WO2024040512A1 - 区块链的创建方法及相关装置 - Google Patents
区块链的创建方法及相关装置 Download PDFInfo
- Publication number
- WO2024040512A1 WO2024040512A1 PCT/CN2022/114801 CN2022114801W WO2024040512A1 WO 2024040512 A1 WO2024040512 A1 WO 2024040512A1 CN 2022114801 W CN2022114801 W CN 2022114801W WO 2024040512 A1 WO2024040512 A1 WO 2024040512A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- node
- blockchain
- information
- capabilities
- transaction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/08—Configuration management of networks or network elements
- H04L41/0866—Checking the configuration
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/22—Payment schemes or models
- G06Q20/223—Payment schemes or models based on the use of peer-to-peer networks
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3678—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/34—Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
- H04L9/3239—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/106—Packet or message integrity
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/10—Integrity
- H04W12/108—Source integrity
Definitions
- This application relates to the field of communication technology, and in particular, to a method for creating a blockchain and related devices.
- Blockchain is a distributed ledger that combines cryptography, peer-to-peer (P2P) networks, distributed databases and other technologies.
- P2P peer-to-peer
- blockchain transforms the traditional authority center and centralized trust into group consensus and decentralized trust, and builds an untamperable distributed ledger guaranteed by cryptography technology.
- the current evolution of blockchain is independent of network evolution. That is, the current blockchain is an independent distributed storage bypassing the communication network. It cannot be combined with the communication network, and the communication network cannot directly access it. Blockchain is created and managed.
- This application provides a method for creating a blockchain and related devices, which can combine the blockchain with a communication network, thereby enabling the communication network to directly manage the blockchain.
- this application provides a method for creating a blockchain, which includes:
- the type of the first node includes at least one of the following: terminal equipment, access network equipment , core network network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the edge Network nodes are nodes with blockchain capabilities in the communication network;
- a first indication message is received from the at least one first node, where the first indication message is used to indicate whether the first node is configured successfully.
- the LAF may send a first message to the first node to configure the first node as a blockchain node, where the LAF may be a new NF in the CN, or the LAF may also be deployed in the RAN.
- the type of the first node may be one or more of terminal equipment, access network equipment, core network elements, independent nodes, application function nodes, edge network nodes, etc. Therefore, by implementing the solution in this application, the blockchain and the communication network can be combined, and the communication network can directly manage the blockchain.
- the method further includes:
- the sending the first message to at least one first node includes:
- other nodes with blockchain establishment requirements can send blockchain establishment requirement information to LAF to create or manage the blockchain through LAF.
- the blockchain establishment requirement information includes one or more of the following requirements:
- Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control strategy of the blockchain, the number of the first nodes, policy information, the first The identification information of the node, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can be a block Chain operation provides a trusted execution environment.
- the blockchain establishment requirement information includes the policy information
- the sending a first message to at least one first node according to the blockchain establishment requirement information includes:
- the demander of blockchain creation (such as the second node) does not need to obtain the details of the infrastructure of the underlying blockchain, but directly publishes the strategy of building a chain node to LAF, and LAF will automatically identify and satisfy the requirements.
- the underlying node of the strategy builds the blockchain. For the second node, it is simpler and easier to use. In addition, since the underlying details are shielded from the second node, the privacy and security of the network are improved.
- the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node is obtained according to the policy information.
- the first response message includes identification information of the network element where the first node is located, or address information of the first node, or the first Identification information of the node.
- the relevant information of the node is obtained, which is compatible with the existing communication network and has higher applicability.
- the blockchain establishment requirement information includes identification information of the first node
- the sending a first message to at least one first node according to the blockchain establishment requirement information includes:
- the blockchain establishment requirement information directly includes the identification of the first node, making the requirement clearer.
- LAF can directly send the first message to the first node without doing too much processing, which is conducive to improving efficiency.
- Blockchain creation or management efficiency
- sending a first message to the at least one first node based on the identification information of the first node includes:
- the access function of the first node in the network and the blockchain management function are separated, because the access function may not only be provided to the LAF, but also to other network elements. , thus making the functional boundaries between each network element clearer.
- the compatibility of this solution when applied to 5G systems is also improved.
- the identification information of the network element where the first node is located is obtained according to the identification information of the first node, or the address information of the first node includes:
- the information management function and the blockchain management function (ie, LAF) of the first node in the network are separated, because the information management function may not only be provided to the LAF, but also to other network elements. , thus making the functional boundaries between each network element clearer.
- the compatibility of this solution when applied to 5G systems is also improved.
- the network element where the first node is located is an access and mobility management function AMF.
- the type of the first node is a terminal device; the first response message includes identification information of the first node; or the second response message includes the location of the first node.
- the fourth node is a policy control function PCF, or the fifth node is a unified data management UDM.
- the first response message includes identification information of the network element where the first node is located, or address information of the first node; and the second response message includes the first response message.
- the type of the first node is access network equipment, and the fourth node or the fifth node is operation, management and maintenance OAM; or,
- the type of the first node is a core network element, and the fourth node or the fifth node is a network storage function NRF; or,
- the type of the first node is an application function node, and the fourth node or the fifth node is a network opening function NEF.
- the method further includes:
- LAF can obtain the configuration status of the first node in real time, which is conducive to the management of the blockchain status and can improve the response efficiency to the demand side of blockchain creation.
- sending the blockchain establishment result to the second node according to the first indication message of the at least one first node includes:
- the blockchain establishment log includes the completion status of the requirements.
- the blockchain establishment log displays the configuration status details of the blockchain nodes in detail, which is beneficial to the management of the nodes and provides more detailed information to the demander of the blockchain creation.
- the first indication message includes configuration success information or configuration failure information
- the blockchain establishment result includes blockchain establishment success or blockchain establishment failure
- the sending of a blockchain establishment result to the second node according to the first instruction message of the at least one first node includes:
- the blockchain establishment result is sent to the second node according to the quantity of configuration success information included in the first indication message of the at least one first node.
- the blockchain establishment result is that the blockchain is successfully established
- the blockchain establishment result is a failure to establish the blockchain.
- the method further includes:
- a node that meets the blockchain establishment requirements is re-selected and the node is configured as a blockchain node.
- the method further includes:
- Receive blockchain capability information of a plurality of nodes the plurality of nodes including the at least one first node.
- the method further includes:
- the sixth node may be UDM, or the sixth node may be a newly designed network element, such as UTDM, etc., which is not limited here.
- the sixth node is UDM
- the compatibility of the solution of this application for the 5G system can be improved
- the sixth node is UDM
- the applicability of the solution of this application can be improved.
- the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
- the nodes in the client mode are used to generate transactions or transaction proposals
- the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
- the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
- the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
- the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
- the terminal device serves as a client
- the access network device serves as a micro node
- the core network element and independent node serve as a full node
- terminal device 1 serves as a client
- terminal device 2 serves as a micro node, access network device, and independent node.
- a full node for example, terminal equipment acts as a client, application function nodes act as micro nodes, core network elements and independent nodes act as full nodes, and other combination methods.
- the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
- the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the blockchain capability information includes at least one of the following capabilities:
- the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the method further includes:
- this application provides a method for creating a blockchain, which includes:
- the first node receives a first message, the first message is used to configure the first node as a blockchain node;
- the type of the first node includes at least one of the following: terminal equipment, access network equipment, core network Network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the edge network node are Blockchain-capable nodes in communication networks;
- the first node sends a first at least message, and the first indication message is used to indicate whether the first node is configured successfully.
- the method further includes:
- the first node sends blockchain capability information.
- the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
- the nodes in the client mode are used to generate transactions or transaction proposals
- the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
- the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
- the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
- the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
- the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
- the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the blockchain capability information includes at least one of the following capabilities:
- the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the first indication message indicates that the first node is configured successfully
- the method also includes:
- this application provides a method for creating a blockchain, which includes:
- the second node determines the blockchain establishment requirement information
- the second node sends the blockchain establishment requirement information.
- the second node is a node with blockchain establishment requirements.
- the blockchain establishment requirement information includes one or more of the following requirements:
- Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control policy of the blockchain, the number of first nodes, policy information, the number of the first node Identification information, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can run for the blockchain Provide a trusted execution environment.
- the type of the first node includes at least one of the following:
- Terminal equipment access network equipment, core network elements, independent nodes, application function nodes, edge network nodes;
- the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the edge network node are nodes with blockchain capabilities in the communication network.
- the mode includes one or more of the following:
- the nodes in the client mode are used to generate transactions or transaction proposals
- the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
- the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
- the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
- the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
- the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
- the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the method further includes:
- the second node receives the blockchain establishment result; or,
- the second node receives the blockchain establishment result and the blockchain establishment log, wherein the blockchain establishment log includes the completion status of the requirements.
- the blockchain establishment result includes blockchain establishment success or blockchain establishment failure.
- this application provides a method for creating a blockchain, which method includes:
- the fourth node receives a first query request, where the first query request includes policy information, or the first query request includes identification information of the first node;
- the fourth node sends a first response message, wherein when the first query request includes policy information, the first response message includes identification information of the network element where the first node is located, or the first node address information, or identification information of the first node; when the first query request includes identification information of the first node, the first response message includes identification information of the network element where the first node is located , or the address information of the first node;
- the type of the first node includes at least one of the following: terminal equipment, access network equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment , the core network element, the independent node, the application function node and the edge network node are nodes with blockchain capabilities in the communication network.
- the network element where the first node is located is an access and mobility management function AMF.
- the type of the first node is a terminal device; the first query request includes policy information, and the first response message includes identification information of the first node; the fourth node is the policy control function PCF.
- the type of the first node is a terminal device; the first query request includes identification information of the first node, and the first response message includes the identification information of the network element where the first node is located. Identification information, or address information of the first node; the fourth node is a unified data management UDM.
- the first response message includes identification information of the network element where the first node is located, or address information of the first node;
- the type of the first node is access network equipment, and the fourth node is operation, management and maintenance OAM; or,
- the type of the first node is a core network element, and the fourth node is a network storage function NRF; or,
- the type of the first node is an application function node, and the fourth node is a network opening function NEF.
- the method further includes:
- the fourth node receives blockchain capability information of multiple nodes, and the multiple nodes include at least one first node; the type of the first node includes at least one of the following: terminal equipment, access network equipment, core network element, independent node, application function node, edge network node; the terminal device, the access network device, the core network element, the independent node, the application function node and the edge network node It is a node with blockchain capabilities in the communication network;
- the fourth node stores blockchain capability information of the plurality of nodes for use in a ledger anchoring function to determine the at least one first node.
- this application provides a communication device, which is a ledger anchoring function LAF.
- the device includes:
- a transceiver unit configured to send a first message to at least one first node, the first message being used to configure the first node as a blockchain node;
- the type of the first node includes at least one of the following: terminal equipment , access network equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application function
- the nodes and the edge network nodes are nodes with blockchain capabilities in the communication network;
- the transceiver unit is configured to receive a first indication message from the at least one first node, where the first indication message is used to indicate whether the first node is configured successfully.
- the transceiver unit is also used to receive blockchain establishment requirement information from the second node;
- the device further includes a processing unit
- the processing unit When sending the first message to at least one first node, the processing unit is also used to:
- the first message is sent to at least one first node according to the blockchain establishment requirement information through the transceiver unit.
- the blockchain establishment requirement information includes one or more of the following requirements:
- Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control strategy of the blockchain, the number of the first nodes, policy information, the first The identification information of the node, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can be a block Chain operation provides a trusted execution environment.
- the blockchain establishment requirement information includes the policy information; the device further includes a processing unit;
- the processing unit When sending the first message to at least one first node according to the blockchain establishment requirement information, the processing unit is used to:
- the transceiver unit sends the first node to the at least one first node based on the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node. A message.
- the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node is obtained according to the policy information.
- the processing unit is used to:
- the first response message from the fourth node is received through the transceiver unit.
- the first response message includes the identification information of the network element where the first node is located, or the address information of the first node, or , the identification information of the first node.
- the blockchain establishment requirement information includes the identification information of the first node; the device further includes a processing unit;
- the processing unit When sending the first message to at least one first node according to the blockchain establishment requirement information, the processing unit is used to:
- the first message is sent to the at least one first node based on the identification information of the first node through the transceiver unit.
- the processing unit when sending the first message to the at least one first node based on the identification information of the first node, the processing unit is configured to:
- the transceiver unit sends the first message to the at least one first node based on the identification information of the network element where the first node is located or the address information of the first node.
- the identification information of the network element where the first node is located is obtained according to the identification information of the first node, or when the address information of the first node is obtained, the processing unit uses At:
- the second response message from the fifth node is received through the transceiver unit, and the second response message includes identification information of the network element where the first node is located, or address information of the first node.
- the network element where the first node is located is an access and mobility management function AMF.
- the type of the first node is a terminal device; the first response message includes identification information of the first node; or the second response message includes the location of the first node.
- the fourth node is a policy control function PCF, or the fifth node is a unified data management UDM.
- the first response message includes identification information of the network element where the first node is located, or address information of the first node; and the second response message includes the first response message.
- the type of the first node is access network equipment, and the fourth node or the fifth node is operation, management and maintenance OAM; or,
- the type of the first node is a core network element, and the fourth node or the fifth node is a network storage function NRF; or,
- the type of the first node is an application function node, and the fourth node or the fifth node is a network opening function NEF.
- processing unit is also used to:
- the blockchain establishment result is sent to the second node through the transceiver unit according to the first instruction message of the at least one first node.
- the processing unit when sending the blockchain establishment result to the second node according to the first instruction message of the at least one first node, the processing unit is also configured to:
- the blockchain establishment log includes the completion status of the requirements.
- the first indication message includes configuration success information or configuration failure information
- the blockchain establishment result includes blockchain establishment success or blockchain establishment failure
- the processing unit When sending the blockchain establishment result to the second node according to the first instruction message of the at least one first node, the processing unit is configured to:
- the blockchain establishment result is sent to the second node through the transceiver unit according to the amount of configuration success information included in the first indication message of the at least one first node.
- the blockchain establishment result is that the blockchain is successfully established
- the blockchain establishment result is a failure to establish the blockchain.
- processing unit is also used to:
- a node that meets the blockchain establishment requirements is re-selected and the node is configured as a blockchain node.
- the transceiver unit is also used to:
- Receive blockchain capability information of a plurality of nodes the plurality of nodes including the at least one first node.
- the device further includes a storage unit
- the storage unit or the transceiver unit After receiving the blockchain capability information of multiple nodes, the storage unit or the transceiver unit is used to:
- the storage unit is used to store blockchain capability information of the multiple nodes; or,
- the transceiver unit is configured to send the blockchain capability information of the multiple nodes to the sixth node.
- the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
- the nodes in the client mode are used to generate transactions or transaction proposals
- the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate micro-blocks based on said transactions;
- the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
- the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
- the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
- the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
- the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the blockchain capability information includes at least one of the following capabilities:
- the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the transceiver unit is also used to:
- this application provides a communication device, which is a first node, and the device includes:
- a transceiver unit configured to receive a first message, the first message being used to configure the first node as a blockchain node;
- the type of the first node includes at least one of the following: terminal equipment, access network equipment, Core network elements, independent nodes, application function nodes, edge network nodes; the terminal equipment, the access network equipment, the core network elements, the independent nodes, the application function nodes and the edge network Nodes are nodes with blockchain capabilities in the communication network;
- the transceiver unit is configured to send a first indication message, and the first indication message is used to indicate whether the first node is configured successfully.
- the transceiver unit is also used to:
- the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
- the nodes in the client mode are used to generate transactions or transaction proposals
- the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
- the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
- the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
- the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
- the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
- the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the blockchain capability information includes at least one of the following capabilities:
- the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the first indication message indicates that the first node is configured successfully
- the transceiver unit is also used for:
- this application provides a communication device, which is a second node, and the device includes:
- a processing unit used to determine blockchain establishment requirement information
- a transceiver unit used to send the blockchain establishment requirement information.
- the blockchain establishment requirement information includes one or more of the following requirements:
- Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control policy of the blockchain, the number of first nodes, policy information, the number of the first node Identification information, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can run for the blockchain Provide a trusted execution environment.
- the type of the first node includes at least one of the following:
- Terminal equipment access network equipment, core network elements, independent nodes, application function nodes, edge network nodes;
- the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the edge network node are nodes with blockchain capabilities in the communication network.
- the transceiver unit is also used to:
- the blockchain establishment result includes blockchain establishment success or blockchain establishment failure.
- the mode includes one or more of the following:
- the nodes in the client mode are used to generate transactions or transaction proposals
- the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate micro-blocks based on said transactions;
- the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
- the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
- the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
- the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
- the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- this application provides a communication device, which is a fourth node, and the device includes:
- a transceiver unit configured to receive a first query request, where the first query request includes policy information, or the first query request includes identification information of the first node;
- the transceiver unit is configured to send a first response message, wherein when the first query request includes policy information, the first response message includes identification information of the network element where the first node is located, or the third The address information of a node, or the identification information of the first node; when the first query request includes the identification information of the first node, the first response message includes the identification information of the network element where the first node is located. Identification information, or address information of the first node;
- the type of the first node includes at least one of the following: terminal equipment, access network equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment , the core network element, the independent node, the application function node and the edge network node are nodes with blockchain capabilities in the communication network.
- the network element where the first node is located is an access and mobility management function AMF.
- the type of the first node is a terminal device; the first query request includes policy information, and the first response message includes identification information of the first node; the fourth node is the policy control function PCF.
- the type of the first node is a terminal device; the first query request includes identification information of the first node, and the first response message includes the identification information of the network element where the first node is located. Identification information, or address information of the first node; the fourth node is a unified data management UDM.
- the first response message includes identification information of the network element where the first node is located, or address information of the first node;
- the type of the first node is access network equipment, and the fourth node is operation, management and maintenance OAM; or,
- the type of the first node is a core network element, and the fourth node is a network storage function NRF; or,
- the type of the first node is an application function node, and the fourth node is a network opening function NEF.
- the device further includes a storage unit, wherein:
- the transceiver unit is configured to receive blockchain capability information of multiple nodes, the multiple nodes including at least one first node; the type of the first node includes at least one of the following: terminal equipment, access network equipment , core network element, independent node, application function node, edge network node; the terminal device, the access network device, the core network element, the independent node, the application function node and the edge Network nodes are nodes with blockchain capabilities in the communication network;
- the storage unit is used to store blockchain capability information of the plurality of nodes for use in the ledger anchoring function to determine the at least one first node.
- the present application provides a communication device.
- the device may be a LAF.
- the LAF may be an access network device or a core network element or other device. It may also be an access network device or a core network element or a communication device. Devices in other equipment, or devices that can be used in conjunction with access network equipment or core network elements or other equipment.
- the communication device may also be a chip system.
- the communication device can perform the method described in the first aspect.
- the functions of the communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more units or modules corresponding to the above functions.
- the unit or module may be software and/or hardware.
- the operations and beneficial effects performed by the communication device can be referred to the method and beneficial effects described in the first aspect above, and repeated details will not be described again.
- the present application provides a communication device, which may be a first node (for example, the first node may be a terminal device, an access network device, a core network element, an independent node, an application function node, or an edge network node). etc.), it can also be a device in the first node, or a device that can be used in conjunction with the first node.
- the communication device may also be a chip system.
- the communication device can perform the method described in the second aspect.
- the functions of the communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more units or modules corresponding to the above functions.
- the unit or module may be software and/or hardware.
- the present application provides a communication device, which may be a second node, a device in the second node, or a device that can be used in conjunction with the second node.
- the communication device may also be a chip system.
- the communication device can perform the method described in the third aspect.
- the functions of the communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more units or modules corresponding to the above functions.
- the unit or module may be software and/or hardware.
- the operations and beneficial effects performed by the communication device can be referred to the method and beneficial effects described in the third aspect above, and repeated details will not be repeated.
- the present application provides a communication device.
- the device may be a fourth node, a device in the fourth node, or a device that can be used in conjunction with the fourth node.
- the communication device may also be a chip system.
- the communication device can perform the method described in the fourth aspect.
- the functions of the communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software.
- the hardware or software includes one or more units or modules corresponding to the above functions.
- the unit or module may be software and/or hardware.
- the operations and beneficial effects performed by the communication device can be referred to the method and beneficial effects described in the fourth aspect above, and repeated descriptions will not be repeated.
- the present application provides a communication device.
- the device may be a LAF.
- the LAF may be an access network device or a core network element or other device.
- the communication device includes a processor and a transceiver, so The processor and the transceiver are configured to execute computer programs or instructions stored in at least one memory, so that the device implements the method in any one of the first aspects.
- the communication device may also include a memory. Among them, the processor, transceiver and memory are coupled.
- the present application provides a communication device, which may be a first node (for example, the first node may be a terminal device, an access network device, a core network element, an independent node, an application function node, an edge network node, etc.), the communication device includes a processor and a transceiver, the processor and the transceiver are used to execute a computer program or instructions stored in at least one memory, so that the device implements any one of the second aspects. item method.
- the communication device also includes a memory. Among them, the processor, transceiver and memory are coupled.
- the present application provides a communication device, which may be a second node.
- the communication device includes a processor and a transceiver.
- the processor and the transceiver are configured to execute at least one stored in a memory.
- the communication device also includes a memory.
- the processor, transceiver and memory are coupled.
- the present application provides a communication device.
- the device may be a core network element (such as a fourth node, a fifth node or a sixth node, etc.).
- the communication device includes a processor and a transceiver, so The processor and the transceiver are configured to execute computer programs or instructions stored in at least one memory, so that the device implements the method in any one of the fourth aspects.
- the communication device also includes a memory. Among them, the processor, transceiver and memory are coupled.
- the present application provides a computer-readable storage medium.
- Computer programs or instructions are stored in the storage medium.
- any one of the first to sixth aspects is implemented. Methods.
- the present application provides a computer program product including instructions.
- the computer program product includes computer program code.
- any one of the first to sixth aspects can be implemented. item method.
- a communication system including a LAF and at least one first node, wherein:
- the LAF sends a first message to the at least one first node, the first message is used to configure the first node as a blockchain node;
- the type of the first node includes at least one of the following: terminal equipment , access network equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application function
- the nodes and the edge network nodes are nodes with blockchain capabilities in the communication network;
- the at least one first node sends a first indication message to the LAF, where the first indication message is used to indicate whether the first node sending the first indication information is configured successfully.
- the communication system further includes a second node; wherein:
- the second node is used to send blockchain establishment requirement information to the LAF;
- the LAF is used to send a first message to at least one first node, including:
- the LAF is configured to send a first message to at least one first node according to the blockchain establishment requirement information.
- the blockchain establishment requirement information includes one or more of the following requirements:
- Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control strategy of the blockchain, the number of the first nodes, policy information, the first The identification information of the node, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can be a block Chain operation provides a trusted execution environment.
- the blockchain establishment requirement information includes the policy information or the identification information of the first node; the communication system further includes a fourth node; wherein:
- the LAF is configured to send a first message to at least one first node according to the blockchain establishment requirement information, including:
- the LAF is configured to send a first query request to the fourth node, where the first query request includes the policy information, or the first query request includes the identification information of the first node;
- the fourth node is configured to send a first response message to the LAF, wherein when the first query request includes policy information, the first response message includes identification information of the network element where the first node is located. , or the address information of the first node, or the identification information of the first node; when the first query request includes the identification information of the first node, the first response message includes the first The identification information of the network element where the node is located, or the address information of the first node;
- the LAF is configured to send a third node to the at least one first node based on the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node. A message.
- the network element where the first node is located is an access and mobility management function AMF.
- the type of the first node is a terminal device; the first query request includes policy information, and the first response message includes identification information of the first node; the fourth node is the policy control function PCF.
- the type of the first node is a terminal device; the first query request includes identification information of the first node, and the first response message includes the identification information of the network element where the first node is located. Identification information, or address information of the first node; the fourth node is a unified data management UDM.
- the first response message includes identification information of the network element where the first node is located, or address information of the first node;
- the type of the first node is access network equipment, and the fourth node is operation, management and maintenance OAM; or,
- the type of the first node is a core network element, and the fourth node is a network storage function NRF; or,
- the type of the first node is an application function node, and the fourth node is a network opening function NEF.
- the LAF is configured to send a blockchain establishment result to the second node according to the first indication message of the at least one first node; or,
- the LAF is configured to send a blockchain establishment result and a blockchain establishment log to the second node according to the first instruction message of the at least one first node; wherein the blockchain establishment log includes a request for Completion.
- the first indication message includes configuration success information or configuration failure information
- the blockchain establishment result includes blockchain establishment success or blockchain establishment failure
- the LAF is configured to send a blockchain establishment result to the second node according to the first instruction message of the at least one first node, including:
- the LAF is configured to send a blockchain establishment result to the second node according to the amount of configuration success information included in the first indication message of the at least one first node.
- the blockchain establishment result is that the blockchain is successfully established
- the blockchain establishment result is a failure to establish the blockchain.
- the at least one first node is also used for:
- the LAF is also used to store the blockchain capability information
- the LAF is also used to send the blockchain capability information to the fourth node
- the fourth node stores the blockchain capability information.
- the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
- the nodes in the client mode are used to generate transactions or transaction proposals
- the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
- the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
- the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
- the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
- the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
- the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the blockchain capability information includes at least one of the following capabilities:
- the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the LAF is used to send a second message to the third node, where the third node is a successfully configured node among the at least one first node, and the second message is Upon cancellation, the third node is a blockchain node;
- the third node is configured to send a second indication message to the LAF, where the second indication message is used to indicate whether the third node is successfully revoked.
- Figure 1 is a schematic diagram of the architecture of a communication system
- Figure 2 is a schematic diagram of the architecture of another communication system
- FIG. 3 is a schematic diagram of the architecture of the blockchain provided by the embodiment of this application.
- Figure 4 is a schematic flow chart of the blockchain creation method provided by the embodiment of this application.
- Figure 5 is a schematic flow chart of a blockchain creation method provided by an embodiment of the present application.
- Figure 6 is a schematic flow chart of another blockchain creation method provided by an embodiment of the present application.
- Figure 7 is a schematic diagram of the blockchain establishment process of multiple node combinations provided by the embodiment of the present application.
- Figure 8 is another schematic diagram of the blockchain establishment process of multiple node combinations provided by the embodiment of the present application.
- Figure 9 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
- Figure 10 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
- an embodiment means that a particular feature, structure or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application.
- the appearances of this phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those skilled in the art understand, both explicitly and implicitly, that the embodiments described herein may be combined with other embodiments.
- At least one (item) means one or more
- plural means two or more
- at least two (items) means two or three and three
- “and/or” is used to describe the relationship between associated objects, indicating that there can be three relationships.
- a and/or B can mean: only A exists, only B exists, and A and B exist simultaneously. In this case, A and B can be singular or plural.
- the character “/” generally indicates that the related objects are in an "or” relationship.
- At least one of the following” or similar expressions thereof refers to any combination of these items, including any combination of a single item (items) or a plurality of items (items).
- At least one of a, b or c can mean: a, b, c, "a and b", “a and c", “b and c", or "a and b and c” ”, where a, b, c can be single or multiple.
- LTE long term evolution
- FDD frequency division duplex
- TDD time division duplex
- NR new radio
- 5th generation, 5G fifth generation
- 6th generation, 6G sixth generation
- WALN Wireless Local Area Network
- FIG. 1 is a schematic diagram of the architecture of a communication system.
- a terminal device can access a wireless network to communicate with other devices through the wireless network, such as communicating with other terminal devices.
- the wireless network includes a (radio)access network ((radio)access network, (R)AN) and a core network (core network, CN), where (R)AN (hereinafter described as RAN) is used to connect terminal devices After accessing the wireless network, CN is used to manage terminal devices.
- R radio access network
- CN core network
- CN core network
- the terminal equipment, RAN and CN involved in the system architecture in Figure 1 are described in detail below.
- Terminal equipment includes equipment that provides voice and/or data connectivity to users.
- terminal equipment is a device with wireless transceiver functions that can be deployed on land, including indoors or outdoors, handheld, wearable or vehicle-mounted; it can also be deployed on On the water (such as ships, etc.); it can also be deployed in the air (such as aircraft, balloons, satellites, etc.).
- the terminal device can be a mobile phone (mobile phone), tablet computer (Pad), computer with wireless transceiver function, virtual reality (VR) terminal, augmented reality (AR) terminal, industrial control (industrial control) Wireless terminals, vehicle-mounted terminals, wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, wireless terminals in transportation safety Terminals, wireless terminals in smart cities, wireless terminals in smart homes, wearable terminals, etc.
- Terminal equipment can sometimes also be called terminal, user equipment (UE), access terminal, vehicle terminal, industrial control terminal, UE unit, UE station, mobile station, mobile station, remote station, remote terminal, mobile device, UE terminal, wireless communication equipment, UE agent or UE device, etc.
- Terminals can also be fixed or mobile. It can be understood that all or part of the functions of the terminal in this application can also be implemented through software functions running on hardware, or through virtualization functions instantiated on a platform (such as a cloud platform).
- the RAN may include one or more RAN devices (or access network devices), and the interface between the access network device and the terminal device may be a Uu interface (or air interface).
- RAN devices or access network devices
- Uu interface or air interface
- Access network equipment is a node or device that connects terminal equipment to a wireless network.
- Access network equipment includes, but is not limited to, next generation node B (gNB) and evolved nodes in 5G communication systems.
- B evolved node B, eNB
- next generation evolved node B next generation evolved node B (next generation eNB, ng-eNB)
- wireless backhaul equipment radio network controller (radio network controller, RNC), node B (node B, NB) , home base station ((home evolved nodeB, HeNB) or (home node B, HNB)), baseband unit (baseBand unit, BBU), transmitting and receiving point (TRP), transmitting point (TP) , mobile switching center, device-to-device (D2D), vehicle-to-everything (V2X), machine-to-machine (M2M) communication equipment that assumes the base station function etc., it can also include the centralized unit (CU) and distributed unit (DU), non-terrest
- the CN may include one or more CN devices (which may also be understood as network element devices or functional network elements or network functions (network function, NF), etc., which are not limited here).
- CN devices which may also be understood as network element devices or functional network elements or network functions (network function, NF), etc., which are not limited here).
- FIG. 2 is an architectural schematic diagram of another communication system.
- the communication system is a system architecture in a 5G non-roaming scenario.
- the communication system includes the following network functions and entities: network slice selection function (NSSF), network exposure function (NEF), network function repository function (NRF) ), policy control function (PCF), unified data management (UDM), application function (AF), authentication server function (AUSF), access and mobility management Function (access and mobility management function, AMF), session management function (SMF), UE, (radio) access network ((radio) access network, (R)AN), user plane function (user plane function) , UPF) and data network (data network, DN).
- NSF network slice selection function
- NEF network exposure function
- NRF network function repository function
- PCF policy control function
- UDM unified data management
- AF application function
- AUSF authentication server function
- AMF access and mobility management Function
- SMF session management function
- UE radio access network
- R radio access network
- UPF user
- User plane network element As an interface with the data network, it completes functions such as user plane data forwarding, session/flow level-based billing statistics, and bandwidth limitation. That is, packet routing and forwarding and quality of service (QoS) processing of user plane data, etc.
- QoS quality of service
- the user plane network element may be a UPF network element.
- Authentication server performs user security authentication.
- the authentication server may be an AUSF network element.
- Mobility management network element mainly used for mobility management and access management.
- the access management network element can be an AMF network element, which mainly performs functions such as mobility management and access authentication/authorization. In addition, it is also responsible for transmitting user policies between the terminal and PCF network elements.
- Session management network element Mainly used for session management, Internet protocol (IP) address allocation and management of user equipment, selection of endpoints for manageable user plane functions, policy control and charging function interfaces, and downlink data Notifications etc.
- IP Internet protocol
- the session management network element can be an SMF network element, which completes terminal IP address allocation, UPF selection, accounting and QoS policy control, etc.
- the application network element can be an AF network element, which represents the application function of a third party or operator. It is the interface for the 5G network to obtain external application data, and is mainly used to transmit application side information to the network. side needs.
- Unified data management network element responsible for the management of user identification, contract data, authentication data, and user service network element registration management.
- the unified data management network element may be a UDM network element.
- Policy control network element including user subscription data management function, policy control function, billing policy control function, quality of service (QoS) control, etc., a unified policy framework used to guide network behavior, which is the control plane function Network elements (such as AMF, SMF network elements, etc.) provide policy rule information, etc.
- QoS quality of service
- the policy control network element may be the PCF.
- Network function repository function network element Provides storage and selection functions for network function entity information for other core network elements.
- the network element may be an NRF network element.
- the network open network element can be an NEF network element, which is mainly used to expose the services and capabilities of 3GPP network functions to AF, and also allows AF to provide information to 3GPP network functions.
- Network slice selection function network element responsible for selecting network slices for UE.
- the application network element can be an NSSF network element.
- the above functional network elements can be either network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
- the above functional network elements can be divided into one or more services. Furthermore, there may also be services that exist independently of network functions.
- instances of the above-mentioned functional network elements, or instances of services included in the above-mentioned functional network elements, or service instances that exist independently of network functions may be called service instances.
- the CN may also include other possible network elements, such as service communication proxy (SCP), network slice admission control function (NSACF), and network element unified data warehousing (unified data repository, UDR) network element.
- SCP service communication proxy
- NSACF network slice admission control function
- UDR network element unified data warehousing
- each functional network element can be the name of each functional network element shown in Figure 2.
- each functional network element can be It is still the name of each functional network element shown in Figure 2, or it may also have other names.
- the policy control network element may be PCF.
- the policy control function may still be PCF, or may have other names. This application does not limited.
- Nnssf is the service interface provided by NSSF
- Nnef is the service interface provided by NEF
- Nnrf is the service interface provided by NRF
- Npcf is the service interface provided by PCF
- Nudm is the service interface provided by UDM
- Naf is AF.
- the service interface provided by Nausf is the service interface provided by AUSF; the service interface provided by Namf is AMF; the service interface provided by Nsmf is SMF; N1 is the reference point between UE and AMF; N2 is (R)AN and AMF; N3 is the reference point between (R)AN and UPF; N4 is the reference point between SMF and UPF; N6 is the reference point between UPF and DN; N9 is the reference point between UPF Reference point.
- Nnssf, Nnef, Nnrf, Npcf, Nudm, Naf, Nausf, Namf, Nsmf, N1, N2, N3, N4, N6, and N9 in Figure 2 can be found in the meanings defined in the relevant standard protocols. There are no restrictions here.
- the communication system described in the embodiments of the present application can also be described as a communication network or a communication network, and is not limited here.
- the names of the network elements or nodes involved in this application can also be called other names, and are not limited here.
- the new network element or newly designed network element described in this application may be a completely new network element, or it may be an expansion, update or addition of the functions of an existing network element, or , or it can be the merger or integration of functions of multiple existing network elements, etc., which is not limited here.
- the fourth node, the fifth node and the sixth node described in the embodiments of this application may be the same network element, or they may be different network elements. The details are determined based on the actual scenario, which will not be discussed here. limit.
- the fourth node and the fifth node are different network elements.
- the fourth node can be PCF
- the fifth node can be for UDM.
- the fourth node, the fifth node and the sixth node may be the same network element, such as OAM.
- the fourth node, the fifth node and the sixth node may be the same network element, such as NRF.
- the fourth node, the fifth node and the sixth node may be the same network element, such as NEF.
- the nodes involved in the embodiments of this application may be a device, a chip or a network function, etc., in There is no restriction on this.
- the ledger is a technology that shares, replicates, or synchronizes data between nodes through a consensus mechanism.
- Blockchain is a type of ledger technology. Based on the ledger, it also adds anti-tampering technology guaranteed by cryptographic mechanisms.
- blockchain nodes can run on physical nodes, or they can also run in a virtual environment in a physical node. The physical node here is the first node in this application. It is understandable that in addition to being applicable to the creation of blockchain, this application can also be extended to the creation of ledgers, or it may not be called blockchain or ledger later, but other names, which are not limited here.
- LAF Ledger anchor function
- the LAF involved in this application can be a new NF in the core network (that is, deployed in the core network), or the LAF can also be deployed in the RAN, or the LAF can also be deployed in addition to the core network and RAN.
- LAF can be used to perform blockchain-related work in communication networks, such as responsible for the management of the blockchain life cycle, including blockchain deployment, access control, etc.
- the network element used in this application to perform blockchain-related work in the communication network may not be limited to be named LAF, and may also use other names, which are determined based on the actual scenario and are not limited here.
- LAF is mainly used for schematic explanation below.
- the LAF can also be a device, a chip, etc., which is not limited here.
- the INN involved in this application is a node with blockchain capabilities deployed in the communication network.
- an independent node is a node that can be deployed anywhere in the communication network and has blockchain capabilities. It follows the communication network protocol stack and accepts the unified management and scheduling of the communication network, but is not formally connected to the terminal device. , access network equipment, core network equipment and other communication nodes are bound. It should be noted that in this application, it can be deployed anywhere in the communication network, and the name of the node with blockchain capabilities is not limited to LAF, and other names can also be used. The details are determined based on the actual scenario, which is not specified here. Make restrictions. For the convenience of description, the following mainly uses independent nodes for schematic description.
- the independent node when an independent node is deployed in a terminal device, then the independent node follows the protocol stack of the terminal device; when an independent node is deployed in the RAN, then the independent node follows the protocol stack of the RAN; when the independent node is deployed in the core network, Then independent nodes follow the NF protocol stack.
- an independent node can also be a software and hardware integrated server designed for blockchain technology, that is, a blockchain all-in-one machine.
- the node corresponding to AF is an AF node, where the AF node involved in this application is a node with blockchain capabilities. It is understandable that the purpose of interaction between AF and 5G core network is to provide services. According to the operator's deployment strategy, the trusted AF can directly access the internal network element functions of the 5G core network to improve business processing efficiency, or it can also implement information interaction with the corresponding internal network element functions through NEF. That is to say, in this application, in addition to being deployed in internal network elements of the communication network, the blockchain nodes can also be extended to AF to apply to scenarios that require AF participation.
- Edge network nodes refer to nodes used in edge computing.
- Edge computing refers to computing performed at or near the physical location of users or data sources, which can reduce latency and save bandwidth. Among them, edge network nodes belong to the communication network.
- Blockchain structures include single chain, parallel chain, sharding, directed acyclic graph (DAG), etc., which are not limited here.
- Block structure refers to the content and data structure inside the block.
- the consensus mechanism refers to the process of reaching a unified agreement on the status of the network/data/transactions in a decentralized manner, also known as the consensus algorithm.
- the consensus mechanism includes proof of work (POW), proof of equity (proof of stack, POS), delegated proof of stake (DPOS), reliable, replicable, redundant, and fault-tolerant ( reliable, replicated, redundant, and fault-tolerant (RAFT), practical byzantine fault tolerance (PBFT), etc., which are not limited here.
- TEE Trusted execution environment
- TEE is a secure area built in the central processor through software and hardware methods to ensure that the confidentiality and integrity of the programs and data loaded inside it are protected.
- Blockchain access control strategies include LAF authorization, LAF access control, LAF transparent transmission, and LAF proxy. in:
- LAF authorization is performed by LAF through authorization code. For example, when entity A accesses the blockchain, A will send an authentication request to LAF. After LAF authenticates, it will issue an authorization code to A, indicating the scope of authorization and the validity period of authorization. A holds the authorization code to access the blockchain. The blockchain verifies the authorization code and accepts access from A.
- LAF access control Access control is performed by LAF. For example, LAF directly verifies A, and after passing the verification, A can directly access the blockchain. For every request, LAF does a verification.
- LAF transparent transmission LAF transparently transmits the access request, and the ledger node performs access control. For example, LAF directly forwards A's request to the blockchain without processing it, and the blockchain node performs access control.
- LAF proxy LAF performs proxy services and provides access to data. For example, A submits a request to LAF. After LAF passes the verification, LAF obtains it from the chain and replies to A.
- the configuration information corresponding to the node can be understood as the blockchain's requirement configuration for the transactions reported by the node.
- the configuration information of a certain node can be a trigger condition for configuring transaction reporting.
- the trigger condition can be triggered based on time, frequency, or conditions. Among them, based on time, that is, transactions are generated based on a certain time interval and reported to the blockchain. For example, configure terminal equipment/base stations to regularly report environment awareness information, or configure NF to regularly report network status. Based on frequency, that is, configure to report information once every n times an event occurs, where n is an integer greater than 0. Based on conditions, that is, reported when certain conditions are met. For example, a transaction report is generated every time a terminal device accesses the AMF. For example, a transaction report is generated when network traffic reaches a certain threshold.
- the modes supported by nodes in this application include one or more of the following: client mode, micro node mode, light node mode, and full node mode. in:
- Nodes in client mode are used to generate transactions or transaction proposals.
- the transaction proposal is the transaction content pre-executed by the client, such as A transferring X yuan to B.
- Nodes in micro-node mode are used to pre-process transactions or transaction proposals.
- Pre-processing transactions or transaction proposals include one or more of the following: 1 Verify transactions or transaction proposals; 2 Execute transaction proposals to generate transactions; 3 Generate micro areas based on transactions piece.
- verifying a transaction or transaction proposal refers to verifying the signature and integrity of the transaction or transaction proposal, as well as verifying the transaction content.
- micro-block is a method that uses micro-nodes to accept transactions sent by clients, verify the legality of the transactions, and verify the transactions that pass.
- the micro-nodes perform Merkle processing (ie, merkle) on the transactions that pass the verification (not limited to It must be a block generated after merkle processing) to generate a transaction tree and endorse it (micronodes sign the transaction tree).
- Nodes in light node mode are used to process transactions or transaction proposals or micro-blocks.
- Processing transactions or transaction proposals or micro-blocks includes one or more of the following: 1 Verify transactions or transaction proposals; 2 Execute transaction proposals to generate transactions; 3 Consensus on transactions or micro-blocks and generate complete blocks based on transactions or micro-blocks.
- the complete block is a full node/light node that accepts the micro-block sent by the micro-node. A single transaction is no longer verified. Only the result of the endorsement of the micro-block is verified. After merkle processing of multiple micro-blocks, After being encapsulated inside a block, a full block is generated.
- Nodes in full node mode include the functions of nodes in light node mode and are used to store complete blocks.
- the capabilities of nodes include the ability to deploy smart contracts, the ability to call smart contracts, the ability to execute smart contracts, the ability to report transactions, the ability to query transactions, the ability to execute transactions, the ability to query blocks, computing power, storage capabilities, and network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, consensus capabilities, and one or more capabilities.
- the ability to deploy smart contracts refers to the program that nodes can install smart contracts.
- the ability to call smart contracts refers to the procedures that nodes can call smart contracts.
- the ability to execute smart contracts means that the node can execute the program of the smart contract and provide computing resources and operating environment for the execution of smart contracts.
- the ability to report transactions means that the node can generate a transaction and send the transaction to the node.
- the node can be a full node, a micro node, or a light node.
- the ability to query transactions means that nodes can query the blockchain for related transactions through keywords, such as transaction ID or transaction hash or transaction party ID or transaction content.
- the ability to execute transactions means that a node can execute a transaction and obtain the status of the transaction party after the transaction is executed.
- block query means that nodes can query the blockchain for related transactions through keywords, such as block height or block hash or block content.
- block height refers to the sequence number of the block on the chain.
- Computing power refers to the computing processing capabilities of blockchain nodes, such as central processing unit (CPU), graphics processing unit (GPU), and memory status.
- Storage capacity refers to the size of hard drive space.
- Network capability refers to network bandwidth.
- Security algorithm capabilities refer to the algorithms supported by the node.
- the ability to provide a trusted execution environment means that the node can provide a trusted execution environment for the deployment, invocation, execution of smart contracts or the operation of the blockchain.
- Consensus capability refers to the consensus algorithm supported by the node.
- a smart contract refers to an agreement that can automatically perform tasks that need to be completed manually.
- a smart contract is any agreement that can perform some functions on its own. For example, a contract that automatically calculates the amount to be paid by the parties to the contract and arranges for payment of this amount.
- blockchain can be used in multiple scenarios, such as:
- Scenario 1 The communication network blockchain requires UE/access network equipment (such as base stations) to report environment, key performance indicator (KPI), surveying and other information, including:
- the KPI indicator data information generated by various actual operations of traditional networks is mainly collected and collected locally by the base station, and then reported directly to the local sub-network management and database system through private interfaces, and then summarized and reported to higher-level network management and data in hierarchical levels. center.
- UE can report various network KPI data in real time.
- mapping data from a large number of users.
- sensors on test cars often capture images and information of other cars, pedestrians, and bicycles, as well as traffic signs, traffic lights, curbs, lanes, other infrastructure, and roadscapes.
- the IoT network will measure and map the humidity, temperature, environmental conditions, etc. of the environment.
- the network can record and store surveying and mapping data.
- Communication network blockchain can also be used to record various and dynamic data of network elements, such as:
- the operator has the terminal's business data, such as user portrait information (that is, the information that the user signs with the operator when accessing the network), location information, identification (Identity, ID) information, public land mobile network (public land mobile network, PLMN) Information, service information, etc.; the blockchain can provide users with personal information related to them (such as itinerary during the epidemic).
- user portrait information that is, the information that the user signs with the operator when accessing the network
- location information that is, the information that the user signs with the operator when accessing the network
- identification (Identity, ID) information public land mobile network (public land mobile network, PLMN) Information, service information, etc.
- PLMN public land mobile network
- service information etc.
- the blockchain can provide users with personal information related to them (such as itinerary during the epidemic).
- Data on the communication network blockchain can also be provided as services to UE, RAN, CN, and application functions (ie, third-party applications).
- the realization of the above scenario requires the communication network to have blockchain capabilities for various entities of the communication network (such as UE, RAN, CN), and a complete set of management structures and methods for blockchain construction and deployment.
- the current evolution of blockchain is independent of network evolution. That is, the current blockchain is an independent distributed storage bypassing the communication network. It cannot be combined with the communication network, and the communication network cannot directly access it. Blockchain management and configuration.
- the embodiment of this application proposes a method for creating a blockchain, which can realize the combination of the blockchain and the communication network.
- FIG 3 is a schematic diagram of the architecture of the blockchain provided by the embodiment of this application.
- the blockchain architecture in this application is mainly divided into three levels:
- Application (Ledger application, LP) layer It is the upper layer business that needs to deploy blockchain in the communication network.
- LS Service (Ledger Service, LS) layer: used to provide blockchain as a service (BAAS) services for upper-layer businesses, shield infrastructure layer details, and manage nodes in the infrastructure layer.
- BAAS blockchain as a service
- the service layer includes LAF, which can interact with other NFs.
- Infrastructure (Ledger Infrastructure, LI) layer mainly includes UE, RAN, NF, AF, INN, edge network nodes (not shown in the figure), etc., used to provide different levels of blockchain capabilities and receive services Layer configuration to build a blockchain.
- BC enabler is used to identify nodes (such as UE, RAN, NF, AF, and INN) that have blockchain capabilities.
- Figure 3 is only an exemplary illustration, and this application does not limit the blockchain architecture.
- Figure 4 is a schematic flow chart of a blockchain creation method provided by an embodiment of the present application. As shown in Figure 4, the creation method of the blockchain includes the following steps S401 ⁇ S402:
- the LAF sends a first message to at least one first node.
- the LAF sends a first message to at least one first node.
- the first message is used to configure the first node as a blockchain node, or it is understood that the first message is used to indicate that the first node is a blockchain node.
- Blockchain node or understood as the first message is used to activate the first node as a blockchain node.
- configuring the first node as a blockchain node can be understood as configuring the first node as a node in the newly established blockchain when establishing a new blockchain.
- configuring the first node is a blockchain node, which can also be understood as adding the first node as a node in the blockchain on the basis of an already established blockchain, that is, managing or maintaining the existing blockchain.
- the configuration information included in the first message corresponding to different first nodes is different.
- the type of the first node involved in this application may be one or more of terminal equipment, access network equipment, core network elements, independent nodes, application function nodes, edge network nodes, etc.
- terminal equipment, access network equipment, core network network elements, independent nodes and application function nodes, and edge network nodes are nodes with blockchain capabilities in the communication network.
- the first messages corresponding to different first nodes are usually different.
- the first message corresponding to any first node may include configuration information for the first node.
- the configuration information may include the configuration of the transaction reported by the first node.
- the configuration information may include the configuration of the transaction reported by the first node.
- the configuration information may include the configuration of the transaction reported by the first node.
- the first node when using a condition-based approach When triggering transaction reporting, what are the specific conditions for configuring the transaction?
- the above-mentioned LAF sending the first message to at least one first node can be understood as: the LAF sends the first message to at least one first node according to the blockchain establishment requirement information.
- the understanding of the LAF sending the first message to at least one first node according to the blockchain establishment requirement information will be described in detail later, and will not be described in detail here.
- the above-mentioned blockchain establishment requirement information may be generated by LAF, that is, when LAF itself has a blockchain establishment requirement, LAF can determine its own blockchain establishment requirement information, and determine at least one blockchain establishment requirement information based on the blockchain establishment requirement information.
- the first node can also be generated and sent to LAF by other nodes (for convenience of description, the second node will be used as an example for schematic explanation later), so LAF can receive the information from the second node based on the The blockchain establishment requirement information determines at least one first node.
- the second node here refers to the node that has the need to establish a blockchain.
- the second node can be the operator's management plane, management node, or administrator.
- the second node can be other business levels or users, for example, data service nodes, Internet of Vehicles nodes, vertical industry users, end users, etc., which are not limited here.
- the above-mentioned blockchain establishment requirement information includes one or more of the following requirements:
- Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control strategy of the blockchain, the number of first nodes, policy information, identification information of the first node , the capability of the first node, the type of the first node, the mode supported by the first node, the corresponding configuration information of the first node, and whether the first node can provide a trusted execution environment for blockchain operation.
- the capabilities of any first node include one or more of the following capabilities: the ability to deploy smart contracts, the ability to call smart contracts, the ability to execute smart contracts, the ability to report transactions, the ability to query transactions, and the ability to execute transactions , one or more capabilities such as block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, consensus capabilities, etc.
- the modes supported by any first node may include client mode, micro node mode, light node mode, or full node mode.
- a first node only supports one mode in a certain blockchain.
- the modes supported by the same first node in different blockchains can be the same or different, and there is no restriction here.
- the number of first nodes can be understood as the total number of first nodes that make up the blockchain, or the number of first nodes can also be understood as the minimum number of first nodes needed to make up the blockchain, etc., which will not be used here. Make restrictions.
- the policy information can be understood as information used to determine the blockchain node, that is, the first node with a certain identity is not directly specified, but some conditional constraints can be used to determine the first node.
- the policy information of the terminal device may be: 1. A terminal device that meets a certain performance during the registration phase, such as a terminal device with a trusted execution environment. 2. The terminal device currently connected to a certain base station, for example, the terminal device currently connected to the base station ID 1101100100111111. 3. Terminal equipment with a long-term fixed location, such as a terminal equipment with a long-term connection to the base station ID of 1101100100111111, etc. We will not give examples one by one here.
- the policy information of the access network equipment may be: 1. Location information of the access network equipment, such as access network equipment located in a certain cell in a certain area; 2. Access network equipment Security and computing capabilities, such as access network equipment with trusted execution environments and CPU 4-core computing capabilities, etc., I will not give examples one by one here.
- the policy information of the core network element may be: a core network element involving a certain service, etc.
- the policy information of the core network element may be: a core network element involving a certain service, etc.
- the policy information of the independent node may be: an independent node that meets certain performance requirements. For example, independent nodes with CPU64 cores, or independent nodes with 100G of memory, or independent nodes with Gigabit network ports, etc. will not be given here.
- the policy information of the application function node may be: an application function node that meets certain performance requirements.
- an application function node with a CPU64 core, or an application function node with a hundred G memory, or an application function node with a Gigabit network port, etc. are not given here one by one.
- Table 1 is a specific example of blockchain establishment requirement information provided by the embodiment of this application. It should be noted that the blockchain establishment requirement information may include one or more items in Table 1. As shown in Table 1 below, the first column represents the demand parameters, that is, the various requirements in the blockchain establishment demand information, the second column represents the detailed parameters, that is, the detailed configuration of the corresponding requirements, and the third column represents the parameter explanation, that is, the Specific explanation of the meaning of demand parameters:
- step S401 the following step S400 may also be included:
- S400 Multiple nodes send blockchain capability information to LAF.
- LAF receives blockchain capability information of multiple nodes.
- the plurality of nodes include the above-mentioned at least one first node. That is to say, each node with blockchain capabilities can report its own blockchain capability information to LAF, or when the blockchain capability information of a node with blockchain capabilities changes or is updated, it can report to LAF Its own latest blockchain capability information.
- the blockchain capability information reported by any node may include the mode supported by the node and the capabilities of the node in this mode.
- client mode, micro node mode, light node mode, or full node mode, etc. are not limited here.
- nodes in client mode and nodes in micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment.
- Nodes in light node mode and nodes in full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, computing power, and storage capabilities , network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the blockchain capability information reported by any node can also directly include at least one of the following capabilities: the ability to deploy smart contracts, the ability to call smart contracts, the ability to execute smart contracts, and the ability to report transactions , transaction query capabilities, transaction execution capabilities, block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, consensus capabilities, etc., are not limited here.
- the ability to deploy smart contracts the ability to call smart contracts, the ability to execute smart contracts, and the ability to report transactions , transaction query capabilities, transaction execution capabilities, block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, consensus capabilities, etc.
- LAF after receiving the blockchain capability information of multiple nodes, LAF can store the blockchain capability information of multiple nodes, that is, the received blockchain capability information of multiple nodes is stored locally.
- LAF can also send the received blockchain capability information of multiple nodes to the sixth node. Therefore, the sixth node can receive and store the blockchain capability information of multiple nodes from LAF.
- the sixth node may be unified data management (UDM).
- UDM unified data management
- the node is an access network device (eg, a base station)
- the sixth node may be an OAM.
- the sixth node may be NRF.
- the node is AF
- the sixth node can be NEF.
- the node is an INN
- the sixth node can be the LAF itself, or the sixth node can also be other network elements, etc., without limitation here.
- the sixth node can also be a newly defined network element, such as unified trusted data management (UTDM), etc., which is not limited here.
- UTDM unified trusted data management
- This newly defined network element can be used to store blockchain capability information of one or more types of nodes such as terminal equipment, access network equipment, core network elements, independent nodes, application function nodes, edge network nodes, etc. It is understandable that the name of the newly defined network element may not be limited to UTDM. For convenience of description, UTDM will be mainly used as an example for schematic explanation in the following.
- the blockchain capability information reported by each node is used by the LAF to determine which node or nodes meet the blockchain establishment requirements before issuing the first message, so as to send the first message to these nodes that meet the requirements. That is to say, LAF can determine which node or nodes can serve as the first node based on the blockchain establishment demand information and the blockchain capability information reported by each node. After LAF determines the first node, it can provide these first nodes with Send the first message.
- the LAF receives a first indication message from at least one first node.
- the first indication message is used to indicate whether the first node is successfully configured, or it can be understood that the first indication message is used to indicate whether the first node is successfully activated.
- the first indication message includes configuration success information or configuration failure information, or it can be understood that the first indication message includes activation success information or activation failure information.
- the LAF may determine the blockchain establishment result based on the first indication message of at least one first node.
- the blockchain establishment result includes successful blockchain establishment or failed blockchain establishment.
- the LAF may determine the blockchain establishment result based on the number of configuration success information returned by the first node, or the LAF may also determine the blockchain establishment result based on the number of configuration failure information returned by the first node.
- the blockchain establishment result is that the blockchain is successfully established. If the number of successfully configured information is less than the first quantity threshold, the blockchain establishment result is that the blockchain establishment fails.
- the blockchain establishment result is a blockchain establishment failure
- the blockchain establishment result is a block chain establishment failure
- the number of successfully configured information is less than the first quantity threshold, reselect a node that meets the blockchain establishment requirements and configure the node as a blockchain node.
- the number of configuration failure messages is greater than or equal to the second quantity threshold, reselect a node that meets the blockchain establishment requirements and configure the node as a blockchain node.
- the settings of the first quantity threshold and the second quantity threshold may be the same or different, and are specifically determined according to the actual application scenario, and are not limited here.
- the LAF can also send a second message to a third node, where the third node is a successfully configured node among at least one of the configured first nodes, and the second message is used to revoke the third node as a blockchain node.
- the LAF may receive a second indication message from the third node, where the second indication message is used to indicate whether the third node is successfully revoked.
- LAF in addition to configuring a node with blockchain capabilities as a blockchain node, LAF can also revoke or delete one or more nodes in the blockchain to create or manage the blockchain.
- LAF can also update or change the configuration information of a configured blockchain node. For example, taking the first node as terminal device 1 as an example, assume that terminal device 1 is initially configured as a full node in the blockchain. , in the subsequent blockchain management process, LAF can also update the terminal device 1 as a micro-node in the blockchain, etc. The details are determined according to the actual application scenario, and there are no restrictions here.
- LAF can also send block chain establishment requirements to other nodes that have blockchain establishment requirements.
- Blockchain creation results can also be sent, where the blockchain establishment log includes the completion of requirements.
- Table 2 is a specific example of the blockchain establishment log provided by the embodiment of this application. As shown in Table 2 below, the first column represents the demand parameters, and the second column represents the actual demand completion status. It can be understood that Table 2 is only for illustration. During specific implementation, the blockchain establishment log can be provided according to specific demand parameters, for example, including at least one row in Table 2.
- Table 3 is another example of the blockchain establishment log provided by the embodiment of this application. As shown in Table 3 below, the first column indicates the type of node, the second column indicates the demand configuration for the node, and the third column indicates the actual demand completion status. It can be understood that Table 3 is only illustrative and exemplary, and may include at least one row in Table 3.
- the communication network and the blockchain are combined to realize the direct creation and management of the blockchain by the communication network.
- the operator's administrator i.e., the second node
- LAF analyzes the requirements. After that, it decides which nodes to deploy DPKI on and in what mode these nodes are deployed. Therefore, LAF publishes the first message to these nodes to configure the nodes to become blockchain nodes.
- LAF can automatically analyze the demand side's blockchain creation requirements, comprehensively manage the infrastructure of the communication network blockchain, and shield the demand side from the details of the underlying communication network blockchain, providing the demand side with more convenient Blockchain creation/management services.
- the process of sending the first message to at least one first node according to the blockchain establishment requirement information in the above step S401 in the above step S401 will be described in detail below with reference to Figures 5 and 6.
- the blockchain establishment requirement information in Figure 5 includes policy information
- the blockchain establishment requirement information in Figure 6 includes the identification information of the first node.
- Figure 5 is a schematic flow chart of a blockchain creation method provided by an embodiment of the present application. As shown in Figure 5, the creation method of the blockchain includes S501 ⁇ S502. in:
- the LAF obtains the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node according to the policy information in the blockchain establishment requirement information.
- the LAF obtains the identification information of the network element where the first node is located based on the policy information in the blockchain establishment requirement information, or the address information of the first node, or the identification information of the first node can be understood as :
- the LAF obtains the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node from the information stored locally by the LAF based on the policy information. That is to say, the information related to the first node can be stored by the LAF itself. For example, when the type of the first node is an independent node, since the independent node is an entity that does not exist in the existing communication network, it can be stored by the LAF itself. Information about independent nodes.
- the identification information of any first node can be used to uniquely identify the first node.
- the identification information of the first node may be user permanent identity (subscription permanent identifier, SUPI) information, device ID, or international mobile equipment identity (international mobile equipment identity) , IMEI), etc.
- SUPI subscription permanent identifier
- IMEI international mobile equipment identity
- the identification information of the first node may be a physical cell identifier (PCI), a cell global identity (CGI), or a device ID, etc.
- PCI physical cell identifier
- CGI cell global identity
- the identification information of the first node can be a fully qualified domain name (fully qualified domain name, FQDN), or a uniform resource identifier (uniform resource identifier, URI), or a network Function ID, etc. are not limited here.
- the identification information of the first node may be FQDN, or URI, etc., which is not limited here.
- the identification information of the first node may be FQDN, or URI, or node ID, etc., which is not limited here.
- the above-mentioned LAF obtains the identification information of the network element where the first node is located according to the policy information in the blockchain establishment requirement information, or the address information of the first node, or the identification information of the first node. It is understood that: the LAF sends a first query request to the fourth node, and the first query request includes policy information.
- the fourth node receives the first query request from the LAF, and the fourth node can obtain the identification information of the network element where the first node is located according to the first query request including the policy information, or the address information of the first node, Alternatively, the identification information of the first node is fed back to the LAF with a first response message, where the first response message carries the identification information of the network element where the first node is located, or the address information of the first node, or the first response message. Identification information of a node.
- the above-mentioned LAF obtains the identification information of the network element where the first node is located according to the policy information through the following steps: S1, LAF sends a first query to the fourth node request, the first query request includes policy information.
- the fourth node receives the first query request from the LAF, and the fourth node can obtain the identification information (for example, SUPI) of the first node according to the policy information included in the first query request.
- SUPI the identification information of the first node according to the policy information included in the first query request.
- the fourth node feeds back the first response message to the LAF.
- the first response message includes SUPI.
- LAF sends a second query request to the fifth node.
- the second query request includes SUPI.
- the fifth node receives the second query request from the LAF, and obtains the identification information of the network element (for example, AMF) where the first node is located according to the SUPI included in the second query request. S4.
- the fifth node feeds back the second response message to the LAF.
- the second response message includes identification information of the AMF.
- the fourth node may be PCF
- the fifth node may be UDM.
- the fourth node when the fourth node is a new network element, the fourth node may include terminal equipment, access network equipment, core network elements, application function nodes, and independent nodes. and information related to one or more types of nodes such as edge network nodes.
- the fourth node may be called UTDM, etc., or the fourth node may be called another name, which is not limited here. That is to say, relevant information about terminal equipment, access network equipment, core network network elements, application function nodes, independent nodes and/or edge network nodes can be unified and summarized into the same network function (i.e., the fourth node, for example
- the fourth node may be UTDM). Therefore, the terminal device can directly query the AMF where the terminal device is located from the fourth node through the policy information.
- the fourth node may specifically be OAM, or UTDM, etc., which is not limited here.
- the information of the first node obtained by the LAF according to the policy information is the identification information of the network element where the first node is located.
- the network element can be AMF, etc., and there is no restriction here.
- the information of the first node obtained by the LAF according to the policy information may be the address information of the first node.
- the address information of the first node may be an Internet protocol (internet protocol, IP) address, etc.
- the information of the first node obtained by the LAF based on the policy information may also be the identification information of the first node.
- the identification information of the first node may be FQDN, or URI, etc., which is not limited here.
- the fourth node may be NRF, or UTDM, etc., which is not limited here.
- the fourth node may specifically be NEF, or UTDM, etc., which is not limited here.
- the information of the first node obtained by LAF based on the policy information may include whether the current node is idle, current resource occupation status, physical location, address information (such as IP address), FQDN and/or URI. wait.
- the fourth node may be UTDM, etc., which is not limited here.
- the fourth node may specifically be UTDM, etc., which is not limited here.
- the LAF sends the first message to at least one first node based on the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node.
- the LAF can based on the network element where the first node is located.
- the identification information of the network element, or the address information of the first node, or the identification information of the first node sends the first message to at least one first node.
- the LAF may send the first message to the first node through the network element (for example, AMF) where the first node is located.
- the network element for example, AMF
- the LAF may send the first message to the first node through the IP address of the first node, or the LAF may send the first message to the first node through the FQDN or URI. information.
- the LAF may send the first message to the first node through the FQDN or URI.
- Figure 6 is a schematic flowchart of another blockchain creation method provided by an embodiment of the present application.
- the creation method of the blockchain includes S601 ⁇ S602:
- LAF obtains the identification information of the first node from the blockchain establishment requirement information.
- the blockchain establishment requirement information may directly include the identification information of the first node.
- the identification information of the first node please refer to the relevant description in S501, which will not be described again here.
- the LAF sends the first message to at least one first node based on the identification information of the first node.
- the LAF may directly send the first message to at least one first node based on the identification information of the first node. For example, when the type of the first node is a core network element, the identification information of the first node is a URI. Therefore, the LAF can send the first message to the corresponding core network element according to the URI. In another example, when the type of the first node is an application function node, the identification information of the first node is a URI. Therefore, the LAF can send the first message to the corresponding application function node according to the URI.
- the LAF sending the first message to at least one first node based on the identification information of the first node can be understood as: the LAF obtains the identification information of the network element where the first node is located based on the identification information of the first node, or , the address information of the first node, and then sends the first message to at least one first node based on the identification information of the network element where the first node is located, or the address information of the first node.
- the LAF obtaining the information of the first node according to the identification information of the first node can be understood as: the LAF sends a second query request to the fifth node, and the second query request includes the identification information of the first node.
- the fifth node receives the second query request from the LAF, and then obtains the identification information of the network element where the first node is located, or the address information of the first node according to the identification information of the first node in the second query request. , and then feeds back a second response message to the LAF, where the second response message includes identification information of the network element where the first node is located, or address information of the first node.
- the types of the first nodes are terminal equipment, access network equipment, core network elements, independent nodes, application function nodes, and edge network nodes respectively.
- the fifth node is a UDM
- the information of the first node obtained according to the identification information of the first node is the identification information of the network element where the first node is located, such as a terminal.
- the network element where the device is located is AMF.
- the fifth node may be an OAM
- the information of the first node obtained according to the identification information of the first node is the identification information of the network element where the first node is located, etc.
- the network element where the access network equipment is located is AMF.
- the fifth node may be an NRF
- the information of the first node obtained according to the identification information of the first node is the address information of the first node, for example, the core network
- the address information of the network element is its IP address, etc.
- the fifth node may be NEF, and the information of the first node obtained according to the identification information of the first node is the address information of the first node, for example, the application function node
- the address information is the IP address.
- the LAF itself can also summarize all information related to terminal equipment, access network equipment, core network elements, application function nodes, independent nodes and/or edge network nodes. Therefore, the LAF obtains the identification information of the network element where the first node is located based on the identification information of the first node, or the address information of the first node is an internal implementation of the LAF.
- the above-mentioned fifth node may also be a new network element, such as UTDM or may be called another name.
- This new network element summarizes all information related to terminal equipment, access network equipment, core network elements, application function nodes, independent nodes and/or edge network nodes.
- Figure 7 is a schematic diagram of the blockchain establishment process of multiple node combinations provided by the embodiment of the present application.
- the blockchain may need to be deployed on multiple types of first nodes, such as terminal equipment, access network equipment, core network elements, application function nodes, and one or more types of independent nodes, etc.
- first nodes such as terminal equipment, access network equipment, core network elements, application function nodes, and one or more types of independent nodes, etc.
- LAF parses the blockchain establishment requirement information, it needs to interact with other network elements to obtain the above-mentioned first node information, such as the identification information of the AMF where the terminal equipment is located (i.e., AMF ID), the AMF ID where the access network equipment is located, and the core
- the address information of the network element such as IP address
- the address information of the application function node such as IP address
- the functions of other network elements can follow the standards in 5G.
- UDM stores information about terminal equipment
- OAM stores information about access network equipment
- NRF stores information about core network elements
- NEF stores information about application function nodes. Since the independent node is an entity that does not exist in the existing communication network, the LAF itself can save the independent node, or other network elements can save the information of the independent node.
- the LAF is mainly used to save the information of the independent node. Take an example to illustrate schematically. specific:
- LAF requests terminal device information from UDM, which may specifically include the blockchain capability information reported by the terminal device, and/or may also include one or more of the following information: the identification of the AMF where the terminal device is located, and other information.
- LAF's query to UDM includes the following two situations:
- the LAF can communicate with the terminal device through the AMF, that is, send the first message to the LAF through the AMF, and the access network device under the AMF to the terminal device, and receive the first instruction message fed back by the terminal device.
- the blockchain establishment requirement information includes policy information, such as a terminal device at a certain location
- LAF first queries PCF for the SUPI information of the terminal device at that location, and PCF returns the SUPI information of the terminal device to AMF, and then LAF then queries UDM for the AMF ID where the terminal device is located based on SUPI, and UDM returns the AMF ID where the terminal device is located. Therefore, LAF can communicate with the terminal device through the AMF, that is, through the AMF to LAF, and access under the AMF.
- the network device sends a first message to the terminal device, and receives a first instruction message fed back by the terminal device.
- the LAF requests information about the access network equipment from the OAM, which may specifically include the blockchain capability information reported by the access network equipment, and/or may also include one or more of the following information:
- the LAF queries the UDM where the access network equipment is located. AMF ID, UDM returns the AMF ID where the access network device is located. Therefore, the LAF can communicate with the access network device through the AMF, that is, the LAF sends the first message to the access network device through the AMF and receives the access network device. The first indication message fed back by the device.
- identification information such as PCI
- policy information such as access network equipment at a certain location
- the LAF queries the UDM where the access network equipment is located.
- AMF ID UDM returns the AMF ID where the access network device is located. Therefore, the LAF can communicate with the access network device through the AMF, that is, the LAF sends the first message to the access network device through the AMF and receives the access network device. The first indication message fed back by the device.
- the LAF requests the core network element information from the NRF (for example, querying the NRF through the identification information or policy information of the core network element), which may specifically include the core network element.
- the reported blockchain capability information and/or may also include one or more of the following information: the IP address, FQDN, URI, and PLMN of the core network element to which the core network element belongs.
- the LAF may send the first message to the core network element through the IP address, and receive the first instruction message fed back by the core network element.
- the LAF can also directly send the first message to the core network element through the core network element's identification information (such as FQDN or URI), and receive the first indication message fed back by the core network element.
- LAF queries NEF for application function node information (for example, queries NEF through the identification information or policy information of the application function node), which may specifically include the blockchain reported by the application function node. Capability information, and/or, may also include one or more of the following information: IP address, FQDN, URI of the application function node, third-party enterprise corresponding to the application function node, and other information.
- the LAF may send the first message to the application function node through the IP address or location, and receive the first indication message fed back by the application function node.
- the LAF can also directly send the first message to the application function node through the identification information of the application function node (such as FQDN or URI), and receive the first indication message fed back by the application function node.
- LAF self-checks to obtain the information of the independent node (for example, self-checking through the identification information or policy information of the independent node), which may specifically include the blockchain capability information of the independent node, and/ Or, it may also include one or more of the following information: the location of the independent node (such as the physical location of the independent node, which data center/data cloud the independent node is located in, etc.), IP address and other information.
- the LAF may send the first message to the independent node through the IP address, and receive the first indication message fed back by the independent node.
- the LAF can also directly send the first message to the independent node through the independent node's identification information (such as FQDN or URI), and receive the first indication message fed back by the independent node.
- FIG. 8 is another schematic diagram of the blockchain establishment process of multiple node combinations provided by the embodiment of the present application.
- the blockchain may need to be deployed on multiple types of first nodes, such as terminal equipment, access network equipment, core network elements, application function nodes, and one or more types of independent nodes, etc.
- first nodes such as terminal equipment, access network equipment, core network elements, application function nodes, and one or more types of independent nodes, etc.
- LAF parses the blockchain establishment requirement information, it needs to interact with other network elements to obtain the above-mentioned first node information.
- other network elements take a new network element, such as UTDM, as an example. specific:
- the LAF requests terminal device information from UTDM based on the identification information or policy information of the terminal device included in the blockchain establishment requirement information. Specifically, it may include the blockchain capability information reported by the terminal device, and/or it may also include the following information: One or more items: information such as the identification of the AMF where the terminal device is located.
- the LAF can communicate with the terminal device through the AMF, that is, send the first message to the LAF through the AMF, and the access network device under the AMF to the terminal device, and receive the first instruction message fed back by the terminal device.
- the LAF requests the information of the access network device from UTDM based on the identification information or policy information of the access network device included in the blockchain establishment requirement information, which may specifically include the blockchain capability information reported by the access network device, and/or, It may also include one or more of the following information: information such as the identification of the AMF where the access network device is located.
- the LAF can communicate with the access network device through the AMF, that is, send the first message to the LAF to the access network device through the AMF, and receive the first instruction message fed back by the access network device.
- LAF requests the core network element information from UTDM based on the identification information or policy information of the core network element included in the blockchain establishment requirement information, which may specifically include the core network element.
- the blockchain capability information reported by network elements may also include one or more of the following information: the IP address, FQDN, URI, and PLMN corresponding to the core network element.
- the LAF may send the first message to the core network element through the IP address, and receive the first instruction message fed back by the core network element.
- the LAF can also directly send the first message to the core network element through the core network element's identification information (such as FQDN or URI), and receive the first indication message fed back by the core network element.
- LAF queries UTDM for the application function node information based on the identification information or policy information of the application function node included in the blockchain establishment requirement information. Specifically, it may include the information reported by the application function node.
- Blockchain capability information may also include one or more of the following information: IP address, FQDN, URI of the application function node, third-party enterprise corresponding to the application function node, and other information.
- the LAF may send the first message to the application function node through the IP address, and receive the first indication message fed back by the application function node.
- the LAF can also directly send the first message to the application function node through the identification information of the application function node (such as FQDN or URI), and receive the first indication message fed back by the application function node.
- LAF queries UTDM for independent node information based on the identification information or policy information of the independent node included in the blockchain establishment requirement information, which may specifically include the blockchain capabilities reported by the independent node.
- Information, and/or, may also include one or more of the following information: IP address of an independent node and other information.
- the LAF may send the first message to the independent node through the IP address or location, and receive the first indication message fed back by the independent node.
- the LAF can also directly send the first message to the independent node through the independent node's identification information (such as FQDN or URI), and receive the first indication message fed back by the independent node.
- FIG. 9 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
- the communication device shown in Figure 9 can be used to implement part or all of the functions of the LAF in the embodiment corresponding to the above-mentioned blockchain creation method, or the communication device shown in Figure 9 can be used to implement the corresponding implementation of the above-mentioned blockchain creation method.
- Part or all of the functions of the first node in the example, or the communication device shown in Figure 9 can be used to implement part or all of the functions of the second node in the embodiment corresponding to the above-mentioned blockchain creation method, or the communication shown in Figure 9
- the device can be used to implement part or all of the functions of the fourth node in the embodiment corresponding to the above-mentioned blockchain creation method, or the communication device shown in Figure 9 can be used to implement the fifth node in the embodiment corresponding to the above-mentioned blockchain creation method.
- Part or all of the functions of the node, or the communication device shown in Figure 9 can be used to implement part or all of the functions of the sixth node in the embodiment corresponding to the above-mentioned blockchain creation method.
- the device may include a transceiver unit 901, a processing unit 902 and/or a storage unit 903.
- the processing unit 902 is used for data processing.
- the transceiver unit 901 integrates a receiving unit and a sending unit.
- the storage unit 903 is used to store data/information, such as blockchain capability information, etc.
- the transceiver unit 901 may also be called a communication unit. Alternatively, the transceiver unit 901 may also be split into a receiving unit and a transmitting unit.
- the device also includes a storage unit (not shown in Figure 9), which can be used to store instructions and/or data, and the processing unit 902 can read the instructions and/or data in the storage unit to The device is caused to implement the actions of the LAF or the first node or the second node or the fourth node or the fifth node or the sixth node in each of the foregoing method embodiments.
- a storage unit not shown in Figure 9
- the processing unit 902 can read the instructions and/or data in the storage unit to The device is caused to implement the actions of the LAF or the first node or the second node or the fourth node or the fifth node or the sixth node in each of the foregoing method embodiments.
- the communication device is a LAF, and may also be a device in the LAF, or a device that can be used in conjunction with the LAF.
- the LAF may be a core network element or deployed on an access network device, etc., which is not limited here.
- the communication device may also be a chip system. in:
- Transceiver unit 901 configured to send a first message to at least one first node, where the first message is used to configure the first node as a blockchain node;
- the type of the first node includes at least one of the following: terminal Equipment, access network equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application
- the functional nodes and the edge network nodes are nodes with blockchain capabilities in the communication network;
- the transceiver unit 901 is configured to receive a first indication message from the at least one first node, where the first indication message is used to indicate whether the first node is successfully configured.
- the transceiver unit 901 is also used to receive blockchain establishment requirement information from the second node;
- the device also includes a processing unit 902;
- the processing unit 902 is also used to:
- the transceiver unit 901 sends a first message to at least one first node according to the blockchain establishment requirement information.
- the blockchain establishment requirement information includes one or more of the following requirements:
- Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control strategy of the blockchain, the number of the first nodes, policy information, the first The identification information of the node, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can be a block Chain operation provides a trusted execution environment.
- the blockchain establishment requirement information includes the policy information; the device further includes a processing unit 902;
- the processing unit 902 is configured to:
- the transceiver unit 901 sends the message to the at least one first node based on the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node. First news.
- the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node is obtained according to the policy information.
- the processing unit 902 is used to:
- the first response message from the fourth node is received through the transceiver unit 901.
- the first response message includes the identification information of the network element where the first node is located, or the address information of the first node, Or, the identification information of the first node.
- the blockchain establishment requirement information includes the identification information of the first node; the device further includes a processing unit 902;
- the processing unit 902 is configured to:
- the transceiver unit 901 sends a first message to the at least one first node based on the identification information of the first node.
- the processing unit 902 when sending a first message to the at least one first node based on the identification information of the first node, the processing unit 902 is configured to:
- the transceiver unit 901 sends the first message to the at least one first node based on the identification information of the network element where the first node is located or the address information of the first node.
- the processing unit 902 Used for:
- the second response message from the fifth node is received through the transceiver unit 901.
- the second response message includes identification information of the network element where the first node is located, or address information of the first node.
- the network element where the first node is located is an access and mobility management function AMF.
- the type of the first node is a terminal device; the first response message includes identification information of the first node; or the second response message includes the location of the first node.
- the fourth node is a policy control function PCF, or the fifth node is a unified data management UDM.
- the first response message includes identification information of the network element where the first node is located, or address information of the first node; and the second response message includes the first response message.
- the type of the first node is access network equipment, and the fourth node or the fifth node is operation, management and maintenance OAM; or,
- the type of the first node is a core network element, and the fourth node or the fifth node is a network storage function NRF; or,
- the type of the first node is an application function node, and the fourth node or the fifth node is a network opening function NEF.
- processing unit 902 is also used to:
- the blockchain establishment result is sent to the second node through the transceiver unit 901 according to the first instruction message of the at least one first node.
- the processing unit 902 when sending the blockchain establishment result to the second node according to the first instruction message of the at least one first node, is also configured to:
- the blockchain establishment log includes the completion status of the requirements.
- the first indication message includes configuration success information or configuration failure information
- the blockchain establishment result includes blockchain establishment success or blockchain establishment failure
- the processing unit 902 is configured to:
- the block chain establishment result is sent to the second node through the transceiver unit 901 according to the amount of configuration success information included in the first indication message of the at least one first node.
- the blockchain establishment result is that the blockchain is successfully established
- the blockchain establishment result is a failure to establish the blockchain.
- processing unit 902 is also used to:
- a node that meets the blockchain establishment requirements is re-selected and the node is configured as a blockchain node.
- the transceiver unit 901 is also used to:
- Receive blockchain capability information of a plurality of nodes the plurality of nodes including the at least one first node.
- the device further includes a storage unit 903;
- the storage unit 903 or the transceiver unit 901 After receiving the blockchain capability information of multiple nodes, the storage unit 903 or the transceiver unit 901 is used to:
- the storage unit 903 is used to store blockchain capability information of the multiple nodes; or,
- the transceiver unit 901 is configured to send the blockchain capability information of the multiple nodes to the sixth node.
- the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
- the nodes in the client mode are used to generate transactions or transaction proposals
- the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
- the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
- the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
- the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
- the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
- the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the blockchain capability information includes at least one of the following capabilities:
- the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the transceiver unit 901 is also used to:
- the communication device is the first node, or it can be a device in the first node, or a device that can be used in conjunction with the first node.
- the first node may be a terminal device, an access network device, a core network element, an independent node, an application function node, an edge network node, etc., which are not limited here.
- the communication device may also be a chip system. in:
- Transceiver unit 901 configured to receive a first message, the first message being used to configure the first node as a blockchain node;
- the type of the first node includes at least one of the following: terminal equipment, access network equipment , core network network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the edge Network nodes are nodes with blockchain capabilities in the communication network;
- the transceiver unit 901 is configured to send a first indication message, where the first indication message is used to indicate whether the first node is successfully configured.
- the transceiver unit 901 is also used to:
- the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
- the nodes in the client mode are used to generate transactions or transaction proposals
- the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate micro-blocks based on said transactions;
- the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
- the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
- the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
- the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
- the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the blockchain capability information includes at least one of the following capabilities:
- the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the first indication message indicates that the first node is configured successfully
- the transceiver unit 901 is also used for:
- the communication device is the second node, or it can be a device in the second node, or a device that can be used in conjunction with the second node.
- the communication device may also be a chip system. in:
- Processing unit 902 used to determine blockchain establishment requirement information
- the transceiver unit 901 is used to send the blockchain establishment requirement information.
- the blockchain establishment requirement information includes one or more of the following requirements:
- Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control policy of the blockchain, the number of first nodes, policy information, the number of the first node Identification information, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can run for the blockchain Provide a trusted execution environment.
- the type of the first node includes at least one of the following:
- Terminal equipment access network equipment, core network elements, independent nodes, application function nodes, edge network nodes;
- the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the edge network node are nodes with blockchain capabilities in the communication network.
- the transceiver unit 901 is also used to:
- the blockchain establishment result includes blockchain establishment success or blockchain establishment failure.
- the mode includes one or more of the following:
- the nodes in the client mode are used to generate transactions or transaction proposals
- the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
- the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
- the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
- the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
- the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
- the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
- the communication device is a fourth node, or may be a device in the fourth node, or a device that can be used in conjunction with the fourth node.
- the fourth node may be a core network element in 5G or a newly defined core network element in 6G, etc., which is not limited here.
- the communication device may also be a chip system. in:
- the transceiver unit 901 is configured to receive a first query request, where the first query request includes policy information, or the first query request includes identification information of the first node;
- the transceiver unit 901 is configured to send a first response message, wherein when the first query request includes policy information, the first response message includes identification information of the network element where the first node is located, or, The address information of the first node, or the identification information of the first node; when the first query request includes the identification information of the first node, the first response message includes the network element where the first node is located The identification information, or the address information of the first node;
- the type of the first node includes at least one of the following: terminal equipment, access network equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment , the core network element, the independent node, the application function node and the edge network node are nodes with blockchain capabilities in the communication network.
- the network element where the first node is located is an access and mobility management function AMF.
- the type of the first node is a terminal device; the first query request includes policy information, and the first response message includes identification information of the first node; the fourth node is the policy control function PCF.
- the type of the first node is a terminal device; the first query request includes identification information of the first node, and the first response message includes the identification information of the network element where the first node is located. Identification information, or address information of the first node; the fourth node is a unified data management UDM.
- the first response message includes identification information of the network element where the first node is located, or address information of the first node;
- the type of the first node is access network equipment, and the fourth node is operation, management and maintenance OAM; or,
- the type of the first node is a core network element, and the fourth node is a network storage function NRF; or,
- the type of the first node is an application function node, and the fourth node is a network opening function NEF.
- the device further includes a storage unit 903, where:
- the transceiver unit 901 is configured to receive blockchain capability information of multiple nodes.
- the multiple nodes include at least one first node; the type of the first node includes at least one of the following: terminal equipment, access network Equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the Edge network nodes are nodes with blockchain capabilities in the communication network;
- the storage unit 903 is used to store blockchain capability information of the multiple nodes for use in the ledger anchoring function to determine the at least one first node.
- FIG. 10 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
- the communication device includes a processor 1010 and an interface circuit 1020.
- the processor 1010 and the interface circuit 1020 are coupled to each other.
- the interface circuit 1020 may be a transceiver or an input-output interface.
- the communication device may also include a memory 1030 for storing instructions executed by the processor 1010 or input data required for the processor 1010 to run the instructions or data generated after the processor 1010 executes the instructions.
- the processor 1010 is used to perform the function of the above processing unit 902
- the interface circuit 1020 is used to perform the function of the above transceiver unit 901.
- the chip When the above communication device is a chip applied to a LAF, the chip implements the functions of the LAF in the above method embodiment.
- the chip receives information from other network elements (or entities or nodes); or, the chip sends information to other network elements (or entities). or node) to send information.
- the chip When the above communication device is a chip applied to the first node, the chip implements the function of the first node in the above method embodiment.
- the chip receives information from other network elements (or entities or nodes); or, the first node chip sends information to other network elements (or entities).
- the second node chip implements the function of the second node in the above method embodiment, and the second node chip receives information from other network elements; or, the second node chip Send information to other network elements (or entities or nodes).
- the chip implements the function of the fourth node in the above method embodiment, and the chip receives information from other network elements; or, the chip sends information to other network elements (or entities or nodes). )send Message.
- the chip implements the function of the fifth node in the above method embodiment, and the chip receives information from other network elements; or, the chip sends information to other network elements (or entities or nodes). )send Message.
- the chip implements the function of the sixth node in the above method embodiment, and the chip receives information from other network elements; or, the chip sends information to other network elements (or entities or nodes). )send Message.
- processor in the embodiment of the present application can be a CPU, or other general-purpose processor, digital signal processor (digital signal processor, DSP), application specific integrated circuit (ASIC), Field programmable gate array (FPGA) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof.
- DSP digital signal processor
- ASIC application specific integrated circuit
- FPGA Field programmable gate array
- a general-purpose processor can be a microprocessor or any conventional processor.
- the method steps in the embodiments of the present application can be implemented by hardware or by a processor executing software instructions.
- Software instructions can be composed of corresponding software modules, which can be stored in random access memory (random access memory, RAM), flash memory, read-only memory (Read-Only Memory, ROM), programmable read-only memory (programmable ROM) , PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically erasable programmable read-only memory (electrically EPROM, EEPROM), register, hard disk, mobile hard disk, CD-ROM or other well-known in the art any other form of storage media.
- An exemplary storage medium is coupled to the processor such that the processor can read information from the storage medium and write information to the storage medium.
- the storage medium can also be an integral part of the processor.
- the processor and storage media may be located in an ASIC.
- the ASIC may be located in the LAF or the first node or the second node or the fourth node or the fifth node or the sixth node.
- the processor and the storage medium may also exist as discrete components in the LAF or the first node or the second node or the fourth node or the fifth node or the sixth node.
- the computer program product includes one or more computer programs or instructions.
- the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
- the computer program or instructions may be stored in or transmitted over a computer-readable storage medium.
- the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server that integrates one or more available media.
- the available media may be magnetic media, such as floppy disks, hard disks, and magnetic tapes; they may also be optical media, such as digital versatile discs (DVDs); they may also be semiconductor media, such as solid state drives (solid state drives). ,SSD).
- magnetic media such as floppy disks, hard disks, and magnetic tapes
- optical media such as digital versatile discs (DVDs)
- DVDs digital versatile discs
- semiconductor media such as solid state drives (solid state drives). ,SSD).
- Embodiments of the present application also provide a computer-readable storage medium.
- Computer-executable instructions are stored in the computer-readable storage medium.
- the LAF or the first node or the second node in the above method embodiment is The method executed by the node or the fourth node or the fifth node or the sixth node is implemented.
- An embodiment of the present application also provides a computer program product.
- the computer program product includes a computer program.
- the LAF or the first node or the second node or the fourth node or the fifth node in the above method embodiment is The method executed by node or sixth node is implemented.
- Embodiments of the present application also provide a communication system, which includes a LAF or one or more nodes among a first node, a second node, a fourth node, a fifth node, a sixth node, etc.
- LAF is used to execute the method executed by LAF in the above method embodiment.
- the first node is used to execute the method executed by the first node in the above method embodiment.
- the second node is used to execute the method executed by the second node in the above method embodiment.
- the fourth node is used to execute the method executed by the fourth node in the above method embodiment.
- the fifth node is used to execute the method executed by the fifth node in the above method embodiment.
- the sixth node is used to execute the method executed by the sixth node in the above method embodiment.
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
| 需求参数 | 需求完成情况 |
| 第一节点的标识信息 | 完成/未完成 |
| 区块链结构 | 完成/未完成 |
| 共识机制 | 完成/未完成 |
| 吞吐量 | 完成/未完成 |
| 是否支持可编辑 | 完成/未完成 |
| 区块链的访问控制策略-接入网设备 | LAF授权 |
| 区块链的访问控制策略-核心网网元 | LAF访控 |
| 区块链的访问控制策略-独立节点 | LAF透传 |
| 区块链的访问控制策略-应用功能节点 | LAF代理 |
| 区块链的访问控制策略-接入网设备 | LAF访控 |
Claims (48)
- 一种区块链的创建方法,其特征在于,所述方法应用于账本锚定功能LAF,包括:向至少一个第一节点发送第一消息,所述第一消息用于配置所述第一节点为区块链节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;接收来自所述至少一个第一节点的第一指示消息,所述第一指示消息用于指示所述第一节点是否配置成功。
- 根据权利要求1所述的方法,其特征在于,所述方法还包括:接收来自第二节点的区块链建立需求信息;所述向至少一个第一节点发送第一消息,包括:根据所述区块链建立需求信息向至少一个第一节点发送第一消息。
- 根据权利要求2所述的方法,其特征在于,所述区块链建立需求信息包括以下一项或者多项需求:区块链结构,区块结构,共识机制,对吞吐量的需求,区块链是否支持可编辑功能,区块链的访问控制策略,所述第一节点的数量,策略信息,所述第一节点的标识信息,所述第一节点的能力,所述第一节点的类型,所述第一节点支持的模式,所述第一节点对应的配置信息,所述第一节点能否为区块链运行提供可信执行环境。
- 根据权利要求3所述的方法,其特征在于,所述区块链建立需求信息包括所述策略信息;所述根据所述区块链建立需求信息向至少一个第一节点发送第一消息,包括:根据所述策略信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息;基于所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息向所述至少一个第一节点发送第一消息。
- 根据权利要求4所述的方法,其特征在于,所述根据所述策略信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息,包括:向第四节点发送第一查询请求,所述第一查询请求包括所述策略信息;接收来自所述第四节点的第一响应消息,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息。
- 根据权利要求3所述的方法,其特征在于,所述区块链建立需求信息包括所述第一节点的标识信息;所述根据所述区块链建立需求信息向至少一个第一节点发送第一消息,包括:基于所述第一节点的标识信息向所述至少一个第一节点发送第一消息。
- 根据权利要求4或6所述的方法,其特征在于,所述基于所述第一节点的标识信息向所述至少一个第一节点发送第一消息,包括:根据所述第一节点的标识信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;基于所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息向所述至少一个第一节点发送第一消息。
- 根据权利要求7所述的方法,其特征在于,所述根据所述第一节点的标识信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,包括:向第五节点发送第二查询请求,所述第二查询请求包括所述第一节点的标识信息;接收来自所述第五节点的第二响应消息,所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息。
- 根据权利要求4或5或7或8所述的方法,其特征在于,所述第一节点所在的网元为接入与移动管理功能AMF。
- 根据权利要求5或8所述的方法,其特征在于,所述第一节点的类型为终端设备;所述第一响应消息包括所述第一节点的标识信息;或者,所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述第四节点为策略控制功能PCF,或者,所述第五节点为统一数据管理UDM。
- 根据权利要求5或8所述的方法,其特征在于,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述第一节点的类型为接入网设备,所述第四节点或所述第五节点为操作、管理和维护OAM;或者,所述第一节点的类型为核心网网元,所述第四节点或所述第五节点为网络存储功能NRF;或者,所述第一节点的类型为应用功能节点,所述第四节点或所述第五节点为网络开放功能NEF。
- 根据权利要求2-11任一项所述的方法,其特征在于,所述方法还包括:根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果。
- 根据权利要求12所述的方法,其特征在于,所述根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果,包括:根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果和区块链建立日志;其中,所述区块链建立日志包括对需求的完成情况。
- 根据权利要求12或13所述的方法,其特征在于,所述第一指示消息包括配置成功信息或配置失败信息;所述区块链建立结果包括区块链建立成功或区块链建立失败;所述根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果,包括:根据所述至少一个第一节点的第一指示消息中包括的配置成功信息的数量向所述第二节点发送区块链建立结果。
- 根据权利要求14所述的方法,其特征在于,若所述配置成功信息的数量大于或者等于第一数量阈值,则所述区块链建立结果为区块链建立成功;若所述配置成功信息的数量小于所述第一数量阈值,则所述区块链建立结果为区块链建立失败。
- 根据权利要求1-15任一项所述的方法,其特征在于,所述方法还包括:接收多个节点的区块链能力信息,所述多个节点包括所述至少一个第一节点。
- 根据权利要求16所述的方法,其特征在于,所述方法还包括:存储所述多个节点的区块链能力信息;或者,向第六节点发送所述多个节点的区块链能力信息。
- 根据权利要求16或17所述的方法,其特征在于,所述区块链能力信息包括节点支持的模式,所述模式包括以下一项或者多项:客户端模式,微节点模式,轻节点模式,全节点模式;其中:所述客户端模式下的节点用于生成交易或交易提案;所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;根据所述交易生成微区块;所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
- 根据权利要求18所述的方法,其特征在于,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
- 根据权利要求16或17所述的方法,其特征在于,所述区块链能力信息包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
- 根据权利要求1-20任一项所述的方法,其特征在于,所述方法还包括:向第三节点发送第二消息,其中所述第三节点为所述至少一个第一节点中配置成功的节点,所述第二消息用于撤销所述第三节点为区块链节点;接收来自所述第三节点的第二指示消息,所述第二指示消息用于指示所述第三节点是否撤销成功。
- 一种区块链的创建方法,其特征在于,包括:第一节点接收第一消息,所述第一消息用于配置所述第一节点为区块链节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;所述第一节点发送第一指示消息,所述第一指示消息用于指示所述第一节点是否配置成功。
- 根据权利要求22所述的方法,其特征在于,所述方法还包括:所述第一节点发送区块链能力信息。
- 根据权利要求23所述的方法,其特征在于,所述区块链能力信息包括节点支持的模式,所述模式包括以下一项或者多项:客户端模式,微节点模式,轻节点模式,全节点模式;其中:所述客户端模式下的节点用于生成交易或交易提案;所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;根据所述交易生成微区块;所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
- 根据权利要求24所述的方法,其特征在于,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能 力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
- 根据权利要求23所述的方法,其特征在于,所述区块链能力信息包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
- 根据权利要求21-26任一项所述的方法,其特征在于,所述第一指示消息指示所述第一节点配置成功;所述方法还包括:接收第二消息,所述第二消息用于撤销所述第一节点为区块链节点;发送第二指示消息,所述第二指示消息用于指示所述第一节点是否撤销成功。
- 一种通信装置,其特征在于,包括用于执行权利要求1-21中任一项所述方法的单元或模块,或者,包括用于执行权利要求22-27中任一项所述方法的单元或模块。
- 一种通信装置,其特征在于,包括:一个或多个处理器,一个或多个收发器和一个或多个存储器;其中,所述一个或多个存储器用于存储计算机程序,所述一个或多个处理器和所述一个或多个收发器用于执行存储于所述一个或多个存储器中的计算机程序,以使得所述通信装置执行如权利要求1-21,或者,权利要求22-27中任一项所述的方法。
- 一种计算机可读存储介质,其特征在于,所述存储介质中存储有计算机程序或指令,当所述计算机程序或指令被计算机执行时,实现如权利要求1-21,或者,权利要求22-27中任一项所述的方法。
- 一种计算机程序产品,其特征在于,包括计算机程序代码,当所述计算机程序代码在计算机上运行时,以实现权利要求1-21,或者,权利要求22-27中任一项所述的方法。
- 一种通信系统,其特征在于,所述通信系统包括账本锚定功能LAF和至少一个第一节点;其中:所述LAF用于向所述至少一个第一节点发送第一消息,所述第一消息用于配置所述第一节点为区块链节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;所述至少一个第一节点用于向所述LAF发送第一指示消息,所述第一指示消息用于指示 发送所述第一指示信息的第一节点是否配置成功。
- 根据权利要求32所述的通信系统,其特征在于,所述通信系统还包括第二节点;其中:所述第二节点用于向所述LAF发送区块链建立需求信息;所述LAF用于向至少一个第一节点发送第一消息,包括:所述LAF用于根据所述区块链建立需求信息向至少一个第一节点发送第一消息。
- 根据权利要求33所述的通信系统,其特征在于,所述区块链建立需求信息包括以下一项或者多项需求:区块链结构,区块结构,共识机制,对吞吐量的需求,区块链是否支持可编辑功能,区块链的访问控制策略,所述第一节点的数量,策略信息,所述第一节点的标识信息,所述第一节点的能力,所述第一节点的类型,所述第一节点支持的模式,所述第一节点对应的配置信息,所述第一节点能否为区块链运行提供可信执行环境。
- 根据权利要求34所述的通信系统,其特征在于,所述区块链建立需求信息包括所述策略信息或者第一节点的标识信息;所述通信系统还包括第四节点;其中:所述LAF用于根据所述区块链建立需求信息向至少一个第一节点发送第一消息,包括:所述LAF用于向所述第四节点发送第一查询请求,所述第一查询请求包括所述策略信息,或者,所述第一查询请求包括第一节点的标识信息;所述第四节点用于向所述LAF发送第一响应消息,其中,当所述第一查询请求包括策略信息时,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息;当所述第一查询请求包括第一节点的标识信息时,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述LAF用于基于所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息向所述至少一个第一节点发送第一消息。
- 根据权利要求35所述的通信系统,其特征在于,所述第一节点所在的网元为接入与移动管理功能AMF。
- 根据权利要求35或36所述的通信系统,其特征在于,所述第一节点的类型为终端设备;所述第一查询请求包括策略信息,所述第一响应消息包括所述第一节点的标识信息;所述第四节点为策略控制功能PCF。
- 根据权利要求35或36所述的通信系统,其特征在于,所述第一节点的类型为终端设备;所述第一查询请求包括第一节点的标识信息,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述第四节点为统一数据管理UDM。
- 根据权利要求35所述的通信系统,其特征在于,所述第一响应消息包括所述第 一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述第一节点的类型为接入网设备,所述第四节点为操作、管理和维护OAM;或者,所述第一节点的类型为核心网网元,所述第四节点为网络存储功能NRF;或者,所述第一节点的类型为应用功能节点,所述第四节点为网络开放功能NEF。
- 根据权利要求33-39任一项所述的通信系统,其特征在于,所述LAF用于根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果;或者,所述LAF用于根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果和区块链建立日志;其中,所述区块链建立日志包括对需求的完成情况。
- 根据权利要求40所述的通信系统,其特征在于,所述第一指示消息包括配置成功信息或配置失败信息;所述区块链建立结果包括区块链建立成功或区块链建立失败;所述LAF用于根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果,包括:所述LAF用于根据所述至少一个第一节点的第一指示消息中包括的配置成功信息的数量向所述第二节点发送区块链建立结果。
- 根据权利要求41所述的通信系统,其特征在于,若所述配置成功信息的数量大于或者等于第一数量阈值,则所述区块链建立结果为区块链建立成功;若所述配置成功信息的数量小于所述第一数量阈值,则所述区块链建立结果为区块链建立失败。
- 根据权利要求32-42任一项所述的通信系统,其特征在于,所述至少一个第一节点还用于:向所述LAF发送区块链能力信息。
- 根据权利要求43所述的通信系统,其特征在于,所述LAF还用于存储所述区块链能力信息;或者,所述LAF还用于向第四节点发送所述区块链能力信息;所述第四节点存储所述区块链能力信息。
- 根据权利要求43或44所述的通信系统,其特征在于,所述区块链能力信息包括节点支持的模式,所述模式包括以下一项或者多项:客户端模式,微节点模式,轻节点模式,全节点模式;其中:所述客户端模式下的节点用于生成交易或交易提案;所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;根据所述交易生成微区块;所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述 交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
- 根据权利要求45所述的通信系统,其特征在于,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
- 根据权利要求43或44所述的通信系统,其特征在于,所述区块链能力信息包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
- 根据权利要求32-47任一项所述的通信系统,其特征在于,所述LAF用于向所述第三节点发送第二消息,其中所述第三节点为所述至少一个第一节点中配置成功的节点,所述第二消息用于撤销所述第三节点为区块链节点;所述第三节点用于向所述LAF发送第二指示消息,所述第二指示消息用于指示所述第三节点是否撤销成功。
Priority Applications (4)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| EP22956059.4A EP4567701A4 (en) | 2022-08-25 | 2022-08-25 | METHOD FOR CREATING A BLOCKCHAIN, AND ASSOCIATED APPARATUS |
| CN202280099481.9A CN119923656A (zh) | 2022-08-25 | 2022-08-25 | 区块链的创建方法及相关装置 |
| PCT/CN2022/114801 WO2024040512A1 (zh) | 2022-08-25 | 2022-08-25 | 区块链的创建方法及相关装置 |
| US19/060,254 US20250193079A1 (en) | 2022-08-25 | 2025-02-21 | Blockchain creation method and related apparatus |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| PCT/CN2022/114801 WO2024040512A1 (zh) | 2022-08-25 | 2022-08-25 | 区块链的创建方法及相关装置 |
Related Child Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| US19/060,254 Continuation US20250193079A1 (en) | 2022-08-25 | 2025-02-21 | Blockchain creation method and related apparatus |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2024040512A1 true WO2024040512A1 (zh) | 2024-02-29 |
Family
ID=90012027
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/CN2022/114801 Ceased WO2024040512A1 (zh) | 2022-08-25 | 2022-08-25 | 区块链的创建方法及相关装置 |
Country Status (4)
| Country | Link |
|---|---|
| US (1) | US20250193079A1 (zh) |
| EP (1) | EP4567701A4 (zh) |
| CN (1) | CN119923656A (zh) |
| WO (1) | WO2024040512A1 (zh) |
Families Citing this family (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN120322992A (zh) * | 2022-12-07 | 2025-07-15 | 华为技术有限公司 | 区块链建立方法及通信装置 |
Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110351191A (zh) * | 2018-04-20 | 2019-10-18 | 腾讯科技(深圳)有限公司 | 网络配置方法、系统、设备及存储介质 |
| CN111405607A (zh) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | 一种网络切换方法、设备及区块链系统 |
| US20210034779A1 (en) * | 2019-07-31 | 2021-02-04 | Nokia Technologies Oy | User-controlled access to data in a communication network |
| WO2022028791A1 (en) * | 2020-08-05 | 2022-02-10 | Nchain Licensing Ag | Connecting to the blockchain network |
Family Cites Families (2)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109246179B (zh) * | 2018-06-30 | 2021-06-01 | 华为技术有限公司 | 维护区块链的方法和装置、服务器和计算机可读存储介质 |
| US12143395B2 (en) * | 2020-05-05 | 2024-11-12 | International Business Machines Corporation | Low trust privileged access management |
-
2022
- 2022-08-25 CN CN202280099481.9A patent/CN119923656A/zh active Pending
- 2022-08-25 WO PCT/CN2022/114801 patent/WO2024040512A1/zh not_active Ceased
- 2022-08-25 EP EP22956059.4A patent/EP4567701A4/en active Pending
-
2025
- 2025-02-21 US US19/060,254 patent/US20250193079A1/en active Pending
Patent Citations (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN110351191A (zh) * | 2018-04-20 | 2019-10-18 | 腾讯科技(深圳)有限公司 | 网络配置方法、系统、设备及存储介质 |
| CN111405607A (zh) * | 2019-01-02 | 2020-07-10 | 中国移动通信有限公司研究院 | 一种网络切换方法、设备及区块链系统 |
| US20210034779A1 (en) * | 2019-07-31 | 2021-02-04 | Nokia Technologies Oy | User-controlled access to data in a communication network |
| WO2022028791A1 (en) * | 2020-08-05 | 2022-02-10 | Nchain Licensing Ag | Connecting to the blockchain network |
Non-Patent Citations (1)
| Title |
|---|
| See also references of EP4567701A4 * |
Also Published As
| Publication number | Publication date |
|---|---|
| EP4567701A1 (en) | 2025-06-11 |
| CN119923656A (zh) | 2025-05-02 |
| US20250193079A1 (en) | 2025-06-12 |
| EP4567701A4 (en) | 2025-08-27 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| EP4016961B1 (en) | Information obtaining method and device | |
| WO2020224463A1 (zh) | 一种数据分析方法及装置 | |
| WO2020147760A1 (zh) | 一种局域网通信方法、装置及系统 | |
| WO2020220865A1 (zh) | 网络功能服务的身份校验方法及相关装置 | |
| JP2021502780A (ja) | エッジネットワークケイパビリティ開放を実現する方法、装置、機器および記憶媒体 | |
| WO2020103828A1 (zh) | 群组通信方法、设备及系统 | |
| MX2012010363A (es) | Metodo y aparato para soportar comunicaciones de maquina a maquina. | |
| WO2021135663A1 (zh) | 应用实例确定的方法、装置及系统 | |
| WO2021135187A1 (zh) | 一种切片控制方法及装置 | |
| WO2022222745A1 (zh) | 一种通信方法及装置 | |
| WO2020253343A1 (zh) | 一种管理服务的发现方法及装置 | |
| CN111865633B (zh) | 一种通信方法、装置及系统 | |
| WO2021159415A1 (zh) | 通信方法、装置及系统 | |
| US20250193079A1 (en) | Blockchain creation method and related apparatus | |
| WO2021147687A1 (zh) | 一种通信的方法及装置和系统 | |
| WO2024037215A1 (zh) | 通信方法及装置 | |
| WO2021134347A1 (zh) | 资源分配方法、装置及系统 | |
| EP4478763A1 (en) | Communication method and apparatus | |
| WO2021218244A1 (zh) | 通信方法、装置及系统 | |
| CN116866965A (zh) | 一种备份方法、通信装置及通信系统 | |
| US20240430089A1 (en) | Communication method, terminal device, and communication apparatus | |
| US20240396979A1 (en) | Communication method, communication apparatus, and communication system | |
| WO2026001734A1 (zh) | 通信方法及装置 | |
| WO2025256424A1 (zh) | 通信方法和装置 | |
| WO2025035329A1 (zh) | 通信系统、业务调用方法及装置 |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 22956059 Country of ref document: EP Kind code of ref document: A1 |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 202280099481.9 Country of ref document: CN |
|
| REG | Reference to national code |
Ref country code: BR Ref legal event code: B01A Ref document number: 112025003541 Country of ref document: BR |
|
| WWE | Wipo information: entry into national phase |
Ref document number: 2022956059 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 2022956059 Country of ref document: EP Effective date: 20250306 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| WWP | Wipo information: published in national office |
Ref document number: 202280099481.9 Country of ref document: CN |
|
| WWP | Wipo information: published in national office |
Ref document number: 2022956059 Country of ref document: EP |
|
| ENP | Entry into the national phase |
Ref document number: 112025003541 Country of ref document: BR Kind code of ref document: A2 Effective date: 20250224 |






