CN107341402A - A kind of program excutive method and device - Google Patents

A kind of program excutive method and device Download PDF

Info

Publication number
CN107341402A
CN107341402A CN201710463921.5A CN201710463921A CN107341402A CN 107341402 A CN107341402 A CN 107341402A CN 201710463921 A CN201710463921 A CN 201710463921A CN 107341402 A CN107341402 A CN 107341402A
Authority
CN
China
Prior art keywords
decision
making
user
program
target program
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710463921.5A
Other languages
Chinese (zh)
Other versions
CN107341402B (en
Inventor
徐刚
胡淳
胡淳一
陈盛东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Decision Chain Mdt Infotech Ltd
Original Assignee
Shanghai Decision Chain Mdt Infotech Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Decision Chain Mdt Infotech Ltd filed Critical Shanghai Decision Chain Mdt Infotech Ltd
Priority to CN201710463921.5A priority Critical patent/CN107341402B/en
Publication of CN107341402A publication Critical patent/CN107341402A/en
Application granted granted Critical
Publication of CN107341402B publication Critical patent/CN107341402B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Human Resources & Organizations (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application discloses a kind of program excutive method, applied to the decentralization system based on block chain, wherein, target program in the decentralization system is included to the distributed data base of the block chain, and the execution flow of the target program is by each user's Shared Decision Making in pre-set user group;Methods described includes:Collect the result of decision that each user in the pre-set user group is submitted respectively based on the private key held;Determine whether decision-making passes through the target program based on the result of decision and default decision strategy being collected into;If the target program decision-making is by the implementing result of the block chain issue target program.The application is also to lift the execution stability of the target program in decentralization system.

Description

A kind of program excutive method and device
Technical field
The application is related to Computer Applied Technology field, more particularly to a kind of program excutive method and device.
Background technology
Block chain technology, it is that one kind is participated in " keeping accounts " jointly by some computing devices, it is common to safeguard that portion completely divides The emerging technology of cloth database.Because there is block chain technology decentralization, open and clear, every computing device can participate in The characteristic of data syn-chronization can be rapidly performed by between data-base recording and each computing device, is taken using block chain technology Decentralization system is built, and includes various configuration processors in the distributed data base of block chain and is performed automatically, in crowd Widely applied in more fields;For example, in financial technology field, P2P payment platforms are built using block chain technology, and The configuration processors such as intelligent contract are issued on block chain, can be realized on the premise of without bank and other financial mechanism Point-to-point secure payment between different users.
In actual applications, due to being included to the configuration processor in the distributed data base of block chain, can be synchronized to Each computing device in block chain, and performed automatically in individual device, therefore for reasons of safety, these quilts Include to the configuration processor in block chain, generally all can perform condition performing setting strict in code.
However, with the complication of application scenarios, even if setting strict execution for the configuration processor in write-in block chain Condition, under some special scenes, the configuration processor still possibly the problem of can not normally performing.
The content of the invention
In view of this, the application proposes a kind of program excutive method, a kind of program excutive method, it is characterised in that application In the decentralization system based on block chain, wherein, the target program in the decentralization system is included to the block The distributed data base of chain, the execution flow of the target program is by each user's Shared Decision Making in pre-set user group;It is described Method includes:
Collect the result of decision that each user in the pre-set user group is submitted respectively based on the private key held;
Determine whether decision-making passes through the target program based on the result of decision and default decision strategy being collected into;
If the target program decision-making is by the implementing result of the block chain issue target program.
Optionally, the target program includes multiple subprograms;
It is described based on the result of decision being collected into and default decision strategy determine the target program whether decision-making by, Including:
Determine that the whether equal decision-making of each subprogram passes through based on the result of decision and the default decision strategy being collected into;Such as The equal decision-making of each subprogram of fruit passes through, it is determined that the target program decision-making passes through.
Optionally, the default decision strategy, including:
User's ratio that decision-making passes through in the pre-set user group is counted based on the result of decision being collected into;
Judge whether user's ratio reaches predetermined threshold value;
If user's ratio reaches predetermined threshold value, determine that decision-making passes through.
Optionally, wherein, the private key that each user holds has preset corresponding decision weights ratio respectively;User's ratio Decision weights ratio sum corresponding to the private key that each user passed through by decision-making holds.
Optionally, when the target program includes multiple subprograms, each subprogram in the target program is right respectively Answer the different predetermined threshold values.
Optionally, the target program is the intelligent contract program being distributed on block chain;Or for online negotiation The online negotiation program of the intelligent contract program;
Wherein, the intelligent contract program, go out for creditor, debtor and bank's tripartite's online negotiation, based on institute State the intelligent contract program that the accounts receivable information between creditor and debtor carries out financing loan to the bank.
Optionally, the target program is that the private key for holding to each user in the pre-set user group is carried out mutually The configuration processor change, increase, deleted.
The application also proposes a kind of program executing apparatus, applied to the decentralization system based on block chain, wherein, it is described Target program in decentralization system is included to the distributed data base of the block chain, the execution stream of the target program Journey is by each user's Shared Decision Making in pre-set user group;Described device includes:
Collection module, determined for collecting each user in the pre-set user group based on what the private key held was submitted respectively Plan result;
Determining module, for whether determining the target program based on the result of decision and default decision strategy that are collected into Decision-making passes through;
Execution module, for the target program decision-making by when, issue the target program to the block chain Implementing result.
Optionally, the target program includes multiple subprograms;
The determining module is further used for:
Determine that the whether equal decision-making of each subprogram passes through based on the result of decision and the default decision strategy being collected into;Such as The equal decision-making of each subprogram of fruit passes through, it is determined that the target program decision-making passes through.
Optionally, the default decision strategy, including:
User's ratio that decision-making passes through in the pre-set user group is counted based on the result of decision being collected into;
Judge whether user's ratio reaches predetermined threshold value;
If user's ratio reaches predetermined threshold value, determine that decision-making passes through.
Optionally, wherein, the private key that each user holds has preset corresponding decision weights ratio respectively;User's ratio Decision weights ratio sum corresponding to the private key that each user passed through by decision-making holds.
Optionally, when the target program includes multiple subprograms, each subprogram in the target program is right respectively Answer the different predetermined threshold values.
Optionally, the target program is the intelligent contract program being distributed on block chain;Or for online negotiation The online negotiation program of the intelligent contract program;
Wherein, the intelligent contract program, go out for creditor, debtor and bank's tripartite's online negotiation, based on institute State the intelligent contract program that the accounts receivable information between creditor and debtor carries out financing loan to the bank.
Optionally, the target program is that the private key for holding to each user in the pre-set user group is carried out mutually The configuration processor change, increase, deleted.
In this application, it is proposed that a kind of target program being directed in block chain performs the more private key Shared Decision Makings of multi-user Mechanism, target program is being included to the distributed data base in block chain based on the decentralization system of block chain, can be with The result of decision that each user in pre-set user group is submitted respectively based on the private key held is collected, be then based on being collected into determines Plan result and default decision strategy determine whether decision-making passes through the target program;If the target program decision-making is by can To issue the implementing result of the target program to the block chain;
Due in this application, for the decision-making mandate of the target program in block chain, being no longer dependent on based on single private The decision-making licensing scheme of key, but be total to by multiple users in pre-set user group based on the multiple private keys each held With authorizing, therefore single private key can be avoided once to lose or be cracked, and caused by target program the problem of can not performing, make The target program is obtained in the case where part private key is lost or is cracked, the target program remains able to normally perform, so as to To lift the execution stability of target program.
It should be appreciated that the general description and following detailed description of the above are only exemplary and explanatory, not The application can be limited.
Brief description of the drawings
, below will be to embodiment or existing in order to illustrate more clearly of the embodiment of the present application or technical scheme of the prior art There is the required accompanying drawing used in technology description to be briefly described, it should be apparent that, drawings in the following description are only this Some embodiments described in application, for those of ordinary skill in the art, other can also be obtained according to these accompanying drawings Accompanying drawing.
Fig. 1 is the schematic flow sheet of the program excutive method of the application;
Fig. 2 is a kind of logic diagram for program executing apparatus that the implementation of the application one exemplifies;
Fig. 3 is the hardware structure for the hardware device that the application one implements a kind of carrying described program performs device exemplified Figure.
Embodiment
In the decentralization system built based on block chain technology, due to being included to the distributed data base of block chain In configuration processor, it will usually each computing device being synchronized in block chain, and the entering independently on node device Row performs, therefore for reasons of safety, these configuration processors being included generally all can be strict in code is performed Execution condition is set.
In actual applications, above-mentioned execution condition, typically the requirement management user related to configuration processor, i.e. program are pre- If the user in groups of users, decision-making mandate is carried out using execution flow of the private key held to configuration processor.
For example, in actual applications, management user can use the private key held to submit an electronic signature as mandate As a result;Or management user can use hold private key submission one signed electronically after instruction or message conduct Authorization result, the execution flow to above-mentioned executive programs carry out decision-making mandate.
In this case, after the target program in block chain on any one computing device is triggered execution, only Management user carries out decision-making mandate by rear using the private key held to the target program, and the target program just can be by implementing result It is distributed to block chain.
However, being based on existing decision-making licensing scheme, user carries out decision-making mandate in the target program to the execution that is triggered When, it is normally based on the mandate of single private key;I.e. user generally only holds for carrying out the unique of decision-making mandate to target program Private key.
In this case, once the unique private goes out active (for example holding the labor turnover of the private key) or broken The fortuitous events such as solution, caused by consequence will be very serious, it is unavailable to directly result in the configuration processor, or even is caused to user Economic loss;
For example, so that above-mentioned target program is the intelligent contract being distributed in block chain as an example, the intelligence is closed if held The unique private for about carrying out decision-making mandate goes out active or is cracked, and not only results in scrapping for the intelligent contract, or even meeting User is caused to lose because the unique private is falsely used.
It can be seen that the existing mechanism for carrying out decision-making mandate to target program based on single private key, there is significant technology Limitation, under the special screne that unique private goes out active or is cracked, can influence the execution stability of target program.
In order to solve the above problems, the application propose it is a kind of propose it is a kind of be directed to block chain in target program perform it is more The mechanism of user institute private key Shared Decision Making, included based on the decentralization system of block chain by target program to point of block chain After cloth database, the execution if target program on any one computing device is triggered, pre-set user can be collected The result of decision that each user in group is submitted respectively based on the private key held, it is then based on the result of decision that is collected into and pre- If decision strategy determines whether decision-making passes through the target program;If the target program decision-making is by can be to the block Chain issues the implementing result of the target program;
Due in this application, for the decision-making mandate of the target program in block chain, being no longer dependent on based on single private The decision-making licensing scheme of key, but be total to by multiple users in pre-set user group based on the multiple private keys each held With authorizing, therefore single private key can be avoided once to lose or be cracked, and caused by target program the problem of can not performing, make The target program is obtained in the case where part private key is lost or is cracked, the target program still may be performed normally, so as to To lift the execution stability of target program.
The application is described below by specific embodiment and with reference to specific application scenarios.
Fig. 1 is refer to, Fig. 1 is a kind of program excutive method that the embodiment of the application one provides, applied to based on block chain Decentralization system, wherein, the target program in the decentralization system is included to the distributed data base of block chain In, the execution flow of the target program is by each user's Shared Decision Making in pre-set user group;Perform following steps:
Step 101, the decision-making knot that each user in the pre-set user group is submitted respectively based on the private key held is collected Fruit;
Step 102, based on the result of decision and default decision strategy being collected into determine the target program whether decision-making Pass through;
Step 103, if the target program decision-making is by the execution knot of the block chain issue target program Fruit.
Above-mentioned decentralization system, it can be specifically one and be built based on block chain technology, the distribution of " decentralization " Formula system.
Wherein, in above-mentioned decentralization system, some computing devices can be included, these computing devices can be presented A kind of " decentralization " characteristic of high degree of autonomy, and can be by carrying common recognition mechanism (such as the specific common recognition of block chain Negotiation algorithm), the configuration processor of data caused by localization, or issue is distributed on the block chain, and is newly generated " book keeping operation people " (being commonly called as " miner ") of new block include into the new block, while each node for accessing the block chain can be with All the elements in the block are synchronized to its local, so as to form the distributed data base of the block chain.
In this way, user need not be used as " data center " disposing large-scale server cluster from the background, and Any form of headend equipment (such as mobile terminal, PC terminals) of user side, can serve as above-mentioned decentralization system In a computing device node.After the target program for being synchronized to the computing device node is triggered execution, pre-set user group The user of group can initiate the decision-making mandate to the target program based on the private key held by the computing device.
Above-mentioned pre-set user group, refer to by multiple there is the user for carrying out decision-making authorization privilege to target program to be formed Groups of users.In actual applications, above-mentioned pre-set user group, specifically above-mentioned mesh can be arranged in the form of white list In beacon course sequence.In this way so that only hit the user of white list, can participate in above-mentioned target program Decision-making licensing process.
In actual applications, each user in the groups of users, one can be held and be used to enter target program The private key of row decision-making mandate (certainly in actual applications, each management user can also hold multiple private keys).When above-mentioned mesh Beacon course sequence is triggered in block chain after execution, each user in above-mentioned groups of users can based on the private key that oneself is held, to The block chain submits a result of decision, and the target program can be according to the result of decision being collected into, and default decision-making Strategy, to determine whether decision-making passes through the target program;For example when realizing, above-mentioned decision strategy can be specifically based on receipts The quantity of the electronic signature collected determines whether decision-making passes through the execution flow of above-mentioned target program.
Wherein, in actual applications, the concrete form of the above-mentioned result of decision, in this application without being particularly limited to;Example Such as, the above-mentioned result of decision, can be specifically the electronic signature that a management user is submitted using the private key held;Can also It is to manage an instruction or message after user is signed electronically using the private key held, etc..
Above-mentioned target program, refer to be included to the distributed data base of block chain, and be synchronized to each meter in block chain Calculate the program code of equipment.Wherein, the concrete form of above-mentioned target program, in this application without being particularly limited to, Ke Yishi Include into the distributed data base of block chain, it performs the arbitrary form that requirements of process is carried out decision-making mandate by user Executable program;
For example, above-mentioned target program can be configuration processor (such as the intelligent contract journey being distributed on block chain Sequence), for configuration processor (such as the online association for the above-mentioned intelligent contract of online negotiation to Online release program on block chain Business's program), and the holding of being interchangeable, increase, deleting of the private key for holding to each user in above-mentioned pre-set user group Line program, or other types of program that can be performed on block chain, etc..
The decision-making mandate of the above-mentioned execution flow to target program, can specifically include whether starting above-mentioned target program The decision-making mandate of operation, the decision-making mandate to the implementation procedure of above-mentioned target program can also be included;
For example, in one case, the process of above-mentioned decision-making mandate, can as the trigger condition of above-mentioned target program, There was only decision-making mandate by rear, above-mentioned target program can just be brought into operation, and implementing result then is distributed into block chain; In another case, can also be by above-mentioned decision-making licensing process, to the target program after above-mentioned target program brings into operation Implementation procedure authorized;There was only decision-making by rear, implementing result can just be distributed to block chain by above-mentioned target program.
In this application, in order to should to it is existing based on single private key to target program carry out decision-making mandate when, due to only One private key lose or be cracked and caused by target program the problem of can not performing or performing the potential safety hazard brought, it is proposed that A kind of target program being directed in block chain performs the mechanism of multi-user institute private key Shared Decision Making.
It is each in pre-set user group after the target program being synchronized on any one computing device is triggered execution User, the result of decision after being signed based on private key can be submitted respectively to the computing device based on the private key each held, To perform the Shared Decision Making of the more private keys of multi-user for the target program so that the target program part private key lose or by In the case of cracking, the target program still may be performed normally.
In a kind of embodiment shown, above-mentioned target program can be specifically to include to the intelligence in block chain to close About program.
Wherein, so-called intelligent contract program, the rights and duties for typically referring to arrange in digital form participant are held Line program.
For example, in actual applications, above-mentioned intelligent contract program can be specifically the intelligence being distributed in block chain Contract program or refer to online negotiation program for online negotiation intelligence contract program.In an initial condition, successfully note Between the multi-party users of the above-mentioned decentralization system of volume, it can rely on and include into the distributed data base of above-mentioned block chain Online negotiation program, it is common to participate in negotiating one section of intelligent contract program.
Below will be by specific embodiment, in the decentralization system built based on block chain, performing online hair The process of multi-user's decision-making during the online negotiation program of cloth intelligence contract program, and it has been distributed to the intelligence of block chain in execution The process of multi-user's decision-making during energy contract program, is described respectively.
First, multi-user's decision-making of online negotiation program
1) " triggering of online negotiation program performs "
It above-mentioned online negotiation program, can generally be developed, and be included to the distributed number of block chain by its operator According in storehouse.After above-mentioned online negotiation program is included into above-mentioned distributed data base, the common recognition machine of block chain can be passed through System, based on the bottom P2P networks of carrying block chain, the online negotiation program is subjected to the whole network expansion in the decentralization system Dissipate, each computing device being synchronized in block chain.
For example, so that creditor carries out the application scenarios of financing loan to bank based on accounts receivable information as an example, this Under scene, creditor, debtor and bank tripartite can rely on the online negotiation program included in block chain, online A tripartite agreement for carrying out financing loan to bank based on accounts receivable information is negotiated (to carry out based on accounts receivable information The configuration processor of financing loan).
Wherein, the processing logic defined in above-mentioned online negotiation program, and the work of above-mentioned workflow program links Make stream order, in this application without being particularly limited to.
For example, still so that creditor carries out the application scenarios of financing loan to bank based on accounts receivable information as an example, at this Plant under scene, the workflow program that creditor, debtor and bank tripartite are carried in financing loan scheduling system is relied on, Online negotiation based on accounts receivable information to bank carry out finance loan tripartite agreement when, above-mentioned online negotiation application definition Negotiation order can be specifically:
Debtor submits accounts receivable information-creditor to carry out confirming-generation tripartite association of bank to accounts receivable information View-debtor and creditor carry out confirming-tripartite agreement negotiation completion to tripartite agreement.
First, debtor, can be based on the private held after the accounts receivable information pair between creditor confirms Accounts receivable information between key pair and creditor signs electronically, by the accounts receivable information Online release to block chain Distributed data base, and above-mentioned workflow program is relied on, the accounts receivable information is submitted into creditor is confirmed.
In next step, after creditor receives the accounts receivable information of debtor's submission, this can be answered based on the private key held Receive accounts receivable information and carry out electronic signature completion confirmation, be then based on above-mentioned workflow program above-mentioned accounts receivable information is further Submit to the side of bank one;
In next step, the side of bank one is after the accounts receivable information of creditor's submission is received, due to the accounts receivable information Via debtor and creditor, each private key is confirmed, therefore can be based on accounts receivable information generation tripartite agreement (for example the financing loan quotation of bank, the information such as interest rate, payback period of financing loan are generally comprised in tripartite agreement), and Complete to confirm because the management user of the side of bank one carries out the tripartite agreement electronic signature based on the private key held, be then based on Above-mentioned tripartite agreement is further submitted to debtor and creditor and confirmed respectively by above-mentioned workflow program;As creditor and After the completion of debtor confirms to above-mentioned tripartite agreement in the same way, now the online negotiation process of above-mentioned tripartite agreement is complete Into.
Certainly, it is described above to carry out the application scenarios of financing loan to bank based on accounts receivable information with creditor In negotiation order, it is exemplary only;Obviously, in actual applications, those skilled in the art are by the technical side of the application When case is put into effect, actual demand can be combined, to the processing logic defined in above-mentioned online negotiation program, and it is above-mentioned The negotiation order of line negotiation procedure links carries out self-defined.
In this application, after above-mentioned line negotiation procedure is included by block chain, for any in accessing in the block chain For one computing device, the online negotiation program can be performed in local instruction triggers.
Wherein, when realizing, user can use an independent computing device, be carried out with the computing device in block chain Communication;Or by sharing same computing device with the computing device in block chain, above-mentioned online negotiation journey is performed to trigger Sequence.
In a kind of embodiment shown, above-mentioned online negotiation program can be specifically that the triggering issued by block chain disappears Breath performs to trigger.
For example, using above-mentioned intelligent contract program as creditor, debtor and bank's tripartite consultation go out based on answering receipt on account Exemplified by money information carries out the tripartite agreement of financing loan to bank, above-mentioned online negotiation program can be specifically to be used for online negotiation The configuration processor of above-mentioned tripartite agreement, the triggering command of the intelligent contract is performed for triggering, is existed with debtor The system message for the accounts receivable information correlation that line is submitted;In this case, debtor can use an independent calculating In equipment, or computing device on computing device in block chain in preassembled client software, with block chain is carried out Communication.After debtor is performing specific operation on the client software (for example click on and upload pressing for accounts receivable information The operation of button), after line submits an accounts receivable information, a system can be issued to the computing device by block chain and disappeared Breath, to trigger the above-mentioned online negotiation program of the computing device.
After the computing device in block chain is receiving the triggering command of block chain issue, can further it call Local above-mentioned online negotiation program is synchronized to, automatic running online negotiation program in the running environment of local, completes intelligence The Multi Part Negotiation of energy contract program;
For example, each computing device in an example, block chain, can carry out virtualization process in advance, create virtual Machine, and above-mentioned intelligent contract program is independently executed using the environment of virtual machine.In this way, it can be ensured that each calculate sets It is standby when independently performing intelligent contract program, even if cross operating system, across hardware operation, remain able to obtain identical fortune Row result.
2) more private key decision-making mandates of online negotiation program
In this example, in the related program code of above-mentioned online negotiation program, corresponding execution bar can be added in advance Part.Wherein, above-mentioned execution condition, it is typically configured as requiring management user corresponding to the online negotiation program, uses what is held Execution flow of the private key to configuration processor carries out decision-making mandate.
Based on existing decision-making licensing scheme, management user carries out decision-making in the execution flow of the program to the execution that is triggered During mandate, the mandate of single private key is normally based on;I.e. user generally only holds for carrying out decision-making mandate only to the program One private key.
And use single private key to carry out decision-making mandate to program, it is possible that when unique private is lost or is cracked, Program integrally disabled problem is caused, therefore above-mentioned execution condition can be configured as requiring corresponding to the program in the application Multiple management users, Shared Decision Making mandate is carried out using execution flow of multiple private keys to the program.
In an initial condition, it can be pre-configured with for above-mentioned online negotiation program corresponding to one and manage groups of users.Than Such as, above-mentioned management groups of users can be configured in above-mentioned online negotiation program in advance in the form of white list.Wherein, if The online negotiation program bag can be directed to each subprogram and distinguish containing multiple subprograms (in the case of i.e. multiple execution steps) Configure an independent management groups of users.In the management groups of users (i.e. above-mentioned pre-set user group), can include from In the user of above-mentioned decentralization system successful registration, multiple pipes corresponding to above-mentioned intelligent contract program for selecting out Manage user.
, wherein it is desired to illustrate, the management user in the management groups of users, participation can be covered and consult intelligent contract The user group of program, can also cover participate in consult the intelligent contract user group beyond other user groups (such as Supervise user), in this application without being particularly limited to.
I.e. in actual applications, can by participating in consulting the user group of intelligent contract program, come complete for it is above-mentioned The decision-making mandate of line negotiation procedure, can also be by participating in consulting other customer groups beyond the user group of intelligent contract program Body, to complete the decision-making mandate for the online negotiation program.
Wherein, for each management user in above-mentioned management groups of users, a use can also be held respectively In the private key that decision-making mandate is carried out to above-mentioned online negotiation program.The provider of the private key, in this application without especially limit It is fixed, can be due to specifically that the operator of above-mentioned decentralization system is provided or by third-party CA (Certificate Authority, Certificate Authority center) mechanism provides.
For example, in a kind of embodiment shown, the operator of above-mentioned decentralization system, or third-party CA machines Structure, private key and electronic signature can be provided built in one respectively towards each management user in above-mentioned management groups of users The electronic signature hardware of algorithm.
In this case, it is above-mentioned to go centring system to pass through area after above-mentioned online negotiation program is triggered execution Each computing device in block chain is soft with holding client used in each management user of private key in above-mentioned management groups of users Part is communicated, and a prompting message is exported to each management user respectively by client software used in each management user, To prompt each management user to carry out decision-making mandate to the online negotiation program based on the private key each held.
For example, so that above-mentioned triggering command is the system message for the accounts receivable information correlation that debtor submits online as an example, In this case, above-mentioned prompting message can be specifically one be pushed to it is each management user " please use electronic signature hardware Accounts receivable information is confirmed " text prompt.
, can be on client software after each management user is viewing the above-mentioned prompting message of client software output Specific operation is performed, decision-making mandate is carried out to above-mentioned online negotiation program, and based on the private key each held, by currently being made Computing device, signs electronically to the message for carrying the result of decision, is then published in block chain.
For example, the above-mentioned electronic signature hardware that respectively management user will can hold, is linked on used computing device, And by triggering the ACK button on electronic signature hardware, a decision information is triggered, and using built-in in electronic signature hardware Private key and electronic signature algorithm, decision information is signed electronically, is then published in block chain.
For the result of decision being published in block chain, can be based on by existing data synchronization mechanism in block chain The bottom P2P networks of block chain are carried, the decision data is subjected to the whole network diffusion in the decentralization system, is synchronized to block Each computing device in chain.
And for the computing device in block chain, it is synchronized to local by other computing devices in block chain when receiving The result of decision after, the electronic signature that carried in the result of decision can be verified (such as can be by above-mentioned decentralization system The operator of system is verified, can also further submit to third-party CA mechanisms to be verified), to confirm to submit the decision-making As a result the legal identity of management user, and determine that the result of decision is effective in electric signing verification, be locally stored by rear The corresponding result of decision.
In this way, the computing device in block chain, each management that can be collected into above-mentioned management groups of users The result of decision that user submits respectively.
, wherein it is desired to explanation, in this application, each management user in above-mentioned management groups of users, to above-mentioned When online negotiation program carries out decision-making mandate, decision-making mandate can be carried out simultaneously, can also be distinguished based on certain decision sequence Carry out decision-making mandate.
It is above-mentioned to go centring system after above-mentioned intelligent contract is being triggered execution in a kind of embodiment shown With by each computing device in block chain, with holding in above-mentioned management groups of users used in each management user of private key Client software is communicated, and one is exported by client software used in each management user, while to each management user Prompting message, to prompt each management user to carry out decision-making mandate to the intelligent contract based on the private key each held.
In this case, respectively management user, can be immediately based on the private each held after above-mentioned prompting message is received Key, by presently used computing device, the relevant Decision result for carrying electronic signature is signed electronically, Ran Houfa Cloth is into block chain.
In the another embodiment shown, each management user can also be based on successively according to certain decision sequence The private key each held, to complete the decision-making mandate to above-mentioned online negotiation program.
Wherein, above-mentioned decision sequence, in actual applications can the need based on reality in the application without being particularly limited to Ask and carry out self-defined setting.For example, above-mentioned decision sequence, can be " decision-making examination & approval the order " (ratio defined based on actual demand As different grades of user examines step by step).
In this case, it is above-mentioned to go centring system, client software used in user can be managed by each, according to Pre-defined decision sequence, above-mentioned prompting message is sequentially output to each management user, and in management user in the prompting message Prompting under, after completing the decision-making mandate for above-mentioned online negotiation program, according to above-mentioned decision sequence, continue to next Manage user and export above-mentioned prompting message, carrying out decision-making continuing with above-mentioned online negotiation program by next management user awards Power;By that analogy, user is managed under the prompting of above-mentioned prompting message until each, be fully completed determining for above-mentioned negotiation procedure Stop during plan mandate.
In this example, after each management with the decision-making mandate for above-mentioned online negotiation program is completed per family, due to this When block chain in each computing device, the result of decision that each management user submits can be collected into, therefore in block chain Each computing device for, the electronic signature that is collected into and default decision strategy are can be based on, to determine that this is above-mentioned Online negotiation program whether decision-making by, and decision-making by when the implementing result of above-mentioned online negotiation program is (final The result of decision), it is published in block chain.
It should be noted that in actual applications, multiple subprograms can be generally included in above-mentioned online negotiation program;Its In, each subprogram generally corresponds to an execution step in above-mentioned online negotiation program respectively;In this case, each pipe The mode that user can be as described above is managed, is entered respectively for each subprogram included in the above-mentioned online negotiation program Row decision-making mandate, and signed to block chain distributing electronic.
Wherein, in actual applications, if above-mentioned online negotiation program includes multiple subprograms, for each sub- journey For sequence, an independent management groups of users can be set respectively;That is, each of above-mentioned online negotiation program performs step Suddenly, the Shared Decision Making of multi-user institute private key can be carried out based on entirely different management groups of users.
And the computing device in block chain, based on the electronic signature and default decision strategy being collected into, determine above-mentioned Online negotiation program whether decision-making by when, can determining each subprogram successively, whether decision-making in each subprogram by and determining Plan is by rear, then judges that above-mentioned online negotiation programmed decision passes through.I.e. in this application, when above-mentioned online negotiation program bag is containing more During individual subprogram, only when the equal decision-making of the plurality of subprogram by, whole online negotiation program can decision-making pass through.
For example, still so that creditor carries out the application scenarios of financing loan to bank based on accounts receivable information as an example, it is above-mentioned Online negotiation application definition negotiation order can be specifically:
Debtor submits accounts receivable information-creditor to carry out confirming-generation tripartite association of bank to accounts receivable information View-debtor and creditor carry out confirming-tripartite agreement negotiation completion to tripartite agreement.
In such a scenario, each step in above-mentioned workflow sequence, above-mentioned online negotiation program can be corresponded to In a subprogram;And for debtor, creditor and bank tripartite, each party can one pipe of separate configurations Groups of users is managed, carries out the Shared Decision Making of multi-user institute private key.
When realizing, first, each management user in the management groups of users of the side of debtor one, couple between creditor Accounts receivable information confirmed after, accounts receivable information that can be based on the private key held respectively pair between creditor is entered Row electronic signature, by the distributed data base of the accounts receivable information Online release to block chain, and relies on above-mentioned workflow Program, the accounts receivable information is submitted into the side of creditor one and confirmed.
In next step, can be by the pipe of the side of creditor one after the side of creditor one receives the accounts receivable information of debtor's submission Each management user in reason groups of users confirms to the accounts receivable information;When in the management groups of users of the side of creditor one Each management user the accounts receivable information is confirmed after, can be based on the private key held respectively to the accounts receivable information Carry out electronic signature to complete to confirm, be then based on above-mentioned workflow program and above-mentioned accounts receivable information is further submitted into bank One side;
In next step, the side of bank one can be based on the accounts receivable and believe after the accounts receivable information of creditor's submission is received Breath generation tripartite agreement (for example the financing loan quotation of bank, the interest rate of financing loan are generally comprised in tripartite agreement, refund The information such as time limit), and by each management user in the management groups of users of the side of bank one based on the private key held respectively to this three Fang Xieyi carries out electronic signature and completed after confirming, above-mentioned tripartite agreement is further submitted into debt based on above-mentioned workflow program The side of people one and the side of creditor one are confirmed respectively;When the side of creditor one and the side of debtor one are in the same way to above-mentioned three After the completion of square protocol validation, now the online negotiation process of above-mentioned tripartite agreement is completed.
It can be seen that in the case where above-mentioned online negotiation program bag contains multiple subprograms, for each subprogram, all By multiple management users in management groups of users, the Shared Decision Making of multi-user more private keys can be carried out based on the private key held.
In this example, the computing device in block chain is it is determined that above-mentioned online negotiation program, or the online negotiation program In some subprogram whether decision-making by when, used decision strategy can be with identical.
Wherein, it above-mentioned decision strategy, can specifically include, based on the electronic signature being collected into, count above-mentioned management user Management user's ratio that decision-making passes through in group, and judge whether above-mentioned management user ratio reaches predetermined threshold value;It is if above-mentioned When management user reaches predetermined threshold value, it is determined that decision-making passes through.
Wherein, the self-defined setting of demand progress that above-mentioned predetermined threshold value can be based on reality;
It can be seen that in this way, when carrying out the Shared Decision Making of more private key multi-users to above-mentioned online negotiation program, i.e., Part private key is set to occur to lose or be cracked, the online negotiation program still can be with decision-making by that therefore can avoid using When single private key carries out decision-making mandate to online negotiation program, because loss or the fortuitous event being cracked occur for unique private When, caused by online negotiation program can not decision-making pass through, it is impossible to the problem of normally performing.
, wherein it is desired to explanation, when statistically stating management user's ratio that decision-making passes through in management groups of users, tool Body can be realized by the electronic signature quantity that statistics collection is arrived with managing the total ratio of user;Such as any Manage user for, by signing electronically, hardware submits electronic signature online, generally represent decision-making by, therefore pass through statistics receipts The electronic signature quantity collected, the total ratio with managing user, it is possible to obtain the management ratio that decision-making passes through.
In this example, due to taking the Shared Decision Making mechanism of the more private keys of multi-user in this application, therefore policymaker is worked as During comprising multiple users, the plurality of user may correspond to different decision-making roles respectively in whole decision-making authorization flow.And Different decision-making roles, may be to the influence degree of final electronic signature, and there is also certain difference;For example, at some Under scene, the business demand based on reality, it may be required that some decision-making roles produce higher influence to final electronic signature Degree.
Based on this, in a kind of embodiment shown, the private key that each management user holds can also be directed to, is preset respectively Corresponding decision weights ratio.Wherein, the decision weights ratio, for weigh it is corresponding with the private key manage user, to final Electronic signature influence degree.
In this case, if intelligent contract includes multiple subprograms, then based on the electronic signature being collected into, system When counting management user's ratio that decision-making in above-mentioned management groups of users passes through, it can calculate what each user that decision-making passes through was held Decision weights ratio sum corresponding to private key, then by obtained decision weights ratio sum of calculating, as above-mentioned management Management user's ratio that decision-making passes through in groups of users.
In this way, can be by presetting different decision weights ratios respectively for different private keys, to above-mentioned pipe Each management user in groups of users is managed, to influence degree caused by final electronic signature, grade is carried out according to decision-making role Division.
In the another embodiment shown, in the case where above-mentioned online negotiation program includes multiple subprograms, also Each subprogram of above-mentioned online negotiation program can be directed to, different above-mentioned predetermined threshold values is set respectively.
In this case, for each subprogram in online negotiation program, it is in judgement current sub-routine Veto plan by when, with the decision-making counted pass through management user's ratio compared with predetermined threshold value, all there will be difference; So that the management user in above-mentioned management groups of users, the more private keys of multi-user are carried out in each subprogram to online negotiation program Shared Decision Making when, difficulty that the decision-making of each subprogram passes through all will be different from each other;
Such as, it is assumed that one of subprogram may need more than 80% user's decision-making in all management users to lead to Cross, just can determine that the subprogram final decision passes through;And another subprogram may only need it is all management users in 60% User's decision-making above is by just can determine that the subprogram final decision passes through;The two is compared, it is clear that what the decision-making of the latter passed through Difficulty is lower (only needing less management user's decision-making to pass through, it is possible to think that this subprogram decision-making passes through).
It can be seen that can be that it assigns the appearance that different decision-makings passes through for different subprograms in this way Degree of bearing, contribute to the diversified demand of lifting business;
Such as, it is assumed that service security requires higher corresponding to a certain sub- degree, then can be by for the subprogram One larger predetermined threshold value is set, to reduce the tolerance that the subprogram decision-making passes through, lifts what the subprogram decision-making passed through Difficulty, and then the security of business can be ensured;
It is on the contrary, it is assumed that service security corresponding to some sub- degree requires relatively low, then can be by for the subprogram One less predetermined threshold value is set, to increase the tolerance that the subprogram decision-making passes through, reduces what the subprogram decision-making passed through Difficulty so that the subprogram quickly can pass through in decision-making.
3) " the implementing result issue of above-mentioned online negotiation program "
In this example, when above-mentioned online negotiation program final decision by after, the computing device in block chain can be by base In the intelligent contract program (i.e. implementing result) that the online negotiation program negotiates in the form of message or instruction, area is distributed to In block chain.
For example, in one case, if above-mentioned decision-making mandate, whether to be brought into operation for above-mentioned online negotiation program Decision-making mandate, then in decision-making mandate by rear, can trigger perform the online negotiation program, the intelligence that then will be negotiated Contract program is distributed in block chain in the form of message or instruction.In another case, if above-mentioned decision-making mandate, For the decision-making mandate of the implementation procedure for above-mentioned online negotiation program, because now above-mentioned online negotiation program has begun to hold OK, then in decision-making mandate by rear, then the intelligent contract program that will directly can negotiate, with message or the shape of instruction Formula, it is distributed in block chain.
When by the intelligent contract negotiated in the form of message or instruction, can be further after being distributed in block chain Based on the existing common recognition mechanism of block chain, each computing device being synchronized in block chain, and finally write newly-increased block and deposit Store up in the distributed data base safeguarded jointly to each computing device.
For example, using above-mentioned intelligent contract program as creditor, debtor and bank's tripartite's online negotiation go out based on should Exemplified by receiving the tripartite agreement that accounts receivable information carries out financing loan to bank, the tripartite agreement for consulting to complete can be published to area In block chain, and it is synchronized to each computing device in block chain.After synchronously completing, come for any computing device in block chain Say, can be in its local independent execution intelligent contract.
, wherein it is desired to explanation, above-mentioned online negotiation program include multiple subprograms in the case of, it is now above-mentioned The execution of line negotiation procedure, can be by the way of each subprogram performs step by step in sequence;Come for any subprogram Say, if after having passed through the Shared Decision Makings of the more private keys of multi-user, the subprogram can be immediately performed, and continue after the completion of execution Next subprogram is called, carrying out the common of the more private keys of multi-user to next subprogram again in the same fashion determines Plan, and next subprogram is immediately performed after in decision-making, by that analogy, until each height of above-mentioned online negotiation program The equal decision-making of program by and when being finished, final implementing result is distributed to block chain, is synchronized to each computing device.
Certainly, in actual applications, under some complicated business scenarios, if above-mentioned online negotiation program finishes execution Afterwards, complete operation flow not yet terminates, then after above-mentioned online negotiation program finishes execution, can continue to calling include to Another configuration processor in the distributed data base of block chain, then in the same fashion, completing this, another performs journey The Shared Decision Making of the more private keys of multi-user of sequence, detailed process repeat no more.
2nd, multi-user's decision-making of intelligent contract program
1) " triggering of intelligent contract performs "
In this example, when multi-party users are by above-mentioned online negotiation program, online negotiation goes out one section of intelligent contract program, and And the intelligent contract program is released to block chain, after being synchronized to each computing device in block chain, for decentralization system In system for any one computing device, the intelligent contract program can be performed locally triggering.
When realizing, user still can use an independent computing device, be carried out with the computing device in block chain Communication;Or by sharing same computing device with the computing device in block chain, above-mentioned intelligent contract journey is performed to trigger Sequence.Performed moreover, above-mentioned intelligent contract program can be specifically the triggering command issued by block chain to trigger.
For example, by taking the intelligent contract related to online transaction as an example, the triggering command of the intelligent contract is performed for triggering, Generally can be by the related transaction message of the transaction of Client-initiated one.In this case, user can use an independence for Taiwan On vertical computing device, or preassembled transacting customer end software on computing device in block chain, and in block chain Computing device is communicated.When user performed on the transacting customer end software specific transactional operation (such as click on transaction The operation of button), after initiating a transaction to another user, a transaction can be issued to the computing device by block chain Message, to trigger the related intelligent contract program of the computing device.
And for example, by taking the intelligent contract program related to transferring accounts online as an example, user can be set using an independent calculating It is standby upper, or preassembled client software of transferring accounts on computing device in block chain, enter with the computing device in block chain Row communication.(for example the behaviour of button of transferring accounts is clicked on when user performs specific transfer operation on the client software of transferring accounts Make), to another user initiate one transfer accounts after, can pass through the computing device of block chain into block chain issue one turn Account message, to trigger the related intelligent contract program of the computing device.
And for example, believed using above-mentioned intelligent contract as what creditor, debtor and bank's tripartite consultation went out based on accounts receivable Exemplified by ceasing the tripartite agreement that financing loan is carried out to bank, above-mentioned online negotiation program can be specifically above-mentioned for online negotiation The configuration processor of tripartite agreement, the triggering that the intelligent contract is performed for triggering perform, and are initiated by creditor The related request message of one financing loan;In this case, creditor can be used on an independent computing device, or It is preassembled on computing device in person's block chain to be used for the client software provided a loan of financing, with the computing device in block chain Communicated.(for example financing loan button is clicked on when creditor performs on the client software specific transactional operation Operation), after line initiates a financing loan to bank, a financing request can be issued to the computing device by block chain Message, to trigger the above-mentioned intelligent contract program of the computing device.
Certainly, in addition to transaction message illustrated above, message of transferring accounts, financing request message, in actual applications, on It can also be the other types of type of message for being used to trigger the intelligent contract of execution to state triggering message, in this application no longer one by one Enumerated.
After the computing device in block chain is receiving the triggering command of block chain issue, can further it call Local above-mentioned intelligent contract program is synchronized to, automatic running intelligent contract program in the running environment of local, completing should The multi-party decision-making mandate of intelligent contract program;
For example, each computing device in an example, block chain, can carry out virtualization process in advance, create virtual Machine, and perform intelligent contract using the environment of virtual machine to make by oneself.In this way, it can be ensured that each computing device is respectively When independently executing intelligent contract, even if cross operating system, across hardware operation, remain able to obtain identical operation result.
2) " more private key decision-making mandates of intelligent contract "
In this example, in the related program code of intelligent contract program, corresponding execution condition can also be added in advance. Wherein, above-mentioned execution condition, it is typically configured as requiring management user corresponding to the intelligent contract, using the private key held to holding The execution flow of line program carries out decision-making mandate.In this application, above-mentioned execution condition still can be configured as requiring the intelligence Multiple management users corresponding to energy contract, Shared Decision Making mandate is carried out to the intelligent contract using multiple private keys.
In an initial condition, it can be pre-configured with for the intelligent contract corresponding to one and manage groups of users.Wherein, if The intelligent contract includes multiple subprograms (in the case of i.e. multiple execution steps), can be respectively configured for each subprogram One independent management groups of users.In the management groups of users (i.e. above-mentioned pre-set user group), it can include from In the user of above-mentioned decentralization system successful registration, multiple management users corresponding to above-mentioned intelligent contract for selecting out.
, wherein it is desired to illustrate, the management user in the management groups of users, participation can be covered and consult intelligent contract The user group of program, can also cover participate in consult the intelligent contract user group beyond other user groups (such as Supervise user), in this application without being particularly limited to.
Wherein, for each management user in above-mentioned management groups of users, a use can also be held respectively In the private key that decision-making mandate is carried out to above-mentioned intelligent contract program.Such as the operator of above-mentioned decentralization system, or the 3rd The CA mechanisms of side, can towards each management user in above-mentioned management groups of users, provide respectively built in one private key and The electronic signature hardware of electronic signature algorithm.
In this case, it is above-mentioned to go centring system to pass through area after above-mentioned intelligent contract program is triggered execution Each computing device in block chain is soft with holding client used in each management user of private key in above-mentioned management groups of users Part is communicated, and a prompting message is exported to each management user respectively by client software used in each management user, To prompt each management user to carry out decision-making mandate to the intelligent contract program based on the private key each held.
For example, the transaction message for the transaction correlation initiated by user of above-mentioned triggering command by client software is Example, in this case, above-mentioned prompting message can be specifically one and be pushed to each management user and " electronic signature please be used hard Part confirms to the transaction " text prompt.
And for example, one initiated by user of above-mentioned triggering command by client software transfer accounts correlation message of transferring accounts be Example, in this case, above-mentioned prompting message can be specifically one and be pushed to each management user and " electronic signature please be used hard Part is transferred accounts to the pen to be confirmed " text prompt.
, can be on client software after each management user is viewing the above-mentioned prompting message of client software output Specific operation is performed, decision-making mandate is carried out to the intelligent contract, and based on the private key each held, pass through presently used meter Equipment is calculated, the message for carrying the result of decision is signed electronically, is then published in block chain.
For the result of decision being published in block chain, can be based on by existing data synchronization mechanism in block chain The bottom P2P networks of block chain are carried, the result of decision is subjected to the whole network diffusion in the decentralization system, is synchronized to block Each computing device in chain.
And for the computing device in block chain, it is synchronized to local by other computing devices in block chain when receiving The result of decision after, the electronic signature carried in the result of decision can be verified, to confirm to submit the pipe of the decision data Manage the legal identity of user, and determine that the result of decision is effective by rear in electric signing verification, be locally stored it is corresponding certainly Plan result.
, wherein it is desired to explanation, in this application, each management user in above-mentioned management groups of users, to above-mentioned When intelligent contract program carries out decision-making mandate, decision-making mandate still can be carried out simultaneously, can also be based on certain decision sequence Decision-making mandate is carried out respectively, and the description of embodiment, is repeated no more before idiographic flow may be referred to.
In this example, after each management with the decision-making mandate for above-mentioned intelligent contract program is completed per family, due to this When block chain in each computing device, the result of decision that each management user submits can be collected into, therefore in block chain Each computing device for, the result of decision that is collected into and default decision strategy are can be based on, to determine the intelligence Contract whether decision-making by, and decision-making by when local performing environment in, independently execute the intelligent contract program.
Further, if above-mentioned intelligent contract includes multiple subprograms;In this case, respectively management user can be with Mode as described above, decision-making mandate is carried out respectively for each subprogram included in the intelligent contract, and to area Block chain issues the result of decision.
And the computing device in block chain, based on the result of decision and default decision strategy being collected into, determine above-mentioned Intelligent contract program whether decision-making by when, can determining each subprogram successively, whether decision-making in each subprogram by and determining Plan is by rear, then judges that above-mentioned intelligent contract passes through into anger decision-making.I.e. in this application, when above-mentioned intelligent contract program bag is containing more During individual subprogram, only when the equal decision-making of the plurality of subprogram by, whole intelligent contract program can decision-making pass through.
In this example, the computing device in block chain is it is determined that certain in intelligent contract program, or intelligent contract Chen Gu Individual subprogram whether decision-making by when, used decision strategy still be able to can specifically be included, based on what is be collected into identical The result of decision, management user's ratio that decision-making in above-mentioned management groups of users passes through is counted, and judge above-mentioned management user ratio Whether predetermined threshold value is reached;If above-mentioned management user reaches predetermined threshold value, it is determined that decision-making passes through.
Wherein, the self-defined setting of demand progress that above-mentioned predetermined threshold value can be based on reality;
It can be seen that in this way, when carrying out the Shared Decision Making of more private key multi-users to intelligent contract program, even if portion Point private key occurs to lose or be cracked, and the intelligent contract program still can be with decision-making by that therefore can avoid using single When private key carries out decision-making mandate to intelligent contract, when the fortuitous event lost or be cracked occurs due to unique private, and lead The intelligent contract program of cause can not decision-making pass through, it is impossible to the problem of normally performing.
Further, in a kind of embodiment shown, the private key that each management user holds can also be directed to, it is pre- respectively If corresponding decision weights ratio.Wherein, the decision weights ratio, for weigh it is corresponding with the private key manage user, to most The influence degree of the whole result of decision.
In this case, if intelligent contract includes multiple subprograms, then based on the result of decision being collected into, system When counting management user's ratio that decision-making in above-mentioned management groups of users passes through, it can calculate what each user that decision-making passes through was held Decision weights ratio sum corresponding to private key, then by obtained decision weights ratio sum of calculating, as above-mentioned management Management user's ratio that decision-making passes through in groups of users.
In the another embodiment shown, in the case where above-mentioned intelligent contract program includes multiple subprograms, also Each subprogram of above-mentioned intelligent contract program can be directed to, different above-mentioned predetermined threshold values is set respectively.
In this case, for each subprogram in intelligent contract program, it is in judgement current sub-routine Veto plan by when, with the decision-making counted pass through management user's ratio compared with predetermined threshold value, all there will be difference; So that the management user in above-mentioned management groups of users, the more private keys of multi-user are carried out in each subprogram to intelligent contract program Shared Decision Making when, difficulty that the decision-making of each subprogram passes through all will be different from each other;In this way, for difference Subprogram for, can be that it assigns the tolerance that different decision-making pass through, contribute to the diversified demand of lifting business;
Such as, it is assumed that service security requires higher corresponding to a certain sub- degree, then can be by for the subprogram One larger predetermined threshold value is set, to reduce the tolerance that the subprogram decision-making passes through, lifts what the subprogram decision-making passed through Difficulty, and then the security of business can be ensured;
It is on the contrary, it is assumed that service security corresponding to some sub- degree requires relatively low, then can be by for the subprogram One less predetermined threshold value is set, to increase the tolerance that the subprogram decision-making passes through, reduces what the subprogram decision-making passed through Difficulty so that the subprogram quickly can pass through in decision-making.
3) " the implementing result issue of intelligent contract "
In this example, when above-mentioned intelligent contract program final decision by after, computing device in block chain can should The implementing result of intelligent contract program is distributed in block chain in the form of message or instruction;Such as issue message or Instruction, can be specifically message or the instruction that some contract is either signed such as to so-and-so account transfer.
When in the form of message or instruction, after being distributed in block chain, implementing result can be based further on into block The existing common recognition mechanism of chain, each computing device being synchronized in block chain, and finally write newly-increased block and store to each meter Calculate in the distributed data base that equipment is safeguarded jointly.
For example, using above-mentioned intelligent contract as creditor, debtor and bank's tripartite's online negotiation go out based on answering receipt on account Exemplified by money information carries out the tripartite agreement of financing loan to bank, the tripartite agreement is passing through multi-user institute described above private key Shared Decision Making after, the tripartite agreement can be performed, from bank to above-mentioned creditor provide financing loan, then will can finance The granting result of loan is published in block chain, and is synchronized to each computing device in block chain.
, wherein it is desired to explanation, in the case where above-mentioned intelligent contract program includes multiple subprograms, now above-mentioned intelligence The execution of energy contract program, can be by the way of each subprogram performs step by step in sequence;Come for any subprogram Say, if after having passed through the Shared Decision Makings of the more private keys of multi-user, the subprogram can be immediately performed, and continue after the completion of execution Next subprogram is called, carrying out the common of the more private keys of multi-user to next subprogram again in the same fashion determines Plan, and next subprogram is immediately performed after in decision-making, by that analogy, until each height of above-mentioned intelligent contract program The equal decision-making of program by and when being finished, final implementing result is distributed to block chain, is synchronized to each computing device.
Certainly, in actual applications, under some complicated business scenarios, if above-mentioned intelligent contract program finishes execution Afterwards, complete operation flow not yet terminates, then after above-mentioned intelligent contract program finishes execution, can continue to calling include to Another configuration processor (such as another intelligent contract program) in the distributed data base of block chain, then according to identical Mode, the Shared Decision Making for the more private keys of multi-user for completing another configuration processor, is repeated no more.
Finally, it is necessary to remark additionally, in both examples above, using above-mentioned target program as the intelligent contract journey of issue The online negotiation program of sequence, and be distributed to exemplified by the intelligent contract program of block chain, the technical scheme of the application is distinguished It is described in detail.
Obviously, in actual applications, above-mentioned target program is except that can be above-mentioned online negotiation program and above-mentioned intelligence Beyond contract program or execution flow is included into the distributed data base of block chain, and it performs requirements of process User carries out the other types of configuration processor of decision-making mandate.
For example, above-mentioned target program can also be the private for holding to each management user in above-mentioned management groups of users Key is interchangeable (user role for holding private key exchanges), the configuration processor for increasing, deleting, etc..
Wherein, when above-mentioned target program is other types of configuration processor, each management in above-mentioned management groups of users User for the configuration processor carry out the more private keys of multi-user Shared Decision Making idiographic flow, with idiographic flow described above It is identical, repeated no more in the application, those skilled in the art may be referred to the note in above example when putting into effect It is loaded into the equivalent implementation of row.
By above example, it is more to perform multi-user present applicant proposes a kind of target program being directed in block chain The mechanism of private key Shared Decision Making, target program is being included to the distribution in block chain based on the decentralization system of block chain After database, the result of decision that each user in pre-set user group is submitted respectively based on the private key held can be collected, then Determine whether decision-making passes through the target program based on the result of decision and default decision strategy being collected into;If the target program Decision-making to the block chain by can then issue the implementing result of the target program;
Due in this application, for the decision-making mandate of the target program in block chain, being no longer dependent on based on single private The decision-making licensing scheme of key, but be total to by multiple users in pre-set user group based on the multiple private keys each held With authorizing, therefore single private key can be avoided once to lose or be cracked, and caused by target program the problem of can not performing, make The target program is obtained in the case where part private key is lost or is cracked, the target program remains able to normally perform, so as to To lift the execution stability of target program.
Corresponding with above method embodiment, present invention also provides the embodiment of system.
Fig. 2 is referred to, the application proposes a kind of program executing apparatus 20, applied to the decentralization system based on block chain System, wherein, the target program in the decentralization system is included into the distributed data base in the extremely block chain, institute The execution flow of target program is stated by each user's Shared Decision Making in pre-set user group;
Wherein, Fig. 3 is referred to, as the hardware structure involved by the hardware device of carrying described program performs device 20 In, generally include processor, internal memory, nonvolatile memory, network interface and internal bus etc.;Exemplified by implemented in software, Described program performs device 20 is it is generally understood that be carried in the computer program in internal memory, shape after being run by processor Into the logic device that is combined of software and hardware, described program performs device 20 includes:
Collection module 201, submitted respectively based on the private key held for collecting each user in the pre-set user group The result of decision;
Determining module 202, for determining the target program based on the result of decision and default decision strategy that are collected into Whether decision-making passes through;
Execution module 203, for the target program decision-making by when, issue the target program to the block chain Implementing result.
In this example, the target program includes multiple subprograms;
The determining module 202 is further used for:
Determine that the whether equal decision-making of each subprogram passes through based on the result of decision and the default decision strategy being collected into;Such as The equal decision-making of each subprogram of fruit passes through, it is determined that the target program decision-making passes through.
In this example, the default decision strategy, including:
User's ratio that decision-making passes through in the pre-set user group is counted based on the result of decision being collected into;
Judge whether user's ratio reaches predetermined threshold value;
If user's ratio reaches predetermined threshold value, determine that decision-making passes through.
In this example, wherein, the private key that each user holds has preset corresponding decision weights ratio respectively;User's ratio Decision weights ratio sum corresponding to the private key that each user that example is passed through by decision-making holds.
In this example, when the target program includes multiple subprograms, each subprogram in the target program, respectively The corresponding different predetermined threshold value.
In this example, the target program is the intelligent contract program being distributed on block chain;Or for assisting online The online negotiation program of intelligent contract program described in business;
Wherein, the intelligent contract program, go out for creditor, debtor and bank's tripartite's online negotiation, based on institute State the intelligent contract program that the accounts receivable information between creditor and debtor carries out financing loan to the bank.
In this example, the target program is that the private key for holding to each user in the pre-set user group is carried out The configuration processor exchange, increase, deleted.
System that various embodiments above illustrates, module, can specifically be realized by computer chip or entity, or by with The product of certain function is realized.One kind typically realizes that equipment is computer or server.Wherein, the specific shape of computer Formula can be personal computer, laptop computer, cell phone, camera phone, smart phone, personal digital assistant, media Player, navigation equipment, E-mail receiver/send equipment, game console, tablet PC, wearable device or these equipment In any several equipment combination.As seen through the above description of the embodiments, those skilled in the art can understand Recognize that the application can add the mode of required general hardware platform to realize by software in ground.Based on such understanding, this Shen The part that technical scheme please substantially contributes to prior art in other words can be embodied in the form of software product, The computer software product can be stored in storage medium, such as ROM/RAM, magnetic disc, CD, including some instructions are making Obtain a computer equipment (can be personal computer, server, or network equipment etc.) and perform each embodiment of the application Or the method described in some parts of embodiment.
Each embodiment in this specification is described by the way of progressive, identical similar portion between each embodiment Divide mutually referring to what each embodiment stressed is the difference with other embodiment.It is real especially for device For applying example, because it is substantially similar to embodiment of the method, so describing fairly simple, related part is referring to embodiment of the method Part explanation.Device embodiment described above is only schematical, wherein described be used as separating component explanation Module can be or may not be physically separate, the function of each module can be existed when implementing application scheme Realized in same or multiple softwares and/or hardware.Some or all of mould therein can also be selected according to the actual needs Block realizes the purpose of this embodiment scheme.Those of ordinary skill in the art are without creative efforts, you can To understand and implement.
Described above is only the embodiment of the application, it is noted that for the ordinary skill people of the art For member, on the premise of the application principle is not departed from, some improvements and modifications can also be made, these improvements and modifications also should It is considered as the protection domain of the application.

Claims (14)

  1. A kind of 1. program excutive method, it is characterised in that applied to the decentralization system based on block chain, wherein, it is described to go Target program in centralized system is included to the database of the block chain, and the execution flow of the target program is by presetting Each user's Shared Decision Making in groups of users;Methods described includes:
    Collect the result of decision that each user in the pre-set user group is submitted respectively based on the private key held;
    Determine whether decision-making passes through the target program based on the result of decision and default decision strategy being collected into;
    If the target program decision-making is by the implementing result of the block chain issue target program.
  2. 2. according to the method for claim 1, it is characterised in that the target program includes multiple subprograms;
    It is described to determine whether decision-making passes through bag to the target program based on the result of decision being collected into and default decision strategy Include:
    Determine that the whether equal decision-making of each subprogram passes through based on the result of decision and the default decision strategy being collected into;It is if each The equal decision-making of subprogram passes through, it is determined that the target program decision-making passes through.
  3. 3. method according to claim 1 or 2, it is characterised in that the default decision strategy, including:
    User's ratio that decision-making passes through in the pre-set user group is counted based on the result of decision being collected into;
    Judge whether user's ratio reaches predetermined threshold value;
    If user's ratio reaches predetermined threshold value, determine that decision-making passes through.
  4. 4. according to the method for claim 3, it is characterised in that wherein, the private key that each user holds has been preset corresponding respectively Decision weights ratio;Decision weights ratio corresponding to the private key that each user that user's ratio is passed through by decision-making holds it With.
  5. 5. according to the method for claim 3, it is characterised in that described when the target program includes multiple subprograms Each subprogram in target program, the different predetermined threshold values is corresponded to respectively.
  6. 6. according to the method for claim 1, it is characterised in that the target program is to have included to point of the block chain Intelligent contract program in cloth database.
  7. 7. according to the method for claim 1, it is characterised in that the target program is for the pre-set user group In the private key held of each user configuration processor that is interchangeable, increases, deleting.
  8. A kind of 8. program executing apparatus, it is characterised in that applied to the decentralization system based on block chain, wherein, it is described to go Target program in centralized system is included to the distributed data base of the block chain, the execution flow of the target program By each user's Shared Decision Making in pre-set user group;Described device includes:
    Collection module, the decision-making knot submitted respectively based on the private key held for collecting each user in the pre-set user group Fruit;
    Determining module, for determined based on the result of decision and default decision strategy that are collected into the target program whether decision-making Pass through;
    Execution module, for the target program decision-making by when, the execution of the target program is issued to the block chain As a result.
  9. 9. device according to claim 8, it is characterised in that the target program includes multiple subprograms;
    The determining module is further used for:
    Determine that the whether equal decision-making of each subprogram passes through based on the result of decision and the default decision strategy being collected into;It is if each The equal decision-making of subprogram passes through, it is determined that the target program decision-making passes through.
  10. 10. device according to claim 8 or claim 9, it is characterised in that the default decision strategy, including:
    User's ratio that decision-making passes through in the pre-set user group is counted based on the result of decision being collected into;
    Judge whether user's ratio reaches predetermined threshold value;
    If user's ratio reaches predetermined threshold value, determine that decision-making passes through.
  11. 11. device according to claim 10, it is characterised in that wherein, the private key that each user holds has been preset pair respectively The decision weights ratio answered;Decision weights ratio corresponding to the private key that each user that user's ratio is passed through by decision-making holds Sum.
  12. 12. device according to claim 10, it is characterised in that when the target program includes multiple subprograms, institute Each subprogram in target program is stated, corresponds to the different predetermined threshold values respectively.
  13. 13. device according to claim 8, it is characterised in that the target program is to have included to the block chain Intelligent contract program in distributed data base.
  14. 14. according to the method for claim 8, it is characterised in that the target program is for the pre-set user group The configuration processor that the private key that each user in group holds is interchangeable, increased, deleting.
CN201710463921.5A 2017-06-19 2017-06-19 Program execution method and device Expired - Fee Related CN107341402B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710463921.5A CN107341402B (en) 2017-06-19 2017-06-19 Program execution method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710463921.5A CN107341402B (en) 2017-06-19 2017-06-19 Program execution method and device

Publications (2)

Publication Number Publication Date
CN107341402A true CN107341402A (en) 2017-11-10
CN107341402B CN107341402B (en) 2020-09-01

Family

ID=60221447

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710463921.5A Expired - Fee Related CN107341402B (en) 2017-06-19 2017-06-19 Program execution method and device

Country Status (1)

Country Link
CN (1) CN107341402B (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107945027A (en) * 2017-11-14 2018-04-20 北京欧链科技有限公司 The processing method and system of Claims Resolution event based on block chain
CN108038786A (en) * 2017-11-14 2018-05-15 北京欧链科技有限公司 The processing method and system of Claims Resolution event based on block chain
CN108154369A (en) * 2018-02-02 2018-06-12 上海二秒科技有限公司 A kind of enterprise asset management based on block chain technology
CN108170701A (en) * 2017-11-14 2018-06-15 北京欧链科技有限公司 The information processing method and device of block chain
CN108388989A (en) * 2018-02-26 2018-08-10 深圳智乾区块链科技有限公司 Transaction methods, system and computer readable storage medium
CN108650291A (en) * 2018-03-26 2018-10-12 南京思利华信息科技有限公司 A kind of GPU task common recognition method and device based on calculation power
CN108920978A (en) * 2018-06-26 2018-11-30 赛飞特工程技术集团有限公司 Block chain technology-based safe production information sharing method
CN109347640A (en) * 2018-09-27 2019-02-15 福建福链科技有限公司 A kind of data processing method and terminal based on block chain dynamic and intelligent contract
CN109377395A (en) * 2018-10-25 2019-02-22 平安科技(深圳)有限公司 Mutual insurance is insured Claims Resolution method and relevant apparatus
CN110009497A (en) * 2019-03-26 2019-07-12 阿里巴巴集团控股有限公司 Decision-making technique and device and electronic equipment based on block chain
CN110264608A (en) * 2019-04-11 2019-09-20 阿里巴巴集团控股有限公司 Voting method, apparatus and system based on block chain
CN110458709A (en) * 2018-04-28 2019-11-15 腾讯科技(深圳)有限公司 Transmission method and device, storage medium, the electronic device of resource transfers information
CN111464285A (en) * 2019-01-18 2020-07-28 正链科技(深圳)有限公司 Anti-quantum computer attack signature method for mobile block chain
TWI734949B (en) * 2018-06-08 2021-08-01 開曼群島商創新先進技術有限公司 Financing loan method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592098A (en) * 2016-01-16 2016-05-18 杭州复杂美科技有限公司 Management method of vote and CA certificate of block chain
CN106055993A (en) * 2016-08-13 2016-10-26 深圳市樊溪电子有限公司 Encryption storage system for block chains and method for applying encryption storage system
CN106649838A (en) * 2016-12-29 2017-05-10 先锋支付有限公司 Data transmission method, block chain node and distributed database

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105592098A (en) * 2016-01-16 2016-05-18 杭州复杂美科技有限公司 Management method of vote and CA certificate of block chain
CN106055993A (en) * 2016-08-13 2016-10-26 深圳市樊溪电子有限公司 Encryption storage system for block chains and method for applying encryption storage system
CN106649838A (en) * 2016-12-29 2017-05-10 先锋支付有限公司 Data transmission method, block chain node and distributed database

Cited By (21)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108038786A (en) * 2017-11-14 2018-05-15 北京欧链科技有限公司 The processing method and system of Claims Resolution event based on block chain
CN108170701A (en) * 2017-11-14 2018-06-15 北京欧链科技有限公司 The information processing method and device of block chain
CN107945027A (en) * 2017-11-14 2018-04-20 北京欧链科技有限公司 The processing method and system of Claims Resolution event based on block chain
CN108154369B (en) * 2018-02-02 2020-07-03 上海二秒科技有限公司 Enterprise asset management system based on block chain technology
CN108154369A (en) * 2018-02-02 2018-06-12 上海二秒科技有限公司 A kind of enterprise asset management based on block chain technology
CN108388989A (en) * 2018-02-26 2018-08-10 深圳智乾区块链科技有限公司 Transaction methods, system and computer readable storage medium
CN108650291A (en) * 2018-03-26 2018-10-12 南京思利华信息科技有限公司 A kind of GPU task common recognition method and device based on calculation power
CN108650291B (en) * 2018-03-26 2020-12-22 南京思利华信息科技有限公司 Calculation power-based GPU task consensus method and device
CN110458709A (en) * 2018-04-28 2019-11-15 腾讯科技(深圳)有限公司 Transmission method and device, storage medium, the electronic device of resource transfers information
US11170437B2 (en) 2018-06-08 2021-11-09 Advanced New Technologies Co., Ltd. Blockchain-based financing
TWI734949B (en) * 2018-06-08 2021-08-01 開曼群島商創新先進技術有限公司 Financing loan method and device
CN108920978A (en) * 2018-06-26 2018-11-30 赛飞特工程技术集团有限公司 Block chain technology-based safe production information sharing method
CN109347640B (en) * 2018-09-27 2021-06-15 福建福链科技有限公司 Data processing method and terminal based on block chain dynamic intelligent contract
CN109347640A (en) * 2018-09-27 2019-02-15 福建福链科技有限公司 A kind of data processing method and terminal based on block chain dynamic and intelligent contract
CN109377395A (en) * 2018-10-25 2019-02-22 平安科技(深圳)有限公司 Mutual insurance is insured Claims Resolution method and relevant apparatus
CN111464285A (en) * 2019-01-18 2020-07-28 正链科技(深圳)有限公司 Anti-quantum computer attack signature method for mobile block chain
CN111464285B (en) * 2019-01-18 2023-08-22 正链科技(深圳)有限公司 Mobile blockchain quantum computer attack resistant signature method
CN110009497A (en) * 2019-03-26 2019-07-12 阿里巴巴集团控股有限公司 Decision-making technique and device and electronic equipment based on block chain
CN113112358A (en) * 2019-03-26 2021-07-13 创新先进技术有限公司 Block chain-based decision method and device and electronic equipment
CN110264608A (en) * 2019-04-11 2019-09-20 阿里巴巴集团控股有限公司 Voting method, apparatus and system based on block chain
CN110264608B (en) * 2019-04-11 2021-06-29 创新先进技术有限公司 Voting method, device and system based on block chain

Also Published As

Publication number Publication date
CN107341402B (en) 2020-09-01

Similar Documents

Publication Publication Date Title
CN107341402A (en) A kind of program excutive method and device
CN110428257B (en) Password cracking task processing method, equipment and storage medium
CN110335147A (en) A kind of digital asset Information Exchange System and method based on block chain
WO2020147586A1 (en) Risk transaction processing method and apparatus, and device
TWM543413U (en) Web lending platform using technology of blockchain for deal
CN107360238A (en) Intelligent contract gateway based on block chain CPOW common recognition algorithms
CN109949033A (en) Block chain-based secure transaction system and method
CN108776929A (en) Bill processing method, system based on block chain database and readable storage medium storing program for executing
CN108830686A (en) A kind of assets information processing method and server based on block chain
CN108768666A (en) A kind of digital cash wallet management method based on SM2 threshold cryptography algorithms
CN111091364A (en) Account system, cooperative payment method, terminal and storage medium
CN109859040A (en) A kind of method and device carrying out house prosperity transaction based on block chain
CN108009818A (en) A kind of on-line payment method and system based on distributed network
CN111612453A (en) Decentralized transaction method and device based on block chain and electronic equipment
CN108846757A (en) A kind of offshore currency method of commerce and device realized based on block chain technology
KR20190115553A (en) Method for Providing Cryptocurrency Trade based on Verification of Information by using Smart Contract based on Blockchain
KR20210109767A (en) A method for providing asset backup services based on blockchain monitoring
CN109389257A (en) A kind of fund distribution method and device
JP7324941B2 (en) Financial transaction system and method
CN108876362A (en) A kind of virtual resource allocation method and device
CN111523898A (en) Verification method for digital asset management system
KR20190115556A (en) Method for Providing Cryptocurrency Trade based on Certification of Balance by using Smart Contract based on Blockchain
KR20190115555A (en) Method for Providing Cryptocurrency Trade based on Certification of Connection Status between Wallet and User by using Smart Contract based on Blockchain
KR20190115554A (en) Method for Providing Cryptocurrency Trade based on Certification of Connection Status between Wallet by using Smart Contract based on Blockchain
KR20190115552A (en) Method for Providing Multiple Cryptocurrency Trade by using Smart Contract based on Blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20200901