CN111311258B - Block chain-based trusted transaction method, device, system, equipment and medium - Google Patents

Block chain-based trusted transaction method, device, system, equipment and medium Download PDF

Info

Publication number
CN111311258B
CN111311258B CN202010063625.8A CN202010063625A CN111311258B CN 111311258 B CN111311258 B CN 111311258B CN 202010063625 A CN202010063625 A CN 202010063625A CN 111311258 B CN111311258 B CN 111311258B
Authority
CN
China
Prior art keywords
transaction
trusted
client
full
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010063625.8A
Other languages
Chinese (zh)
Other versions
CN111311258A (en
Inventor
蒋海
朱建国
商松
赵正涌
旷凯
刘建章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bubi Beijing Network Technology Co ltd
Original Assignee
Bubi Beijing Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bubi Beijing Network Technology Co ltd filed Critical Bubi Beijing Network Technology Co ltd
Priority to CN202010063625.8A priority Critical patent/CN111311258B/en
Publication of CN111311258A publication Critical patent/CN111311258A/en
Application granted granted Critical
Publication of CN111311258B publication Critical patent/CN111311258B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The embodiment of the application provides a trusted transaction method, a device, a system, equipment and a medium based on a blockchain; the method comprises the following steps: the trusted transaction client receives the block and SPV information in the block chain network system from the full-node client, and verifies the block validity, and the simple payment proves the SPV validity and the service rule validity; the trusted transaction device has a binding relationship with the full-node client; when the block legitimacy, the SPV legitimacy and the business rule legitimacy meet the requirements, judging that the transaction and the receipt are valid, and constructing a new transaction according to the business rule; the trusted transaction client constructs a trusted transaction from the new transaction and broadcasts the trusted transaction to the blockchain network system. By adopting the scheme in the application, the trusted transaction which is authorized, safe and accords with the business rule can be constructed.

Description

Block chain-based trusted transaction method, device, system, equipment and medium
Technical Field
The present disclosure relates to the field of blockchain technologies, and in particular, to a blockchain-based trusted transaction method, device, system, apparatus, and medium.
Background
In the prior art, the following points are simultaneously met in the construction of a trusted transaction: firstly, authorized creditability; secondly, the security trust of the private key; thirdly, the trustworthiness of the rules of the business characteristics.
Blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like, transaction is important content on a blockchain ledger, and transaction on the ledger has legality, namely is commonly known by all nodes. However, transactions on blockchains often only mean the validity of the signature, but cannot prove the credibility of the transaction, such as whether the transaction is authorized, whether the private key is secure, and whether the service meets the rules.
SGX (Intel Software Guard Extensions, intel software wizard extension) is an extension of the intel architecture for enhancing the security of software. The secure operation of legitimate software is encapsulated in enclaves, protecting it from malware, and neither privileged nor non-privileged software can access enclaves, i.e., once the software and data are located in the enclave, even if the operating system or sum VMM (Hypervisor) is breached, it cannot affect the code and data inside the container. However, SGX can only be used for protecting the security of the secret key, and ensuring that the signing process is not tampered maliciously; but cannot prove whether the transaction is authorized or not and whether the business meets the rule or not.
In the process of realizing the application, the inventor finds that in the prior art, one transaction is often constructed only to meet one point, and one trusted transaction which can realize authorization, safety and accordance with business rules cannot be truly constructed.
Disclosure of Invention
The embodiment of the application provides a block chain-based trusted transaction method, a block chain-based trusted transaction device, a block chain-based trusted transaction system, a block chain-based trusted transaction device and a block chain-based trusted transaction medium, which are used for solving the problem that a block chain-based trusted transaction which can simultaneously realize authorization, security and business rule compliance cannot be established in the prior art.
According to a first aspect of embodiments of the present application, there is provided a blockchain-based trusted transaction method, the method comprising: the trusted transaction client receives the block and SPV information in the block chain network system from the full-node client, and verifies the block validity, and the simple payment proves the SPV validity and the service rule validity; the trusted transaction device has a binding relationship with the full-node client; when the block legitimacy, the SPV legitimacy and the business rule legitimacy meet the requirements, judging that the transaction and the receipt are valid, and constructing a new transaction according to the business rule; the trusted transaction client constructs a trusted transaction from the new transaction and broadcasts the trusted transaction to the blockchain network system.
According to a second aspect of embodiments of the present application, there is provided a blockchain-based trusted transaction device, the device comprising: a receiving module for receiving block and SPV information in a blockchain network system from a full node client; the trusted transaction device has a binding relationship with the full-node client; the verification module is used for verifying the block legitimacy and simply paying to prove the SPV legitimacy and the service rule legitimacy; the first construction module is used for judging that the transaction and receipt are valid when the block legitimacy, the SPV legitimacy and the business rule legitimacy meet the requirements, and constructing a new transaction according to the business rule; and the second construction module is used for constructing a trusted transaction according to the new transaction and broadcasting the trusted transaction to the blockchain network system.
According to a third aspect of embodiments of the present application, there is provided a blockchain-based trusted transaction system, comprising: the full-node client is used for sending a request for applying for the trusted transaction client to the CA authorization management system; the request comprises a trusted contract address, a service identifier and a first signature message; after receiving the trusted transaction client program and the result message, storing the trusted transaction client program and operating the trusted transaction client after verifying that the result message is legal according to the trusted contract address, the service identifier, the public key of the full-node client and the second signature message; the CA authorization management system is used for generating a trusted transaction client program corresponding to the request after verifying that the request is legal according to the trusted contract address, the service identifier and the first signature message, and sending the trusted transaction client program and the result message back to the full-node client; the result message comprises a trusted contract address, a service identifier, a public key of the full-node client, a hash value of a trusted transaction client program and a second signature message; writing the binding relation formed by the public key of the all-node client and the public key of the trusted transaction client into a trusted contract; the trusted transaction client is a trusted transaction device as described above; the system comprises a blockchain network system and a trusted contract layer, wherein the blockchain network system comprises a blockchain layer and a trusted contract layer, the regional chain layer is used for checking the validity of a trusted transaction signature transaction, and the trusted contract layer is used for checking the validity of a CA signature in the trusted transaction.
According to a fourth aspect of embodiments of the present application, there is provided an electronic device, including: a display, a memory, one or more processors; and one or more modules stored in the memory and configured to be executed by the one or more processors, the one or more modules including instructions for performing the steps of the methods described above.
According to a fifth aspect of embodiments of the present application, there is provided a computer-readable storage medium having a computer program stored thereon; the computer program is executed by a processor to implement the above-described method.
By adopting the trusted transaction method, the device, the system, the equipment and the medium based on the blockchain, which are provided by the embodiment of the application, the trusted transaction client is newly added in the transaction system, the trusted transaction client receives the block and SPV information in the blockchain network system from the corresponding full-node client, and the block legitimacy and the simple payment prove the legitimacy of the SPV and the legitimacy of the business rule; when the block legitimacy, the SPV legitimacy and the business rule legitimacy meet the requirements, judging that the transaction and the receipt are valid, and constructing a trusted transaction according to the business rule; thereby simultaneously realizing the authorized, safe and credible transaction conforming to the business rules.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiments of the application and together with the description serve to explain the application and do not constitute an undue limitation to the application. In the drawings:
FIG. 1 illustrates a schematic diagram of a block chain based trusted transaction system 100 in accordance with an embodiment of the present application;
FIG. 2 illustrates a flow chart of a blockchain-based trusted transaction method in accordance with embodiments of the present application;
FIG. 3 shows a schematic diagram of a transaction tree according to an embodiment of the present application;
FIG. 4 illustrates a block diagram of a block chain based trusted transaction device in accordance with an embodiment of the present application;
fig. 5 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions and advantages of the embodiments of the present application more apparent, the following detailed description of exemplary embodiments of the present application is given with reference to the accompanying drawings, and it is apparent that the described embodiments are only some of the embodiments of the present application and not exhaustive of all the embodiments. It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other.
Fig. 1 shows a schematic diagram of a block chain based trusted transaction system 100 according to an embodiment of the present application.
As shown in fig. 1, a blockchain-based trusted transaction system 100 in accordance with embodiments of the present application includes:
a full node client 101 for sending a request for applying for a trusted transaction client to a CA entitlement management system 102; the request comprises a trusted contract address, a service identifier and a first signature message; and after the trusted transaction client program and the result message are received, the trusted transaction client program is stored and operated to obtain the trusted transaction client after the result message is verified to be legal according to the trusted contract address, the service identifier, the public key of the full-node client and the second signature message.
CA (Certification Authority) authorization management system 102, configured to verify that the request is legal according to the trusted contract address, the service identifier, and the first signature message, generate a trusted transaction client program corresponding to the request, and send the trusted transaction client program and a result message back to the full-node client; the result message comprises a trusted contract address, a service identifier, a public key of the full-node client, a hash value of a trusted transaction client program and a second signature message; and writing the binding relation formed by the public key of the all-node client and the public key of the trusted transaction client into the trusted contract.
The trusted transaction client 103 may be implemented as a trusted instruction set execution device, implementing a block header verification function, an SPV (simple paymentverification) verification function, a service adaptation function, a transaction signature function, a CA signature function, etc. in a trusted space. The trusted transaction client continuously synchronizes and verifies the data of the blockchain network in a trusted space, and after the business module is adapted to the target rule, the transaction is constructed by using the CA certificate and the blockchain private key and is sent to the blockchain network system.
It should be appreciated that the full node client and the trusted transaction client have a one-to-one binding relationship, but are not necessarily located on the same physical node, which is not a limitation of the present application.
It should be understood that the trusted transaction client has a correspondence with the business rule, i.e. for the same full-node client, there may be a corresponding trusted transaction client 1 for business rule a and another corresponding trusted transaction client 2 for business rule B, which is not limited in this application.
The blockchain network system 104 logically divided into two layers, one being the blockchain layer 1041; and secondly, a trusted contract layer 1042, which is used for verifying the validity of the CA signature in the trusted transaction.
In a specific implementation, the sending, by the full-node client, a request for applying for a trusted transaction client to the CA authorization management system may specifically include: the full node client downloads blocks in the blockchain network system and creates a public key of the full node clientPrivate key->And address->The full node client sends a request for applying for a trusted transaction client to the CA authorization management system, the request comprising: a trusted contract address, a service identification and a first signed message; the service identifier is a target service identifier of the full-node client and is used for inquiring a corresponding service rule by the CA authorization management system; the first signature message is that the full node client adopts private key for trusted contract address and business identification in the request>And signing the obtained message.
In specific implementation, after the CA authorization management system verifies that the request is legal according to the trusted contract address, the service identifier and the first signature message, a trusted transaction client program corresponding to the request is generated, and the method specifically comprises the following steps: after receiving the request from the full-node client, the CA authorization management system detects whether the first signature message is legal or not, and checks whether the trusted contract address exists or not and whether the service identifier exists in the service library or not; when the first signature message is legal, the trusted contract address exists and the service identifier exists in the service library, judging that the request is legal; the CA authorization management system loads a rule source code B corresponding to the service identification in the service library i And generates a trusted transaction client public keyTrusted transaction client private key>Trusted transaction client Address->CA certificate C of trusted transaction client i The method comprises the steps of carrying out a first treatment on the surface of the The CA authorization management system uses the rule source code B i Trusted transaction client public key +.>Trusted transaction client private key>Trusted transaction client Address->CA certificate C of trusted transaction client i Compiling in a trusted space in a hard-coded manner to generate a trusted transaction client program.
FIG. 2 illustrates a flow chart of a blockchain-based trusted transaction method in accordance with embodiments of the present application.
As shown in fig. 2, the blockchain-based trusted transaction method according to an embodiment of the present application includes the following steps:
s201, the full-node client applies for a trusted transaction client from the CA authorization management system.
In particular implementations, the full node client may send a request to the CA entitlement management system for applying for a trusted transaction client; the request includes the trusted contract address, the service identification, and the first signed message.
In a specific implementation, the sending, by the full-node client, a request for applying for a trusted transaction client to the CA authorization management system may specifically include: the full node client downloads blocks in the blockchain network system and creates a public key of the full node client Private key->And address->The full node client sends a request for applying for a trusted transaction client to the CA authorization management system, the request comprising: a trusted contract address, a service identification and a first signed message; wherein, the service identifier is a target service identifier of the full-node client, and is used for the CA authorization management system to inquire about the corresponding serviceA business rule; the first signature message is that the full node client adopts private key for trusted contract address and business identification in the request>And signing the obtained message.
Specifically, S201 may include the steps of:
s2011, all-node client R i Downloading block information of the block chain network system and creating a public key, a private key and an address of the block information:
s2012, use E i R represents i Submitting the application message R to CA authorization management system S i The submitted application message mainly contains the following:
credible_contract_address trusted contract address
business_id Service ID
signature Signature information of current message
Trusted contract address: refers to trusted contract addresses that exist in the blockchain network that must exist and be configured in the CA entitlement management system.
Service identification, i.e. service ID: the target business rule ID is configured in the CA authorization management system and is used for the authorization management system to issue a trusted transaction client for processing the specified business rule.
First signed message: is to adopt R i Private key of (a)And signing the information of the structural body to obtain the information which is used for checking the legality of the information.
S202, the CA authorization management system authorizes the trusted transaction client.
In the implementation, the CA authorization management system can verify that the request is legal according to the trusted contract address, the service identifier and the first signature message, generate a trusted transaction client program corresponding to the request, and send the trusted transaction client program and a result message back to the full-node client; the resulting message includes the trusted contract address, the service identification, the public key of the full node client, and the hash value of the trusted transaction client program, and the second signed message. The CA authorization management system writes the binding relation formed by the public key of the full-node client and the public key of the trusted transaction client into the trusted contract.
In a specific implementation, after verifying that the request is legal according to the trusted contract address, the service identifier and the first signature message, the CA authorization management system generates a trusted transaction client program corresponding to the request, which specifically may include: after receiving the request from the full-node client, the CA authorization management system detects whether the first signature message is legal or not, and checks whether the trusted contract address exists or not and whether the service identifier exists in the service library or not; when the first signature message is legal, the trusted contract address exists and the service identifier exists in the service library, judging that the request is legal; the CA authorization management system loads a rule source code B corresponding to the service identification in the service library i And generates a trusted transaction client public keyTrusted transaction client private key>Trusted transaction client Address->CA certificate C of trusted transaction client i The method comprises the steps of carrying out a first treatment on the surface of the The CA authorization management system uses the rule source code B i Trusted transaction client public key +.>Trusted transaction client private key>Trusted transaction client Address->CA certificate C of trusted transaction client i Compiling in a trusted space in a hard-coded manner to generate a trusted transaction client program.
Specifically, S202 may include the steps of:
s2021, CA authorization management System S receives the data from R i Signed message E i Then, detecting signature legitimacy and parameter legitimacy, wherein the signature legitimacy and the parameter legitimacy mainly comprise whether a trusted contract address exists or not and whether a service ID exists in a service library of the user or not;
s2022, CA authorization management System S check message E i After legal, loading corresponding rule source code B in service library i Generating a public key, a private key and an address of a trusted transaction client:generating CA certificate C i
S2023, CA authorization management system S starts automated compiling task, B iC i Compiling it in a hard-coded manner in a trusted space of a trusted transaction client, generating a trusted transaction client program, i.e. alternatively referred to as a trusted instruction set hardware program or SGX trusted transaction program G i
S2024, CA authorization management systemS generates result message and trusted transaction client program G i At the same time return to R i . Wherein the result message contains the following:
credible_contract_address trusted contract address
business_id Service ID
pub_address Public key address of applicant
file_hash Hash of trusted transaction client
signature Signature information of current message
1. Trusted contract address: the description of the trusted contract address in S2012 is repeated without further description.
2. Service ID: the description of the service ID in S2012 is repeated, and is not repeated.
3. Public key address of applicant: the public key address of the signed message in S2012, i.e. the public key address of the full node client applying for trusted transaction clients, i.e. R i A kind of electronic device
4. Hash of trusted instruction set hardware program: i.e. trusted transaction client in S2023Procedure G i The hash value of (c) is used for ensuring that the file is not tampered in the transmission process.
5. Signing the message: the certificate C of the CA authorization management system S is used for guaranteeing the authenticity of the message according to the signed message after the field is removed.
S2025, the CA authorization management system S forms the public keys of the full node client and the corresponding trusted transaction client into a binding relationshipAnd written into the trusted smart contract for verifying the correctness of the CA signature of the trusted transaction.
S203, the full-node client running program obtains the trusted transaction client.
When the method is implemented, after the all-node client receives the trusted transaction client program and the result message, the trusted transaction client program can be stored and operated to obtain the trusted transaction client after the result message is verified to be legal according to the trusted contract address, the service identifier, the public key of the all-node client and the second signature message.
It should be understood that S201 to S203 described above may be performed only when the full-node client performs a trusted transaction corresponding to a certain business rule for the first time, and S204 may be performed directly when the full-node client subsequently performs a trusted transaction corresponding to the business rule again, without repeatedly performing S201 to S203.
S204, the trusted transaction client processes the block and signs the trusted transaction.
In specific implementation, the trusted transaction client receives the block and SPV information in the block chain network system from the full-node client, and verifies the block validity and simple payment to prove the SPV validity and the service rule validity; the trusted transaction client has a binding relationship with the full-node client; when the block legitimacy, the SPV legitimacy and the business rule legitimacy meet the requirements, judging that the transaction and the receipt are valid, and constructing a new transaction according to the business rule; the trusted transaction client constructs a trusted transaction from the new transaction and broadcasts the trusted transaction to the blockchain network system.
In specific implementation, the trusted transaction client checks block validity, SPV validity and business rule validity, and may specifically include: the trusted transaction client performs block validity verification according to the verification rule of the blockchain network, encrypts and stores legal block heads by using a specific sealing key; the trusted transaction client performs SPV validity verification according to the transaction tree in the block head and the Merker tree root hash value of the account tree, and judges that the transaction is legal and obtains each legal transaction and corresponding receipts thereof when the calculated root hash value is consistent with the root hash value in the block head; the trusted transaction client performs business rule validity check on each legal transaction and the corresponding receipt, and when the legal transaction is consistent with the source address, the target address and the transaction parameters of the business rule and the receipt state is true, the validity of the transaction block, the validity of the SPV and the validity of the business rule are judged to meet the requirements.
In implementation, the trusted transaction client constructs a trusted transaction according to the new transaction, which may specifically include: the new transaction comprises a target address, a source address, transaction parameters of the transaction service rule and a signature field; wherein the target address is the trusted transaction client address; the source address is a trusted contract address; the trusted transaction client takes the transaction parameters of the new transaction, signs the transaction parameters by using the CA certificate, and then adds the transaction parameters to obtain another new transaction; and the trusted transaction client takes another new transaction, sets the signature field to be empty, signs the second new transaction by using the private key, and fills the second new transaction into the signature field to obtain the trusted transaction.
Specifically, S204 may include the steps of:
s2041 trusted transaction client G i After start-up, receive block and SPV information in the blockchain network system, wherein the part of the functions are performed by the full node client R i Pass to trusted transaction client G by API means i
S2042 trusted transaction client G i Starting a block verification module to verify the validity of the block according to the verification rule of the block chain network;
s2043 for legal zoneBlock of block header, trusted transaction client G i Starting an SPV checking module, checking whether SPV is legal or not according to Merker tree root hash of block head transaction tree and account tree, and finally obtaining transaction T i And receipt R i The method comprises the steps of carrying out a first treatment on the surface of the The principle is as follows:
taking the transaction tree shown in fig. 3 as an example, all the merck transaction trees store information of all transactions by default, but this information is too huge, and the whole structure is transferred for verifying the Target Data information, which is inefficient. The light merck tree reduces the Data quantity, only the Data of the Target Data is needed to be recorded from the bottom, the relevant leaf_hash value is recorded upwards to form the light merck tree, and finally the Target Data is proved to be legal through the root hash value. And the root hash value is recorded in the block head, and if the calculated root hash value of the merck tree is consistent with the root hash value recorded in the block head, the transaction or receipt is judged to be legal.
S2044 trusted transaction client G i Starting a service adaptation module to use a transaction T i And receipt X i Check compliance with business rule B i The check rule is: when the legal transaction is consistent with the source address, the target address and the transaction parameters of the business rule and the state of the receipt is true, the judging result is valid. Specifically, the judgment code is as follows:
only if all rules check match in trusted space and when the receipt result is true, the transaction and receipt are considered valid and are based on business rule B i Construction of a New transaction T j . The transaction core parameters include the following:
source_address source and destinationAddress of the site
dest_address Target address
input Transaction parameters
signature Signature information
Source address: refers to a trusted transaction client G i Account address of (a)
Target address: like the trusted contract address in S2012.
input: refers to the business rule B in the transaction i Including business rule attributes and CA certificate C i Signature data.
signature: signature data.
S2045 trusted instruction set hardware transaction program G i Starting a CA signature module to obtain a new transaction T in S2044 j And uses CA certificate C i Signing the input field and attaching to the input data; forming another new transaction;
s2046 trusted transaction client G i Starting a transaction signature module, taking the new transaction in S2045, setting a signature field to be empty, and then using a private keyAfter signing the field, filling in the signature field to obtain a new transaction T k The transaction is a trusted transaction;
s2047 trusted transaction client G i Trusted transaction T k Broadcast to the blockchain network system.
S205, the blockchain network system verifies the trusted transaction.
When the method is implemented, after the block chain network receives the trusted transaction, the validity of the transaction signature is verified; in the process of executing the transaction, triggering a trusted contract layer to analyze transaction parameters in the trusted transaction to acquire service rule attributes and CA certificates; the trusted contract layer verifies the legitimacy of the CA certificate and the legitimacy of the transaction parameters; and when the both are legal, corresponding processing is executed according to the business rule, and the result is written into the blockchain network.
Specifically, S205 may include the steps of:
s2051, the blockchain network system receives the transaction T k Packaging node verificationIf the signature transaction accords with the blockchain transaction rule, if the transaction signature is legal, the transaction nonce value is legal, the source address balance is sufficient, the transaction is packed, and the signature verification of the first layer is legal at the moment;
s2052, node packaging transaction T k During the process of executing a transaction and triggering the trusted contract layer to parse T k Input parameters in the transaction have business rule attributes, and also contain CA signature results;
s2053, the intelligent contract checks whether the CA signature is legal or not, and is matched with the one set in step S2025Verification ofIf the signature is consistent, the certificate signature is legal, and the transaction is credible;
s2054, checking logic of input parameters according to the trusted contract, and according to the business logic rule B i And performing corresponding processing, and writing the result execution into the blockchain network.
By adopting the trusted transaction method based on the blockchain, which is provided by the embodiment of the application, the trusted transaction client is newly added in the transaction system, the trusted transaction client receives the block and SPV information in the blockchain network system from the corresponding full-node client, and the block legitimacy and the simple payment prove the SPV legitimacy and the business rule legitimacy; when the block legitimacy, the SPV legitimacy and the business rule legitimacy meet the requirements, judging that the transaction and the receipt are valid, and constructing a trusted transaction according to the business rule; thereby simultaneously realizing the authorized, safe and credible transaction conforming to the business rules.
In addition, based on the technologies of CA certificates, trusted transaction clients, a block chain validity verification algorithm and the like, a double-signature framework conforming to business rules is creatively constructed and is used for constructing the trusted transaction in the block chain system.
Based on the same inventive concept, the embodiment of the present application further provides a trusted transaction device based on a blockchain, and since the principle of solving the problem of the device is similar to that of the method provided in the foregoing, the implementation of the device may refer to the implementation of the method, and the repetition is omitted.
Fig. 4 shows a block diagram of a block chain based trusted transaction device in accordance with an embodiment of the present application.
As shown in fig. 4, a blockchain-based trusted transaction device 400 according to an embodiment of the present application includes: a receiving module 401 for receiving block and SPV information in a blockchain network system from a full node client; the trusted transaction device has a binding relationship with the full-node client; a checking module 402, configured to check block validity, and simply pay to prove SPV validity and service rule validity; a first construction module 403, configured to determine that the transaction and receipt are valid when the block validity, the SPV validity, and the business rule validity all meet the requirements, and construct a new transaction according to the business rule; a second construction module 404 for constructing a trusted transaction from the new transaction and broadcasting the trusted transaction to the blockchain network system.
In particular implementations, the verification module may be configured to: performing block validity verification according to a verification rule of a block chain network, encrypting and storing legal block heads by using a specific sealing key; SPV validity verification is carried out according to the transaction tree in the block head and the Merck tree root hash value of the account tree, when the calculated root hash value is consistent with the root hash value in the block head, the transaction is judged to be legal, and each legal transaction and a receipt corresponding to the legal transaction are obtained; and carrying out business rule validity verification on each legal transaction and the corresponding receipt, and judging that the validity of the transaction block, the validity of the SPV and the validity of the business rule meet the requirements when the legal transaction is consistent with the source address, the target address and the input parameters of the business rule and the receipt state is true.
In particular implementations, constructing a trusted transaction from a new transaction may include: the new transaction comprises a target address, a source address, input parameters of the transaction service rule and a signature field; wherein the target address is the trusted transaction client address; the source address is a trusted contract address; the trusted transaction client takes input parameters of the new transaction, signs the input parameters by using the CA certificate, and then adds the input parameters to obtain another new transaction; and the trusted transaction client takes another new transaction, sets the signature field to be empty, signs the second new transaction by using the private key, and fills the second new transaction into the signature field to obtain the trusted transaction.
By adopting the trusted transaction device based on the blockchain, which is provided by the embodiment of the application, the trusted transaction client is newly added in the transaction system, the trusted transaction client receives the block and SPV information in the blockchain network system from the corresponding full-node client, and the block legitimacy and the simple payment prove the SPV legitimacy and the business rule legitimacy; when the block legitimacy, the SPV legitimacy and the business rule legitimacy meet the requirements, judging that the transaction and the receipt are valid, and constructing a trusted transaction according to the business rule; thereby simultaneously realizing the authorized, safe and credible transaction conforming to the business rules.
Based on the same inventive concept, the embodiment of the present application further provides an electronic device, and since the principle of solving the problem by the device is similar to that of the method provided by the embodiment of the present application, the implementation of the device may refer to the implementation of the method, and the repetition is omitted.
Fig. 5 shows a schematic structural diagram of an electronic device according to an embodiment of the present application.
As shown in fig. 5, an electronic device 500 according to an embodiment of the present application includes: a display 501, a memory 502, one or more processors 503; and one or more modules stored in the memory and configured to be executed by the one or more processors, the one or more modules including instructions for performing the steps in the blockchain-based trusted transaction methods of embodiments of the present application.
By adopting the electronic equipment provided by the embodiment of the application, the trusted transaction client is newly added in the transaction system, the trusted transaction client receives the block and SPV information in the block chain network system from the corresponding full-node client, and the block legitimacy and the simple payment prove the SPV legitimacy and the business rule legitimacy; when the block legitimacy, the SPV legitimacy and the business rule legitimacy meet the requirements, judging that the transaction and the receipt are valid, and constructing a trusted transaction according to the business rule; thereby simultaneously realizing the authorized, safe and credible transaction conforming to the business rules.
Based on the same inventive concept, a computer readable storage medium is also provided in the embodiments of the present application, and since the principle of solving the problem by using the computer readable storage medium is similar to that of the method provided in the embodiments of the present application, the implementation of the computer readable storage medium may refer to the implementation of the method, and the repetition is omitted.
A computer-readable storage medium according to an embodiment of the present application has a computer program stored thereon; the computer program is executed by a processor to implement the above-described method.
By adopting the computer readable storage medium provided by the embodiment of the application, the trusted transaction client is newly added in the transaction system, the trusted transaction client receives the block and SPV information in the block chain network system from the corresponding full-node client, and the block legitimacy and the simple payment prove the legitimacy of the SPV and the legitimacy of the business rule; when the block legitimacy, the SPV legitimacy and the business rule legitimacy meet the requirements, judging that the transaction and the receipt are valid, and constructing a trusted transaction according to the business rule; thereby simultaneously realizing the authorized, safe and credible transaction conforming to the business rules.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various modifications and variations can be made in the present application without departing from the spirit or scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims and the equivalents thereof, the present application is intended to cover such modifications and variations.

Claims (14)

1. A blockchain-based trusted transaction method, the method comprising:
The full-node client sends a request for applying for the trusted transaction client to the CA authorization management system; the request comprises a trusted contract address, a service identifier and a first signature message;
the CA authorization management system verifies that the request is legal according to the trusted contract address, the service identifier and the first signature message, generates a trusted transaction client program corresponding to the request, and sends the trusted transaction client program and a result message back to the full-node client; the result message comprises the trusted contract address, a service identifier, a public key of the full-node client, a hash value of the trusted transaction client program and a second signature message;
the CA authorization management system forms a binding relationship between the public key of the full-node client and the public key of the trusted transaction client to write into a trusted contract;
after the all-node client receives the trusted transaction client program and the result message, the result message is verified to be legal according to the trusted contract address, the service identifier, the public key of the all-node client and the second signature message, and then the trusted transaction client program is stored and operated to obtain the trusted transaction client;
The trusted transaction client receives the block and simple payment certificate (SPV) information in the block chain network system from the full-node client and verifies the block validity, the SPV validity and the business rule validity; wherein the trusted transaction client has a binding relationship with the full-node client;
when the block legitimacy, the SPV legitimacy and the business rule legitimacy meet the requirements, judging that the transaction and the receipt are valid, and constructing a new transaction according to the business rule;
the trusted transaction client constructs a trusted transaction according to the new transaction and broadcasts the trusted transaction to the blockchain network system.
2. The method according to claim 1, wherein the full node client sends a request for applying for a trusted transaction client to the CA authorization management system, in particular comprising:
the method comprises the steps that a full-node client downloads blocks in a blockchain network system and creates a public key private key and an address of the full-node client
The full node client sends a request for applying for a trusted transaction client to the CA authorization management system, wherein the request comprises: a trusted contract address, a service identification and a first signed message; the service identifier is a target service identifier of the full-node client and is used for inquiring a corresponding service rule by the CA authorization management system; the first signature message is a message obtained after the full-node client signs the trusted contract address and the service identifier in the request by adopting a private key.
3. The method according to claim 2, wherein the CA authorization management system generates the trusted transaction client program corresponding to the request after verifying that the request is legal according to the trusted contract address, the service identifier and the first signature message, specifically including:
after receiving the request from the full-node client, the CA authorization management system detects whether the first signature message is legal or not, and checks whether the trusted contract address exists or not and whether the service identifier exists in a service library or not;
when the first signature message is legal, the trusted contract address exists and the service identifier exists in a service library, judging that the request is legal;
the CA authorization management system loads a rule source code Bi corresponding to the service identifier in the service library and generates a trusted transaction client address of the public key of the trusted transaction client and a CA certificate Ci of the trusted transaction client;
the CA authorization management system compiles the rule source code Bi, the trusted transaction client public key trusted transaction client private key trusted transaction client address and the CA certificate Ci of the trusted transaction client in a trusted space in a hard coding mode to generate a trusted transaction client program.
4. A method according to claim 3, wherein the trusted transaction client verifies block legitimacy, SPV legitimacy and business rule legitimacy, comprising in particular:
the trusted transaction client performs block validity verification according to the verification rule of the block chain network, encrypts and stores legal block heads through a sealing key;
the trusted transaction client performs SPV validity verification according to the transaction tree in the block head and the Merker tree root hash value of the account tree, and judges that the transaction is legal and obtains each legal transaction and corresponding receipts thereof when the calculated root hash value is consistent with the root hash value in the block head;
and the trusted transaction client performs business rule validity check on each legal transaction and the corresponding receipt thereof, and judges that the legal transaction block validity, the SPV validity and the business rule validity all meet the requirements when the legal transaction is consistent with the source address, the target address and the transaction parameters of the business rule and the receipt state is true.
5. The method according to claim 1, characterized in that the trusted transaction client constructs a trusted transaction from the new transaction, in particular comprising:
the new transaction comprises a target address, a source address, transaction parameters of the transaction service rule and a signature field; wherein the target address is the trusted transaction client address; the source address is a trusted contract address; the transaction parameters comprise business rule attributes and CA certificates;
The trusted transaction client takes the transaction parameters of the new transaction, signs the transaction parameters by using the CA certificate, and then adds the transaction parameters to obtain another new transaction;
and the trusted transaction client takes the other new transaction, sets the signature field to be empty, signs the other new transaction by using a private key, and fills the signature field to obtain the trusted transaction.
6. The method of claim 1, further comprising, after the trusted transaction client broadcasts the trusted transaction to the blockchain network:
after the block chain network receives the trusted transaction, verifying the validity of the transaction signature; in the process of executing the transaction, triggering a trusted contract layer to analyze transaction parameters in the trusted transaction, and acquiring the business rule attribute and the CA certificate;
the trusted contract layer verifies the validity of the CA certificate and the validity of the transaction parameters; and when the service rules are legal, corresponding processing is executed according to the service rules, and the result is written into the blockchain network.
7. A blockchain-based trusted transaction device, the device comprising:
a receiving module for receiving block and SPV information in a blockchain network system from a full node client; wherein the trusted transaction device has a binding relationship with the full-node client;
The verification module is used for verifying the block legitimacy and simply paying to prove the SPV legitimacy and the service rule legitimacy;
the first construction module is used for judging that the transaction and receipt are valid when the block legitimacy, the SPV legitimacy and the business rule legitimacy meet the requirements, and constructing a new transaction according to the business rule;
the second construction module is used for constructing a trusted transaction according to the new transaction and broadcasting the trusted transaction to the blockchain network system;
the block chain-based trusted transaction device is further used for sending a request for applying for a trusted transaction client to the CA authorization management system through the full-node client; the request comprises a trusted contract address, a service identifier and a first signature message; after verifying that the request is legal according to the trusted contract address, the service identifier and the first signature message through the CA authorization management system, generating a trusted transaction client program corresponding to the request, and sending the trusted transaction client program and a result message back to the full-node client; the result message comprises the trusted contract address, a service identifier, a public key of the full-node client, a hash value of the trusted transaction client program and a second signature message; the CA authorization management system is used for forming a binding relationship between the public key of the all-node client and the public key of the trusted transaction client to write into a trusted contract; after receiving the trusted transaction client program and the result message through the full-node client, verifying that the result message is legal according to the trusted contract address, the service identifier, the public key of the full-node client and the second signature message, storing the trusted transaction client program and operating to obtain the trusted transaction client.
8. The apparatus of claim 7, wherein the verification module is specifically configured to:
performing block validity verification according to a verification rule of a block chain network, encrypting and storing legal block heads through a sealing key;
SPV validity verification is carried out according to the transaction tree in the block head and the Merck tree root hash value of the account tree, when the calculated root hash value is consistent with the root hash value in the block head, the transaction is judged to be legal, and each legal transaction and a receipt corresponding to the legal transaction are obtained;
and carrying out business rule validity verification on each legal transaction and receipts corresponding to the legal transaction, and judging that the validity of the transaction block, the validity of the SPV and the validity of the business rule meet the requirements when the legal transaction is consistent with the source address, the target address and the transaction parameters of the business rule and the state of the receipt is true.
9. The apparatus of claim 7, wherein constructing a trusted transaction from the new transaction comprises:
the new transaction comprises a target address, a source address, transaction parameters of the transaction service rule and a signature field; wherein the target address is the trusted transaction client address; the source address is a trusted contract address;
The trusted transaction client takes the transaction parameters of the new transaction, signs the transaction parameters by using a CA certificate, and then adds the transaction parameters to obtain another new transaction;
and the trusted transaction client takes the other new transaction, sets the signature field to be empty, signs the other new transaction by using a private key, and fills the signature field to obtain the trusted transaction.
10. A blockchain-based trusted transaction system, comprising:
the full-node client is used for sending a request for applying for the trusted transaction client to the CA authorization management system; the request comprises a trusted contract address, a service identifier and a first signature message; after receiving the trusted transaction client program and the result message, verifying that the result message is legal according to the trusted contract address, the service identifier, the public key of the full-node client and the second signature message, storing the trusted transaction client program and operating to obtain the trusted transaction client;
the CA authorization management system is used for generating a trusted transaction client program corresponding to the request after verifying that the request is legal according to the trusted contract address, the service identifier and the first signature message, and sending the trusted transaction client program and the result message back to the full-node client; the result message comprises the trusted contract address, a service identifier, a public key of the full-node client, a hash value of the trusted transaction client program and a second signature message; and writing the binding relation formed by the public key of the all-node client and the public key of the trusted transaction client into a trusted contract;
A trusted transaction client being a trusted transaction device as claimed in any one of claims 7 to 9;
the system comprises a blockchain network system and a trusted contract layer, wherein the blockchain network system comprises a blockchain layer and a trusted contract layer, the blockchain layer is used for verifying the validity of a CA signature in a trusted transaction, and the trusted contract layer is used for verifying the validity of the CA signature in the trusted transaction.
11. The system according to claim 10, wherein the full node client sends a request to the CA entitlement management system for applying for trusted transaction clients, in particular comprising:
the method comprises the steps that a full-node client downloads blocks in a blockchain network system and creates a public key private key and an address of the full-node client
The full node client sends a request for applying for a trusted transaction client to the CA authorization management system, wherein the request comprises: a trusted contract address, a service identification and a first signed message; the service identifier is a target service identifier of the full-node client and is used for inquiring a corresponding service rule by the CA authorization management system; the first signature message is a message obtained after the full-node client signs the trusted contract address and the service identifier in the request by adopting a private key.
12. The system of claim 11, wherein the CA authorization management system, after verifying that the request is legal according to the trusted contract address, the service identifier and the first signature message, generates a trusted transaction client program corresponding to the request, specifically includes:
after receiving the request from the full-node client, the CA authorization management system detects whether the first signature message is legal or not, and checks whether the trusted contract address exists or not and whether the service identifier exists in a service library or not;
when the first signature message is legal, the trusted contract address exists and the service identifier exists in a service library, judging that the request is legal;
the CA authorization management system loads a rule source code Bi corresponding to the service identifier in the service library and generates a trusted transaction client address of the public key of the trusted transaction client and a CA certificate Ci of the trusted transaction client;
the CA authorization management system compiles the rule source code Bi, the trusted transaction client public key trusted transaction client private key trusted transaction client address and the CA certificate Ci of the trusted transaction client in a trusted space in a hard coding mode to generate a trusted transaction client program.
13. An electronic device, the electronic device comprising: a display, a memory, one or more processors; and one or more modules stored in the memory and configured to be executed by the one or more processors, the one or more modules comprising instructions for performing the steps of the method of any of claims 1-6.
14. A computer-readable storage medium, characterized in that a computer program is stored thereon; the computer program being executed by a processor to implement the method of any of claims 1-6.
CN202010063625.8A 2020-01-20 2020-01-20 Block chain-based trusted transaction method, device, system, equipment and medium Active CN111311258B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010063625.8A CN111311258B (en) 2020-01-20 2020-01-20 Block chain-based trusted transaction method, device, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010063625.8A CN111311258B (en) 2020-01-20 2020-01-20 Block chain-based trusted transaction method, device, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN111311258A CN111311258A (en) 2020-06-19
CN111311258B true CN111311258B (en) 2023-07-21

Family

ID=71146862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010063625.8A Active CN111311258B (en) 2020-01-20 2020-01-20 Block chain-based trusted transaction method, device, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN111311258B (en)

Families Citing this family (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333160A (en) * 2020-10-23 2021-02-05 浪潮(北京)电子信息产业有限公司 Block chain transaction information processing method and system, electronic device and storage medium
CN113269644B (en) * 2021-05-28 2023-06-02 长沙链奇科技有限公司 Transaction processing method and device based on blockchain
CN114817229B (en) * 2022-06-21 2022-09-20 布比(北京)网络技术有限公司 Block chain based score clearing data processing method and block chain system
CN116112293B (en) * 2023-04-12 2023-06-23 中国信息通信研究院 Block chain-based data trusted transaction method and device, equipment and medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488431A (en) * 2015-11-30 2016-04-13 布比(北京)网络技术有限公司 Authority management method and device for block chain system
WO2018119930A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Transaction verification processing method, apparatus and node device
CN108769173A (en) * 2018-05-21 2018-11-06 阿里体育有限公司 The block chain implementation method and equipment of the intelligent contract of operation
CN109102296A (en) * 2018-08-31 2018-12-28 北京八分量信息科技有限公司 A kind of node common recognition method and system
CN110417790A (en) * 2019-08-02 2019-11-05 中国工商银行股份有限公司 Block chain system of real name queuing system and method

Family Cites Families (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4120135B2 (en) * 2000-06-15 2008-07-16 ソニー株式会社 Information processing system and information processing method using encryption key block, and program providing medium
CN107679045B (en) * 2016-08-01 2021-08-31 华为技术有限公司 Copyright authorization management method and system
US11138827B2 (en) * 2016-09-15 2021-10-05 Simpsx Technologies Llc Implementations of a computerized business transaction exchange for various users
CN106385319B (en) * 2016-09-29 2020-11-27 江苏通付盾科技有限公司 Method and system for verifying information in block chain network
CN106656974B (en) * 2016-10-17 2019-07-16 江苏通付盾科技有限公司 The grouping common recognition method and system of block chain
CN106875254B (en) * 2017-01-20 2021-03-19 暨南大学 Android malicious application program control method based on block chain technology
US11107048B2 (en) * 2017-04-17 2021-08-31 International Business Machines Corporation Providing out-of-band verification for blockchain transactions
CN107317672A (en) * 2017-05-10 2017-11-03 广东网金控股股份有限公司 A kind of light weight terminating machine block catenary system
CN108122165B (en) * 2017-12-15 2020-10-30 北京中电普华信息技术有限公司 Block chain consensus method and system
CN108229962B (en) * 2018-01-04 2021-04-06 众安信息技术服务有限公司 Permission management method and system based on block chain
CN108540553B (en) * 2018-04-08 2019-08-13 中国联合网络通信集团有限公司 Internet of things data management method, platform and equipment
GB201807389D0 (en) * 2018-05-04 2018-06-20 Hubii As Controlling transactions on a network
CN108648081B (en) * 2018-05-07 2020-08-18 北京柏链基石科技有限公司 Transaction processing method and device based on block chain and electronic equipment
CN108805569A (en) * 2018-05-29 2018-11-13 阿里巴巴集团控股有限公司 Transaction processing method and device, electronic equipment based on block chain
CN108881459A (en) * 2018-07-02 2018-11-23 甘肃山呼信息技术有限公司 A kind of public block catenary system of Highly Scalable towards practical application
CN109242663A (en) * 2018-09-05 2019-01-18 金蝶软件(中国)有限公司 A kind of bookkeeping methods and system based on block chain technology
CN110288480B (en) * 2019-06-28 2023-06-09 深圳前海微众银行股份有限公司 Private transaction method and device for blockchain
CN110472979B (en) * 2019-07-16 2023-05-26 中央财经大学 Verification method of cross host object based on blockchain
CN110471931A (en) * 2019-08-13 2019-11-19 山大地纬软件股份有限公司 A kind of digital asset trade identity maintaining method based on transaction in assets chain
CN110543488B (en) * 2019-09-11 2022-06-07 深圳市迅雷网络技术有限公司 Verification node updating method, device and equipment

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488431A (en) * 2015-11-30 2016-04-13 布比(北京)网络技术有限公司 Authority management method and device for block chain system
WO2018119930A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Transaction verification processing method, apparatus and node device
CN108769173A (en) * 2018-05-21 2018-11-06 阿里体育有限公司 The block chain implementation method and equipment of the intelligent contract of operation
CN109102296A (en) * 2018-08-31 2018-12-28 北京八分量信息科技有限公司 A kind of node common recognition method and system
CN110417790A (en) * 2019-08-02 2019-11-05 中国工商银行股份有限公司 Block chain system of real name queuing system and method

Also Published As

Publication number Publication date
CN111311258A (en) 2020-06-19

Similar Documents

Publication Publication Date Title
CN111090876B (en) Contract calling method and device
CN111311258B (en) Block chain-based trusted transaction method, device, system, equipment and medium
CN103685138B (en) The authentication method of the Android platform application software that mobile interchange is online and system
US8171306B2 (en) Universal secure token for obfuscation and tamper resistance
US7877604B2 (en) Proof of execution using random function
US10880100B2 (en) Apparatus and method for certificate enrollment
US20040088541A1 (en) Digital-rights management system
KR100702499B1 (en) System and method for guaranteeing software integrity
US10686612B2 (en) Cryptographic data
CN110601855B (en) Root certificate management method and device, electronic equipment and storage medium
US20210391991A1 (en) Linking identities in a distributed database
CN110708162B (en) Resource acquisition method and device, computer readable medium and electronic equipment
CN104012036A (en) Combined digital certificate
CN108768975A (en) Support the data integrity verification method of key updating and third party's secret protection
US8745375B2 (en) Handling of the usage of software in a disconnected computing environment
CN116707983A (en) Authorization authentication method and device, access authentication method and device, equipment and medium
WO2022205961A1 (en) Method and apparatus for updating blockchain domain name configuration
CN114205086A (en) Block chain-based digital certificate processing method and device
CN113592638A (en) Transaction request processing method and device and alliance chain
US10177918B2 (en) User permission check system
CN114567444B (en) Digital signature verification method, device, computer equipment and storage medium
CN111818094B (en) Identity registration method, device and equipment
US11770263B1 (en) Systems and methods for enforcing cryptographically secure actions in public, non-permissioned blockchains using bifurcated self-executing programs comprising shared digital signature requirements
KR101054075B1 (en) Method and device to restrict use of protection key
CN116167766A (en) Asset evidence-passing method and related device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant