CN109543456A - Block generation method and computer storage medium - Google Patents

Block generation method and computer storage medium Download PDF

Info

Publication number
CN109543456A
CN109543456A CN201811312692.8A CN201811312692A CN109543456A CN 109543456 A CN109543456 A CN 109543456A CN 201811312692 A CN201811312692 A CN 201811312692A CN 109543456 A CN109543456 A CN 109543456A
Authority
CN
China
Prior art keywords
block
node
requesting node
alliance
public key
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811312692.8A
Other languages
Chinese (zh)
Other versions
CN109543456B (en
Inventor
牛冬
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xintang Sichuang Educational Technology Co Ltd
Original Assignee
Beijing Xintang Sichuang Educational Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xintang Sichuang Educational Technology Co Ltd filed Critical Beijing Xintang Sichuang Educational Technology Co Ltd
Priority to CN201811312692.8A priority Critical patent/CN109543456B/en
Publication of CN109543456A publication Critical patent/CN109543456A/en
Application granted granted Critical
Publication of CN109543456B publication Critical patent/CN109543456B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The embodiment of the present invention provides a kind of block generation method and computer storage medium, is applied to alliance's block chain, includes multiple nodes in alliance's block chain, and each node updates the public key and private key of itself according to the instruction timing of the central node in alliance's block chain;Block generation method includes: to obtain the block that the requesting node in alliance's block chain is initiated to generate request, wherein, block generates the signature that the block content-data of new block to be generated is carried in request, and the signature of block content-data is signed by the updated private key of requesting node;To the validity of the public key after the central node checking request node updates of alliance's block chain, according to the signature of effective public key verifications block content-data;If the signature verification of block content-data passes through, generates requesting node after request is reached common understanding in alliance's block chain in block and generate requested new block.

Description

Block generation method and computer storage medium
Technical field
The present embodiments relate to field of computer technology more particularly to a kind of block generation methods and computer storage to be situated between Matter.
Background technique
Block chain is that the computers such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm are utilized in one kind The new application mode of technology.Block chain is divided into three classes, and is respectively: publicly-owned block chain, alliance's block chain (also referred to as joint block Chain, industry block chain) and three kinds of privately owned block chain.
Wherein, publicly-owned block chain is directed to owner;Alliance's block chain is directed to some specific group and has The third party of limit;Privately owned block chain is directed to individual.Contrastingly, requirement highest of alliance's block chain to safety, is joining It needs to guarantee in alliance's block chain to only have the internal preselected node formulated that could have the permission for generating new block as book keeping operation people, Although other nodes can participate in business, accounting procedure cannot be bothered about.
But in existing alliance's block chain, security mechanism is mostly used for carrying out the information of cochain encryption storage to protect The safety of uplink data is demonstrate,proved, but guarantees the safety of generation block process there is no corresponding security mechanism, in certain feelings The corresponding I P of preselected node and public and private key under condition, such as book keeping operation people are stolen by lawless people, and lawless people can make New block is generated in alliance's block chain with the identity of the preselected node, to generate to the Information Security in alliance's block chain Greatly threaten.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of block generation method and computer storage medium, it is above-mentioned to solve Problem.
The embodiment of the present invention provides a kind of block generation method, is applied to alliance's block chain, wraps in alliance's block chain Multiple nodes are included, each node updates public key and the private of itself according to the instruction timing of the central node in alliance's block chain Key;The block generation method includes: to obtain the block that the requesting node in alliance's block chain is initiated to generate request, In, the block generates the signature that the block content-data of new block to be generated is carried in request, the block content-data Signature signed by the updated private key of the requesting node;To described in the verifying of the central node of alliance's block chain The validity of the updated public key of requesting node, with the signature of the block content-data according to the effective public key verifications; If the signature verification of the block content-data passes through, the requesting node is made to generate request in the alliance in the block Requested new block is generated after reaching common understanding in block chain.
The embodiment of the present invention also provides a kind of computer-readable medium, and the computer storage medium is stored with readable journey Sequence, the readable program are applied to alliance's block chain, include multiple nodes in alliance's block chain, each node is according to described The instruction timing of central node in alliance's block chain updates the public key and private key of itself;The readable program includes: for obtaining The block for taking the requesting node in alliance's block chain to initiate generates the instruction of request, wherein the block generates in request The signature of the block content-data of new block to be generated is carried, the signature of the block content-data passes through the requesting node Updated private key is signed;For verifying the updated public affairs of requesting node to the central node of alliance's block chain The validity of key, with the instruction of the signature of the block content-data according to the effective public key verifications;If for the area The signature verification of block content-data passes through, then the requesting node is made to generate request in alliance's block chain in the block The instruction of requested new block is generated after reaching common understanding.
By above technical scheme as it can be seen that in block generation scheme provided in an embodiment of the present invention, requesting node timing updates Public key, the private key of its own, after the block that acquisition request node is initiated generates request, by central node checking request node Public key validity, can determine requesting node public key be it is updated, belong to requesting node in existing state Public key (i.e. the first public key is effective), so as to the block generated according to the public key of effective requesting node, checking request node The signature of the block content-data for the new block to be generated for including in request is generated, and then can guarantee to generate in alliance's block chain The safety of block process, to improve the safety of alliance's block chain.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in inventive embodiments can also obtain according to these attached drawings for those of ordinary skill in the art Obtain other attached drawings.
Fig. 1 is the step flow chart according to a kind of block generation method of the embodiment of the present invention one;
Fig. 2 is the step flow chart according to a kind of block generation method of the embodiment of the present invention two;
Fig. 3 is the step flow chart according to a kind of block generation method of the embodiment of the present invention three;
Fig. 4 is the step flow chart according to a kind of block generation method of the embodiment of the present invention four.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in the embodiment of the present invention, below in conjunction with the present invention Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described reality Applying example only is a part of the embodiment of the embodiment of the present invention, instead of all the embodiments.Based on the implementation in the embodiment of the present invention The range of protection of the embodiment of the present invention all should belong in example, those of ordinary skill in the art's every other embodiment obtained.
Below with reference to attached drawing of the embodiment of the present invention the embodiment of the present invention will be further explained specific implementation.
Embodiment one
Referring to Fig.1, a kind of step flow chart of according to embodiments of the present invention one block generation method is shown.
Block generation method provided in this embodiment is applied to alliance's block chain, wherein includes in alliance's block chain Multiple nodes, each node update public key and the private of itself according to the instruction timing of the central node in alliance's block chain Key.Wherein, the public key and the node of private key for updating itself according to the instruction timing of central node also include central node itself.
The block generation method of the present embodiment the following steps are included:
S102, the block generation request that the requesting node in alliance's block chain is initiated is obtained.
Wherein, the block generates the signature that the block content-data of new block to be generated is carried in request, the area The signature of block content-data is signed by the updated private key of the requesting node.
When requesting node coalizes block chain for the first time, central node can generate public key and private key for it, wherein private key It is saved by requesting node itself, for the data that requesting node issues to be encrypted or signed;Public key broadcasts are to alliance's block Other nodes of chain, the data for issuing other nodes to requesting node are decrypted or verify.
In the present embodiment, requesting node is to have the arbitrary node for generating block permission in alliance's block chain, is saved in request When point needs to generate new block, it can be generated according to the block content-data of new block to be generated and initiate block generation and asked It asks, and is broadcasted to alliance's block chain.The block generation method of the present embodiment is used for after requesting node initiates block generation request, Before all nodes of entire alliance block chain reach common recognition to block generation request.
The present embodiment is illustrated block generation method, but ability from the angle of a node in alliance's block chain Field technique personnel are it should be apparent that the node can be the arbitrary node in alliance's block chain, or it can be said that alliance's block The processing that all nodes in chain generate request to new block all can refer to the embodiment of the present invention and realize.
Instruction timing due to requesting node also according to the central node in alliance's block chain updates itself public affairs The signature of key and private key, then the block content-data that its block initiated generates the new block to be generated carried in request can be It is signed by the updated private key of requesting node.
The block content-data of new block to be generated can include but is not limited to number and the new district of new block to be generated The information etc. of the corresponding block content of block.
Each new block has a number, the corresponding HASH value of the number typically block, according to the number It can determine whether the new block has generated, position and linking relationship in alliance's block chain etc., in practical applications, Those skilled in the art can use number that is any suitable, meeting block chain specification, unique identification block and can characterize Its position within a block.
And for the information of block content, those skilled in the art can also according to actual needs, and use is any suitable Mode realizes, e.g., the summary info, etc. of the block content of new block, the embodiment of the present invention to this with no restriction.Block content The signature of data can be the digital signature generated after being encrypted the summary info of block content-data by private key.
The central node of S104, Xiang Suoshu alliance block chain verifies the validity of the updated public key of the requesting node, With the signature of the block content-data according to the effective public key verifications.
In the present embodiment, since each node updates certainly according to the instruction timing of the central node in alliance's block chain Therefore, in central node the public key and private key of body include the public key after all node updates.Then receive the section that block generates request Point can public key into central node after checking request node updates validity, that is, determine for verify the request section signed The public key of point is the public key updated and still in existing state for belonging to requesting node.
In this step, verified by the validity to the updated public key of requesting node, with the public key of requesting node, Private key timing update combines, it is ensured that the public key validity of requesting node, though criminal steal requesting node IP, Public key, private key etc., the time used is not also permanent, to ensure that the safety of alliance's block chain.
If the signature verification of S106, the block content-data pass through, generate the requesting node in the block Request generates requested new block after reaching common understanding in alliance's block chain.
If the signature verification of block content-data passes through, it may be considered that sending block to generate the requesting node of request is just Chang Jiedian can execute other subsequent steps, such as determine all nodes to the area by the common recognition mechanism of alliance's block chain Block generates request and reaches common understanding, and reaches in alliance's block chain so that the requesting node generates request in the block At generating requested new block after common recognition.
Through this embodiment, requesting node timing updates public key, the private key of its own, the block that acquisition request node is initiated After generating request, by the validity of the public key to central node checking request node, it can determine that the public key of requesting node is The updated public key (i.e. the first public key is effective) for belonging to requesting node in existing state, so as to according to effective The public key of requesting node, the block that checking request node generates generate the block content number for the new block to be generated for including in request According to signature, and then can guarantee in alliance's block chain generate block process safety, to improve the safety of alliance's block chain Property.
The block generation method of the present embodiment can be executed by any suitable electronic equipment with data-handling capacity, Including but not limited to: server, mobile terminal (such as tablet computer, mobile phone) and PC machine etc..
Embodiment two
Referring to Fig. 2, a kind of step flow chart of according to embodiments of the present invention two block generation method is shown.
Block generation method provided in this embodiment is applied to alliance's block chain, wherein includes in alliance's block chain Multiple nodes, each node update public key and the private of itself according to the instruction timing of the central node in alliance's block chain Key.
Optionally, in the present embodiment, each node can periodically update itself public key and private key in the following manner.
The key updating instruction that central node described in present node timing acquisition issues, wherein key updating instruction is taken The public key and private key for update generated with the central node;Present node is instructed according to the key updating and is obtained The public key and private key for update that the central node generates, periodically to update itself public key and private key.
In the present embodiment, key updating instruction and its public key and private key for update carried are given birth to by central node At.When the key updating instruction that central node described in present node timing acquisition issues, key updating instruction be can be by center What node was actively sent to present node, be also possible to request from present node to central node, the present embodiment to this not into Row limits.
Since the public key and private key for update of present node are generated by central node, centromere can effectively ensure that The accuracy of the public key stored in point.
Present node update after the completion of, can by central node by updated public key broadcasts to alliance's block chain, make to join The public key of the present node of its storage of other node updates in alliance's block chain.
Timing based on public key and private key in aforementioned each node updates, the block generation method of the present embodiment include with Lower step:
S202, the block generation request that the requesting node in alliance's block chain is initiated is obtained.
Wherein, the block generates the signature that the block content-data of new block to be generated is carried in request, the area The signature of block content-data is signed by the updated private key of the requesting node.
Step S202 in the present embodiment is similar with the step S102 in embodiment one, and details are not described herein for the present embodiment.
S204, Xiang Suoshu central node send checking request, and obtain the verification result of the central node feedback.
In the present embodiment, the checking request is for requesting the validity to the updated public key of requesting node to be tested It demonstrate,proves, the public key data of the requesting node of present node storage can be carried in checking request.Central node is asked in acquisition verifying After asking, the public key of the requesting node stored in the public key and central node of the requesting node for including in checking request can be carried out It compares, and verification result is generated according to comparison result.It may include the public affairs for the requesting node that checking request carries in verification result The validation verification of key is as a result, can also include that central node stores in verification result if verification result is invalid optionally Effective requesting node public key.
S206, judge whether the public key for the requesting node that the checking request carries is effective according to verification result;If effectively, Then follow the steps S208;If invalid, S210 is thened follow the steps.
S208, if it is determined that the public key of requesting node is effective, then the area according to the public key verifications of presently described requesting node The signature of block content-data.Go to step S212 execution.
S210, if it is determined that the public key of requesting node is invalid, then refuse to handle the block generating request.Terminate this stream Journey.
In the present embodiment, if carrying the public key of the effective requesting node stored in central node in verification result, It is directly updated to local, if it does not exist, is then needed again to the public key of central node transmission acquisition request node Request, to obtain the public key of effective requesting node.
If the signature verification of S212, the block content-data pass through, generate the requesting node requested new Block.
The data structure of block can be not identical as the data structure of existing block in the present embodiment, the block of the present embodiment It may include block head, block body and hash value, the block body includes a plurality of operational order, and the block head includes described more The time of the value of the root for the Merkle tree that the hash value of operational order, a plurality of operational order are constituted, generation current block The hash value of stamp, the previous block adjacent with the current block, the hash value that the block data includes are based on the area What build and the block body generated.Wherein, every operational order in a plurality of operational order includes action type, table Name, JSONization content.
Based on this, the block content-data of the present embodiment includes block head, block body and hash value, and the block body includes A plurality of operational order, the block head include that the hash value of a plurality of operational order, a plurality of operational order are constituted The hash value of the value of the root of Merkle tree, the timestamp for generating current block, the previous block adjacent with the current block, institute Stating the hash value that block data includes is generated based on the block head and the block body.Wherein, a plurality of operation refers to Every operational order in order includes action type, table name, JSONization content.So that generating the block of above-mentioned block data structures When, the block processes time can be largely saved, to substantially increase the treatment effeciency of block.
In the present embodiment, it is only capable of carrying out by the matched public key of requesting node by the signature that the private key of requesting node generates Verifying.Therefore, it if signature verification passes through, can determine that requesting node is normal, then requesting node can be made to generate requested New block;If signature verification does not pass through, it is abnormal can to determine that requesting node exists, then refuses the requested new district of requesting node The generation of block.
If the signature passes through, show that sending block to generate the requesting node of request is normal, legal node, this In the case of kind, the present node for receiving block generation request can send confirmation message, other in alliance's block chain to inform Node (including requesting node), present node confirmation request node can be generated the block and generate the requested new district of request Block.If all nodes in alliance's block chain have sent confirmation message, it is believed that the block generates request in entire alliance Common recognition is reached in block chain, at this point, new block can be generated in requesting node.
In a kind of feasible pattern, composition of the requesting node based on block data above-mentioned generates the process of new block It may include: to receive the block that requesting node is initiated to generate request;Request is generated to block to parse, and is obtained block generation and is asked Action type information, operation object information and operation content information in asking;Based on action type information, operation object information and Operation content information generates the operational order for the intermediate language representation for having mapping relations with sql like language;To intermediate language representation Operational order execute map operation, obtain the operational order that the sql like language indicates;The operation indicated based on sql like language is referred to It enables, executes block and generate the corresponding new block generation processing of request.
Wherein, the action type information includes being used to indicate to carry out the information that data increase operation, the operation object Information includes the table name of tables of data, bit coin storage account of some user etc., for example, student information table, Students' Score List, Raw educational background table, the operation content information may include the field and operating parameter of tables of data, for example, the field of tables of data can be Raw name, students ' age etc., the operating parameter can be student name be it is small red, students ' age is 8 years old etc., the operation content Information may also include the quantity for this time operating bit coin.It is understood that above description is exemplary only, the present invention is implemented Example does not do any restriction to this.
In the present embodiment, the intermediate language with sql like language with mapping relations can be the language of similar sql like language Or the sql like language of simplified version.For example, operational order include three primary fields, respectively " action type ", " table name ", " JOSN " three fields then indicate the expression example of the operational order are as follows: insert/ using the language of similar sql like language update table json.Wherein, " insert/update " is the concrete operations instruction that can correspond to sql like language, table For a variable, a specific table name can be embodied as in each concrete operations, json is also a variable, every An operating process or the corresponding SQL instruction of operating result and/or sentence can be embodied as in one concrete operations.
In some optional embodiments, refer in the operation for generating the intermediate language representation that there are mapping relations with sql like language When enabling, splicing can be carried out to the action type information, operation object information and operation content information, obtained and SQL language Say the operational order with the intermediate language representation of mapping relations.It is understood that any generation has mapping with sql like language The embodiment of the operational order of the intermediate language representation of relationship may be applicable to this, and the embodiment of the present invention does not do any limit to this It is fixed.
As it can be seen that being not directly to be generated to request according to block, generating machine recognition in above-mentioned block generating process Sql like language indicate generation operational order, but based on block generate request in action type information, operation object information and Operation content information generates the operational order for the intermediate language representation for having mapping relations with sql like language, then to intermediate language table The operational order shown executes map operation, obtains the operational order that sql like language indicates, saves the generation processing time of block, Substantially increase the generation treatment effeciency of block.
It should be noted that the requesting node in the above process can be any one node in alliance's block chain, packet Present node is included, which can be the central node in alliance's block chain, be also possible to non-central node.
By the above process, the generation of the new block of the verifying and requesting node to requesting node legitimacy is realized.
Optionally, in the present embodiment after step s 212, can also include:
S214, the new block generation notification message that the requesting node issues is obtained.
Wherein, the new block generates the information that generated new block is carried in notification message, wherein the new district The signature of the signature of content-data in the information of block including the new block, the content-data of the new block is asked by described The private key of node is asked to sign.
In the present embodiment, the content-data of new block may include the HASH value of new block, the block content of new block Information etc., wherein the information of the block content of new block may include the signature of the content-data of new block, the new block it is interior The signature for holding data can be with are as follows: is signed by the number that the private key of requesting node is encrypted the content-data of new block Name.
The central node of S216, Xiang Suoshu alliance block chain verifies the validity of the public key of the requesting node, with basis The signature of new block described in the effective updated public key verifications of requesting node.
In the present embodiment, step S216 is similar with the step S104 in embodiment one, and details are not described herein for the present embodiment.
In the present embodiment, by the validity of the public key of checking request node again, then pass through effective requesting node Public key verifications new block generate the signature in notification information, further improve and generate new block process in alliance's block chain Safety improves the safety of alliance's block chain data.
If the signature verification of S218, the new block pass through, responds the new block and generate notification message, to use Alliance's block chain described in the information update of the new block generated and local block data.
After requesting node generates new block, it can be broadcasted to all nodes of alliance's block chain, so that all nodes Block update is carried out, realizes that the data of all nodes in alliance's block chain are synchronous.
After updating alliance's block chain and local block data, the uplink operation of new block can be completed.
In the present embodiment, the node that step S214-S218 can generate notification message by arbitrarily receiving new block is executed, when After front nodal point receives new block generation notification message, notification message can be generated according to new block, more by generated new block The data for the alliance's block chain being newly locally stored.
Block provided in this embodiment generates scheme, updates the basis of the public key of its own, private key in requesting node timing On, after the block that acquisition request node is initiated generates request, by the validity of the public key to central node checking request node, Include in requesting so as to which according to the public key of effective requesting node, the block that checking request node generates is generated is to be generated The signature of the block content-data of new block;After requesting node generates new block, the new district that the requesting node issues is obtained Block generates notification message, and the public key validity of checking request node again, so as to according to the public affairs of effective requesting node The new block that key checking request node generates generates the signature for including in notification message can be into one by verification process twice Step improves the safety that block process is generated in alliance's block chain, to improve the safety of alliance's block chain.
The block generation method of the present embodiment can be executed by any suitable electronic equipment with data-handling capacity, Including but not limited to: server, mobile terminal (such as tablet computer, mobile phone) and PC machine etc..
Embodiment three
Scheme of the present embodiment based on previous embodiment one or embodiment two, and aforementioned schemes are further changed Into.
In the present embodiment, setting in alliance's block chain further includes I P white list, is stored with alliance's block in I P white list The IP address of all nodes in chain, since alliance's block chain is directed to setting group, most of is the enterprise of setting industry, then The block chain if a certain enterprise coalizes can be its distribution node, when node generates, can put the section on record to alliance's block chain The IP address of the server of the corresponding enterprise of point, and the IP address of the server is added in IP white list.
In the present embodiment, as shown in figure 3, the method also includes:
S302, acquisition simultaneously verify the IP address of the requesting node with the IP of the requesting node in the IP white list that prestores Whether location is consistent, and verifies the validity of the IP address of the requesting node.
In general, can verify and be carried in the starting request of requesting node when requesting node starting in alliance's block chain The consistency and validity of the IP of the requesting node stored in IP and IP white list can star request if verification passes through Node does not allow requesting node to start if verification does not pass through.By verifying its IP when requesting node starts, can prevent The illegal node that do not put on record in alliance's block chain cannot start.But the program of alliance's block chain is in alliance's block chain All nodes be it is disclosed, therefore, criminal can by cancellation fall alliance's block chain program in for verify starting The subprogram of IP skips the step.
Therefore, in order to which the safety for further increasing alliance's block chain receives block generation and ask before generating new block The present node asked can execute above-mentioned steps S302, to determine that requesting node was not put on record not non-by step S302 Method node.
If S304, inconsistent or requesting node IP address are invalid, refuse to handle the block generation request.Terminate This process.
If S306, consistent or requesting node IP address are effective, continue with the block and generate request, so that institute It states requesting node and generates requested new block.
The IP address of requesting node can be used as parameter included in the request that requesting node issues, so as to direct root The IP address of requesting node is determined according to the request that requesting node is initiated.
Then, can continue to execute it is following as described in embodiment one the step of.
S308, the block generation request that the requesting node in alliance's block chain is initiated is obtained.
The central node of S310, Xiang Suoshu alliance block chain verifies the validity of the updated public key of the requesting node, With the signature of the block content-data according to the effective public key verifications.
If the signature verification of S312, the block content-data pass through, generate the requesting node requested new Block.Wherein, the execution of above-mentioned steps S308-S312 is as described in embodiment one, and details are not described herein.
In the present embodiment, IP white list be can store in the local of all nodes, then arbitrarily obtains what requesting node was initiated The node that block generates request can carry out above-mentioned checking procedure.
Certainly, in another implementation of the present embodiment, IP white list also be can store in central node, then above-mentioned Checking procedure can be executed by central node, and then, check results can be informed other nodes by central node.
Since above-mentioned checking procedure can be carried out by node itself, then criminal can not be jumped by nullifying subprogram The checking procedure is crossed, so that starting node successfully even if there are criminals, which does not have the function for generating new block yet Energy.Further, the process of above-mentioned checking request node IP and checking request node public key validity in embodiment one are mutually tied It closes, can be further improved the safety of alliance's block chain.
It should be noted that combined with above-mentioned steps S302-S306 with the scheme in embodiment one in the present embodiment, For executing before the step S102 (the step S308 in the present embodiment), but those skilled in the art it should be apparent that In practical application, the execution of step S302-S306 can also be in step S106 (this reality in such as embodiment one in the present embodiment Apply the step S312 in example) in signature verification by after executed before generating new block, alternatively, step S302-S306 This two parts executes parallel with step S308-S312, and the present embodiment is to this without limiting.
Certainly, corresponding, in the present embodiment, above-mentioned steps S302-S306 can also be combined with embodiment two, above-mentioned step Rapid S302-S306 can be executed before step S202, can also be tested in the signature in the step S212 in such as embodiment two Card by after executed before generating new block or step S302-S306 with step S202-S210 this two parts is held parallel Row, the present embodiment is to this without limiting.
Further, after the present embodiment is combined with above-described embodiment one or two, the side that can provide through the foregoing embodiment Case determines that the public key of requesting node is the updated public key for belonging to requesting node in existing state, and passes through this reality An ip for checking request node is applied so that it is determined that the illegal node that requesting node was not put on record, is preferably tested from available Effect is demonstrate,proved, to be further ensured that the safety for generating new block process in alliance's block chain.
In another implementation of the present embodiment, the process of IP address verifying can also obtain alliance's block described The block that requesting node in chain is initiated executes before generating request.
For example, before step S308, method provided in this embodiment can also include: present node to the area, alliance The central node sending node of block chain starts request, wherein the node is with starting the IP in request including the present node Location;Receive the starting request feedback message that the central node returns, wherein the starting request feedback message is by the center Node is according to the consistency checking and present node of the IP address of present node and the node IP address in the IP white list that prestores IP address validation verification verification result generate;If the verification result instruction is proved to be successful, the present node Carry out node start-up operation.
By the IP address for verifying present node when present node starts, it is ensured that the validity of present node, from And guarantee that present node executes be to movements such as the validity of public key after central node checking request node updates it is effective, And then ensure that the safety for generating block process, to improve the safety of alliance's block chain.
In another implementation of the present embodiment, the process of IP address verifying can also be into alliance's block chain It is executed during the validity of the updated public key of requesting node described in heart node verification.
For example, step S310 may include: that present node is sent out to the central node of alliance's block chain in the present embodiment The validation verification is sent to request, wherein to include the IP address of the present node in the validation verification request;Receive institute State the checking request feedback message of central node return, wherein the checking request feedback message is being tested by the central node The IP address for demonstrate,proving the present node is consistent and present node with the IP address of the present node in the IP white list prestored IP address it is effective after, according to the verification result of the validity of the updated public key of the requesting node generate;It is described to work as prosthomere Point determines the validity of the updated public key of the requesting node according to the checking request feedback message.
In validity of the present node to the public key of central node checking request node, with verifying the IP of present node Location, it is ensured that the validity of present node, thus guarantee that present node executes to central node checking request node updates The movement of the validity of public key afterwards is effective, and then ensure that the safety for generating block process, to improve alliance's block The safety of chain.
Example IV
Scheme of the present embodiment based on previous embodiment one or embodiment two, and aforementioned schemes are further changed Into.
Scheme provided in this embodiment is to increase other security mechanisms, such as flow on the basis of embodiment one or two Monitoring mechanism.Specifically, since alliance's block chain is directed to special group, such as the enterprise of certain industry etc., alliance's block The node request flow of chain has business rule corresponding with special group.
In the present embodiment, as shown in figure 4, the method also includes:
The flow threshold of the flow of requesting node described in S402, comparison and preset requesting node.
In the present embodiment, flow threshold can be determined when alliance's block chain is established, and flow threshold determining at this time can be with For initial flow threshold value.In alliance's block chain use process, flow threshold can be updated, it is made more to meet alliance's block chain Development.
In the present embodiment, the flow of requesting node can be monitored in real time by the management module of central node, alarm signal Breath is also generated by the management module of central node.
If the flow of S404, the requesting node is greater than the flow threshold of the requesting node, warning message is generated.Knot Shu Benci process.
If the flow of S406, the requesting node is less than the flow threshold of the requesting node, it is determined that the request section Point is normal.
Then, can continue to execute it is following as described in embodiment one the step of.
S408, the block generation request that the requesting node in alliance's block chain is initiated is obtained.
The central node of S410, Xiang Suoshu alliance block chain verifies the validity of the updated public key of the requesting node, With the signature of the block content-data according to the effective public key verifications.
If the signature verification of S412, the block content-data pass through, generate the requesting node requested new Block.
Wherein, the execution of above-mentioned steps S408-S412 is as described in embodiment one, and details are not described herein.
It may include the data on flows of requesting node in warning message, for flow threshold of comparison etc..In the present embodiment, It is whether normal come the flow for detecting requesting node by setting flow threshold, the safety for determining requesting node can be assisted.
It should be noted that combined with above-mentioned steps S402-S404 with the scheme in embodiment one in the present embodiment, For executing before the step S102 (the step S408 in the present embodiment), but those skilled in the art it should be apparent that In practical application, the executing for step S402-S404 in the present embodiment can also be in step S106 (this in such as embodiment one Step S412 in embodiment) in signature verification by after executed before generating new block, alternatively, step S302- S306 is executed parallel with step S308-S312, and the present embodiment is to this without limiting.
Certainly, corresponding, in the present embodiment, above-mentioned steps S402-S406 can also be combined with embodiment two, above-mentioned step Rapid S402-S404 can be executed before step S202, can also be tested in the signature in the step S212 in such as embodiment two Card by after executed before generating new block or step S302-S306 with step S202-S210 this two parts is held parallel Row, the present embodiment is to this without limiting.
By the above process, the real time monitoring to requesting node flow is realized.
Optionally, in the present embodiment, if the flow in the requesting node is greater than the flow threshold, report is generated After alert information, the method also includes:
S414, according to the warning message, determine whether the flow of the requesting node meets preset condition.
Wherein, the flow that the preset condition is used to indicate alliance's block chain interior joint is in normal growth state. Go to step S416 execution.
If the flow of S416, the requesting node meet preset condition, it is determined that the requesting node is normal.It can go to Step S408 is executed.
I.e. flow, which exceeds the reason of flow threshold, is caused by the normal business of node increases, normal in order to adapt to business, The flow threshold of the requesting node can be adjusted according to the present flow rate of the requesting node.
If the flow of S418, the requesting node do not meet preset condition, it is determined that the requesting node exists abnormal.Knot Shu Benci process.
I.e. requesting node may be illegal node, at this time can be by the I P address of the requesting node from I P white list It removes.
By step S414-S418, it can determine whether the flow of requesting node meets preset condition, so as to distinguish The growth reason of requesting node flow, and then determining requesting node can be improved and there is the accurate fixed of abnormal result, it reduces Normal node is judged as to the probability of abnormal nodes.
After the present embodiment is combined with above-described embodiment one or two, the scheme that can be provided through the foregoing embodiment determines request The public key of node be it is updated, in existing state belong to the public key of requesting node, and provide through this embodiment Whether scheme can be more than that flow threshold determines that requesting node whether there is exception by monitoring the real-time traffic of requesting node, From available better verification the verifying results, to be further ensured that the safety for generating new block process in alliance's block chain.
Embodiment five
The embodiment of the invention also provides a kind of computer-readable medium, the computer storage medium is stored with readable journey Sequence, the readable program are applied to alliance's block chain, include multiple nodes in alliance's block chain, each node is according to described The instruction timing of central node in alliance's block chain updates the public key and private key of itself;The readable program includes: for obtaining The block for taking the requesting node in alliance's block chain to initiate generates the instruction of request, wherein the block generates in request The signature of the block content-data of new block to be generated is carried, the signature of the block content-data passes through the requesting node Updated private key is signed;For verifying the updated public affairs of requesting node to the central node of alliance's block chain The validity of key, with the instruction of the signature of the block content-data according to the effective public key verifications;If for the area The signature verification of block content-data passes through, then the requesting node is made to generate request in alliance's block chain in the block The instruction of requested new block is generated after reaching common understanding.
Optionally, each node updates the public key and private key of itself by following readable program timing: working as making The instruction for the key updating instruction that central node described in front nodal point timing acquisition issues, wherein key updating instruction carries The public key and private key for update that the central node generates;For obtaining present node according to key updating instruction The public key and private key for update that the central node generates are taken, periodically to update the instruction of itself public key and private key.
Optionally, described for verifying the updated public key of requesting node to the central node of alliance's block chain Validity, the instruction with the signature of the block content-data according to the effective public key verifications includes: for described Central node sends checking request, and obtains the instruction of the verification result of the central node feedback;If for being tested according to described Card result determines that the public key for the requesting node that the checking request carries is effective, then according to the public affairs of presently described requesting node Key verifies the instruction of the signature of the block content-data;If alternatively, for determining that the verifying is asked according to the verification result It asks the public key of the requesting node of carrying invalid, then refuses to handle the instruction that the block generates request.
Optionally, after for the instruction for generating new block, the readable program further include: described for obtaining The new block that requesting node issues generates notification message, and the new block generates in notification message and carries generated new block Information instruction, wherein in the information of the new block including the new block content-data signature, the new block The signature of content-data signed by the private key of the requesting node;For the central node to alliance's block chain The validity of the public key of the requesting node is verified, with new according to the effective updated public key verifications of requesting node The instruction of the signature of block;If the signature verification for the new block passes through, responds the new block and generates notification message, To use the instruction of alliance's block chain described in the information update of the generated new block and local block data.
Optionally, in the finger for generating request for obtaining the block that the requesting node in alliance's block chain is initiated Before order, alternatively, the readable program also wraps after the instruction that the signature verification for block content-data passes through Include: whether the IP address of the requesting node in IP address and the IP white list prestored for obtaining and verifying the requesting node Unanimously, and verify the requesting node IP address validity instruction;If for inconsistent or requesting node IP Location is invalid, then refuses to handle the instruction that the block generates request;If effective for consistent and requesting node IP address, after The continuous processing block generates request, so that the requesting node generates the instruction of requested new block;
Alternatively,
Before the instruction for obtaining the block generation request that the requesting node in alliance's block chain is initiated, The readable program further include: for making present node to the starting request of the central node sending node of alliance's block chain Instruction, wherein include the IP address of the present node in the node starting request;It is returned for receiving the central node Starting request feedback message instruction, wherein the starting requests feedback message by the central node according to present node IP address and the validity of the consistency checking of the node IP address in the IP white list that prestores and the IP address of present node The verification result of verifying generates;If being proved to be successful for verification result instruction, the present node carries out node starting The instruction of operation;
Alternatively,
It is described to be used to verify the effective of the updated public key of the requesting node to the central node of alliance's block chain Property instruction include: to send the finger that the validation verification is requested to the central node of alliance's block chain for present node It enables, wherein include the IP address of the present node in the validation verification request;It is returned for receiving the central node Checking request feedback message instruction, wherein the checking request feedback message is worked as described in the verifying as the central node Consistent and present node the IP address of the IP address of present node in the IP address of front nodal point and the IP white list prestored After effectively, generated according to the verification result of the validity of the updated public key of the requesting node;For making the present node The instruction of the validity of the updated public key of the requesting node is determined according to the checking request feedback message.
Optionally, in the finger for generating request for obtaining the block that the requesting node in alliance's block chain is initiated Before order, alternatively, the readable program also wraps after the instruction that the signature verification for block content-data passes through It includes: the instruction of the flow threshold of the flow and preset requesting node for the requesting node;If for the request The flow of node is greater than the flow threshold of the requesting node, then generates the instruction of warning message.
Optionally, if being greater than the flow threshold in the flow in the requesting node, report is generated After the instruction of alert information, the readable program further include: for determining the stream of the requesting node according to the warning message Whether amount meets the instruction of preset condition, wherein the preset condition is used to indicate the flow of alliance's block chain interior joint Increase state in normal;If the flow for the requesting node meets preset condition, it is determined that the requesting node is normal, The instruction of the flow threshold of the requesting node is adjusted according to the present flow rate of the requesting node;If alternatively, being asked for described The flow of node is asked not meet preset condition, it is determined that the requesting node has exception, by the IP address of the requesting node The instruction removed from IP white list.
Optionally, the block content-data includes block head, block body and hash value, and the block body includes a plurality of behaviour It instructs, the block head includes the Merkle tree of the hash value of a plurality of operational order, a plurality of operational order composition Root value, generate the hash value of the timestamp of current block, the previous block adjacent with the current block, the block counts It according to the hash value for including is generated based on the block head and the block body.
Optionally, every operational order in a plurality of operational order includes action type, table name, JSONization content.
Computer-readable medium through this embodiment, requesting node timing update public key, the private key of its own, and acquisition is asked After the block for asking node to initiate generates request, by the validity of the public key to central node checking request node, it can determine The public key of requesting node is the updated public key (i.e. the first public key is effective) for belonging to requesting node in existing state, from And can be according to the public key of effective requesting node, include in the block generation request that checking request node generates is to be generated new The signature of the block content-data of block, and then can guarantee the safety that block process is generated in alliance's block chain, to improve The safety of alliance's block chain.It may be noted that according to the needs of implementation, can by all parts described in the embodiment of the present invention/ Step is split as more components/steps, can also combine the part operation of two or more components/steps or components/steps The components/steps of Cheng Xin, to realize the purpose of the embodiment of the present invention.
It is above-mentioned to be realized in hardware, firmware according to the method for the embodiment of the present invention, or be implemented as being storable in note Software or computer code in recording medium (such as CD ROM, RAM, floppy disk, hard disk or magneto-optic disk), or it is implemented through net The original storage of network downloading in long-range recording medium or nonvolatile machine readable media and will be stored in local recording medium In computer code, so that method described herein can be stored in using general purpose computer, application specific processor or can compile Such software processing in journey or the recording medium of specialized hardware (such as ASIC or FPGA).It is appreciated that computer, processing Device, microprocessor controller or programmable hardware include can store or receive software or computer code storage assembly (for example, RAM, ROM, flash memory etc.), when the software or computer code are by computer, processor or hardware access and execute, realize Block generation method described herein.In addition, when general purpose computer accesses for realizing the block generation method being shown here When code, general purpose computer is converted to the dedicated computing for being used for executing the block generation method being shown here by the execution of code Machine.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure Member and method and step can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed The range of the embodiment of the present invention.
Embodiment that the above embodiments are only used to illustrate the present invention, and the limitation not to the embodiment of the present invention, related skill The those of ordinary skill in art field can also make various in the case where not departing from the spirit and scope of the embodiment of the present invention Variation and modification, therefore all equivalent technical solutions also belong to the scope of the embodiment of the present invention, the patent of the embodiment of the present invention Protection scope should be defined by the claims.

Claims (10)

1. a kind of block generation method is applied to alliance's block chain, which is characterized in that include multiple sections in alliance's block chain Point, each node update the public key and private key of itself according to the instruction timing of the central node in alliance's block chain;
The block generation method includes:
It obtains the block that the requesting node in alliance's block chain is initiated and generates request, wherein the block generates in request The signature of the block content-data of new block to be generated is carried, the signature of the block content-data passes through the requesting node Updated private key is signed;
The validity of the updated public key of the requesting node is verified to the central node of alliance's block chain, according to effectively The public key verifications described in block content-data signature;
If the signature verification of the block content-data passes through, the requesting node is made to generate request described in the block Requested new block is generated after reaching common understanding in alliance's block chain.
2. the method according to claim 1, wherein each node periodically updates itself in the following manner Public key and private key:
The key updating instruction that central node described in present node timing acquisition issues, wherein key updating instruction carries The public key and private key for update that the central node generates;
Present node obtains the public key and private key for update that the central node generates according to key updating instruction, Periodically to update itself public key and private key.
3. the method according to claim 1, wherein described verify institute to the central node of alliance's block chain The validity of the updated public key of requesting node is stated, with the signature of the block content-data according to the effective public key verifications Include:
Checking request is sent to the central node, and obtains the verification result of the central node feedback;
If determining that the public key for the requesting node that the checking request carries is effective according to the verification result, according to current The signature of block content-data described in the public key verifications of the requesting node;
Alternatively, being refused if determining that the public key for the requesting node that the checking request carries is invalid according to the verification result The block is handled absolutely generates request.
4. the method according to claim 1, wherein after the generation new block, the method also includes:
It obtains the new block that the requesting node issues and generates notification message, the new block generates to be carried in notification message The information of the new block of generation, wherein the signature of the content-data in the information of the new block including the new block, it is described The signature of the content-data of new block is signed by the private key of the requesting node;
The validity of the public key of the requesting node is verified to the central node of alliance's block chain, according to effective described The signature of new block described in the updated public key verifications of requesting node;
If the signature verification of the new block passes through, responds the new block and generate notification message, to use generated institute State alliance's block chain described in the information update of new block and local block data.
5. the method according to claim 1, wherein
Before the block that the requesting node obtained in alliance's block chain is initiated generates request, alternatively, in the area After the signature verification of block content-data passes through, the method also includes:
Obtain and verify the IP address of the requesting node and the requesting node in the IP white list that prestores IP address whether one It causes, and verifies the validity of the IP address of the requesting node;If inconsistent or requesting node IP address is invalid, refuse It handles the block and generates request;If consistent and requesting node IP address is effective, continues with the block and generates request, So that the requesting node generates requested new block;
Alternatively,
Before the block that the requesting node obtained in alliance's block chain is initiated generates request, the method is also wrapped Include: present node starts to the central node sending node of alliance's block chain requests, wherein in the node starting request IP address including the present node;Receive the starting request feedback message that the central node returns, wherein the starting Request feedback message is by the central node according to the node IP address in the IP address of present node and the IP white list prestored Consistency checking and present node IP address validation verification verification result generate;If the verification result instruction is tested It demonstrate,proves successfully, then the present node carries out node start-up operation;
Alternatively,
It includes: to work as that the central node to alliance's block chain, which verifies the validity of the updated public key of the requesting node, Front nodal point sends the validation verification request to the central node of alliance's block chain, wherein the validation verification is asked It include the IP address of the present node in asking;Receive the checking request feedback message that the central node returns, wherein described Checking request feedback message is by the central node in the IP white list verifying the IP address of the present node and prestoring Consistent and present node the IP address of the IP address of present node it is effective after, according to the updated public key of the requesting node Validity verification result generate;The present node determines the requesting node more according to the checking request feedback message The validity of public key after new.
6. the method according to claim 1, wherein in the requesting node obtained in alliance's block chain Before the block of initiation generates request, alternatively, the method is also wrapped after the signature verification of the block content-data passes through It includes:
Compare the flow of the requesting node and the flow threshold of preset requesting node;
If the flow of the requesting node is greater than the flow threshold of the requesting node, warning message is generated.
7. if according to the method described in claim 6, it is characterized in that, the flow in the requesting node is greater than the stream Measure threshold value, then after generating warning message, the method also includes:
According to the warning message, determine whether the flow of the requesting node meets preset condition, wherein the preset condition The flow for being used to indicate alliance's block chain interior joint is in normal growth state;
If the flow of the requesting node meets preset condition, it is determined that the requesting node is normal, according to the requesting node Present flow rate adjust the flow threshold of the requesting node;
Alternatively, if the flow of the requesting node does not meet preset condition, it is determined that the requesting node has exception, will be described The IP address of requesting node is removed from IP white list.
8. the method according to claim 1, wherein the block content-data include block head, block body and Hash value, the block body include a plurality of operational order, and the block head includes the hash value, described of a plurality of operational order The timestamp, adjacent with the current block of the value of the root for the Merkle tree that a plurality of operational order is constituted, generation current block The hash value of previous block, the hash value that the block data includes are generated based on the block head and the block body.
9. according to the method described in claim 8, it is characterized in that, every operational order in a plurality of operational order includes Action type, table name, JSONization content.
10. a kind of computer-readable medium, which is characterized in that the computer storage medium is stored with readable program, it is described can Reader is applied to alliance's block chain, includes multiple nodes in alliance's block chain, each node is according to alliance's block The instruction timing of central node in chain updates the public key and private key of itself;
The readable program includes:
Block for obtaining the initiation of the requesting node in alliance's block chain generates the instruction of request, wherein the block The signature that the block content-data of new block to be generated is carried in request is generated, the signature of the block content-data passes through institute The updated private key of requesting node is stated to sign;
For verifying the validity of the updated public key of the requesting node to the central node of alliance's block chain, with basis The instruction of the signature of block content-data described in the effective public key verifications;
If the signature verification for the block content-data passes through, so that the requesting node is generated request in the block and exist The instruction of requested new block is generated after reaching common understanding in alliance's block chain.
CN201811312692.8A 2018-11-06 2018-11-06 Block generation method and computer storage medium Active CN109543456B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811312692.8A CN109543456B (en) 2018-11-06 2018-11-06 Block generation method and computer storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811312692.8A CN109543456B (en) 2018-11-06 2018-11-06 Block generation method and computer storage medium

Publications (2)

Publication Number Publication Date
CN109543456A true CN109543456A (en) 2019-03-29
CN109543456B CN109543456B (en) 2021-07-09

Family

ID=65844528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811312692.8A Active CN109543456B (en) 2018-11-06 2018-11-06 Block generation method and computer storage medium

Country Status (1)

Country Link
CN (1) CN109543456B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110176998A (en) * 2019-05-17 2019-08-27 北京众享比特科技有限公司 A kind of common recognition method, apparatus, equipment and the storage medium of proof of work
CN110175467A (en) * 2019-04-25 2019-08-27 平安科技(深圳)有限公司 Signature file store method, device and computer equipment based on block chain
CN110535654A (en) * 2019-07-23 2019-12-03 平安科技(深圳)有限公司 Parallel system dispositions method, device and computer equipment based on block chain
CN110535848A (en) * 2019-08-22 2019-12-03 腾讯科技(深圳)有限公司 A kind of information storage means and device
CN110955721A (en) * 2019-10-23 2020-04-03 金蝶软件(中国)有限公司 Block link point state maintenance method and device, computer equipment and storage medium
CN111953671A (en) * 2020-07-31 2020-11-17 中国工商银行股份有限公司 Block chain-based dynamic honey net data processing method and system
CN112187462A (en) * 2019-07-04 2021-01-05 北京新唐思创教育科技有限公司 Data processing method and device, electronic equipment and computer readable medium
CN112487102A (en) * 2020-12-15 2021-03-12 深圳前海微众银行股份有限公司 Block chain data processing method and device and electronic equipment

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160335628A1 (en) * 2014-05-15 2016-11-17 Adam Mark Weigold System and method for digital currency storage, payment and credit
CN106411503A (en) * 2016-11-28 2017-02-15 中国银行股份有限公司 Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode
CN106780033A (en) * 2016-12-16 2017-05-31 杭州云象网络技术有限公司 A kind of digital ticket transaction system construction method based on alliance's chain
CN107005574A (en) * 2016-12-23 2017-08-01 深圳前海达闼云端智能科技有限公司 Block generation method and device and block chain network
CN107078910A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 Generate method, device, node, signature device and the system of block chain block
CN107171806A (en) * 2017-05-18 2017-09-15 北京航空航天大学 Mobile terminal network cryptographic key negotiation method based on block chain
CN108235799A (en) * 2017-12-27 2018-06-29 深圳达闼科技控股有限公司 Block generation method, device, storage medium and block chain network
US20180198624A1 (en) * 2017-01-12 2018-07-12 International Business Machines Corporation Private blockchain transaction management and termination
CN108416589A (en) * 2018-03-08 2018-08-17 深圳前海微众银行股份有限公司 Connection method, system and the computer readable storage medium of block chain node
CN108600272A (en) * 2018-05-10 2018-09-28 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system
CN108647968A (en) * 2018-05-10 2018-10-12 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160335628A1 (en) * 2014-05-15 2016-11-17 Adam Mark Weigold System and method for digital currency storage, payment and credit
CN106411503A (en) * 2016-11-28 2017-02-15 中国银行股份有限公司 Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode
CN106780033A (en) * 2016-12-16 2017-05-31 杭州云象网络技术有限公司 A kind of digital ticket transaction system construction method based on alliance's chain
CN107005574A (en) * 2016-12-23 2017-08-01 深圳前海达闼云端智能科技有限公司 Block generation method and device and block chain network
CN107078910A (en) * 2016-12-23 2017-08-18 深圳前海达闼云端智能科技有限公司 Generate method, device, node, signature device and the system of block chain block
US20180198624A1 (en) * 2017-01-12 2018-07-12 International Business Machines Corporation Private blockchain transaction management and termination
CN107171806A (en) * 2017-05-18 2017-09-15 北京航空航天大学 Mobile terminal network cryptographic key negotiation method based on block chain
CN108235799A (en) * 2017-12-27 2018-06-29 深圳达闼科技控股有限公司 Block generation method, device, storage medium and block chain network
CN108416589A (en) * 2018-03-08 2018-08-17 深圳前海微众银行股份有限公司 Connection method, system and the computer readable storage medium of block chain node
CN108600272A (en) * 2018-05-10 2018-09-28 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system
CN108647968A (en) * 2018-05-10 2018-10-12 阿里巴巴集团控股有限公司 A kind of block chain data processing method, device, processing equipment and system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
叶小榕等: "基于区块链基于区块链_智能合约和物联网的供应链原型系统", 《科技导报》 *
李大伟等: "基于区块链的密钥更新和可信定位系统", 《密码学报》 *

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110175467A (en) * 2019-04-25 2019-08-27 平安科技(深圳)有限公司 Signature file store method, device and computer equipment based on block chain
CN110176998A (en) * 2019-05-17 2019-08-27 北京众享比特科技有限公司 A kind of common recognition method, apparatus, equipment and the storage medium of proof of work
CN112187462B (en) * 2019-07-04 2022-04-29 北京新唐思创教育科技有限公司 Data processing method and device, electronic equipment and computer readable medium
CN112187462A (en) * 2019-07-04 2021-01-05 北京新唐思创教育科技有限公司 Data processing method and device, electronic equipment and computer readable medium
CN110535654B (en) * 2019-07-23 2021-09-14 平安科技(深圳)有限公司 Block chain based parallel system deployment method and device and computer equipment
CN110535654A (en) * 2019-07-23 2019-12-03 平安科技(深圳)有限公司 Parallel system dispositions method, device and computer equipment based on block chain
CN110535848A (en) * 2019-08-22 2019-12-03 腾讯科技(深圳)有限公司 A kind of information storage means and device
CN110955721A (en) * 2019-10-23 2020-04-03 金蝶软件(中国)有限公司 Block link point state maintenance method and device, computer equipment and storage medium
CN110955721B (en) * 2019-10-23 2022-12-06 金蝶软件(中国)有限公司 Block link point state maintenance method and device, computer equipment and storage medium
CN111953671A (en) * 2020-07-31 2020-11-17 中国工商银行股份有限公司 Block chain-based dynamic honey net data processing method and system
CN111953671B (en) * 2020-07-31 2022-08-26 中国工商银行股份有限公司 Dynamic honey net data processing method and system based on block chain
CN112487102A (en) * 2020-12-15 2021-03-12 深圳前海微众银行股份有限公司 Block chain data processing method and device and electronic equipment
CN112487102B (en) * 2020-12-15 2024-03-19 深圳前海微众银行股份有限公司 Block chain data processing method and device and electronic equipment

Also Published As

Publication number Publication date
CN109543456B (en) 2021-07-09

Similar Documents

Publication Publication Date Title
CN109543456A (en) Block generation method and computer storage medium
CN107231351B (en) Electronic certificate management method and related equipment
CN109450910B (en) Data sharing method based on block chain, data sharing network and electronic equipment
CN109525671B (en) Block chain-based data storage method, electronic device and storage medium
CN109819443B (en) Registration authentication method, device and system based on block chain
CN106899410B (en) A kind of method and device of equipment identities certification
CN110933163B (en) Block chain contract deployment method, device, equipment and storage medium
CN102170440B (en) Method suitable for safely migrating data between storage clouds
JP2021504832A (en) Model training system and method and storage medium
CN111010367B (en) Data storage method and device, computer equipment and storage medium
CN110086608A (en) User authen method, device, computer equipment and computer readable storage medium
CN110516474A (en) User information processing method, device, electronic equipment and storage medium in block chain network
CN108696356B (en) Block chain-based digital certificate deleting method, device and system
CN103685138A (en) Method and system for authenticating application software of Android platform on mobile internet
CN109491996A (en) For the block generation method of block chain network, block data access method, calculate equipment, storage medium
EP4216077A1 (en) Blockchain network-based method and apparatus for data processing, and computer device
CN112115205B (en) Cross-chain trust method, device, equipment and medium based on digital certificate authentication
CN109257334A (en) A kind of data chain loading system, method and storage medium based on block chain
CN112069550B (en) Electronic contract evidence-storing system based on intelligent contract mode
CN109246197A (en) Data processing method and device based on intelligent contract
Lei et al. Blockchain-based cache poisoning security protection and privacy-aware access control in NDN vehicular edge computing networks
CN114329529A (en) Asset data management method and system based on block chain
CN109242404A (en) History information management method, device, computer equipment and readable storage medium storing program for executing
CN111488372A (en) Data processing method, device and storage medium
CN109861996A (en) Relationship method of proof, device, equipment and storage medium based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant