CN111738726A - Resource verification method and device based on block chain and computer equipment - Google Patents

Resource verification method and device based on block chain and computer equipment Download PDF

Info

Publication number
CN111738726A
CN111738726A CN202010770748.5A CN202010770748A CN111738726A CN 111738726 A CN111738726 A CN 111738726A CN 202010770748 A CN202010770748 A CN 202010770748A CN 111738726 A CN111738726 A CN 111738726A
Authority
CN
China
Prior art keywords
key
information
node
checked
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010770748.5A
Other languages
Chinese (zh)
Other versions
CN111738726B (en
Inventor
向舜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Original Assignee
Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuo Erzhi Lian Wuhan Research Institute Co Ltd filed Critical Zhuo Erzhi Lian Wuhan Research Institute Co Ltd
Priority to CN202010770748.5A priority Critical patent/CN111738726B/en
Publication of CN111738726A publication Critical patent/CN111738726A/en
Application granted granted Critical
Publication of CN111738726B publication Critical patent/CN111738726B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Abstract

The application relates to a resource verification method and device based on a block chain, computer equipment and a storage medium. The method comprises the following steps: determining checked billing nodes according to the data checking instruction; acquiring a billing private key of a checked billing node, and summarizing a key of the total amount of resources to be checked and transaction address information in a checked time period; acquiring each single address key and each single account book key which are disclosed in a block chain by a verified accounting node in a verified time period; verifying whether the transaction address information summarizing key is accurate or not according to the product of the transaction address information summarizing key and the accounting private key; and when the transaction address information summary key is correct, verifying whether the total amount of the resources to be verified is correct. By adopting the method, the data security of the checked node can be improved.

Description

Resource verification method and device based on block chain and computer equipment
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method and an apparatus for checking resources based on blockchains, a computer device, and a storage medium.
Background
With the development of the blockchain technology, the blockchain technology is widely applied to various scenes, and in some application scenes of the blockchain, the account resource sum of each transaction node needs to be checked. For example: verification applications in blockchains require confirmation of the total amount of assets (typically digital currency) at a certain point in time at a certain transaction node.
However, the resource verification method usually adopted at present is to obtain the transaction details of each transaction, and perform calculation and comparison, thereby realizing verification of the account resource total of each transaction node, and therefore the verified node needs to expose the transaction details to complete the resource verification. Therefore, when the resource verification is performed on the verified node at present, the acquired data is excessively exposed, so that the data of the verified node is easily leaked, and the security is low.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a block chain-based resource verification method, apparatus, computer device, and storage medium capable of improving data security of a verified node.
A method for resource validation based on block chains, the method comprising:
when a data verification instruction is triggered, determining verified bookkeeping nodes from bookkeeping nodes participating in bookkeeping according to the data verification instruction, wherein the bookkeeping nodes participating in bookkeeping perform encrypted billing by adopting elliptic encrypted resource encryption operation points, address encryption operation points and node address keys provided by the verification nodes;
acquiring a billing private key sent by the checked billing node, and a summary key of the total amount of resources to be checked and the transaction address information of the checked billing node in the checked time period;
acquiring each single address key and each single account book key which are disclosed in a block chain by the checked accounting node in the checked time period;
verifying whether the transaction address information summarizing key is accurate or not according to the product of the transaction address information summarizing key and the accounting private key;
and when the transaction address information summary key is correct, verifying whether the total amount of the resources to be verified is accurate.
In one embodiment, the verifying whether the total amount of the resources to be verified is accurate when the transaction address information summarizing key is correct includes:
when the transaction address information summary key is correct, summing the keys of the single account books to obtain summary information of the keys of the single account books;
encrypting the total amount of the resources to be checked according to the resource encryption operation point to obtain encryption information;
and comparing the summary information of each single account book key with the sum of the encryption information and the transaction address information summary key to determine whether the total amount of the resources to be verified is accurate.
In one embodiment, the comparing the summarized information of each single ledger key with the sum of the encrypted information and the transaction address information summarized key to determine whether the total amount of the resources to be verified is accurate includes:
carrying out elliptic curve addition operation on the encrypted information and the transaction address information summary key to obtain an account book summary key;
comparing the ledger summary key with summary information of each single ledger key;
when the summary key of the account book is consistent with the summary information of each single account book key, the total amount of the resources to be verified is accurate;
and when the summary key of the account book is inconsistent with the summary information of each single account book key, the total amount of the resources to be verified is inaccurate.
In one embodiment, the verifying whether the transaction address information summarizing key is accurate according to the product of the transaction address information summarizing key and the accounting private key includes:
carrying out elliptic curve multiplication operation according to the transaction address information summarizing key and the accounting private key to obtain the operated information;
summing the single address keys to obtain summary information of the single address keys;
comparing the calculated information with the summary information of each single address key;
when the calculated information is consistent with the summary information of each address key, the transaction address information summary key is accurate;
and when the calculated information is inconsistent with the summary information of each address key, the transaction address information summary key is inaccurate.
In one embodiment, after the step of inaccuracy the transaction address information summary key when the calculated information is inconsistent with the summary information of each address key, the method further includes:
and determining that the total amount of the resources to be checked is inaccurate according to the inaccuracy of the transaction address information summary key.
In one embodiment, the method for providing an elliptic encryption resource encryption operation point, an address encryption operation point and a node address key for the accounting node participating in accounting includes:
the resource encryption operation point and the address encryption operation point are selected at will on the elliptic curve and published to the block chain;
and generating a corresponding random number for the accounting node participating in accounting, and correspondingly sending the random number to the accounting node participating in accounting as the node address key representing the accounting node address.
In one embodiment, the method further comprises:
acquiring accurate resource sum from the accounting node with inaccurate resource sum to be checked, and comparing the accurate resource sum with each pair of single account book keys disclosed in the block chain in the checked time period;
and carrying out resource deduction on the accounting node with inaccurate total amount of the resources to be checked.
An apparatus for block chain based resource validation, the apparatus comprising:
the verified bookkeeping node determining module is used for determining verified bookkeeping nodes from bookkeeping nodes participating in bookkeeping according to the data verification instruction when the data verification instruction is triggered, and the bookkeeping nodes participating in bookkeeping adopt elliptic encryption resource encryption operation points, address encryption operation points and node address keys provided by the verification nodes to carry out encryption bookkeeping;
the first information acquisition module is used for acquiring a billing private key sent by the checked billing node, and the total amount of resources to be checked and the transaction address information gathering key of the checked billing node in the checked time period;
the second information acquisition module is used for acquiring each single address key and each single account book key which are disclosed in the block chain by the checked accounting node in the checked time period;
the first verification module is used for verifying whether the transaction address information summary key is accurate or not according to the product of the transaction address information summary key and the accounting private key;
and the second verification module is used for verifying whether the total amount of the resources to be verified is accurate or not when the transaction address information summary key is correct.
A computer device comprising a memory storing a computer program and a processor implementing the steps of the method when executing the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method.
According to the resource checking method and device based on the block chain, the computer equipment and the storage medium, when the checking node needs to perform resource checking on the bookkeeping node in a certain time period, a data checking instruction is triggered, and the checked bookkeeping node is further determined; acquiring a billing private key sent by the checked billing node, and a summary key of the total amount of resources to be checked and the transaction address information of the checked billing node in the checked time period; acquiring each single address key and each single account book key which are disclosed in a block chain by a verified accounting node in a verified time period; according to the product of the transaction address information summarizing key and the accounting private key, whether the transaction address information summarizing key is accurate or not can be verified without decrypting privacy data; when the transaction address information summary key is correct, whether the total amount of the resources to be checked is accurate or not is verified, in the whole checking process, the checking of the resources can be completed without decrypting the address information in the single address key and the ledger information in the single ledger key or providing the address information in the single address key and the ledger information in the single ledger key by the accounting node, and the data safety of the checked nodes is improved.
Drawings
FIG. 1 is a diagram of an embodiment of an application environment of a blockchain-based resource validation method;
FIG. 2 is a flow diagram illustrating a method for block chain based resource verification in one embodiment;
FIG. 3 is a flowchart illustrating one step of a block chain based resource verification method according to an embodiment;
FIG. 4 is a block diagram of an apparatus for block chain based resource verification in one embodiment;
FIG. 5 is a block diagram of an apparatus for block chain based resource validation in one embodiment;
FIG. 6 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The resource verification method based on the block chain can be applied to the application environment shown in fig. 1. Wherein the verification node 102 communicates with the verified billing node 104 over a network. When the data verification instruction of the verification node 102 is triggered, the verified bookkeeping node 104 is determined from bookkeeping nodes participating in bookkeeping according to the data verification instruction, and the bookkeeping nodes participating in bookkeeping perform encryption billing by adopting the elliptic encryption resource encryption operation points, the elliptic encryption address encryption operation points and the elliptic encryption node address keys provided by the verification node; acquiring a billing private key sent by the checked billing node 104, and a summary key of the total amount of resources to be checked and the transaction address information of the checked billing node 104 in the checked time period; acquiring each single address key and each single account book key which are disclosed in the block chain by the checked accounting node 104 in the checked time period; verifying whether the transaction address information summarizing key is accurate or not according to the product of the transaction address information summarizing key and the accounting private key; and when the transaction address information summary key is correct, verifying whether the total amount of the resources to be verified is correct.
The verification node 102 may be a node in the block chain-based billing system, or an external node outside the block chain-based billing system, where the node may be a terminal or a server; the checked and billed node 104 is a billing node participating in billing in the billing system based on the block chain, the billing node may be a terminal or a server, the checked and billed node 104 may be all the billing nodes participating in billing, or a part of the billing nodes participating in billing, or one of the billing nodes participating in billing, when there are a plurality of checked and billed nodes 104, the checked and billed nodes 104 may be checked simultaneously by means of multithreading parallel processing, or the checked and billed nodes 104 may be checked sequentially by means of single-thread serial processing.
In one embodiment, as shown in fig. 2, a resource checking method based on a block chain is provided, which is described by taking the method as an example for being applied to the checking node in fig. 1, and includes the following steps:
and step S220, when the data verification instruction is triggered, determining verified bookkeeping nodes from bookkeeping nodes participating in bookkeeping according to the data verification instruction, wherein the bookkeeping nodes participating in bookkeeping perform encrypted billing by using the elliptic encrypted resource encryption operation points, the elliptic encrypted address operation points and the elliptic encrypted node address keys provided by the verification nodes.
The data verification instruction is an instruction for controlling the verification node to perform resource verification, and the data verification instruction may be automatically triggered by the verification node, for example: and determining which accounting nodes in the accounting nodes participating in accounting need to perform resource check according to the check period, and the resource check can also be triggered by a user. The accounting node participating in accounting is a node for accounting the generated transaction information based on the accounting system of the block chain, the accounting node participating in accounting may be a node for the generated transaction information, and one or more than two accounting nodes participating in accounting may be provided. The checked accounting node is the accounting node which needs resource check currently in the accounting nodes participating in accounting. The verification node is a node for verifying the resources of the verified accounting node. The elliptic encryption is a system for encrypting by adopting an elliptic encryption algorithm (ECC), and is a public key encryption system. The resource encryption operation point is a point selected from the elliptic curve and used for elliptic encryption operation, and the point is used for encrypting the corresponding transaction resource during transaction. The address encryption operation point is another point selected from the elliptic curve for the elliptic encryption operation, and the point is used for encrypting the node address key of the transaction counter-party at the time of transaction, and the transaction counter-party is an accounting node for transmitting the transaction with the current accounting node. The node address key is a key representing the address of the accounting node, and may be a random number randomly generated by the verifying node and then correspondingly allocated to the accounting node participating in accounting.
In one embodiment, a method for providing elliptic encrypted resource encryption operation points, address encryption operation points and node address keys for accounting nodes participating in accounting comprises the following steps: randomly selecting a resource encryption operation point and an address encryption operation point on the elliptic curve, and publishing the resource encryption operation point and the address encryption operation point to a block chain; and generating a corresponding random number for the accounting node participating in accounting, and correspondingly transmitting the random number to the accounting node participating in accounting as a node address key representing the address of the accounting node.
The resource encryption operation point and the address encryption operation point can be selected by randomly selecting two points on the elliptic curve by the verification node, randomly determining one point as the resource encryption operation point, and then determining the other point as the address encryption operation point. The block chain is a shared database in the accounting system, and the data or information stored in the block chain has the characteristics of 'unforgeability', 'trace in the whole process', 'traceability', 'public transparency', 'collective maintenance', and the like. The random number is a number randomly generated by the check node, or an array.
In one scene, two points G and H on the elliptic curve are randomly selected by the check node, G is a resource encryption operation point, H is an address encryption operation point, and G is a resourceThe encryption operation points and H are address encryption operation points which are broadcast and published to the chain as points of elliptic encryption operation. Meanwhile, the verification node generates a group of random numbers k for each accounting node participating in accounting (the accounting node and the transaction node are the same node, and when a transaction occurs with other nodes, the resource of the transaction (namely the transaction amount) and the node address key of the transaction counter-party need to be recorded)iEach accounting node corresponds to a kiE.g. the random number corresponding to the first accounting node is k1And the random number corresponding to the second accounting node is k2The random number is used as a node address key representing the address of the accounting node, and the accounting node participates in the encryption process during accounting.
Step S240, obtaining the billing private key sent by the verified billing node, and the total amount of resources to be verified and the transaction address information summary key of the verified billing node in the verified time period.
The accounting private key is generated by the verified accounting node, and when the verified accounting node verifies the resources of the verified accounting node, the verified accounting node needs to provide the accounting private key for verification. The total amount of the resources to be verified is the total amount of all transactions provided by the verified accounting node in the verified time period, and the total amount of the resources to be verified is equal to the total amount of the transactions actually occurring in the verified time period in principle. The transaction address information summarizing key is information obtained by encrypting the node address keys of the counter-party nodes of all transactions occurring in the verification time period, the node address keys of the counter-party nodes need to be obtained due to the obtaining of the transaction address information summarizing key, the node address keys belong to privacy information, the information is sent to the verification node after being obtained by calculation of the verified billing node, the verification node does not need to obtain the node address keys of the counter-party nodes of the transactions, and information leakage can be avoided.
And step S260, acquiring each single address key and each single ledger key which are disclosed in the block chain by the verified accounting node in the verified time period.
Wherein, the single address key is the address key of each transaction. At each transaction, the accounting node generates an ledger key (i.e., COMM) for each transaction in addition to the ledger keyi) An address key is also generated (i.e.: t isi) The generation mode of the address key is as follows: the accounting node performs elliptic curve multiplication operation with the elliptic encrypted address encryption operation point provided by the verification node according to an accounting private key generated in advance, namely pki= H * xi,pkiAccounting public key, x, referring to accounting nodeiAnd indicating a bookkeeping private key of the bookkeeping node so as to obtain a bookkeeping public key, and performing elliptic curve multiplication operation on the bookkeeping node and a node address key of the counter party node through the bookkeeping public key during each transaction, namely: t isi= ki* pkiWherein, TiRefers to the address key, thereby obtaining the address key for the transaction, which is published onto the blockchain. The single ledger key is the ledger key for each transaction. When a transaction occurs, the transaction amount of the transaction is recorded as ViAnd the node address key of the accounting node is kiThen, the single account book key is: COMMi=ViG+kiH, wherein COMMiThe account management system refers to a single account book key, the single account book key can be understood as the encrypted account book information of the transaction, and after the accounting node obtains the single account book key, the single account book key is published to a block chain.
Taking accounting node a and accounting node B transaction as an example: accounting node A receives accounting node B's digital currency 100, accounting node A's node address key is k1The public key of account is pk1(ii) a Node address key of accounting node B is k2The public key of account is pk2. The accounting node A accounts an transaction: then Vi=100,ki=k2,pkiIs pk1(ii) a Then k is2*pk1The address is a single address key of the transaction, namely Ti; then 100G + k2H is the single account book key of the transaction, i.e. COMMi(ii) a Address the single penThe key and the single ledger key are published to the blockchain. Receiving digital money as ViPositive, paying out digital currency ViIs negative, otherwise: when the accounting node B accounts the transaction, k is1*pk2The address is a single address key of the transaction, namely Ti; then-100 × G + k1H is the single account book key of the transaction, i.e. COMMi(ii) a And publishing the single address key and the single account book key to the blockchain.
And step S280, verifying whether the transaction address information summarizing key is accurate or not according to the product of the transaction address information summarizing key and the accounting private key.
According to the mathematical characteristics of the elliptic encryption, namely the elliptic encryption conforms to the exchange law and the combination law, the operation of a single address key of each transaction is participated by the accounting private key, the summary information of each single address key is the sum of the single address keys of all transactions in the verified time period, the summary key of the transaction address information is the information obtained by encrypting the node address keys of the counter party nodes of all transactions in the verified time period, and the product of the summary key of the transaction address information and the accounting private key is equal to the summary information of each single address key. Therefore, whether the transaction address information summarizing key is accurate or not is verified according to the principle that the product of the transaction address information summarizing key and the accounting private key is equal to the summarizing information of each single address key.
In one embodiment, verifying whether the transaction address information summary key is accurate based on the product of the transaction address information summary key and the billing private key comprises: carrying out elliptic curve multiplication operation according to the transaction address information summarizing key and the accounting private key to obtain the operated information; summing the single address keys to obtain summary information of the single address keys; comparing the calculated information with the summary information of each single address key; when the calculated information is consistent with the summary information of each single address key, the summary key of the transaction address information is accurate; when the calculated information is inconsistent with the summary information of each single address key, the summary key of the transaction address information is inaccurate.
Wherein, according to the transaction address information summary key and the accounting private key, elliptic curve multiplication operation is carried out, namely:
Figure 670849DEST_PATH_IMAGE001
where, x refers to the billing private key,
Figure 384727DEST_PATH_IMAGE002
refers to a transaction address information summarizing key,
thereby obtaining the calculated information. Summing the single address keys, namely:
Figure 695623DEST_PATH_IMAGE003
thereby obtaining the summary information of each single address key, i.e.
Figure 621990DEST_PATH_IMAGE004
According to the ellipse encryption conforming to the exchange law and the combination law, the following can be obtained:
Figure 967521DEST_PATH_IMAGE005
comparing the calculated information with the summary information of each single address key; when the calculated information is consistent with the summary information of each single address key, the summary key of the transaction address information provided by the verified node is accurate; when the calculated information is inconsistent with the summary information of each single address key, it indicates that the summary key of the transaction address information provided by the verified node is inaccurate, each single address key is stored in the block chain, the data stored in the block chain has the characteristics of 'unforgeability', 'whole trace', 'traceability', 'public transparency', 'collective maintenance' and the like, the accounting private key is also provided by the verified node, and the summary key of the transaction address information provided by the verified node is inaccurate, which indicates that the verified node has data providing fakes.
And step S300, when the transaction address information summary key is correct, verifying whether the total amount of the resources to be verified is accurate.
The single-account book key is obtained by performing elliptic curve addition operation on encrypted information obtained by encrypting resources of the transaction and encrypted information obtained by encrypting a node address key of a counter-party node of the transaction by a resource encryption operation point, and according to the mathematical characteristics of the elliptic encryption, namely the elliptic encryption conforms to an exchange law and a combination law, under the condition that a transaction address information summarizing key is correct, the sum of the encrypted information obtained by encrypting the total transaction amount of all transactions occurring in a verification time period and the transaction address information summarizing key is the same as the summarizing information of each single-account book key, namely:
Figure 324072DEST_PATH_IMAGE006
therefore, whether the total amount of the resources to be checked is accurate or not is verified according to the principle that the sum of the summary information of the single account book keys and the summary information of the transaction address information summary keys obtained after the total amount of the resources to be checked is encrypted through the resource encryption operation point is the same as the sum of the summary information of the transaction address information summary keys.
In an embodiment, referring to fig. 3, when the transaction address information summarizing key is correct, it is verified whether the total amount of the resource to be verified is correct, including steps S302 to S306:
and step S302, when the transaction address information summary key is correct, summing the keys of the single accounts to obtain summary information of the keys of the single accounts.
And step S304, encrypting the total amount of the resources to be checked according to the resource encryption operation points to obtain encryption information.
Step S306, the summary information of each single account book key is compared with the sum of the encryption information and the transaction address information summary key, and whether the total amount of the resources to be checked is accurate or not is determined.
Carrying out elliptic curve addition operation on the encrypted information and the transaction address information summary key to obtain an account book summary key; comparing the summary key of the account book with summary information of the keys of the single account book; when the summary key of the account book is consistent with the summary information of each single account book key, the total amount of the resources to be verified is accurate; and when the summary key of the account book is inconsistent with the summary information of each single account book key, the total amount of the resources to be verified is inaccurate. Each single account book key is stored in a block chain, data stored in the block chain has the characteristics of 'unforgeability', 'whole-course trace', 'traceable', 'public transparency', 'collective maintenance' and the like, and the transaction address information summarizing key is accurate, so that the verified node provides a false total amount of resources to be verified, and the summarizing information of the account book summarizing key and each single account book key is inconsistent.
In the above resource checking method based on the block chain, when the checking node needs to perform resource checking on a certain time period of the accounting node, a data checking instruction is triggered to further determine the checked accounting node; acquiring a billing private key sent by the checked billing node, and a summary key of the total amount of resources to be checked and the transaction address information of the checked billing node in the checked time period; acquiring each single address key and each single account book key which are disclosed in a block chain by a verified accounting node in a verified time period; according to the product of the transaction address information summarizing key and the accounting private key, whether the transaction address information summarizing key is accurate or not can be verified without decrypting privacy data; when the transaction address information summary key is correct, whether the total amount of the resources to be checked is accurate or not is verified, in the whole checking process, the checking of the resources can be completed without decrypting the address information in the single address key and the ledger information in the single ledger key or providing the address information in the single address key and the ledger information in the single ledger key by the accounting node, and the data safety of the checked nodes is improved.
In one embodiment, when the computed information is inconsistent with the summary information of each address key, the method further includes, after the step of inaccurate summary key of transaction address information: and summarizing the inaccurate key according to the transaction address information to determine that the total amount of the resources to be checked is inaccurate.
The system comprises a block chain, a plurality of accounting nodes and a plurality of checking nodes, wherein each single address key is stored in the block chain, data stored in the block chain has the characteristics of 'unforgeability', 'whole-course trace', 'traceable', 'public transparency', 'collective maintenance' and the like, the accounting private key is provided by the checking nodes, and the transaction address information summarizing key provided by the checking nodes is inaccurate, so that the checking nodes are provided with the false data, and further the total amount of resources to be checked is also considered to be inaccurate.
In one embodiment, the method for checking resources based on block chains further includes: the method comprises the steps that accurate resource sum is obtained from an accounting node with inaccurate resource sum to be checked, and the accurate resource sum is compared with each pair of single account book secret keys disclosed in a block chain in a checked time period; and carrying out resource deduction on the accounting node with inaccurate total amount of the resources to be checked.
If the total amount of the resources to be checked is inaccurate, it indicates that the checked node has data providing false, the data can be compared according to a single account book key corresponding to each comparison transaction, the node is required to provide correct asset total amount information, and digital asset punishment is performed on the fake node, that is, resource deduction is performed on the accounting node with inaccurate total amount of the resources to be checked.
It should be understood that although the various steps in the flow charts of fig. 2-3 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-3 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed in turn or alternately with other steps or at least some of the other steps.
In one embodiment, as shown in fig. 4, there is provided a resource checking apparatus based on a block chain, including: verified billing node determination module 310, first information acquisition module 320, second information acquisition module 330, first verification module 340, and second verification module 350, wherein:
and the verified bookkeeping node determining module 310 is configured to determine the verified bookkeeping node from the bookkeeping nodes participating in bookkeeping according to the data verification instruction when the data verification instruction is triggered, where the bookkeeping nodes participating in bookkeeping perform encrypted billing by using the elliptic-encrypted resource encryption operation point, the elliptic-encrypted address encryption operation point, and the elliptic-encrypted node address key provided by the verification node.
The first information obtaining module 320 is configured to obtain a billing private key sent by the verified billing node, and a summary key of the transaction address information and the total amount of resources to be verified in the verified time period of the verified billing node.
And the second information acquisition module 330 is configured to acquire each single address key and each single ledger key that are disclosed in the block chain by the checked accounting node within the checked time period.
The first verification module 340 is configured to verify whether the transaction address information summarizing key is accurate according to a product of the transaction address information summarizing key and the accounting private key.
The second verification module 350 is configured to verify whether the total amount of the resource to be verified is accurate when the transaction address information summary key is correct.
In one embodiment, the second verification module 350 is further configured to: when the transaction address information summary key is correct, summing the keys of the single account books to obtain summary information of the keys of the single account books; encrypting the total amount of the resources to be checked according to the resource encryption operation points to obtain encryption information; and comparing the summary information of the keys of the single account books with the sum of the encryption information and the transaction address information summary key to determine whether the total amount of the resources to be checked is accurate.
In one embodiment, the second verification module 350 is further configured to: carrying out elliptic curve addition operation on the encrypted information and the transaction address information summary key to obtain an account book summary key; comparing the summary key of the account book with summary information of the keys of the single account book; when the summary key of the account book is consistent with the summary information of each single account book key, the total amount of the resources to be verified is accurate; and when the summary key of the account book is inconsistent with the summary information of each single account book key, the total amount of the resources to be verified is inaccurate.
In one embodiment, the first verification module 340 is further configured to: carrying out elliptic curve multiplication operation according to the transaction address information summarizing key and the accounting private key to obtain the operated information; summing the single address keys to obtain summary information of the single address keys; comparing the calculated information with the summary information of each single address key; when the calculated information is consistent with the summary information of each single address key, the summary key of the transaction address information is accurate; when the calculated information is inconsistent with the summary information of each single address key, the summary key of the transaction address information is inaccurate.
In one embodiment, the first verification module 340 is further configured to: and summarizing the inaccurate key according to the transaction address information to determine that the total amount of the resources to be checked is inaccurate.
Referring to fig. 5, in an embodiment, the apparatus for checking resources based on a block chain further includes: the encryption rule setting module 360 is used for randomly selecting a resource encryption operation point and an address encryption operation point on the elliptic curve and publishing the resource encryption operation point and the address encryption operation point to the block chain; and generating a corresponding random number for the accounting node participating in accounting, and correspondingly transmitting the random number to the accounting node participating in accounting as a node address key representing the address of the accounting node.
In one embodiment, the second verification module 350 is further configured to: the method comprises the steps that accurate resource sum is obtained from an accounting node with inaccurate resource sum to be checked, and the accurate resource sum is compared with each pair of single account book secret keys disclosed in a block chain in a checked time period; and carrying out resource deduction on the accounting node with inaccurate total amount of the resources to be checked.
For specific definition of the resource check device based on the block chain, reference may be made to the above definition of the resource check method based on the block chain, and details are not described herein again. The modules in the block chain-based resource checking device can be wholly or partially implemented by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server or a terminal, and its internal structure diagram may be as shown in fig. 6. The computer device includes a processor, a memory, and a network interface connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing the resource encryption operation point and the address encryption operation point data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method for block chain based resource verification.
Those skilled in the art will appreciate that the architecture shown in fig. 6 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program:
when the data verification instruction is triggered, determining verified bookkeeping nodes from bookkeeping nodes participating in bookkeeping according to the data verification instruction, wherein the bookkeeping nodes participating in bookkeeping perform encryption billing by using elliptic-encrypted resource encryption operation points, address encryption operation points and node address keys provided by the verification nodes; acquiring a billing private key sent by the checked billing node, and a summary key of the total amount of resources to be checked and the transaction address information of the checked billing node in the checked time period; acquiring each single address key and each single account book key which are disclosed in a block chain by a verified accounting node in a verified time period; verifying whether the transaction address information summarizing key is accurate or not according to the product of the transaction address information summarizing key and the accounting private key; and when the transaction address information summary key is correct, verifying whether the total amount of the resources to be verified is correct.
In one embodiment, the processor, when executing the computer program, further performs the steps of: when the transaction address information summary key is correct, summing the keys of the single account books to obtain summary information of the keys of the single account books; encrypting the total amount of the resources to be checked according to the resource encryption operation points to obtain encryption information; and comparing the summary information of the keys of the single account books with the sum of the encryption information and the transaction address information summary key to determine whether the total amount of the resources to be checked is accurate.
In one embodiment, the processor, when executing the computer program, further performs the steps of: carrying out elliptic curve addition operation on the encrypted information and the transaction address information summary key to obtain an account book summary key; comparing the summary key of the account book with summary information of the keys of the single account book; when the summary key of the account book is consistent with the summary information of each single account book key, the total amount of the resources to be verified is accurate; and when the summary key of the account book is inconsistent with the summary information of each single account book key, the total amount of the resources to be verified is inaccurate.
In one embodiment, the processor, when executing the computer program, further performs the steps of: carrying out elliptic curve multiplication operation according to the transaction address information summarizing key and the accounting private key to obtain the operated information; summing the single address keys to obtain summary information of the single address keys; comparing the calculated information with the summary information of each single address key; when the calculated information is consistent with the summary information of each single address key, the summary key of the transaction address information is accurate; when the calculated information is inconsistent with the summary information of each single address key, the summary key of the transaction address information is inaccurate.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and summarizing the inaccurate key according to the transaction address information to determine that the total amount of the resources to be checked is inaccurate.
In one embodiment, the processor, when executing the computer program, further performs the steps of: randomly selecting a resource encryption operation point and an address encryption operation point on the elliptic curve, and publishing the resource encryption operation point and the address encryption operation point to a block chain; and generating a corresponding random number for the accounting node participating in accounting, and correspondingly transmitting the random number to the accounting node participating in accounting as a node address key representing the address of the accounting node.
In one embodiment, the processor, when executing the computer program, further performs the steps of: the method comprises the steps that accurate resource sum is obtained from an accounting node with inaccurate resource sum to be checked, and the accurate resource sum is compared with each pair of single account book secret keys disclosed in a block chain in a checked time period; and carrying out resource deduction on the accounting node with inaccurate total amount of the resources to be checked.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of:
when the data verification instruction is triggered, determining verified bookkeeping nodes from bookkeeping nodes participating in bookkeeping according to the data verification instruction, wherein the bookkeeping nodes participating in bookkeeping perform encryption billing by using elliptic-encrypted resource encryption operation points, address encryption operation points and node address keys provided by the verification nodes; acquiring a billing private key sent by the checked billing node, and a summary key of the total amount of resources to be checked and the transaction address information of the checked billing node in the checked time period; acquiring each single address key and each single account book key which are disclosed in a block chain by a verified accounting node in a verified time period; verifying whether the transaction address information summarizing key is accurate or not according to the product of the transaction address information summarizing key and the accounting private key; and when the transaction address information summary key is correct, verifying whether the total amount of the resources to be verified is correct.
In one embodiment, the computer program when executed by the processor further performs the steps of: when the transaction address information summary key is correct, summing the keys of the single account books to obtain summary information of the keys of the single account books; encrypting the total amount of the resources to be checked according to the resource encryption operation points to obtain encryption information; and comparing the summary information of the keys of the single account books with the sum of the encryption information and the transaction address information summary key to determine whether the total amount of the resources to be checked is accurate.
In one embodiment, the computer program when executed by the processor further performs the steps of: carrying out elliptic curve addition operation on the encrypted information and the transaction address information summary key to obtain an account book summary key; comparing the summary key of the account book with summary information of the keys of the single account book; when the summary key of the account book is consistent with the summary information of each single account book key, the total amount of the resources to be verified is accurate; and when the summary key of the account book is inconsistent with the summary information of each single account book key, the total amount of the resources to be verified is inaccurate.
In one embodiment, the computer program when executed by the processor further performs the steps of: carrying out elliptic curve multiplication operation according to the transaction address information summarizing key and the accounting private key to obtain the operated information; summing the single address keys to obtain summary information of the single address keys; comparing the calculated information with the summary information of each single address key; when the calculated information is consistent with the summary information of each single address key, the summary key of the transaction address information is accurate; when the calculated information is inconsistent with the summary information of each single address key, the summary key of the transaction address information is inaccurate.
In one embodiment, the computer program when executed by the processor further performs the steps of: and summarizing the inaccurate key according to the transaction address information to determine that the total amount of the resources to be checked is inaccurate.
In one embodiment, the computer program when executed by the processor further performs the steps of: randomly selecting a resource encryption operation point and an address encryption operation point on the elliptic curve, and publishing the resource encryption operation point and the address encryption operation point to a block chain; and generating a corresponding random number for the accounting node participating in accounting, and correspondingly transmitting the random number to the accounting node participating in accounting as a node address key representing the address of the accounting node.
In one embodiment, the computer program when executed by the processor further performs the steps of: the method comprises the steps that accurate resource sum is obtained from an accounting node with inaccurate resource sum to be checked, and the accurate resource sum is compared with each pair of single account book secret keys disclosed in a block chain in a checked time period; and carrying out resource deduction on the accounting node with inaccurate total amount of the resources to be checked.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A resource checking method based on a block chain is characterized in that the method comprises the following steps:
when a data verification instruction is triggered, determining verified bookkeeping nodes from bookkeeping nodes participating in bookkeeping according to the data verification instruction, wherein the bookkeeping nodes participating in bookkeeping perform encrypted billing by adopting elliptic encrypted resource encryption operation points, address encryption operation points and node address keys provided by the verification nodes;
acquiring a billing private key sent by the checked billing node, and a summary key of the total amount of resources to be checked and the transaction address information of the checked billing node in the checked time period;
acquiring each single address key and each single account book key which are disclosed in a block chain by the checked accounting node in the checked time period;
verifying whether the transaction address information summarizing key is accurate or not according to the product of the transaction address information summarizing key and the accounting private key;
and when the transaction address information summary key is correct, verifying whether the total amount of the resources to be verified is accurate.
2. The method according to claim 1, wherein the verifying whether the total amount of the resources to be verified is accurate when the transaction address information summarizing key is correct comprises:
when the transaction address information summary key is correct, summing the keys of the single account books to obtain summary information of the keys of the single account books;
encrypting the total amount of the resources to be checked according to the resource encryption operation point to obtain encryption information;
and comparing the summary information of each single account book key with the sum of the encryption information and the transaction address information summary key to determine whether the total amount of the resources to be verified is accurate.
3. The method of claim 2, wherein comparing the aggregated information for each of the individual ledger keys with the sum of the encrypted information and the transaction address information aggregated key to determine whether the total amount of resources to be verified is accurate comprises:
carrying out elliptic curve addition operation on the encrypted information and the transaction address information summary key to obtain an account book summary key;
comparing the ledger summary key with summary information of each single ledger key;
when the summary key of the account book is consistent with the summary information of each single account book key, the total amount of the resources to be verified is accurate;
and when the summary key of the account book is inconsistent with the summary information of each single account book key, the total amount of the resources to be verified is inaccurate.
4. The method of claim 1, wherein verifying whether the transaction address information summarizing key is accurate based on a product of the transaction address information summarizing key and the billing private key comprises:
carrying out elliptic curve multiplication operation according to the transaction address information summarizing key and the accounting private key to obtain the operated information;
summing the single address keys to obtain summary information of the single address keys;
comparing the calculated information with the summary information of each single address key;
when the calculated information is consistent with the summary information of each address key, the transaction address information summary key is accurate;
and when the calculated information is inconsistent with the summary information of each address key, the transaction address information summary key is inaccurate.
5. The method according to claim 4, wherein the step of inaccuracy of the transaction address information summary key when the calculated information is inconsistent with the summary information of the individual address keys further comprises:
and determining that the total amount of the resources to be checked is inaccurate according to the inaccuracy of the transaction address information summary key.
6. The method of claim 1, wherein the manner of providing the accounting node participating in accounting with the elliptically encrypted resource encryption operation point, address encryption operation point, and node address key comprises:
the resource encryption operation point and the address encryption operation point are selected at will on the elliptic curve and published to the block chain;
and generating a corresponding random number for the accounting node participating in accounting, and correspondingly sending the random number to the accounting node participating in accounting as the node address key representing the accounting node address.
7. The method according to claim 3 or 4, characterized in that the method further comprises:
acquiring accurate resource sum from the accounting node with inaccurate resource sum to be checked, and comparing the accurate resource sum with each pair of single account book keys disclosed in the block chain in the checked time period;
and carrying out resource deduction on the accounting node with inaccurate total amount of the resources to be checked.
8. An apparatus for checking a resource based on a block chain, the apparatus comprising:
the verified bookkeeping node determining module is used for determining verified bookkeeping nodes from bookkeeping nodes participating in bookkeeping according to the data verification instruction when the data verification instruction is triggered, and the bookkeeping nodes participating in bookkeeping adopt elliptic encryption resource encryption operation points, address encryption operation points and node address keys provided by the verification nodes to carry out encryption bookkeeping;
the first information acquisition module is used for acquiring a billing private key sent by the checked billing node, and the total amount of resources to be checked and the transaction address information gathering key of the checked billing node in the checked time period;
the second information acquisition module is used for acquiring each single address key and each single account book key which are disclosed in the block chain by the checked accounting node in the checked time period;
the first verification module is used for verifying whether the transaction address information summary key is accurate or not according to the product of the transaction address information summary key and the accounting private key;
and the second verification module is used for verifying whether the total amount of the resources to be verified is accurate or not when the transaction address information summary key is correct.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202010770748.5A 2020-08-04 2020-08-04 Resource verification method and device based on block chain and computer equipment Active CN111738726B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010770748.5A CN111738726B (en) 2020-08-04 2020-08-04 Resource verification method and device based on block chain and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010770748.5A CN111738726B (en) 2020-08-04 2020-08-04 Resource verification method and device based on block chain and computer equipment

Publications (2)

Publication Number Publication Date
CN111738726A true CN111738726A (en) 2020-10-02
CN111738726B CN111738726B (en) 2020-11-20

Family

ID=72657073

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010770748.5A Active CN111738726B (en) 2020-08-04 2020-08-04 Resource verification method and device based on block chain and computer equipment

Country Status (1)

Country Link
CN (1) CN111738726B (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000004631U (en) * 1998-08-12 2000-03-06 이칠성 Vibration selector
CN105809420A (en) * 2016-03-08 2016-07-27 杭州复杂美科技有限公司 Liquidation method of multi-layer block chain
KR101694455B1 (en) * 2016-03-14 2017-01-17 주식회사 스트리미 Method and apparatus for exchanging or remitting blockchain-based virtual currency
CN106780032A (en) * 2016-12-16 2017-05-31 杭州云象网络技术有限公司 A kind of block chain interchain assets transfer method under multichain scene
CN107742212A (en) * 2017-10-13 2018-02-27 深圳怡化电脑股份有限公司 Assets verification method, apparatus and system based on block chain
CN108881421A (en) * 2018-06-05 2018-11-23 天津大学 Cloud service Data Audit method based on block chain
US10373158B1 (en) * 2018-02-12 2019-08-06 Winklevoss Ip, Llc System, method and program product for modifying a supply of stable value digital asset tokens
CN110336673A (en) * 2019-06-03 2019-10-15 江苏科技大学 A kind of block chain design method based on secret protection
CN111008836A (en) * 2019-11-15 2020-04-14 哈尔滨工业大学(深圳) Privacy safe transfer payment method, device and system based on monitorable block chain and storage medium
CN111277415A (en) * 2020-01-20 2020-06-12 布比(北京)网络技术有限公司 Privacy protection method and device based on block chain intelligent contract

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20000004631U (en) * 1998-08-12 2000-03-06 이칠성 Vibration selector
CN105809420A (en) * 2016-03-08 2016-07-27 杭州复杂美科技有限公司 Liquidation method of multi-layer block chain
KR101694455B1 (en) * 2016-03-14 2017-01-17 주식회사 스트리미 Method and apparatus for exchanging or remitting blockchain-based virtual currency
CN106780032A (en) * 2016-12-16 2017-05-31 杭州云象网络技术有限公司 A kind of block chain interchain assets transfer method under multichain scene
CN107742212A (en) * 2017-10-13 2018-02-27 深圳怡化电脑股份有限公司 Assets verification method, apparatus and system based on block chain
US10373158B1 (en) * 2018-02-12 2019-08-06 Winklevoss Ip, Llc System, method and program product for modifying a supply of stable value digital asset tokens
CN108881421A (en) * 2018-06-05 2018-11-23 天津大学 Cloud service Data Audit method based on block chain
CN110336673A (en) * 2019-06-03 2019-10-15 江苏科技大学 A kind of block chain design method based on secret protection
CN111008836A (en) * 2019-11-15 2020-04-14 哈尔滨工业大学(深圳) Privacy safe transfer payment method, device and system based on monitorable block chain and storage medium
CN111277415A (en) * 2020-01-20 2020-06-12 布比(北京)网络技术有限公司 Privacy protection method and device based on block chain intelligent contract

Also Published As

Publication number Publication date
CN111738726B (en) 2020-11-20

Similar Documents

Publication Publication Date Title
US11443368B2 (en) Resource transfer and capital transfer method and apparatus
CN109493204B (en) Service accounting method based on block chain and terminal equipment
CN112053043B (en) Block chain-based crowd sensing method and system
US10375070B2 (en) Generating cryptographic function parameters from compact source code
CN111316615A (en) System and method for ensuring correct execution of computer program using a mediator computer system
CN111770198B (en) Information sharing method, device and equipment
CN113114476B (en) Privacy evidence storing method and device based on contract
CN111178894B (en) Asset type registration and transaction record verification method and system
CN110751485B (en) Data processing method and equipment
CN111090581B (en) Intelligent contract testing method, intelligent contract testing device, computer equipment and storage medium
CN110851877A (en) Data processing method and device, block chain node point equipment and storage medium
CN110704464B (en) Method and device for processing bifurcation problem
CN111612591A (en) Network-switching user credit rating method and device, control equipment and storage medium
CN112036878A (en) Data processing method and device
Wang et al. A fair and privacy-preserving image trading system based on blockchain and group signature
CN112948789B (en) Identity authentication method and device, storage medium and electronic equipment
CN112788555B (en) Cross-operator telephone charge transfer settlement method, device and computing equipment
CN111738726B (en) Resource verification method and device based on block chain and computer equipment
CN112765668B (en) Zero-knowledge proof privacy protection method, system, storage medium and equipment
CN113094735B (en) Privacy model training method
CN111814193B (en) Information sharing method, device and equipment
CN113055178B (en) Block chain system, and method, system, device and medium for transmitting numerical information
CN110766407A (en) Transaction verification method, accounting node and medium based on block chain
CN111027992A (en) Asset transaction method and device based on blockchain system and hardware equipment
CN110751483A (en) Financial accounting and sales rushing method and device based on block chain and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant