CN109697670A - A kind of public chain information screen method not influencing confidence level - Google Patents

A kind of public chain information screen method not influencing confidence level Download PDF

Info

Publication number
CN109697670A
CN109697670A CN201811640246.XA CN201811640246A CN109697670A CN 109697670 A CN109697670 A CN 109697670A CN 201811640246 A CN201811640246 A CN 201811640246A CN 109697670 A CN109697670 A CN 109697670A
Authority
CN
China
Prior art keywords
transaction
information
intelligent contract
super node
violation
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811640246.XA
Other languages
Chinese (zh)
Other versions
CN109697670B (en
Inventor
李伟
邱炜伟
梁秀波
李启雷
尹可挺
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Qulian Technology Co Ltd
Original Assignee
Hangzhou Qulian Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Qulian Technology Co Ltd filed Critical Hangzhou Qulian Technology Co Ltd
Priority to CN201811640246.XA priority Critical patent/CN109697670B/en
Publication of CN109697670A publication Critical patent/CN109697670A/en
Application granted granted Critical
Publication of CN109697670B publication Critical patent/CN109697670B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses the public chain information screen methods that one kind does not influence confidence level, this method has carried out certain transformation to original public chain, the custom field for allowing public chain super node to call transaction of the certain methods to write-in block shields, masking operation does not influence the verifiability of block, allow intelligent contract developer to hide or delete the irregularity content in certain contracts, allows super node that certain methods is called to disable intelligent contract in violation of rules and regulations.The present invention provides transaction and intelligent contract data shielding mechanisms, enhance super node to the control ability of public chain, provide technical foundation in block chain public affairs chain supervision area for functional organizations such as governments.

Description

A kind of public chain information screen method not influencing confidence level
Technical field
The present invention relates to block chain technology, intelligent contract, block chain transaction field, more particularly to one kind not to influence confidence level Public chain information screen method.
Background technique
Block chain technology, block chain are a kind of novel decentralization distribution account book technologies, can safely store digital goods Coin transaction or other data, the information that feature is stored on block chain can not be forged and be distorted, block chain common recognition algorithm drives Each node on block chain is involved in the verification process of transaction, and it is all credible by confirming for guaranteeing to trade on block chain , each node safeguards a public account book on block chain, in memory block chain network the remaining sum of all users and Intelligent contract data, the modification for the account book that any one node safeguards oneself will not all recognize by other nodes, thus Guarantee that public account book can not be forged and distort.
Intelligent contract, the intelligent contract on block chain, which refers to, to be write and is compiled by solidity and operated on block chain A string of binary codes, the calling of intelligent contract function will generate primary call on block chain and record, and in the form of transaction It is permanently stored in block chain, we can realize data storage on block chain, read-write by intelligent contract and some patrol Operation is collected, therefore some applications based on block chain are completed using intelligent contract.
Due to block chain data structure itself and the characteristic for algorithm of knowing together, block chain participation node, which is generally difficult to be directed to, to be write The data for entering block chain do subsequent processing.When violation data is recorded in public chain by way of transaction, or pass through intelligence When energy contract is written into, is stored in public chain, these violation datas are modified by government or other Gong Lian regulatory agencies, delete or shield Covering, which all will lead to block Hash and generate, changes, and the block after change is re-started broadcast, common recognition will consume larger cost, with mesh It is relatively difficult to achieve for preceding technology.
Summary of the invention
The purpose of the present invention is being directed to the deficiency of existing block chain technology, a kind of public chain information for not influencing confidence level is provided Screen method.
The purpose of the present invention is be achieved through the following technical solutions: one kind not influencing the public chain information shield side of confidence level Method, comprising the following steps:
Step 1:
Monitoring party detects the violation information being stored in transaction or intelligent contract, it is desirable that the super node or intelligence of public chain It can contract developer shielding violation information
Step 2:
1) when violation information is stored in transaction: regulatory agency initiates transaction of the shielding containing violation information to super node Transaction Hash, shielding request inside all super nodes complete common recognition.After super node common recognition, initiate to shield to ordinary node The transaction of violation Transaction Information is covered, public chain participates in node and is updated to the Transaction Information in former block.
2) when violation information is stored in intelligent contract: monitoring party passes through intelligent contract address lookup intelligence contract exploitation Person notifies intelligent contract developer to delete or shield the violation content in contract;Direction super node is supervised to initiate to prohibit With the transaction of intelligent contract, after super node verifies monitoring party identity, the contract information for disabling of knowing together in super node.Common recognition After the completion, super super node disables the intelligent contract containing violation information to whole node broadcasts, completes violation information shielding.
Further, in the step two, transaction includes intrinsic information and self-defined information, and intrinsic information includes handing over Easy address, transaction acceptance address, transaction are spent, and the field that these intrinsic and content meanings of trading of transaction Hash determine is made by oneself Adopted information includes payload, extra, and custom field, which is customized by the user, to be filled in, the uncertain field of content meaning.
Further, in the step two, when supervision direction super node initiates shielding transaction, the super of transaction is received Node carries out transaction common recognition to other super nodes after verifying monitoring party identity.After masking operation carries out, violation information is only right Super node is as it can be seen that only retain the Hash of violation self-defined information in the block of the ordinary node in public chain.
Further, in the step two, intelligent contract developer possesses deletion or shields the permission of violation information, screen Violation information after covering is invisible to the caller of intelligent contract.
Further, in the step two, intelligence under the address is forbidden in the address that super node can specify intelligent contract The calling of energy contract.
Detailed description of the invention
Fig. 1 is the process flow that the transaction of block chain has violation information;
Fig. 2 is the process flow that intelligent contract memory has violation information
Specific embodiment
Below according to the drawings and specific embodiments the present invention is described in detail, the objects and effects of the present invention will become brighter It is aobvious.
As shown in Figure 1, the present invention handles the step in the transaction of violation information memory block chain:
1. the transaction Hash that regulatory agency initiates transaction of the shielding containing violation information to super node.
2. super node certifying organization identity, then enters step 3 after being proved to be successful, shielding process is otherwise terminated.
3. common recognition is completed in shielding request inside all super nodes, after knowing together successfully, 4 are entered step, otherwise terminates screen Cover process.
4. super node initiates the transaction of shielding violation Transaction Information to ordinary node, public chain participates in node in former block Transaction Information be updated, super node then retains shielding content.
As shown in Fig. 2, the present invention handles the step in violation information memory block chain intelligence contract:
1. monitoring party determines the executor for deleting violation content, notify intelligent contract developer to the violation content in contract It is deleted or is shielded, or initiate the request of disabling contract to super node
2. super node certifying organization identity, then enters step 3 after being proved to be successful, disabling process is otherwise terminated.
3. common recognition is completed in shielding request inside all super nodes, after knowing together successfully, 4 are entered step, otherwise terminates and prohibits Use process.
4. super node initiates the transaction of the disabling contract of intelligence containing violation information to ordinary node, public chain participates in node common recognition Afterwards, intelligent contract is disabled.
Further, in the step two, transaction includes intrinsic information and self-defined information, and intrinsic information includes handing over Easy address, transaction acceptance address, transaction are spent, and the field that these intrinsic and content meanings of trading of transaction Hash determine is made by oneself Adopted information includes payload, extra, and custom field, which is customized by the user, to be filled in, the uncertain field of content meaning.
Further, in the step two, when supervision direction super node initiates shielding transaction, the super of transaction is received Node carries out transaction common recognition to other super nodes after verifying monitoring party identity.After masking operation carries out, violation information is only right Super node is as it can be seen that only retain the Hash of violation self-defined information in the block of the ordinary node in public chain.
Further, in the step two, intelligent contract developer possesses deletion or shields the permission of violation information, screen Violation information after covering is invisible to the caller of intelligent contract.
Further, in the step two, intelligence under the address is forbidden in the address that super node can specify intelligent contract The calling of energy contract.

Claims (5)

1. the public chain information screen method that one kind does not influence confidence level, which comprises the following steps:
Step 1:
Monitoring party detects the violation information being stored in transaction or intelligent contract, it is desirable that the super node or intelligence of public chain close About developer shields violation information.
Step 2:
1) when violation information is stored in transaction: regulatory agency initiates the friendship of transaction of the shielding containing violation information to super node Common recognition is completed in easy Hash, shielding request inside all super nodes.After super node common recognition, shielding is initiated to ordinary node and is disobeyed The transaction of Transaction Information is advised, public chain participates in node and is updated to the Transaction Information in former block.
2) when violation information is stored in intelligent contract: monitoring party passes through intelligent contract address lookup intelligence contract developer, Intelligent contract developer is notified to delete or shield the violation content in contract;It supervises direction super node and initiates disabling intelligence The transaction of energy contract, after super node verifies monitoring party identity, the contract information for disabling of knowing together in super node.Common recognition is completed Afterwards, super super node disables the intelligent contract containing violation information to whole node broadcasts, completes violation information shielding.
2. the public chain information screen method that one kind as described in claim 1 does not influence confidence level, which is characterized in that the step In rapid two, transaction includes intrinsic information and self-defined information, and intrinsic information includes transaction address, transaction acceptance address, transaction It spending, fields that these transaction of transaction Hash are intrinsic and content meanings determine, self-defined information includes payload, extra, Custom field, which is customized by the user, to be filled in, the uncertain field of content meaning.
3. the public chain information screen method that one kind as described in claim 1 does not influence confidence level, which is characterized in that the step In rapid two, when supervision direction super node initiates shielding transaction, the super node of transaction is received after verifying monitoring party identity, to Other super nodes carry out transaction common recognition.After masking operation carries out, violation information is only to super node as it can be seen that common in public chain Only retain the Hash of violation self-defined information in the block of node.
4. the public chain information screen method that one kind as described in claim 1 does not influence confidence level, which is characterized in that the step In rapid two, intelligent contract developer possesses deletion or shields the permission of violation information, and the violation information after shielding is to intelligent contract Caller it is invisible.
5. the public chain information screen method that one kind as described in claim 1 does not influence confidence level, which is characterized in that the step In rapid two, the calling of intelligent contract under the address is forbidden in the address that super node can specify intelligent contract.
CN201811640246.XA 2018-12-29 2018-12-29 Public link information shielding method without influence on credibility Active CN109697670B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811640246.XA CN109697670B (en) 2018-12-29 2018-12-29 Public link information shielding method without influence on credibility

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811640246.XA CN109697670B (en) 2018-12-29 2018-12-29 Public link information shielding method without influence on credibility

Publications (2)

Publication Number Publication Date
CN109697670A true CN109697670A (en) 2019-04-30
CN109697670B CN109697670B (en) 2021-06-04

Family

ID=66233093

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811640246.XA Active CN109697670B (en) 2018-12-29 2018-12-29 Public link information shielding method without influence on credibility

Country Status (1)

Country Link
CN (1) CN109697670B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110310205A (en) * 2019-06-28 2019-10-08 百度在线网络技术(北京)有限公司 A kind of block chain data monitoring method, device, equipment and medium
CN112000713A (en) * 2020-08-14 2020-11-27 中国银联股份有限公司 Data processing method, device, equipment and medium
CN112101945A (en) * 2020-11-20 2020-12-18 北京连琪科技有限公司 Method and system for supervising block chain content
CN112560112A (en) * 2020-12-15 2021-03-26 杭州趣链科技有限公司 Block chain based information shielding method, device, equipment and readable storage medium

Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130042111A1 (en) * 2011-08-09 2013-02-14 Michael Stephen Fiske Securing transactions against cyberattacks
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106506467A (en) * 2016-10-31 2017-03-15 国云科技股份有限公司 A kind of proof of identification recording method based on block chain
CN106780033A (en) * 2016-12-16 2017-05-31 杭州云象网络技术有限公司 A kind of digital ticket transaction system construction method based on alliance's chain
CN106878071A (en) * 2017-01-25 2017-06-20 上海钜真金融信息服务有限公司 A kind of block chain common recognition mechanism based on Raft algorithms
CN107025602A (en) * 2017-02-24 2017-08-08 杭州象链网络技术有限公司 A kind of financial asset transaction system construction method based on alliance's chain
US20170244721A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for providing levels of security access to a process data network
CN107241360A (en) * 2017-08-04 2017-10-10 北京明朝万达科技股份有限公司 A kind of data safety shares exchange method and data safety shares switching plane system
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN107682364A (en) * 2017-11-03 2018-02-09 杭州秘猿科技有限公司 One kind license chain privacy method of commerce
CN108075895A (en) * 2016-11-15 2018-05-25 深圳银链科技有限公司 Node permission method and system based on block chain
CN108270780A (en) * 2018-01-08 2018-07-10 中国电子科技集团公司第三十研究所 A kind of heterogeneous network environment multicenter digital identity management method
CN108563924A (en) * 2018-04-24 2018-09-21 深圳市亿道数码技术有限公司 A kind of multimedia ecosystem based on block chain
CN108650073A (en) * 2018-05-07 2018-10-12 浙江工商大学 A kind of secret protection price competing method based on block chain
CN108650270A (en) * 2018-05-16 2018-10-12 苏宁易购集团股份有限公司 Data sharing method based on alliance's chain and incentive mechanism and system
CN108665270A (en) * 2018-04-17 2018-10-16 平安科技(深圳)有限公司 Data diddling recognition methods, device, computer equipment and storage medium
CN108805574A (en) * 2018-05-19 2018-11-13 深圳市图灵奇点智能科技有限公司 Method of commerce based on secret protection and system
CN108831565A (en) * 2018-05-10 2018-11-16 深圳市和和月升科技有限公司 Chinese medicine acupuncture information common recognition system based on block chain
CN108876603A (en) * 2018-01-03 2018-11-23 上海指旺信息科技有限公司 Share exchange platform based on block chain
CN108876213A (en) * 2018-08-22 2018-11-23 泰康保险集团股份有限公司 Product management method, device, medium and electronic equipment based on block chain
CN108932433A (en) * 2018-06-14 2018-12-04 江苏百倍云信息科技有限公司 A kind of industrial data shared system and method based on block chain
CN108965399A (en) * 2018-06-25 2018-12-07 百度在线网络技术(北京)有限公司 Execution method, apparatus, equipment and the storage medium of intelligent contract
CN109066653A (en) * 2018-08-07 2018-12-21 宁波智果科技咨询服务有限公司 A kind of charging pile system based on block chain trade management
CN109064291A (en) * 2018-08-08 2018-12-21 平安科技(深圳)有限公司 House lease method, system, computer equipment and storage medium

Patent Citations (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130042111A1 (en) * 2011-08-09 2013-02-14 Michael Stephen Fiske Securing transactions against cyberattacks
US20170244721A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for providing levels of security access to a process data network
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN106506467A (en) * 2016-10-31 2017-03-15 国云科技股份有限公司 A kind of proof of identification recording method based on block chain
CN108075895A (en) * 2016-11-15 2018-05-25 深圳银链科技有限公司 Node permission method and system based on block chain
CN106780033A (en) * 2016-12-16 2017-05-31 杭州云象网络技术有限公司 A kind of digital ticket transaction system construction method based on alliance's chain
CN106878071A (en) * 2017-01-25 2017-06-20 上海钜真金融信息服务有限公司 A kind of block chain common recognition mechanism based on Raft algorithms
CN107025602A (en) * 2017-02-24 2017-08-08 杭州象链网络技术有限公司 A kind of financial asset transaction system construction method based on alliance's chain
CN107241360A (en) * 2017-08-04 2017-10-10 北京明朝万达科技股份有限公司 A kind of data safety shares exchange method and data safety shares switching plane system
CN107483198A (en) * 2017-09-25 2017-12-15 中国科学院信息工程研究所 A kind of block catenary system supervised and method
CN107682364A (en) * 2017-11-03 2018-02-09 杭州秘猿科技有限公司 One kind license chain privacy method of commerce
CN108876603A (en) * 2018-01-03 2018-11-23 上海指旺信息科技有限公司 Share exchange platform based on block chain
CN108270780A (en) * 2018-01-08 2018-07-10 中国电子科技集团公司第三十研究所 A kind of heterogeneous network environment multicenter digital identity management method
CN108665270A (en) * 2018-04-17 2018-10-16 平安科技(深圳)有限公司 Data diddling recognition methods, device, computer equipment and storage medium
CN108563924A (en) * 2018-04-24 2018-09-21 深圳市亿道数码技术有限公司 A kind of multimedia ecosystem based on block chain
CN108650073A (en) * 2018-05-07 2018-10-12 浙江工商大学 A kind of secret protection price competing method based on block chain
CN108831565A (en) * 2018-05-10 2018-11-16 深圳市和和月升科技有限公司 Chinese medicine acupuncture information common recognition system based on block chain
CN108650270A (en) * 2018-05-16 2018-10-12 苏宁易购集团股份有限公司 Data sharing method based on alliance's chain and incentive mechanism and system
CN108805574A (en) * 2018-05-19 2018-11-13 深圳市图灵奇点智能科技有限公司 Method of commerce based on secret protection and system
CN108932433A (en) * 2018-06-14 2018-12-04 江苏百倍云信息科技有限公司 A kind of industrial data shared system and method based on block chain
CN108965399A (en) * 2018-06-25 2018-12-07 百度在线网络技术(北京)有限公司 Execution method, apparatus, equipment and the storage medium of intelligent contract
CN109066653A (en) * 2018-08-07 2018-12-21 宁波智果科技咨询服务有限公司 A kind of charging pile system based on block chain trade management
CN109064291A (en) * 2018-08-08 2018-12-21 平安科技(深圳)有限公司 House lease method, system, computer equipment and storage medium
CN108876213A (en) * 2018-08-22 2018-11-23 泰康保险集团股份有限公司 Product management method, device, medium and electronic equipment based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
张锐: "基于区块链的传统金融变革与创新", 《数字货币》 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110310205A (en) * 2019-06-28 2019-10-08 百度在线网络技术(北京)有限公司 A kind of block chain data monitoring method, device, equipment and medium
CN110310205B (en) * 2019-06-28 2022-02-25 百度在线网络技术(北京)有限公司 Block chain data monitoring method, device, equipment and medium
CN112000713A (en) * 2020-08-14 2020-11-27 中国银联股份有限公司 Data processing method, device, equipment and medium
WO2022032988A1 (en) * 2020-08-14 2022-02-17 中国银联股份有限公司 Data processing method, apparatus and device, and medium
CN112101945A (en) * 2020-11-20 2020-12-18 北京连琪科技有限公司 Method and system for supervising block chain content
CN112101945B (en) * 2020-11-20 2021-03-23 北京连琪科技有限公司 Method and system for supervising block chain content
CN112560112A (en) * 2020-12-15 2021-03-26 杭州趣链科技有限公司 Block chain based information shielding method, device, equipment and readable storage medium

Also Published As

Publication number Publication date
CN109697670B (en) 2021-06-04

Similar Documents

Publication Publication Date Title
CN109697670A (en) A kind of public chain information screen method not influencing confidence level
US11489843B2 (en) Controlling access to secured data via timed filtering of data
CN108492104B (en) Resource transfer monitoring method and device
CN103944737B (en) Method for authenticating user identity, Third Party Authentication platform, carrier authorization platform
CN106600405A (en) Block-chain-based data rights protection method
CN107145799A (en) A kind of data desensitization method and device
CN110020956A (en) A kind of exchange method and system, computer equipment and storage medium of transregional piece of chain
CN106779708A (en) Participant identity management method and system on block chain based on intelligent contract
CN112597762B (en) Blockchain system with intelligent contract data supervision function and supervision method
US11645418B2 (en) Data processing systems for data testing to confirm data deletion and related methods
CN109598425B (en) Method, device and equipment for managing and controlling risk objects
WO2022206482A1 (en) Blockchain editing method and blockchain node
Sokolov et al. The automating process of information security management
CN113129012B (en) Payment data processing method, device, equipment and system
CN110138767A (en) Processing method, device, equipment and the storage medium of transactions requests
CN106098069A (en) A kind of identity identifying method and terminal unit
Razaq et al. " We Even Borrowed Money From Our Neighbor" Understanding Mobile-based Frauds Through Victims' Experiences
Evtimov et al. Is tricking a robot hacking?
Liu et al. Deepfake Technology and Current Legal Status of It
Jacobi et al. A Solution for the third-party doctrine in a time of data sharing, contact tracing, and mass surveillance
Land et al. Building a Taxonomy for Cybercrimes.
CN109801166A (en) A kind of design method and system of the safe function of the intelligent contract based on status lock
CN110517027A (en) A kind of trustship of digital cash assets and transfer method based on intelligent contract
McDonough Cyber smart: Five habits to protect your family, money, and identity from cyber criminals
CN109389380A (en) A kind of system and method for anti-network payment swindle

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant