CN109697670A - A kind of public chain information screen method not influencing confidence level - Google Patents
A kind of public chain information screen method not influencing confidence level Download PDFInfo
- Publication number
- CN109697670A CN109697670A CN201811640246.XA CN201811640246A CN109697670A CN 109697670 A CN109697670 A CN 109697670A CN 201811640246 A CN201811640246 A CN 201811640246A CN 109697670 A CN109697670 A CN 109697670A
- Authority
- CN
- China
- Prior art keywords
- transaction
- information
- intelligent contract
- super node
- violation
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses the public chain information screen methods that one kind does not influence confidence level, this method has carried out certain transformation to original public chain, the custom field for allowing public chain super node to call transaction of the certain methods to write-in block shields, masking operation does not influence the verifiability of block, allow intelligent contract developer to hide or delete the irregularity content in certain contracts, allows super node that certain methods is called to disable intelligent contract in violation of rules and regulations.The present invention provides transaction and intelligent contract data shielding mechanisms, enhance super node to the control ability of public chain, provide technical foundation in block chain public affairs chain supervision area for functional organizations such as governments.
Description
Technical field
The present invention relates to block chain technology, intelligent contract, block chain transaction field, more particularly to one kind not to influence confidence level
Public chain information screen method.
Background technique
Block chain technology, block chain are a kind of novel decentralization distribution account book technologies, can safely store digital goods
Coin transaction or other data, the information that feature is stored on block chain can not be forged and be distorted, block chain common recognition algorithm drives
Each node on block chain is involved in the verification process of transaction, and it is all credible by confirming for guaranteeing to trade on block chain
, each node safeguards a public account book on block chain, in memory block chain network the remaining sum of all users and
Intelligent contract data, the modification for the account book that any one node safeguards oneself will not all recognize by other nodes, thus
Guarantee that public account book can not be forged and distort.
Intelligent contract, the intelligent contract on block chain, which refers to, to be write and is compiled by solidity and operated on block chain
A string of binary codes, the calling of intelligent contract function will generate primary call on block chain and record, and in the form of transaction
It is permanently stored in block chain, we can realize data storage on block chain, read-write by intelligent contract and some patrol
Operation is collected, therefore some applications based on block chain are completed using intelligent contract.
Due to block chain data structure itself and the characteristic for algorithm of knowing together, block chain participation node, which is generally difficult to be directed to, to be write
The data for entering block chain do subsequent processing.When violation data is recorded in public chain by way of transaction, or pass through intelligence
When energy contract is written into, is stored in public chain, these violation datas are modified by government or other Gong Lian regulatory agencies, delete or shield
Covering, which all will lead to block Hash and generate, changes, and the block after change is re-started broadcast, common recognition will consume larger cost, with mesh
It is relatively difficult to achieve for preceding technology.
Summary of the invention
The purpose of the present invention is being directed to the deficiency of existing block chain technology, a kind of public chain information for not influencing confidence level is provided
Screen method.
The purpose of the present invention is be achieved through the following technical solutions: one kind not influencing the public chain information shield side of confidence level
Method, comprising the following steps:
Step 1:
Monitoring party detects the violation information being stored in transaction or intelligent contract, it is desirable that the super node or intelligence of public chain
It can contract developer shielding violation information
Step 2:
1) when violation information is stored in transaction: regulatory agency initiates transaction of the shielding containing violation information to super node
Transaction Hash, shielding request inside all super nodes complete common recognition.After super node common recognition, initiate to shield to ordinary node
The transaction of violation Transaction Information is covered, public chain participates in node and is updated to the Transaction Information in former block.
2) when violation information is stored in intelligent contract: monitoring party passes through intelligent contract address lookup intelligence contract exploitation
Person notifies intelligent contract developer to delete or shield the violation content in contract;Direction super node is supervised to initiate to prohibit
With the transaction of intelligent contract, after super node verifies monitoring party identity, the contract information for disabling of knowing together in super node.Common recognition
After the completion, super super node disables the intelligent contract containing violation information to whole node broadcasts, completes violation information shielding.
Further, in the step two, transaction includes intrinsic information and self-defined information, and intrinsic information includes handing over
Easy address, transaction acceptance address, transaction are spent, and the field that these intrinsic and content meanings of trading of transaction Hash determine is made by oneself
Adopted information includes payload, extra, and custom field, which is customized by the user, to be filled in, the uncertain field of content meaning.
Further, in the step two, when supervision direction super node initiates shielding transaction, the super of transaction is received
Node carries out transaction common recognition to other super nodes after verifying monitoring party identity.After masking operation carries out, violation information is only right
Super node is as it can be seen that only retain the Hash of violation self-defined information in the block of the ordinary node in public chain.
Further, in the step two, intelligent contract developer possesses deletion or shields the permission of violation information, screen
Violation information after covering is invisible to the caller of intelligent contract.
Further, in the step two, intelligence under the address is forbidden in the address that super node can specify intelligent contract
The calling of energy contract.
Detailed description of the invention
Fig. 1 is the process flow that the transaction of block chain has violation information;
Fig. 2 is the process flow that intelligent contract memory has violation information
Specific embodiment
Below according to the drawings and specific embodiments the present invention is described in detail, the objects and effects of the present invention will become brighter
It is aobvious.
As shown in Figure 1, the present invention handles the step in the transaction of violation information memory block chain:
1. the transaction Hash that regulatory agency initiates transaction of the shielding containing violation information to super node.
2. super node certifying organization identity, then enters step 3 after being proved to be successful, shielding process is otherwise terminated.
3. common recognition is completed in shielding request inside all super nodes, after knowing together successfully, 4 are entered step, otherwise terminates screen
Cover process.
4. super node initiates the transaction of shielding violation Transaction Information to ordinary node, public chain participates in node in former block
Transaction Information be updated, super node then retains shielding content.
As shown in Fig. 2, the present invention handles the step in violation information memory block chain intelligence contract:
1. monitoring party determines the executor for deleting violation content, notify intelligent contract developer to the violation content in contract
It is deleted or is shielded, or initiate the request of disabling contract to super node
2. super node certifying organization identity, then enters step 3 after being proved to be successful, disabling process is otherwise terminated.
3. common recognition is completed in shielding request inside all super nodes, after knowing together successfully, 4 are entered step, otherwise terminates and prohibits
Use process.
4. super node initiates the transaction of the disabling contract of intelligence containing violation information to ordinary node, public chain participates in node common recognition
Afterwards, intelligent contract is disabled.
Further, in the step two, transaction includes intrinsic information and self-defined information, and intrinsic information includes handing over
Easy address, transaction acceptance address, transaction are spent, and the field that these intrinsic and content meanings of trading of transaction Hash determine is made by oneself
Adopted information includes payload, extra, and custom field, which is customized by the user, to be filled in, the uncertain field of content meaning.
Further, in the step two, when supervision direction super node initiates shielding transaction, the super of transaction is received
Node carries out transaction common recognition to other super nodes after verifying monitoring party identity.After masking operation carries out, violation information is only right
Super node is as it can be seen that only retain the Hash of violation self-defined information in the block of the ordinary node in public chain.
Further, in the step two, intelligent contract developer possesses deletion or shields the permission of violation information, screen
Violation information after covering is invisible to the caller of intelligent contract.
Further, in the step two, intelligence under the address is forbidden in the address that super node can specify intelligent contract
The calling of energy contract.
Claims (5)
1. the public chain information screen method that one kind does not influence confidence level, which comprises the following steps:
Step 1:
Monitoring party detects the violation information being stored in transaction or intelligent contract, it is desirable that the super node or intelligence of public chain close
About developer shields violation information.
Step 2:
1) when violation information is stored in transaction: regulatory agency initiates the friendship of transaction of the shielding containing violation information to super node
Common recognition is completed in easy Hash, shielding request inside all super nodes.After super node common recognition, shielding is initiated to ordinary node and is disobeyed
The transaction of Transaction Information is advised, public chain participates in node and is updated to the Transaction Information in former block.
2) when violation information is stored in intelligent contract: monitoring party passes through intelligent contract address lookup intelligence contract developer,
Intelligent contract developer is notified to delete or shield the violation content in contract;It supervises direction super node and initiates disabling intelligence
The transaction of energy contract, after super node verifies monitoring party identity, the contract information for disabling of knowing together in super node.Common recognition is completed
Afterwards, super super node disables the intelligent contract containing violation information to whole node broadcasts, completes violation information shielding.
2. the public chain information screen method that one kind as described in claim 1 does not influence confidence level, which is characterized in that the step
In rapid two, transaction includes intrinsic information and self-defined information, and intrinsic information includes transaction address, transaction acceptance address, transaction
It spending, fields that these transaction of transaction Hash are intrinsic and content meanings determine, self-defined information includes payload, extra,
Custom field, which is customized by the user, to be filled in, the uncertain field of content meaning.
3. the public chain information screen method that one kind as described in claim 1 does not influence confidence level, which is characterized in that the step
In rapid two, when supervision direction super node initiates shielding transaction, the super node of transaction is received after verifying monitoring party identity, to
Other super nodes carry out transaction common recognition.After masking operation carries out, violation information is only to super node as it can be seen that common in public chain
Only retain the Hash of violation self-defined information in the block of node.
4. the public chain information screen method that one kind as described in claim 1 does not influence confidence level, which is characterized in that the step
In rapid two, intelligent contract developer possesses deletion or shields the permission of violation information, and the violation information after shielding is to intelligent contract
Caller it is invisible.
5. the public chain information screen method that one kind as described in claim 1 does not influence confidence level, which is characterized in that the step
In rapid two, the calling of intelligent contract under the address is forbidden in the address that super node can specify intelligent contract.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811640246.XA CN109697670B (en) | 2018-12-29 | 2018-12-29 | Public link information shielding method without influence on credibility |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811640246.XA CN109697670B (en) | 2018-12-29 | 2018-12-29 | Public link information shielding method without influence on credibility |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109697670A true CN109697670A (en) | 2019-04-30 |
CN109697670B CN109697670B (en) | 2021-06-04 |
Family
ID=66233093
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811640246.XA Active CN109697670B (en) | 2018-12-29 | 2018-12-29 | Public link information shielding method without influence on credibility |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109697670B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110310205A (en) * | 2019-06-28 | 2019-10-08 | 百度在线网络技术(北京)有限公司 | A kind of block chain data monitoring method, device, equipment and medium |
CN112000713A (en) * | 2020-08-14 | 2020-11-27 | 中国银联股份有限公司 | Data processing method, device, equipment and medium |
CN112101945A (en) * | 2020-11-20 | 2020-12-18 | 北京连琪科技有限公司 | Method and system for supervising block chain content |
CN112560112A (en) * | 2020-12-15 | 2021-03-26 | 杭州趣链科技有限公司 | Block chain based information shielding method, device, equipment and readable storage medium |
Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130042111A1 (en) * | 2011-08-09 | 2013-02-14 | Michael Stephen Fiske | Securing transactions against cyberattacks |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106506467A (en) * | 2016-10-31 | 2017-03-15 | 国云科技股份有限公司 | A kind of proof of identification recording method based on block chain |
CN106780033A (en) * | 2016-12-16 | 2017-05-31 | 杭州云象网络技术有限公司 | A kind of digital ticket transaction system construction method based on alliance's chain |
CN106878071A (en) * | 2017-01-25 | 2017-06-20 | 上海钜真金融信息服务有限公司 | A kind of block chain common recognition mechanism based on Raft algorithms |
CN107025602A (en) * | 2017-02-24 | 2017-08-08 | 杭州象链网络技术有限公司 | A kind of financial asset transaction system construction method based on alliance's chain |
US20170244721A1 (en) * | 2016-02-22 | 2017-08-24 | Bank Of America Corporation | System for providing levels of security access to a process data network |
CN107241360A (en) * | 2017-08-04 | 2017-10-10 | 北京明朝万达科技股份有限公司 | A kind of data safety shares exchange method and data safety shares switching plane system |
CN107483198A (en) * | 2017-09-25 | 2017-12-15 | 中国科学院信息工程研究所 | A kind of block catenary system supervised and method |
CN107682364A (en) * | 2017-11-03 | 2018-02-09 | 杭州秘猿科技有限公司 | One kind license chain privacy method of commerce |
CN108075895A (en) * | 2016-11-15 | 2018-05-25 | 深圳银链科技有限公司 | Node permission method and system based on block chain |
CN108270780A (en) * | 2018-01-08 | 2018-07-10 | 中国电子科技集团公司第三十研究所 | A kind of heterogeneous network environment multicenter digital identity management method |
CN108563924A (en) * | 2018-04-24 | 2018-09-21 | 深圳市亿道数码技术有限公司 | A kind of multimedia ecosystem based on block chain |
CN108650073A (en) * | 2018-05-07 | 2018-10-12 | 浙江工商大学 | A kind of secret protection price competing method based on block chain |
CN108650270A (en) * | 2018-05-16 | 2018-10-12 | 苏宁易购集团股份有限公司 | Data sharing method based on alliance's chain and incentive mechanism and system |
CN108665270A (en) * | 2018-04-17 | 2018-10-16 | 平安科技(深圳)有限公司 | Data diddling recognition methods, device, computer equipment and storage medium |
CN108805574A (en) * | 2018-05-19 | 2018-11-13 | 深圳市图灵奇点智能科技有限公司 | Method of commerce based on secret protection and system |
CN108831565A (en) * | 2018-05-10 | 2018-11-16 | 深圳市和和月升科技有限公司 | Chinese medicine acupuncture information common recognition system based on block chain |
CN108876603A (en) * | 2018-01-03 | 2018-11-23 | 上海指旺信息科技有限公司 | Share exchange platform based on block chain |
CN108876213A (en) * | 2018-08-22 | 2018-11-23 | 泰康保险集团股份有限公司 | Product management method, device, medium and electronic equipment based on block chain |
CN108932433A (en) * | 2018-06-14 | 2018-12-04 | 江苏百倍云信息科技有限公司 | A kind of industrial data shared system and method based on block chain |
CN108965399A (en) * | 2018-06-25 | 2018-12-07 | 百度在线网络技术(北京)有限公司 | Execution method, apparatus, equipment and the storage medium of intelligent contract |
CN109066653A (en) * | 2018-08-07 | 2018-12-21 | 宁波智果科技咨询服务有限公司 | A kind of charging pile system based on block chain trade management |
CN109064291A (en) * | 2018-08-08 | 2018-12-21 | 平安科技(深圳)有限公司 | House lease method, system, computer equipment and storage medium |
-
2018
- 2018-12-29 CN CN201811640246.XA patent/CN109697670B/en active Active
Patent Citations (24)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20130042111A1 (en) * | 2011-08-09 | 2013-02-14 | Michael Stephen Fiske | Securing transactions against cyberattacks |
US20170244721A1 (en) * | 2016-02-22 | 2017-08-24 | Bank Of America Corporation | System for providing levels of security access to a process data network |
CN105975868A (en) * | 2016-04-29 | 2016-09-28 | 杭州云象网络技术有限公司 | Block chain-based evidence preservation method and apparatus |
CN106506467A (en) * | 2016-10-31 | 2017-03-15 | 国云科技股份有限公司 | A kind of proof of identification recording method based on block chain |
CN108075895A (en) * | 2016-11-15 | 2018-05-25 | 深圳银链科技有限公司 | Node permission method and system based on block chain |
CN106780033A (en) * | 2016-12-16 | 2017-05-31 | 杭州云象网络技术有限公司 | A kind of digital ticket transaction system construction method based on alliance's chain |
CN106878071A (en) * | 2017-01-25 | 2017-06-20 | 上海钜真金融信息服务有限公司 | A kind of block chain common recognition mechanism based on Raft algorithms |
CN107025602A (en) * | 2017-02-24 | 2017-08-08 | 杭州象链网络技术有限公司 | A kind of financial asset transaction system construction method based on alliance's chain |
CN107241360A (en) * | 2017-08-04 | 2017-10-10 | 北京明朝万达科技股份有限公司 | A kind of data safety shares exchange method and data safety shares switching plane system |
CN107483198A (en) * | 2017-09-25 | 2017-12-15 | 中国科学院信息工程研究所 | A kind of block catenary system supervised and method |
CN107682364A (en) * | 2017-11-03 | 2018-02-09 | 杭州秘猿科技有限公司 | One kind license chain privacy method of commerce |
CN108876603A (en) * | 2018-01-03 | 2018-11-23 | 上海指旺信息科技有限公司 | Share exchange platform based on block chain |
CN108270780A (en) * | 2018-01-08 | 2018-07-10 | 中国电子科技集团公司第三十研究所 | A kind of heterogeneous network environment multicenter digital identity management method |
CN108665270A (en) * | 2018-04-17 | 2018-10-16 | 平安科技(深圳)有限公司 | Data diddling recognition methods, device, computer equipment and storage medium |
CN108563924A (en) * | 2018-04-24 | 2018-09-21 | 深圳市亿道数码技术有限公司 | A kind of multimedia ecosystem based on block chain |
CN108650073A (en) * | 2018-05-07 | 2018-10-12 | 浙江工商大学 | A kind of secret protection price competing method based on block chain |
CN108831565A (en) * | 2018-05-10 | 2018-11-16 | 深圳市和和月升科技有限公司 | Chinese medicine acupuncture information common recognition system based on block chain |
CN108650270A (en) * | 2018-05-16 | 2018-10-12 | 苏宁易购集团股份有限公司 | Data sharing method based on alliance's chain and incentive mechanism and system |
CN108805574A (en) * | 2018-05-19 | 2018-11-13 | 深圳市图灵奇点智能科技有限公司 | Method of commerce based on secret protection and system |
CN108932433A (en) * | 2018-06-14 | 2018-12-04 | 江苏百倍云信息科技有限公司 | A kind of industrial data shared system and method based on block chain |
CN108965399A (en) * | 2018-06-25 | 2018-12-07 | 百度在线网络技术(北京)有限公司 | Execution method, apparatus, equipment and the storage medium of intelligent contract |
CN109066653A (en) * | 2018-08-07 | 2018-12-21 | 宁波智果科技咨询服务有限公司 | A kind of charging pile system based on block chain trade management |
CN109064291A (en) * | 2018-08-08 | 2018-12-21 | 平安科技(深圳)有限公司 | House lease method, system, computer equipment and storage medium |
CN108876213A (en) * | 2018-08-22 | 2018-11-23 | 泰康保险集团股份有限公司 | Product management method, device, medium and electronic equipment based on block chain |
Non-Patent Citations (1)
Title |
---|
张锐: "基于区块链的传统金融变革与创新", 《数字货币》 * |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110310205A (en) * | 2019-06-28 | 2019-10-08 | 百度在线网络技术(北京)有限公司 | A kind of block chain data monitoring method, device, equipment and medium |
CN110310205B (en) * | 2019-06-28 | 2022-02-25 | 百度在线网络技术(北京)有限公司 | Block chain data monitoring method, device, equipment and medium |
CN112000713A (en) * | 2020-08-14 | 2020-11-27 | 中国银联股份有限公司 | Data processing method, device, equipment and medium |
WO2022032988A1 (en) * | 2020-08-14 | 2022-02-17 | 中国银联股份有限公司 | Data processing method, apparatus and device, and medium |
CN112101945A (en) * | 2020-11-20 | 2020-12-18 | 北京连琪科技有限公司 | Method and system for supervising block chain content |
CN112101945B (en) * | 2020-11-20 | 2021-03-23 | 北京连琪科技有限公司 | Method and system for supervising block chain content |
CN112560112A (en) * | 2020-12-15 | 2021-03-26 | 杭州趣链科技有限公司 | Block chain based information shielding method, device, equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109697670B (en) | 2021-06-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109697670A (en) | A kind of public chain information screen method not influencing confidence level | |
US11489843B2 (en) | Controlling access to secured data via timed filtering of data | |
CN108492104B (en) | Resource transfer monitoring method and device | |
CN103944737B (en) | Method for authenticating user identity, Third Party Authentication platform, carrier authorization platform | |
CN106600405A (en) | Block-chain-based data rights protection method | |
CN107145799A (en) | A kind of data desensitization method and device | |
CN110020956A (en) | A kind of exchange method and system, computer equipment and storage medium of transregional piece of chain | |
CN106779708A (en) | Participant identity management method and system on block chain based on intelligent contract | |
CN112597762B (en) | Blockchain system with intelligent contract data supervision function and supervision method | |
US11645418B2 (en) | Data processing systems for data testing to confirm data deletion and related methods | |
CN109598425B (en) | Method, device and equipment for managing and controlling risk objects | |
WO2022206482A1 (en) | Blockchain editing method and blockchain node | |
Sokolov et al. | The automating process of information security management | |
CN113129012B (en) | Payment data processing method, device, equipment and system | |
CN110138767A (en) | Processing method, device, equipment and the storage medium of transactions requests | |
CN106098069A (en) | A kind of identity identifying method and terminal unit | |
Razaq et al. | " We Even Borrowed Money From Our Neighbor" Understanding Mobile-based Frauds Through Victims' Experiences | |
Evtimov et al. | Is tricking a robot hacking? | |
Liu et al. | Deepfake Technology and Current Legal Status of It | |
Jacobi et al. | A Solution for the third-party doctrine in a time of data sharing, contact tracing, and mass surveillance | |
Land et al. | Building a Taxonomy for Cybercrimes. | |
CN109801166A (en) | A kind of design method and system of the safe function of the intelligent contract based on status lock | |
CN110517027A (en) | A kind of trustship of digital cash assets and transfer method based on intelligent contract | |
McDonough | Cyber smart: Five habits to protect your family, money, and identity from cyber criminals | |
CN109389380A (en) | A kind of system and method for anti-network payment swindle |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |