CN110224839A - Applied to the verification method and device on block chain - Google Patents

Applied to the verification method and device on block chain Download PDF

Info

Publication number
CN110224839A
CN110224839A CN201910519263.6A CN201910519263A CN110224839A CN 110224839 A CN110224839 A CN 110224839A CN 201910519263 A CN201910519263 A CN 201910519263A CN 110224839 A CN110224839 A CN 110224839A
Authority
CN
China
Prior art keywords
node
block
digital signature
cryptographic hash
block node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910519263.6A
Other languages
Chinese (zh)
Other versions
CN110224839B (en
Inventor
吉建勋
杨慧
沈书航
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ai Morui Strategic Technology Co Ltd
Original Assignee
Beijing Ai Morui Strategic Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ai Morui Strategic Technology Co Ltd filed Critical Beijing Ai Morui Strategic Technology Co Ltd
Priority to CN201910519263.6A priority Critical patent/CN110224839B/en
Publication of CN110224839A publication Critical patent/CN110224839A/en
Application granted granted Critical
Publication of CN110224839B publication Critical patent/CN110224839B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The present embodiments relate to a kind of verification methods and device applied on block chain.Comprise determining that a first digital signature of block node out of specified quantity and described first goes out the first digital signature of block node;First digital signature of block node is gone out to the specified quantity and the first digital signature that described first goes out block node carries out the second Hash operation, obtains the second cryptographic Hash;According to second cryptographic Hash and preset first random rule, selection target verifies node in the multiple verifying node;First block to be verified is sent to the target verification node, to verify the described first block to be verified.With this, it can choose out the part of nodes other than block node to verify block, the selection of the part of nodes has certain randomness and verifiability, can reduce block chain by the possibility of success attack, and the verification efficiency of block chain meshed network is improved, and then improves book keeping operation efficiency.

Description

Applied to the verification method and device on block chain
Technical field
The present invention relates to field of computer technology more particularly to a kind of verification methods and device applied on block chain.
Background technique
Each of block chain network node is equivalent to store each computer of all block datas or service Device terminal.The production of all new blocks, and the verifying and record keeping of transaction, and it is synchronous to be broadcasted to the whole network, all by node Lai It completes.
Node is exactly the miner that we are commonly called as.The different of each miner calculate power, determine it can be assigned to how many record keeping Power harvests how many rewards.
The block chain first generation knows together mechanism POW, is exactly proof of work common recognition mechanism, is commonly called as digging mine.It is new to produce Block, must just carry out the operation of thousands of secondary Hash collisions.And these operations, many electric power can be consumed, the energy is caused Waste, therefore also by dirty disease.Everybody is more allowed to worry, once most of power of calculating is monopolized, decentralization is just on the hazard.
The second generation knows together mechanism POS, is exactly that equity proves common recognition mechanism, it is to be determined according to quantity with cash in hand with the time Who possesses more billing rights.The advantages of this common recognition mechanism is can be to avoid energy consumption, but the disadvantage is that right of speech is all held Coin rich and influential family is controlled, and centralized feature is formed, and also the original intention with block chain decentralization runs in the opposite direction.
Third generation common recognition mechanism is exactly DPOS, maximum feature, is exactly to be added on the basis that POS equity proves Electoral system.The super node for the final acquisition billing right being born by all votes by ballot of user with cash in hand is kept accounts, can To significantly reduce the waste of the energy, still, on the super node all concentrated due to operation, to the calculation force request of super node It is higher, and the efficiency of super node directly affects the efficiency of book keeping operation, this is resulted in, this kind of mode copes with the ability of large-scale data Not strong, development is restricted.
Summary of the invention
Based on the above issues, the embodiment of the invention provides a kind of verification methods and device applied on block chain.
In a first aspect, the embodiment of the invention provides a kind of verification methods applied on block chain.The block chain link Spot net includes multiple block node and multiple verifying node out, and the method is suitable for first and goes out block node, and described first goes out block Node is any one in the multiple block node out, which comprises
Determine that a first digital signature of block node out of specified quantity and described first goes out the first digital signature of block node, First digital signature of each block node out be signed to obtain by that should go out block node to the first cryptographic Hash, first Hash Value carries out the first Hash operation according to the first block to be verified and obtains;
First digital signature of block node is gone out to the specified quantity and the first number label that described first goes out block node Name carries out the second Hash operation, obtains the second cryptographic Hash;
According to second cryptographic Hash and preset first random rule, the selection target in the multiple verifying node Verify node;
First block to be verified is sent to the target verification node, to verify the described first block to be verified.
In some embodiments, first digital signature and described first for going out block node to the specified quantity goes out First digital signature of block node carries out the second Hash operation, obtains the second cryptographic Hash, comprising:
A first digital signature of block node out of the specified quantity, described first are gone out to the first digital signature of block node The second Hash operation is carried out with the first numerical value and obtains the second cryptographic Hash, and first numerical value is that 1-n or described first goes out block section The sequence number of point, the n are arbitrary value.
In some embodiments, preset first random rule includes:
Second cryptographic Hash is converted into 10 systems, and takes the remainder of second value, the second value is according to The quantity of multiple verifying nodes determines;
Determine that the corresponding verifying node of the remainder is the target verification node.
In some embodiments, further includes:
The first block to be verified is generated, the first Hash operation is carried out to the described first block to be verified and obtains the first Hash Value;
Go out block node to the specified quantity and sends first cryptographic Hash;
The specified quantity is received respectively goes out the first digital signature that block node is sent;
First cryptographic Hash is signed to obtain the first the first digital signature for going out block node.
In some embodiments, further includes:
According to preset second random rule, go out block node in the multiple selection specified quantity of block node out.
In some embodiments, further includes:
It receives second and goes out the third cryptographic Hash that block node is sent, the third cryptographic Hash is to carry out to the second block to be verified First Hash operation obtains;
According to second random rule, verify whether itself is the section for needing to sign to the third cryptographic Hash Point;
If it is, being signed to obtain the described first the second digital signature for going out block node to the third cryptographic Hash;
Go out block node to described second and sends the described first the second digital signature for going out block node.
Second aspect provides a kind of verification method applied on block chain.The block chain meshed network includes more A block node and multiple verifying nodes out, the method are suitable for current authentication node, and the current authentication node is described more Any one in a verifying node, which comprises
It receives first and goes out the first block to be verified, first that block node sends and go out the public key of block node, first go out block node The first digital signature and specified quantity go out the first digital signature of block node;
The first digital signature that the public key for going out block node using first goes out block node to described first is verified, and institute is obtained State the first the first cryptographic Hash for going out block node;
First Hash operation is carried out to the described first block to be verified and obtains the 4th cryptographic Hash;
If described first go out block node the first cryptographic Hash it is identical with the 4th cryptographic Hash, to described first go out block section The first digital signature that the first digital signature and specified quantity of point go out block node carries out the second Hash operation, obtains the second Kazakhstan Uncommon value;
According to second cryptographic Hash and preset first random rule, the serial number of target verification node is determined;
If the serial number of current authentication node described in the serial number of the target verification node, to the described first area to be verified Block is verified, and verification result is broadcasted in the block chain meshed network.
In some embodiments, further includes:
According to preset second random rule, verifying specified quantity, whether block node is correct out;If correct, basis Second cryptographic Hash and preset first random rule, determine the serial number of target verification node.
The third aspect, provides a kind of verifying device applied on block chain, and the block chain meshed network includes more It is a go out block node and multiple verifying nodes, described device be suitable for first go out block node, described first go out block node be it is described more It is a go out block node in any one, described device includes:
Determination unit goes out block node for determining that specified quantity goes out the first digital signature of block node and described first First digital signature, the first digital signature of each block node out sign to the first cryptographic Hash by that should go out block node It arrives, first cryptographic Hash carries out the first Hash operation according to the first block to be verified and obtains;
Hash units, the first digital signature and described first for going out block node to the specified quantity go out block node The first digital signature carry out the second Hash operation, obtain the second cryptographic Hash;
Selecting unit is used for according to second cryptographic Hash and preset first random rule, in the multiple verifying Selection target verifies node in node;
Transmission unit, for sending first block to be verified to the target verification node, to verify described the One block to be verified.
In some embodiments, the hash units are specifically used for:
A first digital signature of block node out of the specified quantity, described first are gone out to the first digital signature of block node The second Hash operation is carried out with the first numerical value and obtains the second cryptographic Hash, and first numerical value is that 1-n or described first goes out block section The sequence number of point, the n are arbitrary value.
In some embodiments, further includes:
Generation unit carries out the first Hash operation to the described first block to be verified and obtains for generating the first block to be verified To the first cryptographic Hash;
Transmission unit sends first cryptographic Hash for going out block node to the specified quantity;
Receiving unit goes out the first digital signature that block node is sent for receiving the specified quantity respectively;
First cryptographic Hash is signed to obtain the first the first digital signature for going out block node.
In some embodiments, further includes:
Selecting unit, for selecting specified quantity in the multiple block node out according to preset second random rule Block node out.
In some embodiments, further includes:
Receiving unit goes out the third cryptographic Hash that block node is sent for receiving second, and the third cryptographic Hash is to second Block to be verified carries out the first Hash operation and obtains;
Authentication unit, for according to second random rule, verifying whether itself is to need to the third cryptographic Hash The node signed;
Signature unit, if it is, being used to be signed to obtain to the third cryptographic Hash described first goes out block node Second digital signature;
Transmission unit sends the described first the second digital signature for going out block node for going out block node to described second.
Fourth aspect provides a kind of verifying device applied on block chain, which is characterized in that the block chain node Network includes multiple block node and multiple verifying node out, and described device is suitable for current authentication node, the current authentication section Point is any one in the multiple verifying node, and described device includes:
Receiving unit, for receive first go out the first block to be verified, first that block node sends go out block node public key, First goes out the first digital signature of the first digital signature of block node and a block node out of specified quantity;
First authentication unit is verified first digital signature, is obtained for using the first code key for going out block node The first cryptographic Hash for going out block node to described first;
First hash units obtain the 4th cryptographic Hash for carrying out the first Hash operation to the described first block to be verified;
Second hash units, if described first go out block node the first cryptographic Hash it is identical with the 4th cryptographic Hash, it is right Described first goes out the first digital signature the second Hash of progress of the first digital signature of block node and a block node out of specified quantity Operation obtains the second cryptographic Hash;
Determination unit, for determining target verification section according to second cryptographic Hash and preset first random rule The serial number of point;
Second authentication unit, if the serial number of current authentication node described in the serial number of the target verification node, is used for Described first block to be verified is verified, and verification result is broadcasted in the block chain meshed network.
In some embodiments, preset first random rule includes:
Second cryptographic Hash is converted into 10 systems, and takes the remainder of second value, the second value is according to The quantity of multiple verifying nodes determines;
Determine that the corresponding verifying node of the remainder is the target verification node.
5th aspect, this specification embodiment provide a kind of computer equipment, including memory, processor and are stored in On memory and the computer program that can run on a processor, which is characterized in that the processor executes real when described program Either side or various method and steps in existing aforementioned first aspect or second aspect.
6th aspect, provides a kind of computer readable storage medium, meter is stored on the computer readable storage medium Calculation machine program, the computer program realize either side or more in above-mentioned first aspect or second aspect when being executed by processor Method described in aspect.
7th aspect, provides a kind of computer program product comprising instruction, when described instruction is run on computers When, so that computer executes in above-mentioned first aspect or second aspect method described in either side or various aspects.
Through the embodiment of the present invention, it can choose out the part of nodes other than block node to verify block, the part The selection of node has certain randomness and verifiability, can reduce block chain by the possibility of success attack, and improve The verification efficiency of block chain meshed network, and then book keeping operation efficiency is improved, allow block chain meshed network should data Larger service scenarios.
Detailed description of the invention
Fig. 1 applies the exemplary architecture of embodiment provided by the present application;
Fig. 2 is a kind of flow chart applied to the verification method on block chain provided in an embodiment of the present invention;
Fig. 3 is the flow chart of another verification method being applied on block chain provided in an embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of the device of the release information based on block chain provided in an embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of the device of the release information based on block chain provided in an embodiment of the present invention;
Fig. 6 shows a kind of computer equipment structural schematic diagram provided by this specification embodiment.
Specific embodiment
In order to make the object, technical scheme and advantages of the embodiment of the invention clearer, below in conjunction with the embodiment of the present invention In attached drawing, technical scheme in the embodiment of the invention is clearly and completely described, it is clear that described embodiment is A part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art Every other embodiment obtained without making creative work, shall fall within the protection scope of the present invention.
The embodiment of the invention provides a kind of verification methods and device applied on block chain.Fig. 1 is shown using this The exemplary architecture of the embodiment provided is provided.
As shown in Figure 1, the exemplary architecture may include multiple block chain nodes, multiple block chain node may include Multiple block node 101 and multiple verifying nodes 102 out.In one example, should go out block node can be to be selected by election mechanism The quantity of the multiple super nodes selected, the super node can determine according to actual needs, and the quantity of the super node can be Odd number, such as 21.In another example, multiple verifying node can be alternate node, wherein the super node can Think and chosen from alternate node, the quantity of the alternate node can also determine according to actual needs, for example, can be 100, Wherein, alternate node can be selected according to preset first random rule, for example, calculating the highest specified quantity node of power It can be used as alternate node.In another example, verifying node can also be all or part of section in addition to block node out Point.Wherein, block chain node can be realized in a software form, can also realize in the form of hardware.When implemented in hardware, may be used To be laptop, desktop computer and mobile terminal etc..
Block node is mainly used for based on common recognition mechanism out, the data in system in designated time period is produced block, also It is primarily used for keeping accounts.Verifying node is mainly used for based on common recognition mechanism, and the block generated to block node out is verified, and passes through The block of verifying can be recorded in block chain.It is can communicate between node to synchronize the data such as block chain.For example, section It can be communicated based on D2D agreement between point.
In order to facilitate understanding of embodiments of the present invention, it is further explained below in conjunction with attached drawing with specific embodiment Bright, embodiment does not constitute the restriction to the embodiment of the present invention.
Fig. 2 is a kind of flow chart applied to the verification method on block chain provided by the invention.The block chain node net Network includes multiple block node and multiple verifying node, such as the block chain meshed network in exemplary architecture shown in FIG. 1 out, should Method be suitable for first go out block node, this first go out block node be it is multiple go out block nodes in any one.As shown in Fig. 2, should Method specifically includes:
S210 determines that a first digital signature of block node out of specified quantity and described first goes out the first number of block node Signature, it is each go out block node the first digital signature by that block node should be signed to obtain to the first cryptographic Hash out, described the One cryptographic Hash carries out the first Hash operation according to the first block to be verified and obtains.
Wherein, each node in block chain meshed network is run based on common recognition mechanism.The common recognition mechanism is predefined, The common recognition mechanism, which can wrap, includes block common recognition mechanism, verifying common recognition mechanism etc..
Block node out in block chain meshed network can determine that first goes out block node according to the common recognition mechanism of block out, this first The data in system in designated time period can be generated block by block node out.The designated time period can according to actual needs really It is fixed, such as can be 1 second, 10 seconds or 10 minutes etc..The system can be the corresponding entire block of block chain meshed network Catenary system.Wherein, block chain has multiple blocks to constitute, and the mark that each block can carry a block has been formed The storage organization of chain type.
First go out block node generate new block need after verifying could cochain, which can be with Referred to as first block to be verified.
In order to increase the verification efficiency of node, reduce the burden of system, it can choose certain amount verifying node and carry out Verifying.When node is verified in selection, the first Hash operation can be carried out to the first block to be verified, obtain the first cryptographic Hash.Its In, verifying common recognition mechanism may include predefined first Hash operation, which can according to actual needs really It is fixed, for example, the first Hash operation can be SHA-256 etc..
Determine the first the first digital signature for going out block node and a block node out of specified quantity.
Wherein, the first the first digital signature for going out block node can determine as follows:
A: generating the first block to be verified, carries out the first Hash operation to first block to be verified and obtains the first Hash Value.
B: the first cryptographic Hash is signed to obtain the first the first digital signature for going out block node.
The first digital signature that specified quantity goes out block node can determine as follows:
A: go out block node to specified quantity and send the first cryptographic Hash;
B: specified quantity is received respectively and goes out the first digital signature that block node is sent.
Wherein, each block chain node may include at least one secret key pair, and each secret key pair includes a public key and one A private key, the private key are stored in local, which can be sent to other block chain nodes.
Block node can sign to the cryptographic Hash after determining the first cryptographic Hash out, obtain this go out block node One digital signature.First digital signature can be used the private key for block node and sign, and use the corresponding public affairs of the private key Key can verify first digital signature.
S220, to specified quantity go out the first digital signature of block node and first go out the first digital signature of block node into The second Hash operation of row, obtains the second cryptographic Hash.
When node is verified in selection, the first digital signature of block node and first can be gone out to specified quantity and goes out block node The first digital signature carry out the second Hash operation, obtain the second cryptographic Hash.Wherein, verifying common recognition mechanism may include predefining The second Hash operation, which can determine according to actual needs, for example, the second Hash operation can be SHA- 256 etc..Wherein, the first Hash operation can be able to be that different Hash is transported for identical Hash operation from the second Hash operation It calculates.
S230 is selected in the multiple verifying node according to second cryptographic Hash and preset first random rule Select target verification node.The target verification node may include one or more.
When node is verified in selection, can be selected according to the second cryptographic Hash.Wherein, verifying common recognition mechanism may include Preset first random rule of selection gist, preset first random rule have certain randomness and verifiability.
In one example, which may include:
Second cryptographic Hash is converted into 10 systems, and takes the remainder of second value;
Determine that the corresponding verifying node of the remainder is target verification node.
Wherein, which can determine according to the quantity of verifying node.For example, the quantity of verifying node can be 100, which can be 100.
Wherein, the second cryptographic Hash ensure that randomness, the determination of the second cryptographic Hash and preset first random rule, protect The verifiability of the target verification node is demonstrate,proved.
S240, Xiang Suoshu target verification node send first block to be verified, so that the target verification node is tested Demonstrate,prove the described first block to be verified.
First, which goes out block node, can be sent to target verification node for the first block to be verified and verify.It is tested to target When demonstrate,proving node the first block to be verified of transmission, first can be sent to target verification node, and block node and specified quantity go out block out First digital signature of node and first go out block node public key.Wherein, it may include a variety of for sending the form of the public key.One In a example, this can be generated according to the public key and first goes out block address of node, which can be used as first and go out block node Transaction produce or be transferred to address, the target verification node can according to this first go out block address of node determine this first go out block The public key of node.In another example, which can carry is sent in the first block to be verified.
Target verification node can verify the first identity for going out block node after receiving the first block to be verified first, This first go out block node identity can by first go out block node public key to first go out block node the first digital signature into Row verifying is realized.After being verified, target verification node can the verifying identity to itself verify, the authentication mistake Journey can be verified based on the identical rule of block node selection target verifying node is gone out, to verify whether target verification node wraps Include its own.After above-mentioned two verification process all passes through, target verification node again verifies the first block to be verified, and It is synchronous that verification result is subjected to the whole network.Wherein, the verifying of block to be verified for first, mainly verifying the book keeping operation of block node is It is no correct, specific verification mode may include it is a variety of, details are not described herein again.
Through the embodiment of the present invention, it can choose out the part of nodes other than block node to verify block, the part The selection of node has certain randomness and verifiability, can reduce block chain by the possibility of success attack, and improve The verification efficiency of block chain meshed network, and then book keeping operation efficiency is improved, allow block chain meshed network should data Larger service scenarios.
In some embodiments, above-mentioned steps S220 can be specifically achieved by the steps of:
First digital signature and the first numerical value are subjected to the second Hash operation and obtain the second cryptographic Hash.
Wherein, the first numerical value is the predefined fixed values such as 1-n, which is arbitrary value.
First numerical value can also for first go out block node sequence number, or according to first go out block node sequence number it is true Fixed numerical value.By first numerical value, the randomness of block node selection can be further realized out.
In some embodiments, can also include the following steps: according to preset second random rule, in multiple block sections out Point selection specified quantity goes out block node.
Verifying common recognition mechanism may include preset second random rule of selection gist, preset second random rule With certain randomness and verifiability.
In one example, which may include:
First cryptographic Hash is converted into 10 systems, and takes the remainder of third value;
Determine that sequence number is less than the block node out for going out block node for specified quantity of the remainder.
Wherein, which can determine according to the quantity of block node out.For example, the quantity of block node can be out 21, which can be 21.
Through the embodiment of the present invention, it is also that can be randomly selected that specified quantity, which goes out block node, is further ensured that with this Randomness and verifiability.
Based on the above embodiment, in some embodiments, this method can also include the following steps:
1) it receives second and goes out the third cryptographic Hash that block node is sent, which is to carry out to the second block to be verified First Hash operation obtains;Second block to be verified can go out the newly-generated block of block node for second.
2) according to second random rule, verify whether itself is the section for needing to sign to the third cryptographic Hash Point;
3) if it is, being signed to obtain the described first the second number label for going out block node to the third cryptographic Hash Name;
4) block node sends the described first the second digital signature for going out block node to Xiang Suoshu second out.
5) if it is not, then abandoning the third cryptographic Hash.
Fig. 3 is the flow chart of another verification method being applied on block chain provided by the invention.The block chain node Network includes multiple block node and multiple verifying node, such as the block chain meshed network in exemplary architecture shown in FIG. 1 out, This method is suitable for current authentication node, which is any one in the multiple verifying node, such as Fig. 3 institute Show, this method specifically includes::
S310 receives first and goes out the first block to be verified, first that block node sends to go out the public key of block node, first go out block The first digital signature and specified quantity of node go out the first digital signature of block node.
Wherein, each node in block chain meshed network is run based on common recognition mechanism.The common recognition mechanism is predefined, The common recognition mechanism, which can wrap, includes block common recognition mechanism, verifying common recognition mechanism etc..The verifying node is mainly used for executing verifying altogether Knowledge mechanism.
Wherein, the first block to be verified can go out the newly-generated block of block node for first.First digital signature can be with It is determined according to first block to be verified.Specifically, which can carry out the first Hash to first block to be verified Operation obtains the first cryptographic Hash, and is signed to obtain the first digital signature to first cryptographic Hash using private key.It specifically can be with Referring to aforementioned embodiment shown in Fig. 2, details are not described herein again.
Current authentication node can also determine first go out block node public key, the public key can according to this first go out block node Address determine, also it is available carry band verify block in public key.
Wherein, each node may include the secret key pair of at least one asymmetric encryption, and each secret key pair includes a public affairs Key and a private key.
Target verification node can verify the first identity for going out block node after receiving the first block to be verified first, The identity for going out block node can be realized by following step S320-S330.
S320, the first digital signature that the public key for going out block node using first goes out block node to described first are verified, Obtain first cryptographic Hash.
S330 carries out the first Hash operation to the described first block to be verified and obtains the 4th cryptographic Hash;
Wherein, the first Hash operation is the operation for block node and generating the first cryptographic Hash.First Hash operation can be pre- It is defined in verifying common recognition mechanism.
Current authentication node can compare the first cryptographic Hash and whether the 4th cryptographic Hash is identical, if identical, this explanation should First digital signature is that this goes out the digital signature of block node, namely is verified.If it is different, then verifying does not pass through.
After above-mentioned be verified, current authentication node can the verifying identity to itself verify, the authentication Process can be realized by step S340 and S350.
S340 goes out the first of block node to described first if first cryptographic Hash is identical with the 4th cryptographic Hash The first digital signature that digital signature and specified quantity go out block node carries out the second Hash operation, obtains the second cryptographic Hash;
Wherein, the second Hash operation is the operation for block node and generating the second cryptographic Hash.Second Hash operation can be pre- It is defined in verifying common recognition mechanism.First Hash operation and the second Hash operation can be identical operation, be also possible to not Same operation.First Hash operation and the second Hash operation can be in conjunction with the discussions in aforementioned embodiment shown in Fig. 2, herein It repeats no more.
S350 determines the serial number of target verification node according to second cryptographic Hash and preset first random rule.
Wherein, preset first random rule is the rule for block node selection target verifying node.This preset first Random rule can be predefined in verifying common recognition mechanism.Preset first random rule can combine aforementioned shown in Fig. 2 Discussion in embodiment, details are not described herein again.
After the serial number for determining target verification node, can determine whether the serial number of the target verification node includes itself. If including needing to execute step S360, if not including, terminating to verify process.
S360, if the serial number of current authentication node described in the serial number of the target verification node, to described first to Verifying block is verified, and verification result is broadcasted in the block chain meshed network.
After above-mentioned two verification process all passes through, current authentication node needs to verify the first block to be verified, And verification result is subjected to the whole network and is synchronized.Wherein, the verifying of block to be verified for first mainly verifies the book keeping operation of block node Correctly whether, specific verification mode may include a variety of, and details are not described herein again.
In some embodiments, the above method further include:
1) according to preset second random rule, verifying specified quantity, whether block node is correct out;
Second random rule is referred to the description of aforementioned embodiment shown in Fig. 2.Go out block in verifying specified quantity When whether node is correct, the public key of the available multiple block nodes out determined according to the second random rule, and use each public affairs The first digital signature that key goes out block node to specified quantity is verified.
If 2) correct, according to second cryptographic Hash and preset first random rule, target verification section is determined The serial number of point.
If 3) incorrect, terminate process.
Through the embodiment of the present invention, it can choose out the part of nodes other than block node to verify block, the part The selection of node has certain randomness and verifiability, can reduce block chain by the possibility of success attack, and improve The verification efficiency of block chain meshed network, and then book keeping operation efficiency is improved, allow block chain meshed network should data Larger service scenarios.
Fig. 4 is a kind of verifying apparatus structure schematic diagram applied on block chain provided in an embodiment of the present invention.The block Chain meshed network includes multiple block node and multiple verifying node, such as the block chain link in exemplary architecture shown in FIG. 1 out Spot net, described device are suitable for current block node out, and the current block node out is any in the multiple block node out One, described device includes:
Determination unit 401 goes out block section for determining that specified quantity goes out the first digital signature of block node and described first First digital signature of point, the first digital signature of each block node out sign to the first cryptographic Hash by that should go out block node It obtains, first cryptographic Hash carries out the first Hash operation according to the first block to be verified and obtains;
Hash units 402, the first digital signature and described first for going out block node to the specified quantity go out block First digital signature of node carries out the second Hash operation, obtains the second cryptographic Hash;
Selecting unit 403, for being tested the multiple according to second cryptographic Hash and preset first random rule It demonstrate,proves selection target in node and verifies node;
Transmission unit 404, it is described to verify for sending first block to be verified to the target verification node First block to be verified.
In some embodiments, the hash units are specifically used for:
A first digital signature of block node out of the specified quantity, described first are gone out to the first digital signature of block node The second Hash operation is carried out with the first numerical value and obtains the second cryptographic Hash, and first numerical value is that 1-n or described first goes out block section The sequence number of point, the n are arbitrary value.
In some embodiments, further includes:
Generation unit carries out the first Hash operation to the described first block to be verified and obtains for generating the first block to be verified To the first cryptographic Hash;
Transmission unit sends first cryptographic Hash for going out block node to the specified quantity;
Receiving unit goes out the first digital signature that block node is sent for receiving the specified quantity respectively;
First cryptographic Hash is signed to obtain the first the first digital signature for going out block node.
In some embodiments, further includes:
Selecting unit, for selecting specified quantity in the multiple block node out according to preset second random rule Block node out.
In some embodiments, further includes:
Receiving unit goes out the third cryptographic Hash that block node is sent for receiving second, and the third cryptographic Hash is to second Block to be verified carries out the first Hash operation and obtains;
Authentication unit, for according to second random rule, verifying whether itself is to need to the third cryptographic Hash The node signed;
Signature unit, if it is, being used to be signed to obtain to the third cryptographic Hash described first goes out block node Second digital signature;
Transmission unit sends the described first the second digital signature for going out block node for going out block node to described second.
It is appreciated that the verifying device and side shown in Fig. 2 being applied on block chain based on block chain of the present embodiment Method embodiment is corresponding, therefore, the dress of the present embodiment is equally applicable to above with respect to the description of embodiment of the method shown in Fig. 2 It sets, details are not described herein.
Fig. 5 is a kind of verifying apparatus structure schematic diagram applied on block chain provided in an embodiment of the present invention.The block Chain meshed network includes multiple block node and multiple verifying node, such as the block chain link in exemplary architecture shown in FIG. 1 out Spot net, the device are suitable for current authentication node, and the current authentication node is any one in the multiple verifying node A, described device includes:
Receiving unit 501 goes out the public affairs that the first block to be verified, first that block node sends go out block node for receiving first Key, first go out the first digital signature of block node and the first digital signature of a block node out of specified quantity;
First authentication unit 502 tests first digital signature for using the first code key for going out block node Card obtains the described first the first cryptographic Hash for going out block node;
First hash units 503 obtain the 4th Hash for carrying out the first Hash operation to the described first block to be verified Value;
Second hash units 504, if described first go out block node the first cryptographic Hash it is identical with the 4th cryptographic Hash, The first digital signature that the first digital signature and specified quantity for going out block node to described first go out block node carries out second and breathes out Uncommon operation, obtains the second cryptographic Hash;
Determination unit 505, for determining target verification according to second cryptographic Hash and preset first random rule The serial number of node;
Second authentication unit 506 is used if the serial number of current authentication node described in the serial number of the target verification node It is verified in the described first block to be verified, and verification result is broadcasted in the block chain meshed network.
In some embodiments, preset first random rule includes:
Second cryptographic Hash is converted into 10 systems, and takes the remainder of second value, the second value is according to The quantity of multiple verifying nodes determines;
Determine that the corresponding verifying node of the remainder is the target verification node.
It is appreciated that the verifying device being applied on block chain of the present embodiment is opposite with embodiment of the method shown in Fig. 3 It answers, therefore, the device of the present embodiment is equally applicable to above with respect to the description of embodiment of the method shown in Fig. 3, it is no longer superfluous herein It states.
Fig. 6 shows a kind of computer equipment structural schematic diagram, the computer equipment provided by this specification embodiment It may include: processor 610, memory 620, input/output interface 630, communication interface 640 and bus 650.Wherein processor 640, memory 620, input/output interface 630 and communication interface 640 by bus 650 realize between inside equipment Communication connection.
Processor 610 can use general CPU (Central Processing Unit, central processing unit), micro process Device, application specific integrated circuit (Application Specific Integrated Circuit, ASIC) or one or The modes such as multiple integrated circuits are realized, for executing relative program, to realize technical solution provided by this specification embodiment.
Memory 620 can use ROM (Read Only Memory, read-only memory), RAM (Random Access Memory, random access memory), static storage device, the forms such as dynamic memory realize.Memory 620 can store Operating system and other applications are realizing technical solution provided by this specification embodiment by software or firmware When, relevant program code is stored in memory 620, and execution is called by processor 610.
Input/output interface 630 is for connecting input/output module, to realize information input and output.Input and output/ Module can be used as component Configuration (not shown) in a device, can also be external in equipment to provide corresponding function.Wherein Input equipment may include keyboard, mouse, touch screen, microphone, various kinds of sensors etc., output equipment may include display, Loudspeaker, vibrator, indicator light etc..
Communication interface 640 is used for connection communication module (not shown), to realize the communication of this equipment and other equipment Interaction.Wherein communication module can be realized by wired mode (such as USB, cable etc.) and be communicated, can also be wirelessly (such as mobile network, WIFI, bluetooth etc.) realizes communication.
Bus 650 includes an access, in various components (such as the processor 610, memory 620, input/output of equipment Interface 630 and communication interface 640) between transmit information.
It should be noted that although above equipment illustrates only processor 610, memory 620, input/output interface 630, communication interface 640 and bus 650, but in the specific implementation process, which can also include realizing to operate normally Necessary other assemblies.In addition, it will be appreciated by those skilled in the art that, it can also be only comprising realizing in above equipment Component necessary to this specification example scheme, without including all components shown in figure.
Professional should further appreciate that, described in conjunction with the examples disclosed in the embodiments of the present disclosure Unit and algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, hard in order to clearly demonstrate The interchangeability of part and software generally describes each exemplary composition and step according to function in the above description. These functions are implemented in hardware or software actually, the specific application and design constraint depending on technical solution. Professional technician can use different methods to achieve the described function each specific application, but this realization It should not be considered as beyond the scope of the present invention.
The step of method described in conjunction with the examples disclosed in this document or algorithm, can be executed with hardware, processor The combination of software module or the two is implemented.Software module can be placed in random access memory (RAM), memory, read-only memory (ROM), electrically programmable ROM, electrically erasable ROM, register, hard disk, moveable magnetic disc, CD-ROM or technical field In any other form of storage medium well known to interior.
Above-described specific embodiment has carried out further the purpose of the present invention, technical scheme and beneficial effects It is described in detail, it should be understood that being not intended to limit the present invention the foregoing is merely a specific embodiment of the invention Protection scope, all any modification, equivalent substitution, improvement and etc. within the scope of the present invention, done should be included in this hair Within bright protection scope.

Claims (10)

1. a kind of verification method applied on block chain, which is characterized in that block chain meshed network includes multiple block nodes out With multiple verifying nodes, the method is suitable for first and goes out block node, and described first goes out block node for the multiple block node out In any one, which comprises
Determine that a first digital signature of block node out of specified quantity and described first goes out the first digital signature of block node, each The first digital signature of block node is signed to obtain by that should go out block node to the first cryptographic Hash out, the first cryptographic Hash root The first Hash operation is carried out according to the first block to be verified to obtain;
To the specified quantity go out the first digital signature of block node and described first go out the first digital signature of block node into The second Hash operation of row, obtains the second cryptographic Hash;
According to second cryptographic Hash and preset first random rule, selection target is verified in the multiple verifying node Node;
First block to be verified is sent to the target verification node, to verify the described first block to be verified.
2. the method according to claim 1, wherein first number for going out block node to the specified quantity The first digital signature that word signature goes out block node with described first carries out the second Hash operation, obtains the second cryptographic Hash, comprising:
The specified quantity is gone out into the first digital signature of block node, described first goes out the first digital signature and the of block node One numerical value carries out the second Hash operation and obtains the second cryptographic Hash, and first numerical value is that 1-n or described first goes out block node Sequence number, the n are arbitrary value.
3. the method according to claim 1, wherein preset first random rule includes:
Second cryptographic Hash is converted into 10 systems, and takes the remainder of second value, the second value is according to the multiple The quantity for verifying node determines;
Determine that the corresponding verifying node of the remainder is the target verification node.
4. the method according to claim 1, wherein further include:
The first block to be verified is generated, the first Hash operation is carried out to the described first block to be verified and obtains the first cryptographic Hash;
Go out block node to the specified quantity and sends first cryptographic Hash;
The specified quantity is received respectively goes out the first digital signature that block node is sent;
First cryptographic Hash is signed to obtain the first the first digital signature for going out block node.
5. according to the method described in claim 4, it is characterized by further comprising:
According to preset second random rule, go out block node in the multiple selection specified quantity of block node out.
6. according to the method described in claim 5, it is characterized by further comprising:
It receives second and goes out the third cryptographic Hash that block node is sent, the third cryptographic Hash is to carry out first to the second block to be verified Hash operation obtains;
According to second random rule, verify whether itself is the node for needing to sign to the third cryptographic Hash;
If it is, being signed to obtain the first the second digital signature for going out block node to the third cryptographic Hash;
Go out block node to described second and sends the described first the second digital signature for going out block node.
7. a kind of verification method applied on block chain, which is characterized in that the block chain meshed network includes multiple blocks out Node and multiple verifying nodes, the method are suitable for current authentication node, and the current authentication node is the multiple verifying Any one in node, which comprises
Receive first go out the first block to be verified, first that block node sends go out the public key of block node, first go out block node the One digital signature and specified quantity go out the first digital signature of block node;
The first digital signature that the public key for going out block node using first goes out block node to described first is verified, and obtains described the One goes out the first cryptographic Hash of block node;
First Hash operation is carried out to the described first block to be verified and obtains the 4th cryptographic Hash;
If described first go out block node the first cryptographic Hash it is with the 4th cryptographic Hash identical, go out block node to described first The first digital signature that first digital signature and specified quantity go out block node carries out the second Hash operation, obtains the second Hash Value;
According to second cryptographic Hash and preset first random rule, the serial number of target verification node is determined;
If the serial number of current authentication node described in the serial number of the target verification node, to the described first block to be verified into Row verifying, and verification result is broadcasted in the block chain meshed network.
8. the method according to the description of claim 7 is characterized in that further include:
According to preset second random rule, verifying specified quantity, whether block node is correct out;If correct, according to Second cryptographic Hash and preset first random rule, determine the serial number of target verification node.
9. a kind of verifying device applied on block chain, which is characterized in that the block chain meshed network includes multiple blocks out Node and multiple verifying nodes, described device go out block node for first, and described first goes out block node for the multiple block section out Any one in point, described device includes:
Determination unit goes out the first of block node for determining that specified quantity goes out the first digital signature of block node and described first Digital signature, the first digital signature of each block node out be signed to obtain by that should go out block node to the first cryptographic Hash, institute The first cryptographic Hash is stated to be obtained according to the first first Hash operation of block progress to be verified;
Hash units, the first digital signature and described first for going out block node to the specified quantity go out the of block node One digital signature carries out the second Hash operation, obtains the second cryptographic Hash;
Selecting unit is used for according to second cryptographic Hash and preset first random rule, in the multiple verifying node Middle selection target verifies node;
Transmission unit, for sending first block to be verified to the target verification node, so as to verify described first to Verify block.
10. a kind of verifying device applied on block chain, which is characterized in that the block chain meshed network includes multiple blocks out Node and multiple verifying nodes, described device are suitable for current authentication node, and the current authentication node is the multiple verifying Any one in node, described device includes:
Receiving unit goes out the first block to be verified, first that block node sends for receiving first and goes out the public key of block node, first The first digital signature of block node and specified quantity go out the first digital signature of block node out;
First authentication unit verifies first digital signature, obtains institute for using the first code key for going out block node State the first the first cryptographic Hash for going out block node;
First hash units obtain the 4th cryptographic Hash for carrying out the first Hash operation to the described first block to be verified;
Second hash units, if described first go out block node the first cryptographic Hash it is identical with the 4th cryptographic Hash, to described First goes out the first digital signature the second Hash operation of progress of the first digital signature of block node and a block node out of specified quantity, Obtain the second cryptographic Hash;
Determination unit, for determining target verification node according to second cryptographic Hash and preset first random rule Serial number;
Second authentication unit, if the serial number of current authentication node described in the serial number of the target verification node, for institute It states the first block to be verified to be verified, and verification result is broadcasted in the block chain meshed network.
CN201910519263.6A 2019-06-17 2019-06-17 Verification method and device applied to block chain Active CN110224839B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910519263.6A CN110224839B (en) 2019-06-17 2019-06-17 Verification method and device applied to block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910519263.6A CN110224839B (en) 2019-06-17 2019-06-17 Verification method and device applied to block chain

Publications (2)

Publication Number Publication Date
CN110224839A true CN110224839A (en) 2019-09-10
CN110224839B CN110224839B (en) 2020-10-30

Family

ID=67817222

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910519263.6A Active CN110224839B (en) 2019-06-17 2019-06-17 Verification method and device applied to block chain

Country Status (1)

Country Link
CN (1) CN110224839B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111881147A (en) * 2019-12-13 2020-11-03 深圳数字生命研究院 Processing method and device of computing task, storage medium and processor

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107079059A (en) * 2016-12-21 2017-08-18 深圳前海达闼云端智能科技有限公司 Block chain storage method and device and node equipment
CN108259235A (en) * 2018-01-04 2018-07-06 杭州复杂美科技有限公司 A kind of block chain accounting nodes selection method
CN108600161A (en) * 2018-03-12 2018-09-28 成都零光量子科技有限公司 A kind of fair efficient block chain common recognition method
CN108596621A (en) * 2018-04-28 2018-09-28 深圳市优学链科技有限公司 Block chain accounting nodes generation method, device, computer equipment and storage medium
CN108964879A (en) * 2018-07-20 2018-12-07 杭州复杂美科技有限公司 A kind of drawing method, common recognition method, equipment and storage medium
CN109559122A (en) * 2018-12-07 2019-04-02 北京瑞卓喜投科技发展有限公司 Block chain data transmission method and block chain data transmission system

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107079059A (en) * 2016-12-21 2017-08-18 深圳前海达闼云端智能科技有限公司 Block chain storage method and device and node equipment
CN108259235A (en) * 2018-01-04 2018-07-06 杭州复杂美科技有限公司 A kind of block chain accounting nodes selection method
CN108600161A (en) * 2018-03-12 2018-09-28 成都零光量子科技有限公司 A kind of fair efficient block chain common recognition method
CN108596621A (en) * 2018-04-28 2018-09-28 深圳市优学链科技有限公司 Block chain accounting nodes generation method, device, computer equipment and storage medium
CN108964879A (en) * 2018-07-20 2018-12-07 杭州复杂美科技有限公司 A kind of drawing method, common recognition method, equipment and storage medium
CN109559122A (en) * 2018-12-07 2019-04-02 北京瑞卓喜投科技发展有限公司 Block chain data transmission method and block chain data transmission system

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111881147A (en) * 2019-12-13 2020-11-03 深圳数字生命研究院 Processing method and device of computing task, storage medium and processor
WO2021114889A1 (en) * 2019-12-13 2021-06-17 深圳数字生命研究院 Computational task processing method and device, storage medium, and processor
CN111881147B (en) * 2019-12-13 2023-09-22 深圳数字生命研究院 Processing method and device of computing task, storage medium and processor

Also Published As

Publication number Publication date
CN110224839B (en) 2020-10-30

Similar Documents

Publication Publication Date Title
CN110222537A (en) Verification method and device applied to block chain link
CN110210865A (en) Packaging method and device based on block chain
CN110223070A (en) Verification method and device based on block chain meshed network
CN110247753A (en) Go out block method and device based on block chain meshed network
CN108848148B (en) Transaction information confirmation method and device based on block chain
CN110225044A (en) Verification method and device on block chain
CN114039733B (en) Certificate storage service transfer method, device and equipment for alliance chains
CN110222538A (en) It is related to the verification method and device of block chain
CN109857810A (en) Data synchronization unit and method based on block chain
CN110233722A (en) Go out block method and device on block chain
CN110298757B (en) Consensus method and device relating to DPoS
CN109818965A (en) Personal verification device and method
CN110224839A (en) Applied to the verification method and device on block chain
CN109918445A (en) Digging mine device and method based on block chain
CN113536240A (en) Method and device for using admission ticket by combining NFT (network File transfer)
CN110224813A (en) Go out block method and device based on block chain
CN111262707B (en) Digital signature method, verification method, device and storage medium
CN110223069A (en) Packaging method and device based on block chain meshed network
CN111831669A (en) Method and device for storing internet voting data according to block chain
CN110445620A (en) The marriage certificate for being related to block chain deposits card method and device thereof
CN110225043A (en) Packaging method and device applied to block chain
CN110245949A (en) It is related to the packaging method and device of block chain
CN110247773A (en) Packaging method and device on block chain
CN110224840A (en) Packaging method and device based on block chain
CN110245950A (en) Be related to block chain goes out block method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
CB02 Change of applicant information

Address after: 100085 No. 108, 1st Floor, No. 9, Shangdi Jiujie, Haidian District, Beijing

Applicant after: Beijing ruice Technology Co.,Ltd.

Address before: 100085 No. 108, 1st Floor, No. 9, Shangdi Jiujie, Haidian District, Beijing

Applicant before: BEIJING AIMO RUICE TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant