CN107909369A - Based on the common recognition method, apparatus merchandised across chain and storage medium - Google Patents

Based on the common recognition method, apparatus merchandised across chain and storage medium Download PDF

Info

Publication number
CN107909369A
CN107909369A CN201710952719.9A CN201710952719A CN107909369A CN 107909369 A CN107909369 A CN 107909369A CN 201710952719 A CN201710952719 A CN 201710952719A CN 107909369 A CN107909369 A CN 107909369A
Authority
CN
China
Prior art keywords
chain
parallel
transaction
node
interconnection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201710952719.9A
Other languages
Chinese (zh)
Inventor
孙毅
张珺
李忠诚
李军
蒋海
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bubbe (beijing) Network Technology Co Ltd
Original Assignee
Bubbe (beijing) Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bubbe (beijing) Network Technology Co Ltd filed Critical Bubbe (beijing) Network Technology Co Ltd
Priority to CN201710952719.9A priority Critical patent/CN107909369A/en
Publication of CN107909369A publication Critical patent/CN107909369A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Abstract

The invention discloses a kind of based on the common recognition method, apparatus merchandised across chain and storage medium.Across chain transaction is the transaction between multiple parallel chains, and multiple parallel chains are respectively with interconnecting chain link.This method comprises the following steps:According to parameter preset in multiple parallel chains the random parallel chain for determining to verify;Across the chain transaction initiated definite parallel chain confirms, and is broadcast to interconnection chain and carries out common recognition verification.Thus, cheating risk can be not only greatly reduced in foregoing invention embodiment, improve the security across chain transaction, but also calculation amount can be greatly reduced, and improve the processing speed across chain transaction, block chain link point can also be supported to be dynamically added and exit interconnection chain.

Description

Based on the common recognition method, apparatus merchandised across chain and storage medium
Technical field
The present invention relates to block chain technical field, more particularly to a kind of based on the common recognition method, apparatus merchandised across chain and deposit Storage media.
Background technology
With the fast development of block chain technology, currently there are a variety of mutually independent block chains.Across not same district The transactions demand of block chain has become the more urgent demand in current block chain application.The moneytary operations of transregional piece of chain can be with It is the money transfer transactions that ideal money is performed from a block chain to another block chain, so as to fulfill the monetary value flow of each block interchain It is logical.Because various informative and complicated for the block chain merchandised across chain, for example, some block chains are isomorphism block chains, also Some block chains are isomery block chains, so carrying out across chain transaction needs a kind of reliable common recognition mechanism as the base run across chain Plinth.
Existing block chain common recognition mechanism is mainly:Respectively multiple data verification node fixed allocations each need to verify Parallel chain, then utilize the data verification node for its distribution parallel chain verification.However, applicant it has been investigated that:Mesh Preceding block chain common recognition mechanism allows data verification node to be that artificial public relations and hacking technique crack for fixed parallel chain verification Provide convenience, cause verification cheating risk, thereby reduce the security of block chain transaction.For example, for data verification In the assignment procedure, data verification node may actively select responsible parallel chain for the parallel chain verification of node distribution, and then Take some cheatings.Cheating for example can be:Verify that node may be with the data transmit-receive node of certain parallel chain Collusion, deliberately issues invalid transaction into parallel chain.
The security across chain transaction how is improved, becomes technical problem urgently to be resolved hurrily.
The content of the invention
In order to solve block chain across the low risk problem of the security that chain is merchandised, an embodiment of the present invention provides one kind to be based on Across the common recognition method, apparatus and storage medium of chain transaction.
First aspect, there is provided a kind of based on the common recognition method merchandised across chain.Wherein, across chain transaction be multiple parallel chains it Between transaction, multiple parallel chains respectively with interconnect chain link.This method comprises the following steps:
According to parameter preset in multiple parallel chains the random parallel chain for determining to verify;
Across the chain transaction initiated definite parallel chain confirms, and is broadcast to interconnection chain and carries out common recognition verification.
Second aspect, there is provided a kind of based on the common recognition device merchandised across chain.Wherein, across chain transaction be multiple parallel chains it Between transaction, multiple parallel chains respectively with interconnect chain link.The device includes:
Parallel chain determination unit, for the parallel chain for determining to verify at random in multiple parallel chains according to parameter preset;
Network common recognition unit, across the chain transaction for being initiated definite parallel chain confirms, and is broadcast to interconnection Chain carries out common recognition verification.
The third aspect, there is provided a kind of based on the common recognition device merchandised across chain.The device includes:
Memory, for storing program;
Processor, for performing the program of memory storage, program causes processor to perform the side described in above-mentioned each side Method.
A kind of fourth aspect, there is provided computer-readable recording medium.Finger is stored with the computer-readable recording medium Order, when run on a computer so that computer performs the method described in above-mentioned each side.
A kind of 5th aspect, there is provided computer program product for including instruction.When the product is run on computers, So that computer performs the method described in above-mentioned each side.
A kind of 6th aspect, there is provided computer program.When the computer program is run on computers so that calculate Machine performs the method described in above-mentioned each side.
On the one hand, foregoing invention embodiment can determine to need to verify at random by according to parameter preset in multiple parallel chains Parallel chain so that for some specific data verification node in interconnection chain, it is possible to achieve by certain rule, it is such as pseudo- with The mode of machine, dynamic select parallel chain to be verified, drastically reduce the area cheating risk, improve the security across chain transaction.
On the other hand, specific parallel chain is distributed for specific data verification node, rather than allows it to verify all put down Row chain, can be greatly reduced calculation amount, improve the processing speed across chain transaction.
Another aspect, across the chain transaction to being successfully connected into interconnection chain and being initiated by the parallel chain of success dynamically distributes, Common recognition verification is carried out, block chain link point can be supported to be dynamically added and exit interconnection chain, enhances the flexibility across chain transaction.
Brief description of the drawings
In order to illustrate the technical solution of the embodiments of the present invention more clearly, it will make below to required in the embodiment of the present invention Attached drawing is briefly described, it should be apparent that, drawings described below is only some embodiments of the present invention, for For those of ordinary skill in the art, without creative efforts, other can also be obtained according to these attached drawings Attached drawing.
Fig. 1 is across the catenary system configuration diagram of block chain of one embodiment of the invention;
Fig. 2 (a) is the parallel data verification method flow diagram for being linked into interconnection chain of one embodiment of the invention;
Fig. 2 (b) is the parallel data verification method flow signal for being linked into interconnection chain of another embodiment of the present invention;
Fig. 3 (a) is the parallel data receiving-transmitting method flow diagram for being linked into interconnection chain of one embodiment of the invention;
Fig. 3 (b) is the parallel data receiving-transmitting method flow diagram for being linked into interconnection chain of another embodiment of the present invention;
Fig. 4 is the parallel method flow schematic diagram for being linked into interconnection chain of further embodiment of this invention;
Fig. 5 is a sub- flow diagram of Fig. 4;
Fig. 6 is another sub-process schematic diagram of Fig. 4;
Fig. 7 is another sub-process schematic diagram of Fig. 4;
Fig. 8 is the structure diagram of the block of the interconnection chain of one embodiment of the invention;
Fig. 9 is the method flow schematic diagram that the parallel chain of further embodiment of this invention is merchandised across chain;
Figure 10 is the flow diagram based on the common recognition method merchandised across chain of one embodiment of the invention;
Figure 11 is the flow diagram based on the common recognition method merchandised across chain of another embodiment of the present invention;
Figure 12 is the schematic diagram for the Merkle trees across chain transaction verification of one embodiment of the invention;
Figure 13 is the structure diagram based on the common recognition device merchandised across chain of one embodiment of the invention;
Figure 14 is the circuit theory schematic diagram of the common recognition device for being used to merchandise across chain of one embodiment of the invention.
Embodiment
To make the purpose, technical scheme and advantage of the embodiment of the present invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, the technical solution in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is Part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art All other embodiments obtained without creative efforts, belong to the scope of protection of the invention.
It should be noted that in the case where there is no conflict, the feature in embodiment and embodiment in the application can phase Mutually combination.Describe the application in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is the schematic diagram of the block chain interacted system of one embodiment of the invention.
As shown in Figure 1, the system can include:Interconnect chain 101, parallel chain 102, parallel chain 103, parallel chain 104, parallel Chain 105 and parallel chain 106.It can be disposed in interconnection chain 101:Data transmit-receive node (being represented with regular pentagon), data supervision section Point (being represented with ellipse) and data verification node (using triangular representation).It is parallel chain 102, parallel chain 103, parallel chain 104, flat Row chain 105 and parallel chain 106 can dispose one or more:Data transmit-receive node (being represented with regular pentagon) and parallel chain Network node (is represented) with circle.Wherein, data transmit-receive node is shared by parallel chain and interconnection chain 101.
Wherein, it is a kind of block chain to interconnect chain 101, can be used for establishing contact in various independent block interchains.It is any Block chain has access to interconnection chain, and exchanges information by interconnecting chain, and then can complete to transfer accounts across chain, and a block Chain operates the data access of another block chain, storage, modification etc..For example, interconnection chain 101 can be used for it is existing each other Between independent block chain (such as:Ether mill block chain Ripple block chains etc.) establish contact so that and data interaction is no longer limited to In a single block chain so that the flow range of value is no longer limited to a single block chain.By the system, appoint What block chain can access interconnection chain 101, and be carried out by interconnecting chain 101 with other block chains at the data such as across chain transaction Reason.For example, a block chain carries out the data processings such as data access, storage, modification to another block chain.It is in another example different Across chain transfer data processing is carried out between block chain.Specifically, for example, the bit coin user in Ripple block chains need to When ether mill user too in mill block chain transfers accounts, can directly it be traded using the bit coin in oneself account, without Ripple coin is converted into ether coin by third party.In addition, the embodiment of the present invention can pass through same main body management service Two block chains (for example, a block chain is responsible for finance activities, another block chain is responsible for ideal money assets) so that it is empty The availability for intending currency depends on finance activities.When occurring situations such as freezing of assets, assets can influence finance activities, so that real Existing assets hinder function, carry out effective restraint and limitation to assets, and ensure assets security.
Parallel chain is properly termed as panel data block chain, or referred to as parallel block chain.When certain block chain (such as bit Coin block chain or ether mill block chain) access interconnection chain after just become parallel chain.It is parallel chain 102, parallel chain 103, parallel Chain 104, parallel chain 105 and parallel chain 106 can access interconnection chain 101.The data transmit-receive node that parallel chain and interconnection chain share Across chain transaction can be forwarded in interconnection chain network.
On the one hand data verification node can be used for receiving the information such as the transaction from data transmit-receive person, and verify transaction Validity;On the other hand, data verification node can be used for the complete copy for safeguarding interconnection chain, participate in the common recognition of interconnection chain 101 Process.Data verification node is only deployed at the inside of interconnection chain 101, it is not belonging to a part for parallel chain.Data verification node Verification transaction validity while transaction data can be obtained from parallel chain, and synchronous, the common recognition transaction in interconnection chain network. Data verification node is connected with the data transmit-receive node in parallel chain, it can receive data transmit-receive node transmission on parallel The Transaction Information of chain, can also send the transaction data from other parallel chains and give corresponding data transmitting-receiving node.
For data verification node by being interacted with data transmit-receive node, the place that can obtain the collection of data transmit-receive node is parallel Transaction data on chain.Data verification node can verify the transaction data on its parallel chain obtained.Data verification node it Between known together and (reached in agreement) and generate interconnection chain block.After knowing together successfully, data verification node can will be across chain Transaction data is sent to the data transmit-receive node of corresponding purpose chain (such as some parallel chain).Data verification node is at one Carve and be only connected with a parallel chain, be only responsible for the verification work that a parallel chain is merchandised across chain.But it can be born in different time The verification work that multiple parallel chains are merchandised across chain is blamed, that is, verifies that node has rotation mechanism.
Data transmit-receive node not only belongs to parallel chain, but also belongs to interconnection chain, i.e., data transmit-receive node is by parallel chain and interconnection chain Share.The program of two kinds of block chains (such as parallel chain and interconnection chain) can be run on data transmit-receive node.It is with interconnecting chain In data verification node be connected, the Transaction Information that can send parallel chain gives data verification node, can also receive data verification The transaction data from other parallel chains that node is sent.
One plain block chain can have multiple data transmit-receive nodes.When on the plain block chain where data transmit-receive node be not present across When chain is merchandised, data transmit-receive node gives the block hair of plain block chain to verification node;Plain block where data transmit-receive node When there is across chain transaction on chain, data transmit-receive node is by the block head of plain block chain, across chain Transaction Information and verifies across chain transaction The checking information of validity is sent to verification node.
Data supervisory node is only deployed at the inside of interconnection chain 101, is connected with data verification node.It is not belonging to parallel chain A part.Data supervisory node monitoring data verifies the transaction verification behavior of node, is finding to have data verification node not just Data verification node is punished during true behavior.One supervisory node can supervise a set, and (number is more than or waits In verification node 1).
Above-mentioned each node can be various electronic equipments or functional unit in various electronic equipments, function Module even one section of program.These electronic equipments include but not limited to PC, server, ore deposit machine etc..
It should be understood that the number of the block chain and node in Fig. 1 is only schematical.According to needs are realized, spirit is carried out Configuration living.
Embodiments below can apply the system architecture of the embodiment of the present invention to carry out data interaction or processing.In order to Description is succinct, and the content of each embodiment can mutual reference.
Fig. 2 (a) is the parallel data verification method flow diagram for being linked into interconnection chain of one embodiment of the invention.
The present embodiment can be applied to the data verification node side of interconnection chain.
As shown in Fig. 2 (a), this method may comprise steps of:S210, the data verification node reception for interconnecting chain are parallel The data transmit-receive node of chain send by it is parallel be linked into interconnection chain access request;S220, in response to access request, data are tested Node generation identification information is demonstrate,proved, identification information is stored in the storage for being used for managing parallel chain, and by identification information broadcast mutual Join in chain;S230, after at least one other verification node in interconnecting chain is stored identification information, data verification section Point is successfully accessed information to data transmit-receive node feeding back, and at least part of the information in storage is sent to data transmit-receive node, So that data transmit-receive node carries out synchronizing information.
In S210, data transmit-receive node is a kind of special parallel chain network node, it can be by parallel chain network section Point change.Parallel chain network node freely can be dynamically joined to and exit interconnection path so that interconnection chain framework can be with Flexibly expand.Most start, interconnection chain can be added by the application of parallel chain network node, by interconnecting the data verification section in chain After point verification, parallel chain network node just becomes data transmit-receive node.
In certain embodiments, parallel chain can include:Source parallel chain and purpose parallel chain.
In S220, identification information can include the one or more in following information:Parallel chain title, parallel chain are compiled Number, parallel chain common recognition algorithm, parallel chain data transmit-receive nodal information (such as address, numbering).Identification information can also be included only Information of one one parallel chain of mark etc..
In this step, which can be used for individually carrying out initial authentication to access request.For managing The storage of parallel chain can be stored with the management informations such as parallel chain management table, parallel chain management figure.
Wherein, it is the most key be exactly it is parallel be linked into interconnection chain when, it can be included in its access request initiated The common recognition algorithm used, it is main to include the effective field of verification block and the verification effective algorithm of block.Once the parallel link Enter and interconnect chain, then all verification nodes interconnected in chain update its parallel chain management table, and new parallel chain is added in its table Relevant information, which includes the common recognition algorithm that uses of the parallel chain.
In S230, at least one other verification node in chain is interconnected, it is preferred that all other verification node, docking Enter request and carry out common recognition verification.After common recognition is verified, identification information is stored in respective storage parallel chain management table or flat In the storage of row chain management figure.
The storages such as the parallel chain management table corresponding to each data verification node, data transmit-receive node is also stored with parallel Chain table of comparisons etc. stores.The information that data transmit-receive node can be sent according to data verification node, can be by parallel chain and interconnection Chain carries out synchronizing information.For example, the parallel chain table of comparisons and parallel chain management table are synchronized.
In this step, other verification nodes can be used for collective to access request progress network common recognition, i.e. review verification.
On the one hand, foregoing invention embodiment, is sent by the data transmit-receive node of data verification node reception parallel chain By the parallel access request for being linked into interconnection chain, in response to access request, data verification node generation identification information, mark is believed In storage of the breath deposit for managing parallel chain, the information for being used to manage parallel chain in verification node can be updated the data, for example, Parallel chain management table is updated.
On the other hand, by data verification node by identification information broadcast in chain is interconnected so that other tested in interconnection chain Card node can be stored identification information, and update the respective information for being used to manage parallel chain.
Another aspect, data verification node are successfully accessed information to data transmit-receive node feeding back, and by storage at least Partial information is sent to data transmit-receive node, can cause data transmit-receive node updates parallel chain corresponding with parallel chain management table The table of comparisons.
It follows that foregoing invention embodiment can realize by the node in parallel chain with interconnection chain in each node into Row information is synchronous.By interconnecting the synchronizing information (for example, parallel chain manages table synchronizing information) in chain between data verification node When can realize that parallel chain initiates access request next time, the arbitrary data verification node in interconnection chain has unified, newest Parallel chain management table so that ensure that interconnection chain in each data verification node can correctly handle connecing for parallel chain Enter request, solve the problems, such as that the security caused by existing information centralized management is low, improve the safety of access interconnection chain Property.In addition, foregoing invention embodiment safely can be linked into interconnection chain by parallel so that the node on different block chains can With freedom, it is dynamically joined to and exits interconnect chain network so that interconnection chain framework can be expanded flexibly.
In certain embodiments, the above method can also comprise the following steps:
S240, what data verification node received that data transmit-receive node sends be used for source parallel chain and purpose parallel chain carry out across The source parallel chain block head of chain transaction;
S250, data verification node obtain the first common recognition that source parallel chain knows together across chain transaction from storage and calculate Method;
S260, data verification node carry out source parallel chain block head the first verification using the first common recognition algorithm;
S270, after first is verified, data verification node broadcasts source parallel chain block head in chain is interconnected, for At least one other verification node interconnected in chain carries out across chain transaction the second verification using the second common recognition algorithm of interconnection chain.
Thus, the embodiment of the present invention carries out the first verification and the second verification by using different common recognition algorithms, relatively In using identical common recognition algorithm come carry out second verification major advantage can be as follows:
1st, limited using existing identical common recognition algorithm (such as existing Cosmos methods and other similar across chain methods) Parallel chain (zones) processed, although can simplify logical transaction, existing common recognition method might not be with real trade situation Matching, so network common recognition is ineffective.And although logical transaction of the embodiment of the present invention is slightly more complex, across chain transaction is being carried out When, interconnection chain (hub) need verify parallel chain send across chain transaction validity, i.e., by the parallel chain block head of preservation come Whether the transaction of the corresponding parallel chain of across the chain transaction of verification is effective, meanwhile, interconnection chain is in synchronous parallel sequence build, it is also desirable to Verify the validity of the block head, it can be ensured that the common recognition method of use is matched with real trade situation, can be lifted network and is total to Know effect.
2nd, using existing same common recognition algorithm, although can ensure to verify the one of the mode of block to a certain extent Cause property, so as to avoid the inconvenience that the method for testing a variety of verification block finiteness is brought, while improves across chain trading processing speed, Namely there is simpler processing logic, more efficient treatability performance using the network of the block chain of unified common recognition algorithm, But unified common recognition algorithm limits the species of the block chain of access so that the expansibility of block chain reduces.It is in addition, existing Same common recognition method because not requiring common recognition algorithm, in order to ensure the safety of each parallel chain transaction, it is necessary to Subsidiary specific checking information during across chain transaction is carried out, helps to interconnect the transaction on chain confirmation parallel chain.Comparatively speaking, this hair Bright embodiment is because without subsidiary specific checking information, it is possible to is simplified this part operation logic, not only saves The time that later stage merchandises across chain, can improve the efficiency across chain transaction, and make it that the expansibility of interconnection chain is stronger, development Prospect bigger.
Fig. 2 (b) is the parallel data verification method flow diagram for being linked into interconnection chain of another embodiment of the present invention.
The present embodiment can be applied to the data verification node side of interconnection chain.
As shown in Fig. 2 (b), this method may comprise steps of:
S201, interconnect chain data verification node receive parallel chain data transmit-receive node send by it is parallel be linked into mutually Join the access request of chain.
S202, in response to access request, the generation of data verification node includes at least the identification information of the first common recognition algorithm, deposits Identification information is stored up, and by identification information broadcast in chain is interconnected.
S203, after data verification node confirms that at least one other verification node in interconnection chain receives identification information, To data transmit-receive node feeding back information is successfully accessed including identification information.
In certain embodiments, this method can also comprise the following steps:
S204, data verification node will be successfully accessed information and be sent to data transmit-receive node, for data transmit-receive node profit Synchronizing information is carried out with the identification information being successfully accessed in information.
Wherein, parallel chain can include:Source parallel chain and/or purpose parallel chain.Source parallel chain can by interconnect chain with Across the chain transaction of purpose parallel chain.
In certain embodiments, this method can also comprise the following steps:
S205, data verification node carry out sequence parallel across the source that chain is merchandised according to for source parallel chain with purpose parallel chain Build, source parallel chain block head is carried out the first verification using the first common recognition algorithm.
Wherein, the first common recognition algorithm can be the algorithm that source parallel chain knows together across chain transaction.
S206, after first is verified, data verification node broadcasts source parallel chain block head in chain is interconnected, for At least one other verification node interconnected in chain carries out across chain transaction the second verification using the second common recognition algorithm.
Wherein, the second common recognition algorithm is to interconnect the algorithm that chain knows together across chain transaction.
In certain embodiments, identification information further includes:Solicited message.
In certain embodiments, solicited message includes the one or more in following information:Parallel chain title, parallel chain Numbering, parallel chain data transmit-receive nodal information.
Fig. 3 (a) is the parallel data receiving-transmitting method flow diagram for being linked into interconnection chain of one embodiment of the invention.
The present embodiment can be applied to the data transmit-receive node side of parallel chain.2 embodiment masters of its implementation and Fig. 2 Will be difference lies in being write by different angles, the two implementation mutually can be referred to and quoted.
As shown in Fig. 3 (a), this method may comprise steps of:S310, the data transmit-receive node of parallel chain is to interconnection chain Data verification node send by it is parallel be linked into interconnection chain access request;S320, please according to access in data verification node Identification information is sought survival into, identification information is stored in the storage for being used for managing parallel chain, and by identification information broadcast in interconnection chain In, after at least one other verification node in interconnection chain is stored identification information, data transmit-receive node receives data and tests Card node feeding back is successfully accessed information;S330, data transmit-receive node are received in the storage that data verification node is sent at least Partial information, row information of going forward side by side are synchronous.
On the one hand, the embodiment of the present invention utilizes the cut-in method, can solve the problems, such as that existing malleability is difficult so that any Parallel chain can be stablized, advantageously access is interconnected in chain network.
On the other hand, the embodiment of the present invention causes access and the validity of the transaction in later stage to obtain maximum guarantor Card, user need not trust interconnection chain, it is only necessary to the parallel operation for being linked into interconnection chain be verified using checking information and across chain The validity of transaction.
Another aspect, the embodiment of the present invention can get up existing block chain link independent of each other, expand value Sphere of circulation.
Fig. 3 (b) is the parallel data receiving-transmitting method flow diagram for being linked into interconnection chain of another embodiment of the present invention.
The present embodiment can be applied to the data transmit-receive node side of parallel chain.2 embodiment masters of its implementation and Fig. 2 Will be difference lies in being write by different angles, the two implementation mutually can be referred to and quoted.
As shown in Fig. 3 (b), this method may comprise steps of:
S301, the data verification node of data transmit-receive node to the interconnection chain of parallel chain is sent is linked into interconnection chain by parallel Access request.
S302, the identification information of the first common recognition algorithm, storage mark are included in data verification node according to access request generation Know information, by identification information broadcast in chain interconnect and confirm interconnection chain at least one other verification node receive mark After information, data transmit-receive node reception data verification node feeding back is successfully accessed information including identification information.
In certain embodiments, the parallel method for being linked into interconnection chain can also include the following steps:
S303, data transmit-receive node carry out synchronizing information using the identification information being successfully accessed in information.
Fig. 4 is the parallel method flow schematic diagram for being linked into interconnection chain of further embodiment of this invention.
The present embodiment can be applied to the data transmit-receive node of parallel chain and this both sides of data verification node of interconnection chain.Such as Shown in Fig. 4, this method may comprise steps of:
S410, parallel chain initiate the access request of access interconnection chain.
One or more node operation interconnection chain program on plain block chain, obtains default interconnection chain nodal information, hair Play access request.
S420, interconnects the data verification node verification access request of chain.
Verification node judges whether to receive access request.
S430, parallel chain processing feedback information, carries out synchronizing information.
The contents of the section will be described in greater detail below.
In certain embodiments, this method can also include:
S440, what data verification node received that data transmit-receive node sends be used for source parallel chain and purpose parallel chain carry out across The source parallel chain block head of chain transaction.
S450, data verification node obtain the first common recognition that source parallel chain knows together across chain transaction from storage and calculate Method.
S460, data verification node carry out source parallel chain block head the first verification using the first common recognition algorithm.
S470, after first is verified, data verification node broadcasts source parallel chain block head in chain is interconnected, for At least one other verification node interconnected in chain carries out across chain transaction the second verification using the second common recognition algorithm of interconnection chain.
In certain embodiments, can utilize interconnect chain block head record in following information it is one or two kinds of with On:The cryptographic Hash of a upper block head, the sequence number of this block, transaction Merkle tree root cryptographic Hash, timestamp, verify node Signature.The block body for interconnecting chain can be utilized to record more than one or two kinds of in following information:Across chain data processing of information (such as across chain Transaction Information), parallel chain block head, validity evidence.It is so designed that, can be by current block and previous block phase Connection, forms a block chain that can verify that, can increase the difficulty that block is tampered.
Fig. 5 is a sub- flow diagram of Fig. 4.
With reference to figure 4 and Fig. 5, parallel chain initiates that shown in the access request of access interconnection chain (i.e. S410) following step can be included Suddenly:
S411, parallel chain network node operation interconnection chain program, obtains and nodal information is preset in program.
Parallel chain network node can be one or more nodes on plain block chain.
S412, parallel chain network node ask data verification nodal information active in interconnection chain network to default node;
S413, default node are sent to parallel chain network section by data verification nodal information active in chain network is interconnected Point;
S414, parallel chain network node initiate access interconnection chain request to the active data verification node obtained.
Fig. 6 is another sub-process schematic diagram of Fig. 4.
With reference to figure 4 and Fig. 6, following step can be included by interconnecting the data verification node verification access request (i.e. S420) of chain Suddenly:
S421, its parallel chain network management table for being safeguarded of data verification querying node.
S422, data verification node judge whether the parallel chain has accessed interconnection chain network.
When it is to have accessed interconnection chain network to be judged as the parallel chain, turn S423.
When being judged as that the parallel chain does not access interconnection chain network, turn S428.
S423, when it is to have accessed interconnection chain network to be judged as the parallel chain, data verification node is parallel chain network section Point generation identification information is simultaneously broadcasted, then by identification information deposit plain block chain network management table.
That is, the data verification node for receiving access request is believed to initiate the generation identification of the parallel chain network node of access request Cease and be broadcasted.
The identification information is also stored in plain block chain network management table by S424, other verification nodes for receiving the identification information In.
This indicates that the one or more nodes for initiating request become the data transmit-receive node of the plain block chain.
S425, data verification node send to the data transmit-receive node for initiating request and are successfully accessed information.
S426, the verification node for receiving access request send the plain block link network of renewal to the data transmit-receive node for initiating request Network manages table information.
S427, the complete plain block chain network management table of all data transmit-receive node updates, completes whole interconnection link network at this time The synchronization of plain block chain network management table information in network, data verification node feeding back plain block chain network management table responsible backward more New information.
The synchronizing information (for example, parallel chain management table synchronizing information) interconnected in chain between data verification node is in order under During parallel chain access request, interconnecting the verification node of the arbitrary data in chain has unified, newest parallel chain management table. So as to ensure that the data verification node in interconnection chain can correctly handle the access request of parallel chain.
S428, above meets S422, when being judged as that the parallel chain does not access interconnection chain network, receives the data of access request Verification node initiates the ballot that a whole network participates in interconnection chain network and handles the access request.
S429, judges whether ballot passes through.
If voted through, S4210 is entered step.If ballot is not by entering step S4211.
S4210, if voted through, the data verification node for receiving access request is the parallel chain and hair of request access Play the parallel chain network node generation identification information of request and be broadcasted, the identification information is then stored in plain block chain network pipe Manage in table, then turn S424.
S4211, if ballot is not by receiving the verification node of access request to the parallel chain network node of initiation request Send the plain block chain network management table information of renewal;
Fig. 7 is another sub-process schematic diagram of Fig. 4.
With reference to figure 4 and Fig. 7, parallel chain processing feedback information, carries out synchronizing information (i.e. S430) and may comprise steps of:
S431, the parallel chain for initiating access request receive feedback of the interconnection chain to its access request.
S432, judges whether to access according to feedback.
S433, if being fed back to access failure, the parallel chain for initiating access request puts down received access failure information at this Broadcast in row chain.
S434, if being fed back to be successfully accessed, the plain block chain for initiating access request receives the plain block chain network that interconnection chain is sent Table information is managed, and received information is broadcasted in the parallel chain.
S435, other plain block chains receive the plain block chain network management table fresh information that interconnection chain is sent, improve the flat of oneself The block chain table of comparisons.
It should be noted that in the case where there is no conflict, those skilled in the art can according to actual needs will be above-mentioned The order of operating procedure is adjusted flexibly, or above-mentioned steps are carried out the operation such as flexible combination.For simplicity, repeat no more Various implementations.
Fig. 8 is the structure diagram of the block of the interconnection chain of one embodiment of the invention.
As shown in figure 8, the structure of the block of interconnection chain can include block first 1 and block body 2.Wherein, block first 1 can be with Including:The cryptographic Hash 3 of a upper block head, block sequence number 4, in block Transaction Information it is effective summarize 5, timestamp 6 and Verify node signature 7.Block body 2 can include:Specific Transaction Information 8 and the checking information 9 across chain transaction.
Wherein, the cryptographic Hash 3 of a upper block head can be determined what is obtained after upper block progress Hash operation Long character string.Being so designed that can make the block be connected with previous block, form a block chain that can verify that, Ke Yizeng The difficulty that big block is tampered.
The sequence number 4 of block can refer to the symbol for identifying block present position.Other functions can be facilitated by being so designed that It is directed toward the block.
Effective summary 5 of Transaction Information can be Merkle tree root Hash in block.Merkle tree roots Hash can include Interconnect cryptographic Hash and the cryptographic Hash of across the chain transaction of plain block chain and the calculating generation of validity evidence that chain transaction calculates generation.
Timestamp 6 can be the character string at unique mark a certain moment, for identifying the time of block generation.
Verification node signature 7 can be the digital signature for the verification node private key generation for generating the block, to identify The generator of block.
Specific Transaction Information 8 can include specifically across chain Transaction Information and specific interconnection chain insider transaction letter Breath.
It can include across the checking information 9 of chain transaction:Using Merkle trees verify across chain transaction validity when need its The block head of his cryptographic Hash (i.e. across chain transaction validity evidence) and plain block chain.Utilize these cryptographic Hash and the area of plain block chain Build, is able to verify that the validity across chain transaction.
In certain embodiments, interconnection chain can include:Data verification node.
In certain embodiments, data verification node can be used for receiving that the data transmit-receive node of parallel chain sends by institute State the parallel access request for being linked into interconnection chain;In response to access request, the generation of data verification node includes the first common recognition algorithm Identification information, identification information is stored, and by identification information broadcast in chain is interconnected;Confirm at least one other in interconnection chain After verification node receives identification information, information is successfully accessed including the identification information to data transmit-receive node feeding back.
In certain embodiments, data verification node is additionally operable to:Information will be successfully accessed and be sent to data transmit-receive node, with The identification information being successfully accessed for data transmit-receive node described in information carries out synchronizing information.
In certain embodiments, parallel chain can include:Source parallel chain and/or purpose parallel chain.
In certain embodiments, data verification node can be also used for:According to for source parallel chain and purpose parallel chain into Row carries out source parallel chain block head the first verification across the source parallel chain block head of chain transaction using the first common recognition algorithm;Treat After one is verified, data verification node broadcasts source parallel chain block head in chain is interconnected, at least one in interconnection chain A other verification nodes carry out across chain transaction the second verification using the second common recognition algorithm.
In certain embodiments, the first common recognition algorithm is the algorithm that source parallel chain knows together across chain transaction.
In certain embodiments, the second common recognition algorithm is to interconnect the algorithm that chain knows together across chain transaction.
In certain embodiments, chain is interconnected, it is characterised in that further include:Block head and block body.Wherein, block head can For recording the one or more in following information:The cryptographic Hash of a upper block head, the sequence number of this block, transaction Merkle tree root cryptographic Hash, timestamp, the signature for verifying node;Block body can be used for recording one kind in following information or It is a variety of:Across chain Transaction Information, parallel chain block head, validity evidence.
In certain embodiments, parallel chain can include:Data transmit-receive node.
In certain embodiments, data transmit-receive node can be used for sending parallel chain to the data verification node of interconnection chain Access the access request of the interconnection chain;Include the mark of the first common recognition algorithm according to access request generation in data verification node Information, store identification information, by identification information broadcast in chain interconnect and confirm interconnection chain at least one other verification section After point receives identification information, receive data verification node feeding back is successfully accessed information including identification information.
In certain embodiments, data transmit-receive node can be also used for carrying out using the identification information being successfully accessed in information Synchronizing information.
Fig. 9 is the method flow schematic diagram that the parallel chain of further embodiment of this invention is merchandised across chain.
As shown in figure 9, this method may comprise steps of:
S910, interconnection chain verification node receive the parallel chain block head that corresponding parallel chain data transmit-receive node is sent.
S920, verification node are inquired about the common recognition algorithm of the parallel chain according to its all parallel chain network management table, are found The method for verifying block head validity.
S930, verification node verify the validity of block head according to the verification mode, are preserved if effectively, and will The effective district build is broadcasted to whole interconnection chain network.
In certain embodiments, interconnection chain can include:Data verification node in above-mentioned each embodiment, and it is above-mentioned each Other verification nodes in a embodiment.
In certain embodiments, can also include:Data supervisory node.Data supervisory node can be used for monitoring data and test Demonstrate,prove the verification operation of node and/or other verification nodes, when verification operation occur it is abnormal, manage data verification node and/or its It verifies node.Thus, data supervisory node may insure to verify fair, efficient with network common recognition, improve later stage access With the security of transaction.
In certain embodiments, interconnection chain can include:Block head and block body.Wherein,
Block head can be used for recording the one or more in following information:The cryptographic Hash of a upper block head, local area The sequence number of block, transaction Merkle tree root cryptographic Hash, timestamp, the signature for verifying node.It is following that block body can be used for record One or more in information:Across chain data processing of information (such as across chain Transaction Information), parallel chain block head, validity card According to.
In certain embodiments, parallel chain can include:The data transmit-receive node of above-mentioned each embodiment.
In certain embodiments, parallel chain can include:Parallel chain network node.Parallel chain network node can be used for transporting Row interconnection chain program, obtains and nodal information is preset in program, active data verification nodal information is asked to default node, to work The data verification node request access interconnection chain of jump.
In certain embodiments, block chain interacted system can include:The parallel chain of above-mentioned each embodiment, and it is above-mentioned each The interconnection chain of a embodiment.
Figure 10 is the flow diagram based on the common recognition method merchandised across chain of one embodiment of the invention.
In the present embodiment, the transaction for other block chains being sent to from a block chain is referred to as across chain transaction.This method can With the data verification node side applied to interconnection chain.Any block chain can access interconnection chain, by interconnecting chain to other areas Block chain transmitted transaction.Access interconnection chain block chain be referred to as parallel chain, can be disposed in the network of every parallel chain one or Across chain transaction can be forwarded to interconnection chain network by multiple data transmit-receive nodes, data transmit-receive node.Interconnecting can be with chain network Dispose multiple data verification nodes.On the one hand data verification node receives the information such as the transaction from data transmit-receive person, and test Demonstrate,prove the validity of transaction;On the other hand, data verification node maintenance the complete copy of interconnection chain, participates in the common recognition of interconnection chain Journey.
As shown in Figure 10, this method may comprise steps of:S101, according to parameter preset in multiple parallel chains it is random Determine the parallel chain that need to be verified.S102, across the chain transaction initiated definite parallel chain confirms, and is broadcast to interconnection chain Carry out common recognition verification.
In S101, the implementation of parallel chain is distributed for data verification node to be included:Any one data verification section Point calculates the cryptographic Hash of parameter preset;Cryptographic Hash is mapped in specified integer set based on preset function, is obtained random parallel The numbering of chain.Thus, the embodiment of the present invention can be mapped to cryptographic Hash in specified integer set by way of mapping, can be with The numbering of random parallel chain is simply and easily obtained, it is accurate not only to calculate, but also can reduce computing cost.
In certain embodiments, preset function is:Remainder function.Thus, the embodiment of the present invention can be simple by setting Remainder function, can further improve computational accuracy, reduce computing cost.
In certain embodiments, specified integer set is:The set of the numbering of two or more than three parallel chains.Thus, The embodiment of the present invention can by using the encoding setting integer set of parallel chain, can quickly by data verification node with it is parallel Chain establishes correspondence, to be mutually matched.
In certain embodiments, parameter preset include following parameter in it is one or two kinds of more than:It is cryptographic Hash hi, random Number nonce, address addr, key (such as public key) key.Because nonce is a number being used only once in coded communication Word, in the authentication protocol, it is often one and randomly or pseudo-randomly counts, so using the nonce with uniqueness, to avoid weight Put attack (attack that same transaction is repeatedly asked).
In certain embodiments, calculating the implementation of cryptographic Hash hi can include:Quilt since interconnection chain is created is obtained The number of distribution;The block of the selection height identical with the numerical value of number;The cryptographic Hash of the block head of the block of selection is calculated, is obtained To cryptographic Hash hi.
In certain embodiments, calculating the implementation of random number nonce can include:Specify an arbitrary integer tg;Integer tg is less than or equal to according to the cryptographic Hash obtained by cryptographic Hash hi, random number nonce, address addr and key key Condition, calculate random number nonce.
In S102, across the chain transaction initiated definite parallel chain confirms, and is broadcast to interconnection chain and is total to Knowing verification can include:A master data verification node is chosen from multiple data verification nodes of interconnection chain;Utilize master data Verification node collects multiple data verification nodes to the signature merchandised across chain, and carries out interconnection link network to across chain transaction according to signature Network is known together;When interconnection chain network common recognition completion, across chain transaction confirmation message is constructed;Across chain transaction confirmation message is broadcasted to interconnection In chain.
In certain embodiments, carrying out interconnection chain network common recognition to across chain transaction according to signature can include:Obtain data Verify the number of nodes of node;Obtain the number of signatures of signature;If the ratio of number of signatures and number of nodes reaches threshold value, Across chain transaction is reached in agreement.
On the one hand, foregoing invention embodiment can determine to need to verify at random by according to parameter preset in multiple parallel chains Parallel chain so that for some specific data verification node in interconnection chain, it is possible to achieve by certain rule, it is such as pseudo- with The mode of machine, dynamic select parallel chain to be verified, drastically reduce the area cheating risk, improve the security across chain transaction.
On the other hand, specific parallel chain is distributed for specific data verification node, rather than allows it to verify all put down Row chain, can be greatly reduced calculation amount, improve the processing speed across chain transaction.
Another aspect, across the chain transaction to being successfully connected into interconnection chain and being initiated by the parallel chain of success dynamically distributes, Common recognition verification is carried out, block chain link point can be supported to be dynamically added and exit interconnection chain, enhances the flexibility across chain transaction.
Figure 11 is the flow diagram based on the common recognition method merchandised across chain of another embodiment of the present invention.
In the present embodiment, each node in parallel chain (such as parallel chain A) (receive by such as parallel chain network node and data Hair node) maintain the complete copy of parallel chain A.Similarly, each node in parallel chain network B maintains parallel chain The complete copy of B, each node in parallel chain network C maintain the complete copy of parallel chain C.
In the present embodiment, parallel chain can include one or more data transmit-receive nodes.On the one hand, data transmit-receive node It can safeguard the complete copy of parallel chain, and participate in the common recognition process of parallel chain;On the other hand, can collect from parallel chain across Chain is merchandised, and across chain transaction is sent to interconnection chain network.
In the present embodiment, interconnect in chain network and include multiple data verification nodes.On the one hand, data verification node peace Data transmit-receive node in row chain establishes connection, receives across the chain transaction from data transmit-receive node, and verify its validity;Separately On the one hand, data verification node maintenance the complete copy of interconnection chain, and participates in the common recognition process of interconnection chain.Synchronization, one A data verification node is only responsible for the transaction verification of a parallel block chain, and a parallel chain may be by one or more data Verification node is responsible for.In this way, in an interconnection chain for having accessed M bar parallel chains, verification node colony can be divided into M mutually Disjoint set, the data verification node in the set are responsible for identical parallel chain.
As shown in figure 11, this method may comprise steps of:
S111, starts.
S112, for the responsible parallel chain of each data verification node distribution.
S113, data transmit-receive node (the data transmit-receive node in the parallel chain of distribution) send block head and transaction message extremely Data verification node.
S114, data verification node be responsible for first core be verified as its distribution across the chain Transaction Information initiated of parallel chain whether Effectively, and to the validity across chain Transaction Information reach common understanding.
S115, does not reach common understanding, authentication failed, data verification node abandons transaction message, and turns if just veritifying card Step S1110.
S116, reaches common understanding if just veritifying card, is proved to be successful, data verification joint structure transaction confirmation message, and will Transaction confirmation message is broadcasted to interconnection chain.
S117, each data verification node interconnected in chain (without all data verification nodes, but at least need a number According to verification node) review verifies whether across chain Transaction Information is effective together, and this is reached altogether across the validity of chain Transaction Information Know.
S118, if review verification is not reached common understanding, authentication failed, data verification node abandons transaction message, and turns Step S1110.
S119, if review verification is reached common understanding, is proved to be successful, transaction confirmation message is write and interconnected by data verification node Chain, and go to step S120.
S120, terminates.
Since in the assignment procedure, data verification node (also referred to as verifying node) may actively select responsible parallel Chain, and then take some cheatings.For example, data verification node may be total to the data transmit-receive node of certain parallel chain Scheme, deliberately issues invalid transaction into parallel chain.Such situation in order to prevent, the embodiment of the present invention can ensure that assigning process is It is random and can verify that, i.e.,:Before a distribution, which bar parallel chain can not specify oneself will be responsible for data verification node.
Can be that every parallel chain is compiled if shared M bar blocks are linked into interconnection chain in chain is interconnected in S112 Number be 0 to M-1.For any p ∈ [0, M-1], the parallel chain that numbering is p is referred to as parallel chain p.At the same time, pre-set One integer tg.Then, the sub-process of following S1121 to S1125 is performed.
S1121, if this assigning process has been the ith distribution since interconnection chain is created, selects one and i Relevant numerical value xi
In the present embodiment, to xiSource can not make specific requirement.For example, block of the height for i can be selected, and By xiIt is assigned a value of the cryptographic Hash of its block head.The cryptographic Hash hi can be obtained from block head of the height for the block of i+1.Its In, it is i-th of block since being interconnected in chain first block (creating generation block) that height i, which refers to the block,.In another example can be with XiIt is assigned a value of the numerical value that i is obtained after certain mathematical operation.For another example if the clock of each data verification node can Keep accurate consistent, timestamp when current distribution can also be started is assigned to xi
In the present embodiment, an implementation of parallel chain distribution can have a variety of, and 2 embodiments are set forth below and carry out Explanation.
One implementation of parallel chain distribution may include steps of:
S1122, for any verification node in interconnection chain, if its IP address is addr, verifies the public affairs of itself signature Key is key, then the verification node finds an Integer n once, it is met equation below 1 or formula 2:
O=hash (xi| | addr | | key | | nonce) < tg (formula 1)
O=hash (xi| | addr | | key | | nonce)≤tg (formula 2)
In above-mentioned formula 1 and formula 2, hash represents hash function.Hash function can be used in bit coin PoW common recognitions SHA256 algorithms, can also use other hash algorithms in cryptography.Meanwhile in formula 1 and formula 2 hash function input Only schematical, its input can be xi, the character string that is formed by connecting with random order of addr, key and nonce.Together When, can also be in xi, on the basis of addr, key and nonce, include other additional contents.
Above-mentioned result of calculation O is mapped to an integer p (0≤p by S1123, each data verification node by mathematical function ≤M-1)。
In the present embodiment, mathematical function can be the remainder function shown in 3 as the following formula, but can also use full Other mathematical functions of sufficient the demand.Afterwards, which will be responsible for transaction of the verification from block chain p.
P=O mod M (formula 3)
In the step of above-mentioned S1122 and S1123, the numbering p of parallel chain is derived by Hash calculation.Because hash function Possess the characteristics of one-way, so, a parallel chain p is given in advance, and verification node is difficult to retrodict out suitable hash function defeated Enter.Thus, verification node can not preassign oneself responsible parallel chain.In addition, when calculating parallel chain numbering p, this Embodiment employs being capable of x of the unique mark per sub-distributioni, therefore, it is possible to ensure in every sub-distribution, verification node is all organic The parallel chain oneself being responsible for can be replaced.
Another implementation of parallel chain distribution may include steps of:
S1122 ', for any verification node in interconnection chain, if it verifies that the public key of itself signature is key, then The verification node finds an Integer n once, it is met equation below 4 or formula 5:
hash(xi| | key | | nonce) < tg (formula 4)
hash(xi| | key | | nonce)≤tg (formula 5)
Similar with above-mentioned formula 2 and formula 3, in above-mentioned formula 4 and formula 5, hash represents hash function.Meanwhile Hash The input of function is only schematical, it can be xi, the character string that is spliced with random order of key and nonce.Together When, can also be in xi, on the basis of key and nonce, include other additional contents.
S1123 ', if the IP address of certain verification node is addr, then, by formula 6, by xiMapped to addr whole Number p (0≤p≤M-1).Afterwards, which will be responsible for transaction of the verification from block chain p.
f(xi| | addr) → p (0≤p≤M-1) (formula 6)
In formula 6, the input of mathematical function f can be xiThe character string being spliced with addr with random order, output It is 0 to the integer between M-1.Function f can have a variety of implementations, and formula 7 is the simple form of one of which.
P=[hash (xi| | addr)] mod M (formula 7)
In formula 7, first to xiHash operation is carried out with the character string that addr is spliced into, it is mapped on set of integers, Then, remainder operation is carried out to the integer being mapped to.But function f is also not limited to hash mode, but can use any A kind of realization for meeting demand.
In above-mentioned S1122 ' and S1123 ', p is by x for parallel chain numberingiIt is calculated with IP address addr.Parallel every time When chain distributes, xiIt is known to each verification node, moreover, in order to verify node normal communication, some data verification section with other Point is also difficult to the mode by adjusting IP address, makes oneself to be assigned to selected parallel chain just.Thus, in this embodiment, Verification node can not also preassign oneself responsible parallel chain.
After S1122 and S1123 steps, or S1122 ' and S1123 ', unified S1124 to S1125 steps will be performed Suddenly.
S1124, it is described to verify node broadcasting packet in chain network is interconnected, following letter is included but not limited in the message Breath:I, Integer n once, IP address addr, verify the public key key of itself signature, the parallel chain numbering which is responsible for p.In this way, all verification nodes have learned the parallel chain that other verification nodes are responsible for.
S1125, all verification nodes for being responsible for same parallel chain establish network connection between each other.
By above-mentioned S1121 to S1125 steps, a parallel chain is assigned in all verification nodes.It may be noted that If a parallel chain is responsible for by one group of fixed verification node for a long time, some potential safety problems may be produced.This is specially The measure that profit is taken is that section t, just performs above-mentioned S1121 to S1125 steps again at every fixed time, so that for per number Parallel chain is redistributed according to verification node.
In two kinds of implementations in S112, a node is only after the nonce met the requirements is searched out, Cai Nengguang Broadcast the public key of oneself.It could be obtained since nonce needs to pay certain calculating, so in certain period of time, a section Point can only be bound with a public key.Therefore, this patent need not assert the identity of each node in advance by the way of PKI.Institute With node can be dynamically joined to interconnection chain network.
In S113, the data transmit-receive node in parallel chain can send the transaction message of block head and oneself construction To corresponding data verification node.In common recognition mechanism, data transmit-receive node needs to verify the validity across chain transaction.It is most accurate Transaction verification mode be that each data verification node stores the complete copy of parallel chain.But this can aggravate verification node Storage burden.The measure that this patent is taken is to use for reference simple payment verification (Simplified Payment Verification, SPV) thought, the block head of each bar parallel chain is stored in each data verification node, by block head In Merkle tree roots complete transaction verification.In order to get the block head, it is necessary to perform below scheme.
S1131, when certain parallel chain generates a new block, and after reaching common understanding in parallel chain network, parallel link network Data transmit-receive node in network send the block hair of the block to the verification node for being responsible for the parallel chain.
S1132, the verification node for being responsible for the parallel chain broadcast block head to all verification sections in interconnection chain network Point.
In this way, the block head that each verification node in chain network has all held all parallel chains is interconnected.Because Each block head is relatively small (for example, the block head size of bit coin is only 80 bytes), so, it is complete flat relative to preserving For row chain copy, this mode can significantly mitigate the storage burden of verification node.
After above-mentioned S1131 and S1132 steps are completed, the newly-generated area of data transmit-receive node traverses of parallel chain is in the block Transaction, if it find that including across chain transaction in the new block, is just directed to every across chain transaction, constructs a transaction message.Should It can include but is not limited to following information in transaction message:Across chain transaction, across chain exchange block identifier, it is described across chain Checking information of the transaction on Merkle trees.Then the transaction message is sent to verification node corresponding with the parallel chain.
Wherein, across chain exchange can be in the identifier of block:1. the cryptographic Hash of block head;2. block is in parallel chain Height h.It however, it can be other any identifiers for being capable of one block of unique mark.
Figure 12 is the schematic diagram for the Merkle trees across chain transaction verification of another embodiment of the present invention.
As shown in figure 12, Merkle trees can be set up by tetra- transaction of TxA, TxB, TxC, TxD and be formed, then this four friendships Easy cryptographic Hash HA、HB、HC、HDConstitute the leaf node of Merkle trees.And HABBy by HA、HBIt is connected, and carries out Hash fortune Calculate and obtain;HCDBy by HC、HDIt is connected, and carries out Hash operation acquisition.Finally, the root node H of Merkle treesABCDPassing through will HAB、HCDIt is connected, then carries out Hash operation acquisition.According to block chain technology, the root node HABCDBlock head will be stored in In.Because respectively verification node saves the block head of parallel chain, each data verification node can retrieve root node HABCDValue.
If the TxA that merchandises is across a chain transaction, then HB、HCDValue be exactly to verify necessary checking information (Figure 12 of TxA In be represented by dashed line).Then, merchandise TxA, HB、HCD, and identifier of the block in parallel chain comprising TxA, it is packed In transaction message, and it is sent to one or more data verification nodes corresponding with the parallel chain.
The transaction message from data transmit-receive node can be received by being responsible for the verification node of same parallel chain, then, be born The verification node of duty same parallel chain is known together using BFT reaches an agreement the validity merchandised across chain.User just veritify card and The common recognition mechanism of review verification can be Tangaroa (a kind of changes of BFT that basic PBFT knows together or proposes recently Kind), the common recognition mechanism such as Honey Badger BFT (another mutation of BFT).Compared with the PoW of the uses such as bit coin, BFT is common Knowledge can quickly handle the transaction from different parallel chains.
It is first veritify card and review verification know together during, each data verification node needs to verify across chain transaction Validity.In the present embodiment, the verification mode for just veritifying card and review verification can be different.For example, just veritify Card can rely on the Merkle tree roots in block head to complete transaction verification;Review verification can be then checked in transaction confirmation message The no signature for containing at least preset number (such as t) data verification node.
It is pointed out that the Merkle trees in Figure 12 are only schematical.For example, Merkle trees can be by more friendships Easily build, multiple across chain transaction may also be included on a Merkle tree.
Referring to Figure 11 and Figure 12, in S114, whether effective card transaction is just veritified.For example, it is responsible for same parallel chain Data verification node is known together using BFT reaches an agreement the validity merchandised across chain.The common recognition mechanism can be basic The common recognition mechanism such as Tangaroa, the Honey Badger BFT that PBFT knows together or proposes recently.Used with bit coin etc. PoW compare, BFT common recognition can quickly handle the transaction from different parallel chains.
During being known together, each data verification node needs to verify the validity across chain transaction.Below with TxA Exemplified by, illustrate that the verification mode across chain transaction may comprise steps of.
S1141, by the block-identified symbol included in transaction message, finds the block head of the block comprising TxA.
S1142, retrieves the tree root of Merkle trees from the block head.
S1143, extracts the necessary checking information of verification TxA, i.e. H from the transaction messageB、HCD
S1144, each to verify that node utilizes the information obtained in above-mentioned S1141-S1143 steps, use is well known in the art SPV verification modes, verify the validity across chain transaction.
S1144 specifically includes following sub-step:
S11441, calculates the cryptographic Hash H of TxAA, and then pass through HBAnd HCD, calculate the tree root H of Merkle treesABCD
S11442, contrasts the tree root and H of the Merkle trees retrieved from block headABCDValue it is whether equal, if phase Deng can then determine that across chain transaction TxA is included in the block specified;Otherwise it is assumed that do not include TxA in the block specified, across Chain transaction invalid.
S11443, if across the chain transaction is included in the block specified, for the parallel chain using tradition BFT common recognitions For, data verification node can directly judge that across the chain transaction is effective;For the parallel chain using PoW common recognitions, also Need to wait enough block heads to accumulate after the block head of designated blocks, just can confirm that the validity across chain transaction.Example Such as, bit coin needs to wait the block head accumulation of 6 blocks just to think that common recognition is completed afterwards in the block head of designated blocks. Then, the data verification node for being responsible for parallel chain just thinks that across the chain transaction is effective.
In S116, all kinds of BFT common recognitions, such as PBFT, can elect a host node.Host node is completed in common recognition Afterwards, a transaction confirmation message is constructed, transaction confirmation message includes but not limited to following information:1. across chain transaction;2. across chain friendship The numbering of parallel chain belonging to easily;3. across chain exchange is in the identifier of block;4. verification letter of across the chain transaction on Merkle trees Breath;5. it is responsible for each verification node of the parallel chain to the signature across chain transaction.Host node broadcasts transaction confirmation message All verification nodes into interconnection chain network.
In S117, each data verification node (at least one data verification node) review verification in chain is interconnected across chain Whether Transaction Information is effective, and reaches common understanding to the validity across chain Transaction Information.
Each verification node in interconnection chain network receives transaction confirmation message.Then, respectively verification node disjoint inspection Whether at least t data verification node signature is contained in the transaction confirmation message.Wherein, t saves for verification set in advance Point quantity.In this way, respectively verification node is able to verify that the validity that transaction confirmation message mid-span chain is merchandised.Then, mutually All verify that node utilizes BFT mechanism in connection chain, reach common understanding to across chain transaction validity.
In S118, verification node abandons the transaction confirmation message received, does not further process, common recognition terminates.
In S119, first, verification joint structure interconnection chain block.Afterwards, each data verification section in chain network is interconnected Point writes block in the block chain of interconnection chain.Interconnect and include but not limited to following information in chain block:Across chain transaction;2. across chain The numbering of parallel chain belonging to transaction;3. across chain exchange is in the identifier of block;4. across the chain transaction is on Merkle trees Checking information.
Figure 13 is the structure diagram based on the common recognition device merchandised across chain of one embodiment of the invention.
In the present embodiment, across chain transaction is the transaction between multiple parallel chains, and multiple parallel chains connect with interconnection chain respectively Connect.
As shown in figure 13, can be included based on the common recognition device merchandised across chain:Parallel chain determination unit 131 and network common recognition Unit 132.Parallel chain determination unit 131 can be used for determining to verify at random in multiple parallel chains according to parameter preset flat Row chain;Network common recognition unit 132 can be used for confirming across the chain transaction that definite parallel chain is initiated, and be broadcast to mutually Connection chain carries out common recognition verification.
In certain embodiments, parallel chain determination unit 131 can include:Numerical Simulation Module and numbering acquisition module. Wherein, Numerical Simulation Module can be used for the cryptographic Hash for calculating parameter preset;Numbering acquisition module can be used for based on default letter Number maps to cryptographic Hash in specified integer set, obtains the numbering for the parallel chain that need to be verified.
In certain embodiments, preset function can be:Remainder function.
In certain embodiments, specified integer set can be:The set of the numbering of multiple parallel chains.
In certain embodiments, parameter preset can include following parameter in it is one or two kinds of more than:Cryptographic Hash, with Machine number, address, key.
In certain embodiments, can also be included based on the common recognition device merchandised across chain:Cryptographic Hash acquiring unit.Wherein, Cryptographic Hash acquiring unit can be used for obtaining the number being allocated since interconnection chain is created;Selection is identical with the numerical value of number The block of height;The cryptographic Hash of the block head of the block of selection is calculated, obtains the parameter of cryptographic Hash.
In certain embodiments, can also be included based on the common recognition device merchandised across chain:Random number acquiring unit.Wherein, Random number acquiring unit can be used for specifying an arbitrary integer;According to what is obtained by cryptographic Hash, random number, address and key Cryptographic Hash is less than or equal to the condition of integer, calculates the parameter of random number.
In certain embodiments, network common recognition unit can include:Node selection module, network common recognition module, message structure Modeling block and message broadcast module.Wherein, node selection module, for choosing one from multiple data verification nodes of interconnection chain A master data verifies node;Network is known together module, for using master data verification node collect multiple data verification nodes to across The signature of chain transaction, and interconnection chain network common recognition is carried out to across chain transaction according to signature;Message constructing module, for when interconnection chain Network common recognition is completed, and constructs across chain transaction confirmation message;Message broadcast module, for broadcasting across chain transaction confirmation message to mutual Join in chain.
In certain embodiments, network common recognition unit can include:Number of nodes securing component, number of signatures securing component With network common recognition component.Wherein, number of nodes securing component can be used for the number of nodes for obtaining data verification node;Number of signature Amount securing component can be used for the number of signatures for obtaining signature;If network common recognition component can be used for number of signatures and number of nodes When the ratio of amount reaches threshold value, across chain transaction is reached in agreement.
In the above-described embodiments, can come wholly or partly by software, hardware, firmware or its any combination real It is existing.When implemented in software, can realize in the form of a computer program product whole or in part.The computer program Product includes one or more computer instructions, when run on a computer so that computer performs above-mentioned each implementation Method described in example.When loading on computers and performing the computer program instructions, produce whole or in part according to Flow or function described in the embodiment of the present invention.The computer can be all-purpose computer, special purpose computer, computer network Network or other programmable devices.The computer instruction can store in a computer-readable storage medium, or from one Computer-readable recording medium is transmitted to another computer-readable recording medium, for example, the computer instruction can be from one A web-site, computer, server or data center pass through wired (such as coaxial cable, optical fiber, Digital Subscriber Line (DSL)) Or wireless (such as infrared, wireless, microwave etc.) mode is carried out to another web-site, computer, server or data center Transmission.The computer-readable recording medium can be any usable medium that can access of computer or comprising one or The data storage devices such as server that multiple usable mediums integrate, data center.The usable medium can be magnetic medium, (for example, floppy disk, hard disk, tape), optical medium (for example, DVD) or semiconductor medium (such as solid state hard disc Solid State Disk (SSD)) etc..
It should be noted that the device of the various embodiments described above can be as the method for each embodiment of the various embodiments described above In executive agent, it is possible to achieve the corresponding flow in each method, realizes identical technique effect, for sake of simplicity, in this respect Content repeats no more.
Figure 14 is the circuit theory schematic diagram based on the common recognition device merchandised across chain of one embodiment of the invention.
As shown in figure 14, which can include central processing unit (CPU) 141, it can be according to being stored in read-only deposit Program in reservoir (ROM) 142 is held from the program that storage part 148 is loaded into random access storage device (RAM) 143 The various operations that the above-mentioned each embodiment of row is done.In RAM143, the various programs needed for system architecture operation are also stored with And data.CPU141, ROM 142 and RAM 143 are connected with each other by bus 144.Input/output (I/O) interface 145 also connects It is connected to bus 144.
I/O interfaces 145 are connected to lower component:Importation 146 including keyboard, mouse etc.;Penetrated including such as cathode The output par, c 147 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage part 148 including hard disk etc.; And the communications portion 149 of the network interface card including LAN card, modem etc..Communications portion 149 via such as because The network of spy's net performs communication process.Driver 1410 is also according to needing to be connected to I/O interfaces 145.Detachable media 1411, it is all Such as disk, CD, magneto-optic disk, semiconductor memory, are installed on driver 1410, in order to read from it as needed The computer program gone out is mounted into storage part 148 as needed.
Especially, according to an embodiment of the invention, it may be implemented as computer above with reference to the process of flow chart description Software program.For example, the embodiment of the present invention includes a kind of computer program product, it includes being tangibly embodied in machine readable Computer program on medium, the computer program include the program code for being used for the method shown in execution flow chart.At this In the embodiment of sample, which can be downloaded and installed by communications portion 149 from network, and/or from removable Medium 1411 is unloaded to be mounted.
Device embodiment described above is only schematical, wherein the unit illustrated as separating component can To be or may not be physically separate, physics list is may or may not be as the component that unit is shown Member, you can with positioned at a place, or can also be distributed in multiple network unit.It can be selected according to the actual needs In some or all of module realize the purpose of this embodiment scheme.Those of ordinary skill in the art are not paying creativeness Work in the case of, you can to understand and implement.
Through the above description of the embodiments, those skilled in the art can be understood that each embodiment can Realized by the mode of software plus required general hardware platform, naturally it is also possible to pass through hardware.Based on such understanding, on The part that technical solution substantially in other words contributes to the prior art is stated to embody in the form of software product, should Computer software product can store in a computer-readable storage medium, such as ROM/RAM, magnetic disc, CD, including some fingers Order is used so that a computer equipment (can be personal computer, server, or network equipment etc.) performs each implementation Method described in some parts of example or embodiment.
Finally it should be noted that:The above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although The present invention is described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that:It still may be used To modify to the technical solution described in foregoing embodiments, or equivalent substitution is carried out to which part technical characteristic; And these modification or replace, do not make appropriate technical solution essence depart from various embodiments of the present invention technical solution spirit and Scope.

Claims (20)

  1. It is 1. a kind of based on the common recognition method merchandised across chain, it is characterised in that across the chain transaction is the friendship between multiple parallel chains Easily, multiple parallel chains the described method comprises the following steps respectively with interconnecting chain link:
    According to parameter preset in multiple parallel chains the random parallel chain for determining to verify;
    Across the chain transaction initiated definite parallel chain confirms, and is broadcast to the interconnection chain and carries out common recognition verification.
  2. 2. according to the method described in claim 1, it is characterized in that, it is described according to parameter preset in multiple parallel chains with Machine determines the parallel chain that need to be verified, including:
    Calculate the cryptographic Hash of the parameter preset;
    The cryptographic Hash is mapped in specified integer set based on preset function, obtains the volume of the parallel chain that need to be verified Number.
  3. 3. according to the method described in claim 2, it is characterized in that, wherein:
    The preset function is:Remainder function.
  4. 4. according to the method described in claim 2, it is characterized in that, wherein:
    The specified integer set is:The set of the numbering of multiple parallel chains.
  5. 5. according to any method in claim 1-4, it is characterised in that the parameter preset is included in following parameter It is one or two kinds of more than:
    Cryptographic Hash, random number, address, key.
  6. 6. according to the method described in claim 5, it is characterized in that, further include:
    Obtain the number being allocated since the interconnection chain is created;
    The block of the selection height identical with the numerical value of the number;
    The cryptographic Hash of the block head of the block of selection is calculated, obtains the parameter of the cryptographic Hash.
  7. 7. according to the method described in claim 5, it is characterized in that, further include:
    Specify an arbitrary integer;
    Institute is less than or equal to according to the cryptographic Hash obtained by the cryptographic Hash, the random number, described address and the key The condition of integer is stated, calculates the parameter of the random number.
  8. 8. according to any method in claim 1-7, it is characterised in that what described pair of definite parallel chain was initiated Across chain transaction is confirmed, and is broadcast to the interconnection chain and is carried out common recognition verification, including:
    A master data verification node is chosen from multiple data verification nodes of the interconnection chain;
    Multiple data verification nodes are collected to the signature across chain transaction using master data verification node, and according to The signature carries out across the chain transaction interconnection chain network common recognition;
    When the interconnection chain network common recognition completion, across chain transaction confirmation message is constructed;
    Across the chain transaction confirmation message is broadcasted into the interconnection chain.
  9. 9. according to the method described in claim 8, it is characterized in that, described carry out mutually across the chain transaction according to the signature Join chain network common recognition, including:
    Obtain the number of nodes of the data verification node;
    Obtain the number of signatures of the signature;
    If the number of signatures and the ratio of the number of nodes reach threshold value, opinion one is reached to across the chain transaction Cause.
  10. It is 10. a kind of based on the common recognition device merchandised across chain, it is characterised in that across the chain transaction is the friendship between multiple parallel chains Easily, respectively with interconnecting chain link, described device includes multiple parallel chains:
    Parallel chain determination unit, for the parallel chain for determining to verify at random in multiple parallel chains according to parameter preset;
    Network common recognition unit, across the chain transaction for being initiated definite parallel chain confirms, and is broadcast to the interconnection Chain carries out common recognition verification.
  11. 11. device according to claim 10, it is characterised in that the parallel chain determination unit includes:
    Numerical Simulation Module, for calculating the cryptographic Hash of the parameter preset;
    Numbering acquisition module, for the cryptographic Hash to be mapped to specified integer set based on preset function, obtains the need The numbering of the parallel chain of verification.
  12. 12. according to the devices described in claim 11, it is characterised in that wherein:
    The preset function is:Remainder function.
  13. 13. according to the devices described in claim 11, it is characterised in that wherein:
    The specified integer set is:The set of the numbering of multiple parallel chains.
  14. 14. according to any device in claim 10-13, it is characterised in that the parameter preset includes following ginseng It is more than one or two kinds of in number:
    Cryptographic Hash, random number, address, key.
  15. 15. device according to claim 14, it is characterised in that further include:
    Cryptographic Hash acquiring unit, for obtaining the number being allocated since the interconnection chain is created;Selection and the number The block of the identical height of numerical value;The cryptographic Hash of the block head of the block of selection is calculated, obtains the parameter of the cryptographic Hash.
  16. 16. device according to claim 14, it is characterised in that further include:
    Random number acquiring unit, for specifying an arbitrary integer;According to by the cryptographic Hash, random number, described The cryptographic Hash that location and the key obtain is less than or equal to the condition of the integer, calculates the parameter of the random number.
  17. 17. according to any device in claim 10-16, it is characterised in that the network common recognition unit includes:
    Node selection module, for choosing a master data verification node from multiple data verification nodes of the interconnection chain;
    Network common recognition module, for collecting multiple data verification nodes to described across chain using master data verification node The signature of transaction, and interconnection chain network common recognition carries out across the chain transaction according to the signature;
    Message constructing module, for being completed when the interconnection chain network common recognition, constructs across chain transaction confirmation message;
    Message broadcast module, for broadcasting across the chain transaction confirmation message into the interconnection chain.
  18. 18. device according to claim 17, it is characterised in that the network common recognition module further includes:
    Number of nodes securing component, for obtaining the number of nodes of the data verification node;
    Number of signatures securing component, for obtaining the number of signatures of the signature;
    Network is known together component, if the ratio for the number of signatures and the number of nodes reaches threshold value, to it is described across Chain transaction is reached in agreement.
  19. It is 19. a kind of based on the common recognition device merchandised across chain, it is characterised in that including:
    Memory, for storing program;
    Processor, for performing the program of the memory storage, described program causes the processor to perform such as claim Method in 1-9 described in any one.
  20. A kind of 20. computer-readable recording medium, it is characterised in that including:Instruction,
    When described instruction is run on computers so that computer performs the side as described in any one in claim 1-9 Method.
CN201710952719.9A 2017-10-13 2017-10-13 Based on the common recognition method, apparatus merchandised across chain and storage medium Pending CN107909369A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710952719.9A CN107909369A (en) 2017-10-13 2017-10-13 Based on the common recognition method, apparatus merchandised across chain and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710952719.9A CN107909369A (en) 2017-10-13 2017-10-13 Based on the common recognition method, apparatus merchandised across chain and storage medium

Publications (1)

Publication Number Publication Date
CN107909369A true CN107909369A (en) 2018-04-13

Family

ID=61840565

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710952719.9A Pending CN107909369A (en) 2017-10-13 2017-10-13 Based on the common recognition method, apparatus merchandised across chain and storage medium

Country Status (1)

Country Link
CN (1) CN107909369A (en)

Cited By (73)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108805701A (en) * 2018-04-19 2018-11-13 深圳市网心科技有限公司 Across the chain transaction processing system of multi-tiling chain and method, block catenary system and storage medium
CN108876618A (en) * 2018-06-15 2018-11-23 浙江华信区块链科技服务有限公司 A kind of exchange block catenary system and corresponding universal block chain mutual operation method and network
CN108881387A (en) * 2018-05-16 2018-11-23 横琴密达科技有限责任公司 A kind of block chain common recognition system
CN108900585A (en) * 2018-06-15 2018-11-27 浙江华信区块链科技服务有限公司 Across chain transaction consistency implementation method
CN108924107A (en) * 2018-06-21 2018-11-30 桂林电子科技大学 A kind of block chain tele-medicine data call can verify that method
CN108921559A (en) * 2018-07-27 2018-11-30 杭州复杂美科技有限公司 Across chain transaction method of calibration, equipment and storage medium
CN108989052A (en) * 2018-08-28 2018-12-11 中国联合网络通信集团有限公司 transaction request processing method and system
CN108984662A (en) * 2018-06-28 2018-12-11 杭州复杂美科技有限公司 A kind of block chain method of data synchronization
CN108985742A (en) * 2018-07-19 2018-12-11 深圳市网心科技有限公司 Transaction processing method, device and block catenary system
CN109035016A (en) * 2018-06-28 2018-12-18 杭州复杂美科技有限公司 A kind of multichain concurrent transaction method
CN109102284A (en) * 2018-07-30 2018-12-28 黄芸芸 A kind of optimization method of block chain tamper-resistance techniques
CN109145205A (en) * 2018-07-27 2019-01-04 阿里巴巴集团控股有限公司 A kind of across chain data manipulation method and device based on block chain
CN109167811A (en) * 2018-07-27 2019-01-08 阿里巴巴集团控股有限公司 A kind of across chain data access method and device based on block chain
CN109213767A (en) * 2018-09-19 2019-01-15 挖财网络技术有限公司 A kind of account data management method suitable for block chain
CN109218303A (en) * 2018-09-10 2019-01-15 浙江天脉领域科技有限公司 A kind of novel across chain method of block chain of homologous isomery link network fusion
CN109242512A (en) * 2018-08-24 2019-01-18 维沃移动通信有限公司 A kind of part true and false information processing method, device and equipment based on block chain
CN109242456A (en) * 2018-09-04 2019-01-18 湖南宸瀚信息科技有限责任公司 Across the chain method of commerce of block chain, system and storage medium
CN109360096A (en) * 2018-09-27 2019-02-19 中国联合网络通信集团有限公司 A kind of bookkeeping methods and system of the privately owned chain based on publicly-owned chain
CN109377225A (en) * 2018-10-30 2019-02-22 杭州复杂美科技有限公司 Transaction allocation method, common recognition method, equipment and storage medium
CN109410045A (en) * 2018-08-30 2019-03-01 杭州复杂美科技有限公司 A kind of parallel chain common recognition method, equipment and storage medium
CN109409889A (en) * 2018-11-13 2019-03-01 杭州秘猿科技有限公司 A kind of block in block chain determines method, apparatus and electronic equipment
CN109493027A (en) * 2018-11-19 2019-03-19 众安信息技术服务有限公司 A kind of method and device realized across chain transactional operation
CN109558454A (en) * 2018-11-28 2019-04-02 杭州复杂美科技有限公司 Parallel chain digs mine common recognition method, equipment and storage medium
CN109711844A (en) * 2018-12-31 2019-05-03 莆田市烛火信息技术有限公司 A kind of parallel chain management method of block chain network
CN109711842A (en) * 2018-12-29 2019-05-03 莆田市烛火信息技术有限公司 A kind of account book bookkeeping methods for the block chain network that parallel chain periodically converges
CN109831514A (en) * 2019-03-02 2019-05-31 杭州复杂美科技有限公司 Parallel chain common recognition method, data exception processing method, equipment and storage medium
CN109934592A (en) * 2019-03-22 2019-06-25 深圳市网心科技有限公司 A kind of across the chain communication means of block chain, system, electronic equipment and storage medium
CN110084601A (en) * 2019-04-30 2019-08-02 杭州复杂美科技有限公司 Parallel chain main chain stateful transaction synchronous method, equipment and storage medium
CN110147685A (en) * 2019-04-04 2019-08-20 阿里巴巴集团控股有限公司 Data verification method, system, device and equipment
CN110162523A (en) * 2019-04-04 2019-08-23 阿里巴巴集团控股有限公司 Date storage method, system, device and equipment
CN110188563A (en) * 2019-06-02 2019-08-30 四川虹微技术有限公司 A kind of trust data update method and device
CN110288345A (en) * 2019-06-26 2019-09-27 深圳市网心科技有限公司 Across chain communication means, device, main chain node and storage medium
CN110473093A (en) * 2019-07-29 2019-11-19 杭州复杂美科技有限公司 Parallel chain assets transfer method, equipment and storage medium
CN110490562A (en) * 2019-07-10 2019-11-22 布比(北京)网络技术有限公司 A kind of across the chain data processing method and system of multi-tiling chain
CN110597907A (en) * 2019-09-10 2019-12-20 腾讯科技(深圳)有限公司 Cross-block-chain data information synchronization method, device, equipment and medium
CN110610418A (en) * 2018-06-15 2019-12-24 翟红鹰 Transaction state query method, system, device and storage medium based on block chain
WO2019242508A1 (en) * 2018-06-20 2019-12-26 深圳市红砖坊技术有限公司 Blockchain system and routing method of routing node applied to blockchain system
CN110647311A (en) * 2018-06-27 2020-01-03 厦门本能管家科技有限公司 Uncontrollable random number generation method and system
CN110730959A (en) * 2018-04-21 2020-01-24 因特比有限公司 Method and system for performing actions requested by blockchain
CN110766410A (en) * 2019-10-24 2020-02-07 杭州趣链科技有限公司 Method and equipment for constructing and verifying credible cross-chain event based on Mercker tree
WO2020043046A1 (en) * 2018-08-30 2020-03-05 杭州复杂美科技有限公司 Parallel chain cross-chain transaction method, device and storage medium
WO2020042937A1 (en) * 2018-08-28 2020-03-05 白杰 Maintenance method for blockchain parachain, and blockchain parachain
CN110868438A (en) * 2018-08-28 2020-03-06 傲为信息技术(江苏)有限公司 Block chain network system
CN111008827A (en) * 2019-11-25 2020-04-14 深圳前海微众银行股份有限公司 Cross-chain transaction signature method and device
CN111275437A (en) * 2020-01-12 2020-06-12 杭州复杂美科技有限公司 Parallel chain consensus method, device and storage medium
CN111314438A (en) * 2020-01-20 2020-06-19 厦门顺势共识信息科技有限公司 Credible block chain system based on role distribution and cross-chain consensus method
US20200213089A1 (en) 2019-04-04 2020-07-02 Alibaba Group Holding Limited Data storage method, apparatus, system and device
CN111475572A (en) * 2020-04-02 2020-07-31 百度国际科技(深圳)有限公司 Block generation method, device, equipment and medium
CN111489256A (en) * 2019-01-25 2020-08-04 京东数字科技控股有限公司 Cross-chain processing method, equipment and system for multi-chain block chain system
CN111488202A (en) * 2020-04-07 2020-08-04 百度国际科技(深圳)有限公司 Transaction processing method, device, equipment, system and medium for multi-chain system
CN111556120A (en) * 2020-04-23 2020-08-18 财付通支付科技有限公司 Data processing method and device based on block chain, storage medium and equipment
CN111683120A (en) * 2020-05-22 2020-09-18 哈尔滨工程大学 Alliance node storage method supporting dynamic change of verification node
CN111798238A (en) * 2020-07-03 2020-10-20 杭州复杂美科技有限公司 Parallel chain consensus method, device and storage medium
CN111798239A (en) * 2020-07-03 2020-10-20 杭州复杂美科技有限公司 Parallel chain consensus method, device and storage medium
CN112041873A (en) * 2018-04-27 2020-12-04 区块链控股有限公司 Block chain network partitioning
CN112039926A (en) * 2020-11-04 2020-12-04 南京金宁汇科技有限公司 Method for realizing double-layer chain type architecture of block chain
WO2021018048A1 (en) * 2019-07-26 2021-02-04 华为技术有限公司 Cross-chain transaction method and apparatus
CN112348672A (en) * 2019-08-07 2021-02-09 阿里巴巴集团控股有限公司 Cross-chain transaction method and device, multi-block chain system and computing equipment
CN112598418A (en) * 2020-12-09 2021-04-02 杭州复杂美科技有限公司 Parallel chain supervision consensus method, equipment and storage medium
CN112633868A (en) * 2019-10-08 2021-04-09 橙载(上海)信息技术有限公司 Cross-chain asset transfer method based on intelligent contract implementation
CN112948495A (en) * 2021-03-05 2021-06-11 杭州复杂美科技有限公司 Parallel chain constant block output method, computer device and storage medium
CN112968883A (en) * 2018-09-27 2021-06-15 福建福链科技有限公司 Block chain heterogeneous consensus method with high safety and terminal
US11055277B2 (en) 2019-04-04 2021-07-06 Advanced New Technologies Co., Ltd. Integrity verification method, apparatus, and system and device for data in a blockchain-type ledger
CN113098694A (en) * 2021-04-09 2021-07-09 杭州链网科技有限公司 Hybrid cross-chain consensus method
WO2021139533A1 (en) * 2020-01-12 2021-07-15 江苏复杂美科技有限公司 Method for sending consensus transaction, and device and storage medium
CN113348656A (en) * 2019-04-29 2021-09-03 互达控股有限公司 Network transaction verification method based on multiple nodes, system and storage medium thereof
US11252165B2 (en) * 2018-11-16 2022-02-15 Advanced New Technologies Co., Ltd. Cross-chain data trusted management methods and apparatuses
WO2022068410A1 (en) * 2020-09-30 2022-04-07 杭州复杂美科技有限公司 Parachain supervision consensus method, device, and storage medium
CN114465830A (en) * 2022-04-14 2022-05-10 北京理工大学 Cross-chain data encryption method, device, equipment and storage medium
EP3857850A4 (en) * 2018-09-28 2022-06-29 Thunder Token Inc. High throughput blockchain consensus systems and methods with low finalization time
CN114862397A (en) * 2022-07-06 2022-08-05 国网天津市电力公司培训中心 Double-decoupling block chain distributed method based on double-chain structure
WO2024066010A1 (en) * 2022-09-30 2024-04-04 蚂蚁区块链科技(上海)有限公司 Method and apparatus for transaction processing in blockchain system, and blockchain system
CN112041873B (en) * 2018-04-27 2024-04-19 区块链控股有限公司 Block chain network partitioning

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107146087A (en) * 2017-04-11 2017-09-08 广东网金控股股份有限公司 A kind of quick common recognition bookkeeping methods and system based on block chain alliance chain

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107146087A (en) * 2017-04-11 2017-09-08 广东网金控股股份有限公司 A kind of quick common recognition bookkeeping methods and system based on block chain alliance chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
DR. GAVIN WOOD: "《POLKADOT: VISION FOR A HETEROGENEOUS MULTI-CHAIN FRAMEWORK》", 《POLKADOT 白皮书》 *

Cited By (128)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108805701A (en) * 2018-04-19 2018-11-13 深圳市网心科技有限公司 Across the chain transaction processing system of multi-tiling chain and method, block catenary system and storage medium
CN108805701B (en) * 2018-04-19 2022-06-07 深圳市迅雷网络技术有限公司 Multi-blockchain cross-chain transaction processing system and method, blockchain system and storage medium
CN110730959A (en) * 2018-04-21 2020-01-24 因特比有限公司 Method and system for performing actions requested by blockchain
CN112041873A (en) * 2018-04-27 2020-12-04 区块链控股有限公司 Block chain network partitioning
CN112041873B (en) * 2018-04-27 2024-04-19 区块链控股有限公司 Block chain network partitioning
CN108881387A (en) * 2018-05-16 2018-11-23 横琴密达科技有限责任公司 A kind of block chain common recognition system
CN108900585A (en) * 2018-06-15 2018-11-27 浙江华信区块链科技服务有限公司 Across chain transaction consistency implementation method
CN110610418A (en) * 2018-06-15 2019-12-24 翟红鹰 Transaction state query method, system, device and storage medium based on block chain
CN108876618A (en) * 2018-06-15 2018-11-23 浙江华信区块链科技服务有限公司 A kind of exchange block catenary system and corresponding universal block chain mutual operation method and network
CN110619520B (en) * 2018-06-20 2023-05-02 深圳市红砖坊技术有限公司 Block chain system and routing method applied to routing nodes of block chain system
WO2019242508A1 (en) * 2018-06-20 2019-12-26 深圳市红砖坊技术有限公司 Blockchain system and routing method of routing node applied to blockchain system
CN110619520A (en) * 2018-06-20 2019-12-27 深圳市红砖坊技术有限公司 Block chain system and routing method of routing node applied to block chain system
CN108924107A (en) * 2018-06-21 2018-11-30 桂林电子科技大学 A kind of block chain tele-medicine data call can verify that method
CN108924107B (en) * 2018-06-21 2020-08-21 桂林电子科技大学 Verifiable method for block chain remote medical data calling
CN110647311A (en) * 2018-06-27 2020-01-03 厦门本能管家科技有限公司 Uncontrollable random number generation method and system
CN109035016B (en) * 2018-06-28 2020-10-23 杭州复杂美科技有限公司 Multi-chain concurrent transaction method
WO2020001370A1 (en) * 2018-06-28 2020-01-02 杭州复杂美科技有限公司 Multi-chain concurrent transaction method
US20210272111A1 (en) * 2018-06-28 2021-09-02 Jiangsu Fuzamei Technology Co.,Ltd. Multi-Chain Concurrent Transaction Method
CN109035016A (en) * 2018-06-28 2018-12-18 杭州复杂美科技有限公司 A kind of multichain concurrent transaction method
CN108984662A (en) * 2018-06-28 2018-12-11 杭州复杂美科技有限公司 A kind of block chain method of data synchronization
CN108985742A (en) * 2018-07-19 2018-12-11 深圳市网心科技有限公司 Transaction processing method, device and block catenary system
CN109167811B (en) * 2018-07-27 2020-05-05 阿里巴巴集团控股有限公司 Cross-chain data access method and device based on block chain
US10878052B2 (en) 2018-07-27 2020-12-29 Advanced New Technologies Co., Ltd. Blockchain-based cross-chain data operation method and apparatus
CN108921559A (en) * 2018-07-27 2018-11-30 杭州复杂美科技有限公司 Across chain transaction method of calibration, equipment and storage medium
CN108921559B (en) * 2018-07-27 2022-03-04 杭州复杂美科技有限公司 Cross-chain transaction verification method, device and storage medium
TWI705351B (en) * 2018-07-27 2020-09-21 香港商阿里巴巴集團服務有限公司 A blockchain-based cross-chain data access method and device
US10877930B2 (en) 2018-07-27 2020-12-29 Advanced New Technologies Co., Ltd. Blockchain-based cross-chain data access method and apparatus
CN109167811A (en) * 2018-07-27 2019-01-08 阿里巴巴集团控股有限公司 A kind of across chain data access method and device based on block chain
CN109145205A (en) * 2018-07-27 2019-01-04 阿里巴巴集团控股有限公司 A kind of across chain data manipulation method and device based on block chain
CN109102284B (en) * 2018-07-30 2021-07-27 黄芸芸 Optimization method of block chain tamper-proof technology
CN109102284A (en) * 2018-07-30 2018-12-28 黄芸芸 A kind of optimization method of block chain tamper-resistance techniques
CN109242512A (en) * 2018-08-24 2019-01-18 维沃移动通信有限公司 A kind of part true and false information processing method, device and equipment based on block chain
CN108989052B (en) * 2018-08-28 2021-04-13 中国联合网络通信集团有限公司 Transaction request processing method and system
CN108989052A (en) * 2018-08-28 2018-12-11 中国联合网络通信集团有限公司 transaction request processing method and system
CN110868438A (en) * 2018-08-28 2020-03-06 傲为信息技术(江苏)有限公司 Block chain network system
WO2020042937A1 (en) * 2018-08-28 2020-03-05 白杰 Maintenance method for blockchain parachain, and blockchain parachain
CN110868438B (en) * 2018-08-28 2022-01-07 傲为信息技术(江苏)有限公司 Block chain network system
WO2020043046A1 (en) * 2018-08-30 2020-03-05 杭州复杂美科技有限公司 Parallel chain cross-chain transaction method, device and storage medium
WO2020043047A1 (en) * 2018-08-30 2020-03-05 杭州复杂美科技有限公司 Method and device for reaching consensus in parachain, and storage medium
CN109410045A (en) * 2018-08-30 2019-03-01 杭州复杂美科技有限公司 A kind of parallel chain common recognition method, equipment and storage medium
CN109242456A (en) * 2018-09-04 2019-01-18 湖南宸瀚信息科技有限责任公司 Across the chain method of commerce of block chain, system and storage medium
CN109218303A (en) * 2018-09-10 2019-01-15 浙江天脉领域科技有限公司 A kind of novel across chain method of block chain of homologous isomery link network fusion
CN109218303B (en) * 2018-09-10 2020-12-11 浙江天脉领域科技有限公司 Novel block chain cross-chain method for homologous and heterogeneous chain network fusion
CN109213767A (en) * 2018-09-19 2019-01-15 挖财网络技术有限公司 A kind of account data management method suitable for block chain
CN109213767B (en) * 2018-09-19 2020-07-21 挖财网络技术有限公司 Account data management method suitable for block chain
CN109360096A (en) * 2018-09-27 2019-02-19 中国联合网络通信集团有限公司 A kind of bookkeeping methods and system of the privately owned chain based on publicly-owned chain
CN112968883A (en) * 2018-09-27 2021-06-15 福建福链科技有限公司 Block chain heterogeneous consensus method with high safety and terminal
CN112968883B (en) * 2018-09-27 2023-04-07 福建福链科技有限公司 Block chain heterogeneous consensus method with high safety and terminal
EP3857850A4 (en) * 2018-09-28 2022-06-29 Thunder Token Inc. High throughput blockchain consensus systems and methods with low finalization time
CN109377225A (en) * 2018-10-30 2019-02-22 杭州复杂美科技有限公司 Transaction allocation method, common recognition method, equipment and storage medium
CN109409889B (en) * 2018-11-13 2021-11-12 杭州秘猿科技有限公司 Block determining method and device in block chain and electronic equipment
CN109409889A (en) * 2018-11-13 2019-03-01 杭州秘猿科技有限公司 A kind of block in block chain determines method, apparatus and electronic equipment
US11252165B2 (en) * 2018-11-16 2022-02-15 Advanced New Technologies Co., Ltd. Cross-chain data trusted management methods and apparatuses
CN109493027A (en) * 2018-11-19 2019-03-19 众安信息技术服务有限公司 A kind of method and device realized across chain transactional operation
CN109558454B (en) * 2018-11-28 2020-07-10 杭州复杂美科技有限公司 Parallel chain mining consensus method, apparatus and storage medium
CN109558454A (en) * 2018-11-28 2019-04-02 杭州复杂美科技有限公司 Parallel chain digs mine common recognition method, equipment and storage medium
CN109711842B (en) * 2018-12-29 2021-04-09 西安纸贵互联网科技有限公司 Account book accounting method of block chain network with regularly converged parallel chains
CN109711842A (en) * 2018-12-29 2019-05-03 莆田市烛火信息技术有限公司 A kind of account book bookkeeping methods for the block chain network that parallel chain periodically converges
CN109711844A (en) * 2018-12-31 2019-05-03 莆田市烛火信息技术有限公司 A kind of parallel chain management method of block chain network
CN111489256B (en) * 2019-01-25 2023-06-23 京东科技控股股份有限公司 Cross-chain processing method, device and system for multi-chain block chain system
CN111489256A (en) * 2019-01-25 2020-08-04 京东数字科技控股有限公司 Cross-chain processing method, equipment and system for multi-chain block chain system
CN109831514B (en) * 2019-03-02 2020-06-09 杭州复杂美科技有限公司 Parallel chain consensus method, data exception handling method, device and storage medium
CN109831514A (en) * 2019-03-02 2019-05-31 杭州复杂美科技有限公司 Parallel chain common recognition method, data exception processing method, equipment and storage medium
CN109934592A (en) * 2019-03-22 2019-06-25 深圳市网心科技有限公司 A kind of across the chain communication means of block chain, system, electronic equipment and storage medium
CN110147685B (en) * 2019-04-04 2020-10-23 创新先进技术有限公司 Data verification method, system, device and equipment
CN110162523A (en) * 2019-04-04 2019-08-23 阿里巴巴集团控股有限公司 Date storage method, system, device and equipment
US11055277B2 (en) 2019-04-04 2021-07-06 Advanced New Technologies Co., Ltd. Integrity verification method, apparatus, and system and device for data in a blockchain-type ledger
US20200213089A1 (en) 2019-04-04 2020-07-02 Alibaba Group Holding Limited Data storage method, apparatus, system and device
US10917231B2 (en) 2019-04-04 2021-02-09 Advanced New Technologies Co., Ltd. Data storage method, apparatus, system and device
CN110162523B (en) * 2019-04-04 2020-09-01 阿里巴巴集团控股有限公司 Data storage method, system, device and equipment
CN110147685A (en) * 2019-04-04 2019-08-20 阿里巴巴集团控股有限公司 Data verification method, system, device and equipment
CN113348656A (en) * 2019-04-29 2021-09-03 互达控股有限公司 Network transaction verification method based on multiple nodes, system and storage medium thereof
CN110084601A (en) * 2019-04-30 2019-08-02 杭州复杂美科技有限公司 Parallel chain main chain stateful transaction synchronous method, equipment and storage medium
CN110084601B (en) * 2019-04-30 2021-03-16 杭州复杂美科技有限公司 Parallel chain main chain transaction state synchronization method, equipment and storage medium
CN110188563A (en) * 2019-06-02 2019-08-30 四川虹微技术有限公司 A kind of trust data update method and device
CN110288345A (en) * 2019-06-26 2019-09-27 深圳市网心科技有限公司 Across chain communication means, device, main chain node and storage medium
CN110288345B (en) * 2019-06-26 2022-04-05 深圳市迅雷网络技术有限公司 Cross-link communication method, device, main chain node and storage medium
CN110490562A (en) * 2019-07-10 2019-11-22 布比(北京)网络技术有限公司 A kind of across the chain data processing method and system of multi-tiling chain
WO2021018048A1 (en) * 2019-07-26 2021-02-04 华为技术有限公司 Cross-chain transaction method and apparatus
US11966378B2 (en) 2019-07-26 2024-04-23 Huawei Technologies Co., Ltd. Cross-chain transaction method and apparatus
CN110473093A (en) * 2019-07-29 2019-11-19 杭州复杂美科技有限公司 Parallel chain assets transfer method, equipment and storage medium
CN112348672A (en) * 2019-08-07 2021-02-09 阿里巴巴集团控股有限公司 Cross-chain transaction method and device, multi-block chain system and computing equipment
CN112348672B (en) * 2019-08-07 2023-08-08 淘宝(中国)软件有限公司 Cross-chain transaction method and device, multi-block chain system and computing equipment
CN110597907A (en) * 2019-09-10 2019-12-20 腾讯科技(深圳)有限公司 Cross-block-chain data information synchronization method, device, equipment and medium
CN110597907B (en) * 2019-09-10 2021-10-29 腾讯科技(深圳)有限公司 Cross-block-chain data information synchronization method, device, equipment and medium
CN112633868B (en) * 2019-10-08 2023-04-14 橙载(上海)信息技术有限公司 Cross-chain asset transfer method based on intelligent contract implementation
CN112633868A (en) * 2019-10-08 2021-04-09 橙载(上海)信息技术有限公司 Cross-chain asset transfer method based on intelligent contract implementation
CN110766410A (en) * 2019-10-24 2020-02-07 杭州趣链科技有限公司 Method and equipment for constructing and verifying credible cross-chain event based on Mercker tree
CN110766410B (en) * 2019-10-24 2023-09-22 杭州趣链科技有限公司 Trusted cross-chain event construction and verification method and device based on Merker tree
CN111008827A (en) * 2019-11-25 2020-04-14 深圳前海微众银行股份有限公司 Cross-chain transaction signature method and device
CN111008827B (en) * 2019-11-25 2023-07-21 深圳前海微众银行股份有限公司 Cross-chain transaction signature method and device
CN111275437A (en) * 2020-01-12 2020-06-12 杭州复杂美科技有限公司 Parallel chain consensus method, device and storage medium
CN111275437B (en) * 2020-01-12 2023-05-30 杭州复杂美科技有限公司 Parallel chain consensus method, apparatus and storage medium
WO2021139533A1 (en) * 2020-01-12 2021-07-15 江苏复杂美科技有限公司 Method for sending consensus transaction, and device and storage medium
CN111314438A (en) * 2020-01-20 2020-06-19 厦门顺势共识信息科技有限公司 Credible block chain system based on role distribution and cross-chain consensus method
CN111475572B (en) * 2020-04-02 2023-08-29 百度国际科技(深圳)有限公司 Block generation method, device, equipment and medium
CN111475572A (en) * 2020-04-02 2020-07-31 百度国际科技(深圳)有限公司 Block generation method, device, equipment and medium
JP7026836B2 (en) 2020-04-07 2022-02-28 バイドゥ インターナショナル テクノロジー (シンセン) カンパニー リミテッド Transaction processing methods, devices, equipment, systems and media for multi-chain systems
CN111488202B (en) * 2020-04-07 2023-08-15 百度国际科技(深圳)有限公司 Transaction processing method, device, equipment, system and medium of multi-chain system
US11588618B2 (en) * 2020-04-07 2023-02-21 Baidu International Technology (Shenzhen) Co., Ltd. Transaction processing method, apparatus, device and system for multi-chain system
KR102542248B1 (en) * 2020-04-07 2023-06-12 바이두 인터내셔널 테크놀로지 (센젠) 코., 엘티디. Transaction processing method, apparatus, device and system for multi-chain system, and medium
EP3893141A1 (en) * 2020-04-07 2021-10-13 Baidu International Technology (Shenzhen) Co., Ltd Transaction processing method, apparatus, device and system for multi-chain system
KR20210046605A (en) * 2020-04-07 2021-04-28 바이두 인터내셔널 테크놀로지 (센젠) 코., 엘티디. Transaction processing method, apparatus, device and system for multi-chain system, and medium
CN111488202A (en) * 2020-04-07 2020-08-04 百度国际科技(深圳)有限公司 Transaction processing method, device, equipment, system and medium for multi-chain system
US20210314138A1 (en) * 2020-04-07 2021-10-07 Baidu International Technology (Shenzhen) Co., Ltd. Transaction processing method, apparatus, device and system for multi-chain system
JP2021108464A (en) * 2020-04-07 2021-07-29 バイドゥ インターナショナル テクノロジー (シンセン) カンパニー リミテッド Transaction processing method, apparatus, equipment and system for multi-chain system, and media
CN111556120B (en) * 2020-04-23 2023-04-07 财付通支付科技有限公司 Data processing method and device based on block chain, storage medium and equipment
CN111556120A (en) * 2020-04-23 2020-08-18 财付通支付科技有限公司 Data processing method and device based on block chain, storage medium and equipment
CN111683120A (en) * 2020-05-22 2020-09-18 哈尔滨工程大学 Alliance node storage method supporting dynamic change of verification node
CN111798239B (en) * 2020-07-03 2023-05-30 杭州复杂美科技有限公司 Parallel chain consensus method, apparatus and storage medium
CN111798238A (en) * 2020-07-03 2020-10-20 杭州复杂美科技有限公司 Parallel chain consensus method, device and storage medium
CN111798238B (en) * 2020-07-03 2023-11-24 杭州复杂美科技有限公司 Parallel chain consensus method, apparatus and storage medium
CN111798239A (en) * 2020-07-03 2020-10-20 杭州复杂美科技有限公司 Parallel chain consensus method, device and storage medium
WO2022068410A1 (en) * 2020-09-30 2022-04-07 杭州复杂美科技有限公司 Parachain supervision consensus method, device, and storage medium
CN112039926B (en) * 2020-11-04 2021-03-26 南京金宁汇科技有限公司 Method for realizing double-layer chain type architecture of block chain
CN112039926A (en) * 2020-11-04 2020-12-04 南京金宁汇科技有限公司 Method for realizing double-layer chain type architecture of block chain
CN112598418A (en) * 2020-12-09 2021-04-02 杭州复杂美科技有限公司 Parallel chain supervision consensus method, equipment and storage medium
CN112598418B (en) * 2020-12-09 2023-11-28 杭州复杂美科技有限公司 Parallel chain supervision consensus method, device and storage medium
CN112948495A (en) * 2021-03-05 2021-06-11 杭州复杂美科技有限公司 Parallel chain constant block output method, computer device and storage medium
CN112948495B (en) * 2021-03-05 2022-05-24 杭州复杂美科技有限公司 Parallel chain constant block output method, computer device and storage medium
CN113098694A (en) * 2021-04-09 2021-07-09 杭州链网科技有限公司 Hybrid cross-chain consensus method
CN113098694B (en) * 2021-04-09 2023-12-08 杭州链网科技有限公司 Mixed cross-chain consensus method
CN114465830B (en) * 2022-04-14 2022-06-24 北京理工大学 Cross-link data encryption method, device, equipment and storage medium
CN114465830A (en) * 2022-04-14 2022-05-10 北京理工大学 Cross-chain data encryption method, device, equipment and storage medium
CN114862397A (en) * 2022-07-06 2022-08-05 国网天津市电力公司培训中心 Double-decoupling block chain distributed method based on double-chain structure
CN114862397B (en) * 2022-07-06 2022-09-30 国网天津市电力公司培训中心 Double-decoupling block chain distributed method based on double-chain structure
WO2024066010A1 (en) * 2022-09-30 2024-04-04 蚂蚁区块链科技(上海)有限公司 Method and apparatus for transaction processing in blockchain system, and blockchain system
CN117592990B (en) * 2024-01-04 2024-04-26 恒生电子股份有限公司 Block chain transaction authentication method and device, computing equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107909369A (en) Based on the common recognition method, apparatus merchandised across chain and storage medium
CN107888562A (en) Interconnect serobila architecture
CN107862216A (en) Method for secret protection, device and the storage medium merchandised for anonymity across chain
Sun et al. Voting-based decentralized consensus design for improving the efficiency and security of consortium blockchain
CN110417558A (en) Verification method and device, the storage medium and electronic device of signature
CN110061889A (en) Block chain performance test methods, device, equipment and storage medium
CN110599178A (en) Data processing method and device based on intelligent contract and storage medium
CN110602217B (en) Block chain-based alliance management method, device, equipment and storage medium
CN108959621A (en) A kind of implementation method, device, equipment and the storage medium of block chain network
CN110704531B (en) Block chain-based electricity consumption client credit management method and system
CN108769230A (en) Transaction data storage method, device, server and storage medium
CN108347483B (en) Decentralized computing system based on double-layer network
CN111291060A (en) Method, device and computer readable medium for managing block chain nodes
CN107679149A (en) A kind of data processing method and server
CN108228363A (en) A kind of message method and device
WO2020065242A1 (en) Method and system for transaction processing in decentralized network by network nodes in collaborative decision-making
CN110177124A (en) Identity identifying method and relevant device based on block chain
CN109729068A (en) Security breaches auditing system based on block chain technology
CN111858751A (en) Data storage method and device based on block chain
CN109104419A (en) A kind of generation method and system of block chain account
CN110599145A (en) Data processing method and device based on intelligent contract and storage medium
CN108833133A (en) Network configuration management method, apparatus and storage medium based on system for cloud computing
CN106874371A (en) A kind of data processing method and device
CN113645278A (en) Cross-chain message transmission method, device and storage medium of block chain
CN106209751A (en) Service-oriented interface authentication method based on the operating system certificate of authority

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20180413

RJ01 Rejection of invention patent application after publication