CN109040133A - The method, apparatus and storage medium of intelligent contract are installed in block chain network - Google Patents

The method, apparatus and storage medium of intelligent contract are installed in block chain network Download PDF

Info

Publication number
CN109040133A
CN109040133A CN201811128489.5A CN201811128489A CN109040133A CN 109040133 A CN109040133 A CN 109040133A CN 201811128489 A CN201811128489 A CN 201811128489A CN 109040133 A CN109040133 A CN 109040133A
Authority
CN
China
Prior art keywords
intelligent contract
source code
key
block chain
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811128489.5A
Other languages
Chinese (zh)
Inventor
史锋锋
刘辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Point Information Technology Co Ltd
Original Assignee
Shanghai Point Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Point Information Technology Co Ltd filed Critical Shanghai Point Information Technology Co Ltd
Priority to CN201811128489.5A priority Critical patent/CN109040133A/en
Publication of CN109040133A publication Critical patent/CN109040133A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment provides the methods for installing intelligent contract in block chain network, comprising: the intelligent contract source code and key that encryption is received at block chain node obtain information;Information is obtained based on the key and sends cipher key acquisition request, wherein includes the signature of block chain node in the cipher key acquisition request, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;Receive the key;The intelligent contract source code of the encryption is decrypted, using the key by operation decryption collector to obtain the intelligent contract source code after decryption;Intelligent contract source code after the decryption is stored in memory associated with the decryption collector;The executable installation file of the intelligent contract is obtained by being compiled to the intelligent contract source code after the decryption;And the intelligent contract is installed by running the executable installation file.

Description

The method, apparatus and storage medium of intelligent contract are installed in block chain network
Technical field
The embodiment of the present invention is related to block chain technology, relates more particularly to a kind of for pacifying in block chain network Fill method, the device for executing the above method and a kind of corresponding computer readable storage medium of intelligent contract.
Background technique
Block chain (Blockchain) has obtained extensive discussion and research as the emerging technology risen in recent years.Area Block chain is with the intelligent peer-to-peer network of distributed data base identification, propagation and information-recording, also referred to as value internet.Block Chain technology includes being guaranteed transmission and access safety etc. with block structure storing data using cryptography, it is consistent can be realized data Property storage, tamper-resistant, the technical system for going to center.
Intelligent contract is a kind of computer protocol for being intended to propagate, verify or execute in a manner of information-based contract, can Show as the computer program accurately run on block chain.User terminal can be traded by using intelligent contract, be shared Data, establish trust and by the characteristic of block chain technology ensure the storages of data, reading, execute whole process it is transparent it is traceable, It can not distort.
Currently, in most cases the source code of intelligent contract is transferred directly to each to need to install the intelligence contract Block chain node, there is no the technical solutions that source code provided by a kind of supplier to intelligent contract is protected.
Summary of the invention
The technical issues of in the presence of the prior art, the first aspect of the embodiment of the present invention provide one kind and are used for The method of intelligent contract is installed in block chain network, which comprises
The intelligent contract source code and key that encryption is received at block chain node obtain information;
Information is obtained based on the key and sends cipher key acquisition request, wherein includes block in the cipher key acquisition request The signature of chain node, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;
Receive the key;
The intelligent contract source code of the encryption is decrypted, using the key by operation decryption collector to obtain solution Intelligent contract source code after close;
Intelligent contract source code after the decryption is stored in memory associated with the decryption collector;
The executable installation of the intelligent contract is obtained by being compiled to the intelligent contract source code after the decryption File;And
The intelligent contract is installed by running the executable installation file.
In addition, the second aspect of the embodiment of the present invention provides one kind for installing intelligent contract in block chain network Device, described device includes:
Processor;And
Memory makes the processor execute following operation when described instruction executes for storing instruction:
The intelligent contract source code and key that encryption is received at block chain node obtain information;
Information is obtained based on the key and sends cipher key acquisition request, wherein includes block in the cipher key acquisition request The signature of chain node, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;
Receive the key;
The intelligent contract source code of the encryption is decrypted, using the key by operation decryption collector to obtain solution Intelligent contract source code after close;
Intelligent contract source code after the decryption is stored in memory associated with the decryption collector;
The executable installation of the intelligent contract is obtained by being compiled to the intelligent contract source code after the decryption File;And
The intelligent contract is installed by running the executable installation file.
In addition, the third aspect of the embodiment of the present invention additionally provides a kind of computer readable storage medium, has and deposit The computer-readable program instructions of storage on it, the computer-readable program instructions are for executing first party according to the present invention Method described in face for installing intelligent contract in block chain network.
Pass through method, the use provided by embodiment according to the present invention for the intelligent contract of installation in block chain network In the device and corresponding computer readable storage medium for installing intelligent contract in block chain network by intelligent contract source generation Code is only stored in memory associated with the decryption collector, so that the local storage of the block chain node In do not preserve the intelligence contract source code, and then will not be deposited due to the local of other block chain this block of node visit chain link points Reservoir and obtain intelligent contract source code, thus, it is possible to effectively guarantee the safety of the source code of the intelligent contract on block chain, Guarantee that source code is not obtained by unauthorized party, so that the privacy of the source code of the intelligent contract on block chain is protected Shield.Other advantages of the invention will be explained further below.
Detailed description of the invention
It refers to the following detailed description in conjunction with the accompanying drawings, the feature, advantage and other aspects of various embodiments of the present invention will become Must be more obvious, show several embodiments of the invention by way of example rather than limitation herein, in the accompanying drawings:
Fig. 1 shows the architecture diagram of authorized service centers' system 100 of embodiment according to the present invention;;
Fig. 2 shows the schematic diagrames for the process 200 of embodiment according to the present invention operated to intelligent contract;
Fig. 3 shows the method 300 for the intelligent contract of installation in block chain network of embodiment according to the present invention Schematic flow diagram;
Fig. 4 shows according to an embodiment of the invention for installing the device of intelligent contract in block chain network 400 schematic block diagram;And
Fig. 5 shows the dress for the intelligent contract of installation in block chain network according to another embodiment of the invention Set 500 schematic block diagram.
Specific embodiment
Below with reference to each exemplary embodiment of attached drawing detailed description of the present invention.Although examples described below side Method, device include the software and/or firmware executed on hardware in other components, it should be noted that these examples are only It is merely illustrative, and is not to be taken as restrictive.For example, it is contemplated that within hardware exclusively, in software exclusively or Any or all hardware, software and fastener components can be implemented in any combination of hardware and software.Therefore, although below Illustrative method and apparatus are described, but those skilled in the art should be easily understood that, provided example is not used to Limit the mode for realizing these method and apparatus.
In addition, flowcharts and block diagrams in the drawings show method and system according to various embodiments of the present invention can The architecture, function and operation being able to achieve.It should be noted that function marked in the box can also be according to different from attached drawing The sequence marked occurs.For example, two boxes succeedingly indicated can actually be basically executed in parallel or they have When can also execute in a reverse order, this depend on related function.It should also be noted that flow chart and/or Function as defined in execution or behaviour can be used in the combination of each box in block diagram and the box in flowchart and or block diagram The dedicated hardware based system made is realized, or the combination of specialized hardware and computer instruction can be used to realize.
Before specific embodiment according to the present invention is discussed in detail, first to some terms used in the present invention into Row explanation.
In the present invention, refer to can be to received encryption in block chain node for term " decryption collector " Intelligent contract source code is decrypted and is compiled into the module of executable installation file, either hardware module, it can also To be software module.From the point of view of specific, the form of expression can be a container, can run correlative code wherein;It can also be with It is a process, to realize above-mentioned function;It is also possible to an intelligent contract.
In the present invention, term " supplier of intelligent contract " is with the people for permitting other people to use the right of intelligent contract Or unit, for example, it can be the author of intelligent contract.
In the present invention, term " the installation destination of intelligent contract " refers to by specifying for the mount request of intelligent contract , the block chain node that the intelligence contract will be mounted to, for example, the destination of intelligent contract can be specified by mount request Block chain network in some block chain address of node.
In the present invention, term " authorized service centers " refers to intelligent contract publishing platform.For example, the offer of intelligent contract Person can issue in authorized service centers, permit using intelligent contract, and user can browse in authorized service centers, look into It sees, download intelligent contract.
In the present invention, term " key acquisition information " is to refer to carry out by source code of its acquisition to intelligent contract The information of the key of encryption, such as can be the storage address information of key, the method information or code book for generating key In corresponding key location information etc..
Before specific solution is unfolded, applicant of the present invention introduces the application that the present invention is based on first The technical issues of scene and the present invention are based on.
It, will if a block chain node needs to install some intelligent contract among existing block chain network The source code that the intelligence contract can be for example directly acquired from the authorized service centers for communicating connection, is then compiled and pacifies Dress, before compiling, block chain node can at least be deposited the local that intelligent contract source code is stored temporarily in this block chain link point Among reservoir, other block chain nodes just can obtain the intelligence by accessing the local storage of this block chain link point as a result, Energy contract source code, so that the source code of intelligent contract is possible to be compromised, i.e., it is possible that being obtained by unauthorized parties, That is not protected in the prior art for intelligent contract source code.
Generally, the embodiment provides a kind of method for installing intelligent contract in block chain network, In the method, intelligent contract source code is transmitted in the way of unencryption not in a manner of untreated first, in addition, Intelligent contract source code is not only transmitted in a manner of encryption, and the intelligent contract source code after decryption is also not stored in block chain It is instead to be stored in the intelligent contract source code after decryption and decryption collector among the local storage of node In associated memory, so that the intelligence contract source code is not preserved in the local storage of the block chain node, into Intelligent contract source code is obtained without the local storage due to other block chain this block of node visit chain link points;Again Person, due to the presence of protective separation mechanism memory-based, so that the user for even possessing the block chain node can not also look into The intelligence contract source code is seen, to ensure that the safety of the intelligence contract source code.
In addition, in the scheme of the embodiment of the present invention, pass through authorized service centers' (such as block chain, that is, service platform (Blockchain as a Service:BaaS)) for block chain node encrypted intelligent contract source code is provided, and in area The intelligence can be installed to close by operations such as parsing, the compilings of intelligent contract source code for the encryption on block chain node About.
Furthermore in the scheme of the embodiment of the present invention, mount request of the authorized service centers based on user, to block chain Node provides the intelligent contract source code and key associated with the encrypted intelligent contract source code of encrypted protection Obtain information.Using the scheme of the embodiment of the present invention, information can be obtained to intelligent contract and its key and carry out unique terrestrial reference Know, and is encrypted by the source code to intelligent contract to protect intelligent contract source code, therefore block chain link can be controlled Perhaps user for example can be only to the block chain node of authorization or user's open-source generation to the access of intelligent contract source code for point Code obtains permission.In some embodiments of the invention, it is also proposed that block chain, that is, service platform based on cloud is directed to alliance The authorization that chain provides intelligent contract source code obtains scheme.Therefore, the solution of the present invention constructs block chain intelligence contract ecology Platform protects control of the supplier of intelligent contract for intelligent contract source code significantly.
In the following, carrying out each embodiment that the present invention will be described in detail in conjunction with attached drawing.
Referring now to Fig. 1, it illustrates authorized service centers' system architecture diagrams of embodiment according to the present invention.Shown in Fig. 1 Authorized service centers' system 100 be used for for intelligence contract the service of authorization is provided.As shown in Figure 1, authorized service centers System 100 includes authorized service centers 120.In some embodiments, authorized service centers 120 can be implemented as area based on cloud Block chain, that is, service platform.Authorized service centers' system 100 further includes the multiple block chain networks connecting with authorized service centers 120 140,150,160.Each of block chain network 140,150,160 all includes multiple block chain nodes.For example, block link network Network 140 includes block chain node 1401,1402,1403.Block chain network 150 includes block chain node 1501,1502,1503. Block chain network 160 includes block chain node 1601,1602,1603.
In cloud application environment, each block chain node can correspond to virtual machine instance, and phase is run in virtual machine instance The node application program answered.It should be appreciated that although block chain network 140,150,160 is illustrated as respective independence, each block Chain network also may include common block chain node.For example, some block chain node not only may belong to block chain network 140 but also It may belong to block chain network 150.In Fig. 1, the quantity of block chain network quantity and block chain node be it is schematical, can To be any amount.
With continued reference to Fig. 1, the supplier 110 of intelligent contract provides installable intelligent contract to authorized service centers 120. The supplier 110 of intelligent contract has the right for permitting other people to obtain its intelligent contract source code.In some embodiments, intelligence The supplier 110 of contract is the author of intelligent contract.In some embodiments, the supplier 110 of intelligent contract can be from intelligence The author of contract secures permission, and other people obtain the right of its intelligent contract source code, so that the supplier 110 of intelligent contract has Other people are permitted to use the right of its intelligent contract source code.User 130 is specific block chain link by authorized service centers 120 Some intelligent contract of point installation.Then, authorized service centers 120 are according to the demand of user 130 by the intelligent contract source generation of encryption Code and key associated therewith obtain information and are provided to block chain node for installing the intelligence contract.
In some embodiments, the supplier 110 of the communication in system architecture 100 and intelligent contract, user 130 with Communication between authorized service centers 120 can be based on any wired and or wireless network, including but not limited to internet, wide Domain net, Metropolitan Area Network (MAN), local area network, Virtual Private Network (VPN), wireless network etc..
In some embodiments, each block chain node 1401- in user 130 and block chain network 140-160 1403,1501-1503,1601-1603 can be electronic equipment, such as fixed equipment (such as server or desktop computer), Or mobile device (such as smart phone, tablet computer, portable computer etc.).
Then, referring to fig. 2, it illustrates the mistakes of embodiment according to the present invention operated to intelligent contract source code The schematic diagram of journey 200.User 130, authorized service centers 120 and block chain node 1401 is shown in FIG. 2.It should be appreciated that Each object or functional module are shown only for promoting description, some of them object or functional module can reside in same In a physical entity or certain objects or functional module can reside in virtual environment based on cloud.For example, authorization service Center 120 and block chain node 1401 can be in virtual environments based on cloud.Therefore, discrete object or mould shown in Fig. 2 Block is only illustrative, and the present invention is in this regard with no restrictions.
The foregoing describe the query process entirely completed, will connect below attached drawing 2 come description block chain node installation and Control specific steps when intelligent contract.
As shown in Fig. 2, authorized service centers 120 are optionally able to from the supplier 110 of intelligent contract, reception (202) can The intelligent contract of installation, next, the authorized service centers 120 are optionally able to the essential information of the intelligent contract of publication (204), User 130 for example, by browsing these essential informations or can obtain these essential informations by other channels, then determine One intelligent contract is installed to some or certain block chain link points, at this point, user 130 can send out to authorized service centers 120 Send (306) mount request, the installation destination in the mount request for example comprising the intelligent contract, such as it is specified by some Intelligent contract is mounted on block chain node 1401, and authorized service centers 120 are after receiving such mount request, it will The source code of intelligent contract is encrypted, the intelligent contract source code that (208) generate encryption is then generated;Correspondingly, Authorized service centers 120 can also generate (210) key associated with the intelligent contract source code of encryption and obtain information, wherein Key obtains information and is used to decrypt the intelligent contract source code of the encryption for obtaining key, key.Generating this two After divided data, the intelligent contract source code of the encryption and the key can be obtained information and provided by authorized service centers 120 To the installation destination, such as block chain node 1401.By being used for provided by embodiment according to the present invention in block The method that intelligent contract is provided in chain network can effectively guarantee the transmission safety of the source code of the intelligent contract on block chain, Guarantee that source code is not obtained by unauthorized party, so that the privacy of the source code of the intelligent contract on block chain is protected Shield.
Here, the intelligent contract source code and key of encryption, which obtain information, both can be sent to installation in a data packet The block chain node of destination, merely with this data packet when installation.At this point, the data packet is not or not to add all over Close, which is surrounded by specific format, and encryption is wanted to see that content therein, such as source code portion therein must be Encryption, and rest part can be and not encrypt.Such as key obtains information.The data packet can also be comprising being not added for another example Close the following contents: intelligent contract unique identification, the cryptographic Hash (HASH value) of the intelligence contract source code, the intelligence contract source generation One or more signatures of code, other related datas of the intelligence contract etc., wherein the cryptographic Hash of the intelligence contract source code (HASH value) for verifying for whether the source code of intelligent contract is modified, intelligent contract unique identification is for indicating this Title or number of intelligent contract etc., and one or more signatures of intelligent contract source code for show the intelligence contract by Which tissue license.
Those skilled in the art is it will also be understood that can also obtain information for the intelligent contract source code and key of encryption It independently opens, i.e., is sent to the block chain node of installation destination respectively as independent data packet.
Next, block chain node (such as block chain node 1401) is being received by such as i.e. service platform of block chain After the intelligent contract source code and key encrypted provided by authorized service centers 120 obtains information, block chain node 1401 (402) cipher key acquisition request can will be sent to authorized service centers 120, correspond ground, authorized service centers 120 are connecing After receiving cipher key acquisition request, it will authentication (214) are carried out to the signature of block chain node 1401, if authentication Pass through, then corresponding key can for example be encrypted by the Secure Socket Layer of link level (Secure Sockets Layer:SSL) Mode provides (216) to block chain node 1401, next, block chain node 1401 can receive the key and by making The intelligent contract source code of (403) described encryption is decrypted with the key to obtain the intelligent contract source code, then connect down , block chain node 1401 is by the way that the intelligent contract source code after decryption to be stored in the memory of the block chain node and incite somebody to action In the associated memory of decryption collector that the intelligent contract source code is decrypted and is compiled, and to decryption after The intelligence contract source code is compiled to obtain the executable installation file of (404) the intelligent contract;And area postrema Block chain node 1401 installs (405) described intelligent contract by running the executable installation file.So far, by user 130 Specified intelligent contract is installed on the block chain node 1401 specified by user 130, and in the transmission of source code The state always in encryption, the intelligent contract source code after decryption are only stored in the memory of the block chain node in the process In in memory associated with the decryption collector that will the intelligent contract source code will be decrypted and be compiled, thus prevent The user of other block chain nodes and this block chain link point decrypted after intelligent contract source code to preventing source code It divulges a secret, so that the privacy of the source code of the intelligent contract on block chain is protected.
The offer of the entire intelligent contract of one embodiment according to the present invention is provided from the angle of whole system above And installation process.Next, the application will be from the angle of the block chain node 1401 of the specific intelligent contract of specific final installation To illustrate the method 300 for the intelligent contract of installation in block chain network of one embodiment according to the present invention.
Fig. 3 shows the method 300 for the intelligent contract of installation in block chain network of embodiment according to the present invention Schematic flow diagram.From figure 3, it can be seen that one embodiment according to the present invention for providing intelligence in block chain network The method 300 of energy contract includes at least following seven steps, firstly, receiving and adding at block chain node in method and step 310 Close intelligent contract source code and key obtain information, such as the intelligent contract source generation of encryption is received from block chain, that is, service platform Code and key obtain information;After the intelligent contract source code and key for receiving encryption obtain information, in method and step 320 In based on the key obtain information send cipher key acquisition request, wherein in the cipher key acquisition request include block chain node Signature, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;Then, in method and step 330 In, it receives the key and next, is decrypted by operation decryption collector using the key in method and step 340 The intelligent contract source code of the encryption, to obtain the intelligent contract source code after decryption;Next, in method and step 350 The middle intelligent contract source code by after the decryption is stored in memory associated with the decryption collector, so that Other block chain nodes cannot access the intelligent contract source code after the decryption.Next, in method and step 360 by pair Intelligent contract source code after the decryption is compiled the executable installation file for obtaining the intelligent contract and finally exists The intelligent contract is installed in method and step 3700 by running the executable installation file.Method energy according to the present invention Safety of the source code of intelligent contract after enough ensure to encrypt and decryption at block chain node, and then ensure that for intelligence The protection of energy contract source code.
In one embodiment according to the present invention, the decryption collector is realized in the form of intelligent contract.Ability As long as the technical staff in domain each falls within protection model of the invention it is to be appreciated that other forms can be realized design according to the present invention Within enclosing.
In one embodiment according to the present invention, the method can also be the following steps are included: i.e. to the encryption Intelligent contract source code does completeness check;And in the unsanctioned situation of the completeness check, sends and add for described The source code acquisition request of close intelligent contract source code and the intelligent contract source code for receiving the encryption again.Thus, it is possible to It is enough to obtain corresponding intelligent contract source code again in the intelligent incomplete situation of contract source code of received encryption, Improve the success rate for installing intelligent contract.
In one embodiment according to the present invention, the completeness check includes cryptographic Hash verification or GPG (GNU Privacy Guard:GNU Privacy Guard) signature check.Those skilled in the art is it is to be appreciated that other feasible verification sides Method is also included within protection scope required by claim according to the present invention.
In one embodiment according to the present invention, the key obtains the storage address information that information is key, generates The location information of corresponding key in the method information or code book of key.For example, it includes code key institute that code key, which obtains information, The address information (such as authorized service centers 120 or some block chain, that is, service platform address) of storage;Code key obtains letter Breath is also possible to a kind of method information, such as Hash value function etc. for generating key;In addition, code key obtains institute in information password sheet The location information of corresponding key, for example, code book which row which column etc. information.
In one embodiment according to the present invention, receiving the key further comprises: by Secure Socket Layer channel Receive the key.Thus, it is possible to ensure the safety of code key by the physical attribute of Secure Socket Layer channel.
One embodiment that Fig. 4 shows content according to the present invention is proposed intelligent for running in block chain network The device 400 of contract.Figure 4, it is seen that the device 400 includes processor 410 and the memory with the coupling of processor 410 420。
Memory 420 is stored with instruction.Instruction makes processor 410 execute following movement when being executed by processor 410:
The intelligent contract source code and key that encryption is received at block chain node obtain information;
Information is obtained based on the key and sends cipher key acquisition request, wherein includes block in the cipher key acquisition request The signature of chain node, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;
Receive the key;
The intelligent contract source code of the encryption is decrypted, using the key by operation decryption collector to obtain solution Intelligent contract source code after close;
Intelligent contract source code after the decryption is stored in memory associated with the decryption collector;
The executable installation of the intelligent contract is obtained by being compiled to the intelligent contract source code after the decryption File;And
The intelligent contract is installed by running the executable installation file.
In one embodiment according to the present invention, the decryption collector is realized in the form of intelligent contract.
In one embodiment according to the present invention, the processor is also made to execute following behaviour when described instruction executes Make:
Completeness check is done to the intelligent contract source code of the encryption;And
In the unsanctioned situation of the completeness check, the source generation of the intelligent contract source code for the encryption is sent Code acquisition request and the intelligent contract source code for receiving the encryption again.
In one embodiment according to the present invention, the completeness check includes cryptographic Hash verification or GPG signature check.
In one embodiment according to the present invention, the key obtains the storage address information that information is key, generates The location information of corresponding key in the method information or code book of key.
In one embodiment according to the present invention, receiving the key further comprises:
The key is received by Secure Socket Layer channel.
In addition, alternatively, the above method can be by computer program product, i.e. computer readable storage medium is real It is existing.Computer program product may include computer readable storage medium, containing for executing each of the content of present invention The computer-readable program instructions of aspect.Computer readable storage medium, which can be, can keep and store by instruction execution equipment The tangible device of the instruction used.Computer readable storage medium for example can be but not limited to storage device electric, magnetic storage is set Standby, light storage device, electric magnetic storage apparatus, semiconductor memory apparatus or above-mentioned any appropriate combination.It is computer-readable The more specific example (non exhaustive list) of storage medium includes: portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), static random access memory (SRAM), Portable compressed disk read-only memory (CD-ROM), digital versatile disc (DVD), memory stick, floppy disk, mechanical coding Equipment, the punch card for being for example stored thereon with instruction or groove internal projection structure and above-mentioned any appropriate combination.Here Used computer readable storage medium is not interpreted instantaneous signal itself, such as radio wave or other Free propagations Electromagnetic wave, the electromagnetic wave (for example, the light pulse for passing through fiber optic cables) propagated by waveguide or other transmission mediums or logical Cross the electric signal of electric wire transmission.
One embodiment that Fig. 5 shows content according to the present invention is proposed intelligent for installing in block chain network The schematic block diagram of the device 500 of contract.It is used in Fig. 3 in block chain it should be appreciated that device 500 may be implemented as realizing The function of the method 300 of intelligent contract is installed in network.As can be seen from Figure 5 the device 500 includes central processing unit (CPU) 501 (such as processor), can according to the computer program instructions being stored in read-only memory (ROM) 502 or The computer program instructions in random access storage device (RAM) 503 are loaded into from storage unit 508, it is various appropriate to execute Movement and processing.In RAM 503, it can also store the device 500 and operate required various programs and data.CPU 501,ROM 502 and RAM 503 is connected with each other by bus 504.Input/output (I/O) interface 505 is also connected to bus 504.
Multiple components in device 500 are connected to I/O interface 505, comprising: input unit 506, such as keyboard, mouse etc.; Output unit 507, such as various types of displays, loudspeaker etc.;Storage unit 508, such as disk, CD etc.;And it is logical Believe unit 509, such as network interface card, modem, wireless communication transceiver etc..It is all that communication unit 509 allows the device 500 to pass through As the computer network of internet and/or various telecommunication networks exchange information/data with other equipment.
Various methods described above, such as method 300 for installing intelligent contract in block chain network can be by Processing unit 501 executes.For example, in some embodiments, the method 300 for installing intelligent contract in block chain network can Computer software programs are implemented as, machine readable media, such as storage unit 508 are tangibly embodied in.In some realities It applies in example, some or all of of computer program can be loaded into and/or pacify via ROM 502 and/or communication unit 509 It is attached on device 500.When computer program is loaded into RAM 503 and is executed by processor CPU 501, can execute above One or more movements or step in the method 300 for installing intelligent contract in block chain network of description.
In general, various example embodiments of the invention can in hardware or special circuit, software, firmware, logic, or Implement in any combination thereof.Some aspects can be implemented within hardware, and other aspects can be can be by controller, micro process Implement in the firmware or software that device or other calculating equipment execute.When the various aspects of the embodiment of the present invention are illustrated or described as When block diagram, flow chart or other certain graphical representations of use, it will be understood that box described herein, device, system, techniques or methods Can be used as unrestricted example hardware, software, firmware, special circuit or logic, common hardware or controller or other It calculates and implements in equipment or its certain combination.
Although described above is various example embodiments of the invention can realize in hardware or special circuit, on Stating can both be implemented in hardware for the data processing equipment of block chain, can also be by way of software come real It is existing, this is because: in the 1990s, a technological improvement can easily belong to the improvement on hardware to the improvement (for example, improvement to circuit structures such as diode, transistor, switches) still falls within the improvement on software (such as method The improvement of process).However, with the sustainable development of technology, the improvement of many method flows of today can nearly all pass through by Improved method flow is programmed into hardware circuit to realize, in other words, by programming different programs for hardware circuit To obtaining corresponding hardware circuit, that is, realize the change of hardware circuit, therefore the improvement of such method flow It can also be considered as directly improving for hardware circuit.Therefore, it cannot be said that the improvement of a method flow cannot use hardware Entity module is realized.For example, programmable logic device (Programmable Logic Device:PLD) (such as scene can Program gate array (Field Programmable Gate Array:FPGA)) it is exactly such a integrated circuit, logic function Device programming can be determined by user.It is voluntarily programmed by designer a digital display circuit " integrated " may be programmed a piece of On logical device, dedicated IC chip is designed and made without asking chip maker.Moreover, nowadays replacing IC chip is manually made, this programming is also used " logic compiler (logic compi1er) " software instead mostly and come in fact Existing, software compiler used is similar when it writes with program development, and the source code before compiling is also handy specific Programming language write, this is referred to as hardware description language (Hardware Description Language:HDL), and HDL also not only-kind, but there are many kind, as ABEL (Advanced Boolean Expression Language), AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、 Lola, MyHDL, PALASM, RHDL (Ruby Hardware Description Language) etc., most generally use at present VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) with Verilog.Those skilled in the art, which also will be apparent to the skilled artisan that, only to need with above-mentioned several hardware description languages slightly to patrol method flow It collects and programs and be programmed into integrated circuit, so that it may be readily available the hardware circuit for realizing the logical method process.
For executing the computer-readable program instructions or computer program product of the various aspects of the content of present invention It can store beyond the clouds, when needing to call, user can be accessed by mobile Internet, fixed network or other networks and is stored in The computer-readable program instructions of the one side for executing the content of present invention on cloud, thus implementation basis the content of present invention Various aspects disclosed in technical solution.
The foregoing is merely the embodiment alternative embodiment of the content of present invention, the embodiment being not intended to restrict the invention, For those skilled in the art, the embodiment of the present invention can have various modifications and variations.It is all in implementation of the invention Within the spirit and principle of example, made any modification, equivalence replacement, improvement etc. should be included in the embodiment of the present invention Within protection scope.
Although by reference to several embodiments that specific examples describe the present invention, but it is to be understood that of the invention Embodiment is not limited to disclosed specific embodiment.The embodiment of the present invention be intended to cover appended claims spirit and Included various modifications and equivalent arrangements in range.The scope of the claims meets broadest explanation, thus comprising all Such modification and equivalent structure and function.

Claims (13)

1. a kind of method for installing intelligent contract in block chain network, which comprises
The intelligent contract source code and key that encryption is received at block chain node obtain information;
Information is obtained based on the key and sends cipher key acquisition request, wherein includes the block in the cipher key acquisition request The signature of chain node, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;
Receive the key;
The intelligent contract source code for decrypting the encryption using the key by operation decryption collector, after obtaining decryption Intelligent contract source code;
Intelligent contract source code after the decryption is stored in memory associated with the decryption collector;
The executable installation file of the intelligent contract is obtained by being compiled to the intelligent contract source code after the decryption; And
The intelligent contract is installed by running the executable installation file.
2. according to the method described in claim 1, wherein, the decryption collector is realized in the form of intelligent contract.
3. according to the method described in claim 1, the method also includes:
Completeness check is done to the intelligent contract source code of the encryption;And
In the unsanctioned situation of the completeness check, the source code sent for the intelligent contract source code of the encryption is obtained Take the intelligent contract source code for requesting and receiving again the encryption.
4. according to the method described in claim 3, wherein, the completeness check includes cryptographic Hash verification or GPG signature check.
5. according to the method described in claim 1, wherein, the key obtains the storage address information that information is key, generates The location information of corresponding key in the method information or code book of key.
6. according to the method described in claim 1, wherein, receiving the key further comprises:
The key is received by Secure Socket Layer channel.
7. a kind of for installing the device of intelligent contract in block chain network, described device includes:
Processor;And
Memory makes the processor execute following operation when described instruction executes for storing instruction:
The intelligent contract source code and key that encryption is received at block chain node obtain information;
Information is obtained based on the key and sends cipher key acquisition request, wherein includes block chain link in the cipher key acquisition request The signature of point, and wherein, the key is used to decrypt the intelligent contract source code of the encryption;
Receive the key;
The intelligent contract source code for decrypting the encryption using the key by operation decryption collector, after obtaining decryption Intelligent contract source code;
Intelligent contract source code after the decryption is stored in memory associated with the decryption collector;
The executable installation file of the intelligent contract is obtained by being compiled to the intelligent contract source code after the decryption; And
The intelligent contract is installed by running the executable installation file.
8. device according to claim 7, wherein the decryption collector is realized in the form of intelligent contract.
9. device according to claim 7 also makes the processor execute following operation when described instruction executes:
Completeness check is done to the intelligent contract source code of the encryption;And
In the unsanctioned situation of the completeness check, the source code sent for the intelligent contract source code of the encryption is obtained Take the intelligent contract source code for requesting and receiving again the encryption.
10. device according to claim 9, wherein the completeness check includes cryptographic Hash verification or GPG signature school It tests.
11. device according to claim 7, wherein the key obtains the storage address information that information is key, generates The location information of corresponding key in the method information or code book of key.
12. device according to claim 8, wherein receiving the key further comprises:
The key is received by Secure Socket Layer channel.
13. a kind of computer readable storage medium has the computer-readable program instructions being stored thereon, the computer Readable program instructions are according to any one of claim 1 to 6 for installing intelligence in block chain network for executing The method of contract.
CN201811128489.5A 2018-09-27 2018-09-27 The method, apparatus and storage medium of intelligent contract are installed in block chain network Pending CN109040133A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811128489.5A CN109040133A (en) 2018-09-27 2018-09-27 The method, apparatus and storage medium of intelligent contract are installed in block chain network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811128489.5A CN109040133A (en) 2018-09-27 2018-09-27 The method, apparatus and storage medium of intelligent contract are installed in block chain network

Publications (1)

Publication Number Publication Date
CN109040133A true CN109040133A (en) 2018-12-18

Family

ID=64618307

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811128489.5A Pending CN109040133A (en) 2018-09-27 2018-09-27 The method, apparatus and storage medium of intelligent contract are installed in block chain network

Country Status (1)

Country Link
CN (1) CN109040133A (en)

Cited By (14)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109615378A (en) * 2019-01-24 2019-04-12 上海点融信息科技有限责任公司 Multi-party computations method, apparatus and readable storage medium storing program for executing based on block chain
CN110020855A (en) * 2019-01-31 2019-07-16 阿里巴巴集团控股有限公司 Method, the node, storage medium of secret protection are realized in block chain
CN110190968A (en) * 2019-06-03 2019-08-30 魏靖 Block chain big data security processing system and method
CN111178887A (en) * 2019-12-27 2020-05-19 远光软件股份有限公司 Distributed photovoltaic power generation and sale system and method based on block chain
CN111538521A (en) * 2020-04-24 2020-08-14 中国工商银行股份有限公司 Intelligent contract deployment and transaction method and device
WO2020172880A1 (en) * 2019-02-28 2020-09-03 云图有限公司 Data processing method for blockchain contract and server
WO2020233637A1 (en) * 2019-05-20 2020-11-26 创新先进技术有限公司 Receipt storage method combining code labelling with user type, and node
CN112567414A (en) * 2019-04-04 2021-03-26 华为技术有限公司 Method and device for operating intelligent contract
CN112883436A (en) * 2021-02-08 2021-06-01 北京微芯区块链与边缘计算研究院 Chip device special for intelligent contract, execution method and block chain link point device
CN112907243A (en) * 2021-02-09 2021-06-04 工银科技有限公司 Block chain transaction auditing method and device
WO2021114796A1 (en) * 2019-12-11 2021-06-17 支付宝(杭州)信息技术有限公司 Method and apparatus for updating trusted point in multi-layer blockchain structure
CN113360937A (en) * 2021-08-10 2021-09-07 北京中超伟业信息安全技术股份有限公司 Cloud platform key distribution method and system based on intelligent contracts
CN113472512A (en) * 2021-06-10 2021-10-01 东软集团股份有限公司 Intelligent contract execution method and device, storage medium and electronic equipment
EP4121849A4 (en) * 2020-03-20 2024-04-03 Mastercard International Inc Method and system for auditing smart contracts

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090058184A (en) * 2007-12-04 2009-06-09 주식회사 텔레칩스 Virtual machine based mobile application protecting system, and method for the same
US20100146293A1 (en) * 2008-12-09 2010-06-10 Haixia Shi Apparatus, system, method, and computer program product for executing a program utilizing a processor to generate keys for decrypting content
CN104318135A (en) * 2014-10-27 2015-01-28 中国科学院信息工程研究所 Java code safety dynamic loading method on basis of trusted execution environment
CN105122255A (en) * 2012-12-17 2015-12-02 微软技术许可有限责任公司 Management system for point of care testing
CN107038352A (en) * 2016-02-03 2017-08-11 上海思立微电子科技有限公司 Intranet security access method, device and terminal
CN107273759A (en) * 2017-05-08 2017-10-20 上海点融信息科技有限责任公司 Method, equipment and computer-readable recording medium for protecting block chain data
CN107342858A (en) * 2017-07-05 2017-11-10 武汉凤链科技有限公司 A kind of intelligent contract guard method and system based on trusted context
CN107943469A (en) * 2017-11-17 2018-04-20 深圳圣马歌科技有限公司 A kind of dissemination method and device of intelligence contract
CN108235772A (en) * 2017-12-29 2018-06-29 深圳前海达闼云端智能科技有限公司 Data processing method, device, storage medium and electronic equipment based on block chain
US20180198630A1 (en) * 2015-11-26 2018-07-12 International Business Machines Corporation System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger
CN108399319A (en) * 2017-09-30 2018-08-14 平安科技(深圳)有限公司 Source code guard method, application server and computer readable storage medium

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20090058184A (en) * 2007-12-04 2009-06-09 주식회사 텔레칩스 Virtual machine based mobile application protecting system, and method for the same
US20100146293A1 (en) * 2008-12-09 2010-06-10 Haixia Shi Apparatus, system, method, and computer program product for executing a program utilizing a processor to generate keys for decrypting content
CN105122255A (en) * 2012-12-17 2015-12-02 微软技术许可有限责任公司 Management system for point of care testing
CN104318135A (en) * 2014-10-27 2015-01-28 中国科学院信息工程研究所 Java code safety dynamic loading method on basis of trusted execution environment
US20180198630A1 (en) * 2015-11-26 2018-07-12 International Business Machines Corporation System, method, and computer program product for privacy-preserving transaction validation mechanisms for smart contracts that are included in a ledger
CN107038352A (en) * 2016-02-03 2017-08-11 上海思立微电子科技有限公司 Intranet security access method, device and terminal
CN107273759A (en) * 2017-05-08 2017-10-20 上海点融信息科技有限责任公司 Method, equipment and computer-readable recording medium for protecting block chain data
CN107342858A (en) * 2017-07-05 2017-11-10 武汉凤链科技有限公司 A kind of intelligent contract guard method and system based on trusted context
CN108399319A (en) * 2017-09-30 2018-08-14 平安科技(深圳)有限公司 Source code guard method, application server and computer readable storage medium
CN107943469A (en) * 2017-11-17 2018-04-20 深圳圣马歌科技有限公司 A kind of dissemination method and device of intelligence contract
CN108235772A (en) * 2017-12-29 2018-06-29 深圳前海达闼云端智能科技有限公司 Data processing method, device, storage medium and electronic equipment based on block chain

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109615378A (en) * 2019-01-24 2019-04-12 上海点融信息科技有限责任公司 Multi-party computations method, apparatus and readable storage medium storing program for executing based on block chain
CN110020855B (en) * 2019-01-31 2020-05-29 阿里巴巴集团控股有限公司 Method, node and storage medium for realizing privacy protection in block chain
CN110020855A (en) * 2019-01-31 2019-07-16 阿里巴巴集团控股有限公司 Method, the node, storage medium of secret protection are realized in block chain
WO2020172880A1 (en) * 2019-02-28 2020-09-03 云图有限公司 Data processing method for blockchain contract and server
CN112567414A (en) * 2019-04-04 2021-03-26 华为技术有限公司 Method and device for operating intelligent contract
WO2020233637A1 (en) * 2019-05-20 2020-11-26 创新先进技术有限公司 Receipt storage method combining code labelling with user type, and node
CN110190968A (en) * 2019-06-03 2019-08-30 魏靖 Block chain big data security processing system and method
WO2021114796A1 (en) * 2019-12-11 2021-06-17 支付宝(杭州)信息技术有限公司 Method and apparatus for updating trusted point in multi-layer blockchain structure
CN111178887A (en) * 2019-12-27 2020-05-19 远光软件股份有限公司 Distributed photovoltaic power generation and sale system and method based on block chain
EP4121849A4 (en) * 2020-03-20 2024-04-03 Mastercard International Inc Method and system for auditing smart contracts
CN111538521A (en) * 2020-04-24 2020-08-14 中国工商银行股份有限公司 Intelligent contract deployment and transaction method and device
CN111538521B (en) * 2020-04-24 2024-02-09 中国工商银行股份有限公司 Intelligent contract deployment and transaction method and device
CN112883436A (en) * 2021-02-08 2021-06-01 北京微芯区块链与边缘计算研究院 Chip device special for intelligent contract, execution method and block chain link point device
CN112907243A (en) * 2021-02-09 2021-06-04 工银科技有限公司 Block chain transaction auditing method and device
CN113472512A (en) * 2021-06-10 2021-10-01 东软集团股份有限公司 Intelligent contract execution method and device, storage medium and electronic equipment
CN113360937A (en) * 2021-08-10 2021-09-07 北京中超伟业信息安全技术股份有限公司 Cloud platform key distribution method and system based on intelligent contracts
CN113360937B (en) * 2021-08-10 2021-11-05 北京中超伟业信息安全技术股份有限公司 Cloud platform key distribution method and system based on intelligent contracts

Similar Documents

Publication Publication Date Title
CN109040133A (en) The method, apparatus and storage medium of intelligent contract are installed in block chain network
CN109255210A (en) The method, apparatus and storage medium of intelligent contract are provided in block chain network
US10917394B2 (en) Data operations using a proxy encryption key
US10389727B2 (en) Multi-level security enforcement utilizing data typing
KR101641809B1 (en) Method and system for distributed off-line logon using one-time passwords
CN110088742A (en) Use the logical repositories service of encrypted configuration data
CN109213501A (en) The method, apparatus and storage medium of intelligent contract are installed in block chain network
US8572372B2 (en) Method for selectively enabling access to file systems of mobile terminals
CN110061845A (en) Block chain data ciphering method, device, computer equipment and storage medium
CN109358859A (en) The method, apparatus and storage medium of intelligent contract are installed in block chain network
CN107851167A (en) Protection calculates the technology of data in a computing environment
CN105745660B (en) For supporting the technology of multiple digital rights management agreements on a client device
CN109067528A (en) Crypto-operation, method, cryptographic service platform and the equipment for creating working key
CN111885196B (en) Method, device and system for accessing equipment data of Internet of things cloud platform
KR20140090571A (en) Method and device for privacy-respecting data processing
CN107404472A (en) The migration of Client-initiated encryption key
KR101745843B1 (en) Methods and devices for protecting private data
CN106330934A (en) Distributed database system authority management method and device
CN109076054A (en) System and method for managing the encryption key of single-sign-on application program
CN109146482A (en) User's right providing method and device based on block chain
CN107920060A (en) Data access method and device based on account
US20130124864A1 (en) Method for importing rights object and rights issuer
KR20190112959A (en) Operating method for machine learning model using encrypted data and apparatus based on machine learning model
JP4933327B2 (en) File management system, file management method and program
WO2015154469A1 (en) Database operation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20181218

WD01 Invention patent application deemed withdrawn after publication