CN109493221A - Transaction record time slot scrambling, equipment, network and storage medium in block chain - Google Patents

Transaction record time slot scrambling, equipment, network and storage medium in block chain Download PDF

Info

Publication number
CN109493221A
CN109493221A CN201811256704.XA CN201811256704A CN109493221A CN 109493221 A CN109493221 A CN 109493221A CN 201811256704 A CN201811256704 A CN 201811256704A CN 109493221 A CN109493221 A CN 109493221A
Authority
CN
China
Prior art keywords
block
node
block chain
alternative
cryptographic hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811256704.XA
Other languages
Chinese (zh)
Other versions
CN109493221B (en
Inventor
路成业
王凌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Iallchain Co Ltd
Original Assignee
Iallchain Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Iallchain Co Ltd filed Critical Iallchain Co Ltd
Priority to CN201811256704.XA priority Critical patent/CN109493221B/en
Publication of CN109493221A publication Critical patent/CN109493221A/en
Application granted granted Critical
Publication of CN109493221B publication Critical patent/CN109493221B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Abstract

The embodiment of the present invention provides transaction record time slot scrambling, equipment, network and storage medium in a kind of block chain, wherein, this method comprises: the first node in the first block chain calculates the cryptographic Hash of each transaction record in preset time period on the first block chain;The first node generates Merkel tree Merkle Tree based on the cryptographic Hash of each transaction record;The first node is based on the Merkle Tree and generates alternative block, and the alternative block is broadcast in the second block chain, so that the second node in the second block chain is based on the alternative block and obtains book keeping operation permission, and it is based on the book keeping operation permission and the alternative block, generate new block.Technical solution provided in an embodiment of the present invention can prevent the transaction record in block chain from revealing, and improve the confidentiality and safety of transaction record in block chain.

Description

Transaction record time slot scrambling, equipment, network and storage medium in block chain
Technical field
The present embodiments relate to transaction record time slot scrambling in block chain technical field more particularly to a kind of block chain, Equipment, network and storage medium.
Background technique
When the node in block chain A provides billed services for block chain B, and block chain B is alliance's chain or privately owned chain When, if the block chain B alternative block comprising transaction record details generated is sent directly to carry out in block chain A Book keeping operation, then the transaction record in alternative block is visible for the node in block chain in A, the friendship of such block chain B Easy information is just easy to reveal.
Summary of the invention
The embodiment of the present invention provides transaction record time slot scrambling, equipment, network and storage medium in a kind of block chain, to It prevents the transaction record in block chain from revealing, improves the confidentiality and safety of transaction record in block chain.
First aspect of the embodiment of the present invention provides transaction record time slot scrambling in a kind of block chain, this method comprises:
First node in first block chain calculates each transaction record in preset time period on the first block chain Cryptographic Hash;
The first node is using the cryptographic Hash of each transaction record as Merkel tree Merkle Tree to be generated In leaf node cryptographic Hash, and according to the cryptographic Hash of leaf node in the Merkel tree Merkle Tree to be generated The cryptographic Hash for calculating non-leaf nodes in Merkel tree Merkle Tree to be generated, to generate the Merkle Tree;
The first node is based on the Merkle Tree and generates alternative block, and the alternative block is broadcast to the In two block chains, so that the second node in the second block chain is based on the alternative block and obtains book keeping operation permission, and it is based on The book keeping operation permission and the alternative block generate new block.
In a kind of possible design, when the second node calculates the whole Hash that the random number obtained makes new block When value is less than the difficulty value on the block head point being obtained ahead of time, the second node obtains book keeping operation permission.
In alternatively possible design, the first node is based on the Merkle Tree and generates alternative block, and will The alternative block is broadcast in the second block chain, so that the second node in the second block chain is based on the alternative block Book keeping operation permission is obtained, and is based on the book keeping operation permission and the alternative block, after generating new block, the method is also wrapped It includes:
The first node receives the new block that the second node is broadcast out;
The first node signs to the new block using its private key in the first block chain, and will label The new block after name is broadcast in the first block chain, so that other nodes in the first block chain are based on described Merkle Tree in new block verifies the new block;
When the quantity for the node being verified is more than preset threshold, the first node determines that the new block verifying is logical It crosses.
The first node described in another possible design is using its private key in the first block chain to described New block is signed, and the new block after signature is broadcast in the first block chain, so that first block Other nodes in chain verify the new block based on the Merkle Tree in the new block, comprising:
The first node signs to the new block using its private key in the first block chain, and will label The new block after name is broadcast in the first block chain, so that other nodes in the first block chain are by the Merkle Each leaf node and non-leaf nodes and the cryptographic Hash of root node respectively calculate described pre- with other described nodes in Tree If the cryptographic Hash of each transaction record is compared in the period,
Alternatively, make other nodes in the first block chain by the cryptographic Hash of root node in the Merkle Tree and The cryptographic Hash of the non-leaf nodes of predetermined number respectively calculates the described of acquisition with other described nodes in the Merkle Tree The cryptographic Hash of the node of corresponding position is compared in Merkle Tree.
It is described when the quantity for the node being verified is more than preset threshold in another possible design, described the After one node determines that the new block is verified, the method also includes:
It is broadcast in the second block chain the reward voucher of the second node by the first node.
In another possible design, the first node is based on the Merkle Tree and generates alternative block, and will The alternative block is broadcast in the second block chain, so that the second node in the second block chain is based on the alternative block Book keeping operation permission is obtained, and is based on the book keeping operation permission and the alternative block, generates new block, comprising:
The alternative block is broadcast in the first block chain by the first node, so that in the first block chain Other nodes the alternative block is verified based on the Merkle Tree in the alternative block;
Wherein, if the node for having more than preset quantity in the first block chain is verified the alternative block, The alternative block is broadcast in the second block chain, so that the second node in the second block chain is based on described standby Constituency block obtains book keeping operation permission, and is based on the book keeping operation permission and the alternative block, generates new block.
The second aspect of the embodiment of the present invention provides a kind of node of block chain, which includes:
Processor, and the memory for storing computer instruction, when processor executes the computer instruction, institute Processor is stated, is used for:
Calculate the cryptographic Hash of each transaction record in preset time period;
Using the cryptographic Hash of each transaction record as the leaf node in Merkel tree Merkle Tree to be generated Cryptographic Hash, and calculated according to the cryptographic Hash of leaf node in the Merkel tree Merkle Tree to be generated to be generated The cryptographic Hash of non-leaf nodes in Merkel tree Merkle Tree, to generate the Merkle Tree;
Alternative block is generated based on the Merkle Tree, and the alternative block is broadcast in the second block chain, with So that second node in the second block chain is based on the alternative block and obtain book keeping operation permission, and based on the book keeping operation permission with And the alternative block, generate new block.
In a kind of possible design, when the second node calculates the whole Hash that the random number obtained makes new block When value is less than the difficulty value on the block head point being obtained ahead of time, the second node obtains book keeping operation permission.
In another possible design, the processor is also used to:
Receive the new block that the second node is broadcast out;
It is signed using its private key in the first block chain to the new block, and will be described new after signature Block is broadcast in the first block chain, so that other nodes in the first block chain are based in the new block Merkle Tree verifies the new block;
When the quantity for the node being verified is more than preset threshold, determine that the new block is verified.
In another possible design, the processor is specifically used for:
It is signed using private key of the first node in the first block chain to the new block, and will signature The new block afterwards is broadcast in the first block chain, so that other nodes in the first block chain are by the Merkle Each leaf node and non-leaf nodes and the cryptographic Hash of root node respectively calculate described pre- with other described nodes in Tree If the cryptographic Hash of each transaction record is compared in the period,
Alternatively, make other nodes in the first block chain by the cryptographic Hash of root node in the Merkle Tree and The cryptographic Hash of the non-leaf nodes of predetermined number respectively calculates the described of acquisition with other described nodes in the Merkle Tree The cryptographic Hash of the node of corresponding position is compared in Merkle Tree.
In another possible design, the processor is also used to:
Reward message of the first node to the second node is broadcast in the second block chain.
In another possible design, the processor is specifically used for:
The alternative block is broadcast in the first block chain, so that other node bases in the first block chain Merkle Tree in the alternative block verifies the alternative block;
Wherein, if the node for having more than preset quantity in the first block chain is verified the alternative block, The alternative block is broadcast in the second block chain, so that the second node in the second block chain is based on described standby Constituency block obtains book keeping operation permission, and is based on the book keeping operation permission and the alternative block, generates new block.
The third aspect of the embodiment of the present invention provides a kind of block chain network, which includes described in above-mentioned second aspect Node.
Fourth aspect of the embodiment of the present invention provides a kind of computer readable storage medium, including instruction, when it is in computer When upper operation, so that computer executes method described in above-mentioned first aspect.
In embodiments of the present invention, the first node in the first block chain is by calculating the first block within a preset period of time The cryptographic Hash of each transaction record on chain, and using the cryptographic Hash of each transaction record as Merkel tree Merkle to be generated The cryptographic Hash of leaf node in Tree, according to the cryptographic Hash meter of leaf node in Merkel tree Merkle Tree to be generated The cryptographic Hash of non-leaf nodes is based in Merkel tree Merkle Tree to be generated to generate Merkle Tree Merkle Tree generates alternative block, is kept accounts so that the second node in the second block chain is based on the alternative block Permission, and generate new block.Since the embodiment of the present invention is to indicate the first block chain by the cryptographic Hash on Merkle Tree In transaction record, rather than the details of transaction record are carried directly in alternative block, thus by alternative block When being broadcast to the second block chain, the detailed transaction information of the first block chain would not be leaked into the second block chain, be improved The confidentiality and safety of transaction record in first block chain.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention without any creative labor, may be used also for those of ordinary skill in the art To obtain other drawings based on these drawings.
Fig. 1 is the structural schematic diagram of Merkle Hash Tree provided in an embodiment of the present invention a kind of;
Fig. 2 is the flow chart of transaction record time slot scrambling in a kind of block chain provided in an embodiment of the present invention;
Fig. 3 is the flow chart of transaction record time slot scrambling in a kind of block chain provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of the node of block chain provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
The term " includes " of description and claims of this specification and " having " and their any deformation, it is intended that Be to cover it is non-exclusive include, for example, the device of the process or structure that contain series of steps is not necessarily limited to clearly arrange Those of out structure or step but may include other steps being not clearly listed or intrinsic for these processes or device Rapid or structure.
Merkel tree (Merkle Tree) is tree described in a kind of data structure, and this field is normally referred to as Merkel Hash tree (Merkle Hash Tree), this is because all nodes for the Merkle Tree that it is constructed all are hash values. Merkle Tree has the following characteristics that it is a kind of tree, can be binary tree, can also be with multiway tree, either a few fork trees, it All have the characteristics that all of tree construction;Value on the leaf node of Merkle Tree can be arbitrarily arranged, such as Merkle Hash Tree can be using the hash value of data as the value of leaf node;The value of non-leaf nodes can be by leaf node all below it Value be combined, then to combined result carry out Hash be calculated.Specifically, Fig. 1 is provided in an embodiment of the present invention one The structural schematic diagram of kind of Merkle Hash Tree, by taking the node 7 in Fig. 1 as an example, the hash value of node 7 be by node 15, Hash value on 16 is calculated, and the value of other non-leaf nodes on similar Merkle Hash Tree can also pass through class As method be calculated, repeat no more herein.
Based on the method for above-mentioned Merkle Tree, the embodiment of the invention provides transaction records in a kind of block chain to maintain secrecy Method, this method are used by the structure of block in transformation block chain so that block only includes the hash value of each transaction record Merkle Tree carrys out the transaction record of description block chain within a preset period of time, and does not include the detailed letter of each transaction record Breath, in this way by include Merkle Tree alternative block be sent to kept accounts in other block chains when, would not be by local area Transaction record in block chain is leaked in other block chains, to improve the confidentiality and safety of transaction record in block chain Property.
Technical solution of the present invention is described below with reference to specific embodiment.
Fig. 2 is the flow chart of transaction record time slot scrambling in a kind of block chain provided in an embodiment of the present invention, such as Fig. 2 institute Show, this method comprises the following steps:
First node in step 101, the first block chain calculates each item in preset time period on the first block chain The cryptographic Hash of transaction record.
Wherein, the first block chain refers to the block chain with billing requirements, for " the first block chain " in the present embodiment Name is only for that will there is the block chain of billing requirements to distinguish with other block chains, without other meanings.In order to Facilitate understanding, the first block chain can be interpreted as alliance's chain or privately owned chain in the present embodiment, first node is interpreted as joining Some on alliance's chain or privately owned chain puts node on someone's head.
In the present embodiment, first node obtains all friendships of the first block chain within a preset period of time by broadcast message Easily record, and the transaction record progress cryptographic Hash calculating to getting one by one, obtain the corresponding cryptographic Hash of each transaction record.
Step 102, first node are using the cryptographic Hash of each transaction record as Merkel tree Merkle to be generated The cryptographic Hash of leaf node in Tree, and according to the Kazakhstan of leaf node in the Merkel tree Merkle Tree to be generated Uncommon value calculates the cryptographic Hash of non-leaf nodes in Merkel tree Merkle Tree to be generated, to generate the Merkle Tree。
Obtain each transaction record cryptographic Hash after, first node using the corresponding cryptographic Hash of each transaction record as The leaf node of Merkle Tree, the cryptographic Hash of each non-leaf nodes is according under each non-leaf nodes in Merkle Tree The values of all leaf nodes calculated and obtain using preset algorithm, the calculation method of the cryptographic Hash of root node in Merkle Tree It is similar with the calculation method of root node in existing Merkle Tree, it repeats no more herein.
Step 103, first node are based on the Merkle Tree and generate alternative block, and the alternative block is broadcasted Into the second block chain, so that the second node in the second block chain is based on the alternative block and obtains book keeping operation permission, and Based on the book keeping operation permission and the alternative block, new block is generated.
In the present embodiment, for first node after generating Merkle Tree, being generated based on the Merkle Tree includes being somebody's turn to do Merkle Tree, and the random number on block head point is empty alternative block, or even can also in alternative block in other designs To carry the incentive message that first node makes a promise calculate node (i.e. second node).
First node signs alternative block using its private key in the second block chain after generating alternative block Name, and the alternative block after signature is broadcast in the second block chain, the second node in the second block chain, it is alternative receiving After block, the operation for calculating random number is executed, when the random number that second node calculates is less than the whole cryptographic Hash of block in advance When the difficulty value on the block head first obtained point, then second node obtains book keeping operation permission, and second node will calculate the random of acquisition Number inserts the head of alternative block, generates new block.
Further, after obtaining new block, second node using its private key in the second block chain to new block into Row signature, and the block after signature is broadcast in the second block chain, so that first node obtains new district from the second block chain Block, and new block is broadcast in the first block chain, other nodes in the first block chain verify new block, if It being verified, first node is signed it to the reward voucher of second node using its private key in the second block chain, And the reward voucher after signature is broadcast in the second block chain.
In the present embodiment, the first node in the first block chain is by calculating on the first block chain within a preset period of time Each transaction record cryptographic Hash, and using the cryptographic Hash of each transaction record as Merkel tree Merkle to be generated The cryptographic Hash of leaf node in Tree, according to the cryptographic Hash meter of leaf node in Merkel tree Merkle Tree to be generated The cryptographic Hash of non-leaf nodes is based in Merkel tree Merkle Tree to be generated to generate Merkle Tree Merkle Tree generates alternative block, is kept accounts so that the second node in the second block chain is based on the alternative block Permission, and generate new block.Since the present embodiment is indicated in the first block chain by the cryptographic Hash on Merkle Tree Transaction record, rather than the details of transaction record are carried directly in alternative block, to be broadcasted by alternative block When to the second block chain, the detailed transaction information of the first block chain would not be leaked into the second block chain, improve first The confidentiality and safety of transaction record in block chain.
Above-described embodiment is further optimized and extended below.
Fig. 3 is the flow chart of transaction record time slot scrambling in a kind of block chain provided in an embodiment of the present invention, such as Fig. 3 institute Show, on the basis of Fig. 2 embodiment, after step 103, can also include the following steps:
Step 201, first node receive the new block that the second node is broadcast out.
Step 202, first node sign to the new block using its private key in the first block chain, and The new block after signature is broadcast in the first block chain, so that other nodes in the first block chain are based on Merkle Tree in the new block verifies the new block.
Step 203, when the quantity for the node being verified be more than preset threshold when, the first node determines the new district Block is verified.
In the present embodiment, the node in the first block chain when being verified to new block, can with the following method in Any one:
In a kind of feasible verification method, first node carries out new block using its private key in the first block chain Signature, and the new block after signature is broadcast in the first block chain, the node in the first block chain, after receiving new block By each leaf node of Merkle Tree, the cryptographic Hash of non-leaf nodes and root node in new block and itself it is calculated The first block chain in above-mentioned preset time period the cryptographic Hash of each transaction record compare, if compare it is consistent if verify it is logical It crosses, further, if the quantity for the node being verified is more than preset threshold, it is determined that new block is verified.
In another feasible method, first node signs new block using its private key in the first block chain Name, and the new block after signature is broadcast in the first block chain, the node in the first block chain, after receiving new block, By the non-leaf nodes of predetermined number in the cryptographic Hash of the root node of Merkle Tree in new block and Merkle Tree Cryptographic Hash is compared with the cryptographic Hash that its own calculates the node of corresponding position in the Merkle Tree obtained, wherein If comparing unanimously, it is verified, further, if the quantity for the node being verified in the first block chain is more than default threshold Value, it is determined that new block is verified.
The two methods of certain above-mentioned offer be merely for convenience of understanding two kinds of cited feasible verification modes without It is to unique restriction of the invention.Such as in other possible designs, alternative block can also be broadcast to the second block Before in chain, first alternative block is broadcast in the first block chain, so that other sections in the first block chain in addition to first node Point verifies alternative block based on the Merkle Tree in alternative block, and has more than in the first block chain default When the node verification of quantity passes through, alternative block is broadcast in the second block chain, so that the second node in the second block chain Book keeping operation permission is obtained based on alternative block, and based on book keeping operation permission and alternative block, generates new block.
In the present embodiment, the first node in the first block chain is by calculating on the first block chain within a preset period of time Each transaction record cryptographic Hash, and using the cryptographic Hash of each transaction record as Merkel tree Merkle to be generated The cryptographic Hash of leaf node in Tree, according to the cryptographic Hash meter of leaf node in Merkel tree Merkle Tree to be generated The cryptographic Hash of non-leaf nodes is based in Merkel tree Merkle Tree to be generated to generate Merkle Tree Merkle Tree generates alternative block, is kept accounts so that the second node in the second block chain is based on the alternative block Permission, and generate new block.Since the present embodiment is indicated in the first block chain by the cryptographic Hash on Merkle Tree Transaction record, rather than the details of transaction record are carried directly in alternative block, to be broadcasted by alternative block When to the second block chain, the detailed transaction information of the first block chain would not be leaked into the second block chain, improve first The confidentiality and safety of transaction record in block chain.
The technical solution of embodiment in order to better understand the present invention, below illustratively with the first block chain be it is privately owned Chain, first node are to put node on someone's head, and the second block chain is publicly-owned chain, and second node is to implement the present invention for calculate node Example is illustrated:
Some in S1, privately owned chain puts the generation that node carries out alternative block on someone's head, but what is generated is not in the prior art Traditional block, but generate one include Merkle Tree alternative block.By the transaction of privately owned chain within a preset period of time Record is separated by Merkle Tree with alternative block and unique association.It is specific as follows: to put node on someone's head and pass through oneself extensively The All Activity record of privately owned chain that message was collected within a preset period of time is broadcast, carries out the calculating of cryptographic Hash, Mei Gejiao one by one Leaf node of the cryptographic Hash easily recorded as a Merkle Tree, the value of the non-leaf nodes of Merkle Tree are bases The value of all leaf nodes is calculated according to the algorithm made an appointment below it, finally according to the side of Merkle Tree Formula generates a Merkle Tree, to replace the transaction record in alternative block with Merkle Tree.It both ensure that in this way It maintains secrecy to the particular content of each transaction record in privately owned chain, and can be by the structure of Merkle Tree and every Whether the cryptographic Hash of a leaf node is comprehensive to verify the sequence of transaction record and content in alternative block, it is contemplated that safety While, and convenient for verifying the correctness of alternative block.
Node is put on someone's head after generating alternative block in S2, privately owned chain, and the part of the block body of the alternative block is The form of Merkle Tree, the random number of the part of block head are blank, and it is preset for putting the incentive message of node on someone's head Value, then by the alternative block with this put on someone's head node after the private key signature in publicly-owned chain with broadcast the message mode be broadcast to public affairs Have in chain.
After calculate node in S3, publicly-owned chain receives the broadcast message, candidate area build is calculated according to the broadcast message Random number in portion, that is to say, that find suitable random number the whole cryptographic Hash of the alternative block is less than and be obtained ahead of time The difficulty value on block head point after finding the random number, the head that random number is added to alternative block is formed complete alternative Block (distinguish for convenience it is following will completely alternative block be known as new block), new block is used to the private key label of calculate node It is broadcasted in publicly-owned chain after name.
In S4, privately owned chain put on someone's head node had received in publicly-owned chain calculate node broadcast new block after, put node on someone's head The new block is broadcasted in privately owned chain after the private key signature in privately owned chain using oneself.
After other nodes in S5, privately owned chain have received new block, which is verified, specific method is Verify each leaf node and non-leaf nodes and root node cryptographic Hash whether with oneself pre-stored privately owned chain above-mentioned Whether the cryptographic Hash of each transaction record in preset time period consistent, that is, be compared based on Merkle Tree and Verification processing.Merkle Tree can greatly reduce the transmission quantity of data and the complexity of calculating.In order to promote the effect of verifying Rate leaf node and non-leaf nodes can not also be verified in turn, but only verify the cryptographic Hash of root node, and random The cryptographic Hash and cryptographic Hash of the calculated Merkle Tree of node oneself on corresponding position for the N number of non-leaf nodes chosen It is whether consistent, if unanimously, new block is verified.Still by taking Fig. 1 as an example, if node 15,16.......30 is leaf section The cryptographic Hash of these nodes is transferred to node B from node A by point, after data are transferred to node B, thinks to be transferred to node B under verifying On data validity (whether verify data changes in transmission process), it is only necessary to verify institute on node A and node B Whether the cryptographic Hash of the leaf node of the MerkleTree of construction is consistent, if unanimously, indicating that data are effective, transmission No change has taken place in the process.If the cryptographic Hash of node 15 is tampered in transmission process, held very much by Merkle Tree Easily (because at this point, node 0,1,3,7,15 corresponding hash value are all changed), the time complexity of positioning are found in positioning It is lower.And be once verified, then start to verify the random number that the calculate node in the publicly-owned chain is found, if this is random Number is also verified, then the message being verified is used the private key label in the privately owned chain of oneself by other nodes in privately owned chain It is broadcasted in privately owned chain after name.
If the node existed in S6, privately owned chain more than preset threshold is verified new block.Node is put on someone's head in publicly-owned chain In, it is signed using oneself private key in publicly-owned chain to its reward proof to calculate node, then by the prize after signature Proof is encouraged to be broadcast in publicly-owned chain.
What needs to be explained here is that can also shift to an earlier date the verification step of S5 in other implementations, that is, put node on someone's head After generating alternative block, alternative block is broadcast in privately owned chain, so that other nodes in privately owned chain carry out alternative block Verifying, if the node verification for having more than preset quantity passes through, alternative block is broadcast in publicly-owned chain, so that calculate node meter Calculate random number.
Fig. 4 is a kind of structural schematic diagram of the node of block chain provided in an embodiment of the present invention, as shown in figure 4, node 40, Including processor 41, and the memory 42 for storing computer instruction, when processor executes the computer instruction, institute Processor 41 is stated, is used for:
Calculate the cryptographic Hash of each transaction record in preset time period;
Using the cryptographic Hash of each transaction record as the Kazakhstan of the leaf node in Merkel tree Merkle Tree to be generated Uncommon value, calculates Merkel tree to be generated according to the cryptographic Hash of leaf node in Merkel tree Merkle Tree to be generated The cryptographic Hash of non-leaf nodes is in Merkle Tree to generate Merkle Tree;
Alternative block is generated based on the Merkle Tree, and the alternative block is broadcast in the second block chain, with So that second node in the second block chain is based on the alternative block and obtain book keeping operation permission, and based on the book keeping operation permission with And the alternative block, generate new block.
In a kind of possible design, when the second node calculates the whole Hash that the random number obtained makes new block When value is less than the difficulty value on the block head point being obtained ahead of time, the second node obtains book keeping operation permission.
In a kind of possible design, the processor 41 is also used to:
Receive the new block that the second node is broadcast out;
It is signed using its private key in the first block chain to the new block, and will be described new after signature Block is broadcast in the first block chain, so that other nodes in the first block chain are based in the new block Merkle Tree verifies the new block;
When the quantity for the node being verified is more than preset threshold, determine that the new block is verified.
In a kind of possible design, the processor 41 is specifically used for:
It is signed using private key of the first node in the first block chain to the new block, and will signature The new block afterwards is broadcast in the first block chain, so that other nodes in the first block chain are by the Merkle Each leaf node and non-leaf nodes and the cryptographic Hash of root node respectively calculate described pre- with other described nodes in Tree If the cryptographic Hash of each transaction record is compared in the period,
Alternatively, make other nodes in the first block chain by the cryptographic Hash of root node in the Merkle Tree and The cryptographic Hash of the non-leaf nodes of predetermined number respectively calculates the described of acquisition with other described nodes in the Merkle Tree The cryptographic Hash of the node of corresponding position is compared in Merkle Tree.
In a kind of possible design, the processor 41 is also used to:
Reward message of the first node to the second node is broadcast in the second block chain.
In a kind of possible design, the processor 41 is specifically used for:
The alternative block is broadcast in the first block chain, so that other node bases in the first block chain Merkle Tree in the alternative block verifies the alternative block;
Wherein, if the node for having more than preset quantity in the first block chain is verified the alternative block, The alternative block is broadcast in the second block chain, so that the second node in the second block chain is based on described standby Constituency block obtains book keeping operation permission, and is based on the book keeping operation permission and the alternative block, generates new block.
The method that node provided in this embodiment is able to carry out above-described embodiment, executive mode is similar with beneficial effect, It repeats no more herein.
The embodiment of the present invention also provides a kind of block chain network, which includes the node that Fig. 4 embodiment provides.
The embodiment of the present invention also provides a kind of computer readable storage medium, including instruction, when it runs on computers When, so that computer executes method described in above-described embodiment.
Finally, it should be noted that those of ordinary skill in the art will appreciate that whole in above-described embodiment method or Part process is that relevant hardware can be instructed to complete by computer program, and the program can be stored in a computer In readable storage medium storing program for executing, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, described to deposit Storage media can be disk, CD, read-only memory (ROM) or random access memory (RAM) etc..
Each functional unit in the embodiment of the present invention can integrate in a processing module, be also possible to each unit It is individually physically present, can also be integrated in two or more units in a module.Above-mentioned integrated module both can be with Using formal implementation of hardware, can also be realized in the form of software function module.If the integrated module is with software The form of functional module realizes, and when sold or used as an independent product, also can store and computer-readable deposits at one In storage media.Storage medium mentioned above can be read-only memory, disk or CD etc..
The above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;Although referring to aforementioned each reality Applying example, invention is explained in detail, those skilled in the art should understand that: it still can be to aforementioned each Technical solution documented by embodiment is modified, or equivalent substitution of some or all of the technical features;And These are modified or replaceed, the range for technical solution of various embodiments of the present invention that it does not separate the essence of the corresponding technical solution.

Claims (14)

1. transaction record time slot scrambling in a kind of block chain characterized by comprising
First node in first block chain calculates the Kazakhstan of each transaction record in preset time period on the first block chain Uncommon value;
The first node is using the cryptographic Hash of each transaction record as in Merkel tree Merkle Tree to be generated The cryptographic Hash of leaf node, and calculated according to the cryptographic Hash of leaf node in the Merkel tree Merkle Tree to be generated The cryptographic Hash of non-leaf nodes in Merkel tree Merkle Tree to be generated, to generate the Merkle Tree;
The first node is based on the Merkle Tree and generates alternative block, and the alternative block is broadcast to the secondth area In block chain, so that the second node in the second block chain is based on the alternative block and obtains book keeping operation permission, and based on described Permission of keeping accounts and the alternative block generate new block.
2. the method according to claim 1, wherein making newly when the second node calculates the random number obtained When the whole cryptographic Hash of block is less than the difficulty value on the block head point being obtained ahead of time, the second node obtains book keeping operation permission.
3. the method according to claim 1, wherein the first node is generated based on the Merkle Tree Alternative block, and the alternative block is broadcast in the second block chain, so that the second node base in the second block chain Book keeping operation permission is obtained in the alternative block, and is based on the book keeping operation permission and the alternative block, after generating new block, The method also includes:
The first node obtains the new block that the second node is broadcast out;
The first node signs to the new block using its private key in the first block chain, and will be after signature The new block be broadcast in the first block chain so that other nodes in the first block chain be based on the new district Merkle Tree in block verifies the new block;
When the quantity for the node being verified is more than preset threshold, the first node determines that the new block is verified.
4. according to the method described in claim 3, it is characterized in that, the first node is using it in the first block chain Private key sign to the new block, and the new block after signature is broadcast in the first block chain so that Other nodes in the first block chain verify the new block based on the Merkle Tree in the new block, Include:
The first node signs to the new block using its private key in the first block chain, and will be after signature The new block be broadcast in the first block chain so that other nodes in the first block chain are by the Merkle The institute that each leaf node and non-leaf nodes and the cryptographic Hash of root node and other described nodes are respectively calculated in Tree The cryptographic Hash for stating each transaction record in preset time period is compared,
Alternatively, making other nodes in the first block chain by the cryptographic Hash of the root node in the Merkle Tree and institute It states in Merkle Tree the cryptographic Hash of the non-leaf nodes of predetermined number and respectively calculates the described of acquisition with other described nodes The cryptographic Hash of the node of corresponding position is compared in Merkle Tree.
5. according to the method described in claim 3, it is characterized in that, described when the quantity for the node being verified is more than default threshold When value, after the first node determines that the new block is verified, the method also includes:
It is broadcast in the second block chain the reward voucher of the second node by the first node.
6. the method according to claim 1, wherein the first node is generated based on the Merkle Tree Alternative block, and the alternative block is broadcast in the second block chain, so that the second node base in the second block chain Book keeping operation permission is obtained in the alternative block, and is based on the book keeping operation permission and the alternative block, generates new block, packet It includes:
The alternative block is broadcast in the first block chain by the first node, so that its in the first block chain He verifies the alternative block based on the Merkle Tree in the alternative block node;
Wherein, if the node for having more than preset quantity in the first block chain is verified the alternative block, by institute It states alternative block to be broadcast in the second block chain, so that the second node in the second block chain is based on the candidate area Block obtains book keeping operation permission, and is based on the book keeping operation permission and the alternative block, generates new block.
7. a kind of node of block chain characterized by comprising
Including processor, and the memory for storing computer instruction, when processor executes the computer instruction, institute Processor is stated, is used for:
Calculate the cryptographic Hash of each transaction record in preset time period on the first block chain;
Using the cryptographic Hash of each transaction record as the Kazakhstan of the leaf node in Merkel tree Merkle Tree to be generated Uncommon value, and Merck to be generated is calculated according to the cryptographic Hash of leaf node in the Merkel tree Merkle Tree to be generated The cryptographic Hash of non-leaf nodes in your tree Merkle Tree, to generate the Merkle Tree;
Alternative block is generated based on the Merkle Tree, and the alternative block is broadcast in the second block chain, so that institute It states the second node in the second block chain and is based on the alternative block acquisition book keeping operation permission, and be based on the book keeping operation permission and institute Alternative block is stated, new block is generated.
8. node according to claim 7, which is characterized in that make newly when the second node calculates the random number obtained When the whole cryptographic Hash of block is less than the difficulty value on the block head point being obtained ahead of time, the second node obtains book keeping operation permission.
9. node according to claim 7, which is characterized in that the processor is also used to:
Obtain the new block that the second node is broadcast out;
It is signed using its private key in the first block chain to the new block, and by the new block after signature It is broadcast in the first block chain, so that other nodes in the first block chain are based on the Merkle in the new block Tree verifies the new block;
When the quantity for the node being verified is more than preset threshold, determine that the new block is verified.
10. node according to claim 9, which is characterized in that the processor is specifically used for:
It is signed using private key of the first node in the first block chain to the new block, and will be described in after signature New block is broadcast in the first block chain, so that other nodes in the first block chain will be each in the Merkle Tree Leaf node and non-leaf nodes and the cryptographic Hash of root node and other described nodes be respectively calculated it is described default when Between in section the cryptographic Hash of each transaction record be compared,
Alternatively, making other nodes in the first block chain by the cryptographic Hash of the root node in the Merkle Tree and institute It states in Merkle Tree the cryptographic Hash of the non-leaf nodes of predetermined number and respectively calculates the described of acquisition with other described nodes The cryptographic Hash of the node of corresponding position is compared in Merkle Tree.
11. node according to claim 9, which is characterized in that the processor is also used to:
Reward message of the first node to the second node is broadcast in the second block chain.
12. node according to claim 7, which is characterized in that the processor is specifically used for:
The alternative block is broadcast in the first block chain, so that other nodes in the first block chain are based on institute The Merkle Tree stated in alternative block verifies the alternative block;
Wherein, if the node for having more than preset quantity in the first block chain is verified the alternative block, by institute It states alternative block to be broadcast in the second block chain, so that the second node in the second block chain is based on the candidate area Block obtains book keeping operation permission, and is based on the book keeping operation permission and the alternative block, generates new block.
13. a kind of block chain network, which is characterized in that including node described in any one of claim 7-12.
14. a kind of computer readable storage medium, including instruction, when run on a computer, so that computer executes such as Method of any of claims 1-6.
CN201811256704.XA 2018-10-26 2018-10-26 Method, device, network and storage medium for keeping transaction records secret in block chain Active CN109493221B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811256704.XA CN109493221B (en) 2018-10-26 2018-10-26 Method, device, network and storage medium for keeping transaction records secret in block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811256704.XA CN109493221B (en) 2018-10-26 2018-10-26 Method, device, network and storage medium for keeping transaction records secret in block chain

Publications (2)

Publication Number Publication Date
CN109493221A true CN109493221A (en) 2019-03-19
CN109493221B CN109493221B (en) 2021-01-12

Family

ID=65692074

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811256704.XA Active CN109493221B (en) 2018-10-26 2018-10-26 Method, device, network and storage medium for keeping transaction records secret in block chain

Country Status (1)

Country Link
CN (1) CN109493221B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110020544A (en) * 2018-12-26 2019-07-16 阿里巴巴集团控股有限公司 The Hash information processing method and system of record are stored in the block of block chain
CN110232569A (en) * 2019-05-07 2019-09-13 北京奇艺世纪科技有限公司 A kind of read method of transaction record, device and storage medium
CN110753080A (en) * 2019-08-30 2020-02-04 深圳壹账通智能科技有限公司 Block transmission method, device, equipment and readable storage medium
CN110853214A (en) * 2019-11-06 2020-02-28 杭州复杂美科技有限公司 Block generation method, device and storage medium
CN111130801A (en) * 2019-12-26 2020-05-08 腾讯科技(深圳)有限公司 Data processing method and device, node equipment and computer storage medium
CN111147227A (en) * 2019-12-27 2020-05-12 杭州中科先进技术研究院有限公司 Communication method and communication platform based on block chain
CN111314086A (en) * 2020-02-11 2020-06-19 上海宓猿信息技术有限公司 Method for implementing block chain privacy protocol
CN111371558A (en) * 2020-02-26 2020-07-03 百度在线网络技术(北京)有限公司 Block chain data processing method and device, electronic equipment and medium
CN111428277A (en) * 2020-03-20 2020-07-17 中国建设银行股份有限公司 Block chain data verification method, device and system
CN111431696A (en) * 2020-03-26 2020-07-17 深圳市欧欣泰科技有限公司 Identity-based block chain sealing mechanism
CN111445236A (en) * 2019-11-14 2020-07-24 杭州复杂美科技有限公司 Block chain transaction verification method, equipment and storage medium
CN111464539A (en) * 2020-03-31 2020-07-28 中国联合网络通信集团有限公司 Block chain accounting method and accounting node
CN111614721A (en) * 2020-04-14 2020-09-01 梁伟 Multi-dimensional block chain network and method and device for generating multi-dimensional block chain network
CN111865894A (en) * 2020-05-27 2020-10-30 布比(北京)网络技术有限公司 Block validity verification method and device
CN113841359A (en) * 2019-04-12 2021-12-24 区块链控股有限公司 Method and apparatus for propagating tiles in a blockchain network
CN114844654A (en) * 2022-07-06 2022-08-02 湖南密码工程研究中心有限公司 Vehicle networking credible state data proving method
CN117132279A (en) * 2023-10-26 2023-11-28 山东大学 Block chain double-chain accounting method, system, equipment and medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN107015882A (en) * 2016-12-26 2017-08-04 阿里巴巴集团控股有限公司 A kind of block data method of calibration and device
WO2018013259A1 (en) * 2016-07-15 2018-01-18 Mastercard International Incorporated Method and system for partitioned blockchains and enhanced privacy for permissioned blockchains
CN107947922A (en) * 2017-11-29 2018-04-20 中国科学院合肥物质科学研究院 A kind of digital archives management method and system based on block chain technology
CN108389130A (en) * 2018-03-02 2018-08-10 合肥学院 A kind of more trade mode alliances chain
CN108399572A (en) * 2018-03-22 2018-08-14 深圳市网心科技有限公司 block chain transaction processing method, device and storage medium
CN108667632A (en) * 2018-04-19 2018-10-16 阿里巴巴集团控股有限公司 Based on the credit record sharing method and device of block chain, electronic equipment

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018013259A1 (en) * 2016-07-15 2018-01-18 Mastercard International Incorporated Method and system for partitioned blockchains and enhanced privacy for permissioned blockchains
CN106548091A (en) * 2016-10-14 2017-03-29 北京爱接力科技发展有限公司 A kind of data deposit card, the method and device of checking
CN107015882A (en) * 2016-12-26 2017-08-04 阿里巴巴集团控股有限公司 A kind of block data method of calibration and device
CN107947922A (en) * 2017-11-29 2018-04-20 中国科学院合肥物质科学研究院 A kind of digital archives management method and system based on block chain technology
CN108389130A (en) * 2018-03-02 2018-08-10 合肥学院 A kind of more trade mode alliances chain
CN108399572A (en) * 2018-03-22 2018-08-14 深圳市网心科技有限公司 block chain transaction processing method, device and storage medium
CN108667632A (en) * 2018-04-19 2018-10-16 阿里巴巴集团控股有限公司 Based on the credit record sharing method and device of block chain, electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
袁勇: ""区块链技术发展现状与展望"", 《自动化学报》 *

Cited By (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110020544A (en) * 2018-12-26 2019-07-16 阿里巴巴集团控股有限公司 The Hash information processing method and system of record are stored in the block of block chain
CN110020544B (en) * 2018-12-26 2021-08-24 创新先进技术有限公司 Hash information processing method and system for storage record in block of block chain
CN113841359A (en) * 2019-04-12 2021-12-24 区块链控股有限公司 Method and apparatus for propagating tiles in a blockchain network
CN110232569A (en) * 2019-05-07 2019-09-13 北京奇艺世纪科技有限公司 A kind of read method of transaction record, device and storage medium
CN110232569B (en) * 2019-05-07 2021-04-16 北京奇艺世纪科技有限公司 Method and device for reading transaction record and storage medium
CN110753080A (en) * 2019-08-30 2020-02-04 深圳壹账通智能科技有限公司 Block transmission method, device, equipment and readable storage medium
CN110853214A (en) * 2019-11-06 2020-02-28 杭州复杂美科技有限公司 Block generation method, device and storage medium
CN110853214B (en) * 2019-11-06 2021-05-11 杭州复杂美科技有限公司 Block generation method, device and storage medium
CN111445236A (en) * 2019-11-14 2020-07-24 杭州复杂美科技有限公司 Block chain transaction verification method, equipment and storage medium
CN111445236B (en) * 2019-11-14 2023-05-30 杭州复杂美科技有限公司 Block chain transaction verification method, device and storage medium
CN111130801A (en) * 2019-12-26 2020-05-08 腾讯科技(深圳)有限公司 Data processing method and device, node equipment and computer storage medium
CN111147227A (en) * 2019-12-27 2020-05-12 杭州中科先进技术研究院有限公司 Communication method and communication platform based on block chain
CN111314086A (en) * 2020-02-11 2020-06-19 上海宓猿信息技术有限公司 Method for implementing block chain privacy protocol
CN111371558B (en) * 2020-02-26 2024-01-16 百度在线网络技术(北京)有限公司 Block chain data processing method and device, electronic equipment and medium
CN111371558A (en) * 2020-02-26 2020-07-03 百度在线网络技术(北京)有限公司 Block chain data processing method and device, electronic equipment and medium
CN111428277A (en) * 2020-03-20 2020-07-17 中国建设银行股份有限公司 Block chain data verification method, device and system
CN111428277B (en) * 2020-03-20 2023-08-18 中国建设银行股份有限公司 Block chain data verification method, device and system
CN111431696A (en) * 2020-03-26 2020-07-17 深圳市欧欣泰科技有限公司 Identity-based block chain sealing mechanism
CN111431696B (en) * 2020-03-26 2023-10-17 深圳市欧欣泰科技有限公司 Block chain seal mechanism based on identity
CN111464539A (en) * 2020-03-31 2020-07-28 中国联合网络通信集团有限公司 Block chain accounting method and accounting node
CN111614721A (en) * 2020-04-14 2020-09-01 梁伟 Multi-dimensional block chain network and method and device for generating multi-dimensional block chain network
CN111865894B (en) * 2020-05-27 2022-07-01 布比(北京)网络技术有限公司 Block validity verification method and device
CN111865894A (en) * 2020-05-27 2020-10-30 布比(北京)网络技术有限公司 Block validity verification method and device
CN114844654B (en) * 2022-07-06 2022-09-06 湖南密码工程研究中心有限公司 Vehicle networking credible state data proving method
CN114844654A (en) * 2022-07-06 2022-08-02 湖南密码工程研究中心有限公司 Vehicle networking credible state data proving method
CN117132279A (en) * 2023-10-26 2023-11-28 山东大学 Block chain double-chain accounting method, system, equipment and medium
CN117132279B (en) * 2023-10-26 2024-01-23 山东大学 Block chain double-chain accounting method, system, equipment and medium

Also Published As

Publication number Publication date
CN109493221B (en) 2021-01-12

Similar Documents

Publication Publication Date Title
CN109493221A (en) Transaction record time slot scrambling, equipment, network and storage medium in block chain
Halpin et al. Introduction to Security and Privacy on the Blockchain
CN107729471A (en) A kind of block chain and its generation method and equipment
CN101004805B (en) Digital document management system, digital document management method
CN108039943B (en) Verifiable encryption searching method
CN108830602B (en) Permission chain construction and management and control method based on chameleon hash function
CN110008720B (en) Dynamic data tracing method and device for Internet of things based on alliance chain
JP5753273B2 (en) Data authenticity guarantee method, management computer and storage medium
CN108009445A (en) A kind of trust data management system of half centralization
CN107360156A (en) P2P network method for cloud storage based on block chain under a kind of big data environment
JP2020522927A (en) Blockchain for general calculation
CN107423632A (en) Customizable sensitive data desensitization method and system
Zhang et al. Secure top-k query processing via untrusted location-based service providers
CN110096903B (en) Asset verification method based on block chain and block chain network system
Brunner et al. SPROOF: A Platform for Issuing and Verifying Documents in a Public Blockchain.
Warmke What is bitcoin
Lin et al. The challenges of existence, status, and value for improving blockchain
CN112116349B (en) High-throughput-rate-oriented random consensus method and device for drawing account book
CN111464310B (en) Method for realizing mixed chain of alliance chain and Polkadat chain
CN115270145A (en) User electricity stealing behavior detection method and system based on alliance chain and federal learning
CN109447803A (en) Bookkeeping methods, equipment, alliance's chain and the storage medium of alliance's chain
Etemad et al. Database outsourcing with hierarchical authenticated data structures
EP3906636A1 (en) Verifiable object state data tracking
CN114328518A (en) UTXO model-based low storage consumption method and system
Sung Prospects and challenges posed by blockchain technology on the copyright legal system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100191 1107c, 11 / F, Xueyuan international building, 1 Zhichun Road, Haidian District, Beijing

Applicant after: IALLCHAIN Co.,Ltd.

Address before: 100043 5158, 5 floor, 11 Shixing street, Shijingshan District, Beijing.

Applicant before: IALLCHAIN Co.,Ltd.

GR01 Patent grant
GR01 Patent grant