CN110059125B - Method for invoking proxy contract and related equipment - Google Patents
Method for invoking proxy contract and related equipment Download PDFInfo
- Publication number
- CN110059125B CN110059125B CN201910334886.6A CN201910334886A CN110059125B CN 110059125 B CN110059125 B CN 110059125B CN 201910334886 A CN201910334886 A CN 201910334886A CN 110059125 B CN110059125 B CN 110059125B
- Authority
- CN
- China
- Prior art keywords
- contract
- proxy
- function
- identifier
- called
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/25—Integrating or interfacing systems involving database management systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Accounting & Taxation (AREA)
- General Engineering & Computer Science (AREA)
- Data Mining & Analysis (AREA)
- Computer Security & Cryptography (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The embodiment of the application discloses a method and related equipment for invoking an agent contract, which are used for accurately invoking the agent contract and realizing the function which is required to be completed by the invoking requirement. The method of the embodiment of the application comprises the following steps: in this embodiment, the received proxy contract calling request is parsed to obtain the address of the target proxy contract and the identifier of the function to be called, and whether the address of the proxy contract exists in the first set is determined, if the address of the proxy contract exists in the first set, whether the identifier of the function to be called exists in the second set is determined, and if the identifier of the function to be called exists in the second set, the proxy contract is called. And analyzing the address of the proxy contract corresponding to the received proxy contract calling request and the identifier of the function to judge the specific operation which the calling request wants to complete, thereby accurately calling the proxy contract and realizing the function which the calling requirement wants to complete.
Description
Technical Field
The application relates to the field of blockchains, in particular to a method for invoking proxy contracts and related equipment.
Background
The intelligent contract concept can be summarized as a piece of code which is deployed on a book capable of sharing and copying, can maintain the state of the code, control the asset of the code and respond to the received external information or the asset, and can process the information, receive, store and send values.
The intelligent contract is upgraded by adopting a proxy mode generally, and a user calls the proxy contract and then calls the logic contract to realize corresponding functions by the proxy contract, and the proxy contract needs to have functions such as update or add and the like to manage the proxy contract and upgrade the proxy contract to a new logic contract and the like. As upgrades later become more complex, this type of function may become more and more complex. This results in a conflict if the proxy contract is a function of the same name as the logic contract or the function name is different but the corresponding calculated identifier is exactly the same, in which case, when the proxy contract is called, it is impossible to distinguish whether the proxy contract is called or the proxy contract is desired to be called.
Content of the application
The embodiment of the application discloses a method and related equipment for invoking an agent contract, which are used for accurately invoking the agent contract and realizing the function which is required to be completed by the invoking requirement.
The first aspect of the present application provides a method for proxy contract invocation, comprising:
analyzing the received proxy contract calling request;
judging whether the address of the proxy contract exists in the first set;
if the address of the proxy contract exists in the first set, judging whether the identifier of the function to be called exists in the second set;
and if the identifier of the function to be called exists in the second set, calling the proxy contract.
Optionally, before said parsing the received proxy contract invocation request, the method further comprises:
establishing a first set, wherein the first set is used for storing managers of agent contracts;
and establishing a second set, wherein the second set is used for storing identifiers of operation methods corresponding to the manager of the proxy contract.
Optionally, after the establishing the second set, the method further comprises:
adding a manager of a new agent contract to the first set;
an identifier of a function corresponding to the new proxy contract is added to the second set.
Optionally, if the address of the proxy contract does not exist in the first set, the method further includes:
an identifier of a function call that interprets the proxy contract call request;
and calling the corresponding logic contract through the identifier.
Optionally, if the identifier of the function to be called does not exist in the second set, the method further includes:
and calling a corresponding logic contract through the identifier of the function to be called.
A second aspect of an embodiment of the present application provides a system for proxy contract invocation, including:
the parsing unit is used for parsing the received proxy contract calling request;
a judging unit configured to judge whether an address of the proxy contract exists in a first set;
the judging unit is further configured to judge whether an identifier of a function to be called exists in the second set if the address of the proxy contract exists in the first set;
and the calling unit is used for calling the proxy contract if the identifier of the function to be called exists in the second set.
Optionally, the method system further comprises:
a setting-up unit configured to set up a first set, the first set being used for storing a manager of a proxy contract;
the establishing unit is further configured to establish a second set, where the second set is used to store identifiers of operation methods corresponding to the manager of the proxy contract.
Optionally, the system further comprises:
an adding unit configured to add a manager of a new agent contract to the first set;
the adding unit is further configured to add an identifier of a function corresponding to the new proxy contract to the second set.
Optionally, the system further comprises:
and the calling unit is also used for calling the corresponding logic contract according to the identifier of the function to be called by the calling request.
Optionally, the system further comprises:
the calling unit is further configured to call a corresponding logic contract through the identifier of the function to be called.
A third aspect of an embodiment of the present application provides a computer apparatus, including:
a processor, a memory, an input-output device, and a bus;
the processor, the memory and the input and output equipment are respectively connected with the bus;
the processor is configured to perform the method according to any of the preceding embodiments.
A fourth aspect of the embodiments of the present application provides a computer-readable storage medium having stored thereon a computer program, characterized in that: the computer program when executed by a processor implements the steps of the method as described in the previous embodiments.
From the above technical solutions, the embodiment of the present application has the following advantages: in this embodiment, the received proxy contract calling request is parsed to obtain the address of the target proxy contract and the identifier of the function to be called, and whether the address of the proxy contract exists in the first set is determined, if the address of the proxy contract exists in the first set, whether the identifier of the function to be called exists in the second set is determined, and if the identifier of the function to be called exists in the second set, the proxy contract is called. And analyzing the address of the proxy contract corresponding to the received proxy contract calling request and the identifier of the function to judge the specific operation which the calling request wants to complete, thereby accurately calling the proxy contract and realizing the function which the calling requirement wants to complete.
Drawings
FIG. 1 is a schematic diagram of an embodiment of a method for proxy contract invocation in accordance with an embodiment of the present application;
FIG. 2 is another schematic diagram of an embodiment of a method for proxy contract invocation in accordance with an embodiment of the application;
FIG. 3 is another schematic diagram of an embodiment of a method for proxy contract invocation in accordance with an embodiment of the application;
FIG. 4 is another schematic diagram of an embodiment of a method for proxy contract invocation in accordance with an embodiment of the application;
FIG. 5 is a schematic diagram of an embodiment of a system for proxy contract invocation in accordance with an embodiment of the application;
FIG. 6 is a schematic diagram of a computer device according to an embodiment of the present application.
Detailed Description
The embodiment of the application provides a method and related equipment for invoking an agent contract, which are used for accurately invoking the agent contract and realizing the function which is required to be completed by the invoking requirement.
In order that those skilled in the art will better understand the present application, a technical solution in the embodiments of the present application will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present application without making any inventive effort, shall fall within the scope of the present application.
The terms first, second, third, fourth and the like in the description and in the claims and in the above drawings are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments described herein may be implemented in other sequences than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
The application relates to a BlockChain technology, and in order to facilitate understanding, a BlockChain (BlockChain) in the embodiment of the application will be briefly described, wherein the BlockChain is a data structure of distributed storage disclosed by all BlockChain points of an access server and comprises a plurality of blocks. The user terminal comprising the client can register to form a blockchain node, and forms a P2P network with other blockchain link points accessed to the blockchain server, the blockchain data can be stored in the P2P network, any one or more blockchain link points of the P2P network are paralyzed, the loss of the blockchain data can not be caused, so that the blockchain data has strong security, and the permanent storage and the non-falsification of the data are ensured. When a block is persisted into blockchain data, blockchain nodes accessing the server can add the block; the blocks are added to the blockchain data one by one in the persistence time order, each block except the first block in the blockchain data is linked to its previous block, so that the blockchain data forms a blockchain-like block, which cannot be modified when a block is persisted to the blockchain data.
