CN108416578A - A kind of block catenary system and data processing method - Google Patents
A kind of block catenary system and data processing method Download PDFInfo
- Publication number
- CN108416578A CN108416578A CN201810210284.5A CN201810210284A CN108416578A CN 108416578 A CN108416578 A CN 108416578A CN 201810210284 A CN201810210284 A CN 201810210284A CN 108416578 A CN108416578 A CN 108416578A
- Authority
- CN
- China
- Prior art keywords
- data
- user terminal
- chain
- transaction
- management end
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
This application discloses a kind of block catenary system and data processing methods;Above-mentioned block catenary system, includes at least:Management end and to external system;Wherein, the alliance's chain or privately owned chain of management end use the identical account book data of logic with to external system.The application is capable of providing the block catenary system endorsed with management end, so that it is guaranteed that user's assets security and data personal secrets.
Description
Technical field
This application involves but be not limited to microcomputer data processing field more particularly to a kind of block catenary system and data
Processing method.
Background technology
Block chain technology is also referred to as distributed account book technology, is a kind of distributed data base technique of decentralization,
Feature be decentralization, it is open and clear, can not distort, trusted.
However, current block catenary system, lacks manager and participates in control and management, the distribution of token lacks the related back of the body
Book lacks perfect supervision and secret protection, causes safety insufficient.
Invention content
It is the general introduction of the theme to being described in detail herein below.This general introduction is not to limit the protection model of claim
It encloses.
The embodiment of the present application provides a kind of block catenary system and data processing method, is capable of providing and endorses with management end
Block catenary system, so that it is guaranteed that user's assets security and data personal secrets.
In a first aspect, the embodiment of the present application provides a kind of block catenary system, include at least:Management end, to external system;Its
In, the alliance's chain or privately owned chain of the management end use the identical account book data of logic with described to external system.
In the exemplary embodiment, described may include external publicly-owned chain or alliance's chain to external system.
In the exemplary embodiment, each block data on external system can be by the alliance of the management end
Multiple block datas of chain or privately owned chain sequence forms.
In the exemplary embodiment, the shape of any account got on alliance's chain of the management end or privately owned chain
State can be consistent in the state to the account got on external system.
In the exemplary embodiment, above-mentioned block catenary system can also include:User terminal is suitable for through transaction ID,
Relevant transaction data is retrieved in the account book data.
In the exemplary embodiment, the wallet of the user terminal may be adapted to verify the alliance in the management end automatically
The state of the account got on chain or privately owned chain with the state to the account got on external system whether one
It causes.
In the exemplary embodiment, the transaction ID may include sending mark and receiving mark, and the transmission is marked
Knowing can determine that the reception mark can be by described by the nonce values and encryption key of user terminal last time transmission transaction
User terminal last time receives the nonce values of transaction and encryption key determines;Wherein, the encryption key of the user terminal is by the management
End is issued, and the nonce values of transaction are a random numbers.
In the exemplary embodiment, the transaction data of the user terminal, which can form a transmission chain and one, brother
The reception chain of younger brother's node.
In the exemplary embodiment, the management end may be adapted in the transaction data for receiving the user terminal submission
And after being verified, endorsement signature is added to the transaction data, and update State Tree.
In the exemplary embodiment, the user terminal can be adapted in the block catenary system establish trustship conjunction
About, and by Contract ID, described to retrieving relevant contract data on external system.
In the exemplary embodiment, above-mentioned block catenary system can also include at least one of:
End is supervised, is suitable for supervising the endorsement token of the management end distribution, and under the mandate of the management end, prison
Manage the transaction data and account information;
Third party is suitable under the mandate of the user terminal, checks the transaction data and account information.
In the exemplary embodiment, at least two blocks catenary system by the management end establish cryptochannel into
Row stream compression, wherein the token total amounts in the either block catenary system remain unchanged.
Second aspect, the embodiment of the present application provide a kind of data processing method, are applied to block catenary system, the block chain
System includes at least user terminal and management end;Alternatively, the block catenary system includes at least user terminal, management end and is externally
System, wherein the alliance's chain or privately owned chain of the management end use the identical account book data of logic with described to external system;The side
Method includes:
The encryption key that the user terminal is issued according to the nonce values and the management end of last transaction determines transaction
Mark;
The user terminal retrieves relevant transaction data by the transaction ID in the account book data.
In the exemplary embodiment, the transaction ID may include sending mark and receiving mark, and the transmission is marked
The nonce values of transaction can be sent and the encryption key be determined by the user terminal last time by knowing, and the reception identifies can be by
The user terminal last time receives the nonce values of transaction and the encryption key determines;Wherein, the nonce values are random data.
In the exemplary embodiment, the transaction data of the user terminal, which can form a transmission chain and one, brother
The reception chain of younger brother's node.
In the exemplary embodiment, the above method can also include:The user terminal is built in the block catenary system
Vertical trustship contract, and by Contract ID, described to retrieving relevant contract data on external system.
In addition, the embodiment of the present application also provides a kind of computer-readable medium, it is stored with data processor, at the data
The step of reason program realizes above-mentioned data processing method when being executed by processor.
In the embodiment of the present application, block catenary system includes at least management end and to external system, wherein the alliance of management end
Chain or privately owned chain use the identical account book data of logic with to external system.The connection that the embodiment of the present application passes through combined use management end
Alliance's chain or privately owned chain and to external system, realizing has the block catenary system of management end endorsement, so that it is guaranteed that user's assets security and
Data-privacy safety.
After reading and understanding attached drawing and detailed description, it can be appreciated that other aspects.
Description of the drawings
Fig. 1 is a kind of schematic diagram of block catenary system provided by the embodiments of the present application;
Fig. 2 is the exemplary plot of block catenary system provided by the embodiments of the present application;
Interchain circulation schematic diagrames of the Fig. 3 between two block catenary systems provided by the embodiments of the present application;
Fig. 4 is the interaction schematic diagram of two block catenary systems provided by the embodiments of the present application;
Fig. 5 is the flow chart of data processing method provided by the embodiments of the present application.
Specific implementation mode
The embodiment of the present application is described in detail below in conjunction with attached drawing, it should be understood that embodiments described below is only
For instruction and explanation of the application, it is not used to limit the application.
It should be noted that if do not conflicted, each feature in the embodiment of the present application and embodiment can be tied mutually
It closes, within the protection domain of the application.In addition, though logical order is shown in flow charts, but in certain situations
Under, it can be with the steps shown or described are performed in an order that is different from the one herein.
Below first to this application involves concept illustrate.
Token refers to the token on block chain, also referred to as logical card, but all related to assets class.
Publicly-owned chain refers to the block chain that anyone can read confirmation, participate in common recognition, meets complete decentralization.The application
In, the block data on publicly-owned chain is composed of alliance's chain of management end or the data of privately owned chain, the block head number of publicly-owned chain
According to the quantity of the data block with the management end for including in each data block by there is publicly-owned chain to determine, and the data on publicly-owned chain are
Irreversible, anyone cannot change.
Privately owned chain refers to write-in permission and organizes data-link in hand at one.In the application, the transaction data of user terminal submission
The authentication signature for only including user terminal could be in the alliance of management end after needing management end to be verified and providing endorsement signature
Chain or the enterprising row write of privately owned chain enter.
Alliance's chain refers to data-link of the write-in permission in multiple tissue hands.
EID (electronic Identity) is Ministry of Public Security citizen network identity identifying system, is studied by Ministry of Public Security's third
It is built, there is believable real-name authentication mode.
The embodiment of the present application provides a kind of block catenary system, includes at least:Management end, to external system;Wherein, management end
Alliance's chain or privately owned chain use the identical account book data of logic with to external system.
Wherein, may include to external system:External publicly-owned chain or alliance's chain.
In present embodiment, to each block data on external system (for example, external publicly-owned chain) by the connection of management end
Multiple block datas of alliance's chain or privately owned chain sequence forms.Illustratively, the pipe for including in each block data on publicly-owned chain
The quantity and block head data for managing the block data at end are determined by publicly-owned chain.However, the application does not limit this.
In the exemplary embodiment, the data that publicly-owned chain on journal management end is submitted, and what management end was submitted
Data are alliance's chain of management end or the block data that privately owned chain generates, therefore, alliance's chain or privately owned of publicly-owned chain and management end
The account book data that chain uses are logically same.Block catenary system provided in this embodiment can be regarded as a duplex
System (includes following two layers:The alliance's chain or privately owned chain of management end, to external system).However, the application does not limit this.
In practice, block catenary system provided in this embodiment can be extended to multilayer system, for example, carrying out system in management end
Extension.
In the present embodiment, in alliance's chain of management end or privately owned chain and on external system (for example, external publicly-owned chain)
The state of the account got using different modes is consistent.Illustratively, management end can generate State Tree, to obtain
The state of any account;On publicly-owned chain, the state of any account can be known by adding up transaction results;Pass through accumulative transaction
As a result the state of the account obtained in the state and management end of the account known is consistent.In this way, can be with by publicly-owned chain
Realize the unalterable feature of the transaction data of account.Wherein, the wallet of user terminal can verify alliance's chain in management end automatically
Or the state of the account got on privately owned chain and account for being got on to external system (for example, external publicly-owned chain)
Whether state is consistent.
In the present embodiment, the data that user terminal is submitted need to pass through management end endorsement signature, and all readings are all with external
Data in system are criterion, to realize the block catenary system with management end endorsement.Wherein, management end is suitable for management block
Catenary system adjusts the token total amounts issued in block catenary system, and meets trade management, system of real name, effectively supervision, number of users
The features such as according to secret protection, and by combining the use to external system, make that the data trusted on external system can not be changed.
In block catenary system provided in this embodiment, the authentication signature of existing user terminal, and there is the endorsement of management end to sign,
Also the common recognition of external system is confirmed, so being irreversible to the data on external system, anyone cannot change.In this way, both
It ensures user's assets security and data-privacy, and can guarantee the token on chain and transaction with endorsement.
Below for including external publicly-owned chain to external system, block catenary system provided by the embodiments of the present application is carried out
Explanation.
Fig. 1 and Fig. 2 is the schematic diagram of block catenary system provided by the embodiments of the present application.As shown in Figure 1, the present embodiment provides
Block catenary system, including:Management end 101, external publicly-owned chain 102 and user terminal 103.Wherein, the alliance of management end 101
Chain or privately owned chain and publicly-owned chain 102 use the identical account book data of logic 100.
In the present embodiment, management end, user terminal can be respectively the system for including one or more communication equipments.User
The number at end can be respectively multiple.However, the application does not limit this.
In the present embodiment, each block data on external publicly-owned chain by management end alliance's chain or privately owned chain it is more
A block data sequence forms.I.e. the alliance's chain or privately owned chain of management end and the bottom account book data of publicly-owned chain are logically same
The sequence of one account book data, account book is also associated successively.In this way, management end can check the data of itself by publicly-owned chain
State, and alliance's chain of complete management end or the data of privately owned chain can be recovered by publicly-owned chain.Wherein, the alliance of management end
Chain or privately owned chain are different from the common recognition algorithm that publicly-owned chain uses, so the time for respectively generating block data also differs;Management
Alliance's chain at end or privately owned chain use common recognition time shorter algorithm, to meet quickly confirmation and high frequency transactions demand, and it is publicly-owned
The common recognition time of chain is longer, therefore publicly-owned chain is an asynchronous process with respect to alliance's chain of management end or privately owned chain.Publicly-owned chain
On the quantity of block data that generates of each block data management end for including also be not fixed, for example, in Fig. 1, publicly-owned chain
On a block data may include management end generate three or four block datas;Therefore the connection of management end is not interfered with
The generation of alliance's chain or privately owned chain, to meet the high concurrent demand of management end.
In the present embodiment, the data for the alliance's chain or privately owned chain that management end generates all can be announced externally, asynchronous life
Outer publicly-owned chain in pairs.The data block of publicly-owned chain is multiple continuous data block combinations of the alliance's chain or privately owned chain by management end
Made of, the block head data of publicly-owned chain are only added, due to the accounting very little of block head data, so the data volume newly increased
Very little.Moreover, the data block that publicly-owned chain uses all is alliance's chain by management end or the block data after privately owned chain is packaged, because
This is also beneficial to the data exchange of publicly-owned chain.
In the present embodiment, alliance's chain of management end or the data on privately owned chain are divided into control data and transaction data two
Point.Control data are mainly the set for the information data that management end is issued for managing and controlling block catenary system, can be wrapped
Include the registration and unregistration of user, mechanism, the distribution of token, the fresh informations such as trading rules and key, certificate.Except the body of user
Part information is outside ciphertext, remaining most of data is all that in plain text, easily and effectively to supervise, can also protect the privacy of identities of user.
Transaction data is the set of all single transaction;Trading rules are issued by management end in controlling data, may include that transaction is double
Identity mark, number of deals, nonce values, timestamp, transaction ID (ID) and the additional information etc. of side, can also include user terminal
Authentication signature and management end endorsement signature;Wherein, it per transaction is required for that endorsement is verified and provided by management end
It can just come into force after signature, to achieve the purpose that management end is managed transaction.Wherein, the nonce values of transaction are one random
Numerical value;In addition to timestamp, transaction id and signature value are in plain text, remainder data is all ciphertext, and the authentication signature of user terminal is pair
The signature that the plaintext of the identity of both parties and the plaintext of nonce values and other ciphertext data carry out, and the back of the body of management end
Bookmark name is the signature for the entire transaction data submitted to user terminal, so can be signed with the endorsement at verification management end to outside,
But it is not able to verify that the authentication signature of user terminal, and can prevent violence from attempting the identity of both parties, protects both parties' body
Part privacy.
In the present embodiment, the alliance's chain or privately owned chain of management end can generate the State Tree of whole system, to obtain
The state of each account;And due to the privacy sharing sub-key of not no management end on publicly-owned chain, so whole system cannot be generated
Status data, but the bottom of the alliance's chain or privately owned chain due to management end and publicly-owned chain is used with a account book data, because
This, can obtain and accumulation account remaining sum on publicly-owned chain, more than the account in the State Tree of obtained account balance and management end
The state of volume is consistent.
In other words, for same a account book data, the occupation mode for management end and user terminal is different, management
End can generate the State Tree of system, and to learn the state of each account, and user terminal can learn the detailed of the every transaction of oneself
It counts evidence accurately, is consistent by adding up the account status that transaction results obtain and the state that management end obtains, also just by publicly-owned
Chain realizes the unalterable feature of customer transaction data, and management end can not forge the authentication signature of user terminal and change is handed over
Easy data, so that it is guaranteed that user's assets security.
In the present embodiment, the key of user terminal can be divided into two class of signature key and encryption key.Wherein, signature key
Locally generated by user terminal and management use, using can not derived hardware as carrier, to ensure that the safety of key makes
With.Signature key issues the authentication certificate of user terminal by CA (Certificate Authority, Certificate Authority) mechanism
Or eID mechanism is used, realize the real name authentication of user terminal.Encryption key is that user terminal passes through authentication certificate or eID
It after management end registration, is issued by management end, and is stored and used by the local wallet of user terminal.
Illustratively, encryption key may include the tagged keys of additive homomorphism, privacy sharing sub-key and symmetric cryptography
Key.For example, the identity information of user can use symmetric cryptographic key, storage is encrypted using symmetric encipherment algorithm;It hands over
The data such as the identity of easy both sides can use privacy sharing algorithm, and storage is encrypted using privacy sharing sub-key;It hands over
Easy number can use additive homomorphism algorithm, and storage is encrypted using the tagged keys of additive homomorphism.Wherein, symmetric cryptography refers to
It is encrypted and decrypted using same key using the both sides of this Encryption Algorithm.Privacy sharing refers to classified information with appropriate
Mode is split as N parts, and only M parts of cooperation could Restore Secret message.It, can after additive homomorphism encryption refers to message by public key encryption
The operation of addition is carried out in ciphertext, operation output is decrypted using private key, and result is original with use addition process unencryption
The result that data obtain is consistent.
In the present embodiment, the data on publicly-owned chain are externally able to validate only the complete of the data block that alliance's chain or privately owned chain are packaged
The endorsement signature of the management end of whole property and verification per transaction, and can check the cleartext information that management end is issued in controlling data
With the transaction id and timestamp information in transaction data, other information is all externally kept secure.
In the present embodiment, user terminal may be adapted to, by transaction id, relevant transaction data be retrieved in account book data.
I.e. user terminal can be by transaction id, in the upper relevant transaction data of retrieval of at least one of management end and external publicly-owned chain.
Wherein, the wallet of user terminal is the wallet of a lightweight, does not need to complete publicly-owned chain data;The wallet of user terminal can be with
From publicly-owned chain decryption check oneself account information and with oneself relevant transaction data, such as the body including both parties
Part mark, the number of deals of oneself, and it is able to verify that the authentication signature of transaction data and endorsement are signed.Moreover, the wallet of user terminal
The balance amount information added up after all and oneself relevant transaction data decryption, with the account balance ciphertext inquired from management end
Information after decryption is consistent.
The mode for retrieving relevant transaction data from publicly-owned chain to user terminal below illustrates.
Since transaction data is associated with sender and recipients, transaction id, which can be divided into, sends ID and reception ID two
Part.Wherein, list can be passed through by the nonce values of user terminal last time transmission transaction and the symmetric cryptographic key of user terminal by sending ID
To can not inverse function generate, send ID be unique in systems;Receive ID by user terminal last time receive transaction nonce values and
The symmetric cryptographic key of user terminal by unidirectionally can not inverse function generate, the reception ID at different user end is unique in systems
, but because there are concurrent transactions, therefore there are the same user terminals for different transaction reception ID having the same.
Wherein, user terminal generates a random nonce value and initial reception when being registered to management end by management end
ID, and storage is encrypted using the symmetric cryptographic key of user terminal, and recorded in the State Tree of management end.Transaction when by
In State Tree the symmetric cryptographic key of the nonce values of sender and user terminal by unidirectionally can not inverse function generate send ID, even
Reception ID with recipient in State Tree forms transaction id.Nonce values are generated at random by management end, and are ensured calculated next
A transmission ID and reception ID is unique in systems.Management end passes through the identity of nonce values and both parties secret
Close shared algorithm is encrypted, and is transferred to user terminal together with transaction id.After user terminal submits transaction data, management end can be with
Whether the transmission ID of verification user terminal meets, and verifies and receive whether ID belongs to recipient, then more according to the nonce values of transaction
The nonce values of sender in new state tree, and whether search the reception ID in transaction data identical as the reception ID in State Tree,
If identical, it is updated according to the calculated reception ID of nonce values.It can be seen that the transaction data of user terminal is according to hair
It send and receives and respectively constitute a chain, and due to concurrent transaction, there are the brothers of synchronization on reception chain
Node.In other words, the transaction data of user terminal forms a transmission chain and a reception chain for having the brotgher of node.
Wherein, the wallet of user terminal can by user identifier search account information, decryption registration when nonce values and just
Begin to receive ID, transmission ID next time can be calculated, inquiry sends ID and receives ID on publicly-owned chain respectively, and then gets
All transmission transaction related to user and reception transaction.Nonce values are it is known that also in the transaction data submitted due to user terminal
Next transmission ID is determined, whether the transmission ID that user terminal can be transferred to verification management end meets.And each send ID
It has confirmed that, also it is prevented that Replay Attack.By transaction id and nonce values, the transaction data of user terminal forms a transmission
Chain and a reception chain for having the brotgher of node, and user terminal can easily be retrieved by transaction id on publicly-owned chain
Transaction data, and outside can not be learnt.The wallet of user terminal can use poll or subscribing manner to be looked into from publicly-owned chain
Ask transaction id, preserve with the relevant All Activity data of user terminal, the account status of user terminal can be analyzed, so as to management end
Carry out inquiring and authenticating.
In the exemplary embodiment, user terminal can be adapted in block catenary system establish trustship contract, and pass through
Contract ID retrieves relevant contract data on to external system.
In the present embodiment, the common recognition reward on publicly-owned chain is that management end records the account information to be rewarded on publicly-owned chain,
After waiting for the block data of such as 6 publicly-owned chains to confirm, publication is rewarded into corresponding account in plain text in controlling data, and is tired out
It counts in account balance ciphertext.Common recognition reward on i.e. publicly-owned chain, meeting are issued in the data block below by management end, and
By knowing together reward to ensure the data of publicly-owned chain on journal management end submission, specific reward rule can be by management end
It makes by oneself.In this way, the balance amount information that the wallet of user terminal is inquired from publicly-owned chain, it is also necessary to add up the common recognition reward on publicly-owned chain,
Just it is consistent with the account balance state of management end.And reward of knowing together is by issuing in plain text, so can by user identifier
It is retrieved on publicly-owned chain.Token total amounts to ensure in system are certain, and management end can be when issuing token, reserved part
Token is not diverted into the account balance of issuer, as the common recognition reward on publicly-owned chain.
In the exemplary embodiment, as shown in Fig. 2, the block catenary system of the present embodiment can also include:Supervise end 104
And third party 105;Wherein, end 104 is supervised, is suitable for the endorsement token that regulatory management end 101 is issued, and in management end 101
Mandate under, supervise transaction data and account information;Third party 105, are suitable under the mandate of user terminal 103, supervision transaction
Data and account information.
In this example, for the behavior at effective regulatory management end, supervision end can provide automatic supervision and artificially participate in
Supervise two parts function.Automatic supervision can be on the alliance's chain or privately owned chain of management end, also can be on publicly-owned chain.Automatic supervision exists
The privacy sharing sub-key of management end can be obtained when startup, so corresponding system mode tree can be generated, be able to verify that every transaction
Authentication signature and endorsement sign, and according to every transaction using additive homomorphism algorithm modification State Tree in account balance it is close
Text does not leak relevant account balance information.In order to verify the validity of every transaction number, management end also needs to provide
One black box authentication module by audit, function are to input the account of the number ciphertext and mark and payer of both parties
Family remaining sum ciphertext decrypts number in black box authentication module and verifies whether to meet, returns to success or not.Automatically the mesh supervised
Be verify whether all numbers of deals meet, it is ensured that the total amount of token is certain in system.And the prison artificially participated in
A pipe part is the clear data issued in controlling data by regulatory management end, the main token for including management end distribution
Endorsement, for example need signature of the management end with the proof such as underlying assets mortgage or guarantee fund and with regulator that could issue
The token accordingly to endorse;Another part is the account information for needing certain user in supervisory systems, and management end can authorize accordingly
The encryption key of user terminal gives supervision end, supervision end that can decrypt and check the transaction data and account information of corresponding user.
In this example, third party need check user terminal account information when, user terminal can authorize encryption key to
Third party, so that third party checks on publicly-owned chain.
In the present embodiment, automatic supervision is able to verify that the validity of number of deals, it is ensured that the total amount of token is one in system
Fixed.The variation of token total amounts needs management end to issue or remove in plain text respective numbers in controlling data in system
Token increases or decreases corresponding number ciphertext in its account balance, reaches adjustment system by specified issuer
The purpose of middle token total amounts, and these information are all disclosed in plaintext.General transaction in chain needs the certification with user terminal
Signature can just come into force, and signature key be user terminal local management can not be derived, and be bundled with the authentication card of user terminal
Book uses eID mechanism, and user terminal can be verified on publicly-owned chain and the authentication signature of oneself relationship trading, so management end is not
The authentication signature and transaction data that change user terminal can be forged, so that it is guaranteed that user's assets security.In addition, there is pipe for multiple
The block catenary system of end endorsement is managed, user terminal registration need to only be used with a authentication certificate or eID, convenient for users
And update.
Referring to Fig. 3 and Fig. 4, the stream compression between multiple block catenary systems with management end endorsement is said
It is bright.Fig. 3 and Fig. 4 is respectively that the interchain circulation schematic diagram between two block catenary systems provided by the embodiments of the present application shows with interaction
It is intended to.It is illustrated so that two with the block catenary system of management end endorsement as an example in figs. 3 and 4.
In the exemplary embodiment, at least two block catenary systems establish cryptochannel by management end and carry out data flow
Turn, wherein the token total amounts in either block catenary system remain unchanged, and related contract data stores in respective system.
In this example, stream compression is by each system between multiple block catenary systems with management end endorsement
Cryptochannel realization is established between management end.As shown in Figure 3 and Figure 4, lead between block catenary system SA and block catenary system SB
It crosses respective management end and establishes cryptochannel.Wherein, important data are not stored on cryptochannel, only be used as data agreement and
The channel of contract is triggered, specific user's contract data all stores on each block catenary system, and therefore, user terminal can be right
Relevant contract data is inquired on the publicly-owned chain answered.Corresponding contract rule is issued by each management end in controlling data, and
By associating across chain and about ID, the contract data of stream compression between different system, the wallet of user terminal can be analyzed
The executive condition of related contract.
As shown in figure 4, when carrying out stream compression between multiple block catenary systems, need both parties in the system to be circulated
In registered.For example, user A is registered to the management end of block catenary system SA and SB, user B to block catenary system SA and
The management end of SB is registered.Since the user terminal of both parties is not aware that whom the other side of transaction is, so being held in the palm
Pipe contract is stated.Wherein, the trustship contract of statement may include the people of trustship, the number ciphertext of trustship, timestamp, nonce values,
The authentication signature etc. of about ID, additional information and user terminal can also use the rule of above-mentioned transaction id with about ID here, with
User terminal is facilitated to be retrieved on publicly-owned chain.After management end verifies the trustship contract of user terminal and signature of endorsing, contract just comes into force.
Management end in the account balance of user terminal from subtracting in corresponding number ciphertext to newly-built contract remaining sum.The contract of trustship is merchandised
The authentication signature of user terminal is then no longer needed, passes through between the management end of block catenary system and negotiates and trigger, generate relevant conjunction
It about merchandises and signature of endorsing.Each contract transaction will be closed comprising the trustship contract and about ID, user terminal by retrieving
About ID, so that it may to obtain all relationship tradings of this trustship contract, and recipient merchandised by contract in reception ID,
The transaction can be retrieved.If there is residue in contract remaining sum, user terminal can generate the operation of a releasing trustship contract, specify
Related trustship contract and about ID remove the remaining sum of contract and accumulative contract to account balance after management end endorsement signature
In, complete the releasing of trustship contract.
In this example, it merchandises with the contract carried out between the block catenary system of management end endorsement multiple, in contract
It needs to include in cryptochannel across chain and about ID.The wallet of user terminal passes through transaction id Rule above to user's correlation
Trustship contract, the associated contract transaction of all and trustship contract then can be retrieved on publicly-owned chain, is merchandised by contract
In across chain and about ID, so that it may on another publicly-owned chain of corresponding circulation retrieval comprising should be across the relevant contract of chain and about ID
Transaction.Decryption can check the contents such as relevant contract transaction content, including timestamp, number of deals, contract information, and can test
The endorsement signature of management end is demonstrate,proved, but can only check corresponding trustship and about ID, and cannot check the identity of trustship contract.With
The wallet at family end gets relevant trustship contract information and respectively after the circulation contract Transaction Information of two systems, so that it may with
The executive condition of the related contract of analysis.
In this example, between multiple block catenary systems endorsed with management end, the contract of both parties' user terminal
Transaction can't influence the variation of token total amounts in respective system, the mistake that only different user token circulates in both sides' system
Journey.And the validity of number of deals can be also verified by supervising automatically, it is ensured that the total amount of token is certain in system.And
Between multiple block catenary systems endorsed with management end, after management end mutually establishes relevant cryptochannel, so that it may with
Realize circulation of the user data between system, and the data to circulate all recorded on corresponding publicly-owned chain and can inquiring and authenticating,
It is also convenient for being supervised.
It follows that by establishing cryptochannel between management end between multiple block catenary systems endorsed with management end
Stream compression is carried out, significant data, the only channel as data agreement and triggering contract are not stored on cryptochannel, it is relevant
Contract transaction data all stores on the data-link of respective system, and user can inquire relevant transaction data on publicly-owned chain.And
And interchain stream compression can keep the constant of token total amounts in respective system, be also convenient for management end to issue token management and
Supervision.
Fig. 5 is the flow chart of data processing method provided by the embodiments of the present application.Data processing side provided in this embodiment
Method, is applied to block catenary system, and block catenary system includes at least user terminal and management end;Alternatively, block catenary system includes at least
User terminal, management end and to external system, wherein the alliance's chain or privately owned chain of management end are identical using logic with to external system
Account book data.
As shown in figure 5, data processing method provided in this embodiment includes:
The encryption key that S501, user terminal are issued according to the nonce values and management end of last transaction, determines trading standard
Know;
S502, user terminal retrieve relevant transaction data by transaction ID in account book data.
It is applied to the block catenary system including at least user terminal and management end in data processing method provided in this embodiment
When, user terminal can retrieve relevant transaction data by transaction ID in the account book data that management end uses.In this implementation
When the data processing method that example provides is applied to including at least user terminal, management end and to the block catenary system of external system, due to
The alliance's chain or privately owned chain of management end with to external system using the identical account book data of logic, then user terminal can execute with down toward
One item missing:By transaction ID, relevant transaction data is retrieved in management end;By transaction ID, examined on to external system
The relevant transaction data of rope.
Illustratively, transaction ID may include sending mark and receiving mark, sends mark and was sent by user terminal last time
The nonce values and encryption key of transaction determine, it is true by the nonce values and encryption key of user terminal last time reception transaction to receive mark
It is fixed;Wherein, nonce values are random number.
Illustratively, the transaction data of user terminal can form a transmission chain and a reception chain for having the brotgher of node
Item.Wherein, transaction data can be made to form a transmission chain and a reception chain for having the brotgher of node by transaction ID.
Illustratively, the method for the present embodiment can also include:User terminal establishes trustship contract in block catenary system, and
By Contract ID, relevant contract data is retrieved on to external system.
Related description about data processing method provided in this embodiment is referred to the description of above-mentioned block catenary system,
Therefore it is repeated no more in this.
In addition, the embodiment of the present application also provides a kind of data processing equipment, it is applied to user terminal, including:
Determining module determines trading standard suitable for the encryption key issued according to the nonce values and management end of last transaction
Know;
Module is retrieved, is suitable for, by transaction ID, relevant transaction data being retrieved in account book data.
Wherein, the alliance's chain or privately owned chain of management end are identical using logic as to external system (for example, external publicly-owned chain)
Account book data.
Related description about data processing equipment provided in this embodiment is referred to retouching for above-mentioned data processing method
It states, therefore is repeated no more in this.
In addition, the embodiment of the present application also provides a kind of communication equipment, including:Memory and processor, memory are suitable for depositing
Data processor is stored up, which realizes the data processing side that Fig. 5 corresponding embodiments provide when being executed by processor
The step of method.
Wherein, processor can include but is not limited to microprocessor (MCU, Microcontroller Unit) or programmable
The processing unit of logical device (FPGA, Field Programmable Gate Array) etc..Memory can be used for storing application
The software program and module of software, such as the corresponding program instruction of data processing method or module in the present embodiment, processor
It is stored in software program and module in memory by operation, to perform various functions application and data processing, i.e.,
Realize above-mentioned data processing method.Memory may include high speed random access memory, may also include nonvolatile memory, such as one
A or multiple magnetic storage devices, flash memory or other non-volatile solid state memories.In some instances, memory can
Include the memory remotely located relative to processor, these remote memories can be set by network connection to above-mentioned communication
It is standby.The example of above-mentioned network includes but not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.
Illustratively, above-mentioned communication equipment can also include communication unit;Communication unit can be received via a network
Or transmission data.In an example, communication unit can be radio frequency (RadioFrequency, referred to as RF) module,
For wirelessly being communicated with internet.
In addition, the embodiment of the present application also provides a kind of computer-readable medium, it is stored with data processor, at the data
The step of reason program realizes above-mentioned data processing method when being executed by processor.
It will appreciated by the skilled person that whole or certain steps in method disclosed hereinabove, system, dress
Function module or unit in setting may be implemented as software, firmware, hardware and its combination appropriate.In hardware embodiment
In, the division between the function module or unit that refer in the above description not necessarily corresponds to the division of physical assemblies;For example,
One physical assemblies can have multiple functions or a function or step that can be executed by several physical assemblies cooperations.Certain
A little components or all components may be implemented as by processor, such as the software that digital signal processor or microprocessor execute, or
Person is implemented as hardware, or is implemented as integrated circuit, such as application-specific integrated circuit.Such software can be distributed in computer
On readable medium, computer-readable medium may include computer storage media (or non-transitory medium) and communication media (or
Fugitive medium).As known to a person of ordinary skill in the art, term computer storage medium is included in for storing information
Implement in any method or technique of (such as computer-readable instruction, data structure, program module or other data) volatile
Property and non-volatile, removable and nonremovable medium.Computer storage media includes but not limited to RAM, ROM, EEPROM, sudden strain of a muscle
It deposits or other memory technologies, CD-ROM, digital versatile disc (DVD) or other optical disc storages, magnetic holder, tape, disk storage
Or other magnetic memory apparatus or any other Jie for can be used for storing desired information and being accessed by a computer
Matter.In addition, known to a person of ordinary skill in the art be, communication media generally comprises computer-readable instruction, data structure, journey
Other data in the modulated data signal of sequence module or such as carrier wave or other transmission mechanisms etc, and may include any
Information delivery media.
The advantages of basic principles and main features and the application of the application have been shown and described above.The application is not by upper
The limitation for stating embodiment, the above embodiments and description only describe the principles of the application, are not departing from the application
Under the premise of spirit and scope, the application will also have various changes and improvements, these changes and improvements both fall within claimed
Within the scope of the application.
Claims (16)
1. a kind of block catenary system, which is characterized in that include at least:
Management end, to external system;
Wherein, the alliance's chain or privately owned chain of the management end use the identical account book data of logic with described to external system.
2. system according to claim 1, which is characterized in that described includes external publicly-owned chain or alliance to external system
Chain.
3. system according to claim 1, which is characterized in that each block data on external system is by the pipe
Multiple block datas sequence of the alliance's chain or privately owned chain of managing end forms.
4. system according to claim 1, which is characterized in that got on the alliance's chain or privately owned chain of the management end
The state of any account be consistent in the state to the account got on external system.
5. system according to claim 1, which is characterized in that the system also includes:User terminal, suitable for passing through trading standard
Know, relevant transaction data is retrieved in the account book data.
6. system according to claim 5, which is characterized in that the wallet of the user terminal is suitable for automatic verification in the pipe
Manage the state of account that is got on alliance's chain or privately owned chain at end with described to the account that is got on external system
Whether state is consistent.
7. system according to claim 5, which is characterized in that the transaction ID includes sending mark and receiving to identify,
The mark that sends determines that the reception mark is by institute by the nonce values and encryption key of user terminal last time transmission transaction
The nonce values and encryption key for stating the reception transaction of user terminal last time determine;Wherein, the encryption key of the user terminal is by the pipe
Reason end is issued, and the nonce values of transaction are a random numbers.
8. system according to claim 5, which is characterized in that the transaction data of the user terminal forms a transmission chain
The reception chain for having the brotgher of node with one.
9. system according to claim 5, which is characterized in that the management end, suitable for carrying receiving the user terminal
The transaction data of friendship and after being verified, adds endorsement signature, and update State Tree to the transaction data.
10. system according to claim 5, which is characterized in that the user terminal is further adapted in the block catenary system
Trustship contract is established, and by Contract ID, described to retrieving relevant contract data on external system.
11. system according to claim 5, which is characterized in that the system also includes at least one of:
End is supervised, is suitable for supervising the endorsement token of the management end distribution, and under the mandate of the management end, supervises institute
State transaction data and account information;
Third party is suitable under the mandate of the user terminal, checks the transaction data and account information.
12. system according to claim 1, which is characterized in that at least two blocks catenary system passes through the management
End establishes cryptochannel and carries out stream compression, wherein the token total amounts in the either block catenary system remain unchanged.
13. a kind of data processing method, which is characterized in that be applied to block catenary system, the block catenary system, which includes at least, to be used
Family end and management end;Alternatively, the block catenary system includes at least user terminal, management end and to external system, wherein the pipe
The alliance's chain or privately owned chain for managing end use the identical account book data of logic with described to external system;The method includes:
The encryption key that the user terminal is issued according to the nonce values and the management end of last transaction, determines transaction ID;
The user terminal retrieves relevant transaction data by the transaction ID in the account book data.
14. according to the method for claim 13, which is characterized in that the transaction ID includes sending mark and reception mark
Know, the mark that sends is determined by the nonce values and the encryption key of user terminal last time transmission transaction, the reception mark
Know and is determined by the nonce values and the encryption key of user terminal last time reception transaction;Wherein, the nonce values are random
Data.
15. according to the method for claim 13, which is characterized in that the transaction data of the user terminal forms a send chain
Item and a reception chain for having the brotgher of node.
16. according to the method for claim 13, which is characterized in that the method further includes:The user terminal is in the area
Trustship contract is established in block catenary system, and by Contract ID, described to retrieving relevant contract data on external system.
Priority Applications (10)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810210284.5A CN108416578A (en) | 2018-03-14 | 2018-03-14 | A kind of block catenary system and data processing method |
US16/965,788 US20210042744A1 (en) | 2018-03-14 | 2019-02-01 | Block chain data processing method, management terminal, user terminal, conversion device, and medium |
EP19766756.1A EP3731162A1 (en) | 2018-03-14 | 2019-02-01 | Block chain data processing method, management terminal, user terminal, conversion device, and medium |
SG11202006981QA SG11202006981QA (en) | 2018-03-14 | 2019-02-01 | Block chain data processing method, management terminal, user terminal, conversion device, and medium |
PCT/CN2019/074440 WO2019174430A1 (en) | 2018-03-14 | 2019-02-01 | Block chain data processing method, management terminal, user terminal, conversion device, and medium |
CA3088712A CA3088712A1 (en) | 2018-03-14 | 2019-02-01 | Block chain data processing method, management end, user end, conversion apparatus and medium |
JP2020562824A JP2021512569A (en) | 2018-03-14 | 2019-02-01 | Blockchain data processing method, management side, client side, converter and medium |
BR112020016151-9A BR112020016151A2 (en) | 2018-03-14 | 2019-02-01 | METHOD FOR PROCESSING DATA PROCESSING, METHOD FOR PROCESSING DATA, MANAGEMENT END APPLIANCE, USER END APPLIANCE AND COMPUTER-READABLE MEDIA |
KR1020207022809A KR20200108024A (en) | 2018-03-14 | 2019-02-01 | Blockchain data processing method, management group, user group, conversion device and medium |
AU2019232978A AU2019232978A1 (en) | 2018-03-14 | 2019-02-01 | Block chain data processing method, management terminal, user terminal, conversion device, and medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810210284.5A CN108416578A (en) | 2018-03-14 | 2018-03-14 | A kind of block catenary system and data processing method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN108416578A true CN108416578A (en) | 2018-08-17 |
Family
ID=63131522
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810210284.5A Pending CN108416578A (en) | 2018-03-14 | 2018-03-14 | A kind of block catenary system and data processing method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108416578A (en) |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109242684A (en) * | 2018-08-27 | 2019-01-18 | 北京京东金融科技控股有限公司 | Asset State processing method and device based on block chain |
CN109242623A (en) * | 2018-08-31 | 2019-01-18 | 深圳市有钱科技有限公司 | A kind of right to use the land transfer system |
CN109257430A (en) * | 2018-09-30 | 2019-01-22 | 北京奇虎科技有限公司 | System, method and the server of Internet application based on block chain |
CN110060161A (en) * | 2019-03-28 | 2019-07-26 | 众安信息技术服务有限公司 | It trades anti-heavy client service implementation method and serviced component for block chain |
WO2019174430A1 (en) * | 2018-03-14 | 2019-09-19 | 郑杰骞 | Block chain data processing method, management terminal, user terminal, conversion device, and medium |
WO2019072287A3 (en) * | 2018-11-30 | 2019-10-03 | Alibaba Group Holding Limited | Utilizing nonce table to resolve concurrent blockchain transaction failure |
CN110569668A (en) * | 2019-09-11 | 2019-12-13 | 北京邮电大学 | data encryption storage method, device, equipment and medium based on block chain |
CN110602455A (en) * | 2019-09-10 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Video storage system, video processing method, device, equipment and storage medium |
CN110692228A (en) * | 2019-03-01 | 2020-01-14 | 阿里巴巴集团控股有限公司 | Method and equipment for protecting transaction activity sensitive data based on intelligent contracts in blockchain |
CN110730186A (en) * | 2019-10-22 | 2020-01-24 | 全链通有限公司 | Token issuing method, accounting node and medium based on block chain |
CN111080300A (en) * | 2020-01-04 | 2020-04-28 | 链农(深圳)信息科技有限公司 | Asset transfer method and device based on block chain and hardware equipment |
CN111311413A (en) * | 2020-02-25 | 2020-06-19 | 百度在线网络技术(北京)有限公司 | Method, device, equipment and medium for monitoring resource circulation of block chain |
CN111555888A (en) * | 2020-04-27 | 2020-08-18 | 中国银行股份有限公司 | Data interaction method and device based on block chain |
CN111563744A (en) * | 2020-04-21 | 2020-08-21 | 杭州趣链科技有限公司 | Method for verifying Fabric complex endorsement policy in cross-chain |
CN111565186A (en) * | 2020-04-29 | 2020-08-21 | 中国联合网络通信集团有限公司 | Message publishing method and device |
CN111586069A (en) * | 2020-05-15 | 2020-08-25 | 广州全宇风信息科技有限公司 | Internet of things equipment management and data chaining method based on block chain technology |
WO2020216053A1 (en) * | 2019-04-25 | 2020-10-29 | 腾讯科技(深圳)有限公司 | Distributed data processing method, device, apparatus and medium |
CN112153085A (en) * | 2019-06-26 | 2020-12-29 | 华为技术有限公司 | Data processing method, node and block chain system |
JP2021527373A (en) * | 2018-08-28 | 2021-10-11 | 江蘇傲為控股有限公司 | How to maintain blockchain parachain and blockchain parachain |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106157142A (en) * | 2016-06-30 | 2016-11-23 | 惠众商务顾问(北京)有限公司 | A kind of block chain common recognition and synchronous method, system and device |
US20170076109A1 (en) * | 2015-09-12 | 2017-03-16 | Q Bio, Inc | Uniform-frequency records with obscured context |
CN106649632A (en) * | 2016-12-07 | 2017-05-10 | 北京众享比特科技有限公司 | Data synchronism method and system |
CN107451874A (en) * | 2017-07-27 | 2017-12-08 | 武汉天喻信息产业股份有限公司 | Electronic invoice integrated conduct method and system based on block chain |
-
2018
- 2018-03-14 CN CN201810210284.5A patent/CN108416578A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170076109A1 (en) * | 2015-09-12 | 2017-03-16 | Q Bio, Inc | Uniform-frequency records with obscured context |
CN106157142A (en) * | 2016-06-30 | 2016-11-23 | 惠众商务顾问(北京)有限公司 | A kind of block chain common recognition and synchronous method, system and device |
CN106649632A (en) * | 2016-12-07 | 2017-05-10 | 北京众享比特科技有限公司 | Data synchronism method and system |
CN107451874A (en) * | 2017-07-27 | 2017-12-08 | 武汉天喻信息产业股份有限公司 | Electronic invoice integrated conduct method and system based on block chain |
Non-Patent Citations (1)
Title |
---|
廖滨华: "网络基础与应用 当代大学生必备必用", 《网络基础与应用 当代大学生必备必用》 * |
Cited By (33)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
WO2019174430A1 (en) * | 2018-03-14 | 2019-09-19 | 郑杰骞 | Block chain data processing method, management terminal, user terminal, conversion device, and medium |
CN109242684A (en) * | 2018-08-27 | 2019-01-18 | 北京京东金融科技控股有限公司 | Asset State processing method and device based on block chain |
JP2021527373A (en) * | 2018-08-28 | 2021-10-11 | 江蘇傲為控股有限公司 | How to maintain blockchain parachain and blockchain parachain |
CN109242623A (en) * | 2018-08-31 | 2019-01-18 | 深圳市有钱科技有限公司 | A kind of right to use the land transfer system |
CN109257430A (en) * | 2018-09-30 | 2019-01-22 | 北京奇虎科技有限公司 | System, method and the server of Internet application based on block chain |
CN109257430B (en) * | 2018-09-30 | 2024-04-19 | 北京奇虎科技有限公司 | System, method and server for block chain-based internet application |
WO2019072287A3 (en) * | 2018-11-30 | 2019-10-03 | Alibaba Group Holding Limited | Utilizing nonce table to resolve concurrent blockchain transaction failure |
CN110431580A (en) * | 2018-11-30 | 2019-11-08 | 阿里巴巴集团控股有限公司 | Concurrent block chain Fail Transaction is reduced using the table of random numbers |
US10540344B2 (en) | 2018-11-30 | 2020-01-21 | Alibaba Group Holding Limited | Utilizing nonce table to resolve concurrent blockchain transaction failure |
CN110692228A (en) * | 2019-03-01 | 2020-01-14 | 阿里巴巴集团控股有限公司 | Method and equipment for protecting transaction activity sensitive data based on intelligent contracts in blockchain |
CN110692228B (en) * | 2019-03-01 | 2022-02-22 | 创新先进技术有限公司 | Method and equipment for protecting transaction activity sensitive data based on intelligent contracts in blockchain |
CN110060161B (en) * | 2019-03-28 | 2021-05-28 | 众安信息技术服务有限公司 | Client service implementation method and service assembly for block chain transaction repetition prevention |
CN110060161A (en) * | 2019-03-28 | 2019-07-26 | 众安信息技术服务有限公司 | It trades anti-heavy client service implementation method and serviced component for block chain |
WO2020216053A1 (en) * | 2019-04-25 | 2020-10-29 | 腾讯科技(深圳)有限公司 | Distributed data processing method, device, apparatus and medium |
US11917057B2 (en) | 2019-04-25 | 2024-02-27 | Tencent Technology (Shenzhen) Company Limited | Method, device, and apparatus for processing distributed data, and medium |
CN112153085B (en) * | 2019-06-26 | 2022-05-17 | 华为技术有限公司 | Data processing method, node and block chain system |
CN112153085A (en) * | 2019-06-26 | 2020-12-29 | 华为技术有限公司 | Data processing method, node and block chain system |
CN110602455B (en) * | 2019-09-10 | 2021-06-18 | 腾讯科技(深圳)有限公司 | Video storage system, video processing method, device, equipment and storage medium |
CN110602455A (en) * | 2019-09-10 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Video storage system, video processing method, device, equipment and storage medium |
CN110569668B (en) * | 2019-09-11 | 2022-04-26 | 北京邮电大学 | Data encryption storage method, device, equipment and medium based on block chain |
CN110569668A (en) * | 2019-09-11 | 2019-12-13 | 北京邮电大学 | data encryption storage method, device, equipment and medium based on block chain |
CN110730186A (en) * | 2019-10-22 | 2020-01-24 | 全链通有限公司 | Token issuing method, accounting node and medium based on block chain |
CN111080300A (en) * | 2020-01-04 | 2020-04-28 | 链农(深圳)信息科技有限公司 | Asset transfer method and device based on block chain and hardware equipment |
CN111080300B (en) * | 2020-01-04 | 2024-06-07 | 链农(深圳)信息科技有限公司 | Asset transfer method and device based on block chain and hardware equipment |
CN111311413B (en) * | 2020-02-25 | 2023-08-29 | 百度在线网络技术(北京)有限公司 | Method, device, equipment and medium for monitoring resource circulation of block chain |
CN111311413A (en) * | 2020-02-25 | 2020-06-19 | 百度在线网络技术(北京)有限公司 | Method, device, equipment and medium for monitoring resource circulation of block chain |
CN111563744B (en) * | 2020-04-21 | 2023-05-26 | 杭州趣链科技有限公司 | Method for verifying Fabric complex endorsement policy in cross-chain |
CN111563744A (en) * | 2020-04-21 | 2020-08-21 | 杭州趣链科技有限公司 | Method for verifying Fabric complex endorsement policy in cross-chain |
CN111555888B (en) * | 2020-04-27 | 2022-10-21 | 中国银行股份有限公司 | Data interaction method and device based on block chain |
CN111555888A (en) * | 2020-04-27 | 2020-08-18 | 中国银行股份有限公司 | Data interaction method and device based on block chain |
CN111565186B (en) * | 2020-04-29 | 2022-04-29 | 中国联合网络通信集团有限公司 | Message publishing method and device |
CN111565186A (en) * | 2020-04-29 | 2020-08-21 | 中国联合网络通信集团有限公司 | Message publishing method and device |
CN111586069A (en) * | 2020-05-15 | 2020-08-25 | 广州全宇风信息科技有限公司 | Internet of things equipment management and data chaining method based on block chain technology |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108416578A (en) | A kind of block catenary system and data processing method | |
CN112232527B (en) | Safe distributed federal deep learning method | |
CN108765240B (en) | Block chain-based inter-institution customer verification method, transaction supervision method and device | |
JP6524347B2 (en) | Information sharing system | |
EP3395006B1 (en) | Method for managing a trusted identity | |
CN110084068A (en) | Block catenary system and data processing method for block catenary system | |
CA2808369C (en) | System for protecting an encrypted information unit | |
CN108235805A (en) | Account unifying method and device and storage medium | |
US10523644B2 (en) | System and method for secure digital sharing based on an inter-system exchange of a two-tier double encrypted digital information key | |
US20190014116A1 (en) | Method and system for data security within independent computer systems and digital networks | |
JP2007282295A (en) | Cryptographic system and method with key escrow feature | |
CN110599163B (en) | Transaction record outsourcing method facing block chain transaction supervision | |
CN111274599A (en) | Data sharing method based on block chain and related device | |
CN108876593A (en) | A kind of online transaction method and apparatus | |
CN114020841A (en) | Data sharing system, method, storage medium and equipment | |
CN112347517B (en) | KYC compliance supervision system based on multi-party safety calculation | |
CN111723060A (en) | Blacklist data sharing method and system based on block chain | |
CN112434334A (en) | Data processing method, device, equipment and storage medium | |
CN108462696A (en) | A kind of block chain intelligent identity identification system of decentralization | |
KR102014647B1 (en) | Electronic voting method based on blockchain | |
DE102020004121A1 (en) | METHOD, SUBSCRIBER UNIT, TRANSACTION REGISTER AND PAYMENT SYSTEM FOR ADMINISTRATION OF TRANSACTION RECORDS | |
CN114363013B (en) | Supervision-friendly blockchain content privacy protection system, message sending and query method | |
US20230267426A1 (en) | Payment system, coin register, participant unit, transaction register, monitoring register and method for payment with electronic coin data sets | |
KR102475434B1 (en) | Security method and system for crypto currency | |
TW202101267A (en) | Account data processing method and account data processing system ensuring that there is encryption protection when account data is returned to an electronic payment dealer |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20180817 |
|
RJ01 | Rejection of invention patent application after publication |