CN108416578A - A kind of block catenary system and data processing method - Google Patents

A kind of block catenary system and data processing method Download PDF

Info

Publication number
CN108416578A
CN108416578A CN201810210284.5A CN201810210284A CN108416578A CN 108416578 A CN108416578 A CN 108416578A CN 201810210284 A CN201810210284 A CN 201810210284A CN 108416578 A CN108416578 A CN 108416578A
Authority
CN
China
Prior art keywords
data
management
chain
user terminal
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810210284.5A
Other languages
Chinese (zh)
Inventor
郑杰骞
Original Assignee
郑杰骞
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 郑杰骞 filed Critical 郑杰骞
Priority to CN201810210284.5A priority Critical patent/CN108416578A/en
Publication of CN108416578A publication Critical patent/CN108416578A/en
Priority claimed from BR112020016151-9A external-priority patent/BR112020016151A2/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction

Abstract

This application discloses a kind of block catenary system and data processing methods;Above-mentioned block catenary system, includes at least:Management end and to external system;Wherein, the alliance's chain or privately owned chain of management end use the identical account book data of logic with to external system.The application is capable of providing the block catenary system endorsed with management end, so that it is guaranteed that user's assets security and data personal secrets.

Description

A kind of block catenary system and data processing method
Technical field
This application involves but be not limited to microcomputer data processing field more particularly to a kind of block catenary system and data Processing method.
Background technology
Block chain technology is also referred to as distributed account book technology, is a kind of distributed data base technique of decentralization, Feature be decentralization, it is open and clear, can not distort, trusted.
However, current block catenary system, lacks manager and participates in control and management, the distribution of token lacks the related back of the body Book lacks perfect supervision and secret protection, causes safety insufficient.
Invention content
It is the general introduction of the theme to being described in detail herein below.This general introduction is not to limit the protection model of claim It encloses.
The embodiment of the present application provides a kind of block catenary system and data processing method, is capable of providing and endorses with management end Block catenary system, so that it is guaranteed that user's assets security and data personal secrets.
In a first aspect, the embodiment of the present application provides a kind of block catenary system, include at least:Management end, to external system;Its In, the alliance's chain or privately owned chain of the management end use the identical account book data of logic with described to external system.
In the exemplary embodiment, described may include external publicly-owned chain or alliance's chain to external system.
In the exemplary embodiment, each block data on external system can be by the alliance of the management end Multiple block datas of chain or privately owned chain sequence forms.
In the exemplary embodiment, the shape of any account got on alliance's chain of the management end or privately owned chain State can be consistent in the state to the account got on external system.
In the exemplary embodiment, above-mentioned block catenary system can also include:User terminal is suitable for through transaction ID, Relevant transaction data is retrieved in the account book data.
In the exemplary embodiment, the wallet of the user terminal may be adapted to verify the alliance in the management end automatically The state of the account got on chain or privately owned chain with the state to the account got on external system whether one It causes.
In the exemplary embodiment, the transaction ID may include sending mark and receiving mark, and the transmission is marked Knowing can determine that the reception mark can be by described by the nonce values and encryption key of user terminal last time transmission transaction User terminal last time receives the nonce values of transaction and encryption key determines;Wherein, the encryption key of the user terminal is by the management End is issued, and the nonce values of transaction are a random numbers.
In the exemplary embodiment, the transaction data of the user terminal, which can form a transmission chain and one, brother The reception chain of younger brother's node.
In the exemplary embodiment, the management end may be adapted in the transaction data for receiving the user terminal submission And after being verified, endorsement signature is added to the transaction data, and update State Tree.
In the exemplary embodiment, the user terminal can be adapted in the block catenary system establish trustship conjunction About, and by Contract ID, described to retrieving relevant contract data on external system.
In the exemplary embodiment, above-mentioned block catenary system can also include at least one of:
End is supervised, is suitable for supervising the endorsement token of the management end distribution, and under the mandate of the management end, prison Manage the transaction data and account information;
Third party is suitable under the mandate of the user terminal, checks the transaction data and account information.
In the exemplary embodiment, at least two blocks catenary system by the management end establish cryptochannel into Row stream compression, wherein the token total amounts in the either block catenary system remain unchanged.
Second aspect, the embodiment of the present application provide a kind of data processing method, are applied to block catenary system, the block chain System includes at least user terminal and management end;Alternatively, the block catenary system includes at least user terminal, management end and is externally System, wherein the alliance's chain or privately owned chain of the management end use the identical account book data of logic with described to external system;The side Method includes:
The encryption key that the user terminal is issued according to the nonce values and the management end of last transaction determines transaction Mark;
The user terminal retrieves relevant transaction data by the transaction ID in the account book data.
In the exemplary embodiment, the transaction ID may include sending mark and receiving mark, and the transmission is marked The nonce values of transaction can be sent and the encryption key be determined by the user terminal last time by knowing, and the reception identifies can be by The user terminal last time receives the nonce values of transaction and the encryption key determines;Wherein, the nonce values are random data.
In the exemplary embodiment, the transaction data of the user terminal, which can form a transmission chain and one, brother The reception chain of younger brother's node.
In the exemplary embodiment, the above method can also include:The user terminal is built in the block catenary system Vertical trustship contract, and by Contract ID, described to retrieving relevant contract data on external system.
In addition, the embodiment of the present application also provides a kind of computer-readable medium, it is stored with data processor, at the data The step of reason program realizes above-mentioned data processing method when being executed by processor.
In the embodiment of the present application, block catenary system includes at least management end and to external system, wherein the alliance of management end Chain or privately owned chain use the identical account book data of logic with to external system.The connection that the embodiment of the present application passes through combined use management end Alliance's chain or privately owned chain and to external system, realizing has the block catenary system of management end endorsement, so that it is guaranteed that user's assets security and Data-privacy safety.
After reading and understanding attached drawing and detailed description, it can be appreciated that other aspects.
Description of the drawings
Fig. 1 is a kind of schematic diagram of block catenary system provided by the embodiments of the present application;
Fig. 2 is the exemplary plot of block catenary system provided by the embodiments of the present application;
Interchain circulation schematic diagrames of the Fig. 3 between two block catenary systems provided by the embodiments of the present application;
Fig. 4 is the interaction schematic diagram of two block catenary systems provided by the embodiments of the present application;
Fig. 5 is the flow chart of data processing method provided by the embodiments of the present application.
Specific implementation mode
The embodiment of the present application is described in detail below in conjunction with attached drawing, it should be understood that embodiments described below is only For instruction and explanation of the application, it is not used to limit the application.
It should be noted that if do not conflicted, each feature in the embodiment of the present application and embodiment can be tied mutually It closes, within the protection domain of the application.In addition, though logical order is shown in flow charts, but in certain situations Under, it can be with the steps shown or described are performed in an order that is different from the one herein.
Below first to this application involves concept illustrate.
Token refers to the token on block chain, also referred to as logical card, but all related to assets class.
Publicly-owned chain refers to the block chain that anyone can read confirmation, participate in common recognition, meets complete decentralization.The application In, the block data on publicly-owned chain is composed of alliance's chain of management end or the data of privately owned chain, the block head number of publicly-owned chain According to the quantity of the data block with the management end for including in each data block by there is publicly-owned chain to determine, and the data on publicly-owned chain are Irreversible, anyone cannot change.
Privately owned chain refers to write-in permission and organizes data-link in hand at one.In the application, the transaction data of user terminal submission The authentication signature for only including user terminal could be in the alliance of management end after needing management end to be verified and providing endorsement signature Chain or the enterprising row write of privately owned chain enter.
Alliance's chain refers to data-link of the write-in permission in multiple tissue hands.
EID (electronic Identity) is Ministry of Public Security citizen network identity identifying system, is studied by Ministry of Public Security's third It is built, there is believable real-name authentication mode.
The embodiment of the present application provides a kind of block catenary system, includes at least:Management end, to external system;Wherein, management end Alliance's chain or privately owned chain use the identical account book data of logic with to external system.
Wherein, may include to external system:External publicly-owned chain or alliance's chain.
In present embodiment, to each block data on external system (for example, external publicly-owned chain) by the connection of management end Multiple block datas of alliance's chain or privately owned chain sequence forms.Illustratively, the pipe for including in each block data on publicly-owned chain The quantity and block head data for managing the block data at end are determined by publicly-owned chain.However, the application does not limit this.
In the exemplary embodiment, the data that publicly-owned chain on journal management end is submitted, and what management end was submitted Data are alliance's chain of management end or the block data that privately owned chain generates, therefore, alliance's chain or privately owned of publicly-owned chain and management end The account book data that chain uses are logically same.Block catenary system provided in this embodiment can be regarded as a duplex System (includes following two layers:The alliance's chain or privately owned chain of management end, to external system).However, the application does not limit this. In practice, block catenary system provided in this embodiment can be extended to multilayer system, for example, carrying out system in management end Extension.
In the present embodiment, in alliance's chain of management end or privately owned chain and on external system (for example, external publicly-owned chain) The state of the account got using different modes is consistent.Illustratively, management end can generate State Tree, to obtain The state of any account;On publicly-owned chain, the state of any account can be known by adding up transaction results;Pass through accumulative transaction As a result the state of the account obtained in the state and management end of the account known is consistent.In this way, can be with by publicly-owned chain Realize the unalterable feature of the transaction data of account.Wherein, the wallet of user terminal can verify alliance's chain in management end automatically Or the state of the account got on privately owned chain and account for being got on to external system (for example, external publicly-owned chain) Whether state is consistent.
In the present embodiment, the data that user terminal is submitted need to pass through management end endorsement signature, and all readings are all with external Data in system are criterion, to realize the block catenary system with management end endorsement.Wherein, management end is suitable for management block Catenary system adjusts the token total amounts issued in block catenary system, and meets trade management, system of real name, effectively supervision, number of users The features such as according to secret protection, and by combining the use to external system, make that the data trusted on external system can not be changed.
In block catenary system provided in this embodiment, the authentication signature of existing user terminal, and there is the endorsement of management end to sign, Also the common recognition of external system is confirmed, so being irreversible to the data on external system, anyone cannot change.In this way, both It ensures user's assets security and data-privacy, and can guarantee the token on chain and transaction with endorsement.
Below for including external publicly-owned chain to external system, block catenary system provided by the embodiments of the present application is carried out Explanation.
Fig. 1 and Fig. 2 is the schematic diagram of block catenary system provided by the embodiments of the present application.As shown in Figure 1, the present embodiment provides Block catenary system, including:Management end 101, external publicly-owned chain 102 and user terminal 103.Wherein, the alliance of management end 101 Chain or privately owned chain and publicly-owned chain 102 use the identical account book data of logic 100.
In the present embodiment, management end, user terminal can be respectively the system for including one or more communication equipments.User The number at end can be respectively multiple.However, the application does not limit this.
In the present embodiment, each block data on external publicly-owned chain by management end alliance's chain or privately owned chain it is more A block data sequence forms.I.e. the alliance's chain or privately owned chain of management end and the bottom account book data of publicly-owned chain are logically same The sequence of one account book data, account book is also associated successively.In this way, management end can check the data of itself by publicly-owned chain State, and alliance's chain of complete management end or the data of privately owned chain can be recovered by publicly-owned chain.Wherein, the alliance of management end Chain or privately owned chain are different from the common recognition algorithm that publicly-owned chain uses, so the time for respectively generating block data also differs;Management Alliance's chain at end or privately owned chain use common recognition time shorter algorithm, to meet quickly confirmation and high frequency transactions demand, and it is publicly-owned The common recognition time of chain is longer, therefore publicly-owned chain is an asynchronous process with respect to alliance's chain of management end or privately owned chain.Publicly-owned chain On the quantity of block data that generates of each block data management end for including also be not fixed, for example, in Fig. 1, publicly-owned chain On a block data may include management end generate three or four block datas;Therefore the connection of management end is not interfered with The generation of alliance's chain or privately owned chain, to meet the high concurrent demand of management end.
In the present embodiment, the data for the alliance's chain or privately owned chain that management end generates all can be announced externally, asynchronous life Outer publicly-owned chain in pairs.The data block of publicly-owned chain is multiple continuous data block combinations of the alliance's chain or privately owned chain by management end Made of, the block head data of publicly-owned chain are only added, due to the accounting very little of block head data, so the data volume newly increased Very little.Moreover, the data block that publicly-owned chain uses all is alliance's chain by management end or the block data after privately owned chain is packaged, because This is also beneficial to the data exchange of publicly-owned chain.
In the present embodiment, alliance's chain of management end or the data on privately owned chain are divided into control data and transaction data two Point.Control data are mainly the set for the information data that management end is issued for managing and controlling block catenary system, can be wrapped Include the registration and unregistration of user, mechanism, the distribution of token, the fresh informations such as trading rules and key, certificate.Except the body of user Part information is outside ciphertext, remaining most of data is all that in plain text, easily and effectively to supervise, can also protect the privacy of identities of user. Transaction data is the set of all single transaction;Trading rules are issued by management end in controlling data, may include that transaction is double Identity mark, number of deals, nonce values, timestamp, transaction ID (ID) and the additional information etc. of side, can also include user terminal Authentication signature and management end endorsement signature;Wherein, it per transaction is required for that endorsement is verified and provided by management end It can just come into force after signature, to achieve the purpose that management end is managed transaction.Wherein, the nonce values of transaction are one random Numerical value;In addition to timestamp, transaction id and signature value are in plain text, remainder data is all ciphertext, and the authentication signature of user terminal is pair The signature that the plaintext of the identity of both parties and the plaintext of nonce values and other ciphertext data carry out, and the back of the body of management end Bookmark name is the signature for the entire transaction data submitted to user terminal, so can be signed with the endorsement at verification management end to outside, But it is not able to verify that the authentication signature of user terminal, and can prevent violence from attempting the identity of both parties, protects both parties' body Part privacy.
In the present embodiment, the alliance's chain or privately owned chain of management end can generate the State Tree of whole system, to obtain The state of each account;And due to the privacy sharing sub-key of not no management end on publicly-owned chain, so whole system cannot be generated Status data, but the bottom of the alliance's chain or privately owned chain due to management end and publicly-owned chain is used with a account book data, because This, can obtain and accumulation account remaining sum on publicly-owned chain, more than the account in the State Tree of obtained account balance and management end The state of volume is consistent.
In other words, for same a account book data, the occupation mode for management end and user terminal is different, management End can generate the State Tree of system, and to learn the state of each account, and user terminal can learn the detailed of the every transaction of oneself It counts evidence accurately, is consistent by adding up the account status that transaction results obtain and the state that management end obtains, also just by publicly-owned Chain realizes the unalterable feature of customer transaction data, and management end can not forge the authentication signature of user terminal and change is handed over Easy data, so that it is guaranteed that user's assets security.
In the present embodiment, the key of user terminal can be divided into two class of signature key and encryption key.Wherein, signature key Locally generated by user terminal and management use, using can not derived hardware as carrier, to ensure that the safety of key makes With.Signature key issues the authentication certificate of user terminal by CA (Certificate Authority, Certificate Authority) mechanism Or eID mechanism is used, realize the real name authentication of user terminal.Encryption key is that user terminal passes through authentication certificate or eID It after management end registration, is issued by management end, and is stored and used by the local wallet of user terminal.
Illustratively, encryption key may include the tagged keys of additive homomorphism, privacy sharing sub-key and symmetric cryptography Key.For example, the identity information of user can use symmetric cryptographic key, storage is encrypted using symmetric encipherment algorithm;It hands over The data such as the identity of easy both sides can use privacy sharing algorithm, and storage is encrypted using privacy sharing sub-key;It hands over Easy number can use additive homomorphism algorithm, and storage is encrypted using the tagged keys of additive homomorphism.Wherein, symmetric cryptography refers to It is encrypted and decrypted using same key using the both sides of this Encryption Algorithm.Privacy sharing refers to classified information with appropriate Mode is split as N parts, and only M parts of cooperation could Restore Secret message.It, can after additive homomorphism encryption refers to message by public key encryption The operation of addition is carried out in ciphertext, operation output is decrypted using private key, and result is original with use addition process unencryption The result that data obtain is consistent.
In the present embodiment, the data on publicly-owned chain are externally able to validate only the complete of the data block that alliance's chain or privately owned chain are packaged The endorsement signature of the management end of whole property and verification per transaction, and can check the cleartext information that management end is issued in controlling data With the transaction id and timestamp information in transaction data, other information is all externally kept secure.
In the present embodiment, user terminal may be adapted to, by transaction id, relevant transaction data be retrieved in account book data. I.e. user terminal can be by transaction id, in the upper relevant transaction data of retrieval of at least one of management end and external publicly-owned chain. Wherein, the wallet of user terminal is the wallet of a lightweight, does not need to complete publicly-owned chain data;The wallet of user terminal can be with From publicly-owned chain decryption check oneself account information and with oneself relevant transaction data, such as the body including both parties Part mark, the number of deals of oneself, and it is able to verify that the authentication signature of transaction data and endorsement are signed.Moreover, the wallet of user terminal The balance amount information added up after all and oneself relevant transaction data decryption, with the account balance ciphertext inquired from management end Information after decryption is consistent.
The mode for retrieving relevant transaction data from publicly-owned chain to user terminal below illustrates.
Since transaction data is associated with sender and recipients, transaction id, which can be divided into, sends ID and reception ID two Part.Wherein, list can be passed through by the nonce values of user terminal last time transmission transaction and the symmetric cryptographic key of user terminal by sending ID To can not inverse function generate, send ID be unique in systems;Receive ID by user terminal last time receive transaction nonce values and The symmetric cryptographic key of user terminal by unidirectionally can not inverse function generate, the reception ID at different user end is unique in systems , but because there are concurrent transactions, therefore there are the same user terminals for different transaction reception ID having the same.
Wherein, user terminal generates a random nonce value and initial reception when being registered to management end by management end ID, and storage is encrypted using the symmetric cryptographic key of user terminal, and recorded in the State Tree of management end.Transaction when by In State Tree the symmetric cryptographic key of the nonce values of sender and user terminal by unidirectionally can not inverse function generate send ID, even Reception ID with recipient in State Tree forms transaction id.Nonce values are generated at random by management end, and are ensured calculated next A transmission ID and reception ID is unique in systems.Management end passes through the identity of nonce values and both parties secret Close shared algorithm is encrypted, and is transferred to user terminal together with transaction id.After user terminal submits transaction data, management end can be with Whether the transmission ID of verification user terminal meets, and verifies and receive whether ID belongs to recipient, then more according to the nonce values of transaction The nonce values of sender in new state tree, and whether search the reception ID in transaction data identical as the reception ID in State Tree, If identical, it is updated according to the calculated reception ID of nonce values.It can be seen that the transaction data of user terminal is according to hair It send and receives and respectively constitute a chain, and due to concurrent transaction, there are the brothers of synchronization on reception chain Node.In other words, the transaction data of user terminal forms a transmission chain and a reception chain for having the brotgher of node.
Wherein, the wallet of user terminal can by user identifier search account information, decryption registration when nonce values and just Begin to receive ID, transmission ID next time can be calculated, inquiry sends ID and receives ID on publicly-owned chain respectively, and then gets All transmission transaction related to user and reception transaction.Nonce values are it is known that also in the transaction data submitted due to user terminal Next transmission ID is determined, whether the transmission ID that user terminal can be transferred to verification management end meets.And each send ID It has confirmed that, also it is prevented that Replay Attack.By transaction id and nonce values, the transaction data of user terminal forms a transmission Chain and a reception chain for having the brotgher of node, and user terminal can easily be retrieved by transaction id on publicly-owned chain Transaction data, and outside can not be learnt.The wallet of user terminal can use poll or subscribing manner to be looked into from publicly-owned chain Ask transaction id, preserve with the relevant All Activity data of user terminal, the account status of user terminal can be analyzed, so as to management end Carry out inquiring and authenticating.
In the exemplary embodiment, user terminal can be adapted in block catenary system establish trustship contract, and pass through Contract ID retrieves relevant contract data on to external system.
In the present embodiment, the common recognition reward on publicly-owned chain is that management end records the account information to be rewarded on publicly-owned chain, After waiting for the block data of such as 6 publicly-owned chains to confirm, publication is rewarded into corresponding account in plain text in controlling data, and is tired out It counts in account balance ciphertext.Common recognition reward on i.e. publicly-owned chain, meeting are issued in the data block below by management end, and By knowing together reward to ensure the data of publicly-owned chain on journal management end submission, specific reward rule can be by management end It makes by oneself.In this way, the balance amount information that the wallet of user terminal is inquired from publicly-owned chain, it is also necessary to add up the common recognition reward on publicly-owned chain, Just it is consistent with the account balance state of management end.And reward of knowing together is by issuing in plain text, so can by user identifier It is retrieved on publicly-owned chain.Token total amounts to ensure in system are certain, and management end can be when issuing token, reserved part Token is not diverted into the account balance of issuer, as the common recognition reward on publicly-owned chain.
In the exemplary embodiment, as shown in Fig. 2, the block catenary system of the present embodiment can also include:Supervise end 104 And third party 105;Wherein, end 104 is supervised, is suitable for the endorsement token that regulatory management end 101 is issued, and in management end 101 Mandate under, supervise transaction data and account information;Third party 105, are suitable under the mandate of user terminal 103, supervision transaction Data and account information.
In this example, for the behavior at effective regulatory management end, supervision end can provide automatic supervision and artificially participate in Supervise two parts function.Automatic supervision can be on the alliance's chain or privately owned chain of management end, also can be on publicly-owned chain.Automatic supervision exists The privacy sharing sub-key of management end can be obtained when startup, so corresponding system mode tree can be generated, be able to verify that every transaction Authentication signature and endorsement sign, and according to every transaction using additive homomorphism algorithm modification State Tree in account balance it is close Text does not leak relevant account balance information.In order to verify the validity of every transaction number, management end also needs to provide One black box authentication module by audit, function are to input the account of the number ciphertext and mark and payer of both parties Family remaining sum ciphertext decrypts number in black box authentication module and verifies whether to meet, returns to success or not.Automatically the mesh supervised Be verify whether all numbers of deals meet, it is ensured that the total amount of token is certain in system.And the prison artificially participated in A pipe part is the clear data issued in controlling data by regulatory management end, the main token for including management end distribution Endorsement, for example need signature of the management end with the proof such as underlying assets mortgage or guarantee fund and with regulator that could issue The token accordingly to endorse;Another part is the account information for needing certain user in supervisory systems, and management end can authorize accordingly The encryption key of user terminal gives supervision end, supervision end that can decrypt and check the transaction data and account information of corresponding user.
In this example, third party need check user terminal account information when, user terminal can authorize encryption key to Third party, so that third party checks on publicly-owned chain.
In the present embodiment, automatic supervision is able to verify that the validity of number of deals, it is ensured that the total amount of token is one in system Fixed.The variation of token total amounts needs management end to issue or remove in plain text respective numbers in controlling data in system Token increases or decreases corresponding number ciphertext in its account balance, reaches adjustment system by specified issuer The purpose of middle token total amounts, and these information are all disclosed in plaintext.General transaction in chain needs the certification with user terminal Signature can just come into force, and signature key be user terminal local management can not be derived, and be bundled with the authentication card of user terminal Book uses eID mechanism, and user terminal can be verified on publicly-owned chain and the authentication signature of oneself relationship trading, so management end is not The authentication signature and transaction data that change user terminal can be forged, so that it is guaranteed that user's assets security.In addition, there is pipe for multiple The block catenary system of end endorsement is managed, user terminal registration need to only be used with a authentication certificate or eID, convenient for users And update.
Referring to Fig. 3 and Fig. 4, the stream compression between multiple block catenary systems with management end endorsement is said It is bright.Fig. 3 and Fig. 4 is respectively that the interchain circulation schematic diagram between two block catenary systems provided by the embodiments of the present application shows with interaction It is intended to.It is illustrated so that two with the block catenary system of management end endorsement as an example in figs. 3 and 4.
In the exemplary embodiment, at least two block catenary systems establish cryptochannel by management end and carry out data flow Turn, wherein the token total amounts in either block catenary system remain unchanged, and related contract data stores in respective system.
In this example, stream compression is by each system between multiple block catenary systems with management end endorsement Cryptochannel realization is established between management end.As shown in Figure 3 and Figure 4, lead between block catenary system SA and block catenary system SB It crosses respective management end and establishes cryptochannel.Wherein, important data are not stored on cryptochannel, only be used as data agreement and The channel of contract is triggered, specific user's contract data all stores on each block catenary system, and therefore, user terminal can be right Relevant contract data is inquired on the publicly-owned chain answered.Corresponding contract rule is issued by each management end in controlling data, and By associating across chain and about ID, the contract data of stream compression between different system, the wallet of user terminal can be analyzed The executive condition of related contract.
As shown in figure 4, when carrying out stream compression between multiple block catenary systems, need both parties in the system to be circulated In registered.For example, user A is registered to the management end of block catenary system SA and SB, user B to block catenary system SA and The management end of SB is registered.Since the user terminal of both parties is not aware that whom the other side of transaction is, so being held in the palm Pipe contract is stated.Wherein, the trustship contract of statement may include the people of trustship, the number ciphertext of trustship, timestamp, nonce values, The authentication signature etc. of about ID, additional information and user terminal can also use the rule of above-mentioned transaction id with about ID here, with User terminal is facilitated to be retrieved on publicly-owned chain.After management end verifies the trustship contract of user terminal and signature of endorsing, contract just comes into force. Management end in the account balance of user terminal from subtracting in corresponding number ciphertext to newly-built contract remaining sum.The contract of trustship is merchandised The authentication signature of user terminal is then no longer needed, passes through between the management end of block catenary system and negotiates and trigger, generate relevant conjunction It about merchandises and signature of endorsing.Each contract transaction will be closed comprising the trustship contract and about ID, user terminal by retrieving About ID, so that it may to obtain all relationship tradings of this trustship contract, and recipient merchandised by contract in reception ID, The transaction can be retrieved.If there is residue in contract remaining sum, user terminal can generate the operation of a releasing trustship contract, specify Related trustship contract and about ID remove the remaining sum of contract and accumulative contract to account balance after management end endorsement signature In, complete the releasing of trustship contract.
In this example, it merchandises with the contract carried out between the block catenary system of management end endorsement multiple, in contract It needs to include in cryptochannel across chain and about ID.The wallet of user terminal passes through transaction id Rule above to user's correlation Trustship contract, the associated contract transaction of all and trustship contract then can be retrieved on publicly-owned chain, is merchandised by contract In across chain and about ID, so that it may on another publicly-owned chain of corresponding circulation retrieval comprising should be across the relevant contract of chain and about ID Transaction.Decryption can check the contents such as relevant contract transaction content, including timestamp, number of deals, contract information, and can test The endorsement signature of management end is demonstrate,proved, but can only check corresponding trustship and about ID, and cannot check the identity of trustship contract.With The wallet at family end gets relevant trustship contract information and respectively after the circulation contract Transaction Information of two systems, so that it may with The executive condition of the related contract of analysis.
In this example, between multiple block catenary systems endorsed with management end, the contract of both parties' user terminal Transaction can't influence the variation of token total amounts in respective system, the mistake that only different user token circulates in both sides' system Journey.And the validity of number of deals can be also verified by supervising automatically, it is ensured that the total amount of token is certain in system.And Between multiple block catenary systems endorsed with management end, after management end mutually establishes relevant cryptochannel, so that it may with Realize circulation of the user data between system, and the data to circulate all recorded on corresponding publicly-owned chain and can inquiring and authenticating, It is also convenient for being supervised.
It follows that by establishing cryptochannel between management end between multiple block catenary systems endorsed with management end Stream compression is carried out, significant data, the only channel as data agreement and triggering contract are not stored on cryptochannel, it is relevant Contract transaction data all stores on the data-link of respective system, and user can inquire relevant transaction data on publicly-owned chain.And And interchain stream compression can keep the constant of token total amounts in respective system, be also convenient for management end to issue token management and Supervision.
Fig. 5 is the flow chart of data processing method provided by the embodiments of the present application.Data processing side provided in this embodiment Method, is applied to block catenary system, and block catenary system includes at least user terminal and management end;Alternatively, block catenary system includes at least User terminal, management end and to external system, wherein the alliance's chain or privately owned chain of management end are identical using logic with to external system Account book data.
As shown in figure 5, data processing method provided in this embodiment includes:
The encryption key that S501, user terminal are issued according to the nonce values and management end of last transaction, determines trading standard Know;
S502, user terminal retrieve relevant transaction data by transaction ID in account book data.
It is applied to the block catenary system including at least user terminal and management end in data processing method provided in this embodiment When, user terminal can retrieve relevant transaction data by transaction ID in the account book data that management end uses.In this implementation When the data processing method that example provides is applied to including at least user terminal, management end and to the block catenary system of external system, due to The alliance's chain or privately owned chain of management end with to external system using the identical account book data of logic, then user terminal can execute with down toward One item missing:By transaction ID, relevant transaction data is retrieved in management end;By transaction ID, examined on to external system The relevant transaction data of rope.
Illustratively, transaction ID may include sending mark and receiving mark, sends mark and was sent by user terminal last time The nonce values and encryption key of transaction determine, it is true by the nonce values and encryption key of user terminal last time reception transaction to receive mark It is fixed;Wherein, nonce values are random number.
Illustratively, the transaction data of user terminal can form a transmission chain and a reception chain for having the brotgher of node Item.Wherein, transaction data can be made to form a transmission chain and a reception chain for having the brotgher of node by transaction ID.
Illustratively, the method for the present embodiment can also include:User terminal establishes trustship contract in block catenary system, and By Contract ID, relevant contract data is retrieved on to external system.
Related description about data processing method provided in this embodiment is referred to the description of above-mentioned block catenary system, Therefore it is repeated no more in this.
In addition, the embodiment of the present application also provides a kind of data processing equipment, it is applied to user terminal, including:
Determining module determines trading standard suitable for the encryption key issued according to the nonce values and management end of last transaction Know;
Module is retrieved, is suitable for, by transaction ID, relevant transaction data being retrieved in account book data.
Wherein, the alliance's chain or privately owned chain of management end are identical using logic as to external system (for example, external publicly-owned chain) Account book data.
Related description about data processing equipment provided in this embodiment is referred to retouching for above-mentioned data processing method It states, therefore is repeated no more in this.
In addition, the embodiment of the present application also provides a kind of communication equipment, including:Memory and processor, memory are suitable for depositing Data processor is stored up, which realizes the data processing side that Fig. 5 corresponding embodiments provide when being executed by processor The step of method.
Wherein, processor can include but is not limited to microprocessor (MCU, Microcontroller Unit) or programmable The processing unit of logical device (FPGA, Field Programmable Gate Array) etc..Memory can be used for storing application The software program and module of software, such as the corresponding program instruction of data processing method or module in the present embodiment, processor It is stored in software program and module in memory by operation, to perform various functions application and data processing, i.e., Realize above-mentioned data processing method.Memory may include high speed random access memory, may also include nonvolatile memory, such as one A or multiple magnetic storage devices, flash memory or other non-volatile solid state memories.In some instances, memory can Include the memory remotely located relative to processor, these remote memories can be set by network connection to above-mentioned communication It is standby.The example of above-mentioned network includes but not limited to internet, intranet, LAN, mobile radio communication and combinations thereof.
Illustratively, above-mentioned communication equipment can also include communication unit;Communication unit can be received via a network Or transmission data.In an example, communication unit can be radio frequency (RadioFrequency, referred to as RF) module, For wirelessly being communicated with internet.
In addition, the embodiment of the present application also provides a kind of computer-readable medium, it is stored with data processor, at the data The step of reason program realizes above-mentioned data processing method when being executed by processor.
It will appreciated by the skilled person that whole or certain steps in method disclosed hereinabove, system, dress Function module or unit in setting may be implemented as software, firmware, hardware and its combination appropriate.In hardware embodiment In, the division between the function module or unit that refer in the above description not necessarily corresponds to the division of physical assemblies;For example, One physical assemblies can have multiple functions or a function or step that can be executed by several physical assemblies cooperations.Certain A little components or all components may be implemented as by processor, such as the software that digital signal processor or microprocessor execute, or Person is implemented as hardware, or is implemented as integrated circuit, such as application-specific integrated circuit.Such software can be distributed in computer On readable medium, computer-readable medium may include computer storage media (or non-transitory medium) and communication media (or Fugitive medium).As known to a person of ordinary skill in the art, term computer storage medium is included in for storing information Implement in any method or technique of (such as computer-readable instruction, data structure, program module or other data) volatile Property and non-volatile, removable and nonremovable medium.Computer storage media includes but not limited to RAM, ROM, EEPROM, sudden strain of a muscle It deposits or other memory technologies, CD-ROM, digital versatile disc (DVD) or other optical disc storages, magnetic holder, tape, disk storage Or other magnetic memory apparatus or any other Jie for can be used for storing desired information and being accessed by a computer Matter.In addition, known to a person of ordinary skill in the art be, communication media generally comprises computer-readable instruction, data structure, journey Other data in the modulated data signal of sequence module or such as carrier wave or other transmission mechanisms etc, and may include any Information delivery media.
The advantages of basic principles and main features and the application of the application have been shown and described above.The application is not by upper The limitation for stating embodiment, the above embodiments and description only describe the principles of the application, are not departing from the application Under the premise of spirit and scope, the application will also have various changes and improvements, these changes and improvements both fall within claimed Within the scope of the application.

Claims (16)

1. a kind of block catenary system, which is characterized in that include at least:
Management end, to external system;
Wherein, the alliance's chain or privately owned chain of the management end use the identical account book data of logic with described to external system.
2. system according to claim 1, which is characterized in that described includes external publicly-owned chain or alliance to external system Chain.
3. system according to claim 1, which is characterized in that each block data on external system is by the pipe Multiple block datas sequence of the alliance's chain or privately owned chain of managing end forms.
4. system according to claim 1, which is characterized in that got on the alliance's chain or privately owned chain of the management end The state of any account be consistent in the state to the account got on external system.
5. system according to claim 1, which is characterized in that the system also includes:User terminal, suitable for passing through trading standard Know, relevant transaction data is retrieved in the account book data.
6. system according to claim 5, which is characterized in that the wallet of the user terminal is suitable for automatic verification in the pipe Manage the state of account that is got on alliance's chain or privately owned chain at end with described to the account that is got on external system Whether state is consistent.
7. system according to claim 5, which is characterized in that the transaction ID includes sending mark and receiving to identify, The mark that sends determines that the reception mark is by institute by the nonce values and encryption key of user terminal last time transmission transaction The nonce values and encryption key for stating the reception transaction of user terminal last time determine;Wherein, the encryption key of the user terminal is by the pipe Reason end is issued, and the nonce values of transaction are a random numbers.
8. system according to claim 5, which is characterized in that the transaction data of the user terminal forms a transmission chain The reception chain for having the brotgher of node with one.
9. system according to claim 5, which is characterized in that the management end, suitable for carrying receiving the user terminal The transaction data of friendship and after being verified, adds endorsement signature, and update State Tree to the transaction data.
10. system according to claim 5, which is characterized in that the user terminal is further adapted in the block catenary system Trustship contract is established, and by Contract ID, described to retrieving relevant contract data on external system.
11. system according to claim 5, which is characterized in that the system also includes at least one of:
End is supervised, is suitable for supervising the endorsement token of the management end distribution, and under the mandate of the management end, supervises institute State transaction data and account information;
Third party is suitable under the mandate of the user terminal, checks the transaction data and account information.
12. system according to claim 1, which is characterized in that at least two blocks catenary system passes through the management End establishes cryptochannel and carries out stream compression, wherein the token total amounts in the either block catenary system remain unchanged.
13. a kind of data processing method, which is characterized in that be applied to block catenary system, the block catenary system, which includes at least, to be used Family end and management end;Alternatively, the block catenary system includes at least user terminal, management end and to external system, wherein the pipe The alliance's chain or privately owned chain for managing end use the identical account book data of logic with described to external system;The method includes:
The encryption key that the user terminal is issued according to the nonce values and the management end of last transaction, determines transaction ID;
The user terminal retrieves relevant transaction data by the transaction ID in the account book data.
14. according to the method for claim 13, which is characterized in that the transaction ID includes sending mark and reception mark Know, the mark that sends is determined by the nonce values and the encryption key of user terminal last time transmission transaction, the reception mark Know and is determined by the nonce values and the encryption key of user terminal last time reception transaction;Wherein, the nonce values are random Data.
15. according to the method for claim 13, which is characterized in that the transaction data of the user terminal forms a send chain Item and a reception chain for having the brotgher of node.
16. according to the method for claim 13, which is characterized in that the method further includes:The user terminal is in the area Trustship contract is established in block catenary system, and by Contract ID, described to retrieving relevant contract data on external system.
CN201810210284.5A 2018-03-14 2018-03-14 A kind of block catenary system and data processing method Pending CN108416578A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810210284.5A CN108416578A (en) 2018-03-14 2018-03-14 A kind of block catenary system and data processing method

Applications Claiming Priority (9)

Application Number Priority Date Filing Date Title
CN201810210284.5A CN108416578A (en) 2018-03-14 2018-03-14 A kind of block catenary system and data processing method
BR112020016151-9A BR112020016151A2 (en) 2018-03-14 2019-02-01 METHOD FOR PROCESSING DATA PROCESSING, METHOD FOR PROCESSING DATA, MANAGEMENT END APPLIANCE, USER END APPLIANCE AND COMPUTER-READABLE MEDIA
CA3088712A CA3088712A1 (en) 2018-03-14 2019-02-01 Block chain data processing method, management end, user end, conversion apparatus and medium
PCT/CN2019/074440 WO2019174430A1 (en) 2018-03-14 2019-02-01 Block chain data processing method, management terminal, user terminal, conversion device, and medium
AU2019232978A AU2019232978A1 (en) 2018-03-14 2019-02-01 Block chain data processing method, management terminal, user terminal, conversion device, and medium
KR1020207022809A KR20200108024A (en) 2018-03-14 2019-02-01 Blockchain data processing method, management group, user group, conversion device and medium
US16/965,788 US20210042744A1 (en) 2018-03-14 2019-02-01 Block chain data processing method, management terminal, user terminal, conversion device, and medium
EP19766756.1A EP3731162A1 (en) 2018-03-14 2019-02-01 Block chain data processing method, management terminal, user terminal, conversion device, and medium
SG11202006981QA SG11202006981QA (en) 2018-03-14 2019-02-01 Block chain data processing method, management terminal, user terminal, conversion device, and medium

Publications (1)

Publication Number Publication Date
CN108416578A true CN108416578A (en) 2018-08-17

Family

ID=63131522

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810210284.5A Pending CN108416578A (en) 2018-03-14 2018-03-14 A kind of block catenary system and data processing method

Country Status (1)

Country Link
CN (1) CN108416578A (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109242623A (en) * 2018-08-31 2019-01-18 深圳市有钱科技有限公司 A kind of right to use the land transfer system
CN109242684A (en) * 2018-08-27 2019-01-18 北京京东金融科技控股有限公司 Asset State processing method and device based on block chain
CN110060161A (en) * 2019-03-28 2019-07-26 众安信息技术服务有限公司 It trades anti-heavy client service implementation method and serviced component for block chain
WO2019174430A1 (en) * 2018-03-14 2019-09-19 郑杰骞 Block chain data processing method, management terminal, user terminal, conversion device, and medium
WO2019072287A3 (en) * 2018-11-30 2019-10-03 Alibaba Group Holding Limited Utilizing nonce table to resolve concurrent blockchain transaction failure
CN110602455A (en) * 2019-09-10 2019-12-20 腾讯科技(深圳)有限公司 Video storage system, video processing method, device, equipment and storage medium
WO2020216053A1 (en) * 2019-04-25 2020-10-29 腾讯科技(深圳)有限公司 Distributed data processing method, device, apparatus and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106157142A (en) * 2016-06-30 2016-11-23 惠众商务顾问(北京)有限公司 A kind of block chain common recognition and synchronous method, system and device
US20170076109A1 (en) * 2015-09-12 2017-03-16 Q Bio, Inc Uniform-frequency records with obscured context
CN106649632A (en) * 2016-12-07 2017-05-10 北京众享比特科技有限公司 Data synchronism method and system
CN107451874A (en) * 2017-07-27 2017-12-08 武汉天喻信息产业股份有限公司 Electronic invoice integrated conduct method and system based on block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170076109A1 (en) * 2015-09-12 2017-03-16 Q Bio, Inc Uniform-frequency records with obscured context
CN106157142A (en) * 2016-06-30 2016-11-23 惠众商务顾问(北京)有限公司 A kind of block chain common recognition and synchronous method, system and device
CN106649632A (en) * 2016-12-07 2017-05-10 北京众享比特科技有限公司 Data synchronism method and system
CN107451874A (en) * 2017-07-27 2017-12-08 武汉天喻信息产业股份有限公司 Electronic invoice integrated conduct method and system based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
廖滨华: "网络基础与应用 当代大学生必备必用", 《网络基础与应用 当代大学生必备必用 *

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019174430A1 (en) * 2018-03-14 2019-09-19 郑杰骞 Block chain data processing method, management terminal, user terminal, conversion device, and medium
CN109242684A (en) * 2018-08-27 2019-01-18 北京京东金融科技控股有限公司 Asset State processing method and device based on block chain
CN109242623A (en) * 2018-08-31 2019-01-18 深圳市有钱科技有限公司 A kind of right to use the land transfer system
WO2019072287A3 (en) * 2018-11-30 2019-10-03 Alibaba Group Holding Limited Utilizing nonce table to resolve concurrent blockchain transaction failure
US10540344B2 (en) 2018-11-30 2020-01-21 Alibaba Group Holding Limited Utilizing nonce table to resolve concurrent blockchain transaction failure
CN110060161A (en) * 2019-03-28 2019-07-26 众安信息技术服务有限公司 It trades anti-heavy client service implementation method and serviced component for block chain
WO2020216053A1 (en) * 2019-04-25 2020-10-29 腾讯科技(深圳)有限公司 Distributed data processing method, device, apparatus and medium
CN110602455A (en) * 2019-09-10 2019-12-20 腾讯科技(深圳)有限公司 Video storage system, video processing method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US10348707B2 (en) Rewritable blockchain
KR20180116278A (en) Common information secrets for secure information exchange and hierarchical and deterministic cryptographic keys
CN106982205B (en) Block chain-based digital asset processing method and device
CN109120639B (en) Data cloud storage encryption method and system based on block chain
CN107766542B (en) Partitioned block chain network and method for realizing partitioned query thereof
CN103095453B (en) The Bloom filter of the public key encryption occured simultaneously using privately owned set
Yu et al. Platform-independent secure blockchain-based voting system
Kissel Glossary of key information security terms
CN110300973A (en) The foundation of alliance's block chain network
US5864667A (en) Method for safe communications
Mao Modern cryptography: theory and practice
US8327450B2 (en) Digital safety deposit box
US20180359092A1 (en) Method for managing a trusted identity
EP2228942B1 (en) Securing communications sent by a first user to a second user
US7334255B2 (en) System and method for controlling access to multiple public networks and for controlling access to multiple private networks
WO2020034754A1 (en) Secure multi-party computation method and apparatus, and electronic device
CN110520884A (en) Intelligent bond service outside chain based on credible performing environment
CN107911216A (en) A kind of block chain transaction method for secret protection and system
CN1939028B (en) Accessing protected data on network storage from multiple devices
CN107079036A (en) Registration and authorization method, apparatus and system
CN109417549A (en) The method and apparatus of information proof is provided using centralization or distributed ledger
CN108352015A (en) The anti-loss storage of Secure for the system combination wallet management system based on block chain and encryption key transfer
US9256763B2 (en) Method and system for providing a public key/secret key pair for encrypting and decrypting data
CN106416123B (en) Certification based on password
US7194628B1 (en) Methods and systems for group authentication using the naccache-stern cryptosystem in accordance with a prescribed rule

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination