Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Chain code management method and device of alliance chain and terminal equipment

A management method and chain code technology, applied in the chain code management method, device and terminal equipment field of the alliance chain, can solve the problem of low reliability of container management corresponding to the chain code, improve management reliability, and achieve simple and simple interception operations. Easy to combine effects

Pending Publication Date: 2022-02-08
HANGZHOU QULIAN TECH CO LTD
View PDF0 Cites 1 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] The embodiment of this application provides a chain code management method, device and terminal equipment of the consortium chain, aiming to solve the problem of low reliability of container management corresponding to the existing chain code

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Chain code management method and device of alliance chain and terminal equipment
  • Chain code management method and device of alliance chain and terminal equipment
  • Chain code management method and device of alliance chain and terminal equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0056] This embodiment provides a chain code management method of an alliance chain, which is applied to a chain code management system. The chain code management system includes a Docker container management module created based on Docker container technology, and the chain code management system includes K8s based on K8s container technology. Container management modules such as figure 1 As shown, the method includes steps S101 to S103:

[0057] Specifically, the Docker container management module is used to run the chaincode container of the alliance chain based on the docker service, and the K8s container management module of the K8s container technology is used to use the Kubernetes platform to realize the operation method of the chaincode container. The operation method of the chain code container includes creating, running, shutting down or removing the chain code container, etc. The K8s container management module is also used for accessing the K8s API provided by the...

Embodiment 2

[0069] This embodiment is a further description of Embodiment 1. For the same or similar parts as Embodiment 1, please refer to the relevant description of Embodiment 1 for details, and details will not be repeated here. Such as figure 2 As shown, the above step S102 includes step S202, and step S103 includes step S203. The chain code management method of the consortium chain provided by the embodiment of the present application includes:

[0070] Step S201, when receiving a request instruction from a peer node to perform a corresponding operation on the chain code, analyze the request instruction.

[0071] Specifically, where step S201 is the same as or similar to the above-mentioned step S101, please refer to the relevant description of step S101 for details, and details are not repeated here.

[0072] Step S202, when parsing out that the request instruction is a request instruction for chaincode container creation, intercept the invocation of the Docker creation interface...

Embodiment 3

[0084] This embodiment is a further description of Embodiment 1. For the same or similar parts as Embodiment 1, please refer to the relevant description of Embodiment 1 for details, and details will not be repeated here. Such as image 3 As shown, the above step S102 includes step S302, and step S103 includes step S303. The chain code management method of the consortium chain provided by the embodiment of the present application includes:

[0085] Step S301, when receiving a request instruction from a peer node to perform a corresponding operation on the chain code, analyze the request instruction.

[0086] Specifically, where step S301 is the same as or similar to the above-mentioned step S101, please refer to the relevant description of step S101 for details, and details are not repeated here.

[0087] Step S302, when parsing out that the request instruction is a request instruction for chaincode container configuration, intercept the invocation of the Docker configuration ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention is suitable for the technical field of alliance chains, and provides a chain code management method and device of an alliance chain and terminal equipment, and the method comprises the steps: analyzing a request instruction when the request instruction of performing corresponding operation on a chain code by a peer node is received; when it is analyzed that the request instruction is not the request instruction constructed by the chain code mirror image, intercepting calling of a Docker interface corresponding to a Docker container management module, and calling a K8s interface corresponding to a K8s container management module; and executing a chain code container operation corresponding to the request instruction through the K8s interface. According to the method and device, calling of the Docker interface corresponding to the Docker container management module can be intercepted firstly, and a source code of a chain code Docker control part in a peer node in a chain code cannot be changed, so that the source code of the chain code Docker control part does not need to be changed, errors are not easy to occur, a K8s management container can be simply and conveniently combined, and the management reliability of the container corresponding to the chain code is improved.

Description

technical field [0001] The present application belongs to the technical field of consortium chains, and in particular relates to a chain code management method, device and terminal equipment of consortium chains. Background technique [0002] During the deployment process of the alliance chain, sometimes it is necessary to deploy multiple identical or similar chain codes (Chaincode, also known as smart contracts), and each time it takes a lot of time to perform repetitive work, so container technology came into being , containers are a lightweight, portable, self-contained virtualization technology that enables related chaincodes to run the same way almost anywhere. [0003] Docker is an open source application container engine. Based on the Docker container technology, it can be used as a virtualized container to run in isolation on the host machine in the Docker way. The Docker image (Image) is a special file system. In addition to providing the container runtime required ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F9/455G06F16/27
CPCG06F9/45558G06F16/27G06F2009/45591G06F2009/4557
Inventor 匡立中李伟钟蔚蔚张帅柯帆
Owner HANGZHOU QULIAN TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products