In general, developers can easily upgrade their software, but the situation of blockchains is not the same because they have properties that are difficult to alter. The existing intelligent contract upgrading method comprises the following steps: and upgrading the intelligent contract by adopting the proxy contract, namely writing the logic contract into a logic address called by the proxy contract, and then operating the logic contract on the logic address by the proxy contract, so as to realize the upgrading of the intelligent contract. At the byte code level, the functions in the contract are represented by a 4 byte identifier. For example: transfer (index 256) is expressed as 0xa9059cbb, and the function name and the parameter type are taken as the first four bytes after certain encryption calculation, but this brings a problem that after the intelligent contract is upgraded, the co-existing proxy contract and logic contract may have the same function or two functions with the same identifier but different function names, so that when one of the contracts is taken, a situation of taking error or taking failure may occur, and the application aims to solve the problem so as to achieve the purpose of accurately calling the intelligent contract to be taken.
For easy understanding, a specific flow in the embodiment of the present application is described below, referring to fig. 1, and an embodiment of a method for proxy contract invocation in the embodiment of the present application includes:
101. analyzing the received proxy contract calling request to obtain the address of the target proxy contract and the identifier of the function to be called;
specifically, after receiving the call request of the proxy contract, in order to distinguish whether the call request is to call the logic contract through the proxy contract or directly call the proxy contract, the proxy contract call request is parsed to obtain the address of the target proxy contract and the identifier of the function to be called.
102. Judging whether the address of the proxy contract exists in the first set;
specifically, whether the address of the target agent contract exists in the first set is judged, and since the first set contains the manager identity capable of managing the agent contract, if the address of the target agent contract is the same as the address of the manager identity in the first set, it can be determined that the call request is really for the agent contracts capable of managing other agent contracts and having the manager identity.
103. Judging whether an identifier of a function to be called exists in the second set;
specifically, it is determined whether an identifier of a function to be called exists in the second set, the byte code level, and the function in the contract is represented by an identifier of 4 bytes, for example: transfer (address, ui 256) is expressed as 0xa9059cbb, and is the first four bytes obtained after performing certain encryption calculation on the function name and the parameter type, and in a specific judgment process, it may be enough to judge whether the identifier identical to the identifier of the target agent contract exists in the second set.
104. And calling the proxy contract.
Specifically, in the above two judging processes, the first judging process is to judge whether the address of the proxy contract exists in the first set, so as to judge whether the proxy contract to be called is a proxy contract capable of managing other proxy contracts, that is, the identity of the manager in the proxy contract, and the second judging process is to judge whether the call is directed to the management behavior of other proxy contracts, if the two judging processes are passed, it can be determined that the intelligent contract call is directed to call a proxy contract capable of managing other proxy contracts, and the calling behavior of the current time is also finally acted on the proxy contract.
In this embodiment, the received proxy contract calling request is parsed to obtain the address of the target proxy contract and the identifier of the function to be called, and whether the address of the proxy contract exists in the first set is determined, if the address of the proxy contract exists in the first set, whether the identifier of the function to be called exists in the second set is determined, and if the identifier of the function to be called exists in the second set, the proxy contract is called. And analyzing the address of the proxy contract corresponding to the received proxy contract calling request and the identifier of the function to judge the specific operation which the calling request wants to complete, thereby accurately calling the proxy contract and realizing the function which the calling requirement wants to complete.
In this embodiment, in order to meet the requirement of the subsequent judgment, two sets are established in advance to prepare, and referring to fig. 2 specifically, another method embodiment of proxy contract invocation in the embodiment of the present application includes:
201. establishing a first set, wherein the first set is used for storing managers of agent contracts;
specifically, a first set is established, where the first set is used for storing managers of proxy contracts, and it can be understood that proxy contracts put into the first set are proxy contracts that can act on other proxy contracts and can be distinguished from proxy contracts that are only responsible for calling logical contracts.
202. And establishing a second set, wherein the second set is used for storing identifiers of operation methods corresponding to the manager of the proxy contract.
Specifically, a second set is established, where the second set is used to store identifiers of operation methods corresponding to the manager of the proxy contract, that is, determine whether the acting object of the current call is a proxy contract or a logic contract, which can be understood that the manager of the proxy contract can act on other proxy contracts or on logic contracts, if the identifiers of functions needed when acting the manager on other proxy contracts are stored in the second byte, during the call, if the manager of the proxy contract is guaranteed to be called, and when the manager performs a function similar to the proxy contract, the intelligent contract call behavior of the current time can be guaranteed to be accurate, and the situation of a logic contract with a call error can not occur.
In this embodiment, to meet the continuous upgrade requirement of the intelligent contract, the first set and the second set are also updated correspondingly, referring specifically to fig. 3, another method for invoking the proxy contract in this embodiment of the present application includes:
301. adding a manager of a new agent contract to the first set;
in particular, adding a manager of a new agent contract to the first set, intelligent contracts are continually upgraded to meet the needs of blockchain services, as logical contracts are not revocable, which means that new agent contracts are continually generated to meet new functional needs, and therefore managers for managing other agent contracts are subject to variation, and it should be noted that, although only additions are mentioned here, manager identities may be deleted for the first set.
302. An identifier of a function corresponding to the new proxy contract is added to the second set.
Specifically, if a new administrator identity is generated in the first set, the second set will add an identifier of a function corresponding to the new agent contract, so as to determine whether the call is to act on the agent contract when the call is newly added to the agent contract with the administrator identity in the first set, and it should be noted that although only adding is mentioned here, the corresponding function identifier may be deleted for the second set.
In this embodiment, if the above-mentioned two judging processes are not satisfied, it is determined that the calling process is to call a logic contract, referring specifically to fig. 4, and another method for proxy contract calling in the embodiment of the present application includes:
401. and calling the corresponding logic contract according to the identifier of the function to be called by the calling request.
Specifically, if the address of the proxy contract does not exist in the first set, it may be determined that the call request of the proxy contract does not act on the proxy contract with the administrator identity as mentioned in the foregoing embodiment, and it may be understood that the call request calls a proxy contract that cannot act on other proxy contracts or the proxy contract itself, which proves that the call request calls proxy contracts that can only call a logical contract, so if the address of the proxy contract does not exist in the first set, the call request calls a corresponding logical contract according to the identifier of the function to be called by the call request.
Specifically, if the identifier of the function to be called does not exist in the second set, it may be determined that, although the call request calls those proxy contracts with manager identities that can act on other proxy contracts or on the proxy contracts, the final purpose of the call request may also be determined to be to call a logic contract through the proxy contracts because the identifier of the function to be called, that is, the behavior that the call wants to do, is not the operation method stored in the second set when the proxy contract with manager identities acts on the proxy contracts or on the proxy contracts.
The method in the embodiment of the present application is described above, and the embodiment of the present application is described below from the viewpoint of the virtual device.
A parsing unit 501, configured to parse the received proxy contract call request;
a determining unit 502, configured to determine whether an address of the proxy contract exists in the first set;
the judging unit 502 is further configured to judge whether an identifier of the function to be called exists in the second set if the address of the proxy contract exists in the first set;
and a calling unit 503, configured to call the proxy contract if the identifier of the function to be called exists in the second set.
As a preferred embodiment, the method system further comprises:
an establishing unit 504, configured to establish a first set, where the first set is used for storing an administrator of the proxy contract;
the establishing unit 504 is further configured to establish a second set, where the second set is used to store identifiers of operation methods corresponding to the manager of the proxy contract.
As a preferred embodiment, the system further comprises:
an adding unit 505 for adding a manager of a new agent contract to the first set;
the adding unit 505 is further configured to add an identifier of a function corresponding to the new proxy contract to the second set.
As a preferred embodiment of the present application,
the calling unit 503 is further configured to call a corresponding logic contract according to the identifier of the function to be called by the call request.
As a preferred embodiment of the present application,
the calling unit 503 is further configured to call a corresponding logic contract through the identifier of the function to be called.
In this embodiment, the parsing unit 501 is configured to parse the received proxy contract call request, the determining unit 502 is configured to determine whether an address of the proxy contract exists in the first set, the determining unit 502 is further configured to determine whether an identifier of a function to be called exists in the second set if the address of the proxy contract exists in the first set, and the calling unit 503 is configured to call the proxy contract if the identifier of the function to be called exists in the second set, where the specific operation that the call request wants to complete is determined by parsing the address of the proxy contract corresponding to the received proxy contract call request and the identifier of the function, so that the proxy contract is accurately called and the function that the call requirement wants to complete is implemented.
The computer apparatus in the embodiment of the present application will be described below from the perspective of a physical device, referring to fig. 6, and one embodiment of the computer apparatus in the embodiment of the present application includes:
the computer device 600 may vary widely in configuration or performance and may include one or more Central Processing Units (CPUs) 601 (e.g., one or more processors) and memory 605, where the memory 605 stores one or more applications or data.
Wherein the memory 605 may be volatile storage or persistent storage. The program stored in the memory 605 may include one or more modules, each of which may include a series of instruction operations on the server. Still further, the central processor 601 may be configured to communicate with the memory 605 to execute a series of instruction operations in the memory 605 on the intelligent terminal 600.
The computer device 600 may also include one or more power supplies 602, one or more wired or wireless network interfaces 603, one or more input/output interfaces 604, and/or one or more operating systems, such as WindowsServerTM, macOSXTM, unixTM, linuxTM, freeBSDTM, etc.
It should be understood that, in various embodiments of the present application, the sequence number of each step is not meant to indicate the order of execution, and the order of execution of each step should be determined by its functions and internal logic, and should not be construed as limiting the implementation process of the embodiments of the present application.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described systems, apparatuses and units may refer to corresponding procedures in the foregoing method embodiments, which are not repeated herein.
In the several embodiments provided in the present application, it should be understood that the disclosed systems, devices, and methods may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, e.g., the division of the units is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple units or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a separate product, may be recorded in a computer readable recording medium. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art or in whole or in part in the form of a software product recorded in a recording medium, including several instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned recording medium includes: a usb disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (RAM, randomAccessMemory), a magnetic disk, or an optical disk, or the like, on which program codes can be recorded.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application.
Claims (6)
1. A method of brokering contract invocations, comprising:
establishing a first set, wherein the first set is used for storing managers of agent contracts;
establishing a second set, wherein the second set is used for storing identifiers of operation methods corresponding to the manager of the proxy contract;
adding a manager of a new agent contract to the first set;
adding an identifier of a function corresponding to the new proxy contract to the second set;
analyzing the received proxy contract calling request to obtain the address of the target proxy contract and the identifier of the function to be called;
determining whether an address of the target agent contract exists in the first set;
if the address of the target agent contract exists in the first set, judging whether an identifier of a function to be called exists in the second set;
and if the identifier of the function to be called exists in the second set, calling the proxy contract.
2. The method of claim 1, wherein if the address of the target agent contract does not exist in the first set, the method further comprises:
and calling the corresponding logic contract according to the identifier of the function to be called by the calling request.
3. The method of claim 1, wherein if the identifier of the function to be called does not exist in the second set, the method further comprises:
and calling a corresponding logic contract according to the identifier of the function to be called.
4. A system for brokering contract invocations, comprising:
a setting-up unit configured to set up a first set, the first set being used for storing a manager of a proxy contract;
the establishing unit is further configured to establish a second set, where the second set is used to store identifiers of operation methods corresponding to the manager of the proxy contract.
An adding unit configured to add a manager of a new agent contract to the first set;
the adding unit is further configured to add an identifier of a function corresponding to the new proxy contract to the second set;
the analyzing unit is used for analyzing the received proxy contract calling request to obtain the address of the target proxy contract and the identifier of the function to be called;
a judging unit configured to judge whether an address of the proxy contract exists in the first set;
the judging unit is further configured to judge whether an identifier of a function to be called exists in the second set if the address of the proxy contract exists in the first set;
and the calling unit is used for calling the proxy contract if the identifier of the function to be called exists in the second set.
5. A computer device, comprising:
a processor, a memory, an input-output device, and a bus;
the processor, the memory and the input and output equipment are respectively connected with the bus;
the processor is configured to perform the method of any one of claims 1 to 3.
6. A computer-readable storage medium having stored thereon a computer program, characterized by: the computer program implementing the steps of the method according to any one of claims 1 to 3 when executed by a processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910334886.6A CN110059125B (en) | 2019-04-24 | 2019-04-24 | Method for invoking proxy contract and related equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910334886.6A CN110059125B (en) | 2019-04-24 | 2019-04-24 | Method for invoking proxy contract and related equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110059125A CN110059125A (en) | 2019-07-26 |
CN110059125B true CN110059125B (en) | 2023-09-05 |
Family
ID=67320559
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910334886.6A Active CN110059125B (en) | 2019-04-24 | 2019-04-24 | Method for invoking proxy contract and related equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110059125B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106919419A (en) * | 2017-02-03 | 2017-07-04 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | The update method and device of the intelligent contract program on block chain |
CN108664787A (en) * | 2018-05-15 | 2018-10-16 | 深圳市网心科技有限公司 | Contract deployment, call method, contract audit equipment, storage medium and system |
CN109445820A (en) * | 2018-10-29 | 2019-03-08 | 深圳市元征科技股份有限公司 | A kind of intelligence contract upgrade method, system, equipment and computer storage medium |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20190108576A1 (en) * | 2017-10-11 | 2019-04-11 | Capital One Services, Llc | Blockchain systems and methods for procurement |
-
2019
- 2019-04-24 CN CN201910334886.6A patent/CN110059125B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106919419A (en) * | 2017-02-03 | 2017-07-04 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | The update method and device of the intelligent contract program on block chain |
CN108664787A (en) * | 2018-05-15 | 2018-10-16 | 深圳市网心科技有限公司 | Contract deployment, call method, contract audit equipment, storage medium and system |
CN109445820A (en) * | 2018-10-29 | 2019-03-08 | 深圳市元征科技股份有限公司 | A kind of intelligence contract upgrade method, system, equipment and computer storage medium |
Non-Patent Citations (1)
Title |
---|
区块链技术下智能合约意思表示的认定;陈逸宁;;海南金融(05);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN110059125A (en) | 2019-07-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109995713B (en) | Service processing method in micro-service framework and related equipment | |
CN110661658B (en) | Node management method and device of block chain network and computer storage medium | |
CN111262726B (en) | Configuration information updating method and device and computer readable storage medium | |
US20120203858A1 (en) | Transaction control arrangement for device management system | |
CN106489251A (en) | The methods, devices and systems that applied topology relation finds | |
CN113268308B (en) | Information processing method, device and storage medium | |
CN109492181B (en) | Page jump method, device, computer equipment and storage medium | |
CN109104368B (en) | Connection request method, device, server and computer readable storage medium | |
CN107967140A (en) | The initiating method of software modification, the method and device for issuing metadata | |
CN114363144B (en) | Fault information association reporting method and related equipment for distributed system | |
CN111654399B (en) | Networking method, device, equipment and storage medium based on SD-WAN | |
US10715628B2 (en) | Attribute operating method and device | |
CN113691635A (en) | Method and device for calling micro service, electronic equipment and readable storage medium | |
CN115086166A (en) | Computing system, container network configuration method, and storage medium | |
CN114398397A (en) | Data processing method, device, storage medium and system | |
CN112667270B (en) | Updating method of voice processing resource, computer equipment and storage device | |
CN112559124A (en) | Model management system and target operation instruction processing method and device | |
CN112631994A (en) | Data migration method and system | |
CN110059125B (en) | Method for invoking proxy contract and related equipment | |
CN115208671B (en) | Firewall configuration method, device, electronic equipment and storage medium | |
CN116341508A (en) | Dynamic configuration method and device for message template, computer equipment and storage medium | |
CN113342275B (en) | Method, apparatus and computer readable storage medium for accessing data at block link points | |
CN113132241B (en) | ACL template dynamic configuration method and device | |
CN112889247B (en) | VNF service instantiation method and device | |
CN111698311A (en) | Node control method and device of distributed storage cluster and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |