Basic chain bottom layer architecture system and method based on block chain
1. The basic chain bottom architecture system based on the block chain is characterized by comprising an application layer, a platform layer, a contract layer, a consensus layer, a network layer, a data layer and a basic equipment layer:
the application layer is used for managing software resources and providing required software services for users so as to meet the personalized requirements of the users;
the platform layer is used for obtaining the data obtained by the application layer, and performing calculation analysis and processing on the data to form visual information which can be used by a user;
the contract layer is used for running script codes, algorithms and protocols of the architecture system;
the consensus layer is used for operating a consensus algorithm of the architecture system so as to achieve consensus on the validity of the block data;
the network layer is used for realizing information exchange among nodes in the block chain network and updating data according to the exchange information;
the data layer is used for realizing the safety of data storage and the consistency of data;
the basic device layer is used for performing data calculation, storage and management services.
2. The blockchain-based underlying architecture system of claim 1, wherein the application layer comprises a specific business App, an App application wallet, and a customization program.
3. The blockchain-based infrastructure system of claim 1, wherein the platform layer includes common components including identity authentication, access control, and reporting management, and operations management including security audit, operation monitoring, and billing management.
4. The blockchain-based underlying architecture system of claim 1, wherein the contract layers include tvm and Tokscript scripts.
5. The blockchain-based underlying architecture system of claim 1, wherein the consensus layer comprises a workload attestation pow and a backbone arbitration.
6. The blockchain-based underlying architecture system of claim 1, wherein the network layer includes neighbor node communications, common messages, and data updates.
7. The blockchain-based infrastructure system of claim 6, wherein the neighbor node communication includes any one of a Bluetooth protocol, a WiFi protocol, a Zigbee protocol, a 4G protocol, and a 5G protocol.
8. The blockchain-based underlying architecture system of claim 1, wherein the data layers comprise databases, files, communication middleware, and encryption algorithms.
9. The blockchain-based base chain underlying architecture system of claim 1, wherein the base device layer includes a physical machine, a cloud server, and a Docker container, the physical machine, the cloud server, and the Docker container each being at least one.
10. The management method of the basic chain underlying architecture system based on the block chain is applied to the basic chain underlying architecture system based on the block chain of any one of claims 1 to 9, and is characterized by comprising the following steps:
s1, the application layer manages software resources and provides needed software service for the user so as to meet the individual requirements of the user;
s2, the platform layer obtains the data obtained by the application layer, and the data is calculated, analyzed and processed to form visual information for the user;
s3, running script codes, algorithms and protocols of the architecture system by the contract layer;
s4, the consensus layer runs the consensus algorithm of the architecture system to make the validity of the block data achieve consensus;
s5, the network layer realizes information exchange among nodes in the block chain network and updates data according to the exchange information;
s6, the data layer realizes the safety of data storage and the consistency of data;
and S7, the basic equipment layer performs data calculation, storage and management services.
Background
The modern society has already advanced into the information economy era, the information technology has become an important driving force for promoting the economic structure to be diversified, the development of the information technology has promoted emerging information communication technologies such as mobile internet, internet of things and industrial internet, and the 5G mobile communication network technology oriented in 2020 has also become a global research and development hotspot. The future 5G network can meet diversified business requirements of people in various areas such as residence, work, leisure and traffic, can provide high-definition video, virtual reality, cloud desktop and other extremely-service experiences for users even in scenes with high traffic density, high connection number density and high mobility characteristics such as dense residential areas, offices and wide area coverage, and the mobile internet provides great convenience for meeting diversified business requirements of people in various aspects such as residence, work, leisure and traffic.
The birth of a blockchain is used to store a decentralized or at least partially decentralized data structure for transactions, while a blockchain network is a network of computing nodes that manage, update, and maintain one or more blockchains by broadcasting, validating, and confirming transactions, etc. As described above, the blockchain network may be provided as a public blockchain network, a private blockchain network, or a federated blockchain network. Distributed Application (DApp) is an internet Application that differs from traditional applications by: the DApp runs on a decentralized network, namely a block chain network, and the DApp can be completely controlled by nodes without centralization in the network; traditional applications are centralized and require a server to obtain data, process data, etc. Blockchains are the underlying environment for applications to run relative to DApp.
However, information security is always a concern, and as the use of block chains is increasingly widespread, the security of the underlying system is also subject to serious examination, and the existing underlying architecture system still needs to be improved in terms of information security.
Disclosure of Invention
The embodiment of the invention provides a basic chain bottom layer architecture system and a basic chain bottom layer architecture method based on a block chain, and aims to solve the problem that the existing bottom layer architecture system is difficult to effectively ensure information safety.
In view of the above problems, the technical solution proposed by the present invention is:
the basic chain bottom architecture system based on the block chain is characterized by comprising an application layer, a platform layer, a contract layer, a consensus layer, a network layer, a data layer and a basic equipment layer:
the application layer is used for managing software resources and providing required software services for users so as to meet the personalized requirements of the users;
the platform layer is used for obtaining the data obtained by the application layer, and performing calculation analysis and processing on the data to form visual information which can be used by a user;
the contract layer is used for running script codes, algorithms and protocols of the architecture system;
the consensus layer is used for operating a consensus algorithm of the architecture system so as to achieve consensus on the validity of the block data;
the network layer is used for realizing information exchange among nodes in the block chain network and updating data according to the exchange information;
the data layer is used for realizing the safety of data storage and the consistency of data;
the basic device layer is used for performing data calculation, storage and management services.
As a preferred technical solution of the present invention, the application layer includes a specific service App, an App application wallet, and a customized program.
As a preferred technical scheme of the invention, the platform layer comprises a general component and operation management, wherein the general component comprises identity authentication, access control and report management, and the operation management comprises security audit, operation monitoring and charging management.
As a preferred embodiment of the present invention, the contract layer includes tvm and Tokscript scripts.
As a preferred embodiment of the present invention, the consensus layer includes a workload proof pow and a main chain arbitration.
As a preferred technical solution of the present invention, the network layer includes neighboring node communication, a common packet, and data update.
As a preferred technical solution of the present invention, the neighboring node communication includes any one of a bluetooth protocol, a WiFi protocol, a Zigbee protocol, a 4G protocol, and a 5G protocol.
As a preferred technical solution of the present invention, the data layer includes a database, a file, communication middleware, and an encryption algorithm.
As a preferred technical solution of the present invention, the basic device layer includes a physical machine, a cloud server, and a Docker container, and the physical machine, the cloud server, and the Docker container are all at least one.
On the other hand, the embodiment of the invention also provides a management method of a basic chain underlying architecture system based on the block chain, which comprises the following steps:
s1, the application layer manages software resources and provides needed software service for the user so as to meet the individual requirements of the user;
s2, the platform layer obtains the data obtained by the application layer, and the data is calculated, analyzed and processed to form visual information for the user;
s3, running script codes, algorithms and protocols of the architecture system by the contract layer;
s4, the consensus layer runs the consensus algorithm of the architecture system to make the validity of the block data achieve consensus;
s5, the network layer realizes information exchange among nodes in the block chain network and updates data according to the exchange information;
s6, the data layer realizes the safety of data storage and the consistency of data;
and S7, the basic equipment layer performs data calculation, storage and management services.
The technical scheme provided by the embodiment of the invention has the beneficial effects that at least:
(1) the invention reduces the consumption of time and cost by using a quick identity authentication mode; the digital identity service which can be verified and authorized is provided, data leakage is prevented, a high safety factor is provided, and identity information is guaranteed not to be stolen and tampered.
(2) The invention utilizes the asymmetric encryption algorithm to ensure that each organization only has the data authority for checking the jurisdiction range of the organization, and the identity owner has the authority for checking all the data, so that the decentralized system effectively solves the problem of identity information isolated island.
(3) The invention has the advantages that the data is stored in a centralized way, the data is distributed and stored on each node, and the data are mutually verified to form a data chain. Under the constraint of a block chain consensus mechanism, all the adding and deleting behaviors need to be agreed and recorded by each node, and any mechanism cannot independently tamper the electronic data, so that the integrity and the safety of the data are ensured.
(4) The user can upload the file by himself, the block chain automatically calculates the hash value and adds the time stamp, and the evidence obtaining element is recorded to eliminate the possibility of forgery. And privacy protection and tamper resistance are performed by using a block chain technology, so that authenticity, uniqueness and integrity of electronic data are guaranteed.
(5) The electronic signing process is looped to form a complete evidence chain, so that risks of impersonation signing, private seal carving, contract tampering and the like are effectively avoided; and the electronic contract is stored in the cloud end through encryption, so that the situations of contract mismatching, loss, damage, leakage and the like caused by natural or human factors are effectively avoided.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
FIG. 1 is a schematic structural diagram of a basic chain underlying architecture system based on a blockchain according to the present disclosure;
FIG. 2 is a flow chart of a processing method of the basic chain underlying architecture system based on the blockchain disclosed by the invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be described clearly and completely with reference to the accompanying drawings of the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all embodiments of the present invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
Thus, the following detailed description of the embodiments of the present invention, presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
Example one
Referring to the attached figure 1, the invention provides a technical scheme: the basic chain bottom layer architecture system based on the block chain comprises an application layer, a platform layer, a contract layer, a consensus layer, a network layer, a data layer and a basic equipment layer;
the application layer is used for managing software resources and providing required software services for users so as to meet the personalized requirements of the users.
Further, the application layer includes a specific business App, an App application wallet, and a customization program.
Specifically, the specific service App provides a required service plate App for different users, and the specific service App mainly comprises service plate Apps in e-government affairs, professional technology, business and service industry, agriculture, forestry, animal husbandry, fishery and water conservancy industry, production, transportation equipment operation, soldiers and other industries and the like; the App application wallet provides financial services such as payment and transaction for Apps of various business boards; meanwhile, the user can freely select a customized program according to the self requirement, and the channel congestion is further reduced.
The platform layer is used for obtaining the data obtained by the application layer, and performing calculation analysis and processing on the data to form visual information which can be used by a user.
Further, the platform layer comprises a general component and operation management, the general component comprises identity authentication, access control and report management, and the operation management comprises security audit, operation monitoring and charging management.
Specifically, the identity authentication is mainly used for ensuring the authenticity of the user identity through the recognition functions of human faces, fingerprints, irises, signatures and the like in the process of user login or registration, enhancing information data management, effectively ensuring the information privacy of the user and avoiding the misuse of user information. The access control is mainly used for identifying and monitoring the network address of the user when the user logs in and the user performs node processing, checking the access authority of the user and avoiding the block chain system from being damaged. The report management is mainly used for summarizing user transaction data, calculating, analyzing and processing the transaction data and providing a visual transaction data table for the user. The safety audit and the operation monitoring are mainly used for auditing and monitoring the network environment of the block chain system, and good transaction ecology is ensured. Billing management is primarily used to provide convenient billing services to users during transactions.
The contract layer is used to run script code, algorithms, and protocols of the architectural system.
Further, the contract layer includes tvm and Tokscript scripts.
In particular, the contractual layer may automatically execute predefined tvm and Tokscript scripts in response to received information. After the contract is issued, the operation and maintenance of the contract are handed to the blocks of the whole network to achieve consensus, so that the goal that each blockchain mutually trusts is achieved.
The consensus layer is used for operating consensus algorithm of the architecture system so as to achieve consensus on the validity of the block data.
Further, the consensus layer includes workload proofs pow and backbone arbitration.
Specifically, the consensus layer is responsible for efficient identification and authentication of the point-to-point mode; and highly dispersed nodes can efficiently achieve consensus on the validity of block data in a decentralized block chain system network. The workload certification pow is mainly used for guessing a random number through hash operation, so that the hash value of the content of the spliced transaction data meets a specified upper limit, and users who can propose the random number meeting the requirement are considered to pay a certain workload and can obtain the reward of the block; the main chain arbitration is mainly used for identifying a block chain network which is formally on-line and can be independent and independent. Whether it is a trusted blockchain network recognized by blockchain communities or not, the transaction information is recognized by all members. The valid block is added to the block chain on the block account book of the master network after being identified by the block chain network.
And the network layer is used for realizing information exchange among nodes in the block chain network and updating data according to the exchange information.
Further, the network layer includes neighboring node communication, general packet, and data update.
Specifically, the neighboring node communication is mainly used for being responsible for communication services between neighboring nodes, wherein the neighboring node communication includes any one of a bluetooth protocol, a WiFi protocol, a Zigbee protocol, a 4G protocol, and a 5G protocol.
The data layer is used for realizing the safety of data storage and the consistency of data.
Further, the data layer includes databases, files, communication middleware, and encryption algorithms.
In particular, the database is mainly used for storing data in the blockchain network. The encryption algorithm adopts an asymmetric encryption algorithm, is mainly used for user identification and operation authority verification, and is also used for generation of digital asset addresses, identification of asset ownership and circulation of digital assets. That is, a public-private key pair may be constructed based on an asymmetrically encrypted digital signature to identify a user identity; generating an encrypted asset address based on the public key, and verifying asset ownership with a public-private key pair; the operation can be signed by a private key, and the operation authority of the user is verified by a public key; the transmitted data may also be encrypted with the public key of the receiver, which decrypts and reads the data with the private key.
The basic device layer is used for performing data calculation, storage and management services.
Further, the basic device layer comprises at least one physical machine, at least one cloud server and at least one Docker container.
Example two
The embodiment of the invention also discloses a basic chain bottom layer architecture system based on the block chainAdministrationThe method, as shown with reference to fig. 2, comprises the following steps:
s1, the application layer manages software resources and provides needed software service for the user so as to meet the individual requirements of the user;
s2, the platform layer obtains the data obtained by the application layer, and the data is calculated, analyzed and processed to form visual information for the user;
s3, running script codes, algorithms and protocols of the architecture system by the contract layer;
s4, the consensus layer runs the consensus algorithm of the architecture system to make the validity of the block data achieve consensus;
s5, the network layer realizes information exchange among nodes in the block chain network and updates data according to the exchange information;
s6, the data layer realizes the safety of data storage and the consistency of data;
and S7, the basic equipment layer performs data calculation, storage and management services.
One or more technical solutions in the embodiments of the present application have at least one or more of the following technical effects:
(1) the invention reduces the consumption of time and cost by using a quick identity authentication mode; the digital identity service which can be verified and authorized is provided, data leakage is prevented, a high safety factor is provided, and identity information is guaranteed not to be stolen and tampered.
(2) The invention utilizes the asymmetric encryption algorithm to ensure that each organization only has the data authority for checking the jurisdiction range of the organization, and the identity owner has the authority for checking all the data, so that the decentralized system effectively solves the problem of identity information isolated island.
(3) The invention has the advantages that the data is stored in a centralized way, the data is distributed and stored on each node, and the data are mutually verified to form a data chain. Under the constraint of a block chain consensus mechanism, all the adding and deleting behaviors need to be agreed and recorded by each node, and any mechanism cannot independently tamper the electronic data, so that the integrity and the safety of the data are ensured.
(4) The user can upload the file by himself, the block chain automatically calculates the hash value and adds the time stamp, and the evidence obtaining element is recorded to eliminate the possibility of forgery. And privacy protection and tamper resistance are performed by using a block chain technology, so that authenticity, uniqueness and integrity of electronic data are guaranteed.
(5) The electronic signing process is looped to form a complete evidence chain, so that risks of impersonation signing, private seal carving, contract tampering and the like are effectively avoided; and the electronic contract is stored in the cloud end through encryption, so that the situations of contract mismatching, loss, damage, leakage and the like caused by natural or human factors are effectively avoided.
It should be understood that the specific order or hierarchy of steps in the processes disclosed is an example of exemplary approaches. Based upon design preferences, it is understood that the specific order or hierarchy of steps in the processes may be rearranged without departing from the scope of the present disclosure. The accompanying method claims present elements of the various steps in a sample order, and are not intended to be limited to the specific order or hierarchy presented.
In the foregoing detailed description, various features are grouped together in a single embodiment for the purpose of streamlining the disclosure. This method of disclosure is not to be interpreted as reflecting an intention that the claimed embodiments of the subject matter require more features than are expressly recited in each claim. Rather, as the following claims reflect, invention lies in less than all features of a single disclosed embodiment. Thus, the following claims are hereby expressly incorporated into the detailed description, with each claim standing on its own as a separate preferred embodiment of the invention.
Those of skill would further appreciate that the various illustrative logical blocks, modules, circuits, and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, circuits, and steps have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present disclosure.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art. An exemplary storage medium is coupled to the processor such the processor can read information from, and write information to, the storage medium. Of course, the storage medium may also be integral to the processor. The processor and the storage medium may reside in an ASIC. The ASIC may reside in a user terminal. Of course, the processor and the storage medium may reside as discrete components in a user terminal.
For a software implementation, the techniques described herein may be implemented with modules (e.g., procedures, functions, and so on) that perform the functions described herein. The software codes may be stored in memory units and executed by processors. The memory unit may be implemented within the processor or external to the processor, in which case it can be communicatively coupled to the processor via various means as is known in the art.
What has been described above includes examples of one or more embodiments. It is, of course, not possible to describe every conceivable combination of components or methodologies for purposes of describing the aforementioned embodiments, but one of ordinary skill in the art may recognize that many further combinations and permutations of various embodiments are possible. Accordingly, the embodiments described herein are intended to embrace all such alterations, modifications and variations that fall within the scope of the appended claims. Furthermore, to the extent that the term "includes" is used in either the detailed description or the claims, such term is intended to be inclusive in a manner similar to the term "comprising" as "comprising" is interpreted when employed as a transitional word in a claim. Furthermore, any use of the term "or" in the specification of the claims is intended to mean a "non-exclusive or".
- 上一篇:石墨接头机器人自动装卡簧、装栓机
- 下一篇:一种模块化的平行实境游戏开发方法及系统