CN110222538B - Verification method and device related to block chain - Google Patents

Verification method and device related to block chain Download PDF

Info

Publication number
CN110222538B
CN110222538B CN201910519287.1A CN201910519287A CN110222538B CN 110222538 B CN110222538 B CN 110222538B CN 201910519287 A CN201910519287 A CN 201910519287A CN 110222538 B CN110222538 B CN 110222538B
Authority
CN
China
Prior art keywords
block
hash
node
nodes
hash value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910519287.1A
Other languages
Chinese (zh)
Other versions
CN110222538A (en
Inventor
吉建勋
杨慧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ruice Technology Co Ltd
Original Assignee
Beijing Ruice Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ruice Technology Co Ltd filed Critical Beijing Ruice Technology Co Ltd
Priority to CN201910519287.1A priority Critical patent/CN110222538B/en
Publication of CN110222538A publication Critical patent/CN110222538A/en
Application granted granted Critical
Publication of CN110222538B publication Critical patent/CN110222538B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Technology Law (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The embodiment of the invention relates to a verification method and a verification device related to a block chain. The method comprises the following steps: generating a first block to be verified, and performing a first hash operation according to the first block to be verified to obtain a first hash value; sending the first hash value to other nodes of the plurality of out-of-block nodes; determining and selecting a specified number of second hash values; performing a fourth hash operation on the second hash values with the specified number to obtain a fourth hash value; selecting a target verification node from the plurality of verification nodes according to the fourth hash value and a preset random rule; and sending the first to-be-verified block to the target verification node. Therefore, partial nodes except the block nodes can be selected to verify the block, the selection of the partial nodes has certain randomness and verifiability, the possibility that the block chain is attacked successfully can be reduced, the verification efficiency of the block chain node network is improved, and the accounting efficiency is further improved.

Description

Verification method and device related to block chain
Technical Field
The invention relates to the technical field of computers, in particular to a verification method and device relating to a block chain.
Background
Each node in the blockchain network is equivalent to each computer or server terminal storing all the block data. The production of all new blocks, as well as the verification and accounting of transactions and broadcasting them to the network-wide sync, is done by the nodes.
The node is the miner which we commonly call. The different power of each miner determines how much billing rights it can allocate and how much rewards it can earn.
The first generation of consensus mechanism for block chains is called POW, which is a workload proving consensus mechanism and is commonly called mining. Thousands of hash hits must be performed to create a new block. These operations consume much power and cause energy waste, so they are also affected by the scale. Even more feared is that once most of the computing power is monopolized, decentralization is threatened.
The second generation of consensus mechanism called POS is the rights and interests identification mechanism, which decides who has more accounting rights according to the amount of money held and the time. The recognition mechanism has the advantages of avoiding energy consumption, but has the disadvantages that the speaking right is controlled by the large user holding the money, the characteristic of central collection right is formed, and the characteristic runs counter to the original intention of decentralization of the block chain.
The third generation consensus mechanism is DPOS, and the biggest characteristic of the mechanism is that an election system is added on the basis of POS right certificate. The super nodes which finally obtain the billing right and are produced by voting of all the money-holding users can perform billing, so that the energy waste can be greatly reduced, but the calculation requirements on the super nodes are high due to the centralized calculation on the super nodes, and the efficiency of the super nodes directly influences the billing efficiency, so that the mode has weak capacity of dealing with large-scale data, and the development is restricted.
Disclosure of Invention
Based on the above problem, the embodiments of the present invention provide a verification method and apparatus relating to a block chain.
In a first aspect, an embodiment of the present invention provides a verification method involving a block chain. The block-link node network comprises a plurality of block-out nodes and a plurality of verification nodes, the method is applied to a first block-out node, the first block-out node is any one of the plurality of block-out nodes, and the method comprises the following steps:
generating a first block to be verified, and performing a first hash operation according to the first block to be verified to obtain a first hash value;
sending the first hash value to other nodes of the plurality of out-of-block nodes;
determining second hash values of the plurality of block output nodes, wherein the second hash value of each block output node is obtained by performing second hash operation on at least one third hash value and the first value of the block output node; each third hash value is obtained by carrying out third hash operation according to the second block to be verified; determining a first value of each block output node according to the signature of the block output node on the first hash value;
selecting a specified number of second hash values according to the size of the second hash values of the plurality of block outlet nodes;
performing a fourth hash operation on the second hash values with the specified number to obtain a fourth hash value;
selecting a target verification node from the plurality of verification nodes according to the fourth hash value and a preset random rule;
and sending the first block to be verified to the target verification node so that the target verification node verifies the first block to be verified.
In some embodiments, the method further comprises:
signing the first hash value to obtain a first digital signature of the first block output node;
and performing fifth hash operation on the first digital signature of the first block output node to obtain a first numerical value of the first block output node.
In some embodiments, further comprising:
receiving a fifth hash value sent by a second block output node, wherein the fifth hash value is obtained by performing first hash operation on a third block to be verified by the second block output node;
signing the fifth hash value to obtain a second digital signature of the first block output node;
performing a fifth hash operation on the second digital signature of the first block output node to obtain a second numerical value of the first block output node;
performing a third hash operation according to the fourth block to be verified to obtain at least one sixth hash value, wherein the fourth block to be verified is a block next to the third block to be verified;
performing a second hash operation according to the at least one sixth hash value and the second value of the first block output node to obtain a seventh hash value of the first block output node;
and sending the seventh hash value of the first block output node to the second block output node.
In some embodiments, further comprising:
determining at least one verified block before a specified interval of the first to-be-verified block, where the specified interval may be determined according to the number of the plurality of out-block nodes;
and respectively carrying out third hash operation on each of the at least one verified block to obtain at least one third hash value.
In some embodiments, the performing a fourth hash operation on the specified number of second hash values to obtain a fourth hash value includes:
and performing fourth hash operation on the second hash values and the third numerical values of the specified number to obtain a fourth hash value, wherein the third numerical value is 1-n or the serial number of the first block-out node, and n is an arbitrary value.
In a second aspect, a verification method involving blockchains is provided. The block-link node network comprises a plurality of block-out nodes and a plurality of verification nodes, the method is applied to a current verification node, the current verification node is any one of the plurality of verification nodes, and the method comprises the following steps:
determining a first to-be-verified block generated by a first block output node, a public key of the first block output node, a first digital signature of the first block output node and second hash values of the plurality of block output nodes;
verifying the first digital signature of the first block outlet node by using the public key of the first block outlet node to obtain a first hash value of the first block outlet node;
performing first hash operation on the first block to be verified to obtain a sixth hash value;
if the first hash value is the same as the sixth hash value, selecting a specified number of second hash values according to the sizes of the second hash values of the plurality of out-of-block nodes;
performing a fourth hash operation on the second hash values with the specified number to obtain a fourth hash value;
determining a serial number of a target verification node according to the fourth hash value and a preset random rule;
and if the serial number of the target verification node is the serial number of the current verification node, verifying the first to-be-verified block, and broadcasting a verification result in the block link point network.
In a third aspect, an authentication apparatus is provided that involves a blockchain. The block link node network comprises a plurality of block output nodes and a plurality of verification nodes, the device is suitable for a first block output node, the first block output node is any one of the plurality of block output nodes, and the device comprises:
the hash unit is used for generating a first block to be verified and carrying out a first hash operation according to the first block to be verified to obtain a first hash value;
a sending unit, configured to send the first hash value to other nodes in the plurality of out-of-block nodes;
the determining unit is used for determining second hash values of the plurality of block output nodes, and the second hash value of each block output node is obtained by performing second hash operation on at least one third hash value and the first value of the block output node; each third hash value is obtained by carrying out third hash operation according to the second block to be verified; determining a first value of each block output node according to the signature of the block output node on the first hash value;
the selecting unit is used for selecting a specified number of second hash values according to the sizes of the second hash values of the plurality of block outlet nodes;
the hash unit is further used for performing fourth hash operation on the second hash values with the specified number to obtain fourth hash values;
the selecting unit is further configured to select a target verification node from the plurality of verification nodes according to the fourth hash value and a preset random rule;
the sending unit is further configured to send the first block to be verified to the target verification node, so that the target verification node verifies the first block to be verified.
In some embodiments, further comprising:
the signature unit is used for signing the first hash value to obtain a first digital signature of the first block output node;
and the hash unit is used for carrying out fifth hash operation on the first digital signature of the first block output node to obtain a first numerical value of the first block output node.
In some embodiments, further comprising:
the receiving unit is used for receiving a fifth hash value sent by a second block output node, wherein the fifth hash value is obtained by performing first hash operation on a third block to be verified by the second block output node;
the signature unit is used for signing the fifth hash value to obtain a second digital signature of the first block output node;
the hash unit is used for carrying out fifth hash operation on the second digital signature of the first block output node to obtain a second numerical value of the first block output node;
the hash unit is used for performing third hash operation according to the fourth block to be verified to obtain at least one sixth hash value;
the hash unit is used for performing second hash operation according to the at least one sixth hash value and the second value of the first block output node to obtain a seventh hash value of the first block output node;
and the sending unit is used for sending the seventh hash value of the first block output node to the second block output node.
In some embodiments, further comprising:
a determining unit, configured to determine at least one verified block before a specified interval of the first to-be-verified block, where the specified interval may be determined according to the number of the plurality of out-block nodes;
and the hash unit is used for respectively carrying out third hash operation on each of the at least one verified block to obtain at least one third hash value.
In a fourth aspect, an authentication apparatus is provided that involves a blockchain. The block link node network comprises a plurality of block outlet nodes and a plurality of verification nodes, the device is suitable for a current verification node, the current verification node is any one of the plurality of verification nodes, and the device comprises:
the first determining unit is used for determining a first to-be-verified block generated by a first block output node, a public key of the first block output node, a first digital signature of the first block output node and second hash values of the plurality of block output nodes;
the first verification unit is used for verifying the first digital signature of the first block output node by using the public key of the first block output node to obtain a first hash value of the first block output node;
the first hash unit is used for carrying out first hash operation on the first block to be verified to obtain a sixth hash value;
a selecting unit, configured to select a specified number of second hash values according to sizes of the second hash values of the multiple block output nodes if the first hash value is the same as the sixth hash value;
the second hash unit is used for carrying out fourth hash operation on the second hash values with the specified number to obtain fourth hash values;
the second determining unit is used for determining the serial number of the target verification node according to the fourth hash value and a preset random rule;
and the second verification unit is used for verifying the first to-be-verified block and broadcasting a verification result in the block link point network if the serial number of the target verification node is the serial number of the current verification node.
In some embodiments, the performing a fourth hash operation on the specified number of second hash values to obtain a fourth hash value includes:
and performing fourth hash operation on the second hash values and the third numerical values of the specified number to obtain a fourth hash value, wherein the third numerical value is 1-n or the serial number of the first block-out node, and n is an arbitrary value.
In some embodiments, the preset random rule comprises:
converting the fourth hash value into a 10-system, and taking the remainder of the number of the verification nodes;
and determining the verification node corresponding to the remainder as the target verification node.
In a fifth aspect, the present specification provides a computer device, including a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method steps of any one or more of the first or second aspects when executing the program.
A sixth aspect provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the method of any one or more of the first or second aspects described above.
In a seventh aspect, there is provided a computer program product comprising instructions which, when run on a computer, cause the computer to perform the method of any one or more of the first or second aspects described above.
By the embodiment of the invention, partial nodes except the block nodes can be selected to verify the block, the selection of the partial nodes has certain randomness and verifiability, the possibility of successfully attacking the block chain can be reduced, the verification efficiency of the block chain node network is improved, the accounting efficiency is further improved, and the block chain node network can be applied to a service scene with larger data scale.
Drawings
FIG. 1 illustrates an exemplary architecture for applying embodiments provided herein;
fig. 2 is a flowchart of a verification method involving a blockchain according to an embodiment of the present invention;
fig. 3 is a flowchart of another verification method involving a blockchain according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an apparatus for publishing information based on a block chain according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an apparatus for publishing information based on a block chain according to an embodiment of the present invention;
fig. 6 shows a schematic structural diagram of a computer device provided in an embodiment of the present specification.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a verification method and a verification device related to a block chain. Fig. 1 shows an exemplary architecture to which embodiments provided herein apply.
As shown in fig. 1, the exemplary architecture may include a plurality of blockchain nodes, which may include a plurality of out-of-block nodes 101 and a plurality of verification nodes 102. In one example, the block node may be a plurality of super nodes selected by an election mechanism, the number of the super nodes may be determined according to actual needs, and the number of the super nodes may be an odd number, for example, 21. In another example, the plurality of verification nodes may be candidate nodes, wherein the super node may be selected from the candidate nodes, the number of the candidate nodes may also be determined according to actual needs, for example, may be 100, wherein the candidate nodes may be selected according to a preset random rule, for example, a specified number of nodes with the highest computational power may be used as the candidate nodes. In another example, the verification node may also be all or part of a node other than the out-of-block node. The block link point may be implemented in a software form or a hardware form. When implemented as hardware, it may be a notebook computer, a desktop computer, a mobile terminal, and the like.
The block-out node is mainly used for producing the data blocks in a specified time period in the system based on a consensus mechanism, namely mainly used for accounting. The verification node is mainly used for verifying the blocks generated by the block generation node based on a consensus mechanism, and the verified blocks are recorded in the block chain. The nodes may communicate with each other to synchronize data such as blockchains. For example, the nodes may communicate based on the D2D protocol.
For the purpose of facilitating understanding of the embodiments of the present invention, the following description will be further explained with reference to specific embodiments, which are not to be construed as limiting the embodiments of the present invention.
Fig. 2 is a flowchart of a verification method involving a blockchain according to the present invention. The block-link node network includes a plurality of out-block nodes and a plurality of verification nodes, such as the block-link node network in the exemplary architecture shown in fig. 1, and the method is applied to a first out-block node, which is any one of the plurality of out-block nodes. As shown in fig. 2, the method specifically includes:
s210, generating a first block to be verified, and performing a first hash operation according to the first block to be verified to obtain a first hash value.
Wherein each node in the block-link node network operates based on a consensus mechanism. The consensus mechanism is predefined and may include a block consensus mechanism, a verification consensus mechanism, and the like.
The block output node in the block link node network may determine a first block output node according to a block output consensus mechanism, and the first block output node may generate a block from data in a specified time period in the system. The specified time period can be determined according to actual needs, and can be 1 second, 10 seconds, 10 minutes, or the like, for example. The system may be the entire blockchain system corresponding to the blockchain link point network. The block chain is composed of a plurality of blocks, and each block can carry a storage structure with the identification of the last block forming a chain.
When a previous blockchain node needs to be verified to uplink before generating a new block, the new block may be referred to as a first to-be-verified block.
In order to increase the verification efficiency of the nodes and reduce the burden of the system, a certain number of verification nodes can be selected for verification.
When the verification node is selected, a first hash operation may be performed on the first block to be verified to obtain a first hash value. The verification consensus mechanism may include a predefined first hash operation, which may be determined according to actual needs, for example, the first hash operation may be SHA-256 or the like.
S220, sending the first hash value to other nodes in the plurality of block outlet nodes;
the plurality of egress block nodes may be all egress block nodes.
S230, determining second hash values of the plurality of out-of-block nodes.
The second hash value of each block output node is obtained by performing second hash operation on at least one third hash value and the first value of the block output node; each third hash value is obtained by carrying out third hash operation according to the second block to be verified; the first value of each out-of-block node is determined according to the signature of the out-of-block node on the first hash value. The second to-be-verified block is a block next to the first to-be-verified block. Since the next block is predicted without a way, the whole process is more random.
Each block output node signs the first hash value to obtain a first digital signature of the block output node; the first digital signature of the out-of-block node may be used as the first value of the out-of-block node. Or, each block output node performs a third hash operation on the first digital signature of the block output node to obtain a first value of the block output node.
In one example, a first out-of-block node may sign the first hash value, resulting in a first digital signature of the first out-of-block node; the first block output node may perform a fifth hash operation on the first digital signature of the first block output node to obtain a first value of the first block output node.
Each blockchain node may include at least one key pair, each key pair including a public key and a private key, the private key may be stored locally, and the public key may be sent to other blockchain nodes.
After the current block node determines the first hash value, the first hash value may be signed to obtain a first digital signature. The first signature of the block output node may be signed by using a private key of the block output node, and the first signature of the block output node may be verified by using a public key corresponding to the private key.
The verification consensus mechanism may include a predefined third hash operation, which may be determined according to actual needs, for example, the third hash operation may be SHA-256 or the like.
Each out-of-block node may calculate the at least one third hash value. Then, each out-block node may obtain a second hash value of the out-block node by performing a second hash operation on the at least one third hash value and the first value of the out-block node.
In one example, the first out-block node signs the first hash value, resulting in a first digital signature of the first out-block node; performing a fifth hash operation on the first digital signature of the first block output node to obtain a first numerical value of the first block output node; respectively performing third hash operation on at least one verified block before the first block to be verified to obtain at least one third hash value; and performing second hash operation according to at least one third hash value and the first numerical value of the first block output node to obtain a second hash value of the first block output node.
S240, selecting a specified number of second hash values according to the sizes of the second hash values of the plurality of out-of-block nodes.
The second hash values of the plurality of out-of-block nodes may be sorted, and a specified number of second hash values with a larger or smaller value may be selected. The specified number may be determined according to actual needs, and for example, the specified number may be 2.
And S250, performing fourth hash operation on the second hash values with the specified number to obtain a fourth hash value.
When the verification node is selected, a fourth hash operation may be performed on a specified number of second hash values to obtain a fourth hash value. The verification consensus mechanism may include a predefined fourth hash operation, and the third hash operation may be determined according to actual needs, for example, the fourth hash operation may be SHA-256 or the like.
And S260, selecting a target verification node from the plurality of verification nodes according to the fourth hash value and a preset random rule. The target verification node may include one or more.
In selecting the verification node, the selection may be made based on the fourth hash value. The verification consensus mechanism may include a preset random rule according to which the selection is based, where the preset random rule has certain randomness and verifiability.
In one example, the preset random rule may include:
converting the fourth hash value into a 10-system, and taking the remainder of the fourth numerical value;
and determining the verification node corresponding to the remainder as a target verification node.
Wherein the fourth value may be determined according to the number of verification nodes. For example, the number of verification nodes may be 100, and the third value may be 100.
The randomness is guaranteed through the fourth hash value, and the verifiability of the target verification node is guaranteed through the determination of the fourth hash value and a preset random rule.
S270, sending the first block to be verified to the target verification node, so that the target verification node verifies the first block to be verified.
In the embodiment of the present invention, any two operations of the first hash operation, the second hash operation, the third hash operation, the fourth hash operation, and the fifth hash operation may be the same or different hash operations. In one example, the first hash operation, the second hash operation, the third hash operation, the fourth hash operation, and the fifth hash operation may be the same hash operation, and in another example, the first hash operation, the second hash operation, the third hash operation, the fourth hash operation, and the fifth hash operation may be different hash operations.
The first block outlet node may send the first block to be verified to the target verification node for verification. When the first block to be verified is sent to the target verification node, the target verification node may send the first digital signature and the public key. The form of sending the public key may include various forms. In one example, the address of the out-of-block node may be generated from the public key, the address may be a roll-out or roll-in address for the transaction, and the target verification node may determine the public key of the out-of-block node from the address of the out-of-block node. In another example, the public key may be carried in the first to-be-verified block for transmission.
After receiving the first block to be verified, the target verification node may verify an identity of the first block output node, where the identity of the block output node may be implemented by verifying the first digital signature through a public key of the block output node. After the verification passes, the target verification node can verify the verification identity of the target verification node, and the verification process can select the same rule of the target verification node for verification based on the block-out node so as to verify whether the target verification node comprises the target verification node. After the two verification processes are passed, the target verification node verifies the first to-be-verified block and performs whole-network synchronization on the verification result. For the verification of the first to-be-verified block, it is mainly verified whether the block node is correctly accounted, and specific verification methods may include multiple ones, which are not described herein again.
In addition, the method may further include: and determining at least one third hash value, wherein each third hash value is obtained by performing third hash operation on the second block to be verified.
In some embodiments, this step may be achieved by:
a: at least one verified block before the specified interval of the first to-be-verified block is determined. The designated interval may be determined according to the number of the plurality of out-of-block nodes;
b: and respectively carrying out third hash operation on each of the at least one verified block to obtain at least one third hash value.
In one example, a third hash value may be determined, which may be determined according to the nth block before the first to-be-verified block, where n may be an integer greater than 0, and the n blocks may be the specified interval in the foregoing step a. For example, the value of n may be the number of the multiple out-of-block nodes, for example, the number of out-of-block nodes is 21, and n may be 21.
In another example, a plurality of third hash values may be determined, which may be determined from a plurality of blocks consecutive from the nth block before the first to-be-verified block. The value of n may be the number of the plurality of block-out nodes, and the number of the plurality of consecutive blocks may be a preset value, and the preset value may be determined according to actual needs, for example, 5.
In another example, a plurality of third hash values may be determined, where the plurality of third hash values may be determined according to a plurality of blocks of every n intervals before the first to-be-verified block, and a value of the interval n may be determined according to a number of a plurality of out-of-block nodes, for example, the number of out-of-block nodes is 21, and n may be 20.
By the embodiment of the invention, partial nodes except the block nodes can be selected to verify the block, the selection of the partial nodes has certain randomness and verifiability, the possibility of successfully attacking the block chain can be reduced, the verification efficiency of the block chain node network is improved, the accounting efficiency is further improved, and the block chain node network can be applied to a service scene with larger data scale.
In some embodiments, further comprising:
1) receiving a fifth hash value sent by a second block output node, wherein the fifth hash value is obtained by performing first hash operation on a third block to be verified by the second block output node;
2) signing the fifth hash value to obtain a second digital signature of the first block output node;
3) performing a fifth hash operation on the second digital signature of the first block output node to obtain a second numerical value of the first block output node;
4) performing a third hash operation according to the fourth block to be verified to obtain at least one sixth hash value, wherein the fourth block to be verified is a block next to the third block to be verified;
5) performing a second hash operation according to the at least one sixth hash value and the second value of the first block output node to obtain a seventh hash value of the first block output node;
6) and sending the seventh hash value of the first block output node to the second block output node.
In some embodiments, the step S240 may be specifically implemented by the following steps:
and performing fourth hash operation on the second hash values and the third numerical values in the specified number to obtain a fourth hash value.
Wherein the third value is a predefined fixed value such as 1-n, and n is an arbitrary value.
The third value may also be a sequence number of the first out-of-block node, or a value determined from the sequence number of the first out-of-block node. By this third value, the randomness of the selection of the block nodes can be further achieved.
Fig. 3 is a flowchart of another verification method involving blockchains according to the present invention. The block-linked node network includes a plurality of out-block nodes and a plurality of verification nodes, for example, the block-linked node network in the exemplary architecture shown in fig. 1, and the method is applied to a current verification node, which is any one of the plurality of verification nodes, as shown in fig. 3, and specifically includes: :
s310, determining a first to-be-verified block generated by the first block output node, a public key of the first block output node, a first digital signature of the first block output node and second hash values of the plurality of block output nodes.
A first to-be-verified block sent by a first out-block node, a public key of the first out-block node, and a first digital signature of the first out-block node may be received.
The first to-be-verified block may be a block newly generated by the first block-out node. The first digital signature may be determined from the first block to be verified. Specifically, the current block may perform a first hash operation on the first block to be verified to obtain a first hash value, and perform a signature on the first hash value by using a private key to obtain a first digital signature. Specifically, reference may be made to the foregoing embodiment shown in fig. 2, which is not described herein again.
The current verification node may also determine a public key of the first out-block node, where the public key may be determined according to an address of the first out-block node, or may obtain a public key carried in the verification block.
Wherein each node may comprise at least one asymmetrically encrypted key pair, each key pair comprising a public key and a private key.
Wherein each node in the block-link node network operates based on a consensus mechanism. The consensus mechanism is predefined and may include a block consensus mechanism, a verification consensus mechanism, and the like. The authentication node is primarily used to perform an authentication consensus mechanism.
After receiving the first to-be-verified block, the target verification node may first verify the identity of the first out-block node, and the identity of the out-block node may be implemented through steps S320 to S330 described below.
And S320, verifying the first digital signature by using the public key of the first block output node to obtain a first hash value.
S330, performing first hash operation on the first to-be-verified block to obtain a sixth hash value;
the first hash operation is an operation of generating a first hash value by the node of the block. The first hash operation may be predefined in the authentication consensus mechanism.
The current verification node may compare whether the first hash value and the sixth hash value are the same, and if so, this indicates that the first digital signature is the digital signature of the out-blocking node, that is, the verification is passed. If not, the verification fails.
After the verification passes, the current verification node may verify the verification identity of itself, and the verification process may be implemented through steps S340 and S350.
S340, if the first hash value is the same as the sixth hash value, selecting a specified number of second hash values according to the sizes of the second hash values of the plurality of out-of-block nodes.
The selection of the specified number of second hash values may be combined with the description of the embodiment shown in fig. 2, and is not described herein again.
And S350, performing fourth hash operation on the second hash values with the specified number to obtain a fourth hash value.
The fourth hash operation is an operation of generating a fourth hash value by the node, and the third hash operation is an operation of generating a third hash value by the node. The first hash operation, the second hash operation and the third hash operation may be combined with the foregoing discussion in the embodiment shown in fig. 2, and are not described here again.
And S360, determining the serial number of the target verification node according to the fourth hash value and a preset random rule.
The preset random rule is a rule for selecting a target verification node from the block-out node. The preset random rule may be predefined in the authentication consensus mechanism. The preset random rule may be combined with the foregoing discussion in the embodiment shown in fig. 2, and is not described here again.
After determining the sequence number of the target authentication node, it may be determined whether the sequence number of the target authentication node includes itself. If yes, step S370 is executed, and if not, the verification process is ended.
And S370, if the serial number of the target verification node is the serial number of the current verification node, verifying the first to-be-verified block, and broadcasting a verification result in the block link point network.
After the two verification processes are passed, the current verification node needs to verify the first block to be verified, and the verification result is subjected to full-network synchronization. For the verification of the first to-be-verified block, it is mainly verified whether the block node is correctly accounted, and specific verification methods may include multiple ones, which are not described herein again.
By the embodiment of the invention, partial nodes except the block nodes can be selected to verify the block, the selection of the partial nodes has certain randomness and verifiability, the possibility of successfully attacking the block chain can be reduced, the verification efficiency of the block chain node network is improved, the accounting efficiency is further improved, and the block chain node network can be applied to a service scene with larger data scale.
Fig. 4 is a schematic structural diagram of a verification apparatus relating to a block chain according to an embodiment of the present invention. The block-linked node network includes a plurality of out-blocking nodes and a plurality of verification nodes, for example, the block-linked node network in the exemplary architecture shown in fig. 1, the apparatus is adapted to a current out-blocking node, the current out-blocking node is any one of the plurality of out-blocking nodes, and the apparatus includes:
the hash unit 401 is configured to generate a first block to be verified, and perform a first hash operation according to the first block to be verified to obtain a first hash value;
a sending unit 402, configured to send the first hash value to other nodes in the plurality of out-blocking nodes;
a determining unit 403, configured to determine second hash values of the multiple block output nodes, where the second hash value of each block output node is obtained by performing a second hash operation on at least one third hash value and the first value of the block output node; each third hash value is obtained by carrying out third hash operation according to the second block to be verified; determining a first value of each block output node according to the signature of the block output node on the first hash value;
a selecting unit 404, configured to select a specified number of second hash values according to sizes of the second hash values of the multiple out-of-block nodes;
the hash unit 401 is further configured to perform a fourth hash operation on the specified number of second hash values to obtain a fourth hash value;
the selecting unit 404 is further configured to select a target verification node from the multiple verification nodes according to the fourth hash value and a preset random rule;
the sending unit 402 is further configured to send the first block to be verified to the target verification node, so that the target verification node verifies the first block to be verified.
In some embodiments, further comprising:
the signature unit is used for signing the first hash value to obtain a first digital signature of the first block output node;
and the hash unit is used for carrying out fifth hash operation on the first digital signature of the first block output node to obtain a first numerical value of the first block output node.
In some embodiments, further comprising:
the receiving unit is used for receiving a fifth hash value sent by a second block output node, wherein the fifth hash value is obtained by performing first hash operation on a third block to be verified by the second block output node;
the signature unit is used for signing the fifth hash value to obtain a second digital signature of the first block output node;
the hash unit is used for carrying out fifth hash operation on the second digital signature of the first block output node to obtain a second numerical value of the first block output node;
the hash unit is used for performing third hash operation according to the fourth block to be verified to obtain at least one sixth hash value;
the hash unit is used for performing second hash operation according to the at least one sixth hash value and the second value of the first block output node to obtain a seventh hash value of the first block output node;
and the sending unit is used for sending the seventh hash value of the first block output node to the second block output node.
In some embodiments, further comprising:
a determining unit, configured to determine at least one verified block before a specified interval of the first to-be-verified block, where the specified interval may be determined according to the number of the plurality of out-block nodes;
and the hash unit is used for respectively carrying out third hash operation on each of the at least one verified block to obtain at least one third hash value.
It can be understood that the verification apparatus related to blockchains based on blockchains in this embodiment corresponds to the method embodiment shown in fig. 2, and therefore, the above description about the method embodiment shown in fig. 2 is also applicable to the apparatus in this embodiment, and is not repeated herein.
Fig. 5 is a schematic structural diagram of a verification apparatus relating to a block chain according to an embodiment of the present invention. The block-link point network includes a plurality of egress nodes and a plurality of verification nodes, for example, the block-link point network in the exemplary architecture shown in fig. 1, and the apparatus is adapted to a current verification node, where the current verification node is any one of the plurality of verification nodes, and the apparatus includes:
a first determining unit 501, configured to determine a first to-be-verified block generated by a first block output node, a public key of the first block output node, a first digital signature of the first block output node, and second hash values of the plurality of block output nodes;
a first verification unit 502, configured to verify a first digital signature of a first block output node by using the public key of the first block output node, so as to obtain a first hash value of the first block output node;
a first hash unit 503, configured to perform a first hash operation on the first block to be verified to obtain a sixth hash value;
a selecting unit 504, configured to select a specified number of second hash values according to sizes of the second hash values of the multiple out-of-block nodes if the first hash value is the same as the sixth hash value;
a second hash unit 505, configured to perform a fourth hash operation on the specified number of second hash values to obtain a fourth hash value;
a second determining unit 506, configured to determine a sequence number of the target verification node according to the fourth hash value and a preset random rule;
a second verifying unit 507, configured to verify the first block to be verified and broadcast a verification result in the block link point network if the serial number of the target verification node is the serial number of the current verification node.
In some embodiments, the performing a fourth hash operation on the specified number of second hash values to obtain a fourth hash value includes:
and performing fourth hash operation on the second hash values and the third numerical values of the specified number to obtain a fourth hash value, wherein the third numerical value is 1-n or the serial number of the first block-out node, and n is an arbitrary value.
In some embodiments, the preset random rule comprises:
converting the fourth hash value into a 10-system, and taking the remainder of the number of the verification nodes;
and determining the verification node corresponding to the remainder as the target verification node.
It is understood that the verification apparatus related to the blockchain in this embodiment corresponds to the method embodiment shown in fig. 3, and therefore, the above description about the method embodiment shown in fig. 3 is also applicable to the apparatus in this embodiment, and is not repeated herein.
Fig. 6 shows a schematic structural diagram of a computer device provided in an embodiment of the present specification, where the computer device may include: a processor 610, a memory 620, an input/output interface 630, a communication interface 640, and a bus 650. Wherein processor 640, memory 620, input/output interface 630, and communication interface 640 are communicatively coupled to each other within the device via bus 650.
The processor 610 may be implemented by a general-purpose CPU (Central Processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute related programs to implement the technical solutions provided in the embodiments of the present specification.
The Memory 620 may be implemented in the form of a ROM (Read Only Memory), a RAM (Random access Memory), a static storage device, a dynamic storage device, or the like. The memory 620 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present specification is implemented by software or firmware, the relevant program codes are stored in the memory 620 and called by the processor 610 to be executed.
The input/output interface 630 is used for connecting an input/output module to realize information input and output. The i/o module may be configured as a component in a device (not shown) or may be external to the device to provide a corresponding function. The input devices may include a keyboard, a mouse, a touch screen, a microphone, various sensors, etc., and the output devices may include a display, a speaker, a vibrator, an indicator light, etc.
The communication interface 640 is used for connecting a communication module (not shown in the figure) to realize communication interaction between the device and other devices. The communication module can realize communication in a wired mode (such as USB, network cable and the like) and also can realize communication in a wireless mode (such as mobile network, WIFI, Bluetooth and the like).
Bus 650 includes a pathway to transfer information between various components of the device, such as processor 610, memory 620, input/output interface 630, and communication interface 640.
It should be noted that although the above-mentioned devices only show the processor 610, the memory 620, the input/output interface 630, the communication interface 640 and the bus 650, in a specific implementation, the devices may also include other components necessary for normal operation. In addition, those skilled in the art will appreciate that the above-described apparatus may also include only those components necessary to implement the embodiments of the present description, and not necessarily all of the components shown in the figures.
Those of skill would further appreciate that the various illustrative components and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied in hardware, a software module executed by a processor, or a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The above-mentioned embodiments are intended to illustrate the objects, technical solutions and advantages of the present invention in further detail, and it should be understood that the above-mentioned embodiments are only illustrative of the present invention and are not intended to limit the scope of the present invention, and any modifications, equivalent substitutions, improvements and the like made within the scope of the present invention should be included in the scope of the present invention.

Claims (7)

1. A method of authentication involving a blockchain, wherein a blockchain link point network comprises a plurality of egress nodes and a plurality of authentication nodes, the method being applicable to a first egress node, which is any one of the plurality of egress nodes, the method comprising:
generating a first block to be verified, and performing a first hash operation according to the first block to be verified to obtain a first hash value;
sending the first hash value to other nodes of the plurality of out-of-block nodes;
determining second hash values of the plurality of block output nodes, wherein the second hash value of each block output node is obtained by performing second hash operation on at least one third hash value and the first value of the block output node; each third hash value is obtained by carrying out third hash operation according to a second block to be verified, wherein the second block to be verified is the next block of the first block to be verified; determining a first value of each block output node according to the signature of the block output node on the first hash value;
selecting a specified number of second hash values according to the size of the second hash values of the plurality of block outlet nodes;
performing a fourth hash operation on the second hash values with the specified number to obtain a fourth hash value;
selecting a target verification node from the plurality of verification nodes according to the fourth hash value and a preset random rule;
sending the first block to be verified to the target verification node so that the target verification node verifies the first block to be verified;
the preset random rule comprises:
converting the fourth hash value into a 10-system, and taking the remainder of the number of the verification nodes;
determining a verification node corresponding to the remainder as the target verification node;
the method further comprises the following steps:
signing the first hash value to obtain a first digital signature of the first block output node;
and performing fifth hash operation on the first digital signature of the first block output node to obtain a first numerical value of the first block output node.
2. The method of claim 1, further comprising:
receiving a fifth hash value sent by a second block output node, wherein the fifth hash value is obtained by performing first hash operation on a third block to be verified by the second block output node;
signing the fifth hash value to obtain a second digital signature of the first block output node;
performing a fifth hash operation on the second digital signature of the first block output node to obtain a second numerical value of the first block output node;
performing a third hash operation according to a fourth block to be verified to obtain at least one sixth hash value, wherein the fourth block to be verified is a block next to the third block to be verified;
performing a second hash operation according to the at least one sixth hash value and the second value of the first block output node to obtain a seventh hash value of the first block output node;
and sending the seventh hash value of the first block output node to the second block output node.
3. The method of claim 1, wherein performing a fourth hash operation on the specified number of second hash values to obtain a fourth hash value comprises:
and performing fourth hash operation on the second hash values and the third numerical values of the specified number to obtain a fourth hash value, wherein the third numerical value is 1-n or the serial number of the first block-out node, and n is an arbitrary value.
4. A method of authentication involving a blockchain, wherein a blockchain link point network comprises a plurality of egress nodes and a plurality of authentication nodes, the method being applicable to a current authentication node, the current authentication node being any one of the plurality of authentication nodes, the method comprising:
determining a first to-be-verified block generated by a first block output node, a public key of the first block output node, a first digital signature of the first block output node and second hash values of the plurality of block output nodes;
verifying the first digital signature of the first block outlet node by using the public key of the first block outlet node to obtain a first hash value of the first block outlet node;
performing first hash operation on the first block to be verified to obtain a sixth hash value;
if the first hash value is the same as the sixth hash value, selecting a specified number of second hash values according to the sizes of the second hash values of the plurality of out-of-block nodes;
performing a fourth hash operation on the second hash values with the specified number to obtain a fourth hash value;
determining a serial number of a target verification node according to the fourth hash value and a preset random rule;
if the serial number of the target verification node is the serial number of the current verification node, verifying the first to-be-verified block, and broadcasting a verification result in the block link point network;
the preset random rule comprises:
converting the fourth hash value into a 10-system, and taking the remainder of the number of the verification nodes;
determining a verification node corresponding to the remainder as the target verification node;
the method further comprises the following steps:
signing the first hash value to obtain a first digital signature of the first block output node;
and performing fifth hash operation on the first digital signature of the first block output node to obtain a first numerical value of the first block output node.
5. The method of claim 4, wherein performing a fourth hash operation on the specified number of second hash values to obtain a fourth hash value comprises:
and performing fourth hash operation on the second hash values and the third numerical values of the specified number to obtain a fourth hash value, wherein the third numerical value is 1-n or the serial number of the first block-out node, and n is an arbitrary value.
6. An apparatus for performing authentication involving a blockchain, wherein a blockchain link point network comprises a plurality of egress nodes and a plurality of authentication nodes, the apparatus being adapted to a first egress node, the first egress node being any one of the plurality of egress nodes, the apparatus comprising:
the hash unit is used for generating a first block to be verified and carrying out a first hash operation according to the first block to be verified to obtain a first hash value;
a sending unit, configured to send the first hash value to other nodes in the plurality of out-of-block nodes;
the determining unit is used for determining second hash values of the plurality of block output nodes, and the second hash value of each block output node is obtained by performing second hash operation on at least one third hash value and the first value of the block output node; each third hash value is obtained by carrying out third hash operation according to a second block to be verified, wherein the second block to be verified is the next block of the first block to be verified; determining a first value of each block output node according to the signature of the block output node on the first hash value;
the selecting unit is used for selecting a specified number of second hash values according to the sizes of the second hash values of the plurality of block outlet nodes;
the hash unit is further used for performing fourth hash operation on the second hash values with the specified number to obtain fourth hash values;
the selecting unit is further configured to select a target verification node from the plurality of verification nodes according to the fourth hash value and a preset random rule;
the sending unit is further configured to send the first block to be verified to the target verification node, so that the target verification node verifies the first block to be verified;
the preset random rule comprises:
converting the fourth hash value into a 10-system, and taking the remainder of the number of the verification nodes;
determining a verification node corresponding to the remainder as the target verification node;
signing the first hash value to obtain a first digital signature of the first block output node;
and performing fifth hash operation on the first digital signature of the first block output node to obtain a first numerical value of the first block output node.
7. An apparatus for authentication involving a blockchain, wherein a blockchain link point network comprises a plurality of egress nodes and a plurality of authentication nodes, the apparatus being adapted to a current authentication node, the current authentication node being any one of the plurality of authentication nodes, the apparatus comprising:
the first determining unit is used for determining a first to-be-verified block generated by a first block output node, a public key of the first block output node, a first digital signature of the first block output node and second hash values of the plurality of block output nodes;
the first verification unit is used for verifying the first digital signature of the first block output node by using the public key of the first block output node to obtain a first hash value of the first block output node;
the first hash unit is used for carrying out first hash operation on the first block to be verified to obtain a sixth hash value;
a selecting unit, configured to select a specified number of second hash values according to sizes of the second hash values of the multiple block output nodes if the first hash value is the same as the sixth hash value;
the second hash unit is used for carrying out fourth hash operation on the second hash values with the specified number to obtain fourth hash values;
the second determining unit is used for determining the serial number of the target verification node according to the fourth hash value and a preset random rule;
the second verification unit is used for verifying the first to-be-verified block and broadcasting a verification result in the block link point network if the serial number of the target verification node is the serial number of the current verification node;
the preset random rule comprises:
converting the fourth hash value into a 10-system, and taking the remainder of the number of the verification nodes;
determining a verification node corresponding to the remainder as the target verification node;
signing the first hash value to obtain a first digital signature of the first block output node;
and performing fifth hash operation on the first digital signature of the first block output node to obtain a first numerical value of the first block output node.
CN201910519287.1A 2019-06-17 2019-06-17 Verification method and device related to block chain Active CN110222538B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910519287.1A CN110222538B (en) 2019-06-17 2019-06-17 Verification method and device related to block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910519287.1A CN110222538B (en) 2019-06-17 2019-06-17 Verification method and device related to block chain

Publications (2)

Publication Number Publication Date
CN110222538A CN110222538A (en) 2019-09-10
CN110222538B true CN110222538B (en) 2020-09-08

Family

ID=67817175

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910519287.1A Active CN110222538B (en) 2019-06-17 2019-06-17 Verification method and device related to block chain

Country Status (1)

Country Link
CN (1) CN110222538B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111080296B (en) * 2019-12-05 2023-12-01 深圳前海微众银行股份有限公司 Verification method and device based on blockchain system
CN113938702A (en) * 2020-07-13 2022-01-14 富泰华工业(深圳)有限公司 Multimedia data stream tamper-proof device, method and medium based on block chain system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107005574A (en) * 2016-12-23 2017-08-01 深圳前海达闼云端智能科技有限公司 Block generation method and device and block chain network
CN108876361A (en) * 2017-05-12 2018-11-23 李平 Block catenary system, block generation method and computer readable storage medium
CN108964879A (en) * 2018-07-20 2018-12-07 杭州复杂美科技有限公司 A kind of drawing method, common recognition method, equipment and storage medium
CN109559122A (en) * 2018-12-07 2019-04-02 北京瑞卓喜投科技发展有限公司 Block chain data transmission method and block chain data transmission system
CN109743173A (en) * 2018-12-20 2019-05-10 弗洛格(武汉)信息科技有限公司 Go out block node in block chain and determines method, block verification method and block catenary system

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10389518B2 (en) * 2017-01-27 2019-08-20 Entit Software Llc Blockchain hash value recomputation
KR102417067B1 (en) * 2017-12-08 2022-07-05 한국전자통신연구원 Method and apparatus for generating blocks in node on a block-chain network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107005574A (en) * 2016-12-23 2017-08-01 深圳前海达闼云端智能科技有限公司 Block generation method and device and block chain network
CN108876361A (en) * 2017-05-12 2018-11-23 李平 Block catenary system, block generation method and computer readable storage medium
CN108964879A (en) * 2018-07-20 2018-12-07 杭州复杂美科技有限公司 A kind of drawing method, common recognition method, equipment and storage medium
CN109559122A (en) * 2018-12-07 2019-04-02 北京瑞卓喜投科技发展有限公司 Block chain data transmission method and block chain data transmission system
CN109743173A (en) * 2018-12-20 2019-05-10 弗洛格(武汉)信息科技有限公司 Go out block node in block chain and determines method, block verification method and block catenary system

Also Published As

Publication number Publication date
CN110222538A (en) 2019-09-10

Similar Documents

Publication Publication Date Title
CN110222537B (en) Verification method and device applied to block chain nodes
CN110247753B (en) Block output method and device based on block chain node point network
CN110223070B (en) Verification method and device based on block chain node point network
CN108848148B (en) Transaction information confirmation method and device based on block chain
CN110225044B (en) Verification method and device on block chain
CN110210865A (en) Packaging method and device based on block chain
CN110222538B (en) Verification method and device related to block chain
CN110233722B (en) Block output method and device on block chain
CN110990790B (en) Data processing method and equipment
CN110298757B (en) Consensus method and device relating to DPoS
CN110224839B (en) Verification method and device applied to block chain
CN110224813B (en) Block discharging method and device based on block chain
CN110247773B (en) Packing method and device on block chain
CN110225043B (en) Packing method and device applied to block chain
CN110245949B (en) Packing method and device related to block chain
CN110245950B (en) Block discharging method and device related to block chain
CN110224840B (en) Block chain based packaging method and device
CN111831669A (en) Method and device for storing internet voting data according to block chain
CN111078715A (en) Synchronous storage method and device for internet advertisement data on block chain
CN110223069A (en) Packaging method and device based on block chain meshed network
CN113268322A (en) Method, system, device and storage medium for calculating resource capacity
CN111831670A (en) Storage method and device related to internet comment data on block chain
CN111046048A (en) Method and device for storing Internet business license data on block chain
CN111835815A (en) Synchronous storage method and device for internet self-media data on block chain
CN111078795A (en) Method and device for storing social data of internet on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 100085 No. 108, 1st Floor, No. 9, Shangdi Jiujie, Haidian District, Beijing

Applicant after: Beijing ruice Technology Co., Ltd

Address before: 100085 No. 108, 1st Floor, No. 9, Shangdi Jiujie, Haidian District, Beijing

Applicant before: BEIJING AIMO RUICE TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant