CN110245517A - A kind of across chain method, apparatus, system and the electronic equipment of block chain - Google Patents
A kind of across chain method, apparatus, system and the electronic equipment of block chain Download PDFInfo
- Publication number
- CN110245517A CN110245517A CN201910456755.5A CN201910456755A CN110245517A CN 110245517 A CN110245517 A CN 110245517A CN 201910456755 A CN201910456755 A CN 201910456755A CN 110245517 A CN110245517 A CN 110245517A
- Authority
- CN
- China
- Prior art keywords
- block chain
- block
- chain
- locking
- relaying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Strategic Management (AREA)
- Computing Systems (AREA)
- Economics (AREA)
- Data Mining & Analysis (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
This specification embodiment is related to across chain method, apparatus, system and the electronic equipment of a kind of block chain, using in the side chain after under mode across in catenary system, specifically include that relaying read underlying scenario where the locking that generates after locking underlying scenario of the first block chain prove;Locking is proved to be sent to the second block chain, locks proof and verify for triggering the second block chain to locking proof, and the generation mapping assets corresponding with the underlying scenario after being proved to be successful by relaying;Wherein, the relaying is the full node for going to trust to the first block chain and the second block chain with access authority.Meet the condition of credible setting due to relaying, the as full node of main chain and side chain, the third party across chain mutual concession can be become to relay and across chain service is provided, it does not need to go to generate the relaying that can be trusted by complicated means in the prior art, to simplify the setting mechanism of relaying, by going the relaying trusted to simplify across chain service, and promote across chain transaction security.
Description
Technical field
This specification embodiment be related to network technique field more particularly to a kind of across the chain method, apparatus system of block chain and
Electronic equipment.
Background technique
In block chain field, no matter across chain technology is exactly realized value internet for publicly-owned chain or privately owned chain
Key.
In the problems that block chain is faced, between block chain intercommunity high degree limit block chain across chain
The application space of technology.Across chain technology has at present: notary's mode (Notary schemes), side chain/relaying
(Sidechains/relays), Hash lock-in techniques, distributed private key control technology etc. respectively correspond different across chain modes.
However, current across chain technology, especially across the chain technology under side chain/repeater mode, relaying setting is more multiple
It is miscellaneous, so as to cause under the mode across chain, complicated operation.
Summary of the invention
This specification embodiment provides a kind of across the chain method, apparatus of block chain, system and electronic equipment, existing to solve
The problem of across chain service operations complexity present in across the chain scheme of technology.
In order to solve the above-mentioned technical problem, this specification embodiment adopts the following technical solutions:
In a first aspect, provide a kind of across the chain method of block chain, using in the side chain after under mode across in catenary system,
The described method includes:
The locking that the first block chain where relaying reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain by the relaying, and the locking is proved for triggering secondth area
Block chain verifies locking proof, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the relaying is to go to trust with access authority to the first block chain and the second block chain
Full node.
Second aspect, provide a kind of block chain across chain apparatus, using in the side chain after under mode across in catenary system,
Described device includes:
Read module, the lock generated after locking the underlying scenario for the first block chain where reading underlying scenario
It is fixed to prove;
Sending module, for locking proof to be sent to the second block chain, the locking proves described for triggering
Second block chain verifies locking proof, and mapping money corresponding with the underlying scenario is generated after being proved to be successful
It produces;
Wherein, the relaying is to go to trust with access authority to the first block chain and the second block chain
Full node.
The third aspect, provide a kind of block chain across catenary system, comprising: the first block chain, the second block chain and in
After;
The first block chain locks underlying scenario;
The relaying, the lock that the first block chain where reading underlying scenario generates after locking the underlying scenario
It is fixed to prove;And locking proof is sent to the second block chain;
The second block chain is verified locking proof, and is generated and the primary money after being proved to be successful
Produce corresponding mapping assets;
Wherein, the relaying is to go to trust with access authority to the first block chain and the second block chain
Full node.
Fourth aspect provides a kind of electronic equipment, comprising: memory, processor and is stored on the memory simultaneously
The computer program that can be run on the processor, the computer program are executed by the processor:
The locking that the first block chain where reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain, the locking is proved for triggering the second block chain to institute
Stating locking proves to be verified, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the electronic equipment is there is access authority to write to the first block chain and the second block chain
The full node appointed.
5th aspect, provides a kind of computer readable storage medium, the computer-readable recording medium storage one
Or multiple programs, one or more of programs are when the electronic equipment for being included multiple application programs executes, so that the electricity
Sub- equipment executes following operation:
The locking that the first block chain where reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain, the locking is proved for triggering the second block chain to institute
Stating locking proves to be verified, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the electronic equipment is there is access authority to write to the first block chain and the second block chain
The full node appointed.
This specification embodiment use at least one above-mentioned technical solution can reach it is following the utility model has the advantages that
By this specification technical solution, relaying can not forge Transaction Information, only the locking of trading activity be submitted to prove,
As long as the as full node of main chain and side chain can become the third across chain mutual concession so meet the condition of credible setting
Fang Zhongji simultaneously provides across chain service, does not need to go to generate the relaying that can be trusted by complicated means in the prior art, thus
The setting mechanism for simplifying relaying, by going the relaying trusted to simplify across chain service, and can be by the accounting nodes across chain both sides
Alteration, which timely updates, is synchronized to other side, prevents from relaying and do evil together with the invalid accounting nodes left one's post, and guarantees across chain service
Safety.In addition, it is not necessary that the block head Hash of all blocks, it is only necessary to track (the final change of effective accounting nodes
Accounting nodes afterwards, can with when be individually also possible to the set of multiple accounting nodes) and across chain transaction occur when where block
Block head Hash transaction is verified, thus, simplify across chain operation, promote across chain efficiency on the whole.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or
Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only
The some embodiments recorded in this specification embodiment are not paying creative labor for those of ordinary skill in the art
Under the premise of dynamic property, it is also possible to obtain other drawings based on these drawings.
Fig. 1 a is step schematic diagram one of of the block chain across chain method that this specification embodiment provides;
Fig. 1 b is the two of step schematic diagram of the block chain across chain method that this specification embodiment provides;
Fig. 2 is the three of step schematic diagram of the block chain across chain method that this specification embodiment provides;
Fig. 3 is structural schematic diagram of the block chain across chain apparatus that this specification embodiment provides;
Fig. 4 is structural schematic diagram of the block chain across catenary system that this specification embodiment provides;
Fig. 5 is the structural schematic diagram for the electronic equipment that this specification embodiment provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of this specification embodiment clearer, have below in conjunction with this specification
The technical solution of this specification embodiment is clearly and completely described in body embodiment and corresponding attached drawing.Obviously, described
Embodiment be only this specification a part of the embodiment, instead of all the embodiments.The embodiment of base in this manual, this
Field those of ordinary skill every other embodiment obtained without making creative work, belongs to this explanation
The range of book embodiment protection.
Below in conjunction with attached drawing, the technical solution that each embodiment of this specification provides is described in detail.
It should be noted that for side chain/relaying (Sidechains/relays) mode in across chain service, across chain side
Formula are as follows: assuming that thering is A chain and B chain to need to interact, but A chain and B chain can not intercommunications.At this moment a relaying Relayer energy can be set
A chain and B chain are read, then, which just as " on the chain " intermediary for linking A chain and B chain, is properly termed as " relaying ", entirely
It is exactly " A-C-B " across chain process.However, it is contemplated that in current across chain scheme or needing to believe the part relaying Relayer
Appoint, is biased to notary's mode;The setting for relaying Relayer is excessively complicated, such as: exist between multiple relaying Relayer
Competitive relation needs through mortgage token competition, and supervises and do evil by reporting.This specification embodiment simplifies relaying
The setting mechanism of Relayer, by setting across chain mutual concession for relaying after credible setting and having simultaneously to across chain both sides
The full node for going to trust of access authority, to realize simplified and safety across chain service between across chain both sides.
Embodiment one
Referring to Fig.1 shown in a, for step schematic diagram of a kind of block chain across chain method that this specification embodiment provides, institute
State across chain method apply under side chain/repeater mode across in catenary system, wherein across may include main chain, side chain in catenary system
And the relaying across chain service is provided for main chain and side chain, which can be an independent block chain node or is located at area
Functional module on block chain node.It should be understood that the block chain can be decentralization trading floor across the application scenarios of chain scheme
Scape or exchange of assets scene etc..
Across the chain method may comprise steps of:
Step 102: the lock that the first block chain where relaying reading underlying scenario generates after locking the underlying scenario
It is fixed to prove.
It should be understood that the first block chain can be across the side chain in catenary system, underlying scenario is provided on the side chain.Side
Chain can lock underlying scenario in across chain service process, be executed with freezing or suspending underlying scenario on side chain except this
Other assets transaction except secondary across chain transaction.
Step 104: locking proof is sent to the second block chain by the relaying, and the locking is proved for triggering
It states the second block chain to verify locking proof, and generates mapping corresponding with the underlying scenario after being proved to be successful
Assets.
The second block chain can be across the main chain in catenary system, which can be by way of anchoring in itself institute
Mapping assets corresponding with underlying scenario are mapped on chain.For example, underlying scenario X on side chain, can generate mapping on main chain
Assets X ';Wherein, underlying scenario X can be equal with the value of mapping assets X '.
Wherein, the relaying is to go to trust with access authority to the first block chain and the second block chain
Full node.
It should be noted that relaying can be online lower determination, which can have visit to main chain and side chain simultaneously
Ask permission, in other words, relaying can be the full node of main chain and side chain simultaneously.Full node refers to that maintenance includes all transaction letters
The node of the intact block chain of breath, the node can verify any Transaction Information independently, without by it is any its
Its node or other information.
In this specification embodiment, relaying can not forge Transaction Information, only the locking of trading activity be submitted to prove, institute
As long as the third party across chain mutual concession can be become to meet the condition of credible setting, the as full node of main chain and side chain
Across chain service is relayed and provided, does not need to go to generate the relaying that can be trusted by complicated means in the prior art, thus simple
The setting mechanism for changing relaying by going the relaying trusted to simplify across chain service, and promotes across chain transaction security.
Optionally, in actual across chain operation, underlying scenario can be locked in the first block chain, and in the second block chain
Mapping assets are generated, thus, the transfer of assets is realized, to carry out transaction in assets on the second block chain.In addition, in the secondth area
When the mapping assets that block chain generates do not need, it can be reversed and the first block chain, referring to Fig.1 shown in b, the side are returned into assets transfer
Method further include:
Step 106: the second block chain where the relaying reading mapping assets is after destroying the mapping assets
The unlock of generation proves.
Step 108: unlock proof is sent to the first block chain by the relaying, and the unlock is proved for touching
It sends out the first block chain described and unlock proof is verified, and unlock the underlying scenario after being proved to be successful.
Optionally, the locking proves to carry at least one block checkpoint of the first block chain;
When the second block chain verifies locking proof, specifically include: the second block chain is to described
Locking prove in the block head information of the effective block of at least one block checkpoint that carries carry out verifying and to it is described extremely
The corresponding accounting nodes of block height of a few block checkpoint are verified;
And/or;
The unlock proves to carry at least one block checkpoint of the second block chain;
When the first block chain verifies unlock proof, specifically include: the first block chain is to described
Unlock prove in the block head information of the effective block of at least one block checkpoint that carries carry out verifying and to it is described extremely
The corresponding accounting nodes of block height of a few block checkpoint are verified.
As a result, when transaction verification between being serviced across chain, does not need to track whole block head information, and only need to track
The corresponding accounting nodes of height of the block head information and the block head of block are verified where across chain transaction occurs.Because
Relaying is believable, then need to only determine that side chain is remembered when main chain receives the proof of the behavior comprising transaction on the side chain that relaying is submitted
Account node does not change, and exchange submits the information in proving consistent in the build information of side chain block with relaying.
Optionally, the method also includes:
When monitoring that the accounting nodes of the first block chain change, described relay is sent out to the second block chain
Change is sent to prove;
It is described to relay to the first block chain after the second block chain proves that registration is completed according to the change
Return registration proves, described to register what proof was generated for triggering the first block end of chain (EOC) by accounting nodes generation change
Transaction in assets pausing operation;
And/or;
When monitoring that the accounting nodes of the second block chain change, described relay is sent out to the first block chain
Change is sent to prove;
It is described to relay to the second block chain after the first block chain proves that registration is completed according to the change
Returning to registration proves, the registration is proved for triggering the assets that the second block end of chain (EOC) is changed by accounting nodes and is generated
Trading halt operation.
The accounting nodes alteration across chain both sides can be timely updated by above-mentioned preferred embodiment and be synchronized to other side, prevented
It only relays and does evil together with the invalid accounting nodes left one's post, guarantee the safety across chain service.
Optionally, before the first block chain locks underlying scenario, the method also includes:
The accounting nodes of second block chain described in the first block chained record;
The accounting nodes of first block chain described in the second block chained record.
Optionally, the common recognition mechanism that the first block chain and the second block chain use meets:
All accounting nodes are clear;
There are irreversible confirmation delays.
It is illustrated below by embodiment of the specific example to this specification, relaying interaction is passed through with main chain, side chain
For.
Referring to shown in Fig. 2, may include:
Step 202: when the accounting nodes for monitoring side chain change, relaying chain linked to owner sends change and proves.
At this point, the transaction in assets that the assets contract on side chain is limited enters halted state.
Step 204: main chain is registered according to change proof.
That is main chain modification information that accounting nodes on side chain are recorded on the chain of itself, to guarantee that subsequent authentication is accurate.
Step 206: relaying to side chain and return to registration proof;
Step 208: side chain is proved according to the registration of return, terminates the transaction in assets that change and generation occur by accounting nodes
Pausing operation.
In other words, across chain operation can be entered at this time.
Main chain generates mapping assets X ' to underlying scenario X again after side chain locking:
Step 210: side chain locks underlying scenario X according to across chain assets contract on side chain.
Step 212: relaying proves the behavior of the locked transaction to be submitted to main chain from side chain.
It should be understood that the behavior of the locked transaction proves, does not need the area of all blocks in this specification embodiment
Build Hash, it is only necessary to track effective accounting nodes (accounting nodes after final change, can with when be individually also possible to it is multiple
The set of accounting nodes) and across chain transaction block head Hash of block where when occurring transaction is verified, thus, simplify
Across chain operation, and the synchronization of the modification information by accounting nodes, it can be ensured that accounting nodes that both sides receive other side are
Effectively, guarantee the safety across chain service.
Step 214: main chain correspondingly generates mapping assets X '.
It maps assets X ' and unlocks underlying scenario X in side chain after main chain destruction:
Step 216: main chain destroys mapping assets X ' according to across chain assets contract on main chain.
Step 218: relaying proves the behavior that the unlock is traded to be submitted to side chain from main chain.
The effect of the step is identical with the effect of step 212, and this will not be repeated here.
Step 220: side chain correspondingly unlocks underlying scenario X.
It should be understood that scheme shown in above-mentioned Fig. 2 in fact, can also be wrapped so that the accounting nodes on side chain change as an example
It is changed containing the accounting nodes on main chain, or, there is a situation where change simultaneously for the accounting nodes on main chain and side chain.
By this specification technical solution, relaying can not forge Transaction Information, only the locking of trading activity be submitted to prove,
As long as the as full node of main chain and side chain can become the third across chain mutual concession so meet the condition of credible setting
Fang Zhongji simultaneously provides across chain service, does not need to go to generate the relaying that can be trusted by complicated means in the prior art, thus
The setting mechanism for simplifying relaying, by going the relaying trusted to simplify across chain service, and can be by the accounting nodes across chain both sides
Alteration, which timely updates, is synchronized to other side, prevents from relaying and do evil together with the invalid accounting nodes left one's post, and guarantees across chain service
Safety.In addition, it is not necessary that the block head Hash of all blocks, it is only necessary to track (the final change of effective accounting nodes
Accounting nodes afterwards, can with when be individually also possible to the set of multiple accounting nodes) and across chain transaction occur when where block
Block head Hash transaction is verified, thus, simplify across chain operation, promote across chain efficiency on the whole.
Embodiment two
Referring to shown in Fig. 3, for the structural schematic diagram across chain apparatus for the block chain that this specification embodiment provides, the device
It specifically includes that
Read module 302 generates after locking the underlying scenario for the first block chain where reading underlying scenario
Locking prove;
Sending module 304, for locking proof to be sent to the second block chain, the locking is proved for triggering
It states the second block chain to verify locking proof, and generates mapping corresponding with the underlying scenario after being proved to be successful
Assets;
Wherein, the relaying is to go to trust with access authority to the first block chain and the second block chain
Full node.
Optionally, the locking proves to carry at least one block checkpoint of the first block chain;
When the second block chain verifies locking proof, specifically include: the second block chain is to described
Locking prove in the block head information of the effective block of at least one block checkpoint that carries carry out verifying and to it is described extremely
The corresponding accounting nodes of block height of a few block checkpoint are verified;
And/or;
The unlock proves to carry at least one block checkpoint of the second block chain;
When the first block chain verifies unlock proof, specifically include: the first block chain is to described
Unlock prove in the block head information of the effective block of at least one block checkpoint that carries carry out verifying and to it is described extremely
The corresponding accounting nodes of block height of a few block checkpoint are verified.
Optionally, the sending module, is also used to:
When monitoring that the accounting nodes of the first block chain change, Xiang Suoshu the second block chain sends change card
It is bright;And
After the second block chain proves that registration is completed according to the change, Xiang Suoshu the first block chain returns to registration
It proves, the registration is proved for triggering the transaction in assets that by accounting nodes change occurs for the first block end of chain (EOC) and generates
Pausing operation;
And/or;
The sending module, is also used to:
When monitoring that the accounting nodes of the second block chain change, Xiang Suoshu the first block chain sends change card
It is bright;And
After the first block chain proves that registration is completed according to the change, Xiang Suoshu the second block chain returns to registration
It proves, the registration proves to suspend for triggering the transaction in assets that the second block end of chain (EOC) is changed by accounting nodes and is generated
Operation.
By this specification technical solution, relaying can not forge Transaction Information, only the locking of trading activity be submitted to prove,
As long as the as full node of main chain and side chain can become the third across chain mutual concession so meet the condition of credible setting
Fang Zhongji simultaneously provides across chain service, does not need to go to generate the relaying that can be trusted by complicated means in the prior art, thus
The setting mechanism for simplifying relaying, by going the relaying trusted to simplify across chain service, and can be by the accounting nodes across chain both sides
Alteration, which timely updates, is synchronized to other side, prevents from relaying and do evil together with the invalid accounting nodes left one's post, and guarantees across chain service
Safety.In addition, it is not necessary that the block head Hash of all blocks, it is only necessary to track (the final change of effective accounting nodes
Accounting nodes afterwards, can with when be individually also possible to the set of multiple accounting nodes) and across chain transaction occur when where block
Block head Hash transaction is verified, thus, simplify across chain operation, promote across chain efficiency on the whole.
It should be understood that can be relaying across chain apparatus described in the present embodiment two, being somebody's turn to do can be with functional module across chain apparatus
Form executes all technical solutions involved in across chain method, and realizes relevant art effect, and this will not be repeated here.
Embodiment three
This specification embodiment also provide a kind of block chain across catenary system, referring now still to shown in Fig. 4, comprising: the first block
Chain 402, the second block chain 404 and relaying 406;
The first block chain 402 locks underlying scenario;
The relaying 406, the first block chain 402 where reading underlying scenario are raw after locking the underlying scenario
At locking prove;And locking proof is sent to the second block chain 404;
The second block chain 404, to the locking proof verify, and after being proved to be successful generate with it is described primary
The corresponding mapping assets of assets;
Wherein, the relaying 406 is to have access authority to the first block chain 402 and the second block chain 406
Go trust full node.
Example IV
The electronic equipment of this specification embodiment is discussed in detail referring to Fig. 5.Referring to FIG. 5, in hardware view, the electricity
Sub- equipment includes processor, optionally further comprising internal bus, network interface, memory.Wherein, memory may be comprising interior
It deposits, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-volatile memories
Device (Non-Volatile Memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible that other
Hardware required for business.
Processor, network interface and memory can be connected with each other by internal bus, which can be industry
Standard architecture (Industry Standard Architecture, ISA) bus, Peripheral Component Interconnect standard
(Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended
Industry Standard Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus,
Control bus etc..Only to be indicated with a four-headed arrow in Fig. 5, it is not intended that an only bus or one kind convenient for indicating
The bus of type.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating
Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer
On face formed block chain across chain apparatus.Processor executes the program that memory is stored, and is specifically used for executing described previously
Block chain across chain apparatus as executing subject when performed method operation.
Method disclosed in the above-mentioned implementation example figure 1a- embodiment illustrated in fig. 2 such as this specification can be applied in processor, or
Person is realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.During realization,
Each step of the above method can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.On
The processor stated can be at general processor, including central processing unit (Central Processing Unit, CPU), network
Manage device (Network Processor, NP) etc.;Can also be digital signal processor (Digital Signal Processor,
DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate
Array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or crystalline substance
Body pipe logical device, discrete hardware components.It may be implemented or execute disclosed each method, the step in this specification embodiment
And logic diagram.General processor can be microprocessor or the processor is also possible to any conventional processor etc..Knot
The step of closing method disclosed in this specification embodiment can be embodied directly in hardware decoding processor and execute completion, Huo Zheyong
Hardware and software module combination in decoding processor execute completion.Software module can be located at random access memory, flash memory, read-only
The storage medium of this fields such as memory, programmable read only memory or electrically erasable programmable memory, register maturation
In.The storage medium is located at memory, and processor reads the information in memory, and the step of the above method is completed in conjunction with its hardware
Suddenly.
The method that the electronic equipment can also carry out Fig. 1 a- Fig. 2, and realize block chain across chain implementation shown in Fig. 1 a- Fig. 2
The function of example, details are not described herein for this specification embodiment.
Certainly, other than software realization mode, other realization sides are not precluded in the electronic equipment of this specification embodiment
Formula, such as logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is simultaneously unlimited
Due to each logic unit, it is also possible to hardware or logical device.
Embodiment five
This specification embodiment also provides a kind of computer readable storage medium, the computer-readable recording medium storage
One or more programs, one or more of programs are when the server for being included multiple application programs executes, so that described
Server executes following operation:
The locking that the first block chain where reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain, the locking is proved for triggering the second block chain to institute
Stating locking proves to be verified, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the electronic equipment is there is access authority to write to the first block chain and the second block chain
The full node appointed.
Wherein, the computer readable storage medium, such as read-only memory (Read-Only Memory, ROM), at random
Access memory (Random Access Memory, RAM), magnetic or disk etc..
In short, being not intended to limit this specification the foregoing is merely the preferred embodiment of this specification embodiment
The protection scope of embodiment.It is all this specification embodiment spirit and principle within, made any modification, equivalent replacement,
Improve etc., it should be included within the protection scope of this specification embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
Various embodiments are described in a progressive manner in this specification embodiment, identical phase between each embodiment
As partially may refer to each other, each embodiment focuses on the differences from other embodiments.Especially for
For system embodiment, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to method
The part of embodiment illustrates.
Claims (13)
1. a kind of across chain method of block chain, using in the side chain after under mode across in catenary system, which comprises
The locking that the first block chain where relaying reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain by the relaying, and the locking is proved for triggering the second block chain
Locking proof is verified, and generates mapping assets corresponding with the underlying scenario after being proved to be successful;
Wherein, the relaying is the full section for going to trust to the first block chain and the second block chain with access authority
Point.
2. the method as described in claim 1, the method also includes:
The second block chain where the relaying reads the mapping assets is destroying the unlock card for mapping and generating after assets
It is bright;
Unlock proof is sent to the first block chain by the relaying, and the unlock is proved for triggering firstth area
Block chain verifies unlock proof, and the underlying scenario is unlocked after being proved to be successful.
3. method according to claim 1 or 2, the locking proves to carry at least one block inspection of the first block chain
Point;
When the second block chain verifies locking proof, specifically include: the second block chain is to the locking
The block head information of the effective block of at least one the block checkpoint carried in proof carries out verifying and to described at least one
The corresponding accounting nodes of block height of a block checkpoint are verified;
And/or;
The unlock proves to carry at least one block checkpoint of the second block chain;
When the first block chain verifies unlock proof, specifically include: the first block chain is to the unlock
The block head information of the effective block of at least one the block checkpoint carried in proof carries out verifying and to described at least one
The corresponding accounting nodes of block height of a block checkpoint are verified.
4. it is method according to claim 1 or 2, the method also includes:
When monitoring that the accounting nodes of the first block chain change, described relay to the second block chain sends change
More prove;
After the second block chain proves that registration is completed according to the change, described relay returns to the first block chain
Registration proves that the registration is proved for triggering the assets that by accounting nodes change occurs for the first block end of chain (EOC) and generates
Trading halt operation;
And/or;
When monitoring that the accounting nodes of the second block chain change, described relay to the first block chain sends change
More prove;
After the first block chain proves that registration is completed according to the change, described relay returns to the second block chain
Registration proves that the registration is proved for triggering the transaction in assets that the second block end of chain (EOC) is changed by accounting nodes and is generated
Pausing operation.
5. the method as described in claim 1, before the first block chain locks underlying scenario, the method also includes:
The accounting nodes of second block chain described in the first block chained record;
The accounting nodes of first block chain described in the second block chained record.
6. the common recognition mechanism that the method as described in claim 1, the first block chain and the second block chain use meets:
All accounting nodes are clear;
There are irreversible confirmation delays.
7. a kind of block chain across chain apparatus, using in the side chain after across in catenary system, described device includes: under mode
Read module, the locking card generated after locking the underlying scenario for the first block chain where reading underlying scenario
It is bright;
Sending module, for locking proof to be sent to the second block chain, the locking is proved for triggering described second
Block chain verifies locking proof, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the relaying is the full section for going to trust to the first block chain and the second block chain with access authority
Point.
8. device as claimed in claim 7,
The read module, the second block chain where being also used to read the mapping assets are raw after destroying the mapping assets
At unlock prove;
The sending module is also used to prove the unlock to be sent to the first block chain, and the unlock is proved for touching
It sends out the first block chain described and unlock proof is verified, and unlock the underlying scenario after being proved to be successful.
9. device as claimed in claim 7 or 8, the locking proves to carry at least one block inspection of the first block chain
Point;
When the second block chain verifies locking proof, specifically include: the second block chain is to the locking
The block head information of the effective block of at least one the block checkpoint carried in proof carries out verifying and to described at least one
The corresponding accounting nodes of block height of a block checkpoint are verified;
And/or;
The unlock proves to carry at least one block checkpoint of the second block chain;
When the first block chain verifies unlock proof, specifically include: the first block chain is to the unlock
The block head information of the effective block of at least one the block checkpoint carried in proof carries out verifying and to described at least one
The corresponding accounting nodes of block height of a block checkpoint are verified.
10. device as claimed in claim 7 or 8, the sending module, are also used to:
When monitoring that the accounting nodes of the first block chain change, Xiang Suoshu the second block chain sends change and proves;
And
After the second block chain proves that registration is completed according to the change, Xiang Suoshu the first block chain returns to registration card
Bright, the registration proves temporary for triggering the transaction in assets that by accounting nodes change occurs for the first block end of chain (EOC) and generates
Stop operating;
And/or;
The sending module, is also used to:
When monitoring that the accounting nodes of the second block chain change, Xiang Suoshu the first block chain sends change and proves;
And
After the first block chain proves that registration is completed according to the change, Xiang Suoshu the second block chain returns to registration card
Bright, the registration is proved for triggering the transaction in assets pause behaviour that the second block end of chain (EOC) is changed by accounting nodes and is generated
Make.
11. a kind of block chain across catenary system, comprising: the first block chain, the second block chain and relaying;
The first block chain locks underlying scenario;
The relaying, the locking card that the first block chain where reading underlying scenario generates after locking the underlying scenario
It is bright;And locking proof is sent to the second block chain;
The second block chain is verified locking proof, and is generated and the underlying scenario pair after being proved to be successful
The mapping assets answered;
Wherein, the relaying is the full section for going to trust to the first block chain and the second block chain with access authority
Point.
12. a kind of electronic equipment, comprising: memory, processor and be stored on the memory and can be on the processor
The computer program of operation, the computer program are executed by the processor:
The locking that the first block chain where reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain, the locking is proved for triggering the second block chain to the lock
It is fixed to prove to be verified, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the electronic equipment is to go to trust with access authority to the first block chain and the second block chain
Full node.
13. a kind of computer readable storage medium, the computer-readable recording medium storage one or more program, described one
A or multiple programs are when the electronic equipment for being included multiple application programs executes, so that the electronic equipment executes following behaviour
Make:
The locking that the first block chain where reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain, the locking is proved for triggering the second block chain to the lock
It is fixed to prove to be verified, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the electronic equipment is to go to trust with access authority to the first block chain and the second block chain
Full node.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910456755.5A CN110245517A (en) | 2019-05-29 | 2019-05-29 | A kind of across chain method, apparatus, system and the electronic equipment of block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910456755.5A CN110245517A (en) | 2019-05-29 | 2019-05-29 | A kind of across chain method, apparatus, system and the electronic equipment of block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN110245517A true CN110245517A (en) | 2019-09-17 |
Family
ID=67885437
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910456755.5A Pending CN110245517A (en) | 2019-05-29 | 2019-05-29 | A kind of across chain method, apparatus, system and the electronic equipment of block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110245517A (en) |
Cited By (18)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111368003A (en) * | 2020-03-06 | 2020-07-03 | 安徽中科智链信息科技有限公司 | Management method of multi-chain anchoring data |
CN111539723A (en) * | 2020-04-14 | 2020-08-14 | 浙江浙燃能源有限公司 | Block chain transaction recording method, equipment, block chain node and computer medium |
CN111666336A (en) * | 2020-05-15 | 2020-09-15 | 西安纸贵互联网科技有限公司 | Data intercommunication method and system among block chains and electronic equipment |
CN112003889A (en) * | 2020-07-10 | 2020-11-27 | 南京邮电大学 | Distributed cross-chain system and cross-chain information interaction and system access control mechanism |
CN112104607A (en) * | 2020-08-13 | 2020-12-18 | 北京新盛云佳科技有限公司 | Method, device, network node and storage medium for cross-link communication |
CN112200681A (en) * | 2020-12-04 | 2021-01-08 | 腾讯科技(深圳)有限公司 | Service processing method, information processing method and node equipment of block chain network |
CN112381650A (en) * | 2020-11-18 | 2021-02-19 | 西安纸贵互联网科技有限公司 | Cross-chain interoperation transaction processing method and device, electronic equipment and storage medium |
CN112927075A (en) * | 2021-02-26 | 2021-06-08 | 北京百度网讯科技有限公司 | Processing method and device for cross-chain transaction, electronic equipment and readable storage medium |
CN112953999A (en) * | 2020-12-29 | 2021-06-11 | 合肥达朴汇联科技有限公司 | Block chain information cross-chain interaction method, system and equipment applied to t1 node |
CN112995211A (en) * | 2021-04-21 | 2021-06-18 | 腾讯科技(深圳)有限公司 | Data processing method, device and equipment based on block chain network and storage medium |
CN113179273A (en) * | 2021-04-29 | 2021-07-27 | 杭州丽冠科技有限公司 | Block chain side chain-based block header verification method and device and computer-readable storage medium |
CN113328997A (en) * | 2021-05-10 | 2021-08-31 | 东软集团股份有限公司 | Alliance chain cross-chain system and method |
CN113377875A (en) * | 2021-06-29 | 2021-09-10 | 北京百度网讯科技有限公司 | Cross-link data processing method and device, electronic equipment and readable storage medium |
CN113420090A (en) * | 2021-06-29 | 2021-09-21 | 北京百度网讯科技有限公司 | Cross-chain processing method and device, electronic equipment and readable storage medium |
CN113781228A (en) * | 2021-09-18 | 2021-12-10 | 北京俩撇科技有限公司 | Cross-chain asset transfer method, device, equipment and storage medium |
US11232441B2 (en) | 2019-10-30 | 2022-01-25 | Accenture Global Solutions Limited | Cryptologic coordinated symmetric conditional key release |
CN115225639A (en) * | 2022-09-15 | 2022-10-21 | 杭州趣链科技有限公司 | Changing method and device of consensus trusted cluster, computer equipment and medium |
US11551204B2 (en) | 2019-10-30 | 2023-01-10 | Accenture Global Solutions Limited | Leading-party-initiated cryptologic coordinated symmetric conditional key release |
Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105488722A (en) * | 2015-11-30 | 2016-04-13 | 布比(北京)网络技术有限公司 | Asset data processing method and device based on derivation chain |
CN107679857A (en) * | 2017-10-10 | 2018-02-09 | 马晶瑶 | Across the chain method of commerce and storage medium of block chain |
CN107888562A (en) * | 2017-10-13 | 2018-04-06 | 布比(北京)网络技术有限公司 | Interconnect serobila architecture |
WO2018073564A1 (en) * | 2016-10-17 | 2018-04-26 | Arm Ltd | Blockchain mining using trusted nodes |
CN108009811A (en) * | 2017-11-30 | 2018-05-08 | 中国人民解放军国防科技大学 | Inter-cloud computing environment value exchange-oriented cross-chain communication method |
CN108269190A (en) * | 2018-01-17 | 2018-07-10 | 深圳四方精创资讯股份有限公司 | Across chain method and its system based on across chain relaying platform |
CN108288159A (en) * | 2018-03-07 | 2018-07-17 | 物数(上海)信息科技有限公司 | Across chain method of commerce, system, equipment and storage medium based on multi-tiling chain |
CN108768659A (en) * | 2018-05-24 | 2018-11-06 | 深圳前海益链网络科技有限公司 | Across the chain tra nsfer system of Token assets between a kind of different blocks chain network |
CN108876607A (en) * | 2018-05-29 | 2018-11-23 | 阿里巴巴集团控股有限公司 | Assets transfer method and device, electronic equipment |
CN108880794A (en) * | 2018-06-15 | 2018-11-23 | 浙江华信区块链科技服务有限公司 | Across chain user identity and its digital asset management system |
CN108881187A (en) * | 2018-05-31 | 2018-11-23 | 杭州秘猿科技有限公司 | A kind of across chain data transferring method and equipment suitable for permitting chain scene |
CN109035012A (en) * | 2018-06-11 | 2018-12-18 | 西安纸贵互联网科技有限公司 | A kind of across the chain processing method and computer readable storage medium of block catenary system |
CN109011583A (en) * | 2018-05-28 | 2018-12-18 | 腾讯科技(深圳)有限公司 | virtual resource transfer method and device, storage medium and electronic device |
CN109146448A (en) * | 2018-07-13 | 2019-01-04 | 杭州复杂美科技有限公司 | Across chain assets transfer method, equipment and storage medium |
CN109242456A (en) * | 2018-09-04 | 2019-01-18 | 湖南宸瀚信息科技有限责任公司 | Across the chain method of commerce of block chain, system and storage medium |
CN109242485A (en) * | 2018-08-13 | 2019-01-18 | 阿里巴巴集团控股有限公司 | Block chain method of commerce and device, electronic equipment |
CN109325762A (en) * | 2018-08-30 | 2019-02-12 | 杭州复杂美科技有限公司 | Across the chain method of commerce of parallel chain, equipment and storage medium |
CN109359959A (en) * | 2018-09-29 | 2019-02-19 | 衢州学院 | Across chain assets transfer method, equipment and storage medium |
US20190081773A1 (en) * | 2017-09-12 | 2019-03-14 | Northwestern University | Peer auditing in a blockchain distribution network |
CN109685489A (en) * | 2018-12-28 | 2019-04-26 | 杭州云象网络技术有限公司 | A kind of assets across chain method of commerce between block chain |
CN109726251A (en) * | 2018-12-28 | 2019-05-07 | 苏州鸿链信息科技有限公司 | A kind of across chain distributed business system and method based on the development of block chain |
CN109784921A (en) * | 2018-12-29 | 2019-05-21 | 广州蓝石信息技术有限公司 | General across chain communication mechanism based on decentralization gateway |
-
2019
- 2019-05-29 CN CN201910456755.5A patent/CN110245517A/en active Pending
Patent Citations (22)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105488722A (en) * | 2015-11-30 | 2016-04-13 | 布比(北京)网络技术有限公司 | Asset data processing method and device based on derivation chain |
WO2018073564A1 (en) * | 2016-10-17 | 2018-04-26 | Arm Ltd | Blockchain mining using trusted nodes |
US20190081773A1 (en) * | 2017-09-12 | 2019-03-14 | Northwestern University | Peer auditing in a blockchain distribution network |
CN107679857A (en) * | 2017-10-10 | 2018-02-09 | 马晶瑶 | Across the chain method of commerce and storage medium of block chain |
CN107888562A (en) * | 2017-10-13 | 2018-04-06 | 布比(北京)网络技术有限公司 | Interconnect serobila architecture |
CN108009811A (en) * | 2017-11-30 | 2018-05-08 | 中国人民解放军国防科技大学 | Inter-cloud computing environment value exchange-oriented cross-chain communication method |
CN108269190A (en) * | 2018-01-17 | 2018-07-10 | 深圳四方精创资讯股份有限公司 | Across chain method and its system based on across chain relaying platform |
CN108288159A (en) * | 2018-03-07 | 2018-07-17 | 物数(上海)信息科技有限公司 | Across chain method of commerce, system, equipment and storage medium based on multi-tiling chain |
CN108768659A (en) * | 2018-05-24 | 2018-11-06 | 深圳前海益链网络科技有限公司 | Across the chain tra nsfer system of Token assets between a kind of different blocks chain network |
CN109011583A (en) * | 2018-05-28 | 2018-12-18 | 腾讯科技(深圳)有限公司 | virtual resource transfer method and device, storage medium and electronic device |
CN108876607A (en) * | 2018-05-29 | 2018-11-23 | 阿里巴巴集团控股有限公司 | Assets transfer method and device, electronic equipment |
CN108881187A (en) * | 2018-05-31 | 2018-11-23 | 杭州秘猿科技有限公司 | A kind of across chain data transferring method and equipment suitable for permitting chain scene |
CN109035012A (en) * | 2018-06-11 | 2018-12-18 | 西安纸贵互联网科技有限公司 | A kind of across the chain processing method and computer readable storage medium of block catenary system |
CN108880794A (en) * | 2018-06-15 | 2018-11-23 | 浙江华信区块链科技服务有限公司 | Across chain user identity and its digital asset management system |
CN109146448A (en) * | 2018-07-13 | 2019-01-04 | 杭州复杂美科技有限公司 | Across chain assets transfer method, equipment and storage medium |
CN109242485A (en) * | 2018-08-13 | 2019-01-18 | 阿里巴巴集团控股有限公司 | Block chain method of commerce and device, electronic equipment |
CN109325762A (en) * | 2018-08-30 | 2019-02-12 | 杭州复杂美科技有限公司 | Across the chain method of commerce of parallel chain, equipment and storage medium |
CN109242456A (en) * | 2018-09-04 | 2019-01-18 | 湖南宸瀚信息科技有限责任公司 | Across the chain method of commerce of block chain, system and storage medium |
CN109359959A (en) * | 2018-09-29 | 2019-02-19 | 衢州学院 | Across chain assets transfer method, equipment and storage medium |
CN109685489A (en) * | 2018-12-28 | 2019-04-26 | 杭州云象网络技术有限公司 | A kind of assets across chain method of commerce between block chain |
CN109726251A (en) * | 2018-12-28 | 2019-05-07 | 苏州鸿链信息科技有限公司 | A kind of across chain distributed business system and method based on the development of block chain |
CN109784921A (en) * | 2018-12-29 | 2019-05-21 | 广州蓝石信息技术有限公司 | General across chain communication mechanism based on decentralization gateway |
Cited By (28)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11232441B2 (en) | 2019-10-30 | 2022-01-25 | Accenture Global Solutions Limited | Cryptologic coordinated symmetric conditional key release |
US11551204B2 (en) | 2019-10-30 | 2023-01-10 | Accenture Global Solutions Limited | Leading-party-initiated cryptologic coordinated symmetric conditional key release |
CN111368003B (en) * | 2020-03-06 | 2020-10-16 | 安徽中科智链信息科技有限公司 | Management method of multi-chain anchoring data |
CN111368003A (en) * | 2020-03-06 | 2020-07-03 | 安徽中科智链信息科技有限公司 | Management method of multi-chain anchoring data |
CN111539723A (en) * | 2020-04-14 | 2020-08-14 | 浙江浙燃能源有限公司 | Block chain transaction recording method, equipment, block chain node and computer medium |
CN111666336A (en) * | 2020-05-15 | 2020-09-15 | 西安纸贵互联网科技有限公司 | Data intercommunication method and system among block chains and electronic equipment |
CN111666336B (en) * | 2020-05-15 | 2023-05-23 | 西安纸贵互联网科技有限公司 | Method, system and electronic equipment for data intercommunication among block chains |
CN112003889A (en) * | 2020-07-10 | 2020-11-27 | 南京邮电大学 | Distributed cross-chain system and cross-chain information interaction and system access control mechanism |
CN112003889B (en) * | 2020-07-10 | 2022-11-08 | 南京邮电大学 | Distributed cross-link system and cross-link information interaction and system access control method |
CN112104607A (en) * | 2020-08-13 | 2020-12-18 | 北京新盛云佳科技有限公司 | Method, device, network node and storage medium for cross-link communication |
CN112104607B (en) * | 2020-08-13 | 2023-03-21 | 北京新盛云佳科技有限公司 | Method, device, network node and storage medium for cross-link communication |
CN112381650A (en) * | 2020-11-18 | 2021-02-19 | 西安纸贵互联网科技有限公司 | Cross-chain interoperation transaction processing method and device, electronic equipment and storage medium |
CN112381650B (en) * | 2020-11-18 | 2024-02-27 | 西安纸贵互联网科技有限公司 | Cross-chain interoperation transaction processing method, device, electronic equipment and storage medium |
CN112200681A (en) * | 2020-12-04 | 2021-01-08 | 腾讯科技(深圳)有限公司 | Service processing method, information processing method and node equipment of block chain network |
CN112200681B (en) * | 2020-12-04 | 2021-05-28 | 腾讯科技(深圳)有限公司 | Service processing method, information processing method and node equipment of block chain network |
CN112953999B (en) * | 2020-12-29 | 2024-05-24 | 合肥达朴汇联科技有限公司 | Block chain information cross-chain interaction method, system and equipment applied to t1 node |
CN112953999A (en) * | 2020-12-29 | 2021-06-11 | 合肥达朴汇联科技有限公司 | Block chain information cross-chain interaction method, system and equipment applied to t1 node |
CN112927075A (en) * | 2021-02-26 | 2021-06-08 | 北京百度网讯科技有限公司 | Processing method and device for cross-chain transaction, electronic equipment and readable storage medium |
CN112927075B (en) * | 2021-02-26 | 2023-11-17 | 北京百度网讯科技有限公司 | Processing method and device of cross-chain transaction, electronic equipment and readable storage medium |
CN112995211A (en) * | 2021-04-21 | 2021-06-18 | 腾讯科技(深圳)有限公司 | Data processing method, device and equipment based on block chain network and storage medium |
CN113179273A (en) * | 2021-04-29 | 2021-07-27 | 杭州丽冠科技有限公司 | Block chain side chain-based block header verification method and device and computer-readable storage medium |
CN113328997A (en) * | 2021-05-10 | 2021-08-31 | 东软集团股份有限公司 | Alliance chain cross-chain system and method |
CN113377875B (en) * | 2021-06-29 | 2024-03-22 | 北京百度网讯科技有限公司 | Cross-chain data processing method and device, electronic equipment and readable storage medium |
CN113420090A (en) * | 2021-06-29 | 2021-09-21 | 北京百度网讯科技有限公司 | Cross-chain processing method and device, electronic equipment and readable storage medium |
CN113377875A (en) * | 2021-06-29 | 2021-09-10 | 北京百度网讯科技有限公司 | Cross-link data processing method and device, electronic equipment and readable storage medium |
CN113781228A (en) * | 2021-09-18 | 2021-12-10 | 北京俩撇科技有限公司 | Cross-chain asset transfer method, device, equipment and storage medium |
CN115225639B (en) * | 2022-09-15 | 2022-12-27 | 杭州趣链科技有限公司 | Changing method and device for consensus trusted cluster, computer equipment and medium |
CN115225639A (en) * | 2022-09-15 | 2022-10-21 | 杭州趣链科技有限公司 | Changing method and device of consensus trusted cluster, computer equipment and medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110245517A (en) | A kind of across chain method, apparatus, system and the electronic equipment of block chain | |
US11190342B2 (en) | Transaction processing in a service blockchain | |
US11195231B2 (en) | Transaction processing in a service blockchain | |
CN110766550B (en) | Asset query method and device based on block chain and electronic equipment | |
US11321783B2 (en) | Method and device for data processing based on blockchain | |
Singh et al. | Branch based blockchain technology in intelligent vehicle | |
CN111026789B (en) | Block chain-based electronic bill query method and device and electronic equipment | |
US20210166326A1 (en) | Claim settlement method and apparatus employing blockchain technology | |
CN111539731A (en) | Block chain-based federal learning method and device and electronic equipment | |
EP3961974B1 (en) | Block content editing methods and apparatuses | |
US11270388B2 (en) | Blockchain-based data processing method and apparatus | |
CN108648078A (en) | A kind of transaction preprocess method, device and electronic equipment | |
CN110009435A (en) | Based on the invoice method of charging out and device of block chain, electronic equipment | |
CN108665946A (en) | A kind of access method and device of business datum | |
EP3779760B1 (en) | Blockchain-based data processing method and apparatus, and electronic device | |
CN110505311A (en) | A kind of across the chain exchange method of isomorphism block chain and system | |
TWI737118B (en) | Method, device and electronic equipment for reconciliation based on alliance chain | |
CN108804706A (en) | Block chain data processing method, device, equipment and storage medium | |
CN111818095B (en) | Tax refunding method and device based on block chain and electronic equipment | |
CN110012100A (en) | A kind of the block chain common recognition method, apparatus and electronic equipment of bandwidth optimization | |
US20210319456A1 (en) | Methods, apparatuses, devices, and systems for generating customs clearance confirmation information | |
Diáz et al. | Automatic verification of the TLS handshake protocol | |
Xu et al. | Exploring blockchain technology through a modular lens: A survey | |
CN110033367A (en) | Based on the contract record method and device of block chain, electronic equipment | |
CN110428259A (en) | Block chain business datum transaction system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190917 |
|
RJ01 | Rejection of invention patent application after publication |