CN107491519B - Method and device for inquiring block chain account book - Google Patents

Method and device for inquiring block chain account book Download PDF

Info

Publication number
CN107491519B
CN107491519B CN201710698893.5A CN201710698893A CN107491519B CN 107491519 B CN107491519 B CN 107491519B CN 201710698893 A CN201710698893 A CN 201710698893A CN 107491519 B CN107491519 B CN 107491519B
Authority
CN
China
Prior art keywords
block
node
information
query request
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710698893.5A
Other languages
Chinese (zh)
Other versions
CN107491519A (en
Inventor
田新雪
马书惠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China United Network Communications Group Co Ltd
Original Assignee
China United Network Communications Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China United Network Communications Group Co Ltd filed Critical China United Network Communications Group Co Ltd
Priority to CN201710698893.5A priority Critical patent/CN107491519B/en
Publication of CN107491519A publication Critical patent/CN107491519A/en
Application granted granted Critical
Publication of CN107491519B publication Critical patent/CN107491519B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computational Linguistics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the invention provides a method and a device for inquiring a block chain account book. The method comprises the following steps: sending a first query request to a first node; receiving a first block which comprises transaction information of a target user and is sent by a first node; acquiring the associated information of the first block; acquiring association information of the second block from other nodes except the first node; and determining whether the first block is a legal block or not by comparing the associated information of the first block with the associated information of the second block. The embodiment of the invention sends the first query request to the first node, acquires the first block comprising the transaction information of the target user from the first node, acquires the associated information of the second block from other nodes except the first node, and determines whether the first block is a legal block or not by comparing the associated information of the first block with the associated information of the second block, thereby avoiding the query from acquiring the transaction information attacked by hackers.

Description

Method and device for inquiring block chain account book
Technical Field
The embodiment of the invention relates to the technical field of communication, in particular to a method and a device for inquiring a block chain account book.
Background
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm.
The block chain account book stores transaction information of users, the transaction information in the block chain account book is continuously increased along with the increase of the number of the users and the increase of user transactions, for nodes in the block chain, some nodes may not update and store a complete account book in real time, if the complete account book does not exist, transaction information needing to be inquired needs to be obtained from other nodes, and if other nodes are attacked by a hacker, the transaction information inquired by the node is forged by the hacker, so that the inquiry safety of the block chain account book is reduced.
Disclosure of Invention
The embodiment of the invention provides a method and a device for inquiring a block chain account book, which are used for improving the safety of inquiring the block chain account book.
One aspect of the embodiments of the present invention is to provide a method for querying a block chain ledger, including:
sending a first query request to a first node, wherein the first query request comprises identification information of a target user, and the first query request is used for querying and acquiring transaction information of the target user stored by the first node;
receiving a first block which is sent by the first node and comprises transaction information of the target user;
acquiring the associated information of the first block, wherein the associated information of the first block comprises a first block identifier and a first hash value;
acquiring association information of a second block from other nodes except the first node, wherein the second block is a block stored by other nodes and comprising the transaction information of the target user, and the association information of the second block comprises at least one of a second block identification and a second hash value;
and determining whether the first block is a legal block or not by comparing the associated information of the first block with the associated information of the second block.
Another aspect of the embodiments of the present invention is to provide an apparatus for querying a block chain ledger, including:
a sending module, configured to send a first query request to a first node, where the first query request includes identification information of a target user, and the first query request is used to query and acquire transaction information of the target user stored in the first node;
the receiving module is used for receiving a first block which comprises the transaction information of the target user and is sent by the first node;
an obtaining module, configured to obtain associated information of the first block, where the associated information of the first block includes a first block identifier and a first hash value; acquiring association information of a second block from other nodes except the first node, wherein the second block is a block stored by other nodes and comprising the transaction information of the target user, and the association information of the second block comprises at least one of a second block identification and a second hash value;
and the comparison determining module is used for determining whether the first block is a legal block or not by comparing the associated information of the first block with the associated information of the second block.
According to the method and device for querying the blockchain account book, provided by the embodiment of the invention, the first query request is sent to the first node, the first block comprising the transaction information of the target user is obtained from the first node, the associated information of the second block is obtained from other nodes except the first node, the second block is a block comprising the transaction information of the target user and stored by other nodes, and whether the first block is a legal block or not is determined by comparing the associated information of the first block with the associated information of the second block, so that the query and the acquisition of the transaction information attacked by hackers are avoided.
Drawings
Fig. 1 is a flowchart of a method for querying a block chain ledger book according to an embodiment of the present invention;
fig. 2 is a flowchart of a method for querying a blockchain ledger according to another embodiment of the present invention;
fig. 3 is a flowchart of a method for querying a blockchain ledger according to another embodiment of the present invention;
fig. 4 is a structural diagram of an apparatus for querying a blockchain account book according to an embodiment of the present invention.
Detailed Description
Fig. 1 is a flowchart of a method for querying a block chain ledger book according to an embodiment of the present invention. The method comprises the following steps:
step S101, a first query request is sent to a first node, the first query request comprises identification information of a target user, and the first query request is used for querying and acquiring transaction information of the target user stored by the first node.
In this embodiment, an execution subject of this embodiment is specifically a query node in a block chain, where the query node needs to query from other nodes to obtain transaction information of a target user, specifically, the query node, for example, node a, sends a first query request to a first node, for example, node B, where the first query request includes identification information of the target user, the identification information of the target user may specifically be a public key of the target user, for example, the first query request includes a public key of a target user MM1, and the first query request is used to query and obtain transaction information of the target user MM1 stored in the first node, for example, node B.
Step S102, receiving a first block including the transaction information of the target user sent by the first node.
After receiving the first query request, the node B queries the local ledger, obtains a locally stored first block including the transaction information of the target user MM1, and sends the first block to the node a, that is, sends the entire first block to the node a, and not only sends the transaction information of the target user MM1 to the node a.
Step S103, obtaining the associated information of the first block, where the associated information of the first block includes a first block identifier and a first hash value.
After receiving the first chunk, the node a obtains a first chunk identifier, for example, a chunk number 1, and a first HASH value, for example, HASH-B, of the first chunk.
Step S104, obtaining associated information of a second block from other nodes except the first node, where the second block is a block stored by the other nodes and includes the transaction information of the target user, and the associated information of the second block includes at least one of a second block identifier and a second hash value.
Since the transaction information of the target user is not only stored in the node B, but also possibly stored in other nodes, if the node B is hacked, the transaction information recorded in the first block received by the node a may be the transaction information modified by the hacker, and therefore, the node a needs to verify whether the first block is a legal block, and a specific verification method may be: and the node A acquires the associated information of a second block from other nodes except the node B, wherein the second block is a block which is stored by other nodes and comprises the transaction information of the target user, and the associated information of the second block comprises at least one of a second block identification and a second hash value.
Step S105, determining whether the first block is a legal block by comparing the associated information of the first block with the associated information of the second block.
The node a determines whether the first block is a legal block by comparing the associated information of the first block with the associated information of the second block, and specifically, if the associated information of the first block is consistent with the associated information of the second block, the node a determines that the first block is a legal block; if the association information of the first block and the association information of the second block are not identical, node a determines that the first block is an illegal block.
The embodiment of the invention sends a first query request to a first node, acquires a first block comprising transaction information of a target user from the first node, and acquires associated information of a second block from other nodes except the first node, wherein the second block is a block comprising the transaction information of the target user and stored by other nodes, and determines whether the first block is a legal block or not by comparing the associated information of the first block with the associated information of the second block, thereby avoiding the query acquisition of the transaction information attacked by hackers.
Fig. 2 is a flowchart of a method for querying a blockchain ledger according to another embodiment of the present invention. On the basis of the foregoing embodiment, the method for querying a block chain ledger provided by this embodiment includes the following steps:
step S201, sending a first query request to a first node, where the first query request includes identification information of a target user, and the first query request is used to query and acquire transaction information of the target user stored in the first node.
Step S202, receiving a first block including the transaction information of the target user sent by the first node.
Step S203, obtaining the associated information of the first block, where the associated information of the first block includes a first block identifier and a first hash value.
The principle and implementation of steps S201 to S203 are consistent with those of steps S101 to S103, and are not described herein again.
Step S204, sending a second query request to a second node, where the second query request includes the first block identifier.
The method for the node a to obtain the association information of the second block from the other nodes except the node B may specifically be: the node a sends a second query request to a second node, for example, a node C, where the second query request includes the first block identifier, for example, block number 1, and the node a sends the second query request to the node C to request to obtain the hash value corresponding to the block identified by block number 1 stored in the node C, where the hash value corresponding to the block identified by block number 1 stored in the node C is recorded as the second hash value.
Step S205, receiving a second hash value corresponding to the first chunk identifier sent by the second node.
After receiving the second query request, the node C queries the block corresponding to the block number 1 stored locally according to the block number 1 in the second query request, and sends the HASH value of the block, i.e., the second HASH value, such as HASH-C, to the node a.
Step S206, if the first hash value and the second hash value are consistent, determining that the first block is a legal block.
Node a compares HASH-B and HASH-C, and if HASH-B and HASH-C agree, node a determines that the first block is a legitimate block, and if HASH-B and HASH-C do not agree, point a determines that the first block is an illegitimate block, which may be hacked.
The embodiment of the invention sends a first query request to a first node, acquires a first block comprising transaction information of a target user from the first node, and acquires associated information of a second block from other nodes except the first node, wherein the second block is a block comprising the transaction information of the target user and stored by other nodes, and determines whether the first block is a legal block or not by comparing the associated information of the first block with the associated information of the second block, thereby avoiding the query acquisition of the transaction information attacked by hackers.
Fig. 3 is a flowchart of a method for querying a blockchain ledger according to another embodiment of the present invention. On the basis of the foregoing embodiment, the method for querying a block chain ledger provided by this embodiment includes the following steps:
step S301, sending a first query request to a first node, where the first query request includes identification information of a target user, and the first query request is used to query and acquire transaction information of the target user stored in the first node.
Step S302, receiving a first block including the transaction information of the target user sent by the first node.
Step S303, obtaining the associated information of the first block, where the associated information of the first block includes a first block identifier and a first hash value.
The principle and implementation of steps S301 to S303 are the same as those of steps S101 to S103, and are not described herein again.
Step S304, the first query request is sent to a second node.
The method for the node a to obtain the association information of the second block from the other nodes except the node B may specifically be: node a sends a first query request to a second node, for example, node C, and according to the above embodiment, the first query request includes identification information of the target user, and the identification information of the target user may specifically be a public key of the target user, for example, the first query request includes a public key of the target user MM 1. After receiving the first query request, the node C queries the local ledger, acquires a second block which is locally stored and includes the transaction information of the target user MM1, and sends the identification information of the second block to the node a.
Step S305, receiving a second block identifier sent by the second node, where the second block is a block that includes the transaction information of the target user in the second node.
Node a receives the identification information of the second chunk, i.e. the second chunk identification, e.g. chunk number 2, sent by node C, and the chunk identified by the second chunk, i.e. chunk number 2, is the chunk stored in node C that includes the transaction information of the target user MM 1.
Step S306, sending a second query request to a third node, where the second query request includes the second block identifier.
Node a sends a second query request to a third node, for example, node D, where the second query request includes a second chunk identifier, for example, chunk number 2, and node a requests to obtain a HASH value corresponding to the chunk identified by chunk number 2 stored in node D by sending the second query request to node D, where the HASH value corresponding to the chunk identified by chunk number 2 stored in node D is denoted as a second HASH value, for example, HASH-D.
Step S307, receiving a second hash value corresponding to the second block identifier sent by the third node.
Node a receives a second HASH value, e.g., HASH-D, corresponding to a second chunk identifier, e.g., chunk number 2, sent by node D.
Step S308, if the first block identifier is consistent with the second block identifier, and the first hash value is consistent with the second hash value, determining that the first block is a legal block.
Node a compares block number 1 with block number 2 and HASH-B with HASH-D, determines that the first block is a legitimate block if block number 1 and block number 2 are identical and HASH-B and HASH-D are identical, and determines that the first block is an illegitimate block if block number 1 and block number 2 are not identical or HASH-B and HASH-D are not identical, point a determines that the first block is an illegitimate block and the first block may be hacked.
The embodiment of the invention sends a first query request to a first node, acquires a first block comprising transaction information of a target user from the first node, and acquires associated information of a second block from other nodes except the first node, wherein the second block is a block comprising the transaction information of the target user and stored by other nodes, and determines whether the first block is a legal block or not by comparing the associated information of the first block with the associated information of the second block, thereby avoiding the query acquisition of the transaction information attacked by hackers.
Fig. 4 is a structural diagram of an apparatus for querying a blockchain account book according to an embodiment of the present invention. The query apparatus for a blockchain ledger provided in the embodiment of the present invention may execute the processing procedure provided in the embodiment of the query method for a blockchain ledger, and as shown in fig. 4, the query apparatus 40 for a blockchain ledger includes: the system comprises a sending module 41, a receiving module 42, an obtaining module 43, and a comparison determining module 44, wherein the sending module 41 is configured to send a first query request to a first node, where the first query request includes identification information of a target user, and the first query request is used to query and obtain transaction information of the target user stored in the first node; the receiving module 42 is configured to receive a first block sent by the first node and including the transaction information of the target user; the obtaining module 43 is configured to obtain association information of the first block, where the association information of the first block includes a first block identifier and a first hash value; acquiring association information of a second block from other nodes except the first node, wherein the second block is a block stored by other nodes and comprising the transaction information of the target user, and the association information of the second block comprises at least one of a second block identification and a second hash value; the comparison determining module 44 is configured to determine whether the first block is a legal block by comparing the association information of the first block with the association information of the second block.
The query device of the blockchain ledger provided by the embodiment of the present invention may be specifically configured to execute the method embodiments provided in fig. 1 or fig. 3, and specific functions are not described herein again.
The embodiment of the invention sends a first query request to a first node, acquires a first block comprising transaction information of a target user from the first node, and acquires associated information of a second block from other nodes except the first node, wherein the second block is a block comprising the transaction information of the target user and stored by other nodes, and determines whether the first block is a legal block or not by comparing the associated information of the first block with the associated information of the second block, thereby avoiding the query acquisition of the transaction information attacked by hackers.
On the basis of the above embodiment, the sending module 41 is further configured to: sending a second query request to a second node, the second query request including the first block identifier; the receiving module 42 is further configured to: and receiving a second hash value corresponding to the first block identifier sent by the second node. Accordingly, the comparison determination module 44 is specifically configured to: and if the first hash value is consistent with the second hash value, determining that the first block is a legal block.
Alternatively, the sending module 41 is further configured to: sending the first query request to a second node; the receiving module 42 is further configured to receive a second block identifier sent by the second node, where the second block is a block that includes the transaction information of the target user in the second node; the sending module 41 is further configured to: sending a second query request to a third node, the second query request including the second block identifier; the receiving module 42 is further configured to receive a second hash value corresponding to the second chunk identifier sent by a third node. Accordingly, the comparison determination module 44 is specifically configured to: and if the first block identifier is consistent with the second block identifier and the first hash value is consistent with the second hash value, determining that the first block is a legal block.
The query device of the blockchain ledger provided by the embodiment of the present invention may be specifically configured to execute the method embodiment provided by fig. 2 or fig. 3, and specific functions are not described herein again.
The embodiment of the invention sends a first query request to a first node, acquires a first block comprising transaction information of a target user from the first node, and acquires associated information of a second block from other nodes except the first node, wherein the second block is a block comprising the transaction information of the target user and stored by other nodes, and determines whether the first block is a legal block or not by comparing the associated information of the first block with the associated information of the second block, thereby avoiding the query acquisition of the transaction information attacked by hackers.
In summary, in the embodiments of the present invention, by sending a first query request to a first node, a first block including transaction information of a target user is obtained from the first node, and associated information of a second block is obtained from other nodes except the first node, where the second block is a block stored by other nodes and including the transaction information of the target user, and by comparing the associated information of the first block and the associated information of the second block, it is determined whether the first block is a legal block, thereby avoiding obtaining the transaction information attacked by a hacker.
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
The integrated unit implemented in the form of a software functional unit may be stored in a computer readable storage medium. The software functional unit is stored in a storage medium and includes several instructions to enable a computer device (which may be a personal computer, a server, or a network device) or a processor (processor) to execute some steps of the methods according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It is obvious to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional modules is merely used as an example, and in practical applications, the above function distribution may be performed by different functional modules according to needs, that is, the internal structure of the device is divided into different functional modules to perform all or part of the above described functions. For the specific working process of the device described above, reference may be made to the corresponding process in the foregoing method embodiment, which is not described herein again.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A method for querying a block chain account book is characterized by comprising the following steps:
sending a first query request to a first node, wherein the first query request comprises identification information of a target user, and the first query request is used for querying and acquiring transaction information of the target user stored by the first node;
receiving a first block which is sent by the first node and comprises transaction information of the target user;
acquiring the associated information of the first block, wherein the associated information of the first block comprises a first block identifier and a first hash value;
acquiring association information of a second block from other nodes except the first node, wherein the second block is a block stored by other nodes and comprising the transaction information of the target user, and the association information of the second block comprises at least one of a second block identification and a second hash value;
and determining whether the first block is a legal block or not by comparing the associated information of the first block with the associated information of the second block.
2. The method of claim 1, wherein the obtaining the association information of the second block from the other nodes except the first node comprises:
sending a second query request to a second node, the second query request including the first block identifier;
and receiving a second hash value corresponding to the first block identifier sent by the second node.
3. The method of claim 2, wherein determining whether the first block is a legal block by comparing the association information of the first block with the association information of the second block comprises:
and if the first hash value is consistent with the second hash value, determining that the first block is a legal block.
4. The method of claim 1, wherein the obtaining the association information of the second block from the other nodes except the first node comprises:
sending the first query request to a second node;
receiving a second block identifier sent by the second node, wherein the second block is a block which comprises the transaction information of the target user in the second node;
sending a second query request to a third node, the second query request including the second block identifier;
and receiving a second hash value corresponding to the second block identifier sent by a third node.
5. The method of claim 4, wherein determining whether the first block is a legal block by comparing the association information of the first block with the association information of the second block comprises:
and if the first block identifier is consistent with the second block identifier and the first hash value is consistent with the second hash value, determining that the first block is a legal block.
6. An apparatus for querying a blockchain ledger, comprising:
a sending module, configured to send a first query request to a first node, where the first query request includes identification information of a target user, and the first query request is used to query and acquire transaction information of the target user stored in the first node;
the receiving module is used for receiving a first block which comprises the transaction information of the target user and is sent by the first node;
an obtaining module, configured to obtain associated information of the first block, where the associated information of the first block includes a first block identifier and a first hash value; acquiring association information of a second block from other nodes except the first node, wherein the second block is a block stored by other nodes and comprising the transaction information of the target user, and the association information of the second block comprises at least one of a second block identification and a second hash value;
and the comparison determining module is used for determining whether the first block is a legal block or not by comparing the associated information of the first block with the associated information of the second block.
7. The apparatus of claim 6, wherein the sending module is further configured to: sending a second query request to a second node, the second query request including the first block identifier;
the receiving module is further configured to: and receiving a second hash value corresponding to the first block identifier sent by the second node.
8. The apparatus of claim 7, wherein the comparison determination module is specifically configured to:
and if the first hash value is consistent with the second hash value, determining that the first block is a legal block.
9. The apparatus of claim 6, wherein the sending module is further configured to: sending the first query request to a second node;
the receiving module is also used for receiving a second block identifier sent by the second node, wherein the second block is a block which comprises the transaction information of the target user in the second node;
the sending module is further configured to: sending a second query request to a third node, the second query request including the second block identifier;
the receiving module is further configured to receive a second hash value corresponding to the second block identifier sent by a third node.
10. The apparatus of claim 9, wherein the comparison determination module is specifically configured to:
and if the first block identifier is consistent with the second block identifier and the first hash value is consistent with the second hash value, determining that the first block is a legal block.
CN201710698893.5A 2017-08-15 2017-08-15 Method and device for inquiring block chain account book Active CN107491519B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710698893.5A CN107491519B (en) 2017-08-15 2017-08-15 Method and device for inquiring block chain account book

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710698893.5A CN107491519B (en) 2017-08-15 2017-08-15 Method and device for inquiring block chain account book

Publications (2)

Publication Number Publication Date
CN107491519A CN107491519A (en) 2017-12-19
CN107491519B true CN107491519B (en) 2020-07-28

Family

ID=60646274

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710698893.5A Active CN107491519B (en) 2017-08-15 2017-08-15 Method and device for inquiring block chain account book

Country Status (1)

Country Link
CN (1) CN107491519B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110417833B (en) * 2018-04-27 2022-05-20 百度在线网络技术(北京)有限公司 Data processing method and device based on block chain and storage medium
CN108876611B (en) * 2018-05-31 2021-05-18 中国联合网络通信集团有限公司 Transaction information processing method and device and block link points
CN108777711B (en) * 2018-05-31 2021-06-08 中国联合网络通信集团有限公司 Block chain node communication method and device and block chain node
CN108768733B (en) * 2018-05-31 2021-06-29 中国联合网络通信集团有限公司 Block chain account book processing method and device and block chain link points
CN111324787B (en) * 2018-12-14 2023-06-23 北京沃东天骏信息技术有限公司 Method and device for displaying block chain data in block chain browser
CN110288341A (en) * 2019-05-24 2019-09-27 阿里巴巴集团控股有限公司 Capital chain information tracing method, system, server and readable storage medium storing program for executing
US11120513B2 (en) * 2019-05-24 2021-09-14 Advanced New Technologies Co., Ltd. Capital chain information traceability method, system, server and readable storage medium
CN110322352A (en) * 2019-07-09 2019-10-11 深圳市炳德区块链技术有限公司 A kind of account book foundation and querying method, electronic equipment based on block chain
CN111861482B (en) * 2020-09-22 2021-07-06 支付宝(杭州)信息技术有限公司 Block chain account checking method and system
CN113379542B (en) * 2021-05-28 2024-01-09 中邮信息科技(北京)有限公司 Block chain transaction query method, device, medium and electronic equipment
CN113901144B (en) * 2021-10-15 2024-02-06 北京智融云河科技有限公司 Query method, device and storage medium under non-whole network consensus block chain

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106203179A (en) * 2016-07-12 2016-12-07 何晓行 A kind of completeness check system and method to file

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109951435B (en) * 2014-08-04 2021-03-30 创新先进技术有限公司 Equipment identifier providing method and device and risk control method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106203179A (en) * 2016-07-12 2016-12-07 何晓行 A kind of completeness check system and method to file

Also Published As

Publication number Publication date
CN107491519A (en) 2017-12-19

Similar Documents

Publication Publication Date Title
CN107491519B (en) Method and device for inquiring block chain account book
CN107396360B (en) Block verification method and device
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
CN107294729B (en) Communication method and device between different nodes in block chain
CN108880821B (en) Authentication method and equipment of digital certificate
US20210006410A1 (en) Method for providing virtual asset service based on decentralized identifier and virtual asset service providing server using them
JP6574168B2 (en) Terminal identification method, and method, system, and apparatus for registering machine identification code
EP3178011B1 (en) Method and system for facilitating terminal identifiers
JP7421771B2 (en) Methods, application servers, IOT devices and media for implementing IOT services
CN111986764B (en) Medical data sharing method, device, terminal and storage medium based on blockchain
CN110909025A (en) Database query method, query device and terminal
CN110213263B (en) Identity authentication method, equipment and storage medium based on alliance block chain
CN110599342B (en) Block chain-based identity information authorization method and device
CN111723385B (en) Data information processing method, device, electronic equipment and storage medium
US10783277B2 (en) Blockchain-type data storage
CN110225017B (en) Identity authentication method, equipment and storage medium based on alliance block chain
JP4594078B2 (en) Personal information management system and personal information management program
CN113486060A (en) Data access processing method and device, storage medium and electronic equipment
CN113010894A (en) Data processing method and device and computer readable storage medium
WO2017096886A1 (en) Content pushing method, apparatus and system
CN110020040B (en) Method, device and system for querying data
JP6233846B2 (en) Variable-length nonce generation
CN112865981B (en) Token acquisition and verification method and device
CN110049067B (en) Transmission method and device of session key and computer-readable storage medium
CN110858803B (en) Authentication method, system, server, and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant