CN109543456A - Block generation method and computer storage medium - Google Patents
Block generation method and computer storage medium Download PDFInfo
- Publication number
- CN109543456A CN109543456A CN201811312692.8A CN201811312692A CN109543456A CN 109543456 A CN109543456 A CN 109543456A CN 201811312692 A CN201811312692 A CN 201811312692A CN 109543456 A CN109543456 A CN 109543456A
- Authority
- CN
- China
- Prior art keywords
- block
- node
- requesting node
- alliance
- public key
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Abstract
The embodiment of the present invention provides a kind of block generation method and computer storage medium, is applied to alliance's block chain, includes multiple nodes in alliance's block chain, and each node updates the public key and private key of itself according to the instruction timing of the central node in alliance's block chain;Block generation method includes: to obtain the block that the requesting node in alliance's block chain is initiated to generate request, wherein, block generates the signature that the block content-data of new block to be generated is carried in request, and the signature of block content-data is signed by the updated private key of requesting node;To the validity of the public key after the central node checking request node updates of alliance's block chain, according to the signature of effective public key verifications block content-data;If the signature verification of block content-data passes through, generates requesting node after request is reached common understanding in alliance's block chain in block and generate requested new block.
Description
Technical field
The present embodiments relate to field of computer technology more particularly to a kind of block generation methods and computer storage to be situated between
Matter.
Background technique
Block chain is that the computers such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm are utilized in one kind
The new application mode of technology.Block chain is divided into three classes, and is respectively: publicly-owned block chain, alliance's block chain (also referred to as joint block
Chain, industry block chain) and three kinds of privately owned block chain.
Wherein, publicly-owned block chain is directed to owner;Alliance's block chain is directed to some specific group and has
The third party of limit;Privately owned block chain is directed to individual.Contrastingly, requirement highest of alliance's block chain to safety, is joining
It needs to guarantee in alliance's block chain to only have the internal preselected node formulated that could have the permission for generating new block as book keeping operation people,
Although other nodes can participate in business, accounting procedure cannot be bothered about.
But in existing alliance's block chain, security mechanism is mostly used for carrying out the information of cochain encryption storage to protect
The safety of uplink data is demonstrate,proved, but guarantees the safety of generation block process there is no corresponding security mechanism, in certain feelings
The corresponding I P of preselected node and public and private key under condition, such as book keeping operation people are stolen by lawless people, and lawless people can make
New block is generated in alliance's block chain with the identity of the preselected node, to generate to the Information Security in alliance's block chain
Greatly threaten.
Summary of the invention
In view of this, the embodiment of the present invention provides a kind of block generation method and computer storage medium, it is above-mentioned to solve
Problem.
The embodiment of the present invention provides a kind of block generation method, is applied to alliance's block chain, wraps in alliance's block chain
Multiple nodes are included, each node updates public key and the private of itself according to the instruction timing of the central node in alliance's block chain
Key;The block generation method includes: to obtain the block that the requesting node in alliance's block chain is initiated to generate request,
In, the block generates the signature that the block content-data of new block to be generated is carried in request, the block content-data
Signature signed by the updated private key of the requesting node;To described in the verifying of the central node of alliance's block chain
The validity of the updated public key of requesting node, with the signature of the block content-data according to the effective public key verifications;
If the signature verification of the block content-data passes through, the requesting node is made to generate request in the alliance in the block
Requested new block is generated after reaching common understanding in block chain.
The embodiment of the present invention also provides a kind of computer-readable medium, and the computer storage medium is stored with readable journey
Sequence, the readable program are applied to alliance's block chain, include multiple nodes in alliance's block chain, each node is according to described
The instruction timing of central node in alliance's block chain updates the public key and private key of itself;The readable program includes: for obtaining
The block for taking the requesting node in alliance's block chain to initiate generates the instruction of request, wherein the block generates in request
The signature of the block content-data of new block to be generated is carried, the signature of the block content-data passes through the requesting node
Updated private key is signed;For verifying the updated public affairs of requesting node to the central node of alliance's block chain
The validity of key, with the instruction of the signature of the block content-data according to the effective public key verifications;If for the area
The signature verification of block content-data passes through, then the requesting node is made to generate request in alliance's block chain in the block
The instruction of requested new block is generated after reaching common understanding.
By above technical scheme as it can be seen that in block generation scheme provided in an embodiment of the present invention, requesting node timing updates
Public key, the private key of its own, after the block that acquisition request node is initiated generates request, by central node checking request node
Public key validity, can determine requesting node public key be it is updated, belong to requesting node in existing state
Public key (i.e. the first public key is effective), so as to the block generated according to the public key of effective requesting node, checking request node
The signature of the block content-data for the new block to be generated for including in request is generated, and then can guarantee to generate in alliance's block chain
The safety of block process, to improve the safety of alliance's block chain.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
The some embodiments recorded in inventive embodiments can also obtain according to these attached drawings for those of ordinary skill in the art
Obtain other attached drawings.
Fig. 1 is the step flow chart according to a kind of block generation method of the embodiment of the present invention one;
Fig. 2 is the step flow chart according to a kind of block generation method of the embodiment of the present invention two;
Fig. 3 is the step flow chart according to a kind of block generation method of the embodiment of the present invention three;
Fig. 4 is the step flow chart according to a kind of block generation method of the embodiment of the present invention four.
Specific embodiment
In order to make those skilled in the art more fully understand the technical solution in the embodiment of the present invention, below in conjunction with the present invention
Attached drawing in embodiment, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described reality
Applying example only is a part of the embodiment of the embodiment of the present invention, instead of all the embodiments.Based on the implementation in the embodiment of the present invention
The range of protection of the embodiment of the present invention all should belong in example, those of ordinary skill in the art's every other embodiment obtained.
Below with reference to attached drawing of the embodiment of the present invention the embodiment of the present invention will be further explained specific implementation.
Embodiment one
Referring to Fig.1, a kind of step flow chart of according to embodiments of the present invention one block generation method is shown.
Block generation method provided in this embodiment is applied to alliance's block chain, wherein includes in alliance's block chain
Multiple nodes, each node update public key and the private of itself according to the instruction timing of the central node in alliance's block chain
Key.Wherein, the public key and the node of private key for updating itself according to the instruction timing of central node also include central node itself.
The block generation method of the present embodiment the following steps are included:
S102, the block generation request that the requesting node in alliance's block chain is initiated is obtained.
Wherein, the block generates the signature that the block content-data of new block to be generated is carried in request, the area
The signature of block content-data is signed by the updated private key of the requesting node.
When requesting node coalizes block chain for the first time, central node can generate public key and private key for it, wherein private key
It is saved by requesting node itself, for the data that requesting node issues to be encrypted or signed;Public key broadcasts are to alliance's block
Other nodes of chain, the data for issuing other nodes to requesting node are decrypted or verify.
In the present embodiment, requesting node is to have the arbitrary node for generating block permission in alliance's block chain, is saved in request
When point needs to generate new block, it can be generated according to the block content-data of new block to be generated and initiate block generation and asked
It asks, and is broadcasted to alliance's block chain.The block generation method of the present embodiment is used for after requesting node initiates block generation request,
Before all nodes of entire alliance block chain reach common recognition to block generation request.
The present embodiment is illustrated block generation method, but ability from the angle of a node in alliance's block chain
Field technique personnel are it should be apparent that the node can be the arbitrary node in alliance's block chain, or it can be said that alliance's block
The processing that all nodes in chain generate request to new block all can refer to the embodiment of the present invention and realize.
Instruction timing due to requesting node also according to the central node in alliance's block chain updates itself public affairs
The signature of key and private key, then the block content-data that its block initiated generates the new block to be generated carried in request can be
It is signed by the updated private key of requesting node.
The block content-data of new block to be generated can include but is not limited to number and the new district of new block to be generated
The information etc. of the corresponding block content of block.
Each new block has a number, the corresponding HASH value of the number typically block, according to the number
It can determine whether the new block has generated, position and linking relationship in alliance's block chain etc., in practical applications,
Those skilled in the art can use number that is any suitable, meeting block chain specification, unique identification block and can characterize
Its position within a block.
And for the information of block content, those skilled in the art can also according to actual needs, and use is any suitable
Mode realizes, e.g., the summary info, etc. of the block content of new block, the embodiment of the present invention to this with no restriction.Block content
The signature of data can be the digital signature generated after being encrypted the summary info of block content-data by private key.
The central node of S104, Xiang Suoshu alliance block chain verifies the validity of the updated public key of the requesting node,
With the signature of the block content-data according to the effective public key verifications.
In the present embodiment, since each node updates certainly according to the instruction timing of the central node in alliance's block chain
Therefore, in central node the public key and private key of body include the public key after all node updates.Then receive the section that block generates request
Point can public key into central node after checking request node updates validity, that is, determine for verify the request section signed
The public key of point is the public key updated and still in existing state for belonging to requesting node.
In this step, verified by the validity to the updated public key of requesting node, with the public key of requesting node,
Private key timing update combines, it is ensured that the public key validity of requesting node, though criminal steal requesting node IP,
Public key, private key etc., the time used is not also permanent, to ensure that the safety of alliance's block chain.
If the signature verification of S106, the block content-data pass through, generate the requesting node in the block
Request generates requested new block after reaching common understanding in alliance's block chain.
If the signature verification of block content-data passes through, it may be considered that sending block to generate the requesting node of request is just
Chang Jiedian can execute other subsequent steps, such as determine all nodes to the area by the common recognition mechanism of alliance's block chain
Block generates request and reaches common understanding, and reaches in alliance's block chain so that the requesting node generates request in the block
At generating requested new block after common recognition.
Through this embodiment, requesting node timing updates public key, the private key of its own, the block that acquisition request node is initiated
After generating request, by the validity of the public key to central node checking request node, it can determine that the public key of requesting node is
The updated public key (i.e. the first public key is effective) for belonging to requesting node in existing state, so as to according to effective
The public key of requesting node, the block that checking request node generates generate the block content number for the new block to be generated for including in request
According to signature, and then can guarantee in alliance's block chain generate block process safety, to improve the safety of alliance's block chain
Property.
The block generation method of the present embodiment can be executed by any suitable electronic equipment with data-handling capacity,
Including but not limited to: server, mobile terminal (such as tablet computer, mobile phone) and PC machine etc..
Embodiment two
Referring to Fig. 2, a kind of step flow chart of according to embodiments of the present invention two block generation method is shown.
Block generation method provided in this embodiment is applied to alliance's block chain, wherein includes in alliance's block chain
Multiple nodes, each node update public key and the private of itself according to the instruction timing of the central node in alliance's block chain
Key.
Optionally, in the present embodiment, each node can periodically update itself public key and private key in the following manner.
The key updating instruction that central node described in present node timing acquisition issues, wherein key updating instruction is taken
The public key and private key for update generated with the central node;Present node is instructed according to the key updating and is obtained
The public key and private key for update that the central node generates, periodically to update itself public key and private key.
In the present embodiment, key updating instruction and its public key and private key for update carried are given birth to by central node
At.When the key updating instruction that central node described in present node timing acquisition issues, key updating instruction be can be by center
What node was actively sent to present node, be also possible to request from present node to central node, the present embodiment to this not into
Row limits.
Since the public key and private key for update of present node are generated by central node, centromere can effectively ensure that
The accuracy of the public key stored in point.
Present node update after the completion of, can by central node by updated public key broadcasts to alliance's block chain, make to join
The public key of the present node of its storage of other node updates in alliance's block chain.
Timing based on public key and private key in aforementioned each node updates, the block generation method of the present embodiment include with
Lower step:
S202, the block generation request that the requesting node in alliance's block chain is initiated is obtained.
Wherein, the block generates the signature that the block content-data of new block to be generated is carried in request, the area
The signature of block content-data is signed by the updated private key of the requesting node.
Step S202 in the present embodiment is similar with the step S102 in embodiment one, and details are not described herein for the present embodiment.
S204, Xiang Suoshu central node send checking request, and obtain the verification result of the central node feedback.
In the present embodiment, the checking request is for requesting the validity to the updated public key of requesting node to be tested
It demonstrate,proves, the public key data of the requesting node of present node storage can be carried in checking request.Central node is asked in acquisition verifying
After asking, the public key of the requesting node stored in the public key and central node of the requesting node for including in checking request can be carried out
It compares, and verification result is generated according to comparison result.It may include the public affairs for the requesting node that checking request carries in verification result
The validation verification of key is as a result, can also include that central node stores in verification result if verification result is invalid optionally
Effective requesting node public key.
S206, judge whether the public key for the requesting node that the checking request carries is effective according to verification result;If effectively,
Then follow the steps S208;If invalid, S210 is thened follow the steps.
S208, if it is determined that the public key of requesting node is effective, then the area according to the public key verifications of presently described requesting node
The signature of block content-data.Go to step S212 execution.
S210, if it is determined that the public key of requesting node is invalid, then refuse to handle the block generating request.Terminate this stream
Journey.
In the present embodiment, if carrying the public key of the effective requesting node stored in central node in verification result,
It is directly updated to local, if it does not exist, is then needed again to the public key of central node transmission acquisition request node
Request, to obtain the public key of effective requesting node.
If the signature verification of S212, the block content-data pass through, generate the requesting node requested new
Block.
The data structure of block can be not identical as the data structure of existing block in the present embodiment, the block of the present embodiment
It may include block head, block body and hash value, the block body includes a plurality of operational order, and the block head includes described more
The time of the value of the root for the Merkle tree that the hash value of operational order, a plurality of operational order are constituted, generation current block
The hash value of stamp, the previous block adjacent with the current block, the hash value that the block data includes are based on the area
What build and the block body generated.Wherein, every operational order in a plurality of operational order includes action type, table
Name, JSONization content.
Based on this, the block content-data of the present embodiment includes block head, block body and hash value, and the block body includes
A plurality of operational order, the block head include that the hash value of a plurality of operational order, a plurality of operational order are constituted
The hash value of the value of the root of Merkle tree, the timestamp for generating current block, the previous block adjacent with the current block, institute
Stating the hash value that block data includes is generated based on the block head and the block body.Wherein, a plurality of operation refers to
Every operational order in order includes action type, table name, JSONization content.So that generating the block of above-mentioned block data structures
When, the block processes time can be largely saved, to substantially increase the treatment effeciency of block.
In the present embodiment, it is only capable of carrying out by the matched public key of requesting node by the signature that the private key of requesting node generates
Verifying.Therefore, it if signature verification passes through, can determine that requesting node is normal, then requesting node can be made to generate requested
New block;If signature verification does not pass through, it is abnormal can to determine that requesting node exists, then refuses the requested new district of requesting node
The generation of block.
If the signature passes through, show that sending block to generate the requesting node of request is normal, legal node, this
In the case of kind, the present node for receiving block generation request can send confirmation message, other in alliance's block chain to inform
Node (including requesting node), present node confirmation request node can be generated the block and generate the requested new district of request
Block.If all nodes in alliance's block chain have sent confirmation message, it is believed that the block generates request in entire alliance
Common recognition is reached in block chain, at this point, new block can be generated in requesting node.
In a kind of feasible pattern, composition of the requesting node based on block data above-mentioned generates the process of new block
It may include: to receive the block that requesting node is initiated to generate request;Request is generated to block to parse, and is obtained block generation and is asked
Action type information, operation object information and operation content information in asking;Based on action type information, operation object information and
Operation content information generates the operational order for the intermediate language representation for having mapping relations with sql like language;To intermediate language representation
Operational order execute map operation, obtain the operational order that the sql like language indicates;The operation indicated based on sql like language is referred to
It enables, executes block and generate the corresponding new block generation processing of request.
Wherein, the action type information includes being used to indicate to carry out the information that data increase operation, the operation object
Information includes the table name of tables of data, bit coin storage account of some user etc., for example, student information table, Students' Score List,
Raw educational background table, the operation content information may include the field and operating parameter of tables of data, for example, the field of tables of data can be
Raw name, students ' age etc., the operating parameter can be student name be it is small red, students ' age is 8 years old etc., the operation content
Information may also include the quantity for this time operating bit coin.It is understood that above description is exemplary only, the present invention is implemented
Example does not do any restriction to this.
In the present embodiment, the intermediate language with sql like language with mapping relations can be the language of similar sql like language
Or the sql like language of simplified version.For example, operational order include three primary fields, respectively " action type ", " table name ",
" JOSN " three fields then indicate the expression example of the operational order are as follows: insert/ using the language of similar sql like language
update table json.Wherein, " insert/update " is the concrete operations instruction that can correspond to sql like language, table
For a variable, a specific table name can be embodied as in each concrete operations, json is also a variable, every
An operating process or the corresponding SQL instruction of operating result and/or sentence can be embodied as in one concrete operations.
In some optional embodiments, refer in the operation for generating the intermediate language representation that there are mapping relations with sql like language
When enabling, splicing can be carried out to the action type information, operation object information and operation content information, obtained and SQL language
Say the operational order with the intermediate language representation of mapping relations.It is understood that any generation has mapping with sql like language
The embodiment of the operational order of the intermediate language representation of relationship may be applicable to this, and the embodiment of the present invention does not do any limit to this
It is fixed.
As it can be seen that being not directly to be generated to request according to block, generating machine recognition in above-mentioned block generating process
Sql like language indicate generation operational order, but based on block generate request in action type information, operation object information and
Operation content information generates the operational order for the intermediate language representation for having mapping relations with sql like language, then to intermediate language table
The operational order shown executes map operation, obtains the operational order that sql like language indicates, saves the generation processing time of block,
Substantially increase the generation treatment effeciency of block.
It should be noted that the requesting node in the above process can be any one node in alliance's block chain, packet
Present node is included, which can be the central node in alliance's block chain, be also possible to non-central node.
By the above process, the generation of the new block of the verifying and requesting node to requesting node legitimacy is realized.
Optionally, in the present embodiment after step s 212, can also include:
S214, the new block generation notification message that the requesting node issues is obtained.
Wherein, the new block generates the information that generated new block is carried in notification message, wherein the new district
The signature of the signature of content-data in the information of block including the new block, the content-data of the new block is asked by described
The private key of node is asked to sign.
In the present embodiment, the content-data of new block may include the HASH value of new block, the block content of new block
Information etc., wherein the information of the block content of new block may include the signature of the content-data of new block, the new block it is interior
The signature for holding data can be with are as follows: is signed by the number that the private key of requesting node is encrypted the content-data of new block
Name.
The central node of S216, Xiang Suoshu alliance block chain verifies the validity of the public key of the requesting node, with basis
The signature of new block described in the effective updated public key verifications of requesting node.
In the present embodiment, step S216 is similar with the step S104 in embodiment one, and details are not described herein for the present embodiment.
In the present embodiment, by the validity of the public key of checking request node again, then pass through effective requesting node
Public key verifications new block generate the signature in notification information, further improve and generate new block process in alliance's block chain
Safety improves the safety of alliance's block chain data.
If the signature verification of S218, the new block pass through, responds the new block and generate notification message, to use
Alliance's block chain described in the information update of the new block generated and local block data.
After requesting node generates new block, it can be broadcasted to all nodes of alliance's block chain, so that all nodes
Block update is carried out, realizes that the data of all nodes in alliance's block chain are synchronous.
After updating alliance's block chain and local block data, the uplink operation of new block can be completed.
In the present embodiment, the node that step S214-S218 can generate notification message by arbitrarily receiving new block is executed, when
After front nodal point receives new block generation notification message, notification message can be generated according to new block, more by generated new block
The data for the alliance's block chain being newly locally stored.
Block provided in this embodiment generates scheme, updates the basis of the public key of its own, private key in requesting node timing
On, after the block that acquisition request node is initiated generates request, by the validity of the public key to central node checking request node,
Include in requesting so as to which according to the public key of effective requesting node, the block that checking request node generates is generated is to be generated
The signature of the block content-data of new block;After requesting node generates new block, the new district that the requesting node issues is obtained
Block generates notification message, and the public key validity of checking request node again, so as to according to the public affairs of effective requesting node
The new block that key checking request node generates generates the signature for including in notification message can be into one by verification process twice
Step improves the safety that block process is generated in alliance's block chain, to improve the safety of alliance's block chain.
The block generation method of the present embodiment can be executed by any suitable electronic equipment with data-handling capacity,
Including but not limited to: server, mobile terminal (such as tablet computer, mobile phone) and PC machine etc..
Embodiment three
Scheme of the present embodiment based on previous embodiment one or embodiment two, and aforementioned schemes are further changed
Into.
In the present embodiment, setting in alliance's block chain further includes I P white list, is stored with alliance's block in I P white list
The IP address of all nodes in chain, since alliance's block chain is directed to setting group, most of is the enterprise of setting industry, then
The block chain if a certain enterprise coalizes can be its distribution node, when node generates, can put the section on record to alliance's block chain
The IP address of the server of the corresponding enterprise of point, and the IP address of the server is added in IP white list.
In the present embodiment, as shown in figure 3, the method also includes:
S302, acquisition simultaneously verify the IP address of the requesting node with the IP of the requesting node in the IP white list that prestores
Whether location is consistent, and verifies the validity of the IP address of the requesting node.
In general, can verify and be carried in the starting request of requesting node when requesting node starting in alliance's block chain
The consistency and validity of the IP of the requesting node stored in IP and IP white list can star request if verification passes through
Node does not allow requesting node to start if verification does not pass through.By verifying its IP when requesting node starts, can prevent
The illegal node that do not put on record in alliance's block chain cannot start.But the program of alliance's block chain is in alliance's block chain
All nodes be it is disclosed, therefore, criminal can by cancellation fall alliance's block chain program in for verify starting
The subprogram of IP skips the step.
Therefore, in order to which the safety for further increasing alliance's block chain receives block generation and ask before generating new block
The present node asked can execute above-mentioned steps S302, to determine that requesting node was not put on record not non-by step S302
Method node.
If S304, inconsistent or requesting node IP address are invalid, refuse to handle the block generation request.Terminate
This process.
If S306, consistent or requesting node IP address are effective, continue with the block and generate request, so that institute
It states requesting node and generates requested new block.
The IP address of requesting node can be used as parameter included in the request that requesting node issues, so as to direct root
The IP address of requesting node is determined according to the request that requesting node is initiated.
Then, can continue to execute it is following as described in embodiment one the step of.
S308, the block generation request that the requesting node in alliance's block chain is initiated is obtained.
The central node of S310, Xiang Suoshu alliance block chain verifies the validity of the updated public key of the requesting node,
With the signature of the block content-data according to the effective public key verifications.
If the signature verification of S312, the block content-data pass through, generate the requesting node requested new
Block.Wherein, the execution of above-mentioned steps S308-S312 is as described in embodiment one, and details are not described herein.
In the present embodiment, IP white list be can store in the local of all nodes, then arbitrarily obtains what requesting node was initiated
The node that block generates request can carry out above-mentioned checking procedure.
Certainly, in another implementation of the present embodiment, IP white list also be can store in central node, then above-mentioned
Checking procedure can be executed by central node, and then, check results can be informed other nodes by central node.
Since above-mentioned checking procedure can be carried out by node itself, then criminal can not be jumped by nullifying subprogram
The checking procedure is crossed, so that starting node successfully even if there are criminals, which does not have the function for generating new block yet
Energy.Further, the process of above-mentioned checking request node IP and checking request node public key validity in embodiment one are mutually tied
It closes, can be further improved the safety of alliance's block chain.
It should be noted that combined with above-mentioned steps S302-S306 with the scheme in embodiment one in the present embodiment,
For executing before the step S102 (the step S308 in the present embodiment), but those skilled in the art it should be apparent that
In practical application, the execution of step S302-S306 can also be in step S106 (this reality in such as embodiment one in the present embodiment
Apply the step S312 in example) in signature verification by after executed before generating new block, alternatively, step S302-S306
This two parts executes parallel with step S308-S312, and the present embodiment is to this without limiting.
Certainly, corresponding, in the present embodiment, above-mentioned steps S302-S306 can also be combined with embodiment two, above-mentioned step
Rapid S302-S306 can be executed before step S202, can also be tested in the signature in the step S212 in such as embodiment two
Card by after executed before generating new block or step S302-S306 with step S202-S210 this two parts is held parallel
Row, the present embodiment is to this without limiting.
Further, after the present embodiment is combined with above-described embodiment one or two, the side that can provide through the foregoing embodiment
Case determines that the public key of requesting node is the updated public key for belonging to requesting node in existing state, and passes through this reality
An ip for checking request node is applied so that it is determined that the illegal node that requesting node was not put on record, is preferably tested from available
Effect is demonstrate,proved, to be further ensured that the safety for generating new block process in alliance's block chain.
In another implementation of the present embodiment, the process of IP address verifying can also obtain alliance's block described
The block that requesting node in chain is initiated executes before generating request.
For example, before step S308, method provided in this embodiment can also include: present node to the area, alliance
The central node sending node of block chain starts request, wherein the node is with starting the IP in request including the present node
Location;Receive the starting request feedback message that the central node returns, wherein the starting request feedback message is by the center
Node is according to the consistency checking and present node of the IP address of present node and the node IP address in the IP white list that prestores
IP address validation verification verification result generate;If the verification result instruction is proved to be successful, the present node
Carry out node start-up operation.
By the IP address for verifying present node when present node starts, it is ensured that the validity of present node, from
And guarantee that present node executes be to movements such as the validity of public key after central node checking request node updates it is effective,
And then ensure that the safety for generating block process, to improve the safety of alliance's block chain.
In another implementation of the present embodiment, the process of IP address verifying can also be into alliance's block chain
It is executed during the validity of the updated public key of requesting node described in heart node verification.
For example, step S310 may include: that present node is sent out to the central node of alliance's block chain in the present embodiment
The validation verification is sent to request, wherein to include the IP address of the present node in the validation verification request;Receive institute
State the checking request feedback message of central node return, wherein the checking request feedback message is being tested by the central node
The IP address for demonstrate,proving the present node is consistent and present node with the IP address of the present node in the IP white list prestored
IP address it is effective after, according to the verification result of the validity of the updated public key of the requesting node generate;It is described to work as prosthomere
Point determines the validity of the updated public key of the requesting node according to the checking request feedback message.
In validity of the present node to the public key of central node checking request node, with verifying the IP of present node
Location, it is ensured that the validity of present node, thus guarantee that present node executes to central node checking request node updates
The movement of the validity of public key afterwards is effective, and then ensure that the safety for generating block process, to improve alliance's block
The safety of chain.
Example IV
Scheme of the present embodiment based on previous embodiment one or embodiment two, and aforementioned schemes are further changed
Into.
Scheme provided in this embodiment is to increase other security mechanisms, such as flow on the basis of embodiment one or two
Monitoring mechanism.Specifically, since alliance's block chain is directed to special group, such as the enterprise of certain industry etc., alliance's block
The node request flow of chain has business rule corresponding with special group.
In the present embodiment, as shown in figure 4, the method also includes:
The flow threshold of the flow of requesting node described in S402, comparison and preset requesting node.
In the present embodiment, flow threshold can be determined when alliance's block chain is established, and flow threshold determining at this time can be with
For initial flow threshold value.In alliance's block chain use process, flow threshold can be updated, it is made more to meet alliance's block chain
Development.
In the present embodiment, the flow of requesting node can be monitored in real time by the management module of central node, alarm signal
Breath is also generated by the management module of central node.
If the flow of S404, the requesting node is greater than the flow threshold of the requesting node, warning message is generated.Knot
Shu Benci process.
If the flow of S406, the requesting node is less than the flow threshold of the requesting node, it is determined that the request section
Point is normal.
Then, can continue to execute it is following as described in embodiment one the step of.
S408, the block generation request that the requesting node in alliance's block chain is initiated is obtained.
The central node of S410, Xiang Suoshu alliance block chain verifies the validity of the updated public key of the requesting node,
With the signature of the block content-data according to the effective public key verifications.
If the signature verification of S412, the block content-data pass through, generate the requesting node requested new
Block.
Wherein, the execution of above-mentioned steps S408-S412 is as described in embodiment one, and details are not described herein.
It may include the data on flows of requesting node in warning message, for flow threshold of comparison etc..In the present embodiment,
It is whether normal come the flow for detecting requesting node by setting flow threshold, the safety for determining requesting node can be assisted.
It should be noted that combined with above-mentioned steps S402-S404 with the scheme in embodiment one in the present embodiment,
For executing before the step S102 (the step S408 in the present embodiment), but those skilled in the art it should be apparent that
In practical application, the executing for step S402-S404 in the present embodiment can also be in step S106 (this in such as embodiment one
Step S412 in embodiment) in signature verification by after executed before generating new block, alternatively, step S302-
S306 is executed parallel with step S308-S312, and the present embodiment is to this without limiting.
Certainly, corresponding, in the present embodiment, above-mentioned steps S402-S406 can also be combined with embodiment two, above-mentioned step
Rapid S402-S404 can be executed before step S202, can also be tested in the signature in the step S212 in such as embodiment two
Card by after executed before generating new block or step S302-S306 with step S202-S210 this two parts is held parallel
Row, the present embodiment is to this without limiting.
By the above process, the real time monitoring to requesting node flow is realized.
Optionally, in the present embodiment, if the flow in the requesting node is greater than the flow threshold, report is generated
After alert information, the method also includes:
S414, according to the warning message, determine whether the flow of the requesting node meets preset condition.
Wherein, the flow that the preset condition is used to indicate alliance's block chain interior joint is in normal growth state.
Go to step S416 execution.
If the flow of S416, the requesting node meet preset condition, it is determined that the requesting node is normal.It can go to
Step S408 is executed.
I.e. flow, which exceeds the reason of flow threshold, is caused by the normal business of node increases, normal in order to adapt to business,
The flow threshold of the requesting node can be adjusted according to the present flow rate of the requesting node.
If the flow of S418, the requesting node do not meet preset condition, it is determined that the requesting node exists abnormal.Knot
Shu Benci process.
I.e. requesting node may be illegal node, at this time can be by the I P address of the requesting node from I P white list
It removes.
By step S414-S418, it can determine whether the flow of requesting node meets preset condition, so as to distinguish
The growth reason of requesting node flow, and then determining requesting node can be improved and there is the accurate fixed of abnormal result, it reduces
Normal node is judged as to the probability of abnormal nodes.
After the present embodiment is combined with above-described embodiment one or two, the scheme that can be provided through the foregoing embodiment determines request
The public key of node be it is updated, in existing state belong to the public key of requesting node, and provide through this embodiment
Whether scheme can be more than that flow threshold determines that requesting node whether there is exception by monitoring the real-time traffic of requesting node,
From available better verification the verifying results, to be further ensured that the safety for generating new block process in alliance's block chain.
Embodiment five
The embodiment of the invention also provides a kind of computer-readable medium, the computer storage medium is stored with readable journey
Sequence, the readable program are applied to alliance's block chain, include multiple nodes in alliance's block chain, each node is according to described
The instruction timing of central node in alliance's block chain updates the public key and private key of itself;The readable program includes: for obtaining
The block for taking the requesting node in alliance's block chain to initiate generates the instruction of request, wherein the block generates in request
The signature of the block content-data of new block to be generated is carried, the signature of the block content-data passes through the requesting node
Updated private key is signed;For verifying the updated public affairs of requesting node to the central node of alliance's block chain
The validity of key, with the instruction of the signature of the block content-data according to the effective public key verifications;If for the area
The signature verification of block content-data passes through, then the requesting node is made to generate request in alliance's block chain in the block
The instruction of requested new block is generated after reaching common understanding.
Optionally, each node updates the public key and private key of itself by following readable program timing: working as making
The instruction for the key updating instruction that central node described in front nodal point timing acquisition issues, wherein key updating instruction carries
The public key and private key for update that the central node generates;For obtaining present node according to key updating instruction
The public key and private key for update that the central node generates are taken, periodically to update the instruction of itself public key and private key.
Optionally, described for verifying the updated public key of requesting node to the central node of alliance's block chain
Validity, the instruction with the signature of the block content-data according to the effective public key verifications includes: for described
Central node sends checking request, and obtains the instruction of the verification result of the central node feedback;If for being tested according to described
Card result determines that the public key for the requesting node that the checking request carries is effective, then according to the public affairs of presently described requesting node
Key verifies the instruction of the signature of the block content-data;If alternatively, for determining that the verifying is asked according to the verification result
It asks the public key of the requesting node of carrying invalid, then refuses to handle the instruction that the block generates request.
Optionally, after for the instruction for generating new block, the readable program further include: described for obtaining
The new block that requesting node issues generates notification message, and the new block generates in notification message and carries generated new block
Information instruction, wherein in the information of the new block including the new block content-data signature, the new block
The signature of content-data signed by the private key of the requesting node;For the central node to alliance's block chain
The validity of the public key of the requesting node is verified, with new according to the effective updated public key verifications of requesting node
The instruction of the signature of block;If the signature verification for the new block passes through, responds the new block and generates notification message,
To use the instruction of alliance's block chain described in the information update of the generated new block and local block data.
Optionally, in the finger for generating request for obtaining the block that the requesting node in alliance's block chain is initiated
Before order, alternatively, the readable program also wraps after the instruction that the signature verification for block content-data passes through
Include: whether the IP address of the requesting node in IP address and the IP white list prestored for obtaining and verifying the requesting node
Unanimously, and verify the requesting node IP address validity instruction;If for inconsistent or requesting node IP
Location is invalid, then refuses to handle the instruction that the block generates request;If effective for consistent and requesting node IP address, after
The continuous processing block generates request, so that the requesting node generates the instruction of requested new block;
Alternatively,
Before the instruction for obtaining the block generation request that the requesting node in alliance's block chain is initiated,
The readable program further include: for making present node to the starting request of the central node sending node of alliance's block chain
Instruction, wherein include the IP address of the present node in the node starting request;It is returned for receiving the central node
Starting request feedback message instruction, wherein the starting requests feedback message by the central node according to present node
IP address and the validity of the consistency checking of the node IP address in the IP white list that prestores and the IP address of present node
The verification result of verifying generates;If being proved to be successful for verification result instruction, the present node carries out node starting
The instruction of operation;
Alternatively,
It is described to be used to verify the effective of the updated public key of the requesting node to the central node of alliance's block chain
Property instruction include: to send the finger that the validation verification is requested to the central node of alliance's block chain for present node
It enables, wherein include the IP address of the present node in the validation verification request;It is returned for receiving the central node
Checking request feedback message instruction, wherein the checking request feedback message is worked as described in the verifying as the central node
Consistent and present node the IP address of the IP address of present node in the IP address of front nodal point and the IP white list prestored
After effectively, generated according to the verification result of the validity of the updated public key of the requesting node;For making the present node
The instruction of the validity of the updated public key of the requesting node is determined according to the checking request feedback message.
Optionally, in the finger for generating request for obtaining the block that the requesting node in alliance's block chain is initiated
Before order, alternatively, the readable program also wraps after the instruction that the signature verification for block content-data passes through
It includes: the instruction of the flow threshold of the flow and preset requesting node for the requesting node;If for the request
The flow of node is greater than the flow threshold of the requesting node, then generates the instruction of warning message.
Optionally, if being greater than the flow threshold in the flow in the requesting node, report is generated
After the instruction of alert information, the readable program further include: for determining the stream of the requesting node according to the warning message
Whether amount meets the instruction of preset condition, wherein the preset condition is used to indicate the flow of alliance's block chain interior joint
Increase state in normal;If the flow for the requesting node meets preset condition, it is determined that the requesting node is normal,
The instruction of the flow threshold of the requesting node is adjusted according to the present flow rate of the requesting node;If alternatively, being asked for described
The flow of node is asked not meet preset condition, it is determined that the requesting node has exception, by the IP address of the requesting node
The instruction removed from IP white list.
Optionally, the block content-data includes block head, block body and hash value, and the block body includes a plurality of behaviour
It instructs, the block head includes the Merkle tree of the hash value of a plurality of operational order, a plurality of operational order composition
Root value, generate the hash value of the timestamp of current block, the previous block adjacent with the current block, the block counts
It according to the hash value for including is generated based on the block head and the block body.
Optionally, every operational order in a plurality of operational order includes action type, table name, JSONization content.
Computer-readable medium through this embodiment, requesting node timing update public key, the private key of its own, and acquisition is asked
After the block for asking node to initiate generates request, by the validity of the public key to central node checking request node, it can determine
The public key of requesting node is the updated public key (i.e. the first public key is effective) for belonging to requesting node in existing state, from
And can be according to the public key of effective requesting node, include in the block generation request that checking request node generates is to be generated new
The signature of the block content-data of block, and then can guarantee the safety that block process is generated in alliance's block chain, to improve
The safety of alliance's block chain.It may be noted that according to the needs of implementation, can by all parts described in the embodiment of the present invention/
Step is split as more components/steps, can also combine the part operation of two or more components/steps or components/steps
The components/steps of Cheng Xin, to realize the purpose of the embodiment of the present invention.
It is above-mentioned to be realized in hardware, firmware according to the method for the embodiment of the present invention, or be implemented as being storable in note
Software or computer code in recording medium (such as CD ROM, RAM, floppy disk, hard disk or magneto-optic disk), or it is implemented through net
The original storage of network downloading in long-range recording medium or nonvolatile machine readable media and will be stored in local recording medium
In computer code, so that method described herein can be stored in using general purpose computer, application specific processor or can compile
Such software processing in journey or the recording medium of specialized hardware (such as ASIC or FPGA).It is appreciated that computer, processing
Device, microprocessor controller or programmable hardware include can store or receive software or computer code storage assembly (for example,
RAM, ROM, flash memory etc.), when the software or computer code are by computer, processor or hardware access and execute, realize
Block generation method described herein.In addition, when general purpose computer accesses for realizing the block generation method being shown here
When code, general purpose computer is converted to the dedicated computing for being used for executing the block generation method being shown here by the execution of code
Machine.
Those of ordinary skill in the art may be aware that list described in conjunction with the examples disclosed in the embodiments of the present disclosure
Member and method and step can be realized with the combination of electronic hardware or computer software and electronic hardware.These functions are actually
It is implemented in hardware or software, the specific application and design constraint depending on technical solution.Professional technician
Each specific application can be used different methods to achieve the described function, but this realization is it is not considered that exceed
The range of the embodiment of the present invention.
Embodiment that the above embodiments are only used to illustrate the present invention, and the limitation not to the embodiment of the present invention, related skill
The those of ordinary skill in art field can also make various in the case where not departing from the spirit and scope of the embodiment of the present invention
Variation and modification, therefore all equivalent technical solutions also belong to the scope of the embodiment of the present invention, the patent of the embodiment of the present invention
Protection scope should be defined by the claims.
Claims (10)
1. a kind of block generation method is applied to alliance's block chain, which is characterized in that include multiple sections in alliance's block chain
Point, each node update the public key and private key of itself according to the instruction timing of the central node in alliance's block chain;
The block generation method includes:
It obtains the block that the requesting node in alliance's block chain is initiated and generates request, wherein the block generates in request
The signature of the block content-data of new block to be generated is carried, the signature of the block content-data passes through the requesting node
Updated private key is signed;
The validity of the updated public key of the requesting node is verified to the central node of alliance's block chain, according to effectively
The public key verifications described in block content-data signature;
If the signature verification of the block content-data passes through, the requesting node is made to generate request described in the block
Requested new block is generated after reaching common understanding in alliance's block chain.
2. the method according to claim 1, wherein each node periodically updates itself in the following manner
Public key and private key:
The key updating instruction that central node described in present node timing acquisition issues, wherein key updating instruction carries
The public key and private key for update that the central node generates;
Present node obtains the public key and private key for update that the central node generates according to key updating instruction,
Periodically to update itself public key and private key.
3. the method according to claim 1, wherein described verify institute to the central node of alliance's block chain
The validity of the updated public key of requesting node is stated, with the signature of the block content-data according to the effective public key verifications
Include:
Checking request is sent to the central node, and obtains the verification result of the central node feedback;
If determining that the public key for the requesting node that the checking request carries is effective according to the verification result, according to current
The signature of block content-data described in the public key verifications of the requesting node;
Alternatively, being refused if determining that the public key for the requesting node that the checking request carries is invalid according to the verification result
The block is handled absolutely generates request.
4. the method according to claim 1, wherein after the generation new block, the method also includes:
It obtains the new block that the requesting node issues and generates notification message, the new block generates to be carried in notification message
The information of the new block of generation, wherein the signature of the content-data in the information of the new block including the new block, it is described
The signature of the content-data of new block is signed by the private key of the requesting node;
The validity of the public key of the requesting node is verified to the central node of alliance's block chain, according to effective described
The signature of new block described in the updated public key verifications of requesting node;
If the signature verification of the new block passes through, responds the new block and generate notification message, to use generated institute
State alliance's block chain described in the information update of new block and local block data.
5. the method according to claim 1, wherein
Before the block that the requesting node obtained in alliance's block chain is initiated generates request, alternatively, in the area
After the signature verification of block content-data passes through, the method also includes:
Obtain and verify the IP address of the requesting node and the requesting node in the IP white list that prestores IP address whether one
It causes, and verifies the validity of the IP address of the requesting node;If inconsistent or requesting node IP address is invalid, refuse
It handles the block and generates request;If consistent and requesting node IP address is effective, continues with the block and generates request,
So that the requesting node generates requested new block;
Alternatively,
Before the block that the requesting node obtained in alliance's block chain is initiated generates request, the method is also wrapped
Include: present node starts to the central node sending node of alliance's block chain requests, wherein in the node starting request
IP address including the present node;Receive the starting request feedback message that the central node returns, wherein the starting
Request feedback message is by the central node according to the node IP address in the IP address of present node and the IP white list prestored
Consistency checking and present node IP address validation verification verification result generate;If the verification result instruction is tested
It demonstrate,proves successfully, then the present node carries out node start-up operation;
Alternatively,
It includes: to work as that the central node to alliance's block chain, which verifies the validity of the updated public key of the requesting node,
Front nodal point sends the validation verification request to the central node of alliance's block chain, wherein the validation verification is asked
It include the IP address of the present node in asking;Receive the checking request feedback message that the central node returns, wherein described
Checking request feedback message is by the central node in the IP white list verifying the IP address of the present node and prestoring
Consistent and present node the IP address of the IP address of present node it is effective after, according to the updated public key of the requesting node
Validity verification result generate;The present node determines the requesting node more according to the checking request feedback message
The validity of public key after new.
6. the method according to claim 1, wherein in the requesting node obtained in alliance's block chain
Before the block of initiation generates request, alternatively, the method is also wrapped after the signature verification of the block content-data passes through
It includes:
Compare the flow of the requesting node and the flow threshold of preset requesting node;
If the flow of the requesting node is greater than the flow threshold of the requesting node, warning message is generated.
7. if according to the method described in claim 6, it is characterized in that, the flow in the requesting node is greater than the stream
Measure threshold value, then after generating warning message, the method also includes:
According to the warning message, determine whether the flow of the requesting node meets preset condition, wherein the preset condition
The flow for being used to indicate alliance's block chain interior joint is in normal growth state;
If the flow of the requesting node meets preset condition, it is determined that the requesting node is normal, according to the requesting node
Present flow rate adjust the flow threshold of the requesting node;
Alternatively, if the flow of the requesting node does not meet preset condition, it is determined that the requesting node has exception, will be described
The IP address of requesting node is removed from IP white list.
8. the method according to claim 1, wherein the block content-data include block head, block body and
Hash value, the block body include a plurality of operational order, and the block head includes the hash value, described of a plurality of operational order
The timestamp, adjacent with the current block of the value of the root for the Merkle tree that a plurality of operational order is constituted, generation current block
The hash value of previous block, the hash value that the block data includes are generated based on the block head and the block body.
9. according to the method described in claim 8, it is characterized in that, every operational order in a plurality of operational order includes
Action type, table name, JSONization content.
10. a kind of computer-readable medium, which is characterized in that the computer storage medium is stored with readable program, it is described can
Reader is applied to alliance's block chain, includes multiple nodes in alliance's block chain, each node is according to alliance's block
The instruction timing of central node in chain updates the public key and private key of itself;
The readable program includes:
Block for obtaining the initiation of the requesting node in alliance's block chain generates the instruction of request, wherein the block
The signature that the block content-data of new block to be generated is carried in request is generated, the signature of the block content-data passes through institute
The updated private key of requesting node is stated to sign;
For verifying the validity of the updated public key of the requesting node to the central node of alliance's block chain, with basis
The instruction of the signature of block content-data described in the effective public key verifications;
If the signature verification for the block content-data passes through, so that the requesting node is generated request in the block and exist
The instruction of requested new block is generated after reaching common understanding in alliance's block chain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811312692.8A CN109543456B (en) | 2018-11-06 | 2018-11-06 | Block generation method and computer storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811312692.8A CN109543456B (en) | 2018-11-06 | 2018-11-06 | Block generation method and computer storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109543456A true CN109543456A (en) | 2019-03-29 |
CN109543456B CN109543456B (en) | 2021-07-09 |
Family
ID=65844528
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811312692.8A Active CN109543456B (en) | 2018-11-06 | 2018-11-06 | Block generation method and computer storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109543456B (en) |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110176998A (en) * | 2019-05-17 | 2019-08-27 | 北京众享比特科技有限公司 | A kind of common recognition method, apparatus, equipment and the storage medium of proof of work |
CN110175467A (en) * | 2019-04-25 | 2019-08-27 | 平安科技(深圳)有限公司 | Signature file store method, device and computer equipment based on block chain |
CN110535654A (en) * | 2019-07-23 | 2019-12-03 | 平安科技(深圳)有限公司 | Parallel system dispositions method, device and computer equipment based on block chain |
CN110535848A (en) * | 2019-08-22 | 2019-12-03 | 腾讯科技(深圳)有限公司 | A kind of information storage means and device |
CN110955721A (en) * | 2019-10-23 | 2020-04-03 | 金蝶软件(中国)有限公司 | Block link point state maintenance method and device, computer equipment and storage medium |
CN111953671A (en) * | 2020-07-31 | 2020-11-17 | 中国工商银行股份有限公司 | Block chain-based dynamic honey net data processing method and system |
CN112187462A (en) * | 2019-07-04 | 2021-01-05 | 北京新唐思创教育科技有限公司 | Data processing method and device, electronic equipment and computer readable medium |
CN112487102A (en) * | 2020-12-15 | 2021-03-12 | 深圳前海微众银行股份有限公司 | Block chain data processing method and device and electronic equipment |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160335628A1 (en) * | 2014-05-15 | 2016-11-17 | Adam Mark Weigold | System and method for digital currency storage, payment and credit |
CN106411503A (en) * | 2016-11-28 | 2017-02-15 | 中国银行股份有限公司 | Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode |
CN106780033A (en) * | 2016-12-16 | 2017-05-31 | 杭州云象网络技术有限公司 | A kind of digital ticket transaction system construction method based on alliance's chain |
CN107005574A (en) * | 2016-12-23 | 2017-08-01 | 深圳前海达闼云端智能科技有限公司 | Block generation method and device and block chain network |
CN107078910A (en) * | 2016-12-23 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Generate method, device, node, signature device and the system of block chain block |
CN107171806A (en) * | 2017-05-18 | 2017-09-15 | 北京航空航天大学 | Mobile terminal network cryptographic key negotiation method based on block chain |
CN108235799A (en) * | 2017-12-27 | 2018-06-29 | 深圳达闼科技控股有限公司 | Block generation method, device, storage medium and block chain network |
US20180198624A1 (en) * | 2017-01-12 | 2018-07-12 | International Business Machines Corporation | Private blockchain transaction management and termination |
CN108416589A (en) * | 2018-03-08 | 2018-08-17 | 深圳前海微众银行股份有限公司 | Connection method, system and the computer readable storage medium of block chain node |
CN108600272A (en) * | 2018-05-10 | 2018-09-28 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, device, processing equipment and system |
CN108647968A (en) * | 2018-05-10 | 2018-10-12 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, device, processing equipment and system |
-
2018
- 2018-11-06 CN CN201811312692.8A patent/CN109543456B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160335628A1 (en) * | 2014-05-15 | 2016-11-17 | Adam Mark Weigold | System and method for digital currency storage, payment and credit |
CN106411503A (en) * | 2016-11-28 | 2017-02-15 | 中国银行股份有限公司 | Accounting method, accounting system, voting node and accounting node under block chain voting and accounting mode |
CN106780033A (en) * | 2016-12-16 | 2017-05-31 | 杭州云象网络技术有限公司 | A kind of digital ticket transaction system construction method based on alliance's chain |
CN107005574A (en) * | 2016-12-23 | 2017-08-01 | 深圳前海达闼云端智能科技有限公司 | Block generation method and device and block chain network |
CN107078910A (en) * | 2016-12-23 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Generate method, device, node, signature device and the system of block chain block |
US20180198624A1 (en) * | 2017-01-12 | 2018-07-12 | International Business Machines Corporation | Private blockchain transaction management and termination |
CN107171806A (en) * | 2017-05-18 | 2017-09-15 | 北京航空航天大学 | Mobile terminal network cryptographic key negotiation method based on block chain |
CN108235799A (en) * | 2017-12-27 | 2018-06-29 | 深圳达闼科技控股有限公司 | Block generation method, device, storage medium and block chain network |
CN108416589A (en) * | 2018-03-08 | 2018-08-17 | 深圳前海微众银行股份有限公司 | Connection method, system and the computer readable storage medium of block chain node |
CN108600272A (en) * | 2018-05-10 | 2018-09-28 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, device, processing equipment and system |
CN108647968A (en) * | 2018-05-10 | 2018-10-12 | 阿里巴巴集团控股有限公司 | A kind of block chain data processing method, device, processing equipment and system |
Non-Patent Citations (2)
Title |
---|
叶小榕等: "基于区块链基于区块链_智能合约和物联网的供应链原型系统", 《科技导报》 * |
李大伟等: "基于区块链的密钥更新和可信定位系统", 《密码学报》 * |
Cited By (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110175467A (en) * | 2019-04-25 | 2019-08-27 | 平安科技(深圳)有限公司 | Signature file store method, device and computer equipment based on block chain |
CN110176998A (en) * | 2019-05-17 | 2019-08-27 | 北京众享比特科技有限公司 | A kind of common recognition method, apparatus, equipment and the storage medium of proof of work |
CN112187462B (en) * | 2019-07-04 | 2022-04-29 | 北京新唐思创教育科技有限公司 | Data processing method and device, electronic equipment and computer readable medium |
CN112187462A (en) * | 2019-07-04 | 2021-01-05 | 北京新唐思创教育科技有限公司 | Data processing method and device, electronic equipment and computer readable medium |
CN110535654B (en) * | 2019-07-23 | 2021-09-14 | 平安科技(深圳)有限公司 | Block chain based parallel system deployment method and device and computer equipment |
CN110535654A (en) * | 2019-07-23 | 2019-12-03 | 平安科技(深圳)有限公司 | Parallel system dispositions method, device and computer equipment based on block chain |
CN110535848A (en) * | 2019-08-22 | 2019-12-03 | 腾讯科技(深圳)有限公司 | A kind of information storage means and device |
CN110955721A (en) * | 2019-10-23 | 2020-04-03 | 金蝶软件(中国)有限公司 | Block link point state maintenance method and device, computer equipment and storage medium |
CN110955721B (en) * | 2019-10-23 | 2022-12-06 | 金蝶软件(中国)有限公司 | Block link point state maintenance method and device, computer equipment and storage medium |
CN111953671A (en) * | 2020-07-31 | 2020-11-17 | 中国工商银行股份有限公司 | Block chain-based dynamic honey net data processing method and system |
CN111953671B (en) * | 2020-07-31 | 2022-08-26 | 中国工商银行股份有限公司 | Dynamic honey net data processing method and system based on block chain |
CN112487102A (en) * | 2020-12-15 | 2021-03-12 | 深圳前海微众银行股份有限公司 | Block chain data processing method and device and electronic equipment |
CN112487102B (en) * | 2020-12-15 | 2024-03-19 | 深圳前海微众银行股份有限公司 | Block chain data processing method and device and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN109543456B (en) | 2021-07-09 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109543456A (en) | Block generation method and computer storage medium | |
CN107231351B (en) | Electronic certificate management method and related equipment | |
CN109450910B (en) | Data sharing method based on block chain, data sharing network and electronic equipment | |
CN109525671B (en) | Block chain-based data storage method, electronic device and storage medium | |
CN109819443B (en) | Registration authentication method, device and system based on block chain | |
CN106899410B (en) | A kind of method and device of equipment identities certification | |
CN110933163B (en) | Block chain contract deployment method, device, equipment and storage medium | |
CN102170440B (en) | Method suitable for safely migrating data between storage clouds | |
JP2021504832A (en) | Model training system and method and storage medium | |
CN111010367B (en) | Data storage method and device, computer equipment and storage medium | |
CN110086608A (en) | User authen method, device, computer equipment and computer readable storage medium | |
CN110516474A (en) | User information processing method, device, electronic equipment and storage medium in block chain network | |
CN108696356B (en) | Block chain-based digital certificate deleting method, device and system | |
CN103685138A (en) | Method and system for authenticating application software of Android platform on mobile internet | |
CN109491996A (en) | For the block generation method of block chain network, block data access method, calculate equipment, storage medium | |
EP4216077A1 (en) | Blockchain network-based method and apparatus for data processing, and computer device | |
CN112115205B (en) | Cross-chain trust method, device, equipment and medium based on digital certificate authentication | |
CN109257334A (en) | A kind of data chain loading system, method and storage medium based on block chain | |
CN112069550B (en) | Electronic contract evidence-storing system based on intelligent contract mode | |
CN109246197A (en) | Data processing method and device based on intelligent contract | |
Lei et al. | Blockchain-based cache poisoning security protection and privacy-aware access control in NDN vehicular edge computing networks | |
CN114329529A (en) | Asset data management method and system based on block chain | |
CN109242404A (en) | History information management method, device, computer equipment and readable storage medium storing program for executing | |
CN111488372A (en) | Data processing method, device and storage medium | |
CN109861996A (en) | Relationship method of proof, device, equipment and storage medium based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |