CN107909369A - Based on the common recognition method, apparatus merchandised across chain and storage medium - Google Patents
Based on the common recognition method, apparatus merchandised across chain and storage medium Download PDFInfo
- Publication number
- CN107909369A CN107909369A CN201710952719.9A CN201710952719A CN107909369A CN 107909369 A CN107909369 A CN 107909369A CN 201710952719 A CN201710952719 A CN 201710952719A CN 107909369 A CN107909369 A CN 107909369A
- Authority
- CN
- China
- Prior art keywords
- chain
- parallel
- transaction
- node
- interconnection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 85
- 238000003860 storage Methods 0.000 title abstract description 28
- 238000012795 verification Methods 0.000 claims abstract description 132
- 238000013524 data verification Methods 0.000 claims description 153
- 230000006870 function Effects 0.000 claims description 26
- 238000012790 confirmation Methods 0.000 claims description 20
- 238000004088 simulation Methods 0.000 claims description 3
- 230000005055 memory storage Effects 0.000 claims description 2
- 241000208340 Araliaceae Species 0.000 claims 1
- 235000005035 Panax pseudoginseng ssp. pseudoginseng Nutrition 0.000 claims 1
- 235000003140 Panax quinquefolius Nutrition 0.000 claims 1
- 235000008434 ginseng Nutrition 0.000 claims 1
- 238000012545 processing Methods 0.000 abstract description 13
- 238000004364 calculation method Methods 0.000 abstract description 5
- 238000004422 calculation algorithm Methods 0.000 description 34
- 238000010586 diagram Methods 0.000 description 31
- 238000007726 management method Methods 0.000 description 24
- 238000004590 computer program Methods 0.000 description 10
- 230000007246 mechanism Effects 0.000 description 10
- 238000012552 review Methods 0.000 description 9
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 description 8
- 230000000977 initiatory effect Effects 0.000 description 7
- 230000008569 process Effects 0.000 description 7
- 230000006854 communication Effects 0.000 description 6
- 238000004891 communication Methods 0.000 description 5
- 230000000694 effects Effects 0.000 description 5
- 230000001360 synchronised effect Effects 0.000 description 5
- 238000007620 mathematical function Methods 0.000 description 4
- 230000004044 response Effects 0.000 description 4
- 238000012360 testing method Methods 0.000 description 4
- 238000012546 transfer Methods 0.000 description 4
- 238000005516 engineering process Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 241000538662 Tangaroa Species 0.000 description 2
- 230000006399 behavior Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000011161 development Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012544 monitoring process Methods 0.000 description 2
- 239000004065 semiconductor Substances 0.000 description 2
- 239000007787 solid Substances 0.000 description 2
- LPLLVINFLBSFRP-UHFFFAOYSA-N 2-methylamino-1-phenylpropan-1-one Chemical compound CNC(C)C(=O)C1=CC=CC=C1 LPLLVINFLBSFRP-UHFFFAOYSA-N 0.000 description 1
- 241000132539 Cosmos Species 0.000 description 1
- 235000005956 Cosmos caudatus Nutrition 0.000 description 1
- 230000002159 abnormal effect Effects 0.000 description 1
- 238000009825 accumulation Methods 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 239000003795 chemical substances by application Substances 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 239000000284 extract Substances 0.000 description 1
- 238000007710 freezing Methods 0.000 description 1
- 230000008014 freezing Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000014759 maintenance of location Effects 0.000 description 1
- 238000013507 mapping Methods 0.000 description 1
- 238000003032 molecular docking Methods 0.000 description 1
- 230000035772 mutation Effects 0.000 description 1
- 238000011017 operating method Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000004321 preservation Methods 0.000 description 1
- 241000894007 species Species 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000004083 survival effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
- G06Q20/4014—Identity check for transactions
Abstract
The invention discloses a kind of based on the common recognition method, apparatus merchandised across chain and storage medium.Across chain transaction is the transaction between multiple parallel chains, and multiple parallel chains are respectively with interconnecting chain link.This method comprises the following steps:According to parameter preset in multiple parallel chains the random parallel chain for determining to verify;Across the chain transaction initiated definite parallel chain confirms, and is broadcast to interconnection chain and carries out common recognition verification.Thus, cheating risk can be not only greatly reduced in foregoing invention embodiment, improve the security across chain transaction, but also calculation amount can be greatly reduced, and improve the processing speed across chain transaction, block chain link point can also be supported to be dynamically added and exit interconnection chain.
Description
Technical field
The present invention relates to block chain technical field, more particularly to a kind of based on the common recognition method, apparatus merchandised across chain and deposit
Storage media.
Background technology
With the fast development of block chain technology, currently there are a variety of mutually independent block chains.Across not same district
The transactions demand of block chain has become the more urgent demand in current block chain application.The moneytary operations of transregional piece of chain can be with
It is the money transfer transactions that ideal money is performed from a block chain to another block chain, so as to fulfill the monetary value flow of each block interchain
It is logical.Because various informative and complicated for the block chain merchandised across chain, for example, some block chains are isomorphism block chains, also
Some block chains are isomery block chains, so carrying out across chain transaction needs a kind of reliable common recognition mechanism as the base run across chain
Plinth.
Existing block chain common recognition mechanism is mainly:Respectively multiple data verification node fixed allocations each need to verify
Parallel chain, then utilize the data verification node for its distribution parallel chain verification.However, applicant it has been investigated that:Mesh
Preceding block chain common recognition mechanism allows data verification node to be that artificial public relations and hacking technique crack for fixed parallel chain verification
Provide convenience, cause verification cheating risk, thereby reduce the security of block chain transaction.For example, for data verification
In the assignment procedure, data verification node may actively select responsible parallel chain for the parallel chain verification of node distribution, and then
Take some cheatings.Cheating for example can be:Verify that node may be with the data transmit-receive node of certain parallel chain
Collusion, deliberately issues invalid transaction into parallel chain.
The security across chain transaction how is improved, becomes technical problem urgently to be resolved hurrily.
The content of the invention
In order to solve block chain across the low risk problem of the security that chain is merchandised, an embodiment of the present invention provides one kind to be based on
Across the common recognition method, apparatus and storage medium of chain transaction.
First aspect, there is provided a kind of based on the common recognition method merchandised across chain.Wherein, across chain transaction be multiple parallel chains it
Between transaction, multiple parallel chains respectively with interconnect chain link.This method comprises the following steps:
According to parameter preset in multiple parallel chains the random parallel chain for determining to verify;
Across the chain transaction initiated definite parallel chain confirms, and is broadcast to interconnection chain and carries out common recognition verification.
Second aspect, there is provided a kind of based on the common recognition device merchandised across chain.Wherein, across chain transaction be multiple parallel chains it
Between transaction, multiple parallel chains respectively with interconnect chain link.The device includes:
Parallel chain determination unit, for the parallel chain for determining to verify at random in multiple parallel chains according to parameter preset;
Network common recognition unit, across the chain transaction for being initiated definite parallel chain confirms, and is broadcast to interconnection
Chain carries out common recognition verification.
The third aspect, there is provided a kind of based on the common recognition device merchandised across chain.The device includes:
Memory, for storing program;
Processor, for performing the program of memory storage, program causes processor to perform the side described in above-mentioned each side
Method.
A kind of fourth aspect, there is provided computer-readable recording medium.Finger is stored with the computer-readable recording medium
Order, when run on a computer so that computer performs the method described in above-mentioned each side.
A kind of 5th aspect, there is provided computer program product for including instruction.When the product is run on computers,
So that computer performs the method described in above-mentioned each side.
A kind of 6th aspect, there is provided computer program.When the computer program is run on computers so that calculate
Machine performs the method described in above-mentioned each side.
On the one hand, foregoing invention embodiment can determine to need to verify at random by according to parameter preset in multiple parallel chains
Parallel chain so that for some specific data verification node in interconnection chain, it is possible to achieve by certain rule, it is such as pseudo- with
The mode of machine, dynamic select parallel chain to be verified, drastically reduce the area cheating risk, improve the security across chain transaction.
On the other hand, specific parallel chain is distributed for specific data verification node, rather than allows it to verify all put down
Row chain, can be greatly reduced calculation amount, improve the processing speed across chain transaction.
Another aspect, across the chain transaction to being successfully connected into interconnection chain and being initiated by the parallel chain of success dynamically distributes,
Common recognition verification is carried out, block chain link point can be supported to be dynamically added and exit interconnection chain, enhances the flexibility across chain transaction.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, it will make below to required in the embodiment of the present invention
Attached drawing is briefly described, it should be apparent that, drawings described below is only some embodiments of the present invention, for
For those of ordinary skill in the art, without creative efforts, other can also be obtained according to these attached drawings
Attached drawing.
Fig. 1 is across the catenary system configuration diagram of block chain of one embodiment of the invention;
Fig. 2 (a) is the parallel data verification method flow diagram for being linked into interconnection chain of one embodiment of the invention;
Fig. 2 (b) is the parallel data verification method flow signal for being linked into interconnection chain of another embodiment of the present invention;
Fig. 3 (a) is the parallel data receiving-transmitting method flow diagram for being linked into interconnection chain of one embodiment of the invention;
Fig. 3 (b) is the parallel data receiving-transmitting method flow diagram for being linked into interconnection chain of another embodiment of the present invention;
Fig. 4 is the parallel method flow schematic diagram for being linked into interconnection chain of further embodiment of this invention;
Fig. 5 is a sub- flow diagram of Fig. 4;
Fig. 6 is another sub-process schematic diagram of Fig. 4;
Fig. 7 is another sub-process schematic diagram of Fig. 4;
Fig. 8 is the structure diagram of the block of the interconnection chain of one embodiment of the invention;
Fig. 9 is the method flow schematic diagram that the parallel chain of further embodiment of this invention is merchandised across chain;
Figure 10 is the flow diagram based on the common recognition method merchandised across chain of one embodiment of the invention;
Figure 11 is the flow diagram based on the common recognition method merchandised across chain of another embodiment of the present invention;
Figure 12 is the schematic diagram for the Merkle trees across chain transaction verification of one embodiment of the invention;
Figure 13 is the structure diagram based on the common recognition device merchandised across chain of one embodiment of the invention;
Figure 14 is the circuit theory schematic diagram of the common recognition device for being used to merchandise across chain of one embodiment of the invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention
In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is
Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art
All other embodiments obtained without creative efforts, belong to the scope of protection of the invention.
It should be noted that in the case where there is no conflict, the feature in embodiment and embodiment in the application can phase
Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is the schematic diagram of the block chain interacted system of one embodiment of the invention.
As shown in Figure 1, the system can include:Interconnect chain 101, parallel chain 102, parallel chain 103, parallel chain 104, parallel
Chain 105 and parallel chain 106.It can be disposed in interconnection chain 101:Data transmit-receive node (being represented with regular pentagon), data supervision section
Point (being represented with ellipse) and data verification node (using triangular representation).It is parallel chain 102, parallel chain 103, parallel chain 104, flat
Row chain 105 and parallel chain 106 can dispose one or more:Data transmit-receive node (being represented with regular pentagon) and parallel chain
Network node (is represented) with circle.Wherein, data transmit-receive node is shared by parallel chain and interconnection chain 101.
Wherein, it is a kind of block chain to interconnect chain 101, can be used for establishing contact in various independent block interchains.It is any
Block chain has access to interconnection chain, and exchanges information by interconnecting chain, and then can complete to transfer accounts across chain, and a block
Chain operates the data access of another block chain, storage, modification etc..For example, interconnection chain 101 can be used for it is existing each other
Between independent block chain (such as:Ether mill block chain Ripple block chains etc.) establish contact so that and data interaction is no longer limited to
In a single block chain so that the flow range of value is no longer limited to a single block chain.By the system, appoint
What block chain can access interconnection chain 101, and be carried out by interconnecting chain 101 with other block chains at the data such as across chain transaction
Reason.For example, a block chain carries out the data processings such as data access, storage, modification to another block chain.It is in another example different
Across chain transfer data processing is carried out between block chain.Specifically, for example, the bit coin user in Ripple block chains need to
When ether mill user too in mill block chain transfers accounts, can directly it be traded using the bit coin in oneself account, without
Ripple coin is converted into ether coin by third party.In addition, the embodiment of the present invention can pass through same main body management service
Two block chains (for example, a block chain is responsible for finance activities, another block chain is responsible for ideal money assets) so that it is empty
The availability for intending currency depends on finance activities.When occurring situations such as freezing of assets, assets can influence finance activities, so that real
Existing assets hinder function, carry out effective restraint and limitation to assets, and ensure assets security.
Parallel chain is properly termed as panel data block chain, or referred to as parallel block chain.When certain block chain (such as bit
Coin block chain or ether mill block chain) access interconnection chain after just become parallel chain.It is parallel chain 102, parallel chain 103, parallel
Chain 104, parallel chain 105 and parallel chain 106 can access interconnection chain 101.The data transmit-receive node that parallel chain and interconnection chain share
Across chain transaction can be forwarded in interconnection chain network.
On the one hand data verification node can be used for receiving the information such as the transaction from data transmit-receive person, and verify transaction
Validity;On the other hand, data verification node can be used for the complete copy for safeguarding interconnection chain, participate in the common recognition of interconnection chain 101
Process.Data verification node is only deployed at the inside of interconnection chain 101, it is not belonging to a part for parallel chain.Data verification node
Verification transaction validity while transaction data can be obtained from parallel chain, and synchronous, the common recognition transaction in interconnection chain network.
Data verification node is connected with the data transmit-receive node in parallel chain, it can receive data transmit-receive node transmission on parallel
The Transaction Information of chain, can also send the transaction data from other parallel chains and give corresponding data transmitting-receiving node.
For data verification node by being interacted with data transmit-receive node, the place that can obtain the collection of data transmit-receive node is parallel
Transaction data on chain.Data verification node can verify the transaction data on its parallel chain obtained.Data verification node it
Between known together and (reached in agreement) and generate interconnection chain block.After knowing together successfully, data verification node can will be across chain
Transaction data is sent to the data transmit-receive node of corresponding purpose chain (such as some parallel chain).Data verification node is at one
Carve and be only connected with a parallel chain, be only responsible for the verification work that a parallel chain is merchandised across chain.But it can be born in different time
The verification work that multiple parallel chains are merchandised across chain is blamed, that is, verifies that node has rotation mechanism.
Data transmit-receive node not only belongs to parallel chain, but also belongs to interconnection chain, i.e., data transmit-receive node is by parallel chain and interconnection chain
Share.The program of two kinds of block chains (such as parallel chain and interconnection chain) can be run on data transmit-receive node.It is with interconnecting chain
In data verification node be connected, the Transaction Information that can send parallel chain gives data verification node, can also receive data verification
The transaction data from other parallel chains that node is sent.
One plain block chain can have multiple data transmit-receive nodes.When on the plain block chain where data transmit-receive node be not present across
When chain is merchandised, data transmit-receive node gives the block hair of plain block chain to verification node;Plain block where data transmit-receive node
When there is across chain transaction on chain, data transmit-receive node is by the block head of plain block chain, across chain Transaction Information and verifies across chain transaction
The checking information of validity is sent to verification node.
Data supervisory node is only deployed at the inside of interconnection chain 101, is connected with data verification node.It is not belonging to parallel chain
A part.Data supervisory node monitoring data verifies the transaction verification behavior of node, is finding to have data verification node not just
Data verification node is punished during true behavior.One supervisory node can supervise a set, and (number is more than or waits
In verification node 1).
Above-mentioned each node can be various electronic equipments or functional unit in various electronic equipments, function
Module even one section of program.These electronic equipments include but not limited to PC, server, ore deposit machine etc..
It should be understood that the number of the block chain and node in Fig. 1 is only schematical.According to needs are realized, spirit is carried out
Configuration living.
Embodiments below can apply the system architecture of the embodiment of the present invention to carry out data interaction or processing.In order to
Description is succinct, and the content of each embodiment can mutual reference.
Fig. 2 (a) is the parallel data verification method flow diagram for being linked into interconnection chain of one embodiment of the invention.
The present embodiment can be applied to the data verification node side of interconnection chain.
As shown in Fig. 2 (a), this method may comprise steps of:S210, the data verification node reception for interconnecting chain are parallel
The data transmit-receive node of chain send by it is parallel be linked into interconnection chain access request;S220, in response to access request, data are tested
Node generation identification information is demonstrate,proved, identification information is stored in the storage for being used for managing parallel chain, and by identification information broadcast mutual
Join in chain;S230, after at least one other verification node in interconnecting chain is stored identification information, data verification section
Point is successfully accessed information to data transmit-receive node feeding back, and at least part of the information in storage is sent to data transmit-receive node,
So that data transmit-receive node carries out synchronizing information.
In S210, data transmit-receive node is a kind of special parallel chain network node, it can be by parallel chain network section
Point change.Parallel chain network node freely can be dynamically joined to and exit interconnection path so that interconnection chain framework can be with
Flexibly expand.Most start, interconnection chain can be added by the application of parallel chain network node, by interconnecting the data verification section in chain
After point verification, parallel chain network node just becomes data transmit-receive node.
In certain embodiments, parallel chain can include:Source parallel chain and purpose parallel chain.
In S220, identification information can include the one or more in following information:Parallel chain title, parallel chain are compiled
Number, parallel chain common recognition algorithm, parallel chain data transmit-receive nodal information (such as address, numbering).Identification information can also be included only
Information of one one parallel chain of mark etc..
In this step, which can be used for individually carrying out initial authentication to access request.For managing
The storage of parallel chain can be stored with the management informations such as parallel chain management table, parallel chain management figure.
Wherein, it is the most key be exactly it is parallel be linked into interconnection chain when, it can be included in its access request initiated
The common recognition algorithm used, it is main to include the effective field of verification block and the verification effective algorithm of block.Once the parallel link
Enter and interconnect chain, then all verification nodes interconnected in chain update its parallel chain management table, and new parallel chain is added in its table
Relevant information, which includes the common recognition algorithm that uses of the parallel chain.
In S230, at least one other verification node in chain is interconnected, it is preferred that all other verification node, docking
Enter request and carry out common recognition verification.After common recognition is verified, identification information is stored in respective storage parallel chain management table or flat
In the storage of row chain management figure.
The storages such as the parallel chain management table corresponding to each data verification node, data transmit-receive node is also stored with parallel
Chain table of comparisons etc. stores.The information that data transmit-receive node can be sent according to data verification node, can be by parallel chain and interconnection
Chain carries out synchronizing information.For example, the parallel chain table of comparisons and parallel chain management table are synchronized.
In this step, other verification nodes can be used for collective to access request progress network common recognition, i.e. review verification.
On the one hand, foregoing invention embodiment, is sent by the data transmit-receive node of data verification node reception parallel chain
By the parallel access request for being linked into interconnection chain, in response to access request, data verification node generation identification information, mark is believed
In storage of the breath deposit for managing parallel chain, the information for being used to manage parallel chain in verification node can be updated the data, for example,
Parallel chain management table is updated.
On the other hand, by data verification node by identification information broadcast in chain is interconnected so that other tested in interconnection chain
Card node can be stored identification information, and update the respective information for being used to manage parallel chain.
Another aspect, data verification node are successfully accessed information to data transmit-receive node feeding back, and by storage at least
Partial information is sent to data transmit-receive node, can cause data transmit-receive node updates parallel chain corresponding with parallel chain management table
The table of comparisons.
It follows that foregoing invention embodiment can realize by the node in parallel chain with interconnection chain in each node into
Row information is synchronous.By interconnecting the synchronizing information (for example, parallel chain manages table synchronizing information) in chain between data verification node
When can realize that parallel chain initiates access request next time, the arbitrary data verification node in interconnection chain has unified, newest
Parallel chain management table so that ensure that interconnection chain in each data verification node can correctly handle connecing for parallel chain
Enter request, solve the problems, such as that the security caused by existing information centralized management is low, improve the safety of access interconnection chain
Property.In addition, foregoing invention embodiment safely can be linked into interconnection chain by parallel so that the node on different block chains can
With freedom, it is dynamically joined to and exits interconnect chain network so that interconnection chain framework can be expanded flexibly.
In certain embodiments, the above method can also comprise the following steps:
S240, what data verification node received that data transmit-receive node sends be used for source parallel chain and purpose parallel chain carry out across
The source parallel chain block head of chain transaction;
S250, data verification node obtain the first common recognition that source parallel chain knows together across chain transaction from storage and calculate
Method;
S260, data verification node carry out source parallel chain block head the first verification using the first common recognition algorithm;
S270, after first is verified, data verification node broadcasts source parallel chain block head in chain is interconnected, for
At least one other verification node interconnected in chain carries out across chain transaction the second verification using the second common recognition algorithm of interconnection chain.
Thus, the embodiment of the present invention carries out the first verification and the second verification by using different common recognition algorithms, relatively
In using identical common recognition algorithm come carry out second verification major advantage can be as follows:
1st, limited using existing identical common recognition algorithm (such as existing Cosmos methods and other similar across chain methods)
Parallel chain (zones) processed, although can simplify logical transaction, existing common recognition method might not be with real trade situation
Matching, so network common recognition is ineffective.And although logical transaction of the embodiment of the present invention is slightly more complex, across chain transaction is being carried out
When, interconnection chain (hub) need verify parallel chain send across chain transaction validity, i.e., by the parallel chain block head of preservation come
Whether the transaction of the corresponding parallel chain of across the chain transaction of verification is effective, meanwhile, interconnection chain is in synchronous parallel sequence build, it is also desirable to
Verify the validity of the block head, it can be ensured that the common recognition method of use is matched with real trade situation, can be lifted network and is total to
Know effect.
2nd, using existing same common recognition algorithm, although can ensure to verify the one of the mode of block to a certain extent
Cause property, so as to avoid the inconvenience that the method for testing a variety of verification block finiteness is brought, while improves across chain trading processing speed,
Namely there is simpler processing logic, more efficient treatability performance using the network of the block chain of unified common recognition algorithm,
But unified common recognition algorithm limits the species of the block chain of access so that the expansibility of block chain reduces.It is in addition, existing
Same common recognition method because not requiring common recognition algorithm, in order to ensure the safety of each parallel chain transaction, it is necessary to
Subsidiary specific checking information during across chain transaction is carried out, helps to interconnect the transaction on chain confirmation parallel chain.Comparatively speaking, this hair
Bright embodiment is because without subsidiary specific checking information, it is possible to is simplified this part operation logic, not only saves
The time that later stage merchandises across chain, can improve the efficiency across chain transaction, and make it that the expansibility of interconnection chain is stronger, development
Prospect bigger.
Fig. 2 (b) is the parallel data verification method flow diagram for being linked into interconnection chain of another embodiment of the present invention.
The present embodiment can be applied to the data verification node side of interconnection chain.
As shown in Fig. 2 (b), this method may comprise steps of:
S201, interconnect chain data verification node receive parallel chain data transmit-receive node send by it is parallel be linked into mutually
Join the access request of chain.
S202, in response to access request, the generation of data verification node includes at least the identification information of the first common recognition algorithm, deposits
Identification information is stored up, and by identification information broadcast in chain is interconnected.
S203, after data verification node confirms that at least one other verification node in interconnection chain receives identification information,
To data transmit-receive node feeding back information is successfully accessed including identification information.
In certain embodiments, this method can also comprise the following steps:
S204, data verification node will be successfully accessed information and be sent to data transmit-receive node, for data transmit-receive node profit
Synchronizing information is carried out with the identification information being successfully accessed in information.
Wherein, parallel chain can include:Source parallel chain and/or purpose parallel chain.Source parallel chain can by interconnect chain with
Across the chain transaction of purpose parallel chain.
In certain embodiments, this method can also comprise the following steps:
S205, data verification node carry out sequence parallel across the source that chain is merchandised according to for source parallel chain with purpose parallel chain
Build, source parallel chain block head is carried out the first verification using the first common recognition algorithm.
Wherein, the first common recognition algorithm can be the algorithm that source parallel chain knows together across chain transaction.
S206, after first is verified, data verification node broadcasts source parallel chain block head in chain is interconnected, for
At least one other verification node interconnected in chain carries out across chain transaction the second verification using the second common recognition algorithm.
Wherein, the second common recognition algorithm is to interconnect the algorithm that chain knows together across chain transaction.
In certain embodiments, identification information further includes:Solicited message.
In certain embodiments, solicited message includes the one or more in following information:Parallel chain title, parallel chain
Numbering, parallel chain data transmit-receive nodal information.
Fig. 3 (a) is the parallel data receiving-transmitting method flow diagram for being linked into interconnection chain of one embodiment of the invention.
The present embodiment can be applied to the data transmit-receive node side of parallel chain.2 embodiment masters of its implementation and Fig. 2
Will be difference lies in being write by different angles, the two implementation mutually can be referred to and quoted.
As shown in Fig. 3 (a), this method may comprise steps of:S310, the data transmit-receive node of parallel chain is to interconnection chain
Data verification node send by it is parallel be linked into interconnection chain access request;S320, please according to access in data verification node
Identification information is sought survival into, identification information is stored in the storage for being used for managing parallel chain, and by identification information broadcast in interconnection chain
In, after at least one other verification node in interconnection chain is stored identification information, data transmit-receive node receives data and tests
Card node feeding back is successfully accessed information;S330, data transmit-receive node are received in the storage that data verification node is sent at least
Partial information, row information of going forward side by side are synchronous.
On the one hand, the embodiment of the present invention utilizes the cut-in method, can solve the problems, such as that existing malleability is difficult so that any
Parallel chain can be stablized, advantageously access is interconnected in chain network.
On the other hand, the embodiment of the present invention causes access and the validity of the transaction in later stage to obtain maximum guarantor
Card, user need not trust interconnection chain, it is only necessary to the parallel operation for being linked into interconnection chain be verified using checking information and across chain
The validity of transaction.
Another aspect, the embodiment of the present invention can get up existing block chain link independent of each other, expand value
Sphere of circulation.
Fig. 3 (b) is the parallel data receiving-transmitting method flow diagram for being linked into interconnection chain of another embodiment of the present invention.
The present embodiment can be applied to the data transmit-receive node side of parallel chain.2 embodiment masters of its implementation and Fig. 2
Will be difference lies in being write by different angles, the two implementation mutually can be referred to and quoted.
As shown in Fig. 3 (b), this method may comprise steps of:
S301, the data verification node of data transmit-receive node to the interconnection chain of parallel chain is sent is linked into interconnection chain by parallel
Access request.
S302, the identification information of the first common recognition algorithm, storage mark are included in data verification node according to access request generation
Know information, by identification information broadcast in chain interconnect and confirm interconnection chain at least one other verification node receive mark
After information, data transmit-receive node reception data verification node feeding back is successfully accessed information including identification information.
In certain embodiments, the parallel method for being linked into interconnection chain can also include the following steps:
S303, data transmit-receive node carry out synchronizing information using the identification information being successfully accessed in information.
Fig. 4 is the parallel method flow schematic diagram for being linked into interconnection chain of further embodiment of this invention.
The present embodiment can be applied to the data transmit-receive node of parallel chain and this both sides of data verification node of interconnection chain.Such as
Shown in Fig. 4, this method may comprise steps of:
S410, parallel chain initiate the access request of access interconnection chain.
One or more node operation interconnection chain program on plain block chain, obtains default interconnection chain nodal information, hair
Play access request.
S420, interconnects the data verification node verification access request of chain.
Verification node judges whether to receive access request.
S430, parallel chain processing feedback information, carries out synchronizing information.
The contents of the section will be described in greater detail below.
In certain embodiments, this method can also include:
S440, what data verification node received that data transmit-receive node sends be used for source parallel chain and purpose parallel chain carry out across
The source parallel chain block head of chain transaction.
S450, data verification node obtain the first common recognition that source parallel chain knows together across chain transaction from storage and calculate
Method.
S460, data verification node carry out source parallel chain block head the first verification using the first common recognition algorithm.
S470, after first is verified, data verification node broadcasts source parallel chain block head in chain is interconnected, for
At least one other verification node interconnected in chain carries out across chain transaction the second verification using the second common recognition algorithm of interconnection chain.
In certain embodiments, can utilize interconnect chain block head record in following information it is one or two kinds of with
On:The cryptographic Hash of a upper block head, the sequence number of this block, transaction Merkle tree root cryptographic Hash, timestamp, verify node
Signature.The block body for interconnecting chain can be utilized to record more than one or two kinds of in following information:Across chain data processing of information
(such as across chain Transaction Information), parallel chain block head, validity evidence.It is so designed that, can be by current block and previous block phase
Connection, forms a block chain that can verify that, can increase the difficulty that block is tampered.
Fig. 5 is a sub- flow diagram of Fig. 4.
With reference to figure 4 and Fig. 5, parallel chain initiates that shown in the access request of access interconnection chain (i.e. S410) following step can be included
Suddenly:
S411, parallel chain network node operation interconnection chain program, obtains and nodal information is preset in program.
Parallel chain network node can be one or more nodes on plain block chain.
S412, parallel chain network node ask data verification nodal information active in interconnection chain network to default node;
S413, default node are sent to parallel chain network section by data verification nodal information active in chain network is interconnected
Point;
S414, parallel chain network node initiate access interconnection chain request to the active data verification node obtained.
Fig. 6 is another sub-process schematic diagram of Fig. 4.
With reference to figure 4 and Fig. 6, following step can be included by interconnecting the data verification node verification access request (i.e. S420) of chain
Suddenly:
S421, its parallel chain network management table for being safeguarded of data verification querying node.
S422, data verification node judge whether the parallel chain has accessed interconnection chain network.
When it is to have accessed interconnection chain network to be judged as the parallel chain, turn S423.
When being judged as that the parallel chain does not access interconnection chain network, turn S428.
S423, when it is to have accessed interconnection chain network to be judged as the parallel chain, data verification node is parallel chain network section
Point generation identification information is simultaneously broadcasted, then by identification information deposit plain block chain network management table.
That is, the data verification node for receiving access request is believed to initiate the generation identification of the parallel chain network node of access request
Cease and be broadcasted.
The identification information is also stored in plain block chain network management table by S424, other verification nodes for receiving the identification information
In.
This indicates that the one or more nodes for initiating request become the data transmit-receive node of the plain block chain.
S425, data verification node send to the data transmit-receive node for initiating request and are successfully accessed information.
S426, the verification node for receiving access request send the plain block link network of renewal to the data transmit-receive node for initiating request
Network manages table information.
S427, the complete plain block chain network management table of all data transmit-receive node updates, completes whole interconnection link network at this time
The synchronization of plain block chain network management table information in network, data verification node feeding back plain block chain network management table responsible backward more
New information.
The synchronizing information (for example, parallel chain management table synchronizing information) interconnected in chain between data verification node is in order under
During parallel chain access request, interconnecting the verification node of the arbitrary data in chain has unified, newest parallel chain management table.
So as to ensure that the data verification node in interconnection chain can correctly handle the access request of parallel chain.
S428, above meets S422, when being judged as that the parallel chain does not access interconnection chain network, receives the data of access request
Verification node initiates the ballot that a whole network participates in interconnection chain network and handles the access request.
S429, judges whether ballot passes through.
If voted through, S4210 is entered step.If ballot is not by entering step S4211.
S4210, if voted through, the data verification node for receiving access request is the parallel chain and hair of request access
Play the parallel chain network node generation identification information of request and be broadcasted, the identification information is then stored in plain block chain network pipe
Manage in table, then turn S424.
S4211, if ballot is not by receiving the verification node of access request to the parallel chain network node of initiation request
Send the plain block chain network management table information of renewal;
Fig. 7 is another sub-process schematic diagram of Fig. 4.
With reference to figure 4 and Fig. 7, parallel chain processing feedback information, carries out synchronizing information (i.e. S430) and may comprise steps of:
S431, the parallel chain for initiating access request receive feedback of the interconnection chain to its access request.
S432, judges whether to access according to feedback.
S433, if being fed back to access failure, the parallel chain for initiating access request puts down received access failure information at this
Broadcast in row chain.
S434, if being fed back to be successfully accessed, the plain block chain for initiating access request receives the plain block chain network that interconnection chain is sent
Table information is managed, and received information is broadcasted in the parallel chain.
S435, other plain block chains receive the plain block chain network management table fresh information that interconnection chain is sent, improve the flat of oneself
The block chain table of comparisons.
It should be noted that in the case where there is no conflict, those skilled in the art can according to actual needs will be above-mentioned
The order of operating procedure is adjusted flexibly, or above-mentioned steps are carried out the operation such as flexible combination.For simplicity, repeat no more
Various implementations.
Fig. 8 is the structure diagram of the block of the interconnection chain of one embodiment of the invention.
As shown in figure 8, the structure of the block of interconnection chain can include block first 1 and block body 2.Wherein, block first 1 can be with
Including:The cryptographic Hash 3 of a upper block head, block sequence number 4, in block Transaction Information it is effective summarize 5, timestamp 6 and
Verify node signature 7.Block body 2 can include:Specific Transaction Information 8 and the checking information 9 across chain transaction.
Wherein, the cryptographic Hash 3 of a upper block head can be determined what is obtained after upper block progress Hash operation
Long character string.Being so designed that can make the block be connected with previous block, form a block chain that can verify that, Ke Yizeng
The difficulty that big block is tampered.
The sequence number 4 of block can refer to the symbol for identifying block present position.Other functions can be facilitated by being so designed that
It is directed toward the block.
Effective summary 5 of Transaction Information can be Merkle tree root Hash in block.Merkle tree roots Hash can include
Interconnect cryptographic Hash and the cryptographic Hash of across the chain transaction of plain block chain and the calculating generation of validity evidence that chain transaction calculates generation.
Timestamp 6 can be the character string at unique mark a certain moment, for identifying the time of block generation.
Verification node signature 7 can be the digital signature for the verification node private key generation for generating the block, to identify
The generator of block.
Specific Transaction Information 8 can include specifically across chain Transaction Information and specific interconnection chain insider transaction letter
Breath.
It can include across the checking information 9 of chain transaction:Using Merkle trees verify across chain transaction validity when need its
The block head of his cryptographic Hash (i.e. across chain transaction validity evidence) and plain block chain.Utilize these cryptographic Hash and the area of plain block chain
Build, is able to verify that the validity across chain transaction.
In certain embodiments, interconnection chain can include:Data verification node.
In certain embodiments, data verification node can be used for receiving that the data transmit-receive node of parallel chain sends by institute
State the parallel access request for being linked into interconnection chain;In response to access request, the generation of data verification node includes the first common recognition algorithm
Identification information, identification information is stored, and by identification information broadcast in chain is interconnected;Confirm at least one other in interconnection chain
After verification node receives identification information, information is successfully accessed including the identification information to data transmit-receive node feeding back.
In certain embodiments, data verification node is additionally operable to:Information will be successfully accessed and be sent to data transmit-receive node, with
The identification information being successfully accessed for data transmit-receive node described in information carries out synchronizing information.
In certain embodiments, parallel chain can include:Source parallel chain and/or purpose parallel chain.
In certain embodiments, data verification node can be also used for:According to for source parallel chain and purpose parallel chain into
Row carries out source parallel chain block head the first verification across the source parallel chain block head of chain transaction using the first common recognition algorithm;Treat
After one is verified, data verification node broadcasts source parallel chain block head in chain is interconnected, at least one in interconnection chain
A other verification nodes carry out across chain transaction the second verification using the second common recognition algorithm.
In certain embodiments, the first common recognition algorithm is the algorithm that source parallel chain knows together across chain transaction.
In certain embodiments, the second common recognition algorithm is to interconnect the algorithm that chain knows together across chain transaction.
In certain embodiments, chain is interconnected, it is characterised in that further include:Block head and block body.Wherein, block head can
For recording the one or more in following information:The cryptographic Hash of a upper block head, the sequence number of this block, transaction
Merkle tree root cryptographic Hash, timestamp, the signature for verifying node;Block body can be used for recording one kind in following information or
It is a variety of:Across chain Transaction Information, parallel chain block head, validity evidence.
In certain embodiments, parallel chain can include:Data transmit-receive node.
In certain embodiments, data transmit-receive node can be used for sending parallel chain to the data verification node of interconnection chain
Access the access request of the interconnection chain;Include the mark of the first common recognition algorithm according to access request generation in data verification node
Information, store identification information, by identification information broadcast in chain interconnect and confirm interconnection chain at least one other verification section
After point receives identification information, receive data verification node feeding back is successfully accessed information including identification information.
In certain embodiments, data transmit-receive node can be also used for carrying out using the identification information being successfully accessed in information
Synchronizing information.
Fig. 9 is the method flow schematic diagram that the parallel chain of further embodiment of this invention is merchandised across chain.
As shown in figure 9, this method may comprise steps of:
S910, interconnection chain verification node receive the parallel chain block head that corresponding parallel chain data transmit-receive node is sent.
S920, verification node are inquired about the common recognition algorithm of the parallel chain according to its all parallel chain network management table, are found
The method for verifying block head validity.
S930, verification node verify the validity of block head according to the verification mode, are preserved if effectively, and will
The effective district build is broadcasted to whole interconnection chain network.
In certain embodiments, interconnection chain can include:Data verification node in above-mentioned each embodiment, and it is above-mentioned each
Other verification nodes in a embodiment.
In certain embodiments, can also include:Data supervisory node.Data supervisory node can be used for monitoring data and test
Demonstrate,prove the verification operation of node and/or other verification nodes, when verification operation occur it is abnormal, manage data verification node and/or its
It verifies node.Thus, data supervisory node may insure to verify fair, efficient with network common recognition, improve later stage access
With the security of transaction.
In certain embodiments, interconnection chain can include:Block head and block body.Wherein,
Block head can be used for recording the one or more in following information:The cryptographic Hash of a upper block head, local area
The sequence number of block, transaction Merkle tree root cryptographic Hash, timestamp, the signature for verifying node.It is following that block body can be used for record
One or more in information:Across chain data processing of information (such as across chain Transaction Information), parallel chain block head, validity card
According to.
In certain embodiments, parallel chain can include:The data transmit-receive node of above-mentioned each embodiment.
In certain embodiments, parallel chain can include:Parallel chain network node.Parallel chain network node can be used for transporting
Row interconnection chain program, obtains and nodal information is preset in program, active data verification nodal information is asked to default node, to work
The data verification node request access interconnection chain of jump.
In certain embodiments, block chain interacted system can include:The parallel chain of above-mentioned each embodiment, and it is above-mentioned each
The interconnection chain of a embodiment.
Figure 10 is the flow diagram based on the common recognition method merchandised across chain of one embodiment of the invention.
In the present embodiment, the transaction for other block chains being sent to from a block chain is referred to as across chain transaction.This method can
With the data verification node side applied to interconnection chain.Any block chain can access interconnection chain, by interconnecting chain to other areas
Block chain transmitted transaction.Access interconnection chain block chain be referred to as parallel chain, can be disposed in the network of every parallel chain one or
Across chain transaction can be forwarded to interconnection chain network by multiple data transmit-receive nodes, data transmit-receive node.Interconnecting can be with chain network
Dispose multiple data verification nodes.On the one hand data verification node receives the information such as the transaction from data transmit-receive person, and test
Demonstrate,prove the validity of transaction;On the other hand, data verification node maintenance the complete copy of interconnection chain, participates in the common recognition of interconnection chain
Journey.
As shown in Figure 10, this method may comprise steps of:S101, according to parameter preset in multiple parallel chains it is random
Determine the parallel chain that need to be verified.S102, across the chain transaction initiated definite parallel chain confirms, and is broadcast to interconnection chain
Carry out common recognition verification.
In S101, the implementation of parallel chain is distributed for data verification node to be included:Any one data verification section
Point calculates the cryptographic Hash of parameter preset;Cryptographic Hash is mapped in specified integer set based on preset function, is obtained random parallel
The numbering of chain.Thus, the embodiment of the present invention can be mapped to cryptographic Hash in specified integer set by way of mapping, can be with
The numbering of random parallel chain is simply and easily obtained, it is accurate not only to calculate, but also can reduce computing cost.
In certain embodiments, preset function is:Remainder function.Thus, the embodiment of the present invention can be simple by setting
Remainder function, can further improve computational accuracy, reduce computing cost.
In certain embodiments, specified integer set is:The set of the numbering of two or more than three parallel chains.Thus,
The embodiment of the present invention can by using the encoding setting integer set of parallel chain, can quickly by data verification node with it is parallel
Chain establishes correspondence, to be mutually matched.
In certain embodiments, parameter preset include following parameter in it is one or two kinds of more than:It is cryptographic Hash hi, random
Number nonce, address addr, key (such as public key) key.Because nonce is a number being used only once in coded communication
Word, in the authentication protocol, it is often one and randomly or pseudo-randomly counts, so using the nonce with uniqueness, to avoid weight
Put attack (attack that same transaction is repeatedly asked).
In certain embodiments, calculating the implementation of cryptographic Hash hi can include:Quilt since interconnection chain is created is obtained
The number of distribution;The block of the selection height identical with the numerical value of number;The cryptographic Hash of the block head of the block of selection is calculated, is obtained
To cryptographic Hash hi.
In certain embodiments, calculating the implementation of random number nonce can include:Specify an arbitrary integer
tg;Integer tg is less than or equal to according to the cryptographic Hash obtained by cryptographic Hash hi, random number nonce, address addr and key key
Condition, calculate random number nonce.
In S102, across the chain transaction initiated definite parallel chain confirms, and is broadcast to interconnection chain and is total to
Knowing verification can include:A master data verification node is chosen from multiple data verification nodes of interconnection chain;Utilize master data
Verification node collects multiple data verification nodes to the signature merchandised across chain, and carries out interconnection link network to across chain transaction according to signature
Network is known together;When interconnection chain network common recognition completion, across chain transaction confirmation message is constructed;Across chain transaction confirmation message is broadcasted to interconnection
In chain.
In certain embodiments, carrying out interconnection chain network common recognition to across chain transaction according to signature can include:Obtain data
Verify the number of nodes of node;Obtain the number of signatures of signature;If the ratio of number of signatures and number of nodes reaches threshold value,
Across chain transaction is reached in agreement.
On the one hand, foregoing invention embodiment can determine to need to verify at random by according to parameter preset in multiple parallel chains
Parallel chain so that for some specific data verification node in interconnection chain, it is possible to achieve by certain rule, it is such as pseudo- with
The mode of machine, dynamic select parallel chain to be verified, drastically reduce the area cheating risk, improve the security across chain transaction.
On the other hand, specific parallel chain is distributed for specific data verification node, rather than allows it to verify all put down
Row chain, can be greatly reduced calculation amount, improve the processing speed across chain transaction.
Another aspect, across the chain transaction to being successfully connected into interconnection chain and being initiated by the parallel chain of success dynamically distributes,
Common recognition verification is carried out, block chain link point can be supported to be dynamically added and exit interconnection chain, enhances the flexibility across chain transaction.
Figure 11 is the flow diagram based on the common recognition method merchandised across chain of another embodiment of the present invention.
In the present embodiment, each node in parallel chain (such as parallel chain A) (receive by such as parallel chain network node and data
Hair node) maintain the complete copy of parallel chain A.Similarly, each node in parallel chain network B maintains parallel chain
The complete copy of B, each node in parallel chain network C maintain the complete copy of parallel chain C.
In the present embodiment, parallel chain can include one or more data transmit-receive nodes.On the one hand, data transmit-receive node
It can safeguard the complete copy of parallel chain, and participate in the common recognition process of parallel chain;On the other hand, can collect from parallel chain across
Chain is merchandised, and across chain transaction is sent to interconnection chain network.
In the present embodiment, interconnect in chain network and include multiple data verification nodes.On the one hand, data verification node peace
Data transmit-receive node in row chain establishes connection, receives across the chain transaction from data transmit-receive node, and verify its validity;Separately
On the one hand, data verification node maintenance the complete copy of interconnection chain, and participates in the common recognition process of interconnection chain.Synchronization, one
A data verification node is only responsible for the transaction verification of a parallel block chain, and a parallel chain may be by one or more data
Verification node is responsible for.In this way, in an interconnection chain for having accessed M bar parallel chains, verification node colony can be divided into M mutually
Disjoint set, the data verification node in the set are responsible for identical parallel chain.
As shown in figure 11, this method may comprise steps of:
S111, starts.
S112, for the responsible parallel chain of each data verification node distribution.
S113, data transmit-receive node (the data transmit-receive node in the parallel chain of distribution) send block head and transaction message extremely
Data verification node.
S114, data verification node be responsible for first core be verified as its distribution across the chain Transaction Information initiated of parallel chain whether
Effectively, and to the validity across chain Transaction Information reach common understanding.
S115, does not reach common understanding, authentication failed, data verification node abandons transaction message, and turns if just veritifying card
Step S1110.
S116, reaches common understanding if just veritifying card, is proved to be successful, data verification joint structure transaction confirmation message, and will
Transaction confirmation message is broadcasted to interconnection chain.
S117, each data verification node interconnected in chain (without all data verification nodes, but at least need a number
According to verification node) review verifies whether across chain Transaction Information is effective together, and this is reached altogether across the validity of chain Transaction Information
Know.
S118, if review verification is not reached common understanding, authentication failed, data verification node abandons transaction message, and turns
Step S1110.
S119, if review verification is reached common understanding, is proved to be successful, transaction confirmation message is write and interconnected by data verification node
Chain, and go to step S120.
S120, terminates.
Since in the assignment procedure, data verification node (also referred to as verifying node) may actively select responsible parallel
Chain, and then take some cheatings.For example, data verification node may be total to the data transmit-receive node of certain parallel chain
Scheme, deliberately issues invalid transaction into parallel chain.Such situation in order to prevent, the embodiment of the present invention can ensure that assigning process is
It is random and can verify that, i.e.,:Before a distribution, which bar parallel chain can not specify oneself will be responsible for data verification node.
Can be that every parallel chain is compiled if shared M bar blocks are linked into interconnection chain in chain is interconnected in S112
Number be 0 to M-1.For any p ∈ [0, M-1], the parallel chain that numbering is p is referred to as parallel chain p.At the same time, pre-set
One integer tg.Then, the sub-process of following S1121 to S1125 is performed.
S1121, if this assigning process has been the ith distribution since interconnection chain is created, selects one and i
Relevant numerical value xi。
In the present embodiment, to xiSource can not make specific requirement.For example, block of the height for i can be selected, and
By xiIt is assigned a value of the cryptographic Hash of its block head.The cryptographic Hash hi can be obtained from block head of the height for the block of i+1.Its
In, it is i-th of block since being interconnected in chain first block (creating generation block) that height i, which refers to the block,.In another example can be with
XiIt is assigned a value of the numerical value that i is obtained after certain mathematical operation.For another example if the clock of each data verification node can
Keep accurate consistent, timestamp when current distribution can also be started is assigned to xi。
In the present embodiment, an implementation of parallel chain distribution can have a variety of, and 2 embodiments are set forth below and carry out
Explanation.
One implementation of parallel chain distribution may include steps of:
S1122, for any verification node in interconnection chain, if its IP address is addr, verifies the public affairs of itself signature
Key is key, then the verification node finds an Integer n once, it is met equation below 1 or formula 2:
O=hash (xi| | addr | | key | | nonce) < tg (formula 1)
O=hash (xi| | addr | | key | | nonce)≤tg (formula 2)
In above-mentioned formula 1 and formula 2, hash represents hash function.Hash function can be used in bit coin PoW common recognitions
SHA256 algorithms, can also use other hash algorithms in cryptography.Meanwhile in formula 1 and formula 2 hash function input
Only schematical, its input can be xi, the character string that is formed by connecting with random order of addr, key and nonce.Together
When, can also be in xi, on the basis of addr, key and nonce, include other additional contents.
Above-mentioned result of calculation O is mapped to an integer p (0≤p by S1123, each data verification node by mathematical function
≤M-1)。
In the present embodiment, mathematical function can be the remainder function shown in 3 as the following formula, but can also use full
Other mathematical functions of sufficient the demand.Afterwards, which will be responsible for transaction of the verification from block chain p.
P=O mod M (formula 3)
In the step of above-mentioned S1122 and S1123, the numbering p of parallel chain is derived by Hash calculation.Because hash function
Possess the characteristics of one-way, so, a parallel chain p is given in advance, and verification node is difficult to retrodict out suitable hash function defeated
Enter.Thus, verification node can not preassign oneself responsible parallel chain.In addition, when calculating parallel chain numbering p, this
Embodiment employs being capable of x of the unique mark per sub-distributioni, therefore, it is possible to ensure in every sub-distribution, verification node is all organic
The parallel chain oneself being responsible for can be replaced.
Another implementation of parallel chain distribution may include steps of:
S1122 ', for any verification node in interconnection chain, if it verifies that the public key of itself signature is key, then
The verification node finds an Integer n once, it is met equation below 4 or formula 5:
hash(xi| | key | | nonce) < tg (formula 4)
hash(xi| | key | | nonce)≤tg (formula 5)
Similar with above-mentioned formula 2 and formula 3, in above-mentioned formula 4 and formula 5, hash represents hash function.Meanwhile Hash
The input of function is only schematical, it can be xi, the character string that is spliced with random order of key and nonce.Together
When, can also be in xi, on the basis of key and nonce, include other additional contents.
S1123 ', if the IP address of certain verification node is addr, then, by formula 6, by xiMapped to addr whole
Number p (0≤p≤M-1).Afterwards, which will be responsible for transaction of the verification from block chain p.
f(xi| | addr) → p (0≤p≤M-1) (formula 6)
In formula 6, the input of mathematical function f can be xiThe character string being spliced with addr with random order, output
It is 0 to the integer between M-1.Function f can have a variety of implementations, and formula 7 is the simple form of one of which.
P=[hash (xi| | addr)] mod M (formula 7)
In formula 7, first to xiHash operation is carried out with the character string that addr is spliced into, it is mapped on set of integers,
Then, remainder operation is carried out to the integer being mapped to.But function f is also not limited to hash mode, but can use any
A kind of realization for meeting demand.
In above-mentioned S1122 ' and S1123 ', p is by x for parallel chain numberingiIt is calculated with IP address addr.Parallel every time
When chain distributes, xiIt is known to each verification node, moreover, in order to verify node normal communication, some data verification section with other
Point is also difficult to the mode by adjusting IP address, makes oneself to be assigned to selected parallel chain just.Thus, in this embodiment,
Verification node can not also preassign oneself responsible parallel chain.
After S1122 and S1123 steps, or S1122 ' and S1123 ', unified S1124 to S1125 steps will be performed
Suddenly.
S1124, it is described to verify node broadcasting packet in chain network is interconnected, following letter is included but not limited in the message
Breath:I, Integer n once, IP address addr, verify the public key key of itself signature, the parallel chain numbering which is responsible for
p.In this way, all verification nodes have learned the parallel chain that other verification nodes are responsible for.
S1125, all verification nodes for being responsible for same parallel chain establish network connection between each other.
By above-mentioned S1121 to S1125 steps, a parallel chain is assigned in all verification nodes.It may be noted that
If a parallel chain is responsible for by one group of fixed verification node for a long time, some potential safety problems may be produced.This is specially
The measure that profit is taken is that section t, just performs above-mentioned S1121 to S1125 steps again at every fixed time, so that for per number
Parallel chain is redistributed according to verification node.
In two kinds of implementations in S112, a node is only after the nonce met the requirements is searched out, Cai Nengguang
Broadcast the public key of oneself.It could be obtained since nonce needs to pay certain calculating, so in certain period of time, a section
Point can only be bound with a public key.Therefore, this patent need not assert the identity of each node in advance by the way of PKI.Institute
With node can be dynamically joined to interconnection chain network.
In S113, the data transmit-receive node in parallel chain can send the transaction message of block head and oneself construction
To corresponding data verification node.In common recognition mechanism, data transmit-receive node needs to verify the validity across chain transaction.It is most accurate
Transaction verification mode be that each data verification node stores the complete copy of parallel chain.But this can aggravate verification node
Storage burden.The measure that this patent is taken is to use for reference simple payment verification (Simplified Payment
Verification, SPV) thought, the block head of each bar parallel chain is stored in each data verification node, by block head
In Merkle tree roots complete transaction verification.In order to get the block head, it is necessary to perform below scheme.
S1131, when certain parallel chain generates a new block, and after reaching common understanding in parallel chain network, parallel link network
Data transmit-receive node in network send the block hair of the block to the verification node for being responsible for the parallel chain.
S1132, the verification node for being responsible for the parallel chain broadcast block head to all verification sections in interconnection chain network
Point.
In this way, the block head that each verification node in chain network has all held all parallel chains is interconnected.Because
Each block head is relatively small (for example, the block head size of bit coin is only 80 bytes), so, it is complete flat relative to preserving
For row chain copy, this mode can significantly mitigate the storage burden of verification node.
After above-mentioned S1131 and S1132 steps are completed, the newly-generated area of data transmit-receive node traverses of parallel chain is in the block
Transaction, if it find that including across chain transaction in the new block, is just directed to every across chain transaction, constructs a transaction message.Should
It can include but is not limited to following information in transaction message:Across chain transaction, across chain exchange block identifier, it is described across chain
Checking information of the transaction on Merkle trees.Then the transaction message is sent to verification node corresponding with the parallel chain.
Wherein, across chain exchange can be in the identifier of block:1. the cryptographic Hash of block head;2. block is in parallel chain
Height h.It however, it can be other any identifiers for being capable of one block of unique mark.
Figure 12 is the schematic diagram for the Merkle trees across chain transaction verification of another embodiment of the present invention.
As shown in figure 12, Merkle trees can be set up by tetra- transaction of TxA, TxB, TxC, TxD and be formed, then this four friendships
Easy cryptographic Hash HA、HB、HC、HDConstitute the leaf node of Merkle trees.And HABBy by HA、HBIt is connected, and carries out Hash fortune
Calculate and obtain;HCDBy by HC、HDIt is connected, and carries out Hash operation acquisition.Finally, the root node H of Merkle treesABCDPassing through will
HAB、HCDIt is connected, then carries out Hash operation acquisition.According to block chain technology, the root node HABCDBlock head will be stored in
In.Because respectively verification node saves the block head of parallel chain, each data verification node can retrieve root node
HABCDValue.
If the TxA that merchandises is across a chain transaction, then HB、HCDValue be exactly to verify necessary checking information (Figure 12 of TxA
In be represented by dashed line).Then, merchandise TxA, HB、HCD, and identifier of the block in parallel chain comprising TxA, it is packed
In transaction message, and it is sent to one or more data verification nodes corresponding with the parallel chain.
The transaction message from data transmit-receive node can be received by being responsible for the verification node of same parallel chain, then, be born
The verification node of duty same parallel chain is known together using BFT reaches an agreement the validity merchandised across chain.User just veritify card and
The common recognition mechanism of review verification can be Tangaroa (a kind of changes of BFT that basic PBFT knows together or proposes recently
Kind), the common recognition mechanism such as Honey Badger BFT (another mutation of BFT).Compared with the PoW of the uses such as bit coin, BFT is common
Knowledge can quickly handle the transaction from different parallel chains.
It is first veritify card and review verification know together during, each data verification node needs to verify across chain transaction
Validity.In the present embodiment, the verification mode for just veritifying card and review verification can be different.For example, just veritify
Card can rely on the Merkle tree roots in block head to complete transaction verification;Review verification can be then checked in transaction confirmation message
The no signature for containing at least preset number (such as t) data verification node.
It is pointed out that the Merkle trees in Figure 12 are only schematical.For example, Merkle trees can be by more friendships
Easily build, multiple across chain transaction may also be included on a Merkle tree.
Referring to Figure 11 and Figure 12, in S114, whether effective card transaction is just veritified.For example, it is responsible for same parallel chain
Data verification node is known together using BFT reaches an agreement the validity merchandised across chain.The common recognition mechanism can be basic
The common recognition mechanism such as Tangaroa, the Honey Badger BFT that PBFT knows together or proposes recently.Used with bit coin etc.
PoW compare, BFT common recognition can quickly handle the transaction from different parallel chains.
During being known together, each data verification node needs to verify the validity across chain transaction.Below with TxA
Exemplified by, illustrate that the verification mode across chain transaction may comprise steps of.
S1141, by the block-identified symbol included in transaction message, finds the block head of the block comprising TxA.
S1142, retrieves the tree root of Merkle trees from the block head.
S1143, extracts the necessary checking information of verification TxA, i.e. H from the transaction messageB、HCD。
S1144, each to verify that node utilizes the information obtained in above-mentioned S1141-S1143 steps, use is well known in the art
SPV verification modes, verify the validity across chain transaction.
S1144 specifically includes following sub-step:
S11441, calculates the cryptographic Hash H of TxAA, and then pass through HBAnd HCD, calculate the tree root H of Merkle treesABCD。
S11442, contrasts the tree root and H of the Merkle trees retrieved from block headABCDValue it is whether equal, if phase
Deng can then determine that across chain transaction TxA is included in the block specified;Otherwise it is assumed that do not include TxA in the block specified, across
Chain transaction invalid.
S11443, if across the chain transaction is included in the block specified, for the parallel chain using tradition BFT common recognitions
For, data verification node can directly judge that across the chain transaction is effective;For the parallel chain using PoW common recognitions, also
Need to wait enough block heads to accumulate after the block head of designated blocks, just can confirm that the validity across chain transaction.Example
Such as, bit coin needs to wait the block head accumulation of 6 blocks just to think that common recognition is completed afterwards in the block head of designated blocks.
Then, the data verification node for being responsible for parallel chain just thinks that across the chain transaction is effective.
In S116, all kinds of BFT common recognitions, such as PBFT, can elect a host node.Host node is completed in common recognition
Afterwards, a transaction confirmation message is constructed, transaction confirmation message includes but not limited to following information:1. across chain transaction;2. across chain friendship
The numbering of parallel chain belonging to easily;3. across chain exchange is in the identifier of block;4. verification letter of across the chain transaction on Merkle trees
Breath;5. it is responsible for each verification node of the parallel chain to the signature across chain transaction.Host node broadcasts transaction confirmation message
All verification nodes into interconnection chain network.
In S117, each data verification node (at least one data verification node) review verification in chain is interconnected across chain
Whether Transaction Information is effective, and reaches common understanding to the validity across chain Transaction Information.
Each verification node in interconnection chain network receives transaction confirmation message.Then, respectively verification node disjoint inspection
Whether at least t data verification node signature is contained in the transaction confirmation message.Wherein, t saves for verification set in advance
Point quantity.In this way, respectively verification node is able to verify that the validity that transaction confirmation message mid-span chain is merchandised.Then, mutually
All verify that node utilizes BFT mechanism in connection chain, reach common understanding to across chain transaction validity.
In S118, verification node abandons the transaction confirmation message received, does not further process, common recognition terminates.
In S119, first, verification joint structure interconnection chain block.Afterwards, each data verification section in chain network is interconnected
Point writes block in the block chain of interconnection chain.Interconnect and include but not limited to following information in chain block:Across chain transaction;2. across chain
The numbering of parallel chain belonging to transaction;3. across chain exchange is in the identifier of block;4. across the chain transaction is on Merkle trees
Checking information.
Figure 13 is the structure diagram based on the common recognition device merchandised across chain of one embodiment of the invention.
In the present embodiment, across chain transaction is the transaction between multiple parallel chains, and multiple parallel chains connect with interconnection chain respectively
Connect.
As shown in figure 13, can be included based on the common recognition device merchandised across chain:Parallel chain determination unit 131 and network common recognition
Unit 132.Parallel chain determination unit 131 can be used for determining to verify at random in multiple parallel chains according to parameter preset flat
Row chain;Network common recognition unit 132 can be used for confirming across the chain transaction that definite parallel chain is initiated, and be broadcast to mutually
Connection chain carries out common recognition verification.
In certain embodiments, parallel chain determination unit 131 can include:Numerical Simulation Module and numbering acquisition module.
Wherein, Numerical Simulation Module can be used for the cryptographic Hash for calculating parameter preset;Numbering acquisition module can be used for based on default letter
Number maps to cryptographic Hash in specified integer set, obtains the numbering for the parallel chain that need to be verified.
In certain embodiments, preset function can be:Remainder function.
In certain embodiments, specified integer set can be:The set of the numbering of multiple parallel chains.
In certain embodiments, parameter preset can include following parameter in it is one or two kinds of more than:Cryptographic Hash, with
Machine number, address, key.
In certain embodiments, can also be included based on the common recognition device merchandised across chain:Cryptographic Hash acquiring unit.Wherein,
Cryptographic Hash acquiring unit can be used for obtaining the number being allocated since interconnection chain is created;Selection is identical with the numerical value of number
The block of height;The cryptographic Hash of the block head of the block of selection is calculated, obtains the parameter of cryptographic Hash.
In certain embodiments, can also be included based on the common recognition device merchandised across chain:Random number acquiring unit.Wherein,
Random number acquiring unit can be used for specifying an arbitrary integer;According to what is obtained by cryptographic Hash, random number, address and key
Cryptographic Hash is less than or equal to the condition of integer, calculates the parameter of random number.
In certain embodiments, network common recognition unit can include:Node selection module, network common recognition module, message structure
Modeling block and message broadcast module.Wherein, node selection module, for choosing one from multiple data verification nodes of interconnection chain
A master data verifies node;Network is known together module, for using master data verification node collect multiple data verification nodes to across
The signature of chain transaction, and interconnection chain network common recognition is carried out to across chain transaction according to signature;Message constructing module, for when interconnection chain
Network common recognition is completed, and constructs across chain transaction confirmation message;Message broadcast module, for broadcasting across chain transaction confirmation message to mutual
Join in chain.
In certain embodiments, network common recognition unit can include:Number of nodes securing component, number of signatures securing component
With network common recognition component.Wherein, number of nodes securing component can be used for the number of nodes for obtaining data verification node;Number of signature
Amount securing component can be used for the number of signatures for obtaining signature;If network common recognition component can be used for number of signatures and number of nodes
When the ratio of amount reaches threshold value, across chain transaction is reached in agreement.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its any combination real
It is existing.When implemented in software, can realize in the form of a computer program product whole or in part.The computer program
Product includes one or more computer instructions, when run on a computer so that computer performs above-mentioned each implementation
Method described in example.When loading on computers and performing the computer program instructions, produce whole or in part according to
Flow or function described in the embodiment of the present invention.The computer can be all-purpose computer, special purpose computer, computer network
Network or other programmable devices.The computer instruction can store in a computer-readable storage medium, or from one
Computer-readable recording medium is transmitted to another computer-readable recording medium, for example, the computer instruction can be from one
A web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL))
Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center
Transmission.The computer-readable recording medium can be any usable medium that can access of computer or comprising one or
The data storage devices such as server that multiple usable mediums integrate, data center.The usable medium can be magnetic medium,
(for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disc Solid State
Disk (SSD)) etc..
It should be noted that the device of the various embodiments described above can be as the method for each embodiment of the various embodiments described above
In executive agent, it is possible to achieve the corresponding flow in each method, realizes identical technique effect, for sake of simplicity, in this respect
Content repeats no more.
Figure 14 is the circuit theory schematic diagram based on the common recognition device merchandised across chain of one embodiment of the invention.
As shown in figure 14, which can include central processing unit (CPU) 141, it can be according to being stored in read-only deposit
Program in reservoir (ROM) 142 is held from the program that storage part 148 is loaded into random access storage device (RAM) 143
The various operations that the above-mentioned each embodiment of row is done.In RAM143, the various programs needed for system architecture operation are also stored with
And data.CPU141, ROM 142 and RAM 143 are connected with each other by bus 144.Input/output (I/O) interface 145 also connects
It is connected to bus 144.
I/O interfaces 145 are connected to lower component:Importation 146 including keyboard, mouse etc.;Penetrated including such as cathode
The output par, c 147 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage part 148 including hard disk etc.;
And the communications portion 149 of the network interface card including LAN card, modem etc..Communications portion 149 via such as because
The network of spy's net performs communication process.Driver 1410 is also according to needing to be connected to I/O interfaces 145.Detachable media 1411, it is all
Such as disk, CD, magneto-optic disk, semiconductor memory, are installed on driver 1410, in order to read from it as needed
The computer program gone out is mounted into storage part 148 as needed.
Especially, according to an embodiment of the invention, it may be implemented as computer above with reference to the process of flow chart description
Software program.For example, the embodiment of the present invention includes a kind of computer program product, it includes being tangibly embodied in machine readable
Computer program on medium, the computer program include the program code for being used for the method shown in execution flow chart.At this
In the embodiment of sample, which can be downloaded and installed by communications portion 149 from network, and/or from removable
Medium 1411 is unloaded to be mounted.
Device embodiment described above is only schematical, wherein the unit illustrated as separating component can
To be or may not be physically separate, physics list is may or may not be as the component that unit is shown
Member, you can with positioned at a place, or can also be distributed in multiple network unit.It can be selected according to the actual needs
In some or all of module realize the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying creativeness
Work in the case of, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can
Realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Based on such understanding, on
The part that technical solution substantially in other words contributes to the prior art is stated to embody in the form of software product, should
Computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers
Order is used so that a computer equipment (can be personal computer, server, or network equipment etc.) performs each implementation
Method described in some parts of example or embodiment.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although
The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that:It still may be used
To modify to the technical solution described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic;
And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical solution spirit and
Scope.
Claims (20)
- It is 1. a kind of based on the common recognition method merchandised across chain, it is characterised in that across the chain transaction is the friendship between multiple parallel chains Easily, multiple parallel chains the described method comprises the following steps respectively with interconnecting chain link:According to parameter preset in multiple parallel chains the random parallel chain for determining to verify;Across the chain transaction initiated definite parallel chain confirms, and is broadcast to the interconnection chain and carries out common recognition verification.
- 2. according to the method described in claim 1, it is characterized in that, it is described according to parameter preset in multiple parallel chains with Machine determines the parallel chain that need to be verified, including:Calculate the cryptographic Hash of the parameter preset;The cryptographic Hash is mapped in specified integer set based on preset function, obtains the volume of the parallel chain that need to be verified Number.
- 3. according to the method described in claim 2, it is characterized in that, wherein:The preset function is:Remainder function.
- 4. according to the method described in claim 2, it is characterized in that, wherein:The specified integer set is:The set of the numbering of multiple parallel chains.
- 5. according to any method in claim 1-4, it is characterised in that the parameter preset is included in following parameter It is one or two kinds of more than:Cryptographic Hash, random number, address, key.
- 6. according to the method described in claim 5, it is characterized in that, further include:Obtain the number being allocated since the interconnection chain is created;The block of the selection height identical with the numerical value of the number;The cryptographic Hash of the block head of the block of selection is calculated, obtains the parameter of the cryptographic Hash.
- 7. according to the method described in claim 5, it is characterized in that, further include:Specify an arbitrary integer;Institute is less than or equal to according to the cryptographic Hash obtained by the cryptographic Hash, the random number, described address and the key The condition of integer is stated, calculates the parameter of the random number.
- 8. according to any method in claim 1-7, it is characterised in that what described pair of definite parallel chain was initiated Across chain transaction is confirmed, and is broadcast to the interconnection chain and is carried out common recognition verification, including:A master data verification node is chosen from multiple data verification nodes of the interconnection chain;Multiple data verification nodes are collected to the signature across chain transaction using master data verification node, and according to The signature carries out across the chain transaction interconnection chain network common recognition;When the interconnection chain network common recognition completion, across chain transaction confirmation message is constructed;Across the chain transaction confirmation message is broadcasted into the interconnection chain.
- 9. according to the method described in claim 8, it is characterized in that, described carry out mutually across the chain transaction according to the signature Join chain network common recognition, including:Obtain the number of nodes of the data verification node;Obtain the number of signatures of the signature;If the number of signatures and the ratio of the number of nodes reach threshold value, opinion one is reached to across the chain transaction Cause.
- It is 10. a kind of based on the common recognition device merchandised across chain, it is characterised in that across the chain transaction is the friendship between multiple parallel chains Easily, respectively with interconnecting chain link, described device includes multiple parallel chains:Parallel chain determination unit, for the parallel chain for determining to verify at random in multiple parallel chains according to parameter preset;Network common recognition unit, across the chain transaction for being initiated definite parallel chain confirms, and is broadcast to the interconnection Chain carries out common recognition verification.
- 11. device according to claim 10, it is characterised in that the parallel chain determination unit includes:Numerical Simulation Module, for calculating the cryptographic Hash of the parameter preset;Numbering acquisition module, for the cryptographic Hash to be mapped to specified integer set based on preset function, obtains the need The numbering of the parallel chain of verification.
- 12. according to the devices described in claim 11, it is characterised in that wherein:The preset function is:Remainder function.
- 13. according to the devices described in claim 11, it is characterised in that wherein:The specified integer set is:The set of the numbering of multiple parallel chains.
- 14. according to any device in claim 10-13, it is characterised in that the parameter preset includes following ginseng It is more than one or two kinds of in number:Cryptographic Hash, random number, address, key.
- 15. device according to claim 14, it is characterised in that further include:Cryptographic Hash acquiring unit, for obtaining the number being allocated since the interconnection chain is created;Selection and the number The block of the identical height of numerical value;The cryptographic Hash of the block head of the block of selection is calculated, obtains the parameter of the cryptographic Hash.
- 16. device according to claim 14, it is characterised in that further include:Random number acquiring unit, for specifying an arbitrary integer;According to by the cryptographic Hash, random number, described The cryptographic Hash that location and the key obtain is less than or equal to the condition of the integer, calculates the parameter of the random number.
- 17. according to any device in claim 10-16, it is characterised in that the network common recognition unit includes:Node selection module, for choosing a master data verification node from multiple data verification nodes of the interconnection chain;Network common recognition module, for collecting multiple data verification nodes to described across chain using master data verification node The signature of transaction, and interconnection chain network common recognition carries out across the chain transaction according to the signature;Message constructing module, for being completed when the interconnection chain network common recognition, constructs across chain transaction confirmation message;Message broadcast module, for broadcasting across the chain transaction confirmation message into the interconnection chain.
- 18. device according to claim 17, it is characterised in that the network common recognition module further includes:Number of nodes securing component, for obtaining the number of nodes of the data verification node;Number of signatures securing component, for obtaining the number of signatures of the signature;Network is known together component, if the ratio for the number of signatures and the number of nodes reaches threshold value, to it is described across Chain transaction is reached in agreement.
- It is 19. a kind of based on the common recognition device merchandised across chain, it is characterised in that including:Memory, for storing program;Processor, for performing the program of the memory storage, described program causes the processor to perform such as claim Method in 1-9 described in any one.
- A kind of 20. computer-readable recording medium, it is characterised in that including:Instruction,When described instruction is run on computers so that computer performs the side as described in any one in claim 1-9 Method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710952719.9A CN107909369A (en) | 2017-10-13 | 2017-10-13 | Based on the common recognition method, apparatus merchandised across chain and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201710952719.9A CN107909369A (en) | 2017-10-13 | 2017-10-13 | Based on the common recognition method, apparatus merchandised across chain and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107909369A true CN107909369A (en) | 2018-04-13 |
Family
ID=61840565
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201710952719.9A Pending CN107909369A (en) | 2017-10-13 | 2017-10-13 | Based on the common recognition method, apparatus merchandised across chain and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107909369A (en) |
Cited By (74)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108805701A (en) * | 2018-04-19 | 2018-11-13 | 深圳市网心科技有限公司 | Across the chain transaction processing system of multi-tiling chain and method, block catenary system and storage medium |
CN108881387A (en) * | 2018-05-16 | 2018-11-23 | 横琴密达科技有限责任公司 | A kind of block chain common recognition system |
CN108876618A (en) * | 2018-06-15 | 2018-11-23 | 浙江华信区块链科技服务有限公司 | A kind of exchange block catenary system and corresponding universal block chain mutual operation method and network |
CN108900585A (en) * | 2018-06-15 | 2018-11-27 | 浙江华信区块链科技服务有限公司 | Across chain transaction consistency implementation method |
CN108921559A (en) * | 2018-07-27 | 2018-11-30 | 杭州复杂美科技有限公司 | Across chain transaction method of calibration, equipment and storage medium |
CN108924107A (en) * | 2018-06-21 | 2018-11-30 | 桂林电子科技大学 | A kind of block chain tele-medicine data call can verify that method |
CN108989052A (en) * | 2018-08-28 | 2018-12-11 | 中国联合网络通信集团有限公司 | transaction request processing method and system |
CN108985742A (en) * | 2018-07-19 | 2018-12-11 | 深圳市网心科技有限公司 | Transaction processing method, device and block catenary system |
CN108984662A (en) * | 2018-06-28 | 2018-12-11 | 杭州复杂美科技有限公司 | A kind of block chain method of data synchronization |
CN109035016A (en) * | 2018-06-28 | 2018-12-18 | 杭州复杂美科技有限公司 | A kind of multichain concurrent transaction method |
CN109102284A (en) * | 2018-07-30 | 2018-12-28 | 黄芸芸 | A kind of optimization method of block chain tamper-resistance techniques |
CN109145205A (en) * | 2018-07-27 | 2019-01-04 | 阿里巴巴集团控股有限公司 | A kind of across chain data manipulation method and device based on block chain |
CN109167811A (en) * | 2018-07-27 | 2019-01-08 | 阿里巴巴集团控股有限公司 | A kind of across chain data access method and device based on block chain |
CN109213767A (en) * | 2018-09-19 | 2019-01-15 | 挖财网络技术有限公司 | A kind of account data management method suitable for block chain |
CN109218303A (en) * | 2018-09-10 | 2019-01-15 | 浙江天脉领域科技有限公司 | A kind of novel across chain method of block chain of homologous isomery link network fusion |
CN109242512A (en) * | 2018-08-24 | 2019-01-18 | 维沃移动通信有限公司 | A kind of part true and false information processing method, device and equipment based on block chain |
CN109242456A (en) * | 2018-09-04 | 2019-01-18 | 湖南宸瀚信息科技有限责任公司 | Across the chain method of commerce of block chain, system and storage medium |
CN109360096A (en) * | 2018-09-27 | 2019-02-19 | 中国联合网络通信集团有限公司 | A kind of bookkeeping methods and system of the privately owned chain based on publicly-owned chain |
CN109377225A (en) * | 2018-10-30 | 2019-02-22 | 杭州复杂美科技有限公司 | Transaction allocation method, common recognition method, equipment and storage medium |
CN109410045A (en) * | 2018-08-30 | 2019-03-01 | 杭州复杂美科技有限公司 | A kind of parallel chain common recognition method, equipment and storage medium |
CN109409889A (en) * | 2018-11-13 | 2019-03-01 | 杭州秘猿科技有限公司 | A kind of block in block chain determines method, apparatus and electronic equipment |
CN109493027A (en) * | 2018-11-19 | 2019-03-19 | 众安信息技术服务有限公司 | A kind of method and device realized across chain transactional operation |
CN109558454A (en) * | 2018-11-28 | 2019-04-02 | 杭州复杂美科技有限公司 | Parallel chain digs mine common recognition method, equipment and storage medium |
CN109711844A (en) * | 2018-12-31 | 2019-05-03 | 莆田市烛火信息技术有限公司 | A kind of parallel chain management method of block chain network |
CN109711842A (en) * | 2018-12-29 | 2019-05-03 | 莆田市烛火信息技术有限公司 | A kind of account book bookkeeping methods for the block chain network that parallel chain periodically converges |
CN109831514A (en) * | 2019-03-02 | 2019-05-31 | 杭州复杂美科技有限公司 | Parallel chain common recognition method, data exception processing method, equipment and storage medium |
CN109934592A (en) * | 2019-03-22 | 2019-06-25 | 深圳市网心科技有限公司 | A kind of across the chain communication means of block chain, system, electronic equipment and storage medium |
CN110084601A (en) * | 2019-04-30 | 2019-08-02 | 杭州复杂美科技有限公司 | Parallel chain main chain stateful transaction synchronous method, equipment and storage medium |
CN110147685A (en) * | 2019-04-04 | 2019-08-20 | 阿里巴巴集团控股有限公司 | Data verification method, system, device and equipment |
CN110162523A (en) * | 2019-04-04 | 2019-08-23 | 阿里巴巴集团控股有限公司 | Date storage method, system, device and equipment |
CN110188563A (en) * | 2019-06-02 | 2019-08-30 | 四川虹微技术有限公司 | A kind of trust data update method and device |
CN110288345A (en) * | 2019-06-26 | 2019-09-27 | 深圳市网心科技有限公司 | Across chain communication means, device, main chain node and storage medium |
CN110473093A (en) * | 2019-07-29 | 2019-11-19 | 杭州复杂美科技有限公司 | Parallel chain assets transfer method, equipment and storage medium |
CN110490562A (en) * | 2019-07-10 | 2019-11-22 | 布比(北京)网络技术有限公司 | A kind of across the chain data processing method and system of multi-tiling chain |
CN110597907A (en) * | 2019-09-10 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Cross-block-chain data information synchronization method, device, equipment and medium |
CN110610418A (en) * | 2018-06-15 | 2019-12-24 | 翟红鹰 | Transaction state query method, system, device and storage medium based on block chain |
WO2019242508A1 (en) * | 2018-06-20 | 2019-12-26 | 深圳市红砖坊技术有限公司 | Blockchain system and routing method of routing node applied to blockchain system |
CN110647311A (en) * | 2018-06-27 | 2020-01-03 | 厦门本能管家科技有限公司 | Uncontrollable random number generation method and system |
CN110730959A (en) * | 2018-04-21 | 2020-01-24 | 因特比有限公司 | Method and system for performing actions requested by blockchain |
CN110766410A (en) * | 2019-10-24 | 2020-02-07 | 杭州趣链科技有限公司 | Method and equipment for constructing and verifying credible cross-chain event based on Mercker tree |
WO2020042937A1 (en) * | 2018-08-28 | 2020-03-05 | 白杰 | Maintenance method for blockchain parachain, and blockchain parachain |
WO2020043046A1 (en) * | 2018-08-30 | 2020-03-05 | 杭州复杂美科技有限公司 | Parallel chain cross-chain transaction method, device and storage medium |
CN110868438A (en) * | 2018-08-28 | 2020-03-06 | 傲为信息技术(江苏)有限公司 | Block chain network system |
CN111008827A (en) * | 2019-11-25 | 2020-04-14 | 深圳前海微众银行股份有限公司 | Cross-chain transaction signature method and device |
CN111275437A (en) * | 2020-01-12 | 2020-06-12 | 杭州复杂美科技有限公司 | Parallel chain consensus method, device and storage medium |
CN111314438A (en) * | 2020-01-20 | 2020-06-19 | 厦门顺势共识信息科技有限公司 | Credible block chain system based on role distribution and cross-chain consensus method |
US20200213089A1 (en) | 2019-04-04 | 2020-07-02 | Alibaba Group Holding Limited | Data storage method, apparatus, system and device |
CN111475572A (en) * | 2020-04-02 | 2020-07-31 | 百度国际科技(深圳)有限公司 | Block generation method, device, equipment and medium |
CN111489256A (en) * | 2019-01-25 | 2020-08-04 | 京东数字科技控股有限公司 | Cross-chain processing method, equipment and system for multi-chain block chain system |
CN111488202A (en) * | 2020-04-07 | 2020-08-04 | 百度国际科技(深圳)有限公司 | Transaction processing method, device, equipment, system and medium for multi-chain system |
CN111556120A (en) * | 2020-04-23 | 2020-08-18 | 财付通支付科技有限公司 | Data processing method and device based on block chain, storage medium and equipment |
CN111683120A (en) * | 2020-05-22 | 2020-09-18 | 哈尔滨工程大学 | Alliance node storage method supporting dynamic change of verification node |
CN111798238A (en) * | 2020-07-03 | 2020-10-20 | 杭州复杂美科技有限公司 | Parallel chain consensus method, device and storage medium |
CN111798239A (en) * | 2020-07-03 | 2020-10-20 | 杭州复杂美科技有限公司 | Parallel chain consensus method, device and storage medium |
CN112039926A (en) * | 2020-11-04 | 2020-12-04 | 南京金宁汇科技有限公司 | Method for realizing double-layer chain type architecture of block chain |
CN112041873A (en) * | 2018-04-27 | 2020-12-04 | 区块链控股有限公司 | Block chain network partitioning |
WO2021018048A1 (en) * | 2019-07-26 | 2021-02-04 | 华为技术有限公司 | Cross-chain transaction method and apparatus |
CN112348672A (en) * | 2019-08-07 | 2021-02-09 | 阿里巴巴集团控股有限公司 | Cross-chain transaction method and device, multi-block chain system and computing equipment |
CN112598418A (en) * | 2020-12-09 | 2021-04-02 | 杭州复杂美科技有限公司 | Parallel chain supervision consensus method, equipment and storage medium |
CN112633868A (en) * | 2019-10-08 | 2021-04-09 | 橙载(上海)信息技术有限公司 | Cross-chain asset transfer method based on intelligent contract implementation |
CN112948495A (en) * | 2021-03-05 | 2021-06-11 | 杭州复杂美科技有限公司 | Parallel chain constant block output method, computer device and storage medium |
CN112968883A (en) * | 2018-09-27 | 2021-06-15 | 福建福链科技有限公司 | Block chain heterogeneous consensus method with high safety and terminal |
US11055277B2 (en) | 2019-04-04 | 2021-07-06 | Advanced New Technologies Co., Ltd. | Integrity verification method, apparatus, and system and device for data in a blockchain-type ledger |
CN113098694A (en) * | 2021-04-09 | 2021-07-09 | 杭州链网科技有限公司 | Hybrid cross-chain consensus method |
WO2021139533A1 (en) * | 2020-01-12 | 2021-07-15 | 江苏复杂美科技有限公司 | Method for sending consensus transaction, and device and storage medium |
CN113348656A (en) * | 2019-04-29 | 2021-09-03 | 互达控股有限公司 | Network transaction verification method based on multiple nodes, system and storage medium thereof |
US11252165B2 (en) * | 2018-11-16 | 2022-02-15 | Advanced New Technologies Co., Ltd. | Cross-chain data trusted management methods and apparatuses |
WO2022068410A1 (en) * | 2020-09-30 | 2022-04-07 | 杭州复杂美科技有限公司 | Parachain supervision consensus method, device, and storage medium |
CN114465830A (en) * | 2022-04-14 | 2022-05-10 | 北京理工大学 | Cross-chain data encryption method, device, equipment and storage medium |
EP3857850A4 (en) * | 2018-09-28 | 2022-06-29 | Thunder Token Inc. | High throughput blockchain consensus systems and methods with low finalization time |
CN114862397A (en) * | 2022-07-06 | 2022-08-05 | 国网天津市电力公司培训中心 | Double-decoupling block chain distributed method based on double-chain structure |
CN117592990A (en) * | 2024-01-04 | 2024-02-23 | 恒生电子股份有限公司 | Block chain transaction authentication method and device, computing equipment and storage medium |
WO2024066010A1 (en) * | 2022-09-30 | 2024-04-04 | 蚂蚁区块链科技(上海)有限公司 | Method and apparatus for transaction processing in blockchain system, and blockchain system |
CN117592990B (en) * | 2024-01-04 | 2024-04-26 | 恒生电子股份有限公司 | Block chain transaction authentication method and device, computing equipment and storage medium |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107146087A (en) * | 2017-04-11 | 2017-09-08 | 广东网金控股股份有限公司 | A kind of quick common recognition bookkeeping methods and system based on block chain alliance chain |
-
2017
- 2017-10-13 CN CN201710952719.9A patent/CN107909369A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107146087A (en) * | 2017-04-11 | 2017-09-08 | 广东网金控股股份有限公司 | A kind of quick common recognition bookkeeping methods and system based on block chain alliance chain |
Non-Patent Citations (1)
Title |
---|
DR. GAVIN WOOD: "《POLKADOT: VISION FOR A HETEROGENEOUS MULTI-CHAIN FRAMEWORK》", 《POLKADOT 白皮书》 * |
Cited By (129)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108805701A (en) * | 2018-04-19 | 2018-11-13 | 深圳市网心科技有限公司 | Across the chain transaction processing system of multi-tiling chain and method, block catenary system and storage medium |
CN108805701B (en) * | 2018-04-19 | 2022-06-07 | 深圳市迅雷网络技术有限公司 | Multi-blockchain cross-chain transaction processing system and method, blockchain system and storage medium |
CN110730959A (en) * | 2018-04-21 | 2020-01-24 | 因特比有限公司 | Method and system for performing actions requested by blockchain |
CN112041873A (en) * | 2018-04-27 | 2020-12-04 | 区块链控股有限公司 | Block chain network partitioning |
CN112041873B (en) * | 2018-04-27 | 2024-04-19 | 区块链控股有限公司 | Block chain network partitioning |
CN108881387A (en) * | 2018-05-16 | 2018-11-23 | 横琴密达科技有限责任公司 | A kind of block chain common recognition system |
CN108876618A (en) * | 2018-06-15 | 2018-11-23 | 浙江华信区块链科技服务有限公司 | A kind of exchange block catenary system and corresponding universal block chain mutual operation method and network |
CN108900585A (en) * | 2018-06-15 | 2018-11-27 | 浙江华信区块链科技服务有限公司 | Across chain transaction consistency implementation method |
CN110610418A (en) * | 2018-06-15 | 2019-12-24 | 翟红鹰 | Transaction state query method, system, device and storage medium based on block chain |
CN110619520B (en) * | 2018-06-20 | 2023-05-02 | 深圳市红砖坊技术有限公司 | Block chain system and routing method applied to routing nodes of block chain system |
WO2019242508A1 (en) * | 2018-06-20 | 2019-12-26 | 深圳市红砖坊技术有限公司 | Blockchain system and routing method of routing node applied to blockchain system |
CN110619520A (en) * | 2018-06-20 | 2019-12-27 | 深圳市红砖坊技术有限公司 | Block chain system and routing method of routing node applied to block chain system |
CN108924107B (en) * | 2018-06-21 | 2020-08-21 | 桂林电子科技大学 | Verifiable method for block chain remote medical data calling |
CN108924107A (en) * | 2018-06-21 | 2018-11-30 | 桂林电子科技大学 | A kind of block chain tele-medicine data call can verify that method |
CN110647311A (en) * | 2018-06-27 | 2020-01-03 | 厦门本能管家科技有限公司 | Uncontrollable random number generation method and system |
US20210272111A1 (en) * | 2018-06-28 | 2021-09-02 | Jiangsu Fuzamei Technology Co.,Ltd. | Multi-Chain Concurrent Transaction Method |
WO2020001370A1 (en) * | 2018-06-28 | 2020-01-02 | 杭州复杂美科技有限公司 | Multi-chain concurrent transaction method |
CN109035016A (en) * | 2018-06-28 | 2018-12-18 | 杭州复杂美科技有限公司 | A kind of multichain concurrent transaction method |
CN108984662A (en) * | 2018-06-28 | 2018-12-11 | 杭州复杂美科技有限公司 | A kind of block chain method of data synchronization |
CN109035016B (en) * | 2018-06-28 | 2020-10-23 | 杭州复杂美科技有限公司 | Multi-chain concurrent transaction method |
CN108985742A (en) * | 2018-07-19 | 2018-12-11 | 深圳市网心科技有限公司 | Transaction processing method, device and block catenary system |
CN109167811B (en) * | 2018-07-27 | 2020-05-05 | 阿里巴巴集团控股有限公司 | Cross-chain data access method and device based on block chain |
US10877930B2 (en) | 2018-07-27 | 2020-12-29 | Advanced New Technologies Co., Ltd. | Blockchain-based cross-chain data access method and apparatus |
CN108921559A (en) * | 2018-07-27 | 2018-11-30 | 杭州复杂美科技有限公司 | Across chain transaction method of calibration, equipment and storage medium |
CN108921559B (en) * | 2018-07-27 | 2022-03-04 | 杭州复杂美科技有限公司 | Cross-chain transaction verification method, device and storage medium |
TWI705351B (en) * | 2018-07-27 | 2020-09-21 | 香港商阿里巴巴集團服務有限公司 | A blockchain-based cross-chain data access method and device |
US10878052B2 (en) | 2018-07-27 | 2020-12-29 | Advanced New Technologies Co., Ltd. | Blockchain-based cross-chain data operation method and apparatus |
CN109167811A (en) * | 2018-07-27 | 2019-01-08 | 阿里巴巴集团控股有限公司 | A kind of across chain data access method and device based on block chain |
CN109145205A (en) * | 2018-07-27 | 2019-01-04 | 阿里巴巴集团控股有限公司 | A kind of across chain data manipulation method and device based on block chain |
CN109102284B (en) * | 2018-07-30 | 2021-07-27 | 黄芸芸 | Optimization method of block chain tamper-proof technology |
CN109102284A (en) * | 2018-07-30 | 2018-12-28 | 黄芸芸 | A kind of optimization method of block chain tamper-resistance techniques |
CN109242512A (en) * | 2018-08-24 | 2019-01-18 | 维沃移动通信有限公司 | A kind of part true and false information processing method, device and equipment based on block chain |
CN108989052B (en) * | 2018-08-28 | 2021-04-13 | 中国联合网络通信集团有限公司 | Transaction request processing method and system |
CN108989052A (en) * | 2018-08-28 | 2018-12-11 | 中国联合网络通信集团有限公司 | transaction request processing method and system |
CN110868438A (en) * | 2018-08-28 | 2020-03-06 | 傲为信息技术(江苏)有限公司 | Block chain network system |
WO2020042937A1 (en) * | 2018-08-28 | 2020-03-05 | 白杰 | Maintenance method for blockchain parachain, and blockchain parachain |
CN110868438B (en) * | 2018-08-28 | 2022-01-07 | 傲为信息技术(江苏)有限公司 | Block chain network system |
WO2020043047A1 (en) * | 2018-08-30 | 2020-03-05 | 杭州复杂美科技有限公司 | Method and device for reaching consensus in parachain, and storage medium |
CN109410045A (en) * | 2018-08-30 | 2019-03-01 | 杭州复杂美科技有限公司 | A kind of parallel chain common recognition method, equipment and storage medium |
WO2020043046A1 (en) * | 2018-08-30 | 2020-03-05 | 杭州复杂美科技有限公司 | Parallel chain cross-chain transaction method, device and storage medium |
CN109242456A (en) * | 2018-09-04 | 2019-01-18 | 湖南宸瀚信息科技有限责任公司 | Across the chain method of commerce of block chain, system and storage medium |
CN109218303A (en) * | 2018-09-10 | 2019-01-15 | 浙江天脉领域科技有限公司 | A kind of novel across chain method of block chain of homologous isomery link network fusion |
CN109218303B (en) * | 2018-09-10 | 2020-12-11 | 浙江天脉领域科技有限公司 | Novel block chain cross-chain method for homologous and heterogeneous chain network fusion |
CN109213767A (en) * | 2018-09-19 | 2019-01-15 | 挖财网络技术有限公司 | A kind of account data management method suitable for block chain |
CN109213767B (en) * | 2018-09-19 | 2020-07-21 | 挖财网络技术有限公司 | Account data management method suitable for block chain |
CN112968883B (en) * | 2018-09-27 | 2023-04-07 | 福建福链科技有限公司 | Block chain heterogeneous consensus method with high safety and terminal |
CN109360096A (en) * | 2018-09-27 | 2019-02-19 | 中国联合网络通信集团有限公司 | A kind of bookkeeping methods and system of the privately owned chain based on publicly-owned chain |
CN112968883A (en) * | 2018-09-27 | 2021-06-15 | 福建福链科技有限公司 | Block chain heterogeneous consensus method with high safety and terminal |
EP3857850A4 (en) * | 2018-09-28 | 2022-06-29 | Thunder Token Inc. | High throughput blockchain consensus systems and methods with low finalization time |
CN109377225A (en) * | 2018-10-30 | 2019-02-22 | 杭州复杂美科技有限公司 | Transaction allocation method, common recognition method, equipment and storage medium |
CN109409889A (en) * | 2018-11-13 | 2019-03-01 | 杭州秘猿科技有限公司 | A kind of block in block chain determines method, apparatus and electronic equipment |
CN109409889B (en) * | 2018-11-13 | 2021-11-12 | 杭州秘猿科技有限公司 | Block determining method and device in block chain and electronic equipment |
US11252165B2 (en) * | 2018-11-16 | 2022-02-15 | Advanced New Technologies Co., Ltd. | Cross-chain data trusted management methods and apparatuses |
CN109493027A (en) * | 2018-11-19 | 2019-03-19 | 众安信息技术服务有限公司 | A kind of method and device realized across chain transactional operation |
CN109558454A (en) * | 2018-11-28 | 2019-04-02 | 杭州复杂美科技有限公司 | Parallel chain digs mine common recognition method, equipment and storage medium |
CN109558454B (en) * | 2018-11-28 | 2020-07-10 | 杭州复杂美科技有限公司 | Parallel chain mining consensus method, apparatus and storage medium |
CN109711842B (en) * | 2018-12-29 | 2021-04-09 | 西安纸贵互联网科技有限公司 | Account book accounting method of block chain network with regularly converged parallel chains |
CN109711842A (en) * | 2018-12-29 | 2019-05-03 | 莆田市烛火信息技术有限公司 | A kind of account book bookkeeping methods for the block chain network that parallel chain periodically converges |
CN109711844A (en) * | 2018-12-31 | 2019-05-03 | 莆田市烛火信息技术有限公司 | A kind of parallel chain management method of block chain network |
CN111489256A (en) * | 2019-01-25 | 2020-08-04 | 京东数字科技控股有限公司 | Cross-chain processing method, equipment and system for multi-chain block chain system |
CN111489256B (en) * | 2019-01-25 | 2023-06-23 | 京东科技控股股份有限公司 | Cross-chain processing method, device and system for multi-chain block chain system |
CN109831514B (en) * | 2019-03-02 | 2020-06-09 | 杭州复杂美科技有限公司 | Parallel chain consensus method, data exception handling method, device and storage medium |
CN109831514A (en) * | 2019-03-02 | 2019-05-31 | 杭州复杂美科技有限公司 | Parallel chain common recognition method, data exception processing method, equipment and storage medium |
CN109934592A (en) * | 2019-03-22 | 2019-06-25 | 深圳市网心科技有限公司 | A kind of across the chain communication means of block chain, system, electronic equipment and storage medium |
CN110147685B (en) * | 2019-04-04 | 2020-10-23 | 创新先进技术有限公司 | Data verification method, system, device and equipment |
CN110162523A (en) * | 2019-04-04 | 2019-08-23 | 阿里巴巴集团控股有限公司 | Date storage method, system, device and equipment |
US11055277B2 (en) | 2019-04-04 | 2021-07-06 | Advanced New Technologies Co., Ltd. | Integrity verification method, apparatus, and system and device for data in a blockchain-type ledger |
US20200213089A1 (en) | 2019-04-04 | 2020-07-02 | Alibaba Group Holding Limited | Data storage method, apparatus, system and device |
CN110147685A (en) * | 2019-04-04 | 2019-08-20 | 阿里巴巴集团控股有限公司 | Data verification method, system, device and equipment |
CN110162523B (en) * | 2019-04-04 | 2020-09-01 | 阿里巴巴集团控股有限公司 | Data storage method, system, device and equipment |
US10917231B2 (en) | 2019-04-04 | 2021-02-09 | Advanced New Technologies Co., Ltd. | Data storage method, apparatus, system and device |
CN113348656A (en) * | 2019-04-29 | 2021-09-03 | 互达控股有限公司 | Network transaction verification method based on multiple nodes, system and storage medium thereof |
CN110084601B (en) * | 2019-04-30 | 2021-03-16 | 杭州复杂美科技有限公司 | Parallel chain main chain transaction state synchronization method, equipment and storage medium |
CN110084601A (en) * | 2019-04-30 | 2019-08-02 | 杭州复杂美科技有限公司 | Parallel chain main chain stateful transaction synchronous method, equipment and storage medium |
CN110188563A (en) * | 2019-06-02 | 2019-08-30 | 四川虹微技术有限公司 | A kind of trust data update method and device |
CN110288345B (en) * | 2019-06-26 | 2022-04-05 | 深圳市迅雷网络技术有限公司 | Cross-link communication method, device, main chain node and storage medium |
CN110288345A (en) * | 2019-06-26 | 2019-09-27 | 深圳市网心科技有限公司 | Across chain communication means, device, main chain node and storage medium |
CN110490562A (en) * | 2019-07-10 | 2019-11-22 | 布比(北京)网络技术有限公司 | A kind of across the chain data processing method and system of multi-tiling chain |
US11966378B2 (en) | 2019-07-26 | 2024-04-23 | Huawei Technologies Co., Ltd. | Cross-chain transaction method and apparatus |
WO2021018048A1 (en) * | 2019-07-26 | 2021-02-04 | 华为技术有限公司 | Cross-chain transaction method and apparatus |
CN110473093A (en) * | 2019-07-29 | 2019-11-19 | 杭州复杂美科技有限公司 | Parallel chain assets transfer method, equipment and storage medium |
CN112348672A (en) * | 2019-08-07 | 2021-02-09 | 阿里巴巴集团控股有限公司 | Cross-chain transaction method and device, multi-block chain system and computing equipment |
CN112348672B (en) * | 2019-08-07 | 2023-08-08 | 淘宝(中国)软件有限公司 | Cross-chain transaction method and device, multi-block chain system and computing equipment |
CN110597907A (en) * | 2019-09-10 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Cross-block-chain data information synchronization method, device, equipment and medium |
CN110597907B (en) * | 2019-09-10 | 2021-10-29 | 腾讯科技(深圳)有限公司 | Cross-block-chain data information synchronization method, device, equipment and medium |
CN112633868B (en) * | 2019-10-08 | 2023-04-14 | 橙载(上海)信息技术有限公司 | Cross-chain asset transfer method based on intelligent contract implementation |
CN112633868A (en) * | 2019-10-08 | 2021-04-09 | 橙载(上海)信息技术有限公司 | Cross-chain asset transfer method based on intelligent contract implementation |
CN110766410A (en) * | 2019-10-24 | 2020-02-07 | 杭州趣链科技有限公司 | Method and equipment for constructing and verifying credible cross-chain event based on Mercker tree |
CN110766410B (en) * | 2019-10-24 | 2023-09-22 | 杭州趣链科技有限公司 | Trusted cross-chain event construction and verification method and device based on Merker tree |
CN111008827A (en) * | 2019-11-25 | 2020-04-14 | 深圳前海微众银行股份有限公司 | Cross-chain transaction signature method and device |
CN111008827B (en) * | 2019-11-25 | 2023-07-21 | 深圳前海微众银行股份有限公司 | Cross-chain transaction signature method and device |
WO2021139533A1 (en) * | 2020-01-12 | 2021-07-15 | 江苏复杂美科技有限公司 | Method for sending consensus transaction, and device and storage medium |
CN111275437B (en) * | 2020-01-12 | 2023-05-30 | 杭州复杂美科技有限公司 | Parallel chain consensus method, apparatus and storage medium |
CN111275437A (en) * | 2020-01-12 | 2020-06-12 | 杭州复杂美科技有限公司 | Parallel chain consensus method, device and storage medium |
CN111314438A (en) * | 2020-01-20 | 2020-06-19 | 厦门顺势共识信息科技有限公司 | Credible block chain system based on role distribution and cross-chain consensus method |
CN111475572A (en) * | 2020-04-02 | 2020-07-31 | 百度国际科技(深圳)有限公司 | Block generation method, device, equipment and medium |
CN111475572B (en) * | 2020-04-02 | 2023-08-29 | 百度国际科技(深圳)有限公司 | Block generation method, device, equipment and medium |
KR20210046605A (en) * | 2020-04-07 | 2021-04-28 | 바이두 인터내셔널 테크놀로지 (센젠) 코., 엘티디. | Transaction processing method, apparatus, device and system for multi-chain system, and medium |
JP2021108464A (en) * | 2020-04-07 | 2021-07-29 | バイドゥ インターナショナル テクノロジー (シンセン) カンパニー リミテッド | Transaction processing method, apparatus, equipment and system for multi-chain system, and media |
CN111488202B (en) * | 2020-04-07 | 2023-08-15 | 百度国际科技(深圳)有限公司 | Transaction processing method, device, equipment, system and medium of multi-chain system |
EP3893141A1 (en) * | 2020-04-07 | 2021-10-13 | Baidu International Technology (Shenzhen) Co., Ltd | Transaction processing method, apparatus, device and system for multi-chain system |
CN111488202A (en) * | 2020-04-07 | 2020-08-04 | 百度国际科技(深圳)有限公司 | Transaction processing method, device, equipment, system and medium for multi-chain system |
US20210314138A1 (en) * | 2020-04-07 | 2021-10-07 | Baidu International Technology (Shenzhen) Co., Ltd. | Transaction processing method, apparatus, device and system for multi-chain system |
KR102542248B1 (en) * | 2020-04-07 | 2023-06-12 | 바이두 인터내셔널 테크놀로지 (센젠) 코., 엘티디. | Transaction processing method, apparatus, device and system for multi-chain system, and medium |
JP7026836B2 (en) | 2020-04-07 | 2022-02-28 | バイドゥ インターナショナル テクノロジー (シンセン) カンパニー リミテッド | Transaction processing methods, devices, equipment, systems and media for multi-chain systems |
US11588618B2 (en) * | 2020-04-07 | 2023-02-21 | Baidu International Technology (Shenzhen) Co., Ltd. | Transaction processing method, apparatus, device and system for multi-chain system |
CN111556120A (en) * | 2020-04-23 | 2020-08-18 | 财付通支付科技有限公司 | Data processing method and device based on block chain, storage medium and equipment |
CN111556120B (en) * | 2020-04-23 | 2023-04-07 | 财付通支付科技有限公司 | Data processing method and device based on block chain, storage medium and equipment |
CN111683120A (en) * | 2020-05-22 | 2020-09-18 | 哈尔滨工程大学 | Alliance node storage method supporting dynamic change of verification node |
CN111798239B (en) * | 2020-07-03 | 2023-05-30 | 杭州复杂美科技有限公司 | Parallel chain consensus method, apparatus and storage medium |
CN111798238A (en) * | 2020-07-03 | 2020-10-20 | 杭州复杂美科技有限公司 | Parallel chain consensus method, device and storage medium |
CN111798239A (en) * | 2020-07-03 | 2020-10-20 | 杭州复杂美科技有限公司 | Parallel chain consensus method, device and storage medium |
CN111798238B (en) * | 2020-07-03 | 2023-11-24 | 杭州复杂美科技有限公司 | Parallel chain consensus method, apparatus and storage medium |
WO2022068410A1 (en) * | 2020-09-30 | 2022-04-07 | 杭州复杂美科技有限公司 | Parachain supervision consensus method, device, and storage medium |
CN112039926A (en) * | 2020-11-04 | 2020-12-04 | 南京金宁汇科技有限公司 | Method for realizing double-layer chain type architecture of block chain |
CN112039926B (en) * | 2020-11-04 | 2021-03-26 | 南京金宁汇科技有限公司 | Method for realizing double-layer chain type architecture of block chain |
CN112598418B (en) * | 2020-12-09 | 2023-11-28 | 杭州复杂美科技有限公司 | Parallel chain supervision consensus method, device and storage medium |
CN112598418A (en) * | 2020-12-09 | 2021-04-02 | 杭州复杂美科技有限公司 | Parallel chain supervision consensus method, equipment and storage medium |
CN112948495B (en) * | 2021-03-05 | 2022-05-24 | 杭州复杂美科技有限公司 | Parallel chain constant block output method, computer device and storage medium |
CN112948495A (en) * | 2021-03-05 | 2021-06-11 | 杭州复杂美科技有限公司 | Parallel chain constant block output method, computer device and storage medium |
CN113098694A (en) * | 2021-04-09 | 2021-07-09 | 杭州链网科技有限公司 | Hybrid cross-chain consensus method |
CN113098694B (en) * | 2021-04-09 | 2023-12-08 | 杭州链网科技有限公司 | Mixed cross-chain consensus method |
CN114465830A (en) * | 2022-04-14 | 2022-05-10 | 北京理工大学 | Cross-chain data encryption method, device, equipment and storage medium |
CN114465830B (en) * | 2022-04-14 | 2022-06-24 | 北京理工大学 | Cross-link data encryption method, device, equipment and storage medium |
CN114862397A (en) * | 2022-07-06 | 2022-08-05 | 国网天津市电力公司培训中心 | Double-decoupling block chain distributed method based on double-chain structure |
CN114862397B (en) * | 2022-07-06 | 2022-09-30 | 国网天津市电力公司培训中心 | Double-decoupling block chain distributed method based on double-chain structure |
WO2024066010A1 (en) * | 2022-09-30 | 2024-04-04 | 蚂蚁区块链科技(上海)有限公司 | Method and apparatus for transaction processing in blockchain system, and blockchain system |
CN117592990A (en) * | 2024-01-04 | 2024-02-23 | 恒生电子股份有限公司 | Block chain transaction authentication method and device, computing equipment and storage medium |
CN117592990B (en) * | 2024-01-04 | 2024-04-26 | 恒生电子股份有限公司 | Block chain transaction authentication method and device, computing equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107909369A (en) | Based on the common recognition method, apparatus merchandised across chain and storage medium | |
CN107888562A (en) | Interconnect serobila architecture | |
CN107862216A (en) | Method for secret protection, device and the storage medium merchandised for anonymity across chain | |
Sun et al. | Voting-based decentralized consensus design for improving the efficiency and security of consortium blockchain | |
CN110417558A (en) | Verification method and device, the storage medium and electronic device of signature | |
CN110061889A (en) | Block chain performance test methods, device, equipment and storage medium | |
CN110602217B (en) | Block chain-based alliance management method, device, equipment and storage medium | |
CN110599178A (en) | Data processing method and device based on intelligent contract and storage medium | |
CN108959621A (en) | A kind of implementation method, device, equipment and the storage medium of block chain network | |
CN109102269A (en) | Transfer account method and device, block chain node and storage medium based on block chain | |
CN110704531B (en) | Block chain-based electricity consumption client credit management method and system | |
CN108769230A (en) | Transaction data storage method, device, server and storage medium | |
CN111612613A (en) | Block chain network with centralized system | |
CN108347483B (en) | Decentralized computing system based on double-layer network | |
CN107679149A (en) | A kind of data processing method and server | |
CN108228363A (en) | A kind of message method and device | |
WO2020065242A1 (en) | Method and system for transaction processing in decentralized network by network nodes in collaborative decision-making | |
CN110177124A (en) | Identity identifying method and relevant device based on block chain | |
CN106886722A (en) | Big data information processing method and device | |
CN109729068A (en) | Security breaches auditing system based on block chain technology | |
CN111858751A (en) | Data storage method and device based on block chain | |
CN109104419A (en) | A kind of generation method and system of block chain account | |
CN110599145A (en) | Data processing method and device based on intelligent contract and storage medium | |
CN108833133A (en) | Network configuration management method, apparatus and storage medium based on system for cloud computing | |
CN106874371A (en) | A kind of data processing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180413 |
|
RJ01 | Rejection of invention patent application after publication |