WO2024040512A1 - 区块链的创建方法及相关装置 - Google Patents

区块链的创建方法及相关装置 Download PDF

Info

Publication number
WO2024040512A1
WO2024040512A1 PCT/CN2022/114801 CN2022114801W WO2024040512A1 WO 2024040512 A1 WO2024040512 A1 WO 2024040512A1 CN 2022114801 W CN2022114801 W CN 2022114801W WO 2024040512 A1 WO2024040512 A1 WO 2024040512A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
blockchain
information
capabilities
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/CN2022/114801
Other languages
English (en)
French (fr)
Inventor
王东晖
刘斐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huawei Technologies Co Ltd
Original Assignee
Huawei Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huawei Technologies Co Ltd filed Critical Huawei Technologies Co Ltd
Priority to EP22956059.4A priority Critical patent/EP4567701A4/en
Priority to CN202280099481.9A priority patent/CN119923656A/zh
Priority to PCT/CN2022/114801 priority patent/WO2024040512A1/zh
Publication of WO2024040512A1 publication Critical patent/WO2024040512A1/zh
Priority to US19/060,254 priority patent/US20250193079A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0866Checking the configuration
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/223Payment schemes or models based on the use of peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3678Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/34Network arrangements or protocols for supporting network services or applications involving the movement of software or configuration parameters 
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/108Source integrity

Definitions

  • This application relates to the field of communication technology, and in particular, to a method for creating a blockchain and related devices.
  • Blockchain is a distributed ledger that combines cryptography, peer-to-peer (P2P) networks, distributed databases and other technologies.
  • P2P peer-to-peer
  • blockchain transforms the traditional authority center and centralized trust into group consensus and decentralized trust, and builds an untamperable distributed ledger guaranteed by cryptography technology.
  • the current evolution of blockchain is independent of network evolution. That is, the current blockchain is an independent distributed storage bypassing the communication network. It cannot be combined with the communication network, and the communication network cannot directly access it. Blockchain is created and managed.
  • This application provides a method for creating a blockchain and related devices, which can combine the blockchain with a communication network, thereby enabling the communication network to directly manage the blockchain.
  • this application provides a method for creating a blockchain, which includes:
  • the type of the first node includes at least one of the following: terminal equipment, access network equipment , core network network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the edge Network nodes are nodes with blockchain capabilities in the communication network;
  • a first indication message is received from the at least one first node, where the first indication message is used to indicate whether the first node is configured successfully.
  • the LAF may send a first message to the first node to configure the first node as a blockchain node, where the LAF may be a new NF in the CN, or the LAF may also be deployed in the RAN.
  • the type of the first node may be one or more of terminal equipment, access network equipment, core network elements, independent nodes, application function nodes, edge network nodes, etc. Therefore, by implementing the solution in this application, the blockchain and the communication network can be combined, and the communication network can directly manage the blockchain.
  • the method further includes:
  • the sending the first message to at least one first node includes:
  • other nodes with blockchain establishment requirements can send blockchain establishment requirement information to LAF to create or manage the blockchain through LAF.
  • the blockchain establishment requirement information includes one or more of the following requirements:
  • Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control strategy of the blockchain, the number of the first nodes, policy information, the first The identification information of the node, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can be a block Chain operation provides a trusted execution environment.
  • the blockchain establishment requirement information includes the policy information
  • the sending a first message to at least one first node according to the blockchain establishment requirement information includes:
  • the demander of blockchain creation (such as the second node) does not need to obtain the details of the infrastructure of the underlying blockchain, but directly publishes the strategy of building a chain node to LAF, and LAF will automatically identify and satisfy the requirements.
  • the underlying node of the strategy builds the blockchain. For the second node, it is simpler and easier to use. In addition, since the underlying details are shielded from the second node, the privacy and security of the network are improved.
  • the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node is obtained according to the policy information.
  • the first response message includes identification information of the network element where the first node is located, or address information of the first node, or the first Identification information of the node.
  • the relevant information of the node is obtained, which is compatible with the existing communication network and has higher applicability.
  • the blockchain establishment requirement information includes identification information of the first node
  • the sending a first message to at least one first node according to the blockchain establishment requirement information includes:
  • the blockchain establishment requirement information directly includes the identification of the first node, making the requirement clearer.
  • LAF can directly send the first message to the first node without doing too much processing, which is conducive to improving efficiency.
  • Blockchain creation or management efficiency
  • sending a first message to the at least one first node based on the identification information of the first node includes:
  • the access function of the first node in the network and the blockchain management function are separated, because the access function may not only be provided to the LAF, but also to other network elements. , thus making the functional boundaries between each network element clearer.
  • the compatibility of this solution when applied to 5G systems is also improved.
  • the identification information of the network element where the first node is located is obtained according to the identification information of the first node, or the address information of the first node includes:
  • the information management function and the blockchain management function (ie, LAF) of the first node in the network are separated, because the information management function may not only be provided to the LAF, but also to other network elements. , thus making the functional boundaries between each network element clearer.
  • the compatibility of this solution when applied to 5G systems is also improved.
  • the network element where the first node is located is an access and mobility management function AMF.
  • the type of the first node is a terminal device; the first response message includes identification information of the first node; or the second response message includes the location of the first node.
  • the fourth node is a policy control function PCF, or the fifth node is a unified data management UDM.
  • the first response message includes identification information of the network element where the first node is located, or address information of the first node; and the second response message includes the first response message.
  • the type of the first node is access network equipment, and the fourth node or the fifth node is operation, management and maintenance OAM; or,
  • the type of the first node is a core network element, and the fourth node or the fifth node is a network storage function NRF; or,
  • the type of the first node is an application function node, and the fourth node or the fifth node is a network opening function NEF.
  • the method further includes:
  • LAF can obtain the configuration status of the first node in real time, which is conducive to the management of the blockchain status and can improve the response efficiency to the demand side of blockchain creation.
  • sending the blockchain establishment result to the second node according to the first indication message of the at least one first node includes:
  • the blockchain establishment log includes the completion status of the requirements.
  • the blockchain establishment log displays the configuration status details of the blockchain nodes in detail, which is beneficial to the management of the nodes and provides more detailed information to the demander of the blockchain creation.
  • the first indication message includes configuration success information or configuration failure information
  • the blockchain establishment result includes blockchain establishment success or blockchain establishment failure
  • the sending of a blockchain establishment result to the second node according to the first instruction message of the at least one first node includes:
  • the blockchain establishment result is sent to the second node according to the quantity of configuration success information included in the first indication message of the at least one first node.
  • the blockchain establishment result is that the blockchain is successfully established
  • the blockchain establishment result is a failure to establish the blockchain.
  • the method further includes:
  • a node that meets the blockchain establishment requirements is re-selected and the node is configured as a blockchain node.
  • the method further includes:
  • Receive blockchain capability information of a plurality of nodes the plurality of nodes including the at least one first node.
  • the method further includes:
  • the sixth node may be UDM, or the sixth node may be a newly designed network element, such as UTDM, etc., which is not limited here.
  • the sixth node is UDM
  • the compatibility of the solution of this application for the 5G system can be improved
  • the sixth node is UDM
  • the applicability of the solution of this application can be improved.
  • the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
  • the nodes in the client mode are used to generate transactions or transaction proposals
  • the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
  • the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
  • the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
  • the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
  • the terminal device serves as a client
  • the access network device serves as a micro node
  • the core network element and independent node serve as a full node
  • terminal device 1 serves as a client
  • terminal device 2 serves as a micro node, access network device, and independent node.
  • a full node for example, terminal equipment acts as a client, application function nodes act as micro nodes, core network elements and independent nodes act as full nodes, and other combination methods.
  • the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
  • the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the blockchain capability information includes at least one of the following capabilities:
  • the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the method further includes:
  • this application provides a method for creating a blockchain, which includes:
  • the first node receives a first message, the first message is used to configure the first node as a blockchain node;
  • the type of the first node includes at least one of the following: terminal equipment, access network equipment, core network Network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the edge network node are Blockchain-capable nodes in communication networks;
  • the first node sends a first at least message, and the first indication message is used to indicate whether the first node is configured successfully.
  • the method further includes:
  • the first node sends blockchain capability information.
  • the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
  • the nodes in the client mode are used to generate transactions or transaction proposals
  • the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
  • the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
  • the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
  • the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
  • the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
  • the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the blockchain capability information includes at least one of the following capabilities:
  • the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the first indication message indicates that the first node is configured successfully
  • the method also includes:
  • this application provides a method for creating a blockchain, which includes:
  • the second node determines the blockchain establishment requirement information
  • the second node sends the blockchain establishment requirement information.
  • the second node is a node with blockchain establishment requirements.
  • the blockchain establishment requirement information includes one or more of the following requirements:
  • Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control policy of the blockchain, the number of first nodes, policy information, the number of the first node Identification information, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can run for the blockchain Provide a trusted execution environment.
  • the type of the first node includes at least one of the following:
  • Terminal equipment access network equipment, core network elements, independent nodes, application function nodes, edge network nodes;
  • the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the edge network node are nodes with blockchain capabilities in the communication network.
  • the mode includes one or more of the following:
  • the nodes in the client mode are used to generate transactions or transaction proposals
  • the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
  • the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
  • the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
  • the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
  • the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
  • the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the method further includes:
  • the second node receives the blockchain establishment result; or,
  • the second node receives the blockchain establishment result and the blockchain establishment log, wherein the blockchain establishment log includes the completion status of the requirements.
  • the blockchain establishment result includes blockchain establishment success or blockchain establishment failure.
  • this application provides a method for creating a blockchain, which method includes:
  • the fourth node receives a first query request, where the first query request includes policy information, or the first query request includes identification information of the first node;
  • the fourth node sends a first response message, wherein when the first query request includes policy information, the first response message includes identification information of the network element where the first node is located, or the first node address information, or identification information of the first node; when the first query request includes identification information of the first node, the first response message includes identification information of the network element where the first node is located , or the address information of the first node;
  • the type of the first node includes at least one of the following: terminal equipment, access network equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment , the core network element, the independent node, the application function node and the edge network node are nodes with blockchain capabilities in the communication network.
  • the network element where the first node is located is an access and mobility management function AMF.
  • the type of the first node is a terminal device; the first query request includes policy information, and the first response message includes identification information of the first node; the fourth node is the policy control function PCF.
  • the type of the first node is a terminal device; the first query request includes identification information of the first node, and the first response message includes the identification information of the network element where the first node is located. Identification information, or address information of the first node; the fourth node is a unified data management UDM.
  • the first response message includes identification information of the network element where the first node is located, or address information of the first node;
  • the type of the first node is access network equipment, and the fourth node is operation, management and maintenance OAM; or,
  • the type of the first node is a core network element, and the fourth node is a network storage function NRF; or,
  • the type of the first node is an application function node, and the fourth node is a network opening function NEF.
  • the method further includes:
  • the fourth node receives blockchain capability information of multiple nodes, and the multiple nodes include at least one first node; the type of the first node includes at least one of the following: terminal equipment, access network equipment, core network element, independent node, application function node, edge network node; the terminal device, the access network device, the core network element, the independent node, the application function node and the edge network node It is a node with blockchain capabilities in the communication network;
  • the fourth node stores blockchain capability information of the plurality of nodes for use in a ledger anchoring function to determine the at least one first node.
  • this application provides a communication device, which is a ledger anchoring function LAF.
  • the device includes:
  • a transceiver unit configured to send a first message to at least one first node, the first message being used to configure the first node as a blockchain node;
  • the type of the first node includes at least one of the following: terminal equipment , access network equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application function
  • the nodes and the edge network nodes are nodes with blockchain capabilities in the communication network;
  • the transceiver unit is configured to receive a first indication message from the at least one first node, where the first indication message is used to indicate whether the first node is configured successfully.
  • the transceiver unit is also used to receive blockchain establishment requirement information from the second node;
  • the device further includes a processing unit
  • the processing unit When sending the first message to at least one first node, the processing unit is also used to:
  • the first message is sent to at least one first node according to the blockchain establishment requirement information through the transceiver unit.
  • the blockchain establishment requirement information includes one or more of the following requirements:
  • Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control strategy of the blockchain, the number of the first nodes, policy information, the first The identification information of the node, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can be a block Chain operation provides a trusted execution environment.
  • the blockchain establishment requirement information includes the policy information; the device further includes a processing unit;
  • the processing unit When sending the first message to at least one first node according to the blockchain establishment requirement information, the processing unit is used to:
  • the transceiver unit sends the first node to the at least one first node based on the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node. A message.
  • the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node is obtained according to the policy information.
  • the processing unit is used to:
  • the first response message from the fourth node is received through the transceiver unit.
  • the first response message includes the identification information of the network element where the first node is located, or the address information of the first node, or , the identification information of the first node.
  • the blockchain establishment requirement information includes the identification information of the first node; the device further includes a processing unit;
  • the processing unit When sending the first message to at least one first node according to the blockchain establishment requirement information, the processing unit is used to:
  • the first message is sent to the at least one first node based on the identification information of the first node through the transceiver unit.
  • the processing unit when sending the first message to the at least one first node based on the identification information of the first node, the processing unit is configured to:
  • the transceiver unit sends the first message to the at least one first node based on the identification information of the network element where the first node is located or the address information of the first node.
  • the identification information of the network element where the first node is located is obtained according to the identification information of the first node, or when the address information of the first node is obtained, the processing unit uses At:
  • the second response message from the fifth node is received through the transceiver unit, and the second response message includes identification information of the network element where the first node is located, or address information of the first node.
  • the network element where the first node is located is an access and mobility management function AMF.
  • the type of the first node is a terminal device; the first response message includes identification information of the first node; or the second response message includes the location of the first node.
  • the fourth node is a policy control function PCF, or the fifth node is a unified data management UDM.
  • the first response message includes identification information of the network element where the first node is located, or address information of the first node; and the second response message includes the first response message.
  • the type of the first node is access network equipment, and the fourth node or the fifth node is operation, management and maintenance OAM; or,
  • the type of the first node is a core network element, and the fourth node or the fifth node is a network storage function NRF; or,
  • the type of the first node is an application function node, and the fourth node or the fifth node is a network opening function NEF.
  • processing unit is also used to:
  • the blockchain establishment result is sent to the second node through the transceiver unit according to the first instruction message of the at least one first node.
  • the processing unit when sending the blockchain establishment result to the second node according to the first instruction message of the at least one first node, the processing unit is also configured to:
  • the blockchain establishment log includes the completion status of the requirements.
  • the first indication message includes configuration success information or configuration failure information
  • the blockchain establishment result includes blockchain establishment success or blockchain establishment failure
  • the processing unit When sending the blockchain establishment result to the second node according to the first instruction message of the at least one first node, the processing unit is configured to:
  • the blockchain establishment result is sent to the second node through the transceiver unit according to the amount of configuration success information included in the first indication message of the at least one first node.
  • the blockchain establishment result is that the blockchain is successfully established
  • the blockchain establishment result is a failure to establish the blockchain.
  • processing unit is also used to:
  • a node that meets the blockchain establishment requirements is re-selected and the node is configured as a blockchain node.
  • the transceiver unit is also used to:
  • Receive blockchain capability information of a plurality of nodes the plurality of nodes including the at least one first node.
  • the device further includes a storage unit
  • the storage unit or the transceiver unit After receiving the blockchain capability information of multiple nodes, the storage unit or the transceiver unit is used to:
  • the storage unit is used to store blockchain capability information of the multiple nodes; or,
  • the transceiver unit is configured to send the blockchain capability information of the multiple nodes to the sixth node.
  • the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
  • the nodes in the client mode are used to generate transactions or transaction proposals
  • the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate micro-blocks based on said transactions;
  • the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
  • the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
  • the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
  • the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
  • the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the blockchain capability information includes at least one of the following capabilities:
  • the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the transceiver unit is also used to:
  • this application provides a communication device, which is a first node, and the device includes:
  • a transceiver unit configured to receive a first message, the first message being used to configure the first node as a blockchain node;
  • the type of the first node includes at least one of the following: terminal equipment, access network equipment, Core network elements, independent nodes, application function nodes, edge network nodes; the terminal equipment, the access network equipment, the core network elements, the independent nodes, the application function nodes and the edge network Nodes are nodes with blockchain capabilities in the communication network;
  • the transceiver unit is configured to send a first indication message, and the first indication message is used to indicate whether the first node is configured successfully.
  • the transceiver unit is also used to:
  • the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
  • the nodes in the client mode are used to generate transactions or transaction proposals
  • the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
  • the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
  • the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
  • the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
  • the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
  • the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the blockchain capability information includes at least one of the following capabilities:
  • the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the first indication message indicates that the first node is configured successfully
  • the transceiver unit is also used for:
  • this application provides a communication device, which is a second node, and the device includes:
  • a processing unit used to determine blockchain establishment requirement information
  • a transceiver unit used to send the blockchain establishment requirement information.
  • the blockchain establishment requirement information includes one or more of the following requirements:
  • Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control policy of the blockchain, the number of first nodes, policy information, the number of the first node Identification information, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can run for the blockchain Provide a trusted execution environment.
  • the type of the first node includes at least one of the following:
  • Terminal equipment access network equipment, core network elements, independent nodes, application function nodes, edge network nodes;
  • the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the edge network node are nodes with blockchain capabilities in the communication network.
  • the transceiver unit is also used to:
  • the blockchain establishment result includes blockchain establishment success or blockchain establishment failure.
  • the mode includes one or more of the following:
  • the nodes in the client mode are used to generate transactions or transaction proposals
  • the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate micro-blocks based on said transactions;
  • the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
  • the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
  • the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
  • the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
  • the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • this application provides a communication device, which is a fourth node, and the device includes:
  • a transceiver unit configured to receive a first query request, where the first query request includes policy information, or the first query request includes identification information of the first node;
  • the transceiver unit is configured to send a first response message, wherein when the first query request includes policy information, the first response message includes identification information of the network element where the first node is located, or the third The address information of a node, or the identification information of the first node; when the first query request includes the identification information of the first node, the first response message includes the identification information of the network element where the first node is located. Identification information, or address information of the first node;
  • the type of the first node includes at least one of the following: terminal equipment, access network equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment , the core network element, the independent node, the application function node and the edge network node are nodes with blockchain capabilities in the communication network.
  • the network element where the first node is located is an access and mobility management function AMF.
  • the type of the first node is a terminal device; the first query request includes policy information, and the first response message includes identification information of the first node; the fourth node is the policy control function PCF.
  • the type of the first node is a terminal device; the first query request includes identification information of the first node, and the first response message includes the identification information of the network element where the first node is located. Identification information, or address information of the first node; the fourth node is a unified data management UDM.
  • the first response message includes identification information of the network element where the first node is located, or address information of the first node;
  • the type of the first node is access network equipment, and the fourth node is operation, management and maintenance OAM; or,
  • the type of the first node is a core network element, and the fourth node is a network storage function NRF; or,
  • the type of the first node is an application function node, and the fourth node is a network opening function NEF.
  • the device further includes a storage unit, wherein:
  • the transceiver unit is configured to receive blockchain capability information of multiple nodes, the multiple nodes including at least one first node; the type of the first node includes at least one of the following: terminal equipment, access network equipment , core network element, independent node, application function node, edge network node; the terminal device, the access network device, the core network element, the independent node, the application function node and the edge Network nodes are nodes with blockchain capabilities in the communication network;
  • the storage unit is used to store blockchain capability information of the plurality of nodes for use in the ledger anchoring function to determine the at least one first node.
  • the present application provides a communication device.
  • the device may be a LAF.
  • the LAF may be an access network device or a core network element or other device. It may also be an access network device or a core network element or a communication device. Devices in other equipment, or devices that can be used in conjunction with access network equipment or core network elements or other equipment.
  • the communication device may also be a chip system.
  • the communication device can perform the method described in the first aspect.
  • the functions of the communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more units or modules corresponding to the above functions.
  • the unit or module may be software and/or hardware.
  • the operations and beneficial effects performed by the communication device can be referred to the method and beneficial effects described in the first aspect above, and repeated details will not be described again.
  • the present application provides a communication device, which may be a first node (for example, the first node may be a terminal device, an access network device, a core network element, an independent node, an application function node, or an edge network node). etc.), it can also be a device in the first node, or a device that can be used in conjunction with the first node.
  • the communication device may also be a chip system.
  • the communication device can perform the method described in the second aspect.
  • the functions of the communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more units or modules corresponding to the above functions.
  • the unit or module may be software and/or hardware.
  • the present application provides a communication device, which may be a second node, a device in the second node, or a device that can be used in conjunction with the second node.
  • the communication device may also be a chip system.
  • the communication device can perform the method described in the third aspect.
  • the functions of the communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more units or modules corresponding to the above functions.
  • the unit or module may be software and/or hardware.
  • the operations and beneficial effects performed by the communication device can be referred to the method and beneficial effects described in the third aspect above, and repeated details will not be repeated.
  • the present application provides a communication device.
  • the device may be a fourth node, a device in the fourth node, or a device that can be used in conjunction with the fourth node.
  • the communication device may also be a chip system.
  • the communication device can perform the method described in the fourth aspect.
  • the functions of the communication device can be implemented by hardware, or can be implemented by hardware executing corresponding software.
  • the hardware or software includes one or more units or modules corresponding to the above functions.
  • the unit or module may be software and/or hardware.
  • the operations and beneficial effects performed by the communication device can be referred to the method and beneficial effects described in the fourth aspect above, and repeated descriptions will not be repeated.
  • the present application provides a communication device.
  • the device may be a LAF.
  • the LAF may be an access network device or a core network element or other device.
  • the communication device includes a processor and a transceiver, so The processor and the transceiver are configured to execute computer programs or instructions stored in at least one memory, so that the device implements the method in any one of the first aspects.
  • the communication device may also include a memory. Among them, the processor, transceiver and memory are coupled.
  • the present application provides a communication device, which may be a first node (for example, the first node may be a terminal device, an access network device, a core network element, an independent node, an application function node, an edge network node, etc.), the communication device includes a processor and a transceiver, the processor and the transceiver are used to execute a computer program or instructions stored in at least one memory, so that the device implements any one of the second aspects. item method.
  • the communication device also includes a memory. Among them, the processor, transceiver and memory are coupled.
  • the present application provides a communication device, which may be a second node.
  • the communication device includes a processor and a transceiver.
  • the processor and the transceiver are configured to execute at least one stored in a memory.
  • the communication device also includes a memory.
  • the processor, transceiver and memory are coupled.
  • the present application provides a communication device.
  • the device may be a core network element (such as a fourth node, a fifth node or a sixth node, etc.).
  • the communication device includes a processor and a transceiver, so The processor and the transceiver are configured to execute computer programs or instructions stored in at least one memory, so that the device implements the method in any one of the fourth aspects.
  • the communication device also includes a memory. Among them, the processor, transceiver and memory are coupled.
  • the present application provides a computer-readable storage medium.
  • Computer programs or instructions are stored in the storage medium.
  • any one of the first to sixth aspects is implemented. Methods.
  • the present application provides a computer program product including instructions.
  • the computer program product includes computer program code.
  • any one of the first to sixth aspects can be implemented. item method.
  • a communication system including a LAF and at least one first node, wherein:
  • the LAF sends a first message to the at least one first node, the first message is used to configure the first node as a blockchain node;
  • the type of the first node includes at least one of the following: terminal equipment , access network equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application function
  • the nodes and the edge network nodes are nodes with blockchain capabilities in the communication network;
  • the at least one first node sends a first indication message to the LAF, where the first indication message is used to indicate whether the first node sending the first indication information is configured successfully.
  • the communication system further includes a second node; wherein:
  • the second node is used to send blockchain establishment requirement information to the LAF;
  • the LAF is used to send a first message to at least one first node, including:
  • the LAF is configured to send a first message to at least one first node according to the blockchain establishment requirement information.
  • the blockchain establishment requirement information includes one or more of the following requirements:
  • Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control strategy of the blockchain, the number of the first nodes, policy information, the first The identification information of the node, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can be a block Chain operation provides a trusted execution environment.
  • the blockchain establishment requirement information includes the policy information or the identification information of the first node; the communication system further includes a fourth node; wherein:
  • the LAF is configured to send a first message to at least one first node according to the blockchain establishment requirement information, including:
  • the LAF is configured to send a first query request to the fourth node, where the first query request includes the policy information, or the first query request includes the identification information of the first node;
  • the fourth node is configured to send a first response message to the LAF, wherein when the first query request includes policy information, the first response message includes identification information of the network element where the first node is located. , or the address information of the first node, or the identification information of the first node; when the first query request includes the identification information of the first node, the first response message includes the first The identification information of the network element where the node is located, or the address information of the first node;
  • the LAF is configured to send a third node to the at least one first node based on the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node. A message.
  • the network element where the first node is located is an access and mobility management function AMF.
  • the type of the first node is a terminal device; the first query request includes policy information, and the first response message includes identification information of the first node; the fourth node is the policy control function PCF.
  • the type of the first node is a terminal device; the first query request includes identification information of the first node, and the first response message includes the identification information of the network element where the first node is located. Identification information, or address information of the first node; the fourth node is a unified data management UDM.
  • the first response message includes identification information of the network element where the first node is located, or address information of the first node;
  • the type of the first node is access network equipment, and the fourth node is operation, management and maintenance OAM; or,
  • the type of the first node is a core network element, and the fourth node is a network storage function NRF; or,
  • the type of the first node is an application function node, and the fourth node is a network opening function NEF.
  • the LAF is configured to send a blockchain establishment result to the second node according to the first indication message of the at least one first node; or,
  • the LAF is configured to send a blockchain establishment result and a blockchain establishment log to the second node according to the first instruction message of the at least one first node; wherein the blockchain establishment log includes a request for Completion.
  • the first indication message includes configuration success information or configuration failure information
  • the blockchain establishment result includes blockchain establishment success or blockchain establishment failure
  • the LAF is configured to send a blockchain establishment result to the second node according to the first instruction message of the at least one first node, including:
  • the LAF is configured to send a blockchain establishment result to the second node according to the amount of configuration success information included in the first indication message of the at least one first node.
  • the blockchain establishment result is that the blockchain is successfully established
  • the blockchain establishment result is a failure to establish the blockchain.
  • the at least one first node is also used for:
  • the LAF is also used to store the blockchain capability information
  • the LAF is also used to send the blockchain capability information to the fourth node
  • the fourth node stores the blockchain capability information.
  • the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
  • the nodes in the client mode are used to generate transactions or transaction proposals
  • the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
  • the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
  • the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
  • the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
  • the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
  • the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the blockchain capability information includes at least one of the following capabilities:
  • the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the LAF is used to send a second message to the third node, where the third node is a successfully configured node among the at least one first node, and the second message is Upon cancellation, the third node is a blockchain node;
  • the third node is configured to send a second indication message to the LAF, where the second indication message is used to indicate whether the third node is successfully revoked.
  • Figure 1 is a schematic diagram of the architecture of a communication system
  • Figure 2 is a schematic diagram of the architecture of another communication system
  • FIG. 3 is a schematic diagram of the architecture of the blockchain provided by the embodiment of this application.
  • Figure 4 is a schematic flow chart of the blockchain creation method provided by the embodiment of this application.
  • Figure 5 is a schematic flow chart of a blockchain creation method provided by an embodiment of the present application.
  • Figure 6 is a schematic flow chart of another blockchain creation method provided by an embodiment of the present application.
  • Figure 7 is a schematic diagram of the blockchain establishment process of multiple node combinations provided by the embodiment of the present application.
  • Figure 8 is another schematic diagram of the blockchain establishment process of multiple node combinations provided by the embodiment of the present application.
  • Figure 9 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • Figure 10 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
  • an embodiment means that a particular feature, structure or characteristic described in connection with the embodiment can be included in at least one embodiment of the present application.
  • the appearances of this phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those skilled in the art understand, both explicitly and implicitly, that the embodiments described herein may be combined with other embodiments.
  • At least one (item) means one or more
  • plural means two or more
  • at least two (items) means two or three and three
  • “and/or” is used to describe the relationship between associated objects, indicating that there can be three relationships.
  • a and/or B can mean: only A exists, only B exists, and A and B exist simultaneously. In this case, A and B can be singular or plural.
  • the character “/” generally indicates that the related objects are in an "or” relationship.
  • At least one of the following” or similar expressions thereof refers to any combination of these items, including any combination of a single item (items) or a plurality of items (items).
  • At least one of a, b or c can mean: a, b, c, "a and b", “a and c", “b and c", or "a and b and c” ”, where a, b, c can be single or multiple.
  • LTE long term evolution
  • FDD frequency division duplex
  • TDD time division duplex
  • NR new radio
  • 5th generation, 5G fifth generation
  • 6th generation, 6G sixth generation
  • WALN Wireless Local Area Network
  • FIG. 1 is a schematic diagram of the architecture of a communication system.
  • a terminal device can access a wireless network to communicate with other devices through the wireless network, such as communicating with other terminal devices.
  • the wireless network includes a (radio)access network ((radio)access network, (R)AN) and a core network (core network, CN), where (R)AN (hereinafter described as RAN) is used to connect terminal devices After accessing the wireless network, CN is used to manage terminal devices.
  • R radio access network
  • CN core network
  • CN core network
  • the terminal equipment, RAN and CN involved in the system architecture in Figure 1 are described in detail below.
  • Terminal equipment includes equipment that provides voice and/or data connectivity to users.
  • terminal equipment is a device with wireless transceiver functions that can be deployed on land, including indoors or outdoors, handheld, wearable or vehicle-mounted; it can also be deployed on On the water (such as ships, etc.); it can also be deployed in the air (such as aircraft, balloons, satellites, etc.).
  • the terminal device can be a mobile phone (mobile phone), tablet computer (Pad), computer with wireless transceiver function, virtual reality (VR) terminal, augmented reality (AR) terminal, industrial control (industrial control) Wireless terminals, vehicle-mounted terminals, wireless terminals in self-driving, wireless terminals in remote medical, wireless terminals in smart grid, wireless terminals in transportation safety Terminals, wireless terminals in smart cities, wireless terminals in smart homes, wearable terminals, etc.
  • Terminal equipment can sometimes also be called terminal, user equipment (UE), access terminal, vehicle terminal, industrial control terminal, UE unit, UE station, mobile station, mobile station, remote station, remote terminal, mobile device, UE terminal, wireless communication equipment, UE agent or UE device, etc.
  • Terminals can also be fixed or mobile. It can be understood that all or part of the functions of the terminal in this application can also be implemented through software functions running on hardware, or through virtualization functions instantiated on a platform (such as a cloud platform).
  • the RAN may include one or more RAN devices (or access network devices), and the interface between the access network device and the terminal device may be a Uu interface (or air interface).
  • RAN devices or access network devices
  • Uu interface or air interface
  • Access network equipment is a node or device that connects terminal equipment to a wireless network.
  • Access network equipment includes, but is not limited to, next generation node B (gNB) and evolved nodes in 5G communication systems.
  • B evolved node B, eNB
  • next generation evolved node B next generation evolved node B (next generation eNB, ng-eNB)
  • wireless backhaul equipment radio network controller (radio network controller, RNC), node B (node B, NB) , home base station ((home evolved nodeB, HeNB) or (home node B, HNB)), baseband unit (baseBand unit, BBU), transmitting and receiving point (TRP), transmitting point (TP) , mobile switching center, device-to-device (D2D), vehicle-to-everything (V2X), machine-to-machine (M2M) communication equipment that assumes the base station function etc., it can also include the centralized unit (CU) and distributed unit (DU), non-terrest
  • the CN may include one or more CN devices (which may also be understood as network element devices or functional network elements or network functions (network function, NF), etc., which are not limited here).
  • CN devices which may also be understood as network element devices or functional network elements or network functions (network function, NF), etc., which are not limited here).
  • FIG. 2 is an architectural schematic diagram of another communication system.
  • the communication system is a system architecture in a 5G non-roaming scenario.
  • the communication system includes the following network functions and entities: network slice selection function (NSSF), network exposure function (NEF), network function repository function (NRF) ), policy control function (PCF), unified data management (UDM), application function (AF), authentication server function (AUSF), access and mobility management Function (access and mobility management function, AMF), session management function (SMF), UE, (radio) access network ((radio) access network, (R)AN), user plane function (user plane function) , UPF) and data network (data network, DN).
  • NSF network slice selection function
  • NEF network exposure function
  • NRF network function repository function
  • PCF policy control function
  • UDM unified data management
  • AF application function
  • AUSF authentication server function
  • AMF access and mobility management Function
  • SMF session management function
  • UE radio access network
  • R radio access network
  • UPF user
  • User plane network element As an interface with the data network, it completes functions such as user plane data forwarding, session/flow level-based billing statistics, and bandwidth limitation. That is, packet routing and forwarding and quality of service (QoS) processing of user plane data, etc.
  • QoS quality of service
  • the user plane network element may be a UPF network element.
  • Authentication server performs user security authentication.
  • the authentication server may be an AUSF network element.
  • Mobility management network element mainly used for mobility management and access management.
  • the access management network element can be an AMF network element, which mainly performs functions such as mobility management and access authentication/authorization. In addition, it is also responsible for transmitting user policies between the terminal and PCF network elements.
  • Session management network element Mainly used for session management, Internet protocol (IP) address allocation and management of user equipment, selection of endpoints for manageable user plane functions, policy control and charging function interfaces, and downlink data Notifications etc.
  • IP Internet protocol
  • the session management network element can be an SMF network element, which completes terminal IP address allocation, UPF selection, accounting and QoS policy control, etc.
  • the application network element can be an AF network element, which represents the application function of a third party or operator. It is the interface for the 5G network to obtain external application data, and is mainly used to transmit application side information to the network. side needs.
  • Unified data management network element responsible for the management of user identification, contract data, authentication data, and user service network element registration management.
  • the unified data management network element may be a UDM network element.
  • Policy control network element including user subscription data management function, policy control function, billing policy control function, quality of service (QoS) control, etc., a unified policy framework used to guide network behavior, which is the control plane function Network elements (such as AMF, SMF network elements, etc.) provide policy rule information, etc.
  • QoS quality of service
  • the policy control network element may be the PCF.
  • Network function repository function network element Provides storage and selection functions for network function entity information for other core network elements.
  • the network element may be an NRF network element.
  • the network open network element can be an NEF network element, which is mainly used to expose the services and capabilities of 3GPP network functions to AF, and also allows AF to provide information to 3GPP network functions.
  • Network slice selection function network element responsible for selecting network slices for UE.
  • the application network element can be an NSSF network element.
  • the above functional network elements can be either network elements in hardware devices, software functions running on dedicated hardware, or virtualization functions instantiated on a platform (for example, a cloud platform).
  • the above functional network elements can be divided into one or more services. Furthermore, there may also be services that exist independently of network functions.
  • instances of the above-mentioned functional network elements, or instances of services included in the above-mentioned functional network elements, or service instances that exist independently of network functions may be called service instances.
  • the CN may also include other possible network elements, such as service communication proxy (SCP), network slice admission control function (NSACF), and network element unified data warehousing (unified data repository, UDR) network element.
  • SCP service communication proxy
  • NSACF network slice admission control function
  • UDR network element unified data warehousing
  • each functional network element can be the name of each functional network element shown in Figure 2.
  • each functional network element can be It is still the name of each functional network element shown in Figure 2, or it may also have other names.
  • the policy control network element may be PCF.
  • the policy control function may still be PCF, or may have other names. This application does not limited.
  • Nnssf is the service interface provided by NSSF
  • Nnef is the service interface provided by NEF
  • Nnrf is the service interface provided by NRF
  • Npcf is the service interface provided by PCF
  • Nudm is the service interface provided by UDM
  • Naf is AF.
  • the service interface provided by Nausf is the service interface provided by AUSF; the service interface provided by Namf is AMF; the service interface provided by Nsmf is SMF; N1 is the reference point between UE and AMF; N2 is (R)AN and AMF; N3 is the reference point between (R)AN and UPF; N4 is the reference point between SMF and UPF; N6 is the reference point between UPF and DN; N9 is the reference point between UPF Reference point.
  • Nnssf, Nnef, Nnrf, Npcf, Nudm, Naf, Nausf, Namf, Nsmf, N1, N2, N3, N4, N6, and N9 in Figure 2 can be found in the meanings defined in the relevant standard protocols. There are no restrictions here.
  • the communication system described in the embodiments of the present application can also be described as a communication network or a communication network, and is not limited here.
  • the names of the network elements or nodes involved in this application can also be called other names, and are not limited here.
  • the new network element or newly designed network element described in this application may be a completely new network element, or it may be an expansion, update or addition of the functions of an existing network element, or , or it can be the merger or integration of functions of multiple existing network elements, etc., which is not limited here.
  • the fourth node, the fifth node and the sixth node described in the embodiments of this application may be the same network element, or they may be different network elements. The details are determined based on the actual scenario, which will not be discussed here. limit.
  • the fourth node and the fifth node are different network elements.
  • the fourth node can be PCF
  • the fifth node can be for UDM.
  • the fourth node, the fifth node and the sixth node may be the same network element, such as OAM.
  • the fourth node, the fifth node and the sixth node may be the same network element, such as NRF.
  • the fourth node, the fifth node and the sixth node may be the same network element, such as NEF.
  • the nodes involved in the embodiments of this application may be a device, a chip or a network function, etc., in There is no restriction on this.
  • the ledger is a technology that shares, replicates, or synchronizes data between nodes through a consensus mechanism.
  • Blockchain is a type of ledger technology. Based on the ledger, it also adds anti-tampering technology guaranteed by cryptographic mechanisms.
  • blockchain nodes can run on physical nodes, or they can also run in a virtual environment in a physical node. The physical node here is the first node in this application. It is understandable that in addition to being applicable to the creation of blockchain, this application can also be extended to the creation of ledgers, or it may not be called blockchain or ledger later, but other names, which are not limited here.
  • LAF Ledger anchor function
  • the LAF involved in this application can be a new NF in the core network (that is, deployed in the core network), or the LAF can also be deployed in the RAN, or the LAF can also be deployed in addition to the core network and RAN.
  • LAF can be used to perform blockchain-related work in communication networks, such as responsible for the management of the blockchain life cycle, including blockchain deployment, access control, etc.
  • the network element used in this application to perform blockchain-related work in the communication network may not be limited to be named LAF, and may also use other names, which are determined based on the actual scenario and are not limited here.
  • LAF is mainly used for schematic explanation below.
  • the LAF can also be a device, a chip, etc., which is not limited here.
  • the INN involved in this application is a node with blockchain capabilities deployed in the communication network.
  • an independent node is a node that can be deployed anywhere in the communication network and has blockchain capabilities. It follows the communication network protocol stack and accepts the unified management and scheduling of the communication network, but is not formally connected to the terminal device. , access network equipment, core network equipment and other communication nodes are bound. It should be noted that in this application, it can be deployed anywhere in the communication network, and the name of the node with blockchain capabilities is not limited to LAF, and other names can also be used. The details are determined based on the actual scenario, which is not specified here. Make restrictions. For the convenience of description, the following mainly uses independent nodes for schematic description.
  • the independent node when an independent node is deployed in a terminal device, then the independent node follows the protocol stack of the terminal device; when an independent node is deployed in the RAN, then the independent node follows the protocol stack of the RAN; when the independent node is deployed in the core network, Then independent nodes follow the NF protocol stack.
  • an independent node can also be a software and hardware integrated server designed for blockchain technology, that is, a blockchain all-in-one machine.
  • the node corresponding to AF is an AF node, where the AF node involved in this application is a node with blockchain capabilities. It is understandable that the purpose of interaction between AF and 5G core network is to provide services. According to the operator's deployment strategy, the trusted AF can directly access the internal network element functions of the 5G core network to improve business processing efficiency, or it can also implement information interaction with the corresponding internal network element functions through NEF. That is to say, in this application, in addition to being deployed in internal network elements of the communication network, the blockchain nodes can also be extended to AF to apply to scenarios that require AF participation.
  • Edge network nodes refer to nodes used in edge computing.
  • Edge computing refers to computing performed at or near the physical location of users or data sources, which can reduce latency and save bandwidth. Among them, edge network nodes belong to the communication network.
  • Blockchain structures include single chain, parallel chain, sharding, directed acyclic graph (DAG), etc., which are not limited here.
  • Block structure refers to the content and data structure inside the block.
  • the consensus mechanism refers to the process of reaching a unified agreement on the status of the network/data/transactions in a decentralized manner, also known as the consensus algorithm.
  • the consensus mechanism includes proof of work (POW), proof of equity (proof of stack, POS), delegated proof of stake (DPOS), reliable, replicable, redundant, and fault-tolerant ( reliable, replicated, redundant, and fault-tolerant (RAFT), practical byzantine fault tolerance (PBFT), etc., which are not limited here.
  • TEE Trusted execution environment
  • TEE is a secure area built in the central processor through software and hardware methods to ensure that the confidentiality and integrity of the programs and data loaded inside it are protected.
  • Blockchain access control strategies include LAF authorization, LAF access control, LAF transparent transmission, and LAF proxy. in:
  • LAF authorization is performed by LAF through authorization code. For example, when entity A accesses the blockchain, A will send an authentication request to LAF. After LAF authenticates, it will issue an authorization code to A, indicating the scope of authorization and the validity period of authorization. A holds the authorization code to access the blockchain. The blockchain verifies the authorization code and accepts access from A.
  • LAF access control Access control is performed by LAF. For example, LAF directly verifies A, and after passing the verification, A can directly access the blockchain. For every request, LAF does a verification.
  • LAF transparent transmission LAF transparently transmits the access request, and the ledger node performs access control. For example, LAF directly forwards A's request to the blockchain without processing it, and the blockchain node performs access control.
  • LAF proxy LAF performs proxy services and provides access to data. For example, A submits a request to LAF. After LAF passes the verification, LAF obtains it from the chain and replies to A.
  • the configuration information corresponding to the node can be understood as the blockchain's requirement configuration for the transactions reported by the node.
  • the configuration information of a certain node can be a trigger condition for configuring transaction reporting.
  • the trigger condition can be triggered based on time, frequency, or conditions. Among them, based on time, that is, transactions are generated based on a certain time interval and reported to the blockchain. For example, configure terminal equipment/base stations to regularly report environment awareness information, or configure NF to regularly report network status. Based on frequency, that is, configure to report information once every n times an event occurs, where n is an integer greater than 0. Based on conditions, that is, reported when certain conditions are met. For example, a transaction report is generated every time a terminal device accesses the AMF. For example, a transaction report is generated when network traffic reaches a certain threshold.
  • the modes supported by nodes in this application include one or more of the following: client mode, micro node mode, light node mode, and full node mode. in:
  • Nodes in client mode are used to generate transactions or transaction proposals.
  • the transaction proposal is the transaction content pre-executed by the client, such as A transferring X yuan to B.
  • Nodes in micro-node mode are used to pre-process transactions or transaction proposals.
  • Pre-processing transactions or transaction proposals include one or more of the following: 1 Verify transactions or transaction proposals; 2 Execute transaction proposals to generate transactions; 3 Generate micro areas based on transactions piece.
  • verifying a transaction or transaction proposal refers to verifying the signature and integrity of the transaction or transaction proposal, as well as verifying the transaction content.
  • micro-block is a method that uses micro-nodes to accept transactions sent by clients, verify the legality of the transactions, and verify the transactions that pass.
  • the micro-nodes perform Merkle processing (ie, merkle) on the transactions that pass the verification (not limited to It must be a block generated after merkle processing) to generate a transaction tree and endorse it (micronodes sign the transaction tree).
  • Nodes in light node mode are used to process transactions or transaction proposals or micro-blocks.
  • Processing transactions or transaction proposals or micro-blocks includes one or more of the following: 1 Verify transactions or transaction proposals; 2 Execute transaction proposals to generate transactions; 3 Consensus on transactions or micro-blocks and generate complete blocks based on transactions or micro-blocks.
  • the complete block is a full node/light node that accepts the micro-block sent by the micro-node. A single transaction is no longer verified. Only the result of the endorsement of the micro-block is verified. After merkle processing of multiple micro-blocks, After being encapsulated inside a block, a full block is generated.
  • Nodes in full node mode include the functions of nodes in light node mode and are used to store complete blocks.
  • the capabilities of nodes include the ability to deploy smart contracts, the ability to call smart contracts, the ability to execute smart contracts, the ability to report transactions, the ability to query transactions, the ability to execute transactions, the ability to query blocks, computing power, storage capabilities, and network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, consensus capabilities, and one or more capabilities.
  • the ability to deploy smart contracts refers to the program that nodes can install smart contracts.
  • the ability to call smart contracts refers to the procedures that nodes can call smart contracts.
  • the ability to execute smart contracts means that the node can execute the program of the smart contract and provide computing resources and operating environment for the execution of smart contracts.
  • the ability to report transactions means that the node can generate a transaction and send the transaction to the node.
  • the node can be a full node, a micro node, or a light node.
  • the ability to query transactions means that nodes can query the blockchain for related transactions through keywords, such as transaction ID or transaction hash or transaction party ID or transaction content.
  • the ability to execute transactions means that a node can execute a transaction and obtain the status of the transaction party after the transaction is executed.
  • block query means that nodes can query the blockchain for related transactions through keywords, such as block height or block hash or block content.
  • block height refers to the sequence number of the block on the chain.
  • Computing power refers to the computing processing capabilities of blockchain nodes, such as central processing unit (CPU), graphics processing unit (GPU), and memory status.
  • Storage capacity refers to the size of hard drive space.
  • Network capability refers to network bandwidth.
  • Security algorithm capabilities refer to the algorithms supported by the node.
  • the ability to provide a trusted execution environment means that the node can provide a trusted execution environment for the deployment, invocation, execution of smart contracts or the operation of the blockchain.
  • Consensus capability refers to the consensus algorithm supported by the node.
  • a smart contract refers to an agreement that can automatically perform tasks that need to be completed manually.
  • a smart contract is any agreement that can perform some functions on its own. For example, a contract that automatically calculates the amount to be paid by the parties to the contract and arranges for payment of this amount.
  • blockchain can be used in multiple scenarios, such as:
  • Scenario 1 The communication network blockchain requires UE/access network equipment (such as base stations) to report environment, key performance indicator (KPI), surveying and other information, including:
  • the KPI indicator data information generated by various actual operations of traditional networks is mainly collected and collected locally by the base station, and then reported directly to the local sub-network management and database system through private interfaces, and then summarized and reported to higher-level network management and data in hierarchical levels. center.
  • UE can report various network KPI data in real time.
  • mapping data from a large number of users.
  • sensors on test cars often capture images and information of other cars, pedestrians, and bicycles, as well as traffic signs, traffic lights, curbs, lanes, other infrastructure, and roadscapes.
  • the IoT network will measure and map the humidity, temperature, environmental conditions, etc. of the environment.
  • the network can record and store surveying and mapping data.
  • Communication network blockchain can also be used to record various and dynamic data of network elements, such as:
  • the operator has the terminal's business data, such as user portrait information (that is, the information that the user signs with the operator when accessing the network), location information, identification (Identity, ID) information, public land mobile network (public land mobile network, PLMN) Information, service information, etc.; the blockchain can provide users with personal information related to them (such as itinerary during the epidemic).
  • user portrait information that is, the information that the user signs with the operator when accessing the network
  • location information that is, the information that the user signs with the operator when accessing the network
  • identification (Identity, ID) information public land mobile network (public land mobile network, PLMN) Information, service information, etc.
  • PLMN public land mobile network
  • service information etc.
  • the blockchain can provide users with personal information related to them (such as itinerary during the epidemic).
  • Data on the communication network blockchain can also be provided as services to UE, RAN, CN, and application functions (ie, third-party applications).
  • the realization of the above scenario requires the communication network to have blockchain capabilities for various entities of the communication network (such as UE, RAN, CN), and a complete set of management structures and methods for blockchain construction and deployment.
  • the current evolution of blockchain is independent of network evolution. That is, the current blockchain is an independent distributed storage bypassing the communication network. It cannot be combined with the communication network, and the communication network cannot directly access it. Blockchain management and configuration.
  • the embodiment of this application proposes a method for creating a blockchain, which can realize the combination of the blockchain and the communication network.
  • FIG 3 is a schematic diagram of the architecture of the blockchain provided by the embodiment of this application.
  • the blockchain architecture in this application is mainly divided into three levels:
  • Application (Ledger application, LP) layer It is the upper layer business that needs to deploy blockchain in the communication network.
  • LS Service (Ledger Service, LS) layer: used to provide blockchain as a service (BAAS) services for upper-layer businesses, shield infrastructure layer details, and manage nodes in the infrastructure layer.
  • BAAS blockchain as a service
  • the service layer includes LAF, which can interact with other NFs.
  • Infrastructure (Ledger Infrastructure, LI) layer mainly includes UE, RAN, NF, AF, INN, edge network nodes (not shown in the figure), etc., used to provide different levels of blockchain capabilities and receive services Layer configuration to build a blockchain.
  • BC enabler is used to identify nodes (such as UE, RAN, NF, AF, and INN) that have blockchain capabilities.
  • Figure 3 is only an exemplary illustration, and this application does not limit the blockchain architecture.
  • Figure 4 is a schematic flow chart of a blockchain creation method provided by an embodiment of the present application. As shown in Figure 4, the creation method of the blockchain includes the following steps S401 ⁇ S402:
  • the LAF sends a first message to at least one first node.
  • the LAF sends a first message to at least one first node.
  • the first message is used to configure the first node as a blockchain node, or it is understood that the first message is used to indicate that the first node is a blockchain node.
  • Blockchain node or understood as the first message is used to activate the first node as a blockchain node.
  • configuring the first node as a blockchain node can be understood as configuring the first node as a node in the newly established blockchain when establishing a new blockchain.
  • configuring the first node is a blockchain node, which can also be understood as adding the first node as a node in the blockchain on the basis of an already established blockchain, that is, managing or maintaining the existing blockchain.
  • the configuration information included in the first message corresponding to different first nodes is different.
  • the type of the first node involved in this application may be one or more of terminal equipment, access network equipment, core network elements, independent nodes, application function nodes, edge network nodes, etc.
  • terminal equipment, access network equipment, core network network elements, independent nodes and application function nodes, and edge network nodes are nodes with blockchain capabilities in the communication network.
  • the first messages corresponding to different first nodes are usually different.
  • the first message corresponding to any first node may include configuration information for the first node.
  • the configuration information may include the configuration of the transaction reported by the first node.
  • the configuration information may include the configuration of the transaction reported by the first node.
  • the configuration information may include the configuration of the transaction reported by the first node.
  • the first node when using a condition-based approach When triggering transaction reporting, what are the specific conditions for configuring the transaction?
  • the above-mentioned LAF sending the first message to at least one first node can be understood as: the LAF sends the first message to at least one first node according to the blockchain establishment requirement information.
  • the understanding of the LAF sending the first message to at least one first node according to the blockchain establishment requirement information will be described in detail later, and will not be described in detail here.
  • the above-mentioned blockchain establishment requirement information may be generated by LAF, that is, when LAF itself has a blockchain establishment requirement, LAF can determine its own blockchain establishment requirement information, and determine at least one blockchain establishment requirement information based on the blockchain establishment requirement information.
  • the first node can also be generated and sent to LAF by other nodes (for convenience of description, the second node will be used as an example for schematic explanation later), so LAF can receive the information from the second node based on the The blockchain establishment requirement information determines at least one first node.
  • the second node here refers to the node that has the need to establish a blockchain.
  • the second node can be the operator's management plane, management node, or administrator.
  • the second node can be other business levels or users, for example, data service nodes, Internet of Vehicles nodes, vertical industry users, end users, etc., which are not limited here.
  • the above-mentioned blockchain establishment requirement information includes one or more of the following requirements:
  • Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control strategy of the blockchain, the number of first nodes, policy information, identification information of the first node , the capability of the first node, the type of the first node, the mode supported by the first node, the corresponding configuration information of the first node, and whether the first node can provide a trusted execution environment for blockchain operation.
  • the capabilities of any first node include one or more of the following capabilities: the ability to deploy smart contracts, the ability to call smart contracts, the ability to execute smart contracts, the ability to report transactions, the ability to query transactions, and the ability to execute transactions , one or more capabilities such as block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, consensus capabilities, etc.
  • the modes supported by any first node may include client mode, micro node mode, light node mode, or full node mode.
  • a first node only supports one mode in a certain blockchain.
  • the modes supported by the same first node in different blockchains can be the same or different, and there is no restriction here.
  • the number of first nodes can be understood as the total number of first nodes that make up the blockchain, or the number of first nodes can also be understood as the minimum number of first nodes needed to make up the blockchain, etc., which will not be used here. Make restrictions.
  • the policy information can be understood as information used to determine the blockchain node, that is, the first node with a certain identity is not directly specified, but some conditional constraints can be used to determine the first node.
  • the policy information of the terminal device may be: 1. A terminal device that meets a certain performance during the registration phase, such as a terminal device with a trusted execution environment. 2. The terminal device currently connected to a certain base station, for example, the terminal device currently connected to the base station ID 1101100100111111. 3. Terminal equipment with a long-term fixed location, such as a terminal equipment with a long-term connection to the base station ID of 1101100100111111, etc. We will not give examples one by one here.
  • the policy information of the access network equipment may be: 1. Location information of the access network equipment, such as access network equipment located in a certain cell in a certain area; 2. Access network equipment Security and computing capabilities, such as access network equipment with trusted execution environments and CPU 4-core computing capabilities, etc., I will not give examples one by one here.
  • the policy information of the core network element may be: a core network element involving a certain service, etc.
  • the policy information of the core network element may be: a core network element involving a certain service, etc.
  • the policy information of the independent node may be: an independent node that meets certain performance requirements. For example, independent nodes with CPU64 cores, or independent nodes with 100G of memory, or independent nodes with Gigabit network ports, etc. will not be given here.
  • the policy information of the application function node may be: an application function node that meets certain performance requirements.
  • an application function node with a CPU64 core, or an application function node with a hundred G memory, or an application function node with a Gigabit network port, etc. are not given here one by one.
  • Table 1 is a specific example of blockchain establishment requirement information provided by the embodiment of this application. It should be noted that the blockchain establishment requirement information may include one or more items in Table 1. As shown in Table 1 below, the first column represents the demand parameters, that is, the various requirements in the blockchain establishment demand information, the second column represents the detailed parameters, that is, the detailed configuration of the corresponding requirements, and the third column represents the parameter explanation, that is, the Specific explanation of the meaning of demand parameters:
  • step S401 the following step S400 may also be included:
  • S400 Multiple nodes send blockchain capability information to LAF.
  • LAF receives blockchain capability information of multiple nodes.
  • the plurality of nodes include the above-mentioned at least one first node. That is to say, each node with blockchain capabilities can report its own blockchain capability information to LAF, or when the blockchain capability information of a node with blockchain capabilities changes or is updated, it can report to LAF Its own latest blockchain capability information.
  • the blockchain capability information reported by any node may include the mode supported by the node and the capabilities of the node in this mode.
  • client mode, micro node mode, light node mode, or full node mode, etc. are not limited here.
  • nodes in client mode and nodes in micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment.
  • Nodes in light node mode and nodes in full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, computing power, and storage capabilities , network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the blockchain capability information reported by any node can also directly include at least one of the following capabilities: the ability to deploy smart contracts, the ability to call smart contracts, the ability to execute smart contracts, and the ability to report transactions , transaction query capabilities, transaction execution capabilities, block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, consensus capabilities, etc., are not limited here.
  • the ability to deploy smart contracts the ability to call smart contracts, the ability to execute smart contracts, and the ability to report transactions , transaction query capabilities, transaction execution capabilities, block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, consensus capabilities, etc.
  • LAF after receiving the blockchain capability information of multiple nodes, LAF can store the blockchain capability information of multiple nodes, that is, the received blockchain capability information of multiple nodes is stored locally.
  • LAF can also send the received blockchain capability information of multiple nodes to the sixth node. Therefore, the sixth node can receive and store the blockchain capability information of multiple nodes from LAF.
  • the sixth node may be unified data management (UDM).
  • UDM unified data management
  • the node is an access network device (eg, a base station)
  • the sixth node may be an OAM.
  • the sixth node may be NRF.
  • the node is AF
  • the sixth node can be NEF.
  • the node is an INN
  • the sixth node can be the LAF itself, or the sixth node can also be other network elements, etc., without limitation here.
  • the sixth node can also be a newly defined network element, such as unified trusted data management (UTDM), etc., which is not limited here.
  • UTDM unified trusted data management
  • This newly defined network element can be used to store blockchain capability information of one or more types of nodes such as terminal equipment, access network equipment, core network elements, independent nodes, application function nodes, edge network nodes, etc. It is understandable that the name of the newly defined network element may not be limited to UTDM. For convenience of description, UTDM will be mainly used as an example for schematic explanation in the following.
  • the blockchain capability information reported by each node is used by the LAF to determine which node or nodes meet the blockchain establishment requirements before issuing the first message, so as to send the first message to these nodes that meet the requirements. That is to say, LAF can determine which node or nodes can serve as the first node based on the blockchain establishment demand information and the blockchain capability information reported by each node. After LAF determines the first node, it can provide these first nodes with Send the first message.
  • the LAF receives a first indication message from at least one first node.
  • the first indication message is used to indicate whether the first node is successfully configured, or it can be understood that the first indication message is used to indicate whether the first node is successfully activated.
  • the first indication message includes configuration success information or configuration failure information, or it can be understood that the first indication message includes activation success information or activation failure information.
  • the LAF may determine the blockchain establishment result based on the first indication message of at least one first node.
  • the blockchain establishment result includes successful blockchain establishment or failed blockchain establishment.
  • the LAF may determine the blockchain establishment result based on the number of configuration success information returned by the first node, or the LAF may also determine the blockchain establishment result based on the number of configuration failure information returned by the first node.
  • the blockchain establishment result is that the blockchain is successfully established. If the number of successfully configured information is less than the first quantity threshold, the blockchain establishment result is that the blockchain establishment fails.
  • the blockchain establishment result is a blockchain establishment failure
  • the blockchain establishment result is a block chain establishment failure
  • the number of successfully configured information is less than the first quantity threshold, reselect a node that meets the blockchain establishment requirements and configure the node as a blockchain node.
  • the number of configuration failure messages is greater than or equal to the second quantity threshold, reselect a node that meets the blockchain establishment requirements and configure the node as a blockchain node.
  • the settings of the first quantity threshold and the second quantity threshold may be the same or different, and are specifically determined according to the actual application scenario, and are not limited here.
  • the LAF can also send a second message to a third node, where the third node is a successfully configured node among at least one of the configured first nodes, and the second message is used to revoke the third node as a blockchain node.
  • the LAF may receive a second indication message from the third node, where the second indication message is used to indicate whether the third node is successfully revoked.
  • LAF in addition to configuring a node with blockchain capabilities as a blockchain node, LAF can also revoke or delete one or more nodes in the blockchain to create or manage the blockchain.
  • LAF can also update or change the configuration information of a configured blockchain node. For example, taking the first node as terminal device 1 as an example, assume that terminal device 1 is initially configured as a full node in the blockchain. , in the subsequent blockchain management process, LAF can also update the terminal device 1 as a micro-node in the blockchain, etc. The details are determined according to the actual application scenario, and there are no restrictions here.
  • LAF can also send block chain establishment requirements to other nodes that have blockchain establishment requirements.
  • Blockchain creation results can also be sent, where the blockchain establishment log includes the completion of requirements.
  • Table 2 is a specific example of the blockchain establishment log provided by the embodiment of this application. As shown in Table 2 below, the first column represents the demand parameters, and the second column represents the actual demand completion status. It can be understood that Table 2 is only for illustration. During specific implementation, the blockchain establishment log can be provided according to specific demand parameters, for example, including at least one row in Table 2.
  • Table 3 is another example of the blockchain establishment log provided by the embodiment of this application. As shown in Table 3 below, the first column indicates the type of node, the second column indicates the demand configuration for the node, and the third column indicates the actual demand completion status. It can be understood that Table 3 is only illustrative and exemplary, and may include at least one row in Table 3.
  • the communication network and the blockchain are combined to realize the direct creation and management of the blockchain by the communication network.
  • the operator's administrator i.e., the second node
  • LAF analyzes the requirements. After that, it decides which nodes to deploy DPKI on and in what mode these nodes are deployed. Therefore, LAF publishes the first message to these nodes to configure the nodes to become blockchain nodes.
  • LAF can automatically analyze the demand side's blockchain creation requirements, comprehensively manage the infrastructure of the communication network blockchain, and shield the demand side from the details of the underlying communication network blockchain, providing the demand side with more convenient Blockchain creation/management services.
  • the process of sending the first message to at least one first node according to the blockchain establishment requirement information in the above step S401 in the above step S401 will be described in detail below with reference to Figures 5 and 6.
  • the blockchain establishment requirement information in Figure 5 includes policy information
  • the blockchain establishment requirement information in Figure 6 includes the identification information of the first node.
  • Figure 5 is a schematic flow chart of a blockchain creation method provided by an embodiment of the present application. As shown in Figure 5, the creation method of the blockchain includes S501 ⁇ S502. in:
  • the LAF obtains the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node according to the policy information in the blockchain establishment requirement information.
  • the LAF obtains the identification information of the network element where the first node is located based on the policy information in the blockchain establishment requirement information, or the address information of the first node, or the identification information of the first node can be understood as :
  • the LAF obtains the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node from the information stored locally by the LAF based on the policy information. That is to say, the information related to the first node can be stored by the LAF itself. For example, when the type of the first node is an independent node, since the independent node is an entity that does not exist in the existing communication network, it can be stored by the LAF itself. Information about independent nodes.
  • the identification information of any first node can be used to uniquely identify the first node.
  • the identification information of the first node may be user permanent identity (subscription permanent identifier, SUPI) information, device ID, or international mobile equipment identity (international mobile equipment identity) , IMEI), etc.
  • SUPI subscription permanent identifier
  • IMEI international mobile equipment identity
  • the identification information of the first node may be a physical cell identifier (PCI), a cell global identity (CGI), or a device ID, etc.
  • PCI physical cell identifier
  • CGI cell global identity
  • the identification information of the first node can be a fully qualified domain name (fully qualified domain name, FQDN), or a uniform resource identifier (uniform resource identifier, URI), or a network Function ID, etc. are not limited here.
  • the identification information of the first node may be FQDN, or URI, etc., which is not limited here.
  • the identification information of the first node may be FQDN, or URI, or node ID, etc., which is not limited here.
  • the above-mentioned LAF obtains the identification information of the network element where the first node is located according to the policy information in the blockchain establishment requirement information, or the address information of the first node, or the identification information of the first node. It is understood that: the LAF sends a first query request to the fourth node, and the first query request includes policy information.
  • the fourth node receives the first query request from the LAF, and the fourth node can obtain the identification information of the network element where the first node is located according to the first query request including the policy information, or the address information of the first node, Alternatively, the identification information of the first node is fed back to the LAF with a first response message, where the first response message carries the identification information of the network element where the first node is located, or the address information of the first node, or the first response message. Identification information of a node.
  • the above-mentioned LAF obtains the identification information of the network element where the first node is located according to the policy information through the following steps: S1, LAF sends a first query to the fourth node request, the first query request includes policy information.
  • the fourth node receives the first query request from the LAF, and the fourth node can obtain the identification information (for example, SUPI) of the first node according to the policy information included in the first query request.
  • SUPI the identification information of the first node according to the policy information included in the first query request.
  • the fourth node feeds back the first response message to the LAF.
  • the first response message includes SUPI.
  • LAF sends a second query request to the fifth node.
  • the second query request includes SUPI.
  • the fifth node receives the second query request from the LAF, and obtains the identification information of the network element (for example, AMF) where the first node is located according to the SUPI included in the second query request. S4.
  • the fifth node feeds back the second response message to the LAF.
  • the second response message includes identification information of the AMF.
  • the fourth node may be PCF
  • the fifth node may be UDM.
  • the fourth node when the fourth node is a new network element, the fourth node may include terminal equipment, access network equipment, core network elements, application function nodes, and independent nodes. and information related to one or more types of nodes such as edge network nodes.
  • the fourth node may be called UTDM, etc., or the fourth node may be called another name, which is not limited here. That is to say, relevant information about terminal equipment, access network equipment, core network network elements, application function nodes, independent nodes and/or edge network nodes can be unified and summarized into the same network function (i.e., the fourth node, for example
  • the fourth node may be UTDM). Therefore, the terminal device can directly query the AMF where the terminal device is located from the fourth node through the policy information.
  • the fourth node may specifically be OAM, or UTDM, etc., which is not limited here.
  • the information of the first node obtained by the LAF according to the policy information is the identification information of the network element where the first node is located.
  • the network element can be AMF, etc., and there is no restriction here.
  • the information of the first node obtained by the LAF according to the policy information may be the address information of the first node.
  • the address information of the first node may be an Internet protocol (internet protocol, IP) address, etc.
  • the information of the first node obtained by the LAF based on the policy information may also be the identification information of the first node.
  • the identification information of the first node may be FQDN, or URI, etc., which is not limited here.
  • the fourth node may be NRF, or UTDM, etc., which is not limited here.
  • the fourth node may specifically be NEF, or UTDM, etc., which is not limited here.
  • the information of the first node obtained by LAF based on the policy information may include whether the current node is idle, current resource occupation status, physical location, address information (such as IP address), FQDN and/or URI. wait.
  • the fourth node may be UTDM, etc., which is not limited here.
  • the fourth node may specifically be UTDM, etc., which is not limited here.
  • the LAF sends the first message to at least one first node based on the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node.
  • the LAF can based on the network element where the first node is located.
  • the identification information of the network element, or the address information of the first node, or the identification information of the first node sends the first message to at least one first node.
  • the LAF may send the first message to the first node through the network element (for example, AMF) where the first node is located.
  • the network element for example, AMF
  • the LAF may send the first message to the first node through the IP address of the first node, or the LAF may send the first message to the first node through the FQDN or URI. information.
  • the LAF may send the first message to the first node through the FQDN or URI.
  • Figure 6 is a schematic flowchart of another blockchain creation method provided by an embodiment of the present application.
  • the creation method of the blockchain includes S601 ⁇ S602:
  • LAF obtains the identification information of the first node from the blockchain establishment requirement information.
  • the blockchain establishment requirement information may directly include the identification information of the first node.
  • the identification information of the first node please refer to the relevant description in S501, which will not be described again here.
  • the LAF sends the first message to at least one first node based on the identification information of the first node.
  • the LAF may directly send the first message to at least one first node based on the identification information of the first node. For example, when the type of the first node is a core network element, the identification information of the first node is a URI. Therefore, the LAF can send the first message to the corresponding core network element according to the URI. In another example, when the type of the first node is an application function node, the identification information of the first node is a URI. Therefore, the LAF can send the first message to the corresponding application function node according to the URI.
  • the LAF sending the first message to at least one first node based on the identification information of the first node can be understood as: the LAF obtains the identification information of the network element where the first node is located based on the identification information of the first node, or , the address information of the first node, and then sends the first message to at least one first node based on the identification information of the network element where the first node is located, or the address information of the first node.
  • the LAF obtaining the information of the first node according to the identification information of the first node can be understood as: the LAF sends a second query request to the fifth node, and the second query request includes the identification information of the first node.
  • the fifth node receives the second query request from the LAF, and then obtains the identification information of the network element where the first node is located, or the address information of the first node according to the identification information of the first node in the second query request. , and then feeds back a second response message to the LAF, where the second response message includes identification information of the network element where the first node is located, or address information of the first node.
  • the types of the first nodes are terminal equipment, access network equipment, core network elements, independent nodes, application function nodes, and edge network nodes respectively.
  • the fifth node is a UDM
  • the information of the first node obtained according to the identification information of the first node is the identification information of the network element where the first node is located, such as a terminal.
  • the network element where the device is located is AMF.
  • the fifth node may be an OAM
  • the information of the first node obtained according to the identification information of the first node is the identification information of the network element where the first node is located, etc.
  • the network element where the access network equipment is located is AMF.
  • the fifth node may be an NRF
  • the information of the first node obtained according to the identification information of the first node is the address information of the first node, for example, the core network
  • the address information of the network element is its IP address, etc.
  • the fifth node may be NEF, and the information of the first node obtained according to the identification information of the first node is the address information of the first node, for example, the application function node
  • the address information is the IP address.
  • the LAF itself can also summarize all information related to terminal equipment, access network equipment, core network elements, application function nodes, independent nodes and/or edge network nodes. Therefore, the LAF obtains the identification information of the network element where the first node is located based on the identification information of the first node, or the address information of the first node is an internal implementation of the LAF.
  • the above-mentioned fifth node may also be a new network element, such as UTDM or may be called another name.
  • This new network element summarizes all information related to terminal equipment, access network equipment, core network elements, application function nodes, independent nodes and/or edge network nodes.
  • Figure 7 is a schematic diagram of the blockchain establishment process of multiple node combinations provided by the embodiment of the present application.
  • the blockchain may need to be deployed on multiple types of first nodes, such as terminal equipment, access network equipment, core network elements, application function nodes, and one or more types of independent nodes, etc.
  • first nodes such as terminal equipment, access network equipment, core network elements, application function nodes, and one or more types of independent nodes, etc.
  • LAF parses the blockchain establishment requirement information, it needs to interact with other network elements to obtain the above-mentioned first node information, such as the identification information of the AMF where the terminal equipment is located (i.e., AMF ID), the AMF ID where the access network equipment is located, and the core
  • the address information of the network element such as IP address
  • the address information of the application function node such as IP address
  • the functions of other network elements can follow the standards in 5G.
  • UDM stores information about terminal equipment
  • OAM stores information about access network equipment
  • NRF stores information about core network elements
  • NEF stores information about application function nodes. Since the independent node is an entity that does not exist in the existing communication network, the LAF itself can save the independent node, or other network elements can save the information of the independent node.
  • the LAF is mainly used to save the information of the independent node. Take an example to illustrate schematically. specific:
  • LAF requests terminal device information from UDM, which may specifically include the blockchain capability information reported by the terminal device, and/or may also include one or more of the following information: the identification of the AMF where the terminal device is located, and other information.
  • LAF's query to UDM includes the following two situations:
  • the LAF can communicate with the terminal device through the AMF, that is, send the first message to the LAF through the AMF, and the access network device under the AMF to the terminal device, and receive the first instruction message fed back by the terminal device.
  • the blockchain establishment requirement information includes policy information, such as a terminal device at a certain location
  • LAF first queries PCF for the SUPI information of the terminal device at that location, and PCF returns the SUPI information of the terminal device to AMF, and then LAF then queries UDM for the AMF ID where the terminal device is located based on SUPI, and UDM returns the AMF ID where the terminal device is located. Therefore, LAF can communicate with the terminal device through the AMF, that is, through the AMF to LAF, and access under the AMF.
  • the network device sends a first message to the terminal device, and receives a first instruction message fed back by the terminal device.
  • the LAF requests information about the access network equipment from the OAM, which may specifically include the blockchain capability information reported by the access network equipment, and/or may also include one or more of the following information:
  • the LAF queries the UDM where the access network equipment is located. AMF ID, UDM returns the AMF ID where the access network device is located. Therefore, the LAF can communicate with the access network device through the AMF, that is, the LAF sends the first message to the access network device through the AMF and receives the access network device. The first indication message fed back by the device.
  • identification information such as PCI
  • policy information such as access network equipment at a certain location
  • the LAF queries the UDM where the access network equipment is located.
  • AMF ID UDM returns the AMF ID where the access network device is located. Therefore, the LAF can communicate with the access network device through the AMF, that is, the LAF sends the first message to the access network device through the AMF and receives the access network device. The first indication message fed back by the device.
  • the LAF requests the core network element information from the NRF (for example, querying the NRF through the identification information or policy information of the core network element), which may specifically include the core network element.
  • the reported blockchain capability information and/or may also include one or more of the following information: the IP address, FQDN, URI, and PLMN of the core network element to which the core network element belongs.
  • the LAF may send the first message to the core network element through the IP address, and receive the first instruction message fed back by the core network element.
  • the LAF can also directly send the first message to the core network element through the core network element's identification information (such as FQDN or URI), and receive the first indication message fed back by the core network element.
  • LAF queries NEF for application function node information (for example, queries NEF through the identification information or policy information of the application function node), which may specifically include the blockchain reported by the application function node. Capability information, and/or, may also include one or more of the following information: IP address, FQDN, URI of the application function node, third-party enterprise corresponding to the application function node, and other information.
  • the LAF may send the first message to the application function node through the IP address or location, and receive the first indication message fed back by the application function node.
  • the LAF can also directly send the first message to the application function node through the identification information of the application function node (such as FQDN or URI), and receive the first indication message fed back by the application function node.
  • LAF self-checks to obtain the information of the independent node (for example, self-checking through the identification information or policy information of the independent node), which may specifically include the blockchain capability information of the independent node, and/ Or, it may also include one or more of the following information: the location of the independent node (such as the physical location of the independent node, which data center/data cloud the independent node is located in, etc.), IP address and other information.
  • the LAF may send the first message to the independent node through the IP address, and receive the first indication message fed back by the independent node.
  • the LAF can also directly send the first message to the independent node through the independent node's identification information (such as FQDN or URI), and receive the first indication message fed back by the independent node.
  • FIG. 8 is another schematic diagram of the blockchain establishment process of multiple node combinations provided by the embodiment of the present application.
  • the blockchain may need to be deployed on multiple types of first nodes, such as terminal equipment, access network equipment, core network elements, application function nodes, and one or more types of independent nodes, etc.
  • first nodes such as terminal equipment, access network equipment, core network elements, application function nodes, and one or more types of independent nodes, etc.
  • LAF parses the blockchain establishment requirement information, it needs to interact with other network elements to obtain the above-mentioned first node information.
  • other network elements take a new network element, such as UTDM, as an example. specific:
  • the LAF requests terminal device information from UTDM based on the identification information or policy information of the terminal device included in the blockchain establishment requirement information. Specifically, it may include the blockchain capability information reported by the terminal device, and/or it may also include the following information: One or more items: information such as the identification of the AMF where the terminal device is located.
  • the LAF can communicate with the terminal device through the AMF, that is, send the first message to the LAF through the AMF, and the access network device under the AMF to the terminal device, and receive the first instruction message fed back by the terminal device.
  • the LAF requests the information of the access network device from UTDM based on the identification information or policy information of the access network device included in the blockchain establishment requirement information, which may specifically include the blockchain capability information reported by the access network device, and/or, It may also include one or more of the following information: information such as the identification of the AMF where the access network device is located.
  • the LAF can communicate with the access network device through the AMF, that is, send the first message to the LAF to the access network device through the AMF, and receive the first instruction message fed back by the access network device.
  • LAF requests the core network element information from UTDM based on the identification information or policy information of the core network element included in the blockchain establishment requirement information, which may specifically include the core network element.
  • the blockchain capability information reported by network elements may also include one or more of the following information: the IP address, FQDN, URI, and PLMN corresponding to the core network element.
  • the LAF may send the first message to the core network element through the IP address, and receive the first instruction message fed back by the core network element.
  • the LAF can also directly send the first message to the core network element through the core network element's identification information (such as FQDN or URI), and receive the first indication message fed back by the core network element.
  • LAF queries UTDM for the application function node information based on the identification information or policy information of the application function node included in the blockchain establishment requirement information. Specifically, it may include the information reported by the application function node.
  • Blockchain capability information may also include one or more of the following information: IP address, FQDN, URI of the application function node, third-party enterprise corresponding to the application function node, and other information.
  • the LAF may send the first message to the application function node through the IP address, and receive the first indication message fed back by the application function node.
  • the LAF can also directly send the first message to the application function node through the identification information of the application function node (such as FQDN or URI), and receive the first indication message fed back by the application function node.
  • LAF queries UTDM for independent node information based on the identification information or policy information of the independent node included in the blockchain establishment requirement information, which may specifically include the blockchain capabilities reported by the independent node.
  • Information, and/or, may also include one or more of the following information: IP address of an independent node and other information.
  • the LAF may send the first message to the independent node through the IP address or location, and receive the first indication message fed back by the independent node.
  • the LAF can also directly send the first message to the independent node through the independent node's identification information (such as FQDN or URI), and receive the first indication message fed back by the independent node.
  • FIG. 9 is a schematic structural diagram of a communication device provided by an embodiment of the present application.
  • the communication device shown in Figure 9 can be used to implement part or all of the functions of the LAF in the embodiment corresponding to the above-mentioned blockchain creation method, or the communication device shown in Figure 9 can be used to implement the corresponding implementation of the above-mentioned blockchain creation method.
  • Part or all of the functions of the first node in the example, or the communication device shown in Figure 9 can be used to implement part or all of the functions of the second node in the embodiment corresponding to the above-mentioned blockchain creation method, or the communication shown in Figure 9
  • the device can be used to implement part or all of the functions of the fourth node in the embodiment corresponding to the above-mentioned blockchain creation method, or the communication device shown in Figure 9 can be used to implement the fifth node in the embodiment corresponding to the above-mentioned blockchain creation method.
  • Part or all of the functions of the node, or the communication device shown in Figure 9 can be used to implement part or all of the functions of the sixth node in the embodiment corresponding to the above-mentioned blockchain creation method.
  • the device may include a transceiver unit 901, a processing unit 902 and/or a storage unit 903.
  • the processing unit 902 is used for data processing.
  • the transceiver unit 901 integrates a receiving unit and a sending unit.
  • the storage unit 903 is used to store data/information, such as blockchain capability information, etc.
  • the transceiver unit 901 may also be called a communication unit. Alternatively, the transceiver unit 901 may also be split into a receiving unit and a transmitting unit.
  • the device also includes a storage unit (not shown in Figure 9), which can be used to store instructions and/or data, and the processing unit 902 can read the instructions and/or data in the storage unit to The device is caused to implement the actions of the LAF or the first node or the second node or the fourth node or the fifth node or the sixth node in each of the foregoing method embodiments.
  • a storage unit not shown in Figure 9
  • the processing unit 902 can read the instructions and/or data in the storage unit to The device is caused to implement the actions of the LAF or the first node or the second node or the fourth node or the fifth node or the sixth node in each of the foregoing method embodiments.
  • the communication device is a LAF, and may also be a device in the LAF, or a device that can be used in conjunction with the LAF.
  • the LAF may be a core network element or deployed on an access network device, etc., which is not limited here.
  • the communication device may also be a chip system. in:
  • Transceiver unit 901 configured to send a first message to at least one first node, where the first message is used to configure the first node as a blockchain node;
  • the type of the first node includes at least one of the following: terminal Equipment, access network equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application
  • the functional nodes and the edge network nodes are nodes with blockchain capabilities in the communication network;
  • the transceiver unit 901 is configured to receive a first indication message from the at least one first node, where the first indication message is used to indicate whether the first node is successfully configured.
  • the transceiver unit 901 is also used to receive blockchain establishment requirement information from the second node;
  • the device also includes a processing unit 902;
  • the processing unit 902 is also used to:
  • the transceiver unit 901 sends a first message to at least one first node according to the blockchain establishment requirement information.
  • the blockchain establishment requirement information includes one or more of the following requirements:
  • Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control strategy of the blockchain, the number of the first nodes, policy information, the first The identification information of the node, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can be a block Chain operation provides a trusted execution environment.
  • the blockchain establishment requirement information includes the policy information; the device further includes a processing unit 902;
  • the processing unit 902 is configured to:
  • the transceiver unit 901 sends the message to the at least one first node based on the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node. First news.
  • the identification information of the network element where the first node is located, or the address information of the first node, or the identification information of the first node is obtained according to the policy information.
  • the processing unit 902 is used to:
  • the first response message from the fourth node is received through the transceiver unit 901.
  • the first response message includes the identification information of the network element where the first node is located, or the address information of the first node, Or, the identification information of the first node.
  • the blockchain establishment requirement information includes the identification information of the first node; the device further includes a processing unit 902;
  • the processing unit 902 is configured to:
  • the transceiver unit 901 sends a first message to the at least one first node based on the identification information of the first node.
  • the processing unit 902 when sending a first message to the at least one first node based on the identification information of the first node, the processing unit 902 is configured to:
  • the transceiver unit 901 sends the first message to the at least one first node based on the identification information of the network element where the first node is located or the address information of the first node.
  • the processing unit 902 Used for:
  • the second response message from the fifth node is received through the transceiver unit 901.
  • the second response message includes identification information of the network element where the first node is located, or address information of the first node.
  • the network element where the first node is located is an access and mobility management function AMF.
  • the type of the first node is a terminal device; the first response message includes identification information of the first node; or the second response message includes the location of the first node.
  • the fourth node is a policy control function PCF, or the fifth node is a unified data management UDM.
  • the first response message includes identification information of the network element where the first node is located, or address information of the first node; and the second response message includes the first response message.
  • the type of the first node is access network equipment, and the fourth node or the fifth node is operation, management and maintenance OAM; or,
  • the type of the first node is a core network element, and the fourth node or the fifth node is a network storage function NRF; or,
  • the type of the first node is an application function node, and the fourth node or the fifth node is a network opening function NEF.
  • processing unit 902 is also used to:
  • the blockchain establishment result is sent to the second node through the transceiver unit 901 according to the first instruction message of the at least one first node.
  • the processing unit 902 when sending the blockchain establishment result to the second node according to the first instruction message of the at least one first node, is also configured to:
  • the blockchain establishment log includes the completion status of the requirements.
  • the first indication message includes configuration success information or configuration failure information
  • the blockchain establishment result includes blockchain establishment success or blockchain establishment failure
  • the processing unit 902 is configured to:
  • the block chain establishment result is sent to the second node through the transceiver unit 901 according to the amount of configuration success information included in the first indication message of the at least one first node.
  • the blockchain establishment result is that the blockchain is successfully established
  • the blockchain establishment result is a failure to establish the blockchain.
  • processing unit 902 is also used to:
  • a node that meets the blockchain establishment requirements is re-selected and the node is configured as a blockchain node.
  • the transceiver unit 901 is also used to:
  • Receive blockchain capability information of a plurality of nodes the plurality of nodes including the at least one first node.
  • the device further includes a storage unit 903;
  • the storage unit 903 or the transceiver unit 901 After receiving the blockchain capability information of multiple nodes, the storage unit 903 or the transceiver unit 901 is used to:
  • the storage unit 903 is used to store blockchain capability information of the multiple nodes; or,
  • the transceiver unit 901 is configured to send the blockchain capability information of the multiple nodes to the sixth node.
  • the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
  • the nodes in the client mode are used to generate transactions or transaction proposals
  • the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
  • the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
  • the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
  • the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
  • the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
  • the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the blockchain capability information includes at least one of the following capabilities:
  • the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the transceiver unit 901 is also used to:
  • the communication device is the first node, or it can be a device in the first node, or a device that can be used in conjunction with the first node.
  • the first node may be a terminal device, an access network device, a core network element, an independent node, an application function node, an edge network node, etc., which are not limited here.
  • the communication device may also be a chip system. in:
  • Transceiver unit 901 configured to receive a first message, the first message being used to configure the first node as a blockchain node;
  • the type of the first node includes at least one of the following: terminal equipment, access network equipment , core network network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the edge Network nodes are nodes with blockchain capabilities in the communication network;
  • the transceiver unit 901 is configured to send a first indication message, where the first indication message is used to indicate whether the first node is successfully configured.
  • the transceiver unit 901 is also used to:
  • the blockchain capability information includes modes supported by nodes, and the modes include one or more of the following:
  • the nodes in the client mode are used to generate transactions or transaction proposals
  • the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate micro-blocks based on said transactions;
  • the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
  • the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
  • the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
  • the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
  • the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the blockchain capability information includes at least one of the following capabilities:
  • the ability to deploy or call or execute smart contracts the ability to report or query or execute transactions, the ability to query blocks, computing power, storage capacity, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the first indication message indicates that the first node is configured successfully
  • the transceiver unit 901 is also used for:
  • the communication device is the second node, or it can be a device in the second node, or a device that can be used in conjunction with the second node.
  • the communication device may also be a chip system. in:
  • Processing unit 902 used to determine blockchain establishment requirement information
  • the transceiver unit 901 is used to send the blockchain establishment requirement information.
  • the blockchain establishment requirement information includes one or more of the following requirements:
  • Blockchain structure block structure, consensus mechanism, demand for throughput, whether the blockchain supports editable functions, the access control policy of the blockchain, the number of first nodes, policy information, the number of the first node Identification information, the capability of the first node, the type of the first node, the mode supported by the first node, the configuration information corresponding to the first node, whether the first node can run for the blockchain Provide a trusted execution environment.
  • the type of the first node includes at least one of the following:
  • Terminal equipment access network equipment, core network elements, independent nodes, application function nodes, edge network nodes;
  • the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the edge network node are nodes with blockchain capabilities in the communication network.
  • the transceiver unit 901 is also used to:
  • the blockchain establishment result includes blockchain establishment success or blockchain establishment failure.
  • the mode includes one or more of the following:
  • the nodes in the client mode are used to generate transactions or transaction proposals
  • the nodes in the micro-node mode are used to pre-process the transaction or transaction proposal, and the pre-processing of the transaction or transaction proposal includes one or more of the following: verifying the transaction or the transaction proposal; executing the Transaction proposals to generate transactions; generate microblocks based on said transactions;
  • the node in the light node mode is used to process the transaction or transaction proposal or the micro-block.
  • the processing of the transaction or transaction proposal or the micro-block includes one or more of the following: verifying the Transaction or the transaction proposal; execute the transaction proposal to generate a transaction; perform consensus on the transaction or the micro-block, and generate a complete block based on the transaction or the micro-block;
  • the node in the full node mode includes the functions of the node in the light node mode and is used to store the complete block.
  • the nodes in the client mode and the nodes in the micro-node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query transactions or execute them , block query capabilities, computing capabilities, storage capabilities, network capabilities, security algorithm capabilities, and the ability to provide a trusted execution environment;
  • the nodes in the light node mode and the nodes in the full node mode include at least one of the following capabilities: the ability to deploy or call or execute smart contracts, the ability to report or query or execute transactions, the ability to query blocks, and calculate Capabilities, storage capabilities, network capabilities, security algorithm capabilities, the ability to provide a trusted execution environment, and consensus capabilities.
  • the communication device is a fourth node, or may be a device in the fourth node, or a device that can be used in conjunction with the fourth node.
  • the fourth node may be a core network element in 5G or a newly defined core network element in 6G, etc., which is not limited here.
  • the communication device may also be a chip system. in:
  • the transceiver unit 901 is configured to receive a first query request, where the first query request includes policy information, or the first query request includes identification information of the first node;
  • the transceiver unit 901 is configured to send a first response message, wherein when the first query request includes policy information, the first response message includes identification information of the network element where the first node is located, or, The address information of the first node, or the identification information of the first node; when the first query request includes the identification information of the first node, the first response message includes the network element where the first node is located The identification information, or the address information of the first node;
  • the type of the first node includes at least one of the following: terminal equipment, access network equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment , the core network element, the independent node, the application function node and the edge network node are nodes with blockchain capabilities in the communication network.
  • the network element where the first node is located is an access and mobility management function AMF.
  • the type of the first node is a terminal device; the first query request includes policy information, and the first response message includes identification information of the first node; the fourth node is the policy control function PCF.
  • the type of the first node is a terminal device; the first query request includes identification information of the first node, and the first response message includes the identification information of the network element where the first node is located. Identification information, or address information of the first node; the fourth node is a unified data management UDM.
  • the first response message includes identification information of the network element where the first node is located, or address information of the first node;
  • the type of the first node is access network equipment, and the fourth node is operation, management and maintenance OAM; or,
  • the type of the first node is a core network element, and the fourth node is a network storage function NRF; or,
  • the type of the first node is an application function node, and the fourth node is a network opening function NEF.
  • the device further includes a storage unit 903, where:
  • the transceiver unit 901 is configured to receive blockchain capability information of multiple nodes.
  • the multiple nodes include at least one first node; the type of the first node includes at least one of the following: terminal equipment, access network Equipment, core network element, independent node, application function node, edge network node; the terminal equipment, the access network equipment, the core network element, the independent node, the application function node and the Edge network nodes are nodes with blockchain capabilities in the communication network;
  • the storage unit 903 is used to store blockchain capability information of the multiple nodes for use in the ledger anchoring function to determine the at least one first node.
  • FIG. 10 is a schematic structural diagram of another communication device provided by an embodiment of the present application.
  • the communication device includes a processor 1010 and an interface circuit 1020.
  • the processor 1010 and the interface circuit 1020 are coupled to each other.
  • the interface circuit 1020 may be a transceiver or an input-output interface.
  • the communication device may also include a memory 1030 for storing instructions executed by the processor 1010 or input data required for the processor 1010 to run the instructions or data generated after the processor 1010 executes the instructions.
  • the processor 1010 is used to perform the function of the above processing unit 902
  • the interface circuit 1020 is used to perform the function of the above transceiver unit 901.
  • the chip When the above communication device is a chip applied to a LAF, the chip implements the functions of the LAF in the above method embodiment.
  • the chip receives information from other network elements (or entities or nodes); or, the chip sends information to other network elements (or entities). or node) to send information.
  • the chip When the above communication device is a chip applied to the first node, the chip implements the function of the first node in the above method embodiment.
  • the chip receives information from other network elements (or entities or nodes); or, the first node chip sends information to other network elements (or entities).
  • the second node chip implements the function of the second node in the above method embodiment, and the second node chip receives information from other network elements; or, the second node chip Send information to other network elements (or entities or nodes).
  • the chip implements the function of the fourth node in the above method embodiment, and the chip receives information from other network elements; or, the chip sends information to other network elements (or entities or nodes). )send Message.
  • the chip implements the function of the fifth node in the above method embodiment, and the chip receives information from other network elements; or, the chip sends information to other network elements (or entities or nodes). )send Message.
  • the chip implements the function of the sixth node in the above method embodiment, and the chip receives information from other network elements; or, the chip sends information to other network elements (or entities or nodes). )send Message.
  • processor in the embodiment of the present application can be a CPU, or other general-purpose processor, digital signal processor (digital signal processor, DSP), application specific integrated circuit (ASIC), Field programmable gate array (FPGA) or other programmable logic devices, transistor logic devices, hardware components or any combination thereof.
  • DSP digital signal processor
  • ASIC application specific integrated circuit
  • FPGA Field programmable gate array
  • a general-purpose processor can be a microprocessor or any conventional processor.
  • the method steps in the embodiments of the present application can be implemented by hardware or by a processor executing software instructions.
  • Software instructions can be composed of corresponding software modules, which can be stored in random access memory (random access memory, RAM), flash memory, read-only memory (Read-Only Memory, ROM), programmable read-only memory (programmable ROM) , PROM), erasable programmable read-only memory (erasable PROM, EPROM), electrically erasable programmable read-only memory (electrically EPROM, EEPROM), register, hard disk, mobile hard disk, CD-ROM or other well-known in the art any other form of storage media.
  • An exemplary storage medium is coupled to the processor such that the processor can read information from the storage medium and write information to the storage medium.
  • the storage medium can also be an integral part of the processor.
  • the processor and storage media may be located in an ASIC.
  • the ASIC may be located in the LAF or the first node or the second node or the fourth node or the fifth node or the sixth node.
  • the processor and the storage medium may also exist as discrete components in the LAF or the first node or the second node or the fourth node or the fifth node or the sixth node.
  • the computer program product includes one or more computer programs or instructions.
  • the computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable device.
  • the computer program or instructions may be stored in or transmitted over a computer-readable storage medium.
  • the computer-readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server that integrates one or more available media.
  • the available media may be magnetic media, such as floppy disks, hard disks, and magnetic tapes; they may also be optical media, such as digital versatile discs (DVDs); they may also be semiconductor media, such as solid state drives (solid state drives). ,SSD).
  • magnetic media such as floppy disks, hard disks, and magnetic tapes
  • optical media such as digital versatile discs (DVDs)
  • DVDs digital versatile discs
  • semiconductor media such as solid state drives (solid state drives). ,SSD).
  • Embodiments of the present application also provide a computer-readable storage medium.
  • Computer-executable instructions are stored in the computer-readable storage medium.
  • the LAF or the first node or the second node in the above method embodiment is The method executed by the node or the fourth node or the fifth node or the sixth node is implemented.
  • An embodiment of the present application also provides a computer program product.
  • the computer program product includes a computer program.
  • the LAF or the first node or the second node or the fourth node or the fifth node in the above method embodiment is The method executed by node or sixth node is implemented.
  • Embodiments of the present application also provide a communication system, which includes a LAF or one or more nodes among a first node, a second node, a fourth node, a fifth node, a sixth node, etc.
  • LAF is used to execute the method executed by LAF in the above method embodiment.
  • the first node is used to execute the method executed by the first node in the above method embodiment.
  • the second node is used to execute the method executed by the second node in the above method embodiment.
  • the fourth node is used to execute the method executed by the fourth node in the above method embodiment.
  • the fifth node is used to execute the method executed by the fifth node in the above method embodiment.
  • the sixth node is used to execute the method executed by the sixth node in the above method embodiment.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本申请提供了一种区块链的创建方法及相关装置,该方法包括:向至少一个第一节点发送第一消息,第一消息用于配置第一节点为区块链节点;接收来自至少一个第一节点的第一指示消息,该第一指示消息用于指示第一节点是否配置成功。其中,第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点。基于本申请实施例中的方案,可实现将通信网络与区块链技术相结合,便于对区块链的创建和管理。

Description

区块链的创建方法及相关装置 技术领域
本申请涉及通信技术领域,尤其涉及一种区块链的创建方法及相关装置。
背景技术
区块链是一种综合了密码学技术、点对点(peer to peer,P2P)网络、分布式数据库等多种技术的分布式账本。作为一种公开透明的去中心化技术,区块链将传统的权威中心、中心式信任转化为群体共识、去中心化信任,构建了以密码学技术为保障的,不可篡改的分布式账本。然而,当前区块链的演进是独立于网络演进的,即当前区块链是作为一个独立的分布式存储旁路于通信网络的,其无法与通信网络相结合,且通信网络也无法直接对区块链进行创建和管理。
发明内容
本申请提供了一种区块链的创建方法及相关装置,可实现将区块链和通信网络结合,进而实现通信网络直接对区块链进行管理。
第一方面,本申请提供了一种区块链的创建方法,该方法包括:
向至少一个第一节点发送第一消息,所述第一消息用于配置所述第一节点为区块链节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;
接收来自所述至少一个第一节点的第一指示消息,所述第一指示消息用于指示所述第一节点是否配置成功。
在本申请中,LAF可以向第一节点发送第一消息以配置第一节点为区块链节点,其中,LAF可以是CN中一种新的NF,或者,LAF也可以部署于RAN中。第一节点的类型可以为终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点等中的一种或者多种。因此,通过实施本申请中的方案,可以实现将区块链和通信网络结合,进而实现通信网络直接对区块链的管理。
在一种可能的实现中,所述方法还包括:
接收来自第二节点的区块链建立需求信息;
所述向至少一个第一节点发送第一消息,包括:
根据所述区块链建立需求信息向至少一个第一节点发送第一消息。
在该种实现方式下,其他具有区块链建立需求的节点(例如第二节点)可以向LAF发送区块链建立需求信息,以通过LAF创建或管理区块链。
在一种可能的实现中,所述区块链建立需求信息包括以下一项或者多项需求:
区块链结构,区块结构,共识机制,对吞吐量的需求,区块链是否支持可编辑功能,区块链的访问控制策略,所述第一节点的数量,策略信息,所述第一节点的标识信息,所述第 一节点的能力,所述第一节点的类型,所述第一节点支持的模式,所述第一节点对应的配置信息,所述第一节点能否为区块链运行提供可信执行环境。
在一种可能的实现中,所述区块链建立需求信息包括所述策略信息;
所述根据所述区块链建立需求信息向至少一个第一节点发送第一消息,包括:
根据所述策略信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息;
基于所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息向所述至少一个第一节点发送第一消息。
在该种实现方式下,区块链创建的需求方(例如第二节点)无需获取底层区块链的基础设施的细节,而是直接向LAF发布建链节点的策略,LAF会自动识别满足该策略的底层节点,构建区块链。对于第二节点而言,更加简洁易用,另外,由于对第二节点屏蔽了底层细节,因此提高了网络的隐私性和安全性。
在一种可能的实现中,所述根据所述策略信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息,包括:
向第四节点发送第一查询请求,所述第一查询请求包括所述策略信息;
接收来自所述第四节点的第一响应消息,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息。
在该种实现方式下,LAF与第四节点(如UDM、PCF等)进行互通后,获取节点的相关信息,能够兼容现有通信网络,适用性更高。
在一种可能的实现中,所述区块链建立需求信息包括所述第一节点的标识信息;
所述根据所述区块链建立需求信息向至少一个第一节点发送第一消息,包括:
基于所述第一节点的标识信息向所述至少一个第一节点发送第一消息。
在该种实现方式下,区块链建立需求信息中直接包括第一节点的标识,使得需求更加清晰,LAF无需做过多的处理就可以直接向第一节点下发第一消息,有利于提高区块链创建或管理效率。
在一种可能的实现中,所述基于所述第一节点的标识信息向所述至少一个第一节点发送第一消息,包括:
根据所述第一节点的标识信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
基于所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息向所述至少一个第一节点发送第一消息。
在该种实现方式下,分离了第一节点在网络中的接入功能和区块链管理功能(即LAF),因为接入功能可能不单单提供给LAF使用,也会提供给其他网元使用,因此使得各网元间功能界限更加清晰。除此之外,还提高了将该方案应用于5G系统时的兼容性。
在一种可能的实现中,所述根据所述第一节点的标识信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,包括:
向第五节点发送第二查询请求,所述第二查询请求包括所述第一节点的标识信息;
接收来自所述第五节点的第二响应消息,所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息。
在该种实现方式下,分离了第一节点在网络中的信息管理功能和区块链管理功能(即LAF),因为信息管理功能可能不单单提供给LAF使用,也会提供给其他网元使用,因此使 得各网元间功能界限更加清晰。除此之外,还提高了将该方案应用于5G系统时的兼容性。
在一种可能的实现中,所述第一节点所在的网元为接入与移动管理功能AMF。
在一种可能的实现中,所述第一节点的类型为终端设备;所述第一响应消息包括所述第一节点的标识信息;或者,所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
所述第四节点为策略控制功能PCF,或者,所述第五节点为统一数据管理UDM。
在该种实现方式下,提高了将该方案应用于5G系统时的兼容性。
在一种可能的实现中,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
所述第一节点的类型为接入网设备,所述第四节点或所述第五节点为操作、管理和维护OAM;或者,
所述第一节点的类型为核心网网元,所述第四节点或所述第五节点为网络存储功能NRF;或者,
所述第一节点的类型为应用功能节点,所述第四节点或所述第五节点为网络开放功能NEF。
在该种实现方式下,提高了将该方案应用于5G系统时的兼容性。
在一种可能的实现中,所述方法还包括:
根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果。
在该种实现方式下,LAF可以实时获取第一节点的配置状态,有利于实现对区块链状态的管理,且可以提升对区块链创建的需求方的响应效率。
在一种可能的实现中,所述根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果,包括:
根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果和区块链建立日志;
其中,所述区块链建立日志包括对需求的完成情况。
在该种实现方式下,区块链建立日志详细展示了区块链节点的配置状态细节,有利于对节点的管理,获取更加细节的信息提供给区块链创建的需求方。
在一种可能的实现中,所述第一指示消息包括配置成功信息或配置失败信息;所述区块链建立结果包括区块链建立成功或区块链建立失败;
所述根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果,包括:
根据所述至少一个第一节点的第一指示消息中包括的配置成功信息的数量向所述第二节点发送区块链建立结果。
在一种可能的实现中,若所述配置成功信息的数量大于或者等于第一数量阈值,则所述区块链建立结果为区块链建立成功;
若所述配置成功信息的数量小于所述第一数量阈值,则所述区块链建立结果为区块链建立失败。
在一种可能的实现中,所述方法还包括:
若所述配置成功信息的数量小于所述第一数量阈值,则重新选择满足区块链建立需求的节点,并将该节点配置为区块链节点。
在一种可能的实现中,所述方法还包括:
接收多个节点的区块链能力信息,所述多个节点包括所述至少一个第一节点。
在该种实现方式下,通过接收各个节点的区块链能力信息,有利于后续准确地识别出满足区块链建立需求的节点。
在一种可能的实现中,所述方法还包括:
存储所述多个节点的区块链能力信息;或者,
向第六节点发送所述多个节点的区块链能力信息。
在该种实现方式下,第六节点可以为UDM,或者第六节点也可以是新设计的网元,例如UTDM等,在此不做限制。其中,当第六节点为UDM时,可提高本申请方案对5G系统的兼容性,当第六节点为UDM时,可提高本申请方案的适用性。
在一种可能的实现中,所述区块链能力信息包括节点支持的模式,所述模式包括以下一项或者多项:
客户端模式,微节点模式,轻节点模式,全节点模式;其中:
所述客户端模式下的节点用于生成交易或交易提案;
所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;根据所述交易生成微区块;
所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;
所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
在该种实现方式下,通过定义不同的模式可以更好地适配通信网这种底层设备种类众多,能力差异较大的情况,有利于提高方案的适用性。例如,终端设备作为客户端、接入网设备作为微节点、核心网网元和独立节点作为全节点;又例如终端设备1作为客户端、终端设备2作为微节点、接入网设备和独立节点作为全节点;又例如终端设备作为客户端、应用功能节点作为微节点、核心网网元和独立节点作为全节点等各种组合方式。
在一种可能的实现中,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;
所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述区块链能力信息包括以下至少一项能力:
部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述方法还包括:
向第三节点发送第二消息,其中所述第三节点为所述至少一个第一节点中配置成功的节点,所述第二消息用于撤销所述第三节点为区块链节点;
接收来自所述第三节点的第二指示消息,所述第二指示消息用于指示所述第三节点是否撤销成功。
第二方面,本申请提供了一种区块链的创建方法,该方法包括:
第一节点接收第一消息,所述第一消息用于配置所述第一节点为区块链节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;
所述第一节点发送第一至少消息,所述第一指示消息用于指示所述第一节点是否配置成功。
在一种可能的实现中,所述方法还包括:
所述第一节点发送区块链能力信息。
在一种可能的实现中,所述区块链能力信息包括节点支持的模式,所述模式包括以下一项或者多项:
客户端模式,微节点模式,轻节点模式,全节点模式;其中:
所述客户端模式下的节点用于生成交易或交易提案;
所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;根据所述交易生成微区块;
所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;
所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
在一种可能的实现中,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;
所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述区块链能力信息包括以下至少一项能力:
部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述第一指示消息指示所述第一节点配置成功;
所述方法还包括:
接收第二消息,所述第二消息用于撤销所述第一节点为区块链节点;
发送第二指示消息,所述第二指示消息用于指示所述第一节点是否撤销成功。
第三方面,本申请提供了一种区块链的创建方法,该方法包括:
第二节点确定区块链建立需求信息;
所述第二节点发送所述区块链建立需求信息。
这里,第二节点为具有区块链建立需求的节点。
在一种可能的实现中,所述区块链建立需求信息包括以下一项或者多项需求:
区块链结构,区块结构,共识机制,对吞吐量的需求,区块链是否支持可编辑功能,区块链的访问控制策略,第一节点的数量,策略信息,所述第一节点的标识信息,所述第一节点的能力,所述第一节点的类型,所述第一节点支持的模式,所述第一节点对应的配置信息,所述第一节点能否为区块链运行提供可信执行环境。
在一种可能的实现中,所述第一节点的类型包括以下至少一种:
终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;
所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点。
在一种可能的实现中,所述模式包括以下一项或者多项:
客户端模式,微节点模式,轻节点模式,全节点模式;其中:
所述客户端模式下的节点用于生成交易或交易提案;
所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;根据所述交易生成微区块;
所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;
所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
在一种可能的实现中,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;
所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述方法还包括:
所述第二节点接收区块链建立结果;或者,
所述第二节点接收区块链建立结果和区块链建立日志,其中,所述区块链建立日志包括对需求的完成情况。
在一种可能的实现中,所述区块链建立结果包括区块链建立成功或区块链建立失败。
第四方面,本申请提供了一种区块链的创建方法,该方法包括:
第四节点接收第一查询请求,所述第一查询请求包括策略信息,或者,所述第一查询请求包括第一节点的标识信息;
所述第四节点发送第一响应消息,其中,当所述第一查询请求包括策略信息时,所述第一响应消息包括第一节点所在的网元的标识信息,或者,所述第一节点的地址信息, 或者,所述第一节点的标识信息;当所述第一查询请求包括第一节点的标识信息时,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
其中,所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点。
在一种可能的实现中,所述第一节点所在的网元为接入与移动管理功能AMF。
在一种可能的实现中,所述第一节点的类型为终端设备;所述第一查询请求包括策略信息,所述第一响应消息包括所述第一节点的标识信息;所述第四节点为策略控制功能PCF。
在一种可能的实现中,所述第一节点的类型为终端设备;所述第一查询请求包括第一节点的标识信息,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述第四节点为统一数据管理UDM。
在一种可能的实现中,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
所述第一节点的类型为接入网设备,所述第四节点为操作、管理和维护OAM;或者,
所述第一节点的类型为核心网网元,所述第四节点为网络存储功能NRF;或者,
所述第一节点的类型为应用功能节点,所述第四节点为网络开放功能NEF。
在一种可能的实现中,所述方法还包括:
所述第四节点接收多个节点的区块链能力信息,所述多个节点包括至少一个第一节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;
所述第四节点存储所述多个节点的区块链能力信息,以用于账本锚定功能确定所述至少一个第一节点。
第五方面,本申请提供了一种通信装置,该装置为账本锚定功能LAF,该装置包括:
收发单元,用于向至少一个第一节点发送第一消息,所述第一消息用于配置所述第一节点为区块链节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;
所述收发单元,用于接收来自所述至少一个第一节点的第一指示消息,所述第一指示消息用于指示所述第一节点是否配置成功。
在一种可能的实现中,所述收发单元,还用于接收来自第二节点的区块链建立需求信息;
所述装置还包括处理单元;
所述向至少一个第一节点发送第一消息时,所述处理单元还用于:
通过所述收发单元根据所述区块链建立需求信息向至少一个第一节点发送第一消息。
在一种可能的实现中,所述区块链建立需求信息包括以下一项或者多项需求:
区块链结构,区块结构,共识机制,对吞吐量的需求,区块链是否支持可编辑功能,区块链的访问控制策略,所述第一节点的数量,策略信息,所述第一节点的标识信息,所述第一节点的能力,所述第一节点的类型,所述第一节点支持的模式,所述第一节点对应的配置信息,所述第一节点能否为区块链运行提供可信执行环境。
在一种可能的实现中,所述区块链建立需求信息包括所述策略信息;所述装置还包括处理单元;
所述根据所述区块链建立需求信息向至少一个第一节点发送第一消息时,所述处理单元用于:
根据所述策略信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息;
通过所述收发单元基于所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息向所述至少一个第一节点发送第一消息。
在一种可能的实现中,所述根据所述策略信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息时,所述处理单元用于:
通过所述收发单元向第四节点发送第一查询请求,所述第一查询请求包括所述策略信息;
通过所述收发单元接收来自所述第四节点的第一响应消息,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息。
在一种可能的实现中,所述区块链建立需求信息包括所述第一节点的标识信息;所述装置还包括处理单元;
所述根据所述区块链建立需求信息向至少一个第一节点发送第一消息时,所述处理单元用于:
通过所述收发单元基于所述第一节点的标识信息向所述至少一个第一节点发送第一消息。
在一种可能的实现中,所述基于所述第一节点的标识信息向所述至少一个第一节点发送第一消息时,所述处理单元用于:
根据所述第一节点的标识信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
通过所述收发单元基于所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息向所述至少一个第一节点发送第一消息。
在一种可能的实现中,所述根据所述第一节点的标识信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息时,所述处理单元用于:
通过所述收发单元向第五节点发送第二查询请求,所述第二查询请求包括所述第一节点的标识信息;
通过所述收发单元接收来自所述第五节点的第二响应消息,所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息。
在一种可能的实现中,所述第一节点所在的网元为接入与移动管理功能AMF。
在一种可能的实现中,所述第一节点的类型为终端设备;所述第一响应消息包括所述第一节点的标识信息;或者,所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
所述第四节点为策略控制功能PCF,或者,所述第五节点为统一数据管理UDM。
在一种可能的实现中,所述第一响应消息包括所述第一节点所在的网元的标识信息,或 者,所述第一节点的地址信息;所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
所述第一节点的类型为接入网设备,所述第四节点或所述第五节点为操作、管理和维护OAM;或者,
所述第一节点的类型为核心网网元,所述第四节点或所述第五节点为网络存储功能NRF;或者,
所述第一节点的类型为应用功能节点,所述第四节点或所述第五节点为网络开放功能NEF。
在一种可能的实现中,所述处理单元还用于:
通过所述收发单元根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果。
在一种可能的实现中,所述根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果时,所述处理单元还用于:
通过所述收发单元根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果和区块链建立日志;
其中,所述区块链建立日志包括对需求的完成情况。
在一种可能的实现中,所述第一指示消息包括配置成功信息或配置失败信息;所述区块链建立结果包括区块链建立成功或区块链建立失败;
所述根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果时,所述处理单元用于:
通过所述收发单元根据所述至少一个第一节点的第一指示消息中包括的配置成功信息的数量向所述第二节点发送区块链建立结果。
在一种可能的实现中,若所述配置成功信息的数量大于或者等于第一数量阈值,则所述区块链建立结果为区块链建立成功;
若所述配置成功信息的数量小于所述第一数量阈值,则所述区块链建立结果为区块链建立失败。
在一种可能的实现中,所述处理单元还用于:
若所述配置成功信息的数量小于所述第一数量阈值,则重新选择满足区块链建立需求的节点,并将该节点配置为区块链节点。
在一种可能的实现中,所述收发单元还用于:
接收多个节点的区块链能力信息,所述多个节点包括所述至少一个第一节点。
在一种可能的实现中,所述装置还包括存储单元;
所述接收多个节点的区块链能力信息之后,所述存储单元或所述收发单元用于:
所述存储单元,用于存储所述多个节点的区块链能力信息;或者,
所述收发单元,用于向第六节点发送所述多个节点的区块链能力信息。
在一种可能的实现中,所述区块链能力信息包括节点支持的模式,所述模式包括以下一项或者多项:
客户端模式,微节点模式,轻节点模式,全节点模式;其中:
所述客户端模式下的节点用于生成交易或交易提案;
所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易; 根据所述交易生成微区块;
所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;
所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
在一种可能的实现中,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;
所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述区块链能力信息包括以下至少一项能力:
部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述收发单元还用于:
向第三节点发送第二消息,其中所述第三节点为所述至少一个第一节点中配置成功的节点,所述第二消息用于撤销所述第三节点为区块链节点;
接收来自所述第三节点的第二指示消息,所述第二指示消息用于指示所述第三节点是否撤销成功。
第六方面,本申请提供了一种通信装置,该装置为第一节点,该装置包括:
收发单元,用于接收第一消息,所述第一消息用于配置所述第一节点为区块链节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;
所述收发单元,用于发送第一指示消息,所述第一指示消息用于指示所述第一节点是否配置成功。
在一种可能的实现中,所述收发单元还用于:
发送区块链能力信息。
在一种可能的实现中,所述区块链能力信息包括节点支持的模式,所述模式包括以下一项或者多项:
客户端模式,微节点模式,轻节点模式,全节点模式;其中:
所述客户端模式下的节点用于生成交易或交易提案;
所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;根据所述交易生成微区块;
所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述 交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;
所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
在一种可能的实现中,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;
所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述区块链能力信息包括以下至少一项能力:
部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述第一指示消息指示所述第一节点配置成功;
所述收发单元还用于:
接收第二消息,所述第二消息用于撤销所述第一节点为区块链节点;
发送第二指示消息,所述第二指示消息用于指示所述第一节点是否撤销成功。
第七方面,本申请提供了一种通信装置,该装置为第二节点,该装置包括:
处理单元,用于确定区块链建立需求信息;
收发单元,用于发送所述区块链建立需求信息。
在一种可能的实现中,所述区块链建立需求信息包括以下一项或者多项需求:
区块链结构,区块结构,共识机制,对吞吐量的需求,区块链是否支持可编辑功能,区块链的访问控制策略,第一节点的数量,策略信息,所述第一节点的标识信息,所述第一节点的能力,所述第一节点的类型,所述第一节点支持的模式,所述第一节点对应的配置信息,所述第一节点能否为区块链运行提供可信执行环境。
在一种可能的实现中,所述第一节点的类型包括以下至少一种:
终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;
所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点。
在一种可能的实现中,所述收发单元还用于:
接收区块链建立结果;或者,
接收区块链建立结果和区块链建立日志,其中,所述区块链建立日志包括对需求的完成情况。
在一种可能的实现中,所述区块链建立结果包括区块链建立成功或区块链建立失败。
在一种可能的实现中,所述模式包括以下一项或者多项:
客户端模式,微节点模式,轻节点模式,全节点模式;其中:
所述客户端模式下的节点用于生成交易或交易提案;
所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易; 根据所述交易生成微区块;
所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;
所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
在一种可能的实现中,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;
所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
第八方面,本申请提供了一种通信装置,该装置为第四节点,该装置包括:
收发单元,用于接收第一查询请求,所述第一查询请求包括策略信息,或者,所述第一查询请求包括第一节点的标识信息;
所述收发单元,用于发送第一响应消息,其中,当所述第一查询请求包括策略信息时,所述第一响应消息包括第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息;当所述第一查询请求包括第一节点的标识信息时,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
其中,所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点。
在一种可能的实现中,所述第一节点所在的网元为接入与移动管理功能AMF。
在一种可能的实现中,所述第一节点的类型为终端设备;所述第一查询请求包括策略信息,所述第一响应消息包括所述第一节点的标识信息;所述第四节点为策略控制功能PCF。
在一种可能的实现中,所述第一节点的类型为终端设备;所述第一查询请求包括第一节点的标识信息,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述第四节点为统一数据管理UDM。
在一种可能的实现中,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
所述第一节点的类型为接入网设备,所述第四节点为操作、管理和维护OAM;或者,
所述第一节点的类型为核心网网元,所述第四节点为网络存储功能NRF;或者,
所述第一节点的类型为应用功能节点,所述第四节点为网络开放功能NEF。
在一种可能的实现中,所述装置还包括存储单元,其中:
所述收发单元,用于接收多个节点的区块链能力信息,所述多个节点包括至少一个第一节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元, 独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;
所述存储单元用于存储所述多个节点的区块链能力信息,以用于账本锚定功能确定所述至少一个第一节点。
第九方面,本申请提供了一种通信装置,该装置可以是LAF,例如该LAF可以为接入网设备或核心网网元或其他设备,也可以是接入网设备或核心网网元或其他设备中的装置,或者是能够和接入网设备或核心网网元或其他设备匹配使用的装置。其中,该通信装置还可以为芯片系统。该通信装置可执行第一方面所述的方法。该通信装置的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元或模块。该单元或模块可以是软件和/或硬件。该通信装置执行的操作及有益效果可以参见上述第一方面所述的方法以及有益效果,重复之处不再赘述。
第十方面,本申请提供了一种通信装置,该装置可以是第一节点(例如第一节点可以为终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点等),也可以是第一节点中的装置,或者是能够和第一节点匹配使用的装置。其中,该通信装置还可以为芯片系统。该通信装置可执行第二方面所述的方法。该通信装置的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元或模块。该单元或模块可以是软件和/或硬件。该通信装置执行的操作及有益效果可以参见上述第二方面所述的方法以及有益效果,重复之处不再赘述。
第十一方面,本申请提供了一种通信装置,该装置可以是第二节点,也可以是第二节点中的装置,或者是能够和第二节点匹配使用的装置。其中,该通信装置还可以为芯片系统。该通信装置可执行第三方面所述的方法。该通信装置的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元或模块。该单元或模块可以是软件和/或硬件。该通信装置执行的操作及有益效果可以参见上述第三方面所述的方法以及有益效果,重复之处不再赘述。
第十二方面,本申请提供了一种通信装置,该装置可以是第四节点,也可以是第四节点中的装置,或者是能够和第四节点匹配使用的装置。其中,该通信装置还可以为芯片系统。该通信装置可执行第四方面所述的方法。该通信装置的功能可以通过硬件实现,也可以通过硬件执行相应的软件实现。该硬件或软件包括一个或多个与上述功能相对应的单元或模块。该单元或模块可以是软件和/或硬件。该通信装置执行的操作及有益效果可以参见上述第四方面所述的方法以及有益效果,重复之处不再赘述。
第十三方面,本申请提供了一种通信装置,该装置可以是LAF,例如该LAF可以为接入网设备或核心网网元或其他设备,所述通信装置包括处理器和收发器,所述处理器和所述收发器用于执行至少一个存储器中存储的计算机程序或指令,以使得所述装置实现如第一方面中任意一项的方法。可选的,该通信装置还可以包括存储器。其中,处理器、收发器和存储器耦合。
第十四方面,本申请提供了一种通信装置,该装置可以是第一节点(例如第一节点可以为终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点等),所述通信装置包括处理器和收发器,所述处理器和所述收发器用于执行至少一个存储器中存储的计算机程序或指令,以使得所述装置实现如第二方面中任意一项的方法。可选的,该通信装 置还包括存储器。其中,处理器、收发器和存储器耦合。
第十五方面,本申请提供了一种通信装置,该装置可以是第二节点,所述通信装置包括处理器和收发器,所述处理器和所述收发器用于执行至少一个存储器中存储的计算机程序或指令,以使得所述装置实现如第三方面中任意一项的方法。可选的,该通信装置还包括存储器。其中,处理器、收发器和存储器耦合。
第十六方面,本申请提供了一种通信装置,该装置可以是核心网网元(例如第四节点,第五节点或第六节点等),所述通信装置包括处理器和收发器,所述处理器和所述收发器用于执行至少一个存储器中存储的计算机程序或指令,以使得所述装置实现如第四方面中任意一项的方法。可选的,该通信装置还包括存储器。其中,处理器、收发器和存储器耦合。
第十七方面,本申请提供了一种计算机可读存储介质,存储介质中存储有计算机程序或指令,当计算机程序或指令被计算机执行时,实现如第一方面~第六方面中任意一项的方法。
第十八方面,本申请提供一种包括指令的计算机程序产品,所述计算机程序产品中包括计算机程序代码,当计算机程序代码在计算机上运行时,以实现第一方面~第六方面中任意一项的方法。
第十九方面,提供了一种通信系统,该通信系统包括LAF和至少一个第一节点,其中:
所述LAF向所述至少一个第一节点发送第一消息,所述第一消息用于配置所述第一节点为区块链节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;
所述至少一个第一节点向所述LAF发送第一指示消息,所述第一指示消息用于指示发送所述第一指示信息的第一节点是否配置成功。
在一种可能的实现中,所述通信系统还包括第二节点;其中:
所述第二节点用于向所述LAF发送区块链建立需求信息;
所述LAF用于向至少一个第一节点发送第一消息,包括:
所述LAF用于根据所述区块链建立需求信息向至少一个第一节点发送第一消息。
在一种可能的实现中,所述区块链建立需求信息包括以下一项或者多项需求:
区块链结构,区块结构,共识机制,对吞吐量的需求,区块链是否支持可编辑功能,区块链的访问控制策略,所述第一节点的数量,策略信息,所述第一节点的标识信息,所述第一节点的能力,所述第一节点的类型,所述第一节点支持的模式,所述第一节点对应的配置信息,所述第一节点能否为区块链运行提供可信执行环境。
在一种可能的实现中,所述区块链建立需求信息包括所述策略信息或者第一节点的标识信息;所述通信系统还包括第四节点;其中:
所述LAF用于根据所述区块链建立需求信息向至少一个第一节点发送第一消息,包括:
所述LAF用于向所述第四节点发送第一查询请求,所述第一查询请求包括所述策略信息,或者,所述第一查询请求包括第一节点的标识信息;
所述第四节点用于向所述LAF发送第一响应消息,其中,当所述第一查询请求包括策略信息时,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息;当所述第一查询请求包括第一节点的标识信息时,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
所述LAF用于基于所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息向所述至少一个第一节点发送第一消息。
在一种可能的实现中,所述第一节点所在的网元为接入与移动管理功能AMF。
在一种可能的实现中,所述第一节点的类型为终端设备;所述第一查询请求包括策略信息,所述第一响应消息包括所述第一节点的标识信息;所述第四节点为策略控制功能PCF。
在一种可能的实现中,所述第一节点的类型为终端设备;所述第一查询请求包括第一节点的标识信息,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述第四节点为统一数据管理UDM。
在一种可能的实现中,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
所述第一节点的类型为接入网设备,所述第四节点为操作、管理和维护OAM;或者,
所述第一节点的类型为核心网网元,所述第四节点为网络存储功能NRF;或者,
所述第一节点的类型为应用功能节点,所述第四节点为网络开放功能NEF。
在一种可能的实现中,其特征在于,
所述LAF用于根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果;或者,
所述LAF用于根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果和区块链建立日志;其中,所述区块链建立日志包括对需求的完成情况。
在一种可能的实现中,所述第一指示消息包括配置成功信息或配置失败信息;所述区块链建立结果包括区块链建立成功或区块链建立失败;
所述LAF用于根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果,包括:
所述LAF用于根据所述至少一个第一节点的第一指示消息中包括的配置成功信息的数量向所述第二节点发送区块链建立结果。
在一种可能的实现中,若所述配置成功信息的数量大于或者等于第一数量阈值,则所述区块链建立结果为区块链建立成功;
若所述配置成功信息的数量小于所述第一数量阈值,则所述区块链建立结果为区块链建立失败。
在一种可能的实现中,所述至少一个第一节点还用于:
向所述LAF发送区块链能力信息。
在一种可能的实现中,所述LAF还用于存储所述区块链能力信息;或者,
所述LAF还用于向第四节点发送所述区块链能力信息;
所述第四节点存储所述区块链能力信息。
在一种可能的实现中,所述区块链能力信息包括节点支持的模式,所述模式包括以下一项或者多项:
客户端模式,微节点模式,轻节点模式,全节点模式;其中:
所述客户端模式下的节点用于生成交易或交易提案;
所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;根据所述交易生成微区块;
所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;
所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
在一种可能的实现中,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;
所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述区块链能力信息包括以下至少一项能力:
部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述LAF用于向所述第三节点发送第二消息,其中所述第三节点为所述至少一个第一节点中配置成功的节点,所述第二消息用于撤销所述第三节点为区块链节点;
所述第三节点用于向所述LAF发送第二指示消息,所述第二指示消息用于指示所述第三节点是否撤销成功。
附图说明
图1是一种通信系统的架构示意图;
图2是另一种通信系统的架构示意图;
图3是本申请实施例提供的区块链的架构示意图;
图4是本申请实施例提供的区块链的创建方法的一个流程示意图;
图5是本申请实施例提供的一种区块链的创建方法的流程示意图;
图6是本申请实施例提供的另一种区块链的创建方法的流程示意图;
图7是本申请实施例提供的多种节点组合的区块链建立过程的一种示意图;
图8是本申请实施例提供的多种节点组合的区块链建立过程的另一种示意图;
图9是本申请实施例提供的一种通信装置的结构示意图;
图10是本申请实施例提供的另一种通信装置的结构示意图。
具体实施方式
下面结合附图对本申请具体实施例作进一步的详细描述。
本申请的说明书、权利要求书及附图中的术语“第一”和“第二”等是用于区别不同对象,而不是用于描述特定顺序。此外,术语“包括”和“具有”以及它们任何变形,意图在于覆盖不排他的包含。例如包含了一系列步骤或单元的过程、方法、系统、产品或设备没有 限定于已列出的步骤或单元,而是可选地还包括没有列出的步骤或单元,或可选地还包括对于这些过程、方法、产品或设备固有的其它步骤或单元。
在本文中提及“实施例”意味着,结合实施例描述的特定特征、结构或特性可以包含在本申请的至少一个实施例中。在说明书中的各个位置出现该短语并不一定均是指相同的实施例,也不是与其它实施例互斥的独立的或备选的实施例。本领域技术人员显式地和隐式地理解的是,本文所描述的实施例可以与其它实施例相结合。
在本申请中,“至少一个(项)”是指一个或者多个,“多个”是指两个或两个以上,“至少两个(项)”是指两个或三个及三个以上,“和/或”,用于描述关联对象的关联关系,表示可以存在三种关系,例如,“A和/或B”可以表示:只存在A,只存在B以及同时存在A和B三种情况,其中A,B可以是单数或者复数。字符“/”一般表示前后关联对象是一种“或”的关系。“以下至少一项(个)”或其类似表达,是指这些项中的任意组合,包括单项(个)或复数项(个)的任意组合。例如,a,b或c中的至少一项(个),可以表示:a,b,c,“a和b”,“a和c”,“b和c”,或“a和b和c”,其中a,b,c可以是单个,也可以是多个。
为了更好地理解本申请实施例,下面首先对本申请实施例涉及的系统架构进行介绍:
本申请实施例的技术方案可以应用于各种通信系统,例如:长期演进(long term evolution,LTE)系统、LTE频分双工(frequency division duplex,FDD)系统、LTE时分双工(time division duplex,TDD)、新无线(new radio,NR)等第五代(5th generation,5G)系统、第六代(6th generation,6G)系统等5G之后演进的系统、无线局域网(Wireless Local Area Network,WALN)等,在此不做限制。
请参见图1,图1是一种通信系统的架构示意图。如图1所示,终端设备可以接入到无线网络中以通过无线网络与其它设备通信,如可以与其它终端设备通信。该无线网络包括(无线)接入网((radio)access network,(R)AN)和核心网(core network,CN),其中,(R)AN(后文描述为RAN)用于将终端设备接入到无线网络,CN用于对终端设备进行管理。下面分别对图1中系统架构所涉及的终端设备、RAN和CN进行详细说明。
一、终端设备
终端设备包括向用户提供语音和/或数据连通性的设备,例如终端设备是一种具有无线收发功能的设备,可以部署在陆地上,包括室内或室外、手持、穿戴或车载;也可以部署在水面上(如轮船等);还可以部署在空中(例如飞机、气球和卫星上等)。终端设备可以是手机(mobile phone)、平板电脑(Pad)、带无线收发功能的电脑、虚拟现实(virtual reality,VR)终端、增强现实(augmented reality,AR)终端、工业控制(industrial control)中的无线终端、车载终端、无人驾驶(self driving)中的无线终端、远程医疗(remote medical)中的无线终端、智能电网(smart grid)中的无线终端、运输安全(transportation safety)中的无线终端、智慧城市(smart city)中的无线终端、智慧家庭(smart home)中的无线终端、可穿戴终端等等。本申请的实施例对应用场景不做限定。终端设备有时也可以称为终端、用户设备(user equipment,UE)、接入终端、车载终端、工业控制终端、UE单元、UE站、移动站、移动台、远方站、远程终端、移动设备、UE终端、无线通信设备、UE代理或UE装置等。终端也可以是固定的或者移动的。可以理解,本申请中的终端的全部或部分功能也可以通过在硬件上运行的软件功能来实现,或者通过平台(例如云平台)上实例化的虚拟化功能来实现。
二、RAN
RAN中可以包括一个或多个RAN设备(或者说接入网设备),接入网设备与终端设备之间的接口可以为Uu接口(或称为空口)。当然,5G之后演进的通信中,这些接口的名称可 以不变,或者也可以用其它名称代替,本申请对此不限定。
接入网设备即为将终端设备接入到无线网络的节点或设备,接入网设备例如包括但不限于:5G通信系统中的下一代节点B(next generation node B,gNB)、演进型节点B(evolved node B,eNB)、下一代演进型节点B(next generation eNB,ng-eNB)、无线回传设备、无线网络控制器(radio network controller,RNC)、节点B(node B,NB)、家庭基站((home evolved nodeB,HeNB)或(home node B,HNB))、基带单元(baseBand unit,BBU)、传输接收点(transmitting and receiving point,TRP)、发射点(transmitting point,TP)、移动交换中心、设备到设备(Device-to-Device,D2D)、车辆外联(vehicle-to-everything,V2X)、机器到机器(machine-to-machine,M2M)通信中承担基站功能的设备等,还可以包括云接入网(cloud radio access network,C-RAN)系统中的集中式单元(centralized unit,CU)和分布式单元(distributed unit,DU)、非陆地通信网络(non-terrestrial network,NTN)通信系统中的网络设备,即可以部署于高空平台或者卫星,等,本申请实施例对此不作具体限定。
三、CN
CN中可以包括一个或多个CN设备(也可以理解为网元设备或功能网元或网络功能(network function,NF)等,在此不做限制)。
请参见图2,图2是另一种通信系统的架构示意图。该通信系统为5G非漫游场景下的系统架构。如图2所示,该通信系统包括以下网络功能和实体:网络切片选择功能(network slice selection function,NSSF)、网络开放功能(network exposure function,NEF)、网络存储功能(network function repository function,NRF)、策略控制功能(policy control function,PCF)、统一数据管理(unified data management,UDM)、应用功能(application function,AF)、认证服务器功能(authentication server function,AUSF)、接入与移动性管理功能(access and mobility management function,AMF)、会话管理功能(session management function,SMF)、UE、(无线)接入网((radio)access network,(R)AN)、用户面功能(user plane function,UPF)和数据网络(data network,DN)。其中:
1、用户面网元:作为和数据网络的接口,完成用户面数据转发、基于会话/流级的计费统计,带宽限制等功能。即分组路由和转发以及用户面数据的服务质量(quality of service,QoS)处理等。
在5G通信系统中,该用户面网元可以是UPF网元。
2、认证服务器:执行用户的安全认证。在5G通信系统中,该认证服务器可以是AUSF网元。
3、移动性管理网元:主要用于移动性管理和接入管理等。在5G通信系统中,该接入管理网元可以是AMF网元,主要进行移动性管理、接入鉴权/授权等功能。此外,还负责在终端与PCF网元间传递用户策略。
4、会话管理网元:主要用于会话管理、用户设备的网络互连协议(internet protocol,IP)地址分配和管理、选择可管理用户平面功能、策略控制和收费功能接口的终结点以及下行数据通知等。
在5G通信系统中,该会话管理网元可以是SMF网元,完成终端IP地址分配,UPF选择,及计费与QoS策略控制等。
5、应用网元:在5G通信系统中,该应用网元可以是AF网元,表示第三方或运营商的应用功能,是5G网络获取外部应用数据的接口,主要用于传递应用侧对网络侧的需求。
6、统一数据管理网元:负责用户标识、签约数据、鉴权数据的管理、用户的服务网元注 册管理。在5G通信系统中,该统一数据管理网元可以是UDM网元。
7、策略控制网元:包括用户签约数据管理功能、策略控制功能、计费策略控制功能、服务质量(quality of service,QoS)控制等,用于指导网络行为的统一策略框架,为控制面功能网元(例如AMF,SMF网元等)提供策略规则信息等。
在5G通信系统中,该策略控制网元可以是PCF。
8、网络功能存储库功能网元:为其他核心网元提供网络功能实体信息的存储功能和选择功能。在5G通信系统中,该网元可以是NRF网元。
9、网络开放网元:在5G通信系统中,该网络开放网元可以是NEF网元,主要用于向AF暴露3GPP网络功能的业务和能力,同时也可以让AF向3GPP网络功能提供信息。
10、网络切片选择功能网元:负责为UE选择网络切片,在5G通信系统中,该应用网元可以是NSSF网元。
上述功能网元既可以是硬件设备中的网络元件,也可以是在专用硬件上运行的软件功能,或者是平台(例如,云平台)上实例化的虚拟化功能。上述功能网元可划分出一个或多个服务,进一步,还可能会出现独立于网络功能存在的服务。在本申请中,上述功能网元的实例、或上述功能网元中包括的服务的实例、或独立于网络功能存在的服务实例均可称为服务实例。
此外,尽管未示出,CN中还可以包括其它可能的网元,比如服务通信代理(service communication proxy,SCP)、网络切片准入控制(network slice admission control function,NSACF)、网元统一数据仓储(unified data repository,UDR)网元。
需要知晓的是,在5G通信系统中,各功能网元可以是图2中所示的各个功能网元的名称,在5G之后演进的通信系统(如6G通信系统)中,各功能网元可以仍是图2中所示的各个功能网元的名称,或者也可以具有其它名称。例如,在5G通信系统中,策略控制网元可以是PCF,在5G之后演进的通信系统(如6G通信系统)中,策略控制功能可以仍是PCF,或者也可以具有其它名称,本申请并不限定。
其中,Nnssf为NSSF提供的服务化接口;Nnef为NEF提供的服务化接口;Nnrf为NRF提供的服务化接口;Npcf为PCF提供的服务化接口;Nudm为UDM提供的服务化接口;Naf为AF提供的服务化接口;Nausf为AUSF提供的服务化接口;Namf为AMF提供的服务化接口;Nsmf为SMF提供的服务化接口;N1为UE和AMF之间的参考点;N2为(R)AN和AMF之间的参考点;N3为(R)AN和UPF之间的参考点;N4为SMF和UPF之间的参考点;N6为UPF和DN之间的参考点;N9为UPF之间的参考点。需要说明的是,图2中Nnssf、Nnef、Nnrf、Npcf、Nudm、Naf、Nausf、Namf、Nsmf、N1、N2、N3、N4、N6,以及N9的含义可参见相关标准协议中定义的含义,在此不做限制。
需要说明的是,本申请实施例描述的通信系统(例如图1和图2所示的通信系统)也可以描述为通信网或通信网络等,在此不做限制。
需要说明的是,本申请中所涉及的网元或节点的名称,也可以称作其他名称,在此不做限制。需要说明的是,本申请中描述的新的网元或新设计的网元可以是一个全新的网元,或者,也可以是对现有网元的功能的扩充或更新或新增等,或者,也可以是对多个现有网元的功能的合并或集成等,在此不做限制。
需要说明的是,本申请实施例中描述的第四节点,第五节点和第六节点可以是相同的网元,或者,也可以是不同的网元,具体根据实际场景确定,在此不做限制。
例如当第一节点的类型为终端设备,且区块链建立需求信息包括策略信息时,第四节点和第五节点为不同的网元,具体地,第四节点可以为PCF,第五节点可以为UDM。
又例如,当第一节点的类型为接入网设备时,第四节点,第五节点和第六节点可以为相同的网元,例如OAM。
又例如,当第一节点的类型为核心网网元时,第四节点,第五节点和第六节点可以为相同的网元,例如NRF。
又例如,当第一节点的类型为应用功能节点时,第四节点,第五节点和第六节点可以为相同的网元,例如NEF。
需要说明的是,本申请实施例中涉及的节点(例如第一节点,第二节点,第四节点,第五节点,或第六节点等)可以是一种设备,芯片或网络功能等,在此不做限制。
为便于理解本申请实施例的相关内容,下面对一些本申请方案需要用到的知识进行介绍。需要说明的是,这些解释是为了让本申请实施例更容易被理解,而不应该视为对本申请所要求的保护范围的限定。
1、账本
账本是一种通过共识机制在节点之间共享、复制、或同步数据的技术。区块链(blockchain,BC)是账本技术中的一种,其在账本的基础上,还增加了通过密码学机制保障的防篡改的技术。一般来说,区块链的节点可以运行在物理节点上,或者,也可以运行在物理节点中的虚拟环境。这里物理节点即本申请中的第一节点。可理解的,本申请除了可以适用于区块链创建,还可以扩展到账本创建,或者后续不叫做区块链或者账本这两个名字,而是称作其他名称,在此不做限制。
2、账本锚定功能(ledger anchor function,LAF)
本申请中涉及的LAF可以是核心网中的一种新的NF(即部署于核心网中),或者,LAF也可以部署于RAN中,或者,LAF也可以部署于除核心网和RAN之外的其他网元或设备中,在此不做限制。LAF可用于执行通信网中与区块链相关的工作,例如负责区块链的生命周期的管理,包括如区块链的部署、访问控制等。可理解的,本申请中用于执行通信网中与区块链相关的工作的网元也可以不限定名称为LAF,也可以采用其他名称,具体根据实际场景确定,在此不做限制。为方便描述,以下主要以LAF进行示意性说明。可选的,LAF还可以是一种设备,或者芯片等,在此不做限制。
3、独立节点(independent node,INN)
本申请中涉及的INN为部署于通信网络中具有区块链能力的节点。也就是说,独立节点是一种可以部署于通信网中任何位置,且具有区块链能力的节点,其遵循通信网协议栈,接受通信网的统一管理和调度,但形式上不与终端设备、接入网设备、核心网设备等通信节点绑定。需要说明的是,本申请中可以部署于通信网中任何位置,且具有区块链能力的节点的名称也可以不限定命名为LAF,也可以采用其他名称,具体根据实际场景确定,在此不做限制。为方便描述,以下主要以独立节点进行示意性说明。
例如,当独立节点部署于终端设备中时,那么独立节点遵从终端设备的协议栈;当独立节点部署于RAN中时,那么独立节点遵循RAN的协议栈;当独立节点部署于核心网中时,那么独立节点遵循NF协议栈。
再例如,独立节点也可以是一种针对区块链技术设计的软硬件一体化服务器,也即是区块链一体机。
再例如,在一些对区块链的高性能需求场景,例如,需要区块链的高吞吐量、高计算、和/或支持多种共识算法的能力时,当集成于RAN中区块链节点难以满足性能需求 时,那么可以启动部署在RAN中的独立节点,该独立节点既遵循RAN的协议栈通信,又可提供高性能的区块链能力。
4、AF节点和边缘网络节点
AF对应的节点为AF节点,其中,本申请中涉及的AF节点为具有区块链能力的节点。可理解的,AF与5G核心网交互的目的在于提供服务。根据运营商部署策略,受信任的AF可以直接访问5G核心网的内部网元功能以提升业务处理效率,或者,也可以通过NEF与相应的内部网元功能实现信息交互。也就是说,在本申请中,区块链节点除了可以部署于通信网内部网元,也可扩展到AF,以适用需要AF参与的场景。
边缘网络节点是指在边缘计算中使用的节点。边缘计算是指在用户或数据源的物理位置或附近进行的计算,这样可以降低延迟,节省带宽。其中,边缘网络节点属于通信网络。
5、区块链结构
区块链结构包括单链,平行链,分片,有向无环图(directed acyclic graph,DAG)等,在此不做限制。
6、区块结构
区块结构是指区块内部的内容和数据结构。
7、共识机制
在去中心化账本/区块链技术中,共识机制是指以去中心化的方式就网络/数据/交易的状态达成统一协议的过程,也被称为共识算法。共识机制包括工作量证明机制(proof of work,POW),权益证明机制(proof of stack,POS),委托权益证明(delegated proof of stake,DPOS),可靠、可复制、可冗余、可容错(reliable,replicated,redundant,and fault-tolerant,RAFT),实用拜占庭容错(practical byzantine fault tolerance,PBFT)等,在此不做限制。
8、可信执行环境(trusted execution environment,TEE)
TEE是通过软硬件方法在中央处理器中构建的一个安全区域,保证其内部加载的程序和数据在机密性和完整性上得到保护。
9、区块链的访问控制策略
区块链的访问控制策略包括LAF授权、LAF访控、LAF透传、LAF代理。其中:
LAF授权:由LAF通过授权码的方式进行授权。例如实体A访问区块链,A会向LAF发送认证请求,LAF认证后,向A签发授权码,表示授权的范围和授权的有效期,A持有授权码访问区块链。区块链验证授权码,接受A的访问。
LAF访控:由LAF进行访问控制。例如,LAF直接对A进行验证,通过后A可直接访问区块链。每一次请求,LAF做一个验证。
LAF透传:由LAF透传访问请求,账本节点执行访控。例如,LAF不做处理,直接将A的请求转发至区块链,由区块链节点进行访问控制。
LAF代理:LAF执行代理服务,提供访问数据。例如,A向LAF提交请求,LAF验证通过后,LAF从链上获取后回复给A。
10、节点对应的配置信息
节点对应的配置信息可以理解为区块链对于节点上报交易的需求配置。例如,某个节点的配置信息可以是配置交易上报的触发条件,该触发条件可以为基于时间触发,或者基于频率触发,或者基于条件触发。其中,基于时间,即基于一定的时间间隔产生交易,并上报至区块链。例如配置终端设备/基站定期上报环境感知信息,或者配置NF定期上报网络状态。基于频率,即配置每发生n次某个事件,上报一次信息,n为大于0的整数。基于条件,即 满足一定条件时上报,例如,当终端设备每接入一次AMF时,产生交易上报,又例如,当网络流量到达某阈值时,产生交易上报。
11、节点支持的模式
本申请中节点支持的模式包括以下一项或者多项:客户端模式,微节点模式,轻节点模式,全节点模式。其中:
客户端模式下的节点用于生成交易或交易提案。其中,交易提案是客户端预执行的交易内容,如A向B转移X元。交易是交易提案执行后,客户端的状态。如A和B初始为10元,A向B转移1元,交易执行后A=9元,B=11元。
微节点模式下的节点用于预处理交易或交易提案,预处理交易或交易提案包括以下一项或多项:①验证交易或交易提案;②执行交易提案以生成交易;③根据交易生成微区块。其中,验证交易或交易提案是指验证交易或交易提案的签名和完整性,以及验证交易内容。其中,微区块是一种利用由微节点接受客户端发送的交易后,验证交易的合法性,验证通过的交易,微节点对验证通过的交易进行默克尔(即merkle)处理(不限定一定是merkle处理)后生成交易树,并为其背书(微节点对交易树进行签名)后生成的区块。
轻节点模式下的节点用于处理交易或交易提案或微区块,处理交易或交易提案或微区块包括以下一项或多项:①验证交易或交易提案;②执行交易提案以生成交易;③对交易或微区块进行共识,并基于交易或者微区块生成完整区块。其中,完整区块是全节点/轻节点接受微节点发送的微区块,不再对单一交易进行验证,只需验证微区块对其背书的结果,将多个微区块merkle处理后,封装在一个区块内部后,生成全区块。
全节点模式下的节点包括轻节点模式下的节点的功能,以及用于存储完整区块。
12、节点的能力
节点的能力包括部署智能合约的能力,调用智能合约的能力,执行智能合约的能力,交易上报的能力,交易查询的能力,交易执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力等一项或者多项能力。
其中,部署智能合约的能力是指节点可以安装智能合约的程序。
调用智能合约的能力是指节点可以调用智能合约的程序。
执行智能合约的能力是指节点可以执行智能合约的程序,为智能合约的执行提供计算资源和运行环境。
交易上报的能力是指节点可以生成一笔交易,并把交易发送给节点,该节点可以为全节点、微节点、轻节点。
交易查询的能力是指节点可以通过关键词,如交易ID或者交易哈希或者交易方ID或者交易内容,向区块链查询相关交易。
交易执行的能力是指节点可以执行一笔交易,并且获得交易执行后,交易方的状态。
区块查询的能力是指节点可以通过关键词,如区块高度或区块哈希或区块内容向区块链查询相关交易。其中,区块高度是指区块在链上的序号。
计算能力是指区块链节点的计算处理能力,如中央处理单元(central processing unit,CPU)、图形处理器(graphics processing unit,GPU)、内存状态。
存储能力是指硬盘空间大小。
网络能力是指网络带宽。
安全算法能力是指节点支持的算法。
提供可信执行环境的能力是指节点可以为智能合约的部署、调用、执行或区块链的运行提供可信执行环境。
共识能力是指节点支持的共识算法。
13、智能合约
智能合约是指一份能自动执行本需要手动才能完成任务的协议。智能合约就是任何能自行执行部分功能的协议。例如,一份能自动计算合同当事人待付金额,并安排支付这笔金额的合约。
需要说明的是,在通信系统中,可以将区块链用于多个场景,如:
场景1:通信网区块链需要UE/接入网设备(如基站)上报环境、关键性能指标(key performance indicator,KPI)、测绘等信息,包括:
传统网络的各种实际运营产生的KPI指标数据信息,主要是基站本地采集和收集,再通过私有接口直接上报给本地的子网管和数据库系统,再分级汇总统计上报给更高级别的网管和数据中心。利用区块链技术,UE可实时上报各种网络KPI数据。
或者,新型业务需要大量用户的测绘数据,如测试汽车的传感器通常会捕获其他汽车、行人、自行车以及交通标志、红绿灯、路沿、车道、其他基础设施及道路景观的影像和信息。IoT网络中会测绘环境的湿度、温度、环境状况等等。通过区块链,网络可以记录并存储测绘数据。
场景2:通信网区块链也可以用于记录网元的各种、动态的数据,如:
如运营商具有终端的业务数据,如用户画像信息(即用户在入网时与运营商签约的信息)、位置信息、标识(Identity,ID)信息、公共陆地移动网络(public land mobile network,PLMN)信息、服务信息等等;区块链可将与用户相关的个人信息(如疫情期间的行程)可提供给用户使用。
场景3:通信网区块链的上的数据也可以作为服务提供给UE、RAN、CN、和应用功能(即第三方应用)等。
但是,上述场景的实现需要通信网对通信网的各类实体(例如UE、RAN、CN)的区块链能力,区块链建设和部署都具有一套完整的管理架构和方法。然而,当前区块链的演进是独立于网络演进的,即当前区块链是作为一个独立的分布式存储旁路于通信网络的,其无法与通信网络相结合,且通信网络也无法直接对区块链进行管理和配置。
基于此,本申请实施例提出了一种区块链的创建方法,可以实现区块链与通信网络的结合。
在介绍本申请提供的区块链的创建方法之前,先对本申请适用的一种区块链架构进行示意性说明。
请参见图3,图3是本申请实施例提供的区块链的架构示意图。如图3所示,本申请中的区块链架构主要分为三个层面:
1、应用(Ledger application,LP)层:是通信网络中需要部署区块链的上层业务。
2、服务(Ledger Service,LS)层:用于为上层业务提供区块链即服务(blockchain as a service,BAAS)服务,屏蔽基础设施层细节,管理基础设施层中的节点。其中,服务层中包括LAF,LAF可以与其他NF进行交互。
3、基础设施(Ledger Infrastructure,LI)层:主要包括UE、RAN、NF、AF、INN、边 缘网络节点(图中暂未示出)等,用于提供不同等级的区块链能力,接受服务层的配置,构建区块链。其中,BC enabler用于标识节点(例如UE、RAN、NF、AF、和INN))具有区块链能力。
需要说明的是,图3只是一种示例性说明,本申请对区块链架构不做限制。
下面对本申请提供的区块链的创建方法及通信装置进行详细介绍:
请参见图4,图4是本申请实施例提供的区块链的创建方法的一个流程示意图。如图4所示,该区块链的创建方法包括如下步骤S401~S402:
S401、LAF向至少一个第一节点发送第一消息。
在一些可行的实施方式中,LAF向至少一个第一节点发送第一消息,该第一消息用于配置第一节点为区块链节点,或者理解为第一消息用于指示第一节点为区块链节点,或者理解为第一消息用于激活第一节点为区块链节点。需要说明的是,配置第一节点为区块链节点可以理解为在建立一条新的区块链时,将第一节点配置为新建立的区块链中的节点,可选的,配置第一节点为区块链节点也可以理解为已经建立好的区块链的基础上,将第一节点新增作为该条区块链中的节点,即对已有区块链进行管理或维护。通常来说,不同第一节点对应的第一消息中包括的配置信息不同。
可理解的,本申请中涉及的第一节点的类型可以是终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点等中的一种或者多种。其中,终端设备,接入网设备,核心网网元,独立节点和应用功能节点,边缘网络节点为通信网络中具有区块链能力的节点。
可理解的,本申请实施例中不同第一节点对应的第一消息通常是不同的。可选的,任一第一节点对应的第一消息中可以包括对该第一节点的配置信息,例如配置信息可以包括对第一节点上报交易的配置,举个例子,当采用基于条件的方式触发交易上报时,配置信息配置交易的条件具体是什么。再例如,激活/触发/指示第一节点为区块链节点后,需要配置其对应的其他通信节点的一些信息,这是因为区块链节点要与其他通信节点通信,因此需要配置其他通信节点。
可选的,上述LAF向至少一个第一节点发送第一消息可以理解为:LAF根据区块链建立需求信息向至少一个第一节点发送第一消息。其中,针对LAF根据区块链建立需求信息向至少一个第一节点发送第一消息的理解将在后文详细描述,在此不再进行详细说明。
其中上述区块链建立需求信息可以是由LAF生成的,即当LAF自身具有区块链建立需求时,LAF可以确定自身的区块链建立需求信息,并根据区块链建立需求信息确定至少一个第一节点。或者,该区块链建立需求信息也可以是由其他节点(为方便描述,后续以第二节点为例进行示意性说明)生成并发送给LAF的,因此LAF可以根据接收到的来自第二节点的区块链建立需求信息确定至少一个第一节点。这里第二节点是指具有区块链建立需求的节点,例如第二节点可以是运营商的管理面、管理节点、管理员。再例如第二节点可以是其他业务层面或者用户,举个例子,数据服务的节点、车联网的节点、垂直行业的用户、终端用户等,在此不做限制。
通常来说,上述区块链建立需求信息包括以下一项或者多项需求:
区块链结构,区块结构,共识机制,对吞吐量的需求,区块链是否支持可编辑功能,区块链的访问控制策略,第一节点的数量,策略信息,第一节点的标识信息,第一节点的能力,第一节点的类型,第一节点支持的模式,第一节点对应的配置信息,第一节点 能否为区块链运行提供可信执行环境。
其中,任一第一节点的能力包括以下一项或者多项能力:部署智能合约的能力,调用智能合约的能力,执行智能合约的能力,交易上报的能力,交易查询的能力,交易执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力等一项或者多项能力。
其中,任一第一节点支持的模式可以包括客户端模式,微节点模式,轻节点模式,或全节点模式。通常来说,一个第一节点在某一条区块链中只支持一种模式,同一第一节点在不同的区块链中支持的模式可以相同,也可以不同,在此不做限制。
其中,第一节点的数量可以理解为组成区块链的第一节点的总数量,或者,第一节点的数量也可以理解为组成区块链最少需要的第一节点的数量等,在此不做限制。
其中,策略信息可以理解为用于确定区块链节点的信息,即没有直接指定某个标识的第一节点,而是一些条件约束,该条件约束可以用于确定第一节点。
例如,针对终端设备而言,终端设备的策略信息可以为:1、在注册阶段满足某项性能的终端设备,例如具有可信执行环境的终端设备。2、当前连接至某一基站的终端设备,例如当前连接至基站ID为1101100100111111的终端设备。3、位置长期固定的终端设备,例如长期连接至基站ID为1101100100111111的终端设备等,在此不再一一举例。
又例如,针对接入网设备而言,接入网设备的策略信息可以为:1、接入网设备的位置信息,例如位于某地区中某小区的接入网设备;2、接入网设备的安全和计算能力,例如具备可信执行环境以及具有CPU4核计算能力的接入网设备等,在此不再一一举例。
又例如,针对核心网网元而言,核心网网元的策略信息可以为:涉及某项业务的核心网网元等。举个例子,管理移动性管理的网元。再举个例子,当前流量空闲的网元等。
又例如,针对独立节点而言,独立节点的策略信息可以为:满足某些性能要求的独立节点。举例来说,具有CPU64核的独立节点,或者,具有百G内存的独立节点,或者,具有千兆网口的独立节点等,在此不再一一举例。
又例如,针对应用功能节点而言,应用功能节点的策略信息可以为:满足某些性能要求的应用功能节点。举例来说,具有CPU64核的应用功能节点,或者,具有百G内存的应用功能节点,或者,具有千兆网口的应用功能节点等,在此不再一一举例。
示例性地,请参见如下表1,表1是本申请实施例提供的区块链建立需求信息的一个具体示例。需要说明的是,区块链建立需求信息可以包含表1中的一项或多项。如下表1所示,第一列表示需求参数,即区块链建立需求信息中的各项需求,第二列表示参数详细,即对相应需求的详细配置,第三列表示参数解释,即对需求参数的含义的具体解释:
表1
Figure PCTCN2022114801-appb-000001
Figure PCTCN2022114801-appb-000002
Figure PCTCN2022114801-appb-000003
Figure PCTCN2022114801-appb-000004
Figure PCTCN2022114801-appb-000005
Figure PCTCN2022114801-appb-000006
可选的,在步骤S401之前,还可以包括如下步骤S400:
S400、多个节点向LAF发送区块链能力信息。相应地,LAF接收多个节点的区块链能力信息。
其中,该多个节点包括上述至少一个第一节点。也就是说,具有区块链能力的各个节点可以向LAF上报自身的区块链能力信息,或者,当具有区块链能力的节点的区块链能力信息发生变化或更新时,可以向LAF上报自身最新的区块链能力信息。
在一种实现中,任一节点上报的区块链能力信息可以包括该节点支持的模式,以及该模式下节点具备的能力。例如客户端模式,微节点模式,轻节点模式,或者全节点模式等,在此不做限制。通常来说,客户端模式下的节点和微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力。轻节点模式下的节点和全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在另一种实现,任一节点上报的区块链能力信息也可以直接包括以下能力中的至少一种:部署智能合约的能力,调用智能合约的能力,执行智能合约的能力,交易上报的能力,交易查询的能力,交易执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力等,在此不做限制。也就是说,节点在上报区块链能力信息时,可以不上报其支持的模式,而只上报其具备的能力。
其中,在接收多个节点的区块链能力信息之后,LAF可以存储多个节点的区块链能力信息,即将接收到的多个节点的区块链能力信息存储于本地。可选的,LAF也可以将接收到的多个节点的区块链能力信息发送给第六节点,因此,第六节点可以接收并存储来自LAF的多个节点的区块链能力信息。
可理解的,当节点是终端设备的情况下,第六节点可以是统一数据管理(unified data management,UDM)。当节点是接入网设备(例如基站)时,第六节点可以为OAM。当节点是NF时,第六节点可以为NRF。当节点是AF时,第六节点可以为NEF。当节点是INN时,第六节点可以为LAF本身,或者,第六节点也可以为其他网元等,在此不做限制。可选的,第六节点也可以为新定义的网元,例如统一可信数据管理(unified trusted data management,UTDM)等,在此不做限制。该新定义的网元可用于存储终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点等一种或者多种类型节点的区块链能力信息。可理解的,该新定义的网元的名称也可以不限定命名为UTDM,为方便描述,后续主要以UTDM为例进行示意性说明。
需要说明的是,各个节点上报的区块链能力信息用于LAF在下发第一消息之前,判断哪个或哪些节点满足区块链建立需求,以向这些满足需求的节点发送第一消息。也就是说,LAF可以根据区块链建立需求信息和各个节点上报的区块链能力信息,确定哪个或哪些节点可以 作为第一节点,当LAF确定出第一节点后,可以向这些第一节点发送第一消息。
S402、LAF接收来自至少一个第一节点的第一指示消息。
其中,该第一指示消息用于指示第一节点是否配置成功,或者理解为,该第一指示消息用于指示第一节点是否激活成功。具体地,第一指示消息中包括配置成功信息或配置失败信息,或者理解为,第一指示消息中包括激活成功信息或激活失败信息。
可选的,LAF可以根据至少一个第一节点的第一指示消息确定区块链建立结果。其中,区块链建立结果包括区块链建立成功或区块链建立失败。示例性地,LAF可以根据第一节点返回的配置成功信息的数量确定区块链建立结果,或者,LAF也可以根据第一节点返回的配置失败信息的数量确定区块链建立结果。
例如,若配置成功信息的数量大于或者等于第一数量阈值,则区块链建立结果为区块链建立成功。若配置成功信息的数量小于第一数量阈值,则区块链建立结果为区块链建立失败。
又例如,若配置失败信息的数量大于或者等于第二数量阈值,则区块链建立结果为区块链建立失败;若配置失败信息的数量小于第二数量阈值,则区块链建立结果为区块链建立成功。
可选的,若配置成功信息的数量小于第一数量阈值,则重新选择满足区块链建立需求的节点,并将该节点配置为区块链节点。或者,若配置失败信息的数量大于或者等于第二数量阈值,则重新选择满足区块链建立需求的节点,并将该节点配置为区块链节点。
其中,第一数量阈值和第二数量阈值的设置可以相同,也可以不同,具体根据实际应用场景确定,在此不做限制。
可选的,LAF还可以向第三节点发送第二消息,其中第三节点为上述被配置的至少一个第一节点中配置成功的节点,第二消息用于撤销第三节点为区块链节点。可选的,LAF可以接收来自第三节点的第二指示消息,第二指示消息用于指示第三节点是否撤销成功。也就是说,LAF除了可以配置某个具有区块链能力的节点作为区块链节点,其还可以撤销或删除区块链中一个或者多个节点,以实现对区块链的创建或管理。
可选的,LAF还可以更新或更改对已配置的某个区块链节点的配置信息,例如以第一节点为终端设备1为例,假设终端设备1初始配置为区块链中的全节点,在后续的区块链管理过程中,LAF还可以更新终端设备1作为区块链中的微节点等,具体根据实际应用场景确定,在此不做限制。
可选的,若区块链建立需求信息是由其他节点生成并发送给LAF的,那么在LAF确定出区块链建立结果之后,LAF还可以向该具有区块链建立需求的其他节点发送区块链建立结果。可选的,在发送区块链建立结果的同时,还可以发送区块链建立日志,其中区块链建立日志包括对需求的完成情况。
举例来说,请参见如下表2,表2是本申请实施例提供的区块链建立日志的一个具体示例。如下表2所示,第一列表示需求参数,第二列表示实际的需求完成情况。可以理解的是,表2仅是示意,具体实现时可根据具体的需求参数提供区块链建立日志,例如,包含表2中的至少一行。
表2
需求参数 需求完成情况
第一节点的标识信息 完成/未完成
区块链结构 完成/未完成
共识机制 完成/未完成
吞吐量 完成/未完成
是否支持可编辑 完成/未完成
区块链的访问控制策略-接入网设备 LAF授权
区块链的访问控制策略-核心网网元 LAF访控
区块链的访问控制策略-独立节点 LAF透传
区块链的访问控制策略-应用功能节点 LAF代理
区块链的访问控制策略-接入网设备 LAF访控
又举例来说,请参见如下表3,表3是本申请实施例提供的区块链建立日志的另一种示例。如下表3所示,第一列表示节点的类型,第二列表示对该节点的需求配置,第三列表示实际的需求完成情况。可以理解的是,表3仅是示意,示例性的,可以包含表3中的至少一行。
表3
Figure PCTCN2022114801-appb-000007
在本申请实施例中,将通信网络与区块链相结合,可实现通信网络直接对区块链的创建和管理。示例性地,以去中心化公钥基础设施(decentralized public key infrastructure,DKPI)业务为例,运营商的管理员(即第二节点)可以向LAF发送DPKI的建链需求,LAF对需求进行解析之后,决定将DPKI部署在哪些节点,以及这些节点分别以什么模式部署,因此,LAF向这些节点发布第一消息用于配置节点成为区块链节点。通过实施例本申请,LAF可以自动解析需求方的区块链创建需求,全面管理通信网区块链的基础设施,且为需求方屏蔽底层通信网区块链细节,为需求方提供更加方便的区块链创建/管理服务。
下面结合图5和图6分别对上述步骤S401中根据区块链建立需求信息向至少一个第一节点发送第一消息的过程进行详细描述,其中图5中区块链建立需求信息包括策略信息,图6中区块链建立需求信息包括第一节点的标识信息。
请参见图5,图5是本申请实施例提供的一种区块链的创建方法的流程示意图。如图5所示,该区块链的创建方法包括S501~S502。其中:
S501、LAF根据区块链建立需求信息中的策略信息获取第一节点所在的网元的标识信息,或者,第一节点的地址信息,或者,第一节点的标识信息。
在一种实现中,LAF根据区块链建立需求信息中的策略信息获取第一节点所在的网元 的标识信息,或者,第一节点的地址信息,或者,第一节点的标识信息可以理解为:LAF根据策略信息从LAF本地存储的信息中获取第一节点所在的网元的标识信息,或者,第一节点的地址信息,或者,第一节点的标识信息。也就是说,可以由LAF本身存储与第一节点相关的信息,例如,当第一节点的类型为独立节点时,由于独立节点是现有通信网络中不存在的实体,因此可以由LAF自身保存独立节点的信息。
可理解的,任一第一节点的标识信息可以用于唯一标识该第一节点。示例性地,当第一节点的类型为终端设备时,第一节点的标识信息可以为用户永久性标识(subscription permanent identifier,SUPI)信息,设备ID,或者国际移动设备识别码(international mobile equipment identity,IMEI)等,在此不做限制。当第一节点的类型为接入网设备时,第一节点的标识信息可以为物理小区标识(physical cell identifier,PCI),小区全局标识(cell global identity,CGI),或者设备ID等,在此不做限制。当第一节点的类型为核心网网元时,第一节点的标识信息可以为全限定域名(fully qualified domain name,FQDN),或者,统一资源标识符(uniform resource identifier,URI),或者,网络功能ID等,在此不做限制。当第一节点的类型为应用功能节点时,第一节点的标识信息可以为FQDN,或者,URI等,在此不做限制。当第一节点的类型为独立节点时,第一节点的标识信息可以为FQDN,或者,URI,或者,节点ID等,在此不做限制。
在另一种实现中,上述LAF根据区块链建立需求信息中的策略信息获取第一节点所在的网元的标识信息,或者,第一节点的地址信息,或者,第一节点的标识信息可以理解为:LAF向第四节点发送第一查询请求,该第一查询请求包括策略信息。相应地,第四节点接收来自LAF的该第一查询请求,进而第四节点可以根据第一查询请求包括策略信息获取第一节点所在的网元的标识信息,或者,第一节点的地址信息,或者,第一节点的标识信息,进而向LAF反馈第一响应消息,其中,该第一响应消息中携带第一节点所在的网元的标识信息,或者,第一节点的地址信息,或者,第一节点的标识信息。下面针对第一节点的类型分别为终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点的情况分别进行详细描述。
在一个示例中,以第一节点的类型为终端设备为例,上述LAF根据策略信息获取第一节点所在的网元的标识信息可以通过以下步骤实现:S1、LAF向第四节点发送第一查询请求,该第一查询请求包括策略信息。相应地,第四节点接收来自LAF的该第一查询请求,进而第四节点可以根据第一查询请求中包括策略信息获取第一节点的标识信息(例如SUPI)。S2、第四节点向LAF反馈第一响应消息。其中,该第一响应消息中包括SUPI。S3、LAF向第五节点发送第二查询请求。其中,第二查询请求中包括SUPI。相应地,第五节点接收来自LAF的第二查询请求,并根据第二查询请求中包括的SUPI获取第一节点所在的网元(例如AMF)的标识信息。S4、第五节点向LAF反馈第二响应消息。其中,该第二响应消息中包括AMF的标识信息。在一种实现中,第四节点具体可以为PCF,第五节点具体可以为UDM。可选的,在另一种实现中,当第四节点是一种新的网元时,该第四节点可以包括关于终端设备、接入网设备、核心网网元、应用功能节点、独立节点和边缘网络节点等一种或者多种类型节点的相关信息。例如,该第四节点可以称为UTDM等,或者,第四节点也可以称作其他名称,在此不做限制。也就是说,可以将关于终端设备、接入网设备、核心网网元、应用功能节点、独立节点和/或边缘网络节点的相关信息都统一汇总到同一个网络功能(即第四节点,例如第四节点可以为UTDM),因此,终端设备通过策略信息可以直接从该第四节点中查询到该终端设备所在的AMF。
在另一个示例中,以第一节点的类型为接入网设备为例,第四节点具体可以为OAM,或者,UTDM等,在此不做限制。
需要说明的是,当第一节点的类型为终端设备或接入网设备时,LAF根据策略信息获取的第一节点的信息为第一节点所在的网元的标识信息,例如,第一节点所在的网元可以为AMF等,在此不做限制。
当第一节点的类型为核心网网元或应用功能节点时,LAF根据策略信息获取的第一节点的信息可以为第一节点的地址信息。例如,第一节点的地址信息可以为互联网协议(internet protocol,IP)地址等。可选的,当第一节点的类型为核心网网元或应用功能节点时,LAF根据策略信息获取的第一节点的信息还可以为第一节点的标识信息。例如,第一节点的标识信息可以为FQDN,或者,URI等,在此不做限制。
在另一个示例中,当第一节点的类型为核心网网元时,第四节点具体可以为NRF,或者,UTDM等,在此不做限制。
在另一个示例中,以第一节点的类型为应用功能节点为例,第四节点具体可以为NEF,或者,UTDM等,在此不做限制。
当第一节点的类型为独立节点时,LAF根据策略信息获取的第一节点的信息可以为当前节点是否空闲,当前资源占用状态,物理位置,地址信息(例如IP地址),FQDN和/或URI等。具体地,第四节点可以为UTDM等,在此不做限制。
在另一个示例中,当第一节点的类型为边缘网络节点时,第四节点具体可以为UTDM等,在此不做限制。
S502、LAF基于第一节点所在的网元的标识信息,或者,第一节点的地址信息,或者,第一节点的标识信息向至少一个第一节点发送第一消息。
在一些可行的实施方式中,当LAF获取到第一节点所在的网元的标识信息,或者,第一节点的地址信息,或者,第一节点的标识信息之后,LAF可以基于第一节点所在的网元的标识信息,或者,第一节点的地址信息,或者,第一节点的标识信息向至少一个第一节点发送第一消息。
具体地,当第一节点的类型为终端设备或接入网设备时,LAF可以通过第一节点所在的网元(例如AMF)向第一节点发送第一消息。
当第一节点的类型为核心网网元或应用功能节点时,LAF可以通过第一节点的IP地址向第一节点发送第一消息,或者,LAF可以通过FQDN或URI向第一节点发送第一消息。
当第一节点的类型为独立节点时,LAF可以通过FQDN或URI向第一节点发送第一消息。
请参见图6,图6是本申请实施例提供的另一种区块链的创建方法的流程示意图。如图6所示,该区块链的创建方法包括S601~S602:
S601、LAF从区块链建立需求信息中获取第一节点的标识信息。
也就是说,区块链建立需求信息中可以直接包括第一节点的标识信息。其中有关第一节点的标识信息的理解可参见S501中的相关描述,在此不进行赘述。
S602、LAF基于第一节点的标识信息向至少一个第一节点发送第一消息。
在一种实现中,LAF可以直接基于第一节点的标识信息向至少一个第一节点发送第一消息。示例性地,当第一节点的类型为核心网网元时,第一节点的标识信息为URI,因此,LAF 可以根据URI向对应的核心网网元发送第一消息。再一个示例中,当第一节点的类型为应用功能节点时,第一节点的标识信息为URI,因此,LAF可以根据URI向对应的应用功能节点发送第一消息。
在另一种实现中,LAF基于第一节点的标识信息向至少一个第一节点发送第一消息可以理解为:LAF根据第一节点的标识信息获取第一节点所在的网元的标识信息,或者,第一节点的地址信息,进而基于第一节点所在的网元的标识信息,或者,第一节点的地址信息向至少一个第一节点发送第一消息。
其中,LAF根据第一节点的标识信息获取第一节点的信息可以理解为:LAF向第五节点发送第二查询请求,第二查询请求包括第一节点的标识信息。相应地,第五节点接收来自LAF的第二查询请求,进而根据第二查询请求中的第一节点的标识信息,获取第一节点所在的网元的标识信息,或者,第一节点的地址信息,进而向LAF反馈第二响应消息,该第二响应消息包括第一节点所在的网元的标识信息,或者,第一节点的地址信息。下面针对第一节点的类型分别为终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点的情况分别进行详细描述。
示例性地,当第一节点的类型为终端设备时,第五节点为UDM,根据第一节点的标识信息获取的第一节点的信息为第一节点所在的网元的标识信息等,例如终端设备所在的网元为AMF。
示例性地,当第一节点的类型为接入网设备时,第五节点可以为OAM,根据第一节点的标识信息获取的第一节点的信息为第一节点所在的网元的标识信息等,例如接入网设备所在的网元为AMF。
示例性地,当第一节点的类型为核心网网元时,第五节点可以为NRF,根据第一节点的标识信息获取的第一节点的信息为第一节点的地址信息等,例如核心网网元的地址信息为其IP地址等。
示例性地,当第一节点的类型为应用功能节点时,第五节点可以为NEF,根据第一节点的标识信息获取的第一节点的信息为第一节点的地址信息等,例如应用功能节点的地址信息为IP地址。
可选的,LAF本身也可以汇总终端设备、接入网设备、核心网网元、应用功能节点、独立节点和/或边缘网络节点的相关的所有信息。因此,LAF根据第一节点的标识信息获取第一节点所在的网元的标识信息,或者,第一节点的地址信息为LAF的内部实现。
可选的,上述第五节点也可以为新的网元,例如UTDM或者也可以称作其他名称。该新的网元汇总了终端设备、接入网设备、核心网网元、应用功能节点、独立节点和/或边缘网络节点的相关的所有信息。
可理解的,为使得图5和图6中涉及的方案更加清楚,下面结果图7和图8进行进一步说明。
请参见图7,图7是本申请实施例提供的多种节点组合的区块链建立过程的一种示意图。如图7所示,在一个区块链建立需求中,该区块链可能需要部署在多种类型的第一节点上,如终端设备、接入网设备、核心网网元、应用功能节点、以及独立节点等中的一种或多种节点。LAF解析区块链建立需求信息后,需要与其他网元交互才能获得上述第一节点的信息,如终端设备所在的AMF的标识信息(即AMF ID)、接入网设备所在的AMF ID,核心网网元的地址信息(例如IP地址),应用功能节点的地址信息(例如 IP地址)等。其中,如图7中所示,其他网元的功能可以沿用5G中的标准,如UDM中保存终端设备的信息,OAM中保存接入网设备的信息,NRF中保存核心网网元的信息,NEF中保存应用功能节点的信息。由于独立节点是现有通信网中不存在的实体,因此可由LAF自身保存独立节点,或者也可以由其他网元保存独立节点的信息,为方便描述,图7中主要以LAF保存独立节点的信息为例进行示意性说明。具体的:
1、区块链部署在终端设备上的情况:
LAF向UDM请求终端设备的信息,具体可以包括终端设备上报的区块链能力信息,和/或,也可以包括以下信息中的一项或者多项:终端设备所在的AMF的标识等信息。其中,LAF向UDM查询包括以下2种情况:
a)当区块链建立需求信息中包括终端设备的标识信息时,如终端设备的SUPI信息时,LAF根据SUPI信息向UDM查询该终端设备所在的AMF ID,UDM返回终端设备所在的AMF ID,因此,LAF可以通过该AMF与终端设备进行通信,即向LAF通过该AMF,以及该AMF下的接入网设备向终端设备发送第一消息,并接收终端设备反馈的第一指示消息。
b)当区块链建立需求信息中包括策略信息时,如某一个位置的终端设备时,LAF先向PCF查询该位置的终端设备的SUPI信息,PCF向AMF返回该终端设备的SUPI信息,进而LAF再根据SUPI向UDM查询终端设备所在的AMF ID,UDM返回终端设备所在的AMF ID,因此,LAF可以通过该AMF与终端设备进行通信,即向LAF通过该AMF,以及该AMF下的接入网设备向终端设备发送第一消息,并接收终端设备反馈的第一指示消息。
2、区块链部署在接入网设备上的情况:
LAF向OAM请求接入网设备的信息,具体可以包括接入网设备上报的区块链能力信息,和/或,也可以包括以下信息中的一项或者多项:
接入网设备所在的AMF的标识等信息。具体地,LAF根据区块链建立需求信息中包括的接入网设备的标识信息(例如PCI)或策略信息(例如某一个位置的接入网设备),向UDM查询该接入网设备所在的AMF ID,UDM返回接入网设备所在的AMF ID,因此,LAF可以通过该AMF与接入网设备进行通信,即向LAF通过该AMF向接入网设备发送第一消息,并接收接入网设备反馈的第一指示消息。
3、区块链部署在核心网网元上的情况,LAF向NRF请求核心网网元的信息(例如通过核心网网元的标识信息或者策略信息向NRF查询),具体可以包括核心网网元上报的区块链能力信息,和/或,也可以包括以下信息中的一项或者多项:核心网网元的IP地址,FQDN,URI,核心网网元归属的PLMN等信息。其中,LAF可以通过IP地址向核心网网元发送第一消息,并接收核心网网元反馈的第一指示消息。可选的,LAF也可以直接通过核心网网元的标识信息(例如FQDN,或者URI)向核心网网元发送第一消息,并接收核心网网元反馈的第一指示消息。
4、区块链部署在应用功能节点的情况下,LAF向NEF查询应用功能节点信息(例如通过应用功能节点的标识信息或者策略信息向NEF查询),具体可以包括应用功能节点上报的区块链能力信息,和/或,也可以包括以下信息中的一项或者多项:应用功能节点的IP地址,FQDN,URI,应用功能节点对应的第三方企业等信息。其中,LAF可以通过IP地址或者位置向应用功能节点发送第一消息,并接收应用功能节点反馈的第一指示消息。可选的,LAF也可以直接通过应用功能节点的标识信息(例如FQDN,或者URI) 向应用功能节点发送第一消息,并接收应用功能节点反馈的第一指示消息。
5、区块链部署在独立节点的情况下,LAF自查获得独立节点的信息(例如通过独立节点的标识信息或者策略信息自查),具体可以包括独立节点的区块链能力信息,和/或,也可以包括以下信息中的一项多项:独立节点的位置(例如独立节点的物理位置,独立节点位于哪个数据中心/数据云等),IP地址等信息。其中,LAF可以通过IP地址向独立节点发送第一消息,并接收独立节点反馈的第一指示消息。可选的,LAF也可以直接通过独立节点的标识信息(例如FQDN,或者URI)向独立节点发送第一消息,并接收独立节点反馈的第一指示消息。
请参见图8,图8是本申请实施例提供的多种节点组合的区块链建立过程的另一种示意图。如图8所示,在一个区块链建立需求中,该区块链可能需要部署在多种类型的第一节点上,如终端设备、接入网设备、核心网网元、应用功能节点、以及独立节点等中的一种或多种节点。LAF解析区块链建立需求信息后,需要与其他网元交互才能获得上述第一节点的信息,这里其他网元以一个新的网元,例如UTDM为例。具体的:
1、区块链部署在终端设备上的情况:
LAF根据区块链建立需求信息中包括终端设备的标识信息或者策略信息向UTDM请求终端设备的信息,具体可以包括终端设备上报的区块链能力信息,和/或,也可以包括以下信息中的一项或者多项:终端设备所在的AMF的标识等信息。其中,LAF可以通过该AMF与终端设备进行通信,即向LAF通过该AMF,以及该AMF下的接入网设备向终端设备发送第一消息,并接收终端设备反馈的第一指示消息。
2、区块链部署在接入网设备上的情况:
LAF根据区块链建立需求信息中包括的接入网设备的标识信息或策略信息向UTDM请求接入网设备的信息,具体可以包括接入网设备上报的区块链能力信息,和/或,也可以包括以下信息中的一项或者多项:接入网设备所在的AMF的标识等信息。其中,LAF可以通过该AMF与接入网设备进行通信,即向LAF通过该AMF向接入网设备发送第一消息,并接收接入网设备反馈的第一指示消息。
3、区块链部署在核心网网元上的情况,LAF根据区块链建立需求信息中包括的核心网网元的标识信息或策略信息向UTDM请求核心网网元的信息,具体可以包括核心网网元上报的区块链能力信息,和/或,也可以包括以下信息中的一项或者多项:核心网网元的IP地址,FQDN,URI,核心网网元对应的PLMN等信息。其中,LAF可以通过IP地址向核心网网元发送第一消息,并接收核心网网元反馈的第一指示消息。可选的,LAF也可以直接通过核心网网元的标识信息(例如FQDN,或者URI)向核心网网元发送第一消息,并接收核心网网元反馈的第一指示消息。
4、区块链部署在应用功能节点的情况下,LAF根据区块链建立需求信息中包括的应用功能节点的标识信息或策略信息向UTDM查询应用功能节点信息,具体可以包括应用功能节点上报的区块链能力信息,和/或,也可以包括以下信息中的一项或者多项:应用功能节点的IP地址,FQDN,URI,应用功能节点对应的第三方企业等信息。其中,LAF可以通过IP地址向应用功能节点发送第一消息,并接收应用功能节点反馈的第一指示消息。可选的,LAF也可以直接通过应用功能节点的标识信息(例如FQDN,或者URI)向应用功能节点发送第一消息,并接收应用功能节点反馈的第一指示消息。
5、区块链部署在独立节点的情况下,LAF根据区块链建立需求信息中包括的独立节点的标识信息或策略信息向UTDM查询独立节点信息,具体可以包括独立节点上报的区 块链能力信息,和/或,也可以包括以下信息中的一项或者多项:独立节点的IP地址等信息。其中,LAF可以通过IP地址或者位置向独立节点发送第一消息,并接收独立节点反馈的第一指示消息。可选的,LAF也可以直接通过独立节点的标识信息(例如FQDN,或者URI)向独立节点发送第一消息,并接收独立节点反馈的第一指示消息。
下面将结合图9和图10对本申请提供的通信装置进行详细说明。
请参见图9,图9是本申请实施例提供的一种通信装置的结构示意图。图9所示的通信装置可用于实现上述区块链的创建方法对应的实施例中LAF的部分或全部功能,或者图9所示的通信装置可用于实现上述区块链的创建方法对应的实施例中第一节点的部分或全部功能,或者图9所示的通信装置可用于实现上述区块链的创建方法对应的实施例中第二节点的部分或全部功能,或者图9所示的通信装置可用于实现上述区块链的创建方法对应的实施例中第四节点的部分或全部功能,或者图9所示的通信装置可用于实现上述区块链的创建方法对应的实施例中第五节点的部分或全部功能,或者图9所示的通信装置可用于实现上述区块链的创建方法对应的实施例中第六节点的部分或全部功能。
如图9所示,该装置可以包括收发单元901,处理单元902和/或存储单元903。其中,处理单元902,用于进行数据处理。收发单元901集成有接收单元和发送单元。存储单元903用于存储数据/信息,例如区块链能力信息等。收发单元901也可以称为通信单元。或者,也可将收发单元901拆分为接收单元和发送单元。可选地,该装置还包括存储单元(图9中暂未示出),该存储单元可以用于存储指令和/或数据,处理单元902可以读取存储单元中的指令和/或数据,以使得装置实现前述各个方法实施例中的LAF或第一节点或第二节点或第四节点或第五节点或第六节点的动作。
在一种实现中,该通信装置为LAF,也可以是LAF中的装置,或者是能和LAF匹配使用的装置。示例性地,LAF具体可以为一种核心网网元或者部署于接入网设备中等,在此不做限制。其中,该通信装置还可以为芯片系统。其中:
收发单元901,用于向至少一个第一节点发送第一消息,所述第一消息用于配置所述第一节点为区块链节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;
所述收发单元901,用于接收来自所述至少一个第一节点的第一指示消息,所述第一指示消息用于指示所述第一节点是否配置成功。
在一种可能的实现中,所述收发单元901,还用于接收来自第二节点的区块链建立需求信息;
所述装置还包括处理单元902;
所述向至少一个第一节点发送第一消息时,所述处理单元902还用于:
通过所述收发单元901根据所述区块链建立需求信息向至少一个第一节点发送第一消息。
在一种可能的实现中,所述区块链建立需求信息包括以下一项或者多项需求:
区块链结构,区块结构,共识机制,对吞吐量的需求,区块链是否支持可编辑功能,区块链的访问控制策略,所述第一节点的数量,策略信息,所述第一节点的标识信息,所述第一节点的能力,所述第一节点的类型,所述第一节点支持的模式,所述第一节点对应的配置信息,所述第一节点能否为区块链运行提供可信执行环境。
在一种可能的实现中,所述区块链建立需求信息包括所述策略信息;所述装置还包括处理单元902;
所述根据所述区块链建立需求信息向至少一个第一节点发送第一消息时,所述处理单元902用于:
根据所述策略信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息;
通过所述收发单元901基于所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息向所述至少一个第一节点发送第一消息。
在一种可能的实现中,所述根据所述策略信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息时,所述处理单元902用于:
通过所述收发单元901向第四节点发送第一查询请求,所述第一查询请求包括所述策略信息;
通过所述收发单元901接收来自所述第四节点的第一响应消息,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息。
在一种可能的实现中,所述区块链建立需求信息包括所述第一节点的标识信息;所述装置还包括处理单元902;
所述根据所述区块链建立需求信息向至少一个第一节点发送第一消息时,所述处理单元902用于:
通过所述收发单元901基于所述第一节点的标识信息向所述至少一个第一节点发送第一消息。
在一种可能的实现中,所述基于所述第一节点的标识信息向所述至少一个第一节点发送第一消息时,所述处理单元902用于:
根据所述第一节点的标识信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
通过所述收发单元901基于所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息向所述至少一个第一节点发送第一消息。
在一种可能的实现中,所述根据所述第一节点的标识信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息时,所述处理单元902用于:
通过所述收发单元901向第五节点发送第二查询请求,所述第二查询请求包括所述第一节点的标识信息;
通过所述收发单元901接收来自所述第五节点的第二响应消息,所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息。
在一种可能的实现中,所述第一节点所在的网元为接入与移动管理功能AMF。
在一种可能的实现中,所述第一节点的类型为终端设备;所述第一响应消息包括所述第一节点的标识信息;或者,所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
所述第四节点为策略控制功能PCF,或者,所述第五节点为统一数据管理UDM。
在一种可能的实现中,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述第二响应消息包括所述第一节点所在的网元的标识信息, 或者,所述第一节点的地址信息;
所述第一节点的类型为接入网设备,所述第四节点或所述第五节点为操作、管理和维护OAM;或者,
所述第一节点的类型为核心网网元,所述第四节点或所述第五节点为网络存储功能NRF;或者,
所述第一节点的类型为应用功能节点,所述第四节点或所述第五节点为网络开放功能NEF。
在一种可能的实现中,所述处理单元902还用于:
通过所述收发单元901根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果。
在一种可能的实现中,所述根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果时,所述处理单元902还用于:
通过所述收发单元901根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果和区块链建立日志;
其中,所述区块链建立日志包括对需求的完成情况。
在一种可能的实现中,所述第一指示消息包括配置成功信息或配置失败信息;所述区块链建立结果包括区块链建立成功或区块链建立失败;
所述根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果时,所述处理单元902用于:
通过所述收发单元901根据所述至少一个第一节点的第一指示消息中包括的配置成功信息的数量向所述第二节点发送区块链建立结果。
在一种可能的实现中,若所述配置成功信息的数量大于或者等于第一数量阈值,则所述区块链建立结果为区块链建立成功;
若所述配置成功信息的数量小于所述第一数量阈值,则所述区块链建立结果为区块链建立失败。
在一种可能的实现中,所述处理单元902还用于:
若所述配置成功信息的数量小于所述第一数量阈值,则重新选择满足区块链建立需求的节点,并将该节点配置为区块链节点。
在一种可能的实现中,所述收发单元901还用于:
接收多个节点的区块链能力信息,所述多个节点包括所述至少一个第一节点。
在一种可能的实现中,所述装置还包括存储单元903;
所述接收多个节点的区块链能力信息之后,所述存储单元903或所述收发单元901用于:
所述存储单元903,用于存储所述多个节点的区块链能力信息;或者,
所述收发单元901,用于向第六节点发送所述多个节点的区块链能力信息。
在一种可能的实现中,所述区块链能力信息包括节点支持的模式,所述模式包括以下一项或者多项:
客户端模式,微节点模式,轻节点模式,全节点模式;其中:
所述客户端模式下的节点用于生成交易或交易提案;
所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;根据所述交易生成微区块;
所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;
所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
在一种可能的实现中,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;
所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述区块链能力信息包括以下至少一项能力:
部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述收发单元901还用于:
向第三节点发送第二消息,其中所述第三节点为所述至少一个第一节点中配置成功的节点,所述第二消息用于撤销所述第三节点为区块链节点;
接收来自所述第三节点的第二指示消息,所述第二指示消息用于指示所述第三节点是否撤销成功。
在另一种实现中,该通信装置为第一节点,也可以是第一节点中的装置,或者是能和第一节点匹配使用的装置。示例性地,第一节点具体可以为终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点等,在此不做限制。其中,该通信装置还可以为芯片系统。其中:
收发单元901,用于接收第一消息,所述第一消息用于配置所述第一节点为区块链节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;
所述收发单元901,用于发送第一指示消息,所述第一指示消息用于指示所述第一节点是否配置成功。
在一种可能的实现中,所述收发单元901还用于:
发送区块链能力信息。
在一种可能的实现中,所述区块链能力信息包括节点支持的模式,所述模式包括以下一项或者多项:
客户端模式,微节点模式,轻节点模式,全节点模式;其中:
所述客户端模式下的节点用于生成交易或交易提案;
所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易; 根据所述交易生成微区块;
所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;
所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
在一种可能的实现中,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;
所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述区块链能力信息包括以下至少一项能力:
部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在一种可能的实现中,所述第一指示消息指示所述第一节点配置成功;
所述收发单元901还用于:
接收第二消息,所述第二消息用于撤销所述第一节点为区块链节点;
发送第二指示消息,所述第二指示消息用于指示所述第一节点是否撤销成功。
在另一种实现中,该通信装置为第二节点,也可以是第二节点中的装置,或者是能和第二节点匹配使用的装置。其中,该通信装置还可以为芯片系统。其中:
处理单元902,用于确定区块链建立需求信息;
收发单元901,用于发送所述区块链建立需求信息。
在一种可能的实现中,所述区块链建立需求信息包括以下一项或者多项需求:
区块链结构,区块结构,共识机制,对吞吐量的需求,区块链是否支持可编辑功能,区块链的访问控制策略,第一节点的数量,策略信息,所述第一节点的标识信息,所述第一节点的能力,所述第一节点的类型,所述第一节点支持的模式,所述第一节点对应的配置信息,所述第一节点能否为区块链运行提供可信执行环境。
在一种可能的实现中,所述第一节点的类型包括以下至少一种:
终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;
所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点。
在一种可能的实现中,所述收发单元901还用于:
接收区块链建立结果;或者,
接收区块链建立结果和区块链建立日志,其中,所述区块链建立日志包括对需求的完成情况。
在一种可能的实现中,所述区块链建立结果包括区块链建立成功或区块链建立失败。
在一种可能的实现中,所述模式包括以下一项或者多项:
客户端模式,微节点模式,轻节点模式,全节点模式;其中:
所述客户端模式下的节点用于生成交易或交易提案;
所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;根据所述交易生成微区块;
所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;
所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
在一种可能的实现中,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;
所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
在另一种实现中,该通信装置为第四节点,也可以是第四节点中的装置,或者是能和第四节点匹配使用的装置。示例性地,第四节点具体可以为5G中的核心网网元或者6G中新定义的核心网网元等,在此不做限制。其中,该通信装置还可以为芯片系统。其中:
收发单元901,用于接收第一查询请求,所述第一查询请求包括策略信息,或者,所述第一查询请求包括第一节点的标识信息;
所述收发单元901,用于发送第一响应消息,其中,当所述第一查询请求包括策略信息时,所述第一响应消息包括第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息;当所述第一查询请求包括第一节点的标识信息时,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
其中,所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点。
在一种可能的实现中,所述第一节点所在的网元为接入与移动管理功能AMF。
在一种可能的实现中,所述第一节点的类型为终端设备;所述第一查询请求包括策略信息,所述第一响应消息包括所述第一节点的标识信息;所述第四节点为策略控制功能PCF。
在一种可能的实现中,所述第一节点的类型为终端设备;所述第一查询请求包括第一节点的标识信息,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述第四节点为统一数据管理UDM。
在一种可能的实现中,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
所述第一节点的类型为接入网设备,所述第四节点为操作、管理和维护OAM;或者,
所述第一节点的类型为核心网网元,所述第四节点为网络存储功能NRF;或者,
所述第一节点的类型为应用功能节点,所述第四节点为网络开放功能NEF。
在一种可能的实现中,所述装置还包括存储单元903,其中:
所述收发单元901,用于接收多个节点的区块链能力信息,所述多个节点包括至少一个第一节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;
所述存储单元903用于存储所述多个节点的区块链能力信息,以用于账本锚定功能确定所述至少一个第一节点。
该通信装置的其他可能的实现方式,可参见上述图4~图6对应的方法实施例中对相关设备功能的相关描述,在此不赘述。
请参见图10,图10是本申请实施例提供的另一种通信装置的结构示意图。该通信装置包括处理器1010和接口电路1020。处理器1010和接口电路1020之间相互耦合。可以理解的是,接口电路1020可以为收发器或输入输出接口。可选的,通信装置还可以包括存储器1030,用于存储处理器1010执行的指令或存储处理器1010运行指令所需要的输入数据或存储处理器1010运行指令后产生的数据。
当通信装置用于实现上述方法实施例中的方法时,处理器1010用于执行上述处理单元902的功能,接口电路1020用于执行上述收发单元901的功能。
当上述通信装置为应用于LAF的芯片时,该芯片实现上述方法实施例中LAF的功能,该芯片从其它网元(或实体或节点)接收信息;或者,该芯片向其它网元(或实体或节点)发送信息。
当上述通信装置为应用于第一节点的芯片时,该芯片实现上述方法实施例中第一节点的功能。该芯片从其它网元(或实体或节点)接收信息;或者,该第一节点芯片向其他网元(或实体)发送信息。
当上述通信装置为应用于第二节点的芯片时,该第二节点芯片实现上述方法实施例中第二节点的功能,该第二节点芯片从其它网元接收信息;或者,该第二节点芯片向其它网元(或实体或节点)发送信息。
当上述通信装置为应用于第四节点的芯片时,该芯片实现上述方法实施例中第四节点的功能,该芯片从其它网元接收信息;或者,该芯片向其它网元(或实体或节点)发送信息。
当上述通信装置为应用于第五节点的芯片时,该芯片实现上述方法实施例中第五节点的功能,该芯片从其它网元接收信息;或者,该芯片向其它网元(或实体或节点)发送信息。
当上述通信装置为应用于第六节点的芯片时,该芯片实现上述方法实施例中第六节点的功能,该芯片从其它网元接收信息;或者,该芯片向其它网元(或实体或节点)发送信息。
可以理解的是,本申请的实施例中的处理器可以是CPU,还可以是其它通用处理器、数字信号处理器(digital signal processor,DSP)、专用集成电路(application specific integrated circuit,ASIC)、现场可编程门阵列(field programmable gate array,FPGA)或者其它可编程逻辑器件、晶体管逻辑器件,硬件部件或者其任意组合。通用处理器可以是微处理器,也可以是任何常规的处理器。
本申请的实施例中的方法步骤可以通过硬件的方式来实现,也可以由处理器执行软件指令的方式来实现。软件指令可以由相应的软件模块组成,软件模块可以被存放于随机存取存储器(random access memory,RAM)、闪存、只读存储器(Read-Only Memory,ROM)、可编程只读存储器(programmable ROM,PROM)、可擦除可编程只读存储器(erasable PROM,EPROM)、电可擦除可编程只读存储器(electrically EPROM,EEPROM)、寄存器、硬盘、移动硬盘、CD-ROM或者本领域熟知的任何其它形式的存储介质中。一种示例性的存储介质耦合至处理器,从而使处理器能够从该存储介质读取信息,且可向该存储介质写入信息。当然,存储介质也可以是处理器的组成部分。处理器和存储介质可以位于ASIC中。另外,该ASIC可以位于LAF或第一节点或第二节点或第四节点或第五节点或第六节点中。当然,处理器和存储介质也可以作为分立组件存在于LAF或第一节点或第二节点或第四节点或第五节点或第六节点中。
在上述实施例中,可以全部或部分地通过软件、硬件、固件或者其任意组合来实现。当使用软件实现时,可以全部或部分地以计算机程序产品的形式实现。所述计算机程序产品包括一个或多个计算机程序或指令。在计算机上加载和执行所述计算机程序或指令时,全部或部分地执行本申请实施例所述的流程或功能。所述计算机可以是通用计算机、专用计算机、计算机网络、或者其它可编程装置。所述计算机程序或指令可以存储在计算机可读存储介质中,或者通过所述计算机可读存储介质进行传输。所述计算机可读存储介质可以是计算机能够存取的任何可用介质或者是集成一个或多个可用介质的服务器等数据存储设备。所述可用介质可以是磁性介质,例如,软盘、硬盘、磁带;也可以是光介质,例如,数字多功能光盘(digital versatile disc,DVD);还可以是半导体介质,例如,固态硬盘(solid statedrive,SSD)。
在本申请的各个实施例中,如果没有特殊说明以及逻辑冲突,不同的实施例之间的术语和/或描述具有一致性、且可以相互引用,不同的实施例中的技术特征根据其内在的逻辑关系可以组合形成新的实施例。
可以理解的是,在本申请的实施例中涉及的各种数字编号仅为描述方便进行的区分,并不用来限制本申请的实施例的范围。上述各过程的序号的大小并不意味着执行顺序的先后,各过程的执行顺序应以其功能和内在逻辑确定。
本申请实施例还提供一种计算机可读存储介质,该计算机可读存储介质中存储有计算机执行指令,当该计算机执行指令被执行时,使得上述方法实施例中LAF或第一节点或第二节点或第四节点或第五节点或第六节点执行的方法被实现。
本申请实施例还提供一种计算机程序产品,该计算机程序产品包括计算机程序,当该计算机程序被执行时,使得上述方法实施例中LAF或第一节点或第二节点或第四节点或第五节点或第六节点执行的方法被实现。
本申请实施例还提供一种通信系统,该通信系统包括LAF或第一节点或第二节点或第四节点或第五节点或第六节点等中的一个或者多个节点。其中,LAF用于执行上述方法实施例中LAF执行的方法。第一节点用于执行上述方法实施例中第一节点执行的方法。第二节点用于执行上述方法实施例中第二节点执行的方法。第四节点用于执行上述方法实施例中第四节点执行的方法。第五节点用于执行上述方法实施例中第五节点执行的方法。第六节点用于执行上述方法实施例中第六节点执行的方法。
需要说明的是,对于前述的各方法实施例,为了简单描述,故将其都表述为一系列的动作组合,但是本领域技术人员应该知悉,本申请并不受所描述的动作顺序的限制,因为依据本申请,某些步骤可以采用其他顺序或者同时进行。其次,本领域技术人员也应该知悉,说 明书中所描述的实施例均属于优选实施例,所涉及的动作和模块并不一定是本申请所必须的。
本申请提供的各实施例的描述可以相互参照,对各个实施例的描述都各有侧重,某个实施例中没有详述的部分,可以参见其他实施例的相关描述。为描述的方便和简洁,例如关于本申请实施例提供的各装置、设备的功能以及执行的步骤可以参照本申请方法实施例的相关描述,各方法实施例之间、各装置实施例之间也可以互相参考、结合或引用。
最后应说明的是:以上各实施例仅用以说明本申请的技术方案,而非对其限制;尽管参照前述各实施例对本申请进行了详细的说明,本领域的普通技术人员应当理解:其依然可以对前述各实施例所记载的技术方案进行修改,或者对其中部分或者全部技术特征进行等同替换;而这些修改或者替换,并不使相应技术方案的本质脱离本申请各实施例技术方案的范围。

Claims (48)

  1. 一种区块链的创建方法,其特征在于,所述方法应用于账本锚定功能LAF,包括:
    向至少一个第一节点发送第一消息,所述第一消息用于配置所述第一节点为区块链节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;
    接收来自所述至少一个第一节点的第一指示消息,所述第一指示消息用于指示所述第一节点是否配置成功。
  2. 根据权利要求1所述的方法,其特征在于,所述方法还包括:
    接收来自第二节点的区块链建立需求信息;
    所述向至少一个第一节点发送第一消息,包括:
    根据所述区块链建立需求信息向至少一个第一节点发送第一消息。
  3. 根据权利要求2所述的方法,其特征在于,所述区块链建立需求信息包括以下一项或者多项需求:
    区块链结构,区块结构,共识机制,对吞吐量的需求,区块链是否支持可编辑功能,区块链的访问控制策略,所述第一节点的数量,策略信息,所述第一节点的标识信息,所述第一节点的能力,所述第一节点的类型,所述第一节点支持的模式,所述第一节点对应的配置信息,所述第一节点能否为区块链运行提供可信执行环境。
  4. 根据权利要求3所述的方法,其特征在于,所述区块链建立需求信息包括所述策略信息;
    所述根据所述区块链建立需求信息向至少一个第一节点发送第一消息,包括:
    根据所述策略信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息;
    基于所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息向所述至少一个第一节点发送第一消息。
  5. 根据权利要求4所述的方法,其特征在于,所述根据所述策略信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息,包括:
    向第四节点发送第一查询请求,所述第一查询请求包括所述策略信息;
    接收来自所述第四节点的第一响应消息,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息。
  6. 根据权利要求3所述的方法,其特征在于,所述区块链建立需求信息包括所述第一节点的标识信息;
    所述根据所述区块链建立需求信息向至少一个第一节点发送第一消息,包括:
    基于所述第一节点的标识信息向所述至少一个第一节点发送第一消息。
  7. 根据权利要求4或6所述的方法,其特征在于,所述基于所述第一节点的标识信息向所述至少一个第一节点发送第一消息,包括:
    根据所述第一节点的标识信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
    基于所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息向所述至少一个第一节点发送第一消息。
  8. 根据权利要求7所述的方法,其特征在于,所述根据所述第一节点的标识信息获取所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,包括:
    向第五节点发送第二查询请求,所述第二查询请求包括所述第一节点的标识信息;
    接收来自所述第五节点的第二响应消息,所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息。
  9. 根据权利要求4或5或7或8所述的方法,其特征在于,所述第一节点所在的网元为接入与移动管理功能AMF。
  10. 根据权利要求5或8所述的方法,其特征在于,所述第一节点的类型为终端设备;所述第一响应消息包括所述第一节点的标识信息;或者,所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
    所述第四节点为策略控制功能PCF,或者,所述第五节点为统一数据管理UDM。
  11. 根据权利要求5或8所述的方法,其特征在于,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述第二响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
    所述第一节点的类型为接入网设备,所述第四节点或所述第五节点为操作、管理和维护OAM;或者,
    所述第一节点的类型为核心网网元,所述第四节点或所述第五节点为网络存储功能NRF;或者,
    所述第一节点的类型为应用功能节点,所述第四节点或所述第五节点为网络开放功能NEF。
  12. 根据权利要求2-11任一项所述的方法,其特征在于,所述方法还包括:
    根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果。
  13. 根据权利要求12所述的方法,其特征在于,所述根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果,包括:
    根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果和区块链建立日志;
    其中,所述区块链建立日志包括对需求的完成情况。
  14. 根据权利要求12或13所述的方法,其特征在于,所述第一指示消息包括配置成功信息或配置失败信息;所述区块链建立结果包括区块链建立成功或区块链建立失败;
    所述根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果,包括:
    根据所述至少一个第一节点的第一指示消息中包括的配置成功信息的数量向所述第二节点发送区块链建立结果。
  15. 根据权利要求14所述的方法,其特征在于,
    若所述配置成功信息的数量大于或者等于第一数量阈值,则所述区块链建立结果为区块链建立成功;
    若所述配置成功信息的数量小于所述第一数量阈值,则所述区块链建立结果为区块链建立失败。
  16. 根据权利要求1-15任一项所述的方法,其特征在于,所述方法还包括:
    接收多个节点的区块链能力信息,所述多个节点包括所述至少一个第一节点。
  17. 根据权利要求16所述的方法,其特征在于,所述方法还包括:
    存储所述多个节点的区块链能力信息;或者,
    向第六节点发送所述多个节点的区块链能力信息。
  18. 根据权利要求16或17所述的方法,其特征在于,所述区块链能力信息包括节点支持的模式,所述模式包括以下一项或者多项:
    客户端模式,微节点模式,轻节点模式,全节点模式;其中:
    所述客户端模式下的节点用于生成交易或交易提案;
    所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;根据所述交易生成微区块;
    所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;
    所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
  19. 根据权利要求18所述的方法,其特征在于,
    所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;
    所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
  20. 根据权利要求16或17所述的方法,其特征在于,所述区块链能力信息包括以下至少一项能力:
    部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
  21. 根据权利要求1-20任一项所述的方法,其特征在于,所述方法还包括:
    向第三节点发送第二消息,其中所述第三节点为所述至少一个第一节点中配置成功的节点,所述第二消息用于撤销所述第三节点为区块链节点;
    接收来自所述第三节点的第二指示消息,所述第二指示消息用于指示所述第三节点是否撤销成功。
  22. 一种区块链的创建方法,其特征在于,包括:
    第一节点接收第一消息,所述第一消息用于配置所述第一节点为区块链节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;
    所述第一节点发送第一指示消息,所述第一指示消息用于指示所述第一节点是否配置成功。
  23. 根据权利要求22所述的方法,其特征在于,所述方法还包括:
    所述第一节点发送区块链能力信息。
  24. 根据权利要求23所述的方法,其特征在于,所述区块链能力信息包括节点支持的模式,所述模式包括以下一项或者多项:
    客户端模式,微节点模式,轻节点模式,全节点模式;其中:
    所述客户端模式下的节点用于生成交易或交易提案;
    所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;根据所述交易生成微区块;
    所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;
    所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
  25. 根据权利要求24所述的方法,其特征在于,
    所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能 力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;
    所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
  26. 根据权利要求23所述的方法,其特征在于,所述区块链能力信息包括以下至少一项能力:
    部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
  27. 根据权利要求21-26任一项所述的方法,其特征在于,所述第一指示消息指示所述第一节点配置成功;
    所述方法还包括:
    接收第二消息,所述第二消息用于撤销所述第一节点为区块链节点;
    发送第二指示消息,所述第二指示消息用于指示所述第一节点是否撤销成功。
  28. 一种通信装置,其特征在于,包括用于执行权利要求1-21中任一项所述方法的单元或模块,或者,包括用于执行权利要求22-27中任一项所述方法的单元或模块。
  29. 一种通信装置,其特征在于,包括:
    一个或多个处理器,一个或多个收发器和一个或多个存储器;
    其中,所述一个或多个存储器用于存储计算机程序,所述一个或多个处理器和所述一个或多个收发器用于执行存储于所述一个或多个存储器中的计算机程序,以使得所述通信装置执行如权利要求1-21,或者,权利要求22-27中任一项所述的方法。
  30. 一种计算机可读存储介质,其特征在于,所述存储介质中存储有计算机程序或指令,当所述计算机程序或指令被计算机执行时,实现如权利要求1-21,或者,权利要求22-27中任一项所述的方法。
  31. 一种计算机程序产品,其特征在于,包括计算机程序代码,当所述计算机程序代码在计算机上运行时,以实现权利要求1-21,或者,权利要求22-27中任一项所述的方法。
  32. 一种通信系统,其特征在于,所述通信系统包括账本锚定功能LAF和至少一个第一节点;其中:
    所述LAF用于向所述至少一个第一节点发送第一消息,所述第一消息用于配置所述第一节点为区块链节点;所述第一节点的类型包括以下至少一种:终端设备,接入网设备,核心网网元,独立节点,应用功能节点,边缘网络节点;所述终端设备,所述接入网设备,所述核心网网元,所述独立节点,所述应用功能节点和所述边缘网络节点为通信网络中具有区块链能力的节点;
    所述至少一个第一节点用于向所述LAF发送第一指示消息,所述第一指示消息用于指示 发送所述第一指示信息的第一节点是否配置成功。
  33. 根据权利要求32所述的通信系统,其特征在于,所述通信系统还包括第二节点;其中:
    所述第二节点用于向所述LAF发送区块链建立需求信息;
    所述LAF用于向至少一个第一节点发送第一消息,包括:
    所述LAF用于根据所述区块链建立需求信息向至少一个第一节点发送第一消息。
  34. 根据权利要求33所述的通信系统,其特征在于,所述区块链建立需求信息包括以下一项或者多项需求:
    区块链结构,区块结构,共识机制,对吞吐量的需求,区块链是否支持可编辑功能,区块链的访问控制策略,所述第一节点的数量,策略信息,所述第一节点的标识信息,所述第一节点的能力,所述第一节点的类型,所述第一节点支持的模式,所述第一节点对应的配置信息,所述第一节点能否为区块链运行提供可信执行环境。
  35. 根据权利要求34所述的通信系统,其特征在于,所述区块链建立需求信息包括所述策略信息或者第一节点的标识信息;所述通信系统还包括第四节点;其中:
    所述LAF用于根据所述区块链建立需求信息向至少一个第一节点发送第一消息,包括:
    所述LAF用于向所述第四节点发送第一查询请求,所述第一查询请求包括所述策略信息,或者,所述第一查询请求包括第一节点的标识信息;
    所述第四节点用于向所述LAF发送第一响应消息,其中,当所述第一查询请求包括策略信息时,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息;当所述第一查询请求包括第一节点的标识信息时,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
    所述LAF用于基于所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息,或者,所述第一节点的标识信息向所述至少一个第一节点发送第一消息。
  36. 根据权利要求35所述的通信系统,其特征在于,所述第一节点所在的网元为接入与移动管理功能AMF。
  37. 根据权利要求35或36所述的通信系统,其特征在于,所述第一节点的类型为终端设备;所述第一查询请求包括策略信息,所述第一响应消息包括所述第一节点的标识信息;所述第四节点为策略控制功能PCF。
  38. 根据权利要求35或36所述的通信系统,其特征在于,所述第一节点的类型为终端设备;所述第一查询请求包括第一节点的标识信息,所述第一响应消息包括所述第一节点所在的网元的标识信息,或者,所述第一节点的地址信息;所述第四节点为统一数据管理UDM。
  39. 根据权利要求35所述的通信系统,其特征在于,所述第一响应消息包括所述第 一节点所在的网元的标识信息,或者,所述第一节点的地址信息;
    所述第一节点的类型为接入网设备,所述第四节点为操作、管理和维护OAM;或者,
    所述第一节点的类型为核心网网元,所述第四节点为网络存储功能NRF;或者,
    所述第一节点的类型为应用功能节点,所述第四节点为网络开放功能NEF。
  40. 根据权利要求33-39任一项所述的通信系统,其特征在于,
    所述LAF用于根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果;或者,
    所述LAF用于根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果和区块链建立日志;其中,所述区块链建立日志包括对需求的完成情况。
  41. 根据权利要求40所述的通信系统,其特征在于,所述第一指示消息包括配置成功信息或配置失败信息;所述区块链建立结果包括区块链建立成功或区块链建立失败;
    所述LAF用于根据所述至少一个第一节点的第一指示消息向所述第二节点发送区块链建立结果,包括:
    所述LAF用于根据所述至少一个第一节点的第一指示消息中包括的配置成功信息的数量向所述第二节点发送区块链建立结果。
  42. 根据权利要求41所述的通信系统,其特征在于,若所述配置成功信息的数量大于或者等于第一数量阈值,则所述区块链建立结果为区块链建立成功;
    若所述配置成功信息的数量小于所述第一数量阈值,则所述区块链建立结果为区块链建立失败。
  43. 根据权利要求32-42任一项所述的通信系统,其特征在于,所述至少一个第一节点还用于:
    向所述LAF发送区块链能力信息。
  44. 根据权利要求43所述的通信系统,其特征在于,
    所述LAF还用于存储所述区块链能力信息;或者,
    所述LAF还用于向第四节点发送所述区块链能力信息;
    所述第四节点存储所述区块链能力信息。
  45. 根据权利要求43或44所述的通信系统,其特征在于,所述区块链能力信息包括节点支持的模式,所述模式包括以下一项或者多项:
    客户端模式,微节点模式,轻节点模式,全节点模式;其中:
    所述客户端模式下的节点用于生成交易或交易提案;
    所述微节点模式下的节点用于预处理所述交易或交易提案,所述预处理所述交易或交易提案包括以下一项或多项:验证所述交易或所述交易提案;执行所述交易提案以生成交易;根据所述交易生成微区块;
    所述轻节点模式下的节点用于处理所述交易或交易提案或所述微区块,所述处理所述交易或交易提案或所述微区块包括以下一项或多项:验证所述交易或所述交易提案;执行所述 交易提案以生成交易;对所述交易或所述微区块进行共识,并基于所述交易或者所述微区块生成完整区块;
    所述全节点模式下的节点包括所述轻节点模式下的节点的功能,以及用于存储所述完整区块。
  46. 根据权利要求45所述的通信系统,其特征在于,所述客户端模式下的节点和所述微节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力;
    所述轻节点模式下的节点和所述全节点模式下的节点包括以下至少一项能力:部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
  47. 根据权利要求43或44所述的通信系统,其特征在于,所述区块链能力信息包括以下至少一项能力:
    部署或调用或执行智能合约的能力,交易上报或查询或执行的能力,区块查询的能力,计算能力,存储能力,网络能力,安全算法能力,提供可信执行环境的能力,共识能力。
  48. 根据权利要求32-47任一项所述的通信系统,其特征在于,
    所述LAF用于向所述第三节点发送第二消息,其中所述第三节点为所述至少一个第一节点中配置成功的节点,所述第二消息用于撤销所述第三节点为区块链节点;
    所述第三节点用于向所述LAF发送第二指示消息,所述第二指示消息用于指示所述第三节点是否撤销成功。
PCT/CN2022/114801 2022-08-25 2022-08-25 区块链的创建方法及相关装置 Ceased WO2024040512A1 (zh)

Priority Applications (4)

Application Number Priority Date Filing Date Title
EP22956059.4A EP4567701A4 (en) 2022-08-25 2022-08-25 METHOD FOR CREATING A BLOCKCHAIN, AND ASSOCIATED APPARATUS
CN202280099481.9A CN119923656A (zh) 2022-08-25 2022-08-25 区块链的创建方法及相关装置
PCT/CN2022/114801 WO2024040512A1 (zh) 2022-08-25 2022-08-25 区块链的创建方法及相关装置
US19/060,254 US20250193079A1 (en) 2022-08-25 2025-02-21 Blockchain creation method and related apparatus

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2022/114801 WO2024040512A1 (zh) 2022-08-25 2022-08-25 区块链的创建方法及相关装置

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US19/060,254 Continuation US20250193079A1 (en) 2022-08-25 2025-02-21 Blockchain creation method and related apparatus

Publications (1)

Publication Number Publication Date
WO2024040512A1 true WO2024040512A1 (zh) 2024-02-29

Family

ID=90012027

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/114801 Ceased WO2024040512A1 (zh) 2022-08-25 2022-08-25 区块链的创建方法及相关装置

Country Status (4)

Country Link
US (1) US20250193079A1 (zh)
EP (1) EP4567701A4 (zh)
CN (1) CN119923656A (zh)
WO (1) WO2024040512A1 (zh)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120322992A (zh) * 2022-12-07 2025-07-15 华为技术有限公司 区块链建立方法及通信装置

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351191A (zh) * 2018-04-20 2019-10-18 腾讯科技(深圳)有限公司 网络配置方法、系统、设备及存储介质
CN111405607A (zh) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 一种网络切换方法、设备及区块链系统
US20210034779A1 (en) * 2019-07-31 2021-02-04 Nokia Technologies Oy User-controlled access to data in a communication network
WO2022028791A1 (en) * 2020-08-05 2022-02-10 Nchain Licensing Ag Connecting to the blockchain network

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109246179B (zh) * 2018-06-30 2021-06-01 华为技术有限公司 维护区块链的方法和装置、服务器和计算机可读存储介质
US12143395B2 (en) * 2020-05-05 2024-11-12 International Business Machines Corporation Low trust privileged access management

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110351191A (zh) * 2018-04-20 2019-10-18 腾讯科技(深圳)有限公司 网络配置方法、系统、设备及存储介质
CN111405607A (zh) * 2019-01-02 2020-07-10 中国移动通信有限公司研究院 一种网络切换方法、设备及区块链系统
US20210034779A1 (en) * 2019-07-31 2021-02-04 Nokia Technologies Oy User-controlled access to data in a communication network
WO2022028791A1 (en) * 2020-08-05 2022-02-10 Nchain Licensing Ag Connecting to the blockchain network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
See also references of EP4567701A4 *

Also Published As

Publication number Publication date
EP4567701A1 (en) 2025-06-11
CN119923656A (zh) 2025-05-02
US20250193079A1 (en) 2025-06-12
EP4567701A4 (en) 2025-08-27

Similar Documents

Publication Publication Date Title
EP4016961B1 (en) Information obtaining method and device
WO2020224463A1 (zh) 一种数据分析方法及装置
WO2020147760A1 (zh) 一种局域网通信方法、装置及系统
WO2020220865A1 (zh) 网络功能服务的身份校验方法及相关装置
JP2021502780A (ja) エッジネットワークケイパビリティ開放を実現する方法、装置、機器および記憶媒体
WO2020103828A1 (zh) 群组通信方法、设备及系统
MX2012010363A (es) Metodo y aparato para soportar comunicaciones de maquina a maquina.
WO2021135663A1 (zh) 应用实例确定的方法、装置及系统
WO2021135187A1 (zh) 一种切片控制方法及装置
WO2022222745A1 (zh) 一种通信方法及装置
WO2020253343A1 (zh) 一种管理服务的发现方法及装置
CN111865633B (zh) 一种通信方法、装置及系统
WO2021159415A1 (zh) 通信方法、装置及系统
US20250193079A1 (en) Blockchain creation method and related apparatus
WO2021147687A1 (zh) 一种通信的方法及装置和系统
WO2024037215A1 (zh) 通信方法及装置
WO2021134347A1 (zh) 资源分配方法、装置及系统
EP4478763A1 (en) Communication method and apparatus
WO2021218244A1 (zh) 通信方法、装置及系统
CN116866965A (zh) 一种备份方法、通信装置及通信系统
US20240430089A1 (en) Communication method, terminal device, and communication apparatus
US20240396979A1 (en) Communication method, communication apparatus, and communication system
WO2026001734A1 (zh) 通信方法及装置
WO2025256424A1 (zh) 通信方法和装置
WO2025035329A1 (zh) 通信系统、业务调用方法及装置

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22956059

Country of ref document: EP

Kind code of ref document: A1

WWE Wipo information: entry into national phase

Ref document number: 202280099481.9

Country of ref document: CN

REG Reference to national code

Ref country code: BR

Ref legal event code: B01A

Ref document number: 112025003541

Country of ref document: BR

WWE Wipo information: entry into national phase

Ref document number: 2022956059

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 2022956059

Country of ref document: EP

Effective date: 20250306

NENP Non-entry into the national phase

Ref country code: DE

WWP Wipo information: published in national office

Ref document number: 202280099481.9

Country of ref document: CN

WWP Wipo information: published in national office

Ref document number: 2022956059

Country of ref document: EP

ENP Entry into the national phase

Ref document number: 112025003541

Country of ref document: BR

Kind code of ref document: A2

Effective date: 20250224