CN111339197A - Block chain data processing method and device, electronic equipment and medium - Google Patents

Block chain data processing method and device, electronic equipment and medium Download PDF

Info

Publication number
CN111339197A
CN111339197A CN202010120525.4A CN202010120525A CN111339197A CN 111339197 A CN111339197 A CN 111339197A CN 202010120525 A CN202010120525 A CN 202010120525A CN 111339197 A CN111339197 A CN 111339197A
Authority
CN
China
Prior art keywords
node
data
block
trusted
nodes
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010120525.4A
Other languages
Chinese (zh)
Inventor
肖伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Baidu Online Network Technology Beijing Co Ltd
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202010120525.4A priority Critical patent/CN111339197A/en
Publication of CN111339197A publication Critical patent/CN111339197A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Abstract

The application discloses a block chain data processing method, a block chain data processing device, electronic equipment and a medium, and relates to the technical field of computers, in particular to a block chain technology. The specific implementation scheme is as follows: the method for processing the blockchain data is executed by a trusted node in a blockchain network, and comprises the following steps: determining a current block generation node by a workload certification mechanism through a trusted execution area of a local trusted node; performing a block processing operation based on the current block generation node. According to the embodiment of the application, the workload proving mechanism is operated in the trusted execution area, and the calculation capacity increase limit of the workload proving mechanism is locked in the limit of a single machine, so that the problem of resource waste caused by continuous improvement of calculation capacity is avoided.

Description

Block chain data processing method and device, electronic equipment and medium
Technical Field
The embodiment of the application relates to the technical field of computers, in particular to a block chain technology, and particularly relates to a block chain data processing method and device, electronic equipment and a medium.
Background
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The common knowledge mechanism is an important component of the blockchain technique, and the block generation right is obtained by the node based on the common knowledge mechanism, for example, the POW common knowledge mechanism. The essence of the conventional POW consensus mechanism is that: only one result is generated in the control unit time T, and the node with the result is taken as a miner node.
However, a large number of operations are required to generate a result based on the POW consensus mechanism, and the higher the calculation power of the POW algorithm is, the faster the calculation speed is. In the actual application process, the more the calculation force is, the more resources are consumed, thereby causing a problem of resource waste.
Disclosure of Invention
The embodiment of the application discloses a block chain data processing method, a block chain data processing device, electronic equipment and a block chain data processing medium, which can achieve the technical effects of reducing resource consumption and improving data security.
In a first aspect, an embodiment of the present application discloses a method for processing blockchain data, where the method is performed by a trusted node in a blockchain network, and the method includes:
determining a current block generation node by a workload certification mechanism through a trusted execution area of a local trusted node;
performing a block processing operation based on the current block generation node.
One embodiment in the above application has the following advantages or benefits: by operating the workload certification mechanism in the trusted execution area, the problem of resource waste caused by continuous increase of resource consumption due to continuous improvement of computing power when only the POW algorithm is adopted to process block data at present is solved, the computing power increase limit of the POW algorithm is locked in the single machine limit, and the resource consumption is reduced.
In addition, the block chain data processing method according to the above embodiment of the present application may further have the following additional technical features:
optionally, the method further includes:
when a credible certification event is monitored, determining first data to be sent;
signing the first data by adopting a first block chain key in a key storage area of the local trusted node to obtain a first data signature;
sending the first data signature to other nodes to instruct the other nodes to verify the first data signature to determine whether the local trusted node is trusted.
One embodiment in the above application has the following advantages or benefits: the first data are signed based on the first block chain key, so that the first data can be prevented from being leaked, and the safety of the first data is improved; further, the first data signature is sent to other nodes, and the trusted node can be determined to operate in the trusted execution environment based on the signature verification result of the first data signature.
Optionally, the method further includes: and when data needs to be sent to other nodes or access requests of other nodes are received, generating the credibility certification event.
One embodiment in the above application has the following advantages or benefits: and determining a trigger condition of data verification so as to determine that the trusted node runs in the trusted execution environment based on the trigger condition.
Optionally, the method further includes:
receiving a second data signature to be verified from other nodes; the second data signature is obtained by signing second data by adopting a second block chain key in a key storage area of other nodes;
based on a third block chain key, checking the second data signature, and determining whether other nodes are credible according to the result of checking the signature; wherein the second blockchain key and the third blockchain key are mutually asymmetric key pairs
One embodiment in the above application has the following advantages or benefits: when the data signatures sent by other nodes are received, whether the other nodes operate in the trusted environment or not is determined, and the safety of data transmission is improved.
Optionally, determining the current block generation node by using a workload certification mechanism through the trusted execution area of the local trusted node includes:
generating a workload certification problem according to a predetermined workload certification function and a difficulty value and current transaction data of a current transaction processing request through a trusted execution area of a local trusted node;
and determining the current block generation node based on the workload certification problem through the trusted execution area.
One embodiment in the above application has the following advantages or benefits: in a trusted execution environment, a POW algorithm is adopted to determine the current block generation node so as to achieve the effect of reducing resource consumption.
Optionally, before generating the workload certification problem according to the predetermined workload certification function and the difficulty value, and the current transaction data of the current transaction processing request, the method further includes:
determining an actual block-out time length value of the block chain network;
comparing the actual block out time length value of the block chain network with an expected block out time length value;
and adjusting the difficulty value according to the comparison result.
One embodiment in the above application has the following advantages or benefits: and adjusting a reasonable difficulty value through the relation between the actual block output time length value and the expected time length value, so that the block output time is stable.
In a second aspect, an embodiment of the present application further discloses a device for processing blockchain data, where the device is executed by a trusted node in a blockchain network, and the device includes:
the block node generation module is used for determining the current block generation node through a trusted execution area of a local trusted node by adopting a workload certification mechanism;
and the block processing module is used for executing block processing operation based on the current block generating node.
In a third aspect, an embodiment of the present application further discloses an electronic device, including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of processing blockchain data as described in any of the embodiments of the present application.
In a fourth aspect, this application further discloses a non-transitory computer-readable storage medium storing computer instructions for causing a computer to execute the method for processing blockchain data according to any one of the embodiments of the application.
According to the technical scheme of the embodiment of the application, the workload certification mechanism (POW algorithm) is operated in the trusted execution area, so that the problems that the calculation power needs to be continuously improved and the resource consumption is continuously increased to cause resource waste when only the POW algorithm is adopted to process block data at present are solved, the calculation power increase limit of the POW algorithm is locked in the single machine limit, and the resource consumption effect is reduced.
Other effects of the above-described alternative will be described below with reference to specific embodiments.
Drawings
The drawings are included to provide a better understanding of the present solution and are not intended to limit the present application. Wherein:
fig. 1 is a schematic flowchart of a block chain data processing method according to an embodiment of the present disclosure;
fig. 2 is a schematic diagram illustrating a flow of a method for processing blockchain data according to an embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a method for processing blockchain data according to an embodiment of the present disclosure;
fig. 4 is a schematic structural diagram of a block chain data processing apparatus according to an embodiment of the present disclosure;
fig. 5 is a block diagram of an electronic device that can implement the disclosure of the embodiments of the present application.
Detailed Description
The following description of the exemplary embodiments of the present application, taken in conjunction with the accompanying drawings, includes various details of the embodiments of the application for the understanding of the same, which are to be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 is a flowchart of a blockchain data processing method disclosed in an embodiment of the present application, where the present embodiment is applicable to a situation where a blockchain program is applied in a trusted execution environment and block data is processed by using a POW algorithm, that is, a situation where the block data is processed by using the POW algorithm in a trusted blockchain network. Trusted nodes in a blockchain network may be deployed in an electronic device that has processing functionality for the nodes.
A block chain network formed by nodes running in a Trusted Execution Environment (TEE) is used as a Trusted block chain network. A block-generating node in a trusted blockchain network may be a trusted node. The TEE is an execution environment for providing credible security for an application program by an operating system. The TEE is deployed inside a Central Processing Unit (CPU), and may specifically include a CPU with an Intel SGX function and a CPU with Arm TrustZone, so as to ensure the security of a memory and an independent isolated computing area.
In the embodiment of the present application, each node in the trusted block chain network includes a trusted execution area (usually located in a memory) and a key storage area. The trusted execution area is only used for executing a designated program, for example, if a signature of the program a is registered in the trusted hardware in advance, the program a is the designated program, specifically, the program a is used for executing a consensus algorithm, and optionally, a POW algorithm, that is, a workload certification mechanism; the key storage area is used for storing a unified private key of the block chain network, the number of the private keys can be one or multiple, and the number of the private keys can be multiple in consideration of the security of block data.
As shown in fig. 1, the method includes:
and S110, determining the current block generation node through the trusted execution area of the local trusted node by adopting a workload certification mechanism.
In this embodiment, the local trusted node may be any node in the trusted blockchain network.
The workload certification mechanism selects the current block generation node based on the computing power of each node, hardware capability, network quality and other certification factors. For example, a bitcoin forming block chain system adopting a workload certification mechanism, under the workload certification mechanism, each node uses any first candidate block generation node that completes mining as a block generation node through competitive mining. And taking the block generating node determined by the workload certification mechanism through the trusted execution area of the local trusted node as the current block generating node.
Specifically, a designated program including a POW algorithm is pre-deployed in the trusted execution area, and the POW algorithm is executed based on the designated program, that is, a workload certification mechanism is adopted, and a candidate block generation node that completes workload certification first is used as a current block generation node.
Optionally, determining the current block generation node by using a workload certification mechanism through the trusted execution area of the local trusted node includes: generating a workload certification problem according to a predetermined workload certification function and a difficulty value and current transaction data of a current transaction processing request through a trusted execution area of a local trusted node; and determining the current block generation node based on the workload certification problem through the trusted execution area.
The workload certification function is preset and is a calculation method for determining the workload certification problem, optionally, the workload certification function may be a SHA256(Secure Hash Algorithm) Algorithm or an MD5 Algorithm, etc., and after processing data based on the SHA56 Algorithm, the data may be output as a 256-bit Hash Algorithm, and a unique signature may be performed. The difficulty value determines the amount of work required to solve the workload certification problem and also determines how many hash operations are required to generate a valid and valid block. Any node in the trusted blockchain network can communicate with a trusted node in the trusted blockchain network, and accordingly, when a certain node has a transaction processing requirement, optionally, data uplink and the like, a transaction processing request, namely a current transaction processing request, can be generated. The current transaction request may include, but is not limited to, a data query request and/or a data update request, etc. The current transaction data is data corresponding to the current transaction request. The workload certification problem may be understood as a problem for proving the operation capability of each block generation node and the hardware performance, for example, whether a solution to a certain problem is correct or not.
Specifically, the workload certification problem may be generated by performing signature calculation in the trusted execution area of the local trusted node according to a predetermined workload certification function and a difficulty value, and the current transaction data of the current transaction processing request, and optionally, a signature result value may be generated. And comparing the signature result value with a preset difficulty value, finishing the workload certification if the signature result value is smaller than the preset difficulty value, and taking the candidate block generation node which finishes the workload certification first in the candidate block generation nodes in the local trusted block chain network as the current block generation node.
Before determining the workload proving problem, it is also necessary to determine a difficulty value in the POW algorithm. Optionally, determining an actual block output duration value of the block chain network; comparing the actual block out time length value of the block chain network with an expected block out time length value; and adjusting the difficulty value according to the comparison result.
The block-out duration value may be understood as a duration value required from the time when the last block is generated to the time when the current block is generated. The actual block-out duration value refers to a duration value required for generating one block in an actual operation process. The expected block length value is set in advance according to a computer device or the like.
Specifically, when a block output request is received, the time length value used from the time when the last block is generated to the time when the current block is generated may be counted and used as the actual block output time length value. If the actual block output time length value is larger than the expected block output time length value, the time length for generating one block is too long, the current difficulty value can be adjusted to be small, namely the difficulty value in the POW algorithm is reduced; if the actual block output time length value is smaller than the expected block output time length value, the time for generating a block is too short, and the current difficulty value can be increased, namely the difficulty value in the POW algorithm is increased; if the actual block out time length value is equal to the expected block out time length value, the difficulty value in the POW algorithm may not be updated.
Specifically, after the difficulty value in the POW algorithm is determined based on the actual block output duration value, a signature result value may be generated according to a predetermined workload certification function and the difficulty value, and current transaction data of the current transaction processing request, the signature result is processed based on the trusted execution region of the trusted node, if the signature result value is smaller than the preset difficulty value, the workload certification is completed, and the candidate block generation node that completes the workload certification first in the candidate block generation nodes in the local trusted block chain network may be used as the current block generation node. .
And S120, performing block processing operation based on the current block generation node.
The block processing operation may be operations of creating a new block, verifying whether the block is correct, and deleting the block. For example, after determining the current block generation node based on the workload certification mechanism, the current block generation node may pack the corresponding transaction data into a new block according to the received hash value of the previous block sent by the previous block generation node and the current logical processing request.
According to the technical scheme of the embodiment of the application, the workload certification mechanism is operated in the trusted execution area, so that the problem that resource consumption is continuously increased and resource waste is caused due to continuous improvement of computing power when only the POW algorithm is adopted to process block data at present is solved, and the effect of locking the computing power increase limit of the POW algorithm in a single machine limit to reduce resource consumption is achieved.
On the basis of the above technical solution, if a block link point needs to transmit data to other nodes, or a block is output from the block link point, optionally, the trusted node synchronizes its information and the extracted block data to other nodes, and it needs to prove to the other nodes that the block link node operates in the trusted execution area, because: the safety and reliability of block data transmission can be ensured. Fig. 2 is another flow chart illustrating a method for processing blockchain data disclosed in the present application. As shown in fig. 2, the method includes:
s210, determining the current block generation node through the trusted execution area of the local trusted node by adopting a workload certification mechanism.
S220, performing a block processing operation based on the current block generating node.
And S230, when the credible certification event is monitored, determining first data to be sent.
It should be noted that, in the trusted execution environment, whether the local trusted node transmits data to other nodes or receives access requests of other nodes, the public trust of the local trusted node needs to be proved, that is, the local trusted node operates in the trusted execution area. And taking an event for proving that the local trusted node runs in the trusted execution area as a trusted proving event. The first data is block data dug by the local trusted node. For example, if the a node accesses the data of the B node, the B node also needs to prove that it operates in the trusted execution environment, and an event that proves that the B node operates in the trusted execution environment is taken as a trusted event.
Specifically, when it is detected that data needs to be generated to other nodes or an access request of other nodes is received, block data to be sent by a local trusted node, that is, first data, is determined.
S240, signing the first data by adopting a first block chain key in a key storage area of the local trusted node to obtain a first data signature.
The key storage area of the local trusted node is used for protecting stored data from being leaked, and specifically, the first blockchain key is stored to ensure the security of the first blockchain key. The first blockchain key is used for signing the first data so as to ensure that the first data is not leaked in the data transmission process, thereby improving the security of data transmission.
Specifically, a first block chain key in a key storage area of the local trusted node is acquired based on a designated program, and a first data signature is obtained after signature encryption processing is performed on first data.
And S250, sending the first data signature to other nodes to indicate the other nodes to check the first data signature so as to determine whether the local trusted node is trusted.
Based on a designated program, other blockchain nodes can acquire a unified public key in the blockchain network, so as to check the received first data signature based on the unified public key, and if the check passes, the first data signature runs in the trusted execution environment, that is, the local trusted node is trusted, otherwise, the local trusted node is untrusted.
According to the technical scheme, the data to be sent are signed based on the block chain key, the safety of block data transmission is improved, the signature of the data signature is verified through other nodes, the local trusted node is further determined to operate in the trusted execution environment, and the effect of reducing resource consumption is achieved.
On the basis of the technical scheme, if the data signature to be verified sent by other nodes is received, the data signature can be verified to determine whether the other nodes are credible. The specific processing method is shown in fig. 3:
and S310, determining the current block generation node through the trusted execution area of the local trusted node by adopting a workload certification mechanism.
And S320, executing block processing operation based on the current block generation node.
And S330, receiving a second data signature to be verified from other nodes.
If other nodes transmit data to the local trusted node, the other nodes need to perform signature processing on the transmitted data to obtain a data signature. And the second data signature is obtained by adopting second block keys in the key storage areas of other nodes to sign the second data. The second blockchain key may be the same as or different from the first blockchain key, and the user may set the second blockchain key according to actual requirements. If the first blockchain key and the second blockchain key are different, the key storage area of all nodes in the blockchain network comprises the first blockchain key and the second blockchain key.
Illustratively, the other nodes are nodes a, the local trusted node is a node B, and the second blockchain key in the key storage area of the node a is acquired based on the designated program, and the block data transmitted by the node a is encrypted to obtain a second data signature. The node B receives the second data signature transmitted by the node a and needs to verify the second data signature to ensure that the data transmission is performed in the trusted execution environment of the node a, so as to improve the security of the data transmission.
S340, verifying the second data signature based on the third block chain key, and determining whether other nodes are credible according to the verification result.
And the third block chain key is also stored in the local key storage area and is used for performing signature verification processing on the second data. The third blockchain key and the second blockchain key are mutually a key pair, and comprise a symmetric key pair or an asymmetric key pair. Illustratively, the second blockchain key and the third blockchain key are asymmetric key pairs, the second blockchain key is a private key, and the third blockchain key is a public key.
Specifically, the second data signature is decrypted based on the key stored in the third block chain, optionally, the stored public key, and when the decryption is successful, it is indicated that the other node is authentic.
According to the technical scheme of the embodiment of the application, the data sent by other nodes are subjected to signature verification processing, so that the other nodes can be determined to operate in a trusted execution environment, the safety of data transmission can be improved, and the technical effect of reducing resource consumption can be achieved.
Fig. 4 is a schematic structural diagram of a blockchain data processing apparatus according to an embodiment of the present disclosure, which can be applied to a situation where a blockchain program is applied in a trusted execution environment and block data is processed by using a POW algorithm, that is, a situation where block data is processed by using a POW algorithm in a trusted blockchain network. The device of the embodiment can be implemented in a software and/or hardware manner, and can be configured in a local trusted node in a trusted blockchain network.
As shown in fig. 4, a block chain data processing apparatus 400 disclosed in the embodiment of the present application includes: a block node generation module 401 and a block processing module 402, wherein:
a block node generation module 401, configured to determine, through a trusted execution area of a local trusted node, a current block generation node by using a workload certification mechanism; a block processing module 402, configured to perform a block processing operation based on the current block generation node.
Optionally, the apparatus of this embodiment further includes: the device comprises a to-be-sent data determining module, a to-be-sent data determining module and a to-be-sent data determining module, wherein the to-be-sent data determining module is used for determining first data to be sent when a credible certification event is monitored; the first data signature module is used for signing the first data by adopting a first block chain key in a key storage area of the local trusted node to obtain a first data signature; and the judging module is used for sending the first data signature to other nodes so as to indicate the other nodes to check the first data signature to determine whether the local trusted node is trusted.
Optionally, the apparatus of this embodiment further includes: and when data needs to be sent to other nodes or access requests of other nodes are received, generating the credibility certification event.
Optionally, the apparatus of this embodiment further includes: the second data signature module is used for receiving second data signatures to be verified from other nodes; the second data signature is obtained by signing second data by adopting a second block chain key in a key storage area of other nodes; the second judgment module is used for verifying the signature of the second data signature based on a third block chain key and determining whether other nodes are credible according to the verification result; wherein the second blockchain key and the third blockchain key are mutually asymmetric key pairs.
Optionally, the block node generating module in the apparatus of this embodiment includes a workload proving unit and a block node generating unit; the workload certification unit is used for generating a workload certification problem according to a predetermined workload certification function and a difficulty value and current transaction data of a current transaction processing request through a trusted execution area of a local trusted node; and the block node generating unit is used for determining the current block generating node based on the workload certification problem through the trusted execution area.
According to the technical scheme, the block chain network is executed by the trusted nodes in the block chain network, the safety of data transmission is guaranteed, further, the current block generation nodes are determined through the trusted execution area of the local trusted nodes by adopting a working demonstration mechanism, and block processing operation is executed based on the current block generation nodes, so that the technical problem that resource consumption exists if the computing power is continuously improved when the block data is processed by only adopting a POW algorithm in the prior art is solved, the computing power increase limit of the POW algorithm is locked in a single machine limit in a trusted execution environment where the POW algorithm is pre-deployed, and the effect of resource consumption is reduced.
The blockchain data processing apparatus 400, which is configurable in a trusted node in a trusted blockchain network and disclosed in the embodiment of the present application, can execute any method for processing blockchain data, which is disclosed in the embodiment of the present application and applied to a transaction processing node in a trusted blockchain network, and has functional modules and beneficial effects corresponding to the execution method. Reference may be made to the description of any method embodiment of the present application for details not explicitly described in this embodiment.
According to an embodiment of the present application, an electronic device and a readable storage medium are also provided. The electronic device is used for exemplifying hardware devices on which trusted nodes in a blockchain network depend.
Fig. 5 is a block diagram of an electronic device according to an embodiment of the present application. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular phones, smart phones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be examples only, and are not meant to limit implementations of the present application that are described and/or claimed herein.
As shown in fig. 5, the electronic apparatus includes: one or more processors 501, memory 502, and interfaces for connecting the various components, including high-speed interfaces and low-speed interfaces. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions for execution within the electronic device, including instructions stored in or on the memory to display graphical information of a GUI on an external input/output apparatus (such as a display device coupled to the interface). In other embodiments, multiple processors and/or multiple buses may be used, along with multiple memories and multiple memories, as desired. Also, multiple electronic devices may be connected, with each device providing portions of the necessary operations (e.g., as a server array, a group of blade servers, or a multi-processor system). In fig. 5, one processor 501 is taken as an example.
Memory 502 is a non-transitory computer readable storage medium as provided herein. The memory stores instructions executable by at least one processor, so that the at least one processor executes the block chain data processing method provided by the application. The non-transitory computer-readable storage medium of the present application stores computer instructions for causing a computer to perform the block chain data processing method provided herein.
The memory 502, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules (e.g., the block node generation module 401 and the block processing module 402 shown in fig. 4) corresponding to the block chain data processing method in the embodiments of the present application. The processor 501 executes various functional applications of the server and data processing by running non-transitory software programs, instructions and modules stored in the memory 502, that is, implements the block chain data processing method in the above method embodiment.
The memory 502 may include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function; the storage data area may store data created from use of the blockchain data processing electronic device, and the like. Further, the memory 502 may include high speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, memory 502 optionally includes memory located remotely from processor 501, which may be connected to blockchain data processing electronics over a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The electronic device of the block chain data processing method may further include: an input device 503 and an output device 504. The processor 501, the memory 502, the input device 503 and the output device 504 may be connected by a bus or other means, and fig. 5 illustrates the connection by a bus as an example.
The input device 503 may receive input numeric or character information and generate key signal inputs related to user settings and function control of the blockchain data processing electronic apparatus, such as a touch screen, a keypad, a mouse, a track pad, a touch pad, a pointing stick, one or more mouse buttons, a track ball, a joystick, or other input device. The output devices 504 may include a display device, auxiliary lighting devices (e.g., LEDs), and haptic feedback devices (e.g., vibrating motors), among others. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device can be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASICs (application specific integrated circuits), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs that are executable and/or interpretable on a programmable system including at least one programmable processor, which may be special or general purpose, receiving data and instructions from, and transmitting data and instructions to, a storage system, at least one input device, and at least one output device.
These computer programs (also known as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented using high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, Programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user can be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic, speech, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a back-end component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such back-end, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), Wide Area Networks (WANs), the internet, and blockchain networks.
The computer system may include clients and servers. A client and server are generally remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
According to the technical scheme of the embodiment of the application, the common identification mechanism (POW algorithm) is applied to the trusted execution environment, the technical problem that resource consumption is large due to continuous improvement of computing power when block data are directly processed through the POW algorithm in the prior art is solved, the POW algorithm is deployed in the trusted execution environment in advance, so that the computing power increase limit of the POW algorithm can be locked in a stand-alone limit, resource consumption is reduced, block data are encrypted and decrypted by the key storage under the trusted environment, and the data security is further improved.
It should be understood that various forms of the flows shown above may be used, with steps reordered, added, or deleted. For example, the steps described in the present application may be executed in parallel, sequentially, or in different orders, and the present invention is not limited thereto as long as the desired results of the technical solutions disclosed in the present application can be achieved.
The above-described embodiments should not be construed as limiting the scope of the present application. It should be understood by those skilled in the art that various modifications, combinations, sub-combinations and substitutions may be made in accordance with design requirements and other factors. Any modification, equivalent replacement, and improvement made within the spirit and principle of the present application shall be included in the protection scope of the present application.

Claims (10)

1. A method of blockchain data processing performed by a trusted node in a blockchain network, the method comprising:
determining a current block generation node by a workload certification mechanism through a trusted execution area of a local trusted node;
performing a block processing operation based on the current block generation node.
2. The method of claim 1, further comprising:
when a credible certification event is monitored, determining first data to be sent;
signing the first data by adopting a first block chain key in a key storage area of the local trusted node to obtain a first data signature;
sending the first data signature to other nodes to instruct the other nodes to verify the first data signature to determine whether the local trusted node is trusted.
3. The method of claim 2,
and when data needs to be sent to other nodes or access requests of other nodes are received, generating the credibility certification event.
4. The method of claim 1, further comprising:
receiving a second data signature to be verified from other nodes; the second data signature is obtained by signing second data by adopting second block chain keys in key storage areas of other nodes;
based on a third block chain key, checking the second data signature, and determining whether other nodes are credible according to the result of checking the signature; wherein the second blockchain key and the third blockchain key are mutually asymmetric key pairs.
5. The method of claim 1, wherein determining the current block generation node through a trusted execution zone of a local trusted node using a workload certification mechanism comprises:
generating a workload certification problem according to a predetermined workload certification function and a difficulty value and current transaction data of a current transaction processing request through a trusted execution area of a local trusted node;
and determining the current block generation node based on the workload certification problem through the trusted execution area.
6. The method of claim 5, before generating the workload attestation problem in accordance with the predetermined workload attestation function and the difficulty value and the current transaction data of the current transaction processing request, further comprising:
determining an actual block-out time length value of the block chain network;
comparing the actual block out time length value of the block chain network with an expected block out time length value;
and adjusting the difficulty value according to the comparison result.
7. An apparatus for blockchain data processing, performed by a trusted node in a blockchain network, the apparatus comprising:
the block node generation module is used for determining the current block generation node through a trusted execution area of a local trusted node by adopting a workload certification mechanism;
and the block processing module is used for executing block processing operation based on the current block generating node.
8. The apparatus of claim 7, wherein the block node generating module comprises:
the workload certification unit is used for generating a workload certification problem according to a predetermined workload certification function and a difficulty value and current transaction data of a current transaction processing request through a trusted execution area of a local trusted node;
and the block node generating unit is used for determining the current block generating node based on the workload certification problem through the trusted execution area.
9. An electronic device, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-6.
10. A non-transitory computer readable storage medium having stored thereon computer instructions for causing the computer to perform the method of any one of claims 1-6.
CN202010120525.4A 2020-02-26 2020-02-26 Block chain data processing method and device, electronic equipment and medium Pending CN111339197A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010120525.4A CN111339197A (en) 2020-02-26 2020-02-26 Block chain data processing method and device, electronic equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010120525.4A CN111339197A (en) 2020-02-26 2020-02-26 Block chain data processing method and device, electronic equipment and medium

Publications (1)

Publication Number Publication Date
CN111339197A true CN111339197A (en) 2020-06-26

Family

ID=71185693

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010120525.4A Pending CN111339197A (en) 2020-02-26 2020-02-26 Block chain data processing method and device, electronic equipment and medium

Country Status (1)

Country Link
CN (1) CN111339197A (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108124505A (en) * 2017-12-19 2018-06-05 深圳前海达闼云端智能科技有限公司 Method and device for acquiring trusted node, storage medium and block link node
CN108665272A (en) * 2018-05-02 2018-10-16 百度在线网络技术(北京)有限公司 Block chain data processing method, device, equipment and storage medium
CN109858285A (en) * 2018-12-07 2019-06-07 上海异势信息科技有限公司 Processing method, device, equipment and the medium of block chain data
CN109934579A (en) * 2018-11-30 2019-06-25 上海点融信息科技有限责任公司 For the key generation method of block chain network, endorsement method, storage medium, calculate equipment
CN110176998A (en) * 2019-05-17 2019-08-27 北京众享比特科技有限公司 A kind of common recognition method, apparatus, equipment and the storage medium of proof of work

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108124505A (en) * 2017-12-19 2018-06-05 深圳前海达闼云端智能科技有限公司 Method and device for acquiring trusted node, storage medium and block link node
CN108665272A (en) * 2018-05-02 2018-10-16 百度在线网络技术(北京)有限公司 Block chain data processing method, device, equipment and storage medium
CN109934579A (en) * 2018-11-30 2019-06-25 上海点融信息科技有限责任公司 For the key generation method of block chain network, endorsement method, storage medium, calculate equipment
CN109858285A (en) * 2018-12-07 2019-06-07 上海异势信息科技有限公司 Processing method, device, equipment and the medium of block chain data
CN110176998A (en) * 2019-05-17 2019-08-27 北京众享比特科技有限公司 A kind of common recognition method, apparatus, equipment and the storage medium of proof of work

Similar Documents

Publication Publication Date Title
CN111683071B (en) Private data processing method, device, equipment and storage medium of block chain
CN111310216B (en) Block chain data processing method and device, electronic equipment and medium
CN111737366B (en) Private data processing method, device, equipment and storage medium of block chain
CN111769958B (en) Block chain cross-chain processing method, device, equipment and storage medium
CN111460429B (en) Task processing method, device, equipment and medium based on trusted execution environment
CN111125763B (en) Method, device, equipment and medium for processing private data
CN111339569B (en) Block chain data processing method, device, electronic equipment and medium
CN111131317B (en) Data processing method, device, equipment and medium based on block chain
CN111565109A (en) Key processing method, device, equipment and medium for block chain
CN110889124B (en) Information sharing method and device, electronic equipment and storage medium
CN111464297B (en) Transaction processing method, device, electronic equipment and medium based on block chain
JP7317084B2 (en) REMOTE VERIFICATION METHOD, DEVICE, DEVICE, SYSTEM AND MEDIUM OF TRUSTED ENVIRONMENT
CN110909372A (en) Data processing method, device, equipment and medium
CN114363088B (en) Method and device for requesting data
CN111565204A (en) Block chain operation method, device, equipment and storage medium
CN113612597A (en) Data calculation method, device and system and electronic equipment
WO2022143298A1 (en) Blockchain-based data processing method and apparatus
CN111147242A (en) Block generation method and device, electronic equipment and storage medium
CN111400743B (en) Transaction processing method, device, electronic equipment and medium based on blockchain network
CN111459672B (en) Transaction processing method, device, equipment and medium based on block chain network
CN111343177B (en) Method, device, equipment and medium for supervising lightweight node
CN111371558B (en) Block chain data processing method and device, electronic equipment and medium
CN111371557B (en) Block chain data processing method and device, electronic equipment and medium
US9436529B2 (en) Providing random data to a guest operating system
CN111339197A (en) Block chain data processing method and device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination