CN110245517A - A kind of across chain method, apparatus, system and the electronic equipment of block chain - Google Patents

A kind of across chain method, apparatus, system and the electronic equipment of block chain Download PDF

Info

Publication number
CN110245517A
CN110245517A CN201910456755.5A CN201910456755A CN110245517A CN 110245517 A CN110245517 A CN 110245517A CN 201910456755 A CN201910456755 A CN 201910456755A CN 110245517 A CN110245517 A CN 110245517A
Authority
CN
China
Prior art keywords
block chain
block
chain
locking
relaying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910456755.5A
Other languages
Chinese (zh)
Inventor
王博
曾兵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Cryptape Co ltd
Original Assignee
Cryptape Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cryptape Co ltd filed Critical Cryptape Co ltd
Priority to CN201910456755.5A priority Critical patent/CN110245517A/en
Publication of CN110245517A publication Critical patent/CN110245517A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Computing Systems (AREA)
  • Economics (AREA)
  • Data Mining & Analysis (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

This specification embodiment is related to across chain method, apparatus, system and the electronic equipment of a kind of block chain, using in the side chain after under mode across in catenary system, specifically include that relaying read underlying scenario where the locking that generates after locking underlying scenario of the first block chain prove;Locking is proved to be sent to the second block chain, locks proof and verify for triggering the second block chain to locking proof, and the generation mapping assets corresponding with the underlying scenario after being proved to be successful by relaying;Wherein, the relaying is the full node for going to trust to the first block chain and the second block chain with access authority.Meet the condition of credible setting due to relaying, the as full node of main chain and side chain, the third party across chain mutual concession can be become to relay and across chain service is provided, it does not need to go to generate the relaying that can be trusted by complicated means in the prior art, to simplify the setting mechanism of relaying, by going the relaying trusted to simplify across chain service, and promote across chain transaction security.

Description

A kind of across chain method, apparatus, system and the electronic equipment of block chain
Technical field
This specification embodiment be related to network technique field more particularly to a kind of across the chain method, apparatus system of block chain and Electronic equipment.
Background technique
In block chain field, no matter across chain technology is exactly realized value internet for publicly-owned chain or privately owned chain Key.
In the problems that block chain is faced, between block chain intercommunity high degree limit block chain across chain The application space of technology.Across chain technology has at present: notary's mode (Notary schemes), side chain/relaying (Sidechains/relays), Hash lock-in techniques, distributed private key control technology etc. respectively correspond different across chain modes.
However, current across chain technology, especially across the chain technology under side chain/repeater mode, relaying setting is more multiple It is miscellaneous, so as to cause under the mode across chain, complicated operation.
Summary of the invention
This specification embodiment provides a kind of across the chain method, apparatus of block chain, system and electronic equipment, existing to solve The problem of across chain service operations complexity present in across the chain scheme of technology.
In order to solve the above-mentioned technical problem, this specification embodiment adopts the following technical solutions:
In a first aspect, provide a kind of across the chain method of block chain, using in the side chain after under mode across in catenary system, The described method includes:
The locking that the first block chain where relaying reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain by the relaying, and the locking is proved for triggering secondth area Block chain verifies locking proof, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the relaying is to go to trust with access authority to the first block chain and the second block chain Full node.
Second aspect, provide a kind of block chain across chain apparatus, using in the side chain after under mode across in catenary system, Described device includes:
Read module, the lock generated after locking the underlying scenario for the first block chain where reading underlying scenario It is fixed to prove;
Sending module, for locking proof to be sent to the second block chain, the locking proves described for triggering Second block chain verifies locking proof, and mapping money corresponding with the underlying scenario is generated after being proved to be successful It produces;
Wherein, the relaying is to go to trust with access authority to the first block chain and the second block chain Full node.
The third aspect, provide a kind of block chain across catenary system, comprising: the first block chain, the second block chain and in After;
The first block chain locks underlying scenario;
The relaying, the lock that the first block chain where reading underlying scenario generates after locking the underlying scenario It is fixed to prove;And locking proof is sent to the second block chain;
The second block chain is verified locking proof, and is generated and the primary money after being proved to be successful Produce corresponding mapping assets;
Wherein, the relaying is to go to trust with access authority to the first block chain and the second block chain Full node.
Fourth aspect provides a kind of electronic equipment, comprising: memory, processor and is stored on the memory simultaneously The computer program that can be run on the processor, the computer program are executed by the processor:
The locking that the first block chain where reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain, the locking is proved for triggering the second block chain to institute Stating locking proves to be verified, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the electronic equipment is there is access authority to write to the first block chain and the second block chain The full node appointed.
5th aspect, provides a kind of computer readable storage medium, the computer-readable recording medium storage one Or multiple programs, one or more of programs are when the electronic equipment for being included multiple application programs executes, so that the electricity Sub- equipment executes following operation:
The locking that the first block chain where reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain, the locking is proved for triggering the second block chain to institute Stating locking proves to be verified, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the electronic equipment is there is access authority to write to the first block chain and the second block chain The full node appointed.
This specification embodiment use at least one above-mentioned technical solution can reach it is following the utility model has the advantages that
By this specification technical solution, relaying can not forge Transaction Information, only the locking of trading activity be submitted to prove, As long as the as full node of main chain and side chain can become the third across chain mutual concession so meet the condition of credible setting Fang Zhongji simultaneously provides across chain service, does not need to go to generate the relaying that can be trusted by complicated means in the prior art, thus The setting mechanism for simplifying relaying, by going the relaying trusted to simplify across chain service, and can be by the accounting nodes across chain both sides Alteration, which timely updates, is synchronized to other side, prevents from relaying and do evil together with the invalid accounting nodes left one's post, and guarantees across chain service Safety.In addition, it is not necessary that the block head Hash of all blocks, it is only necessary to track (the final change of effective accounting nodes Accounting nodes afterwards, can with when be individually also possible to the set of multiple accounting nodes) and across chain transaction occur when where block Block head Hash transaction is verified, thus, simplify across chain operation, promote across chain efficiency on the whole.
Detailed description of the invention
In order to illustrate more clearly of this specification embodiment or technical solution in the prior art, below will to embodiment or Attached drawing needed to be used in the description of the prior art is briefly described, it should be apparent that, the accompanying drawings in the following description is only The some embodiments recorded in this specification embodiment are not paying creative labor for those of ordinary skill in the art Under the premise of dynamic property, it is also possible to obtain other drawings based on these drawings.
Fig. 1 a is step schematic diagram one of of the block chain across chain method that this specification embodiment provides;
Fig. 1 b is the two of step schematic diagram of the block chain across chain method that this specification embodiment provides;
Fig. 2 is the three of step schematic diagram of the block chain across chain method that this specification embodiment provides;
Fig. 3 is structural schematic diagram of the block chain across chain apparatus that this specification embodiment provides;
Fig. 4 is structural schematic diagram of the block chain across catenary system that this specification embodiment provides;
Fig. 5 is the structural schematic diagram for the electronic equipment that this specification embodiment provides.
Specific embodiment
To keep the purposes, technical schemes and advantages of this specification embodiment clearer, have below in conjunction with this specification The technical solution of this specification embodiment is clearly and completely described in body embodiment and corresponding attached drawing.Obviously, described Embodiment be only this specification a part of the embodiment, instead of all the embodiments.The embodiment of base in this manual, this Field those of ordinary skill every other embodiment obtained without making creative work, belongs to this explanation The range of book embodiment protection.
Below in conjunction with attached drawing, the technical solution that each embodiment of this specification provides is described in detail.
It should be noted that for side chain/relaying (Sidechains/relays) mode in across chain service, across chain side Formula are as follows: assuming that thering is A chain and B chain to need to interact, but A chain and B chain can not intercommunications.At this moment a relaying Relayer energy can be set A chain and B chain are read, then, which just as " on the chain " intermediary for linking A chain and B chain, is properly termed as " relaying ", entirely It is exactly " A-C-B " across chain process.However, it is contemplated that in current across chain scheme or needing to believe the part relaying Relayer Appoint, is biased to notary's mode;The setting for relaying Relayer is excessively complicated, such as: exist between multiple relaying Relayer Competitive relation needs through mortgage token competition, and supervises and do evil by reporting.This specification embodiment simplifies relaying The setting mechanism of Relayer, by setting across chain mutual concession for relaying after credible setting and having simultaneously to across chain both sides The full node for going to trust of access authority, to realize simplified and safety across chain service between across chain both sides.
Embodiment one
Referring to Fig.1 shown in a, for step schematic diagram of a kind of block chain across chain method that this specification embodiment provides, institute State across chain method apply under side chain/repeater mode across in catenary system, wherein across may include main chain, side chain in catenary system And the relaying across chain service is provided for main chain and side chain, which can be an independent block chain node or is located at area Functional module on block chain node.It should be understood that the block chain can be decentralization trading floor across the application scenarios of chain scheme Scape or exchange of assets scene etc..
Across the chain method may comprise steps of:
Step 102: the lock that the first block chain where relaying reading underlying scenario generates after locking the underlying scenario It is fixed to prove.
It should be understood that the first block chain can be across the side chain in catenary system, underlying scenario is provided on the side chain.Side Chain can lock underlying scenario in across chain service process, be executed with freezing or suspending underlying scenario on side chain except this Other assets transaction except secondary across chain transaction.
Step 104: locking proof is sent to the second block chain by the relaying, and the locking is proved for triggering It states the second block chain to verify locking proof, and generates mapping corresponding with the underlying scenario after being proved to be successful Assets.
The second block chain can be across the main chain in catenary system, which can be by way of anchoring in itself institute Mapping assets corresponding with underlying scenario are mapped on chain.For example, underlying scenario X on side chain, can generate mapping on main chain Assets X ';Wherein, underlying scenario X can be equal with the value of mapping assets X '.
Wherein, the relaying is to go to trust with access authority to the first block chain and the second block chain Full node.
It should be noted that relaying can be online lower determination, which can have visit to main chain and side chain simultaneously Ask permission, in other words, relaying can be the full node of main chain and side chain simultaneously.Full node refers to that maintenance includes all transaction letters The node of the intact block chain of breath, the node can verify any Transaction Information independently, without by it is any its Its node or other information.
In this specification embodiment, relaying can not forge Transaction Information, only the locking of trading activity be submitted to prove, institute As long as the third party across chain mutual concession can be become to meet the condition of credible setting, the as full node of main chain and side chain Across chain service is relayed and provided, does not need to go to generate the relaying that can be trusted by complicated means in the prior art, thus simple The setting mechanism for changing relaying by going the relaying trusted to simplify across chain service, and promotes across chain transaction security.
Optionally, in actual across chain operation, underlying scenario can be locked in the first block chain, and in the second block chain Mapping assets are generated, thus, the transfer of assets is realized, to carry out transaction in assets on the second block chain.In addition, in the secondth area When the mapping assets that block chain generates do not need, it can be reversed and the first block chain, referring to Fig.1 shown in b, the side are returned into assets transfer Method further include:
Step 106: the second block chain where the relaying reading mapping assets is after destroying the mapping assets The unlock of generation proves.
Step 108: unlock proof is sent to the first block chain by the relaying, and the unlock is proved for touching It sends out the first block chain described and unlock proof is verified, and unlock the underlying scenario after being proved to be successful.
Optionally, the locking proves to carry at least one block checkpoint of the first block chain;
When the second block chain verifies locking proof, specifically include: the second block chain is to described Locking prove in the block head information of the effective block of at least one block checkpoint that carries carry out verifying and to it is described extremely The corresponding accounting nodes of block height of a few block checkpoint are verified;
And/or;
The unlock proves to carry at least one block checkpoint of the second block chain;
When the first block chain verifies unlock proof, specifically include: the first block chain is to described Unlock prove in the block head information of the effective block of at least one block checkpoint that carries carry out verifying and to it is described extremely The corresponding accounting nodes of block height of a few block checkpoint are verified.
As a result, when transaction verification between being serviced across chain, does not need to track whole block head information, and only need to track The corresponding accounting nodes of height of the block head information and the block head of block are verified where across chain transaction occurs.Because Relaying is believable, then need to only determine that side chain is remembered when main chain receives the proof of the behavior comprising transaction on the side chain that relaying is submitted Account node does not change, and exchange submits the information in proving consistent in the build information of side chain block with relaying.
Optionally, the method also includes:
When monitoring that the accounting nodes of the first block chain change, described relay is sent out to the second block chain Change is sent to prove;
It is described to relay to the first block chain after the second block chain proves that registration is completed according to the change Return registration proves, described to register what proof was generated for triggering the first block end of chain (EOC) by accounting nodes generation change Transaction in assets pausing operation;
And/or;
When monitoring that the accounting nodes of the second block chain change, described relay is sent out to the first block chain Change is sent to prove;
It is described to relay to the second block chain after the first block chain proves that registration is completed according to the change Returning to registration proves, the registration is proved for triggering the assets that the second block end of chain (EOC) is changed by accounting nodes and is generated Trading halt operation.
The accounting nodes alteration across chain both sides can be timely updated by above-mentioned preferred embodiment and be synchronized to other side, prevented It only relays and does evil together with the invalid accounting nodes left one's post, guarantee the safety across chain service.
Optionally, before the first block chain locks underlying scenario, the method also includes:
The accounting nodes of second block chain described in the first block chained record;
The accounting nodes of first block chain described in the second block chained record.
Optionally, the common recognition mechanism that the first block chain and the second block chain use meets:
All accounting nodes are clear;
There are irreversible confirmation delays.
It is illustrated below by embodiment of the specific example to this specification, relaying interaction is passed through with main chain, side chain For.
Referring to shown in Fig. 2, may include:
Step 202: when the accounting nodes for monitoring side chain change, relaying chain linked to owner sends change and proves.
At this point, the transaction in assets that the assets contract on side chain is limited enters halted state.
Step 204: main chain is registered according to change proof.
That is main chain modification information that accounting nodes on side chain are recorded on the chain of itself, to guarantee that subsequent authentication is accurate.
Step 206: relaying to side chain and return to registration proof;
Step 208: side chain is proved according to the registration of return, terminates the transaction in assets that change and generation occur by accounting nodes Pausing operation.
In other words, across chain operation can be entered at this time.
Main chain generates mapping assets X ' to underlying scenario X again after side chain locking:
Step 210: side chain locks underlying scenario X according to across chain assets contract on side chain.
Step 212: relaying proves the behavior of the locked transaction to be submitted to main chain from side chain.
It should be understood that the behavior of the locked transaction proves, does not need the area of all blocks in this specification embodiment Build Hash, it is only necessary to track effective accounting nodes (accounting nodes after final change, can with when be individually also possible to it is multiple The set of accounting nodes) and across chain transaction block head Hash of block where when occurring transaction is verified, thus, simplify Across chain operation, and the synchronization of the modification information by accounting nodes, it can be ensured that accounting nodes that both sides receive other side are Effectively, guarantee the safety across chain service.
Step 214: main chain correspondingly generates mapping assets X '.
It maps assets X ' and unlocks underlying scenario X in side chain after main chain destruction:
Step 216: main chain destroys mapping assets X ' according to across chain assets contract on main chain.
Step 218: relaying proves the behavior that the unlock is traded to be submitted to side chain from main chain.
The effect of the step is identical with the effect of step 212, and this will not be repeated here.
Step 220: side chain correspondingly unlocks underlying scenario X.
It should be understood that scheme shown in above-mentioned Fig. 2 in fact, can also be wrapped so that the accounting nodes on side chain change as an example It is changed containing the accounting nodes on main chain, or, there is a situation where change simultaneously for the accounting nodes on main chain and side chain.
By this specification technical solution, relaying can not forge Transaction Information, only the locking of trading activity be submitted to prove, As long as the as full node of main chain and side chain can become the third across chain mutual concession so meet the condition of credible setting Fang Zhongji simultaneously provides across chain service, does not need to go to generate the relaying that can be trusted by complicated means in the prior art, thus The setting mechanism for simplifying relaying, by going the relaying trusted to simplify across chain service, and can be by the accounting nodes across chain both sides Alteration, which timely updates, is synchronized to other side, prevents from relaying and do evil together with the invalid accounting nodes left one's post, and guarantees across chain service Safety.In addition, it is not necessary that the block head Hash of all blocks, it is only necessary to track (the final change of effective accounting nodes Accounting nodes afterwards, can with when be individually also possible to the set of multiple accounting nodes) and across chain transaction occur when where block Block head Hash transaction is verified, thus, simplify across chain operation, promote across chain efficiency on the whole.
Embodiment two
Referring to shown in Fig. 3, for the structural schematic diagram across chain apparatus for the block chain that this specification embodiment provides, the device It specifically includes that
Read module 302 generates after locking the underlying scenario for the first block chain where reading underlying scenario Locking prove;
Sending module 304, for locking proof to be sent to the second block chain, the locking is proved for triggering It states the second block chain to verify locking proof, and generates mapping corresponding with the underlying scenario after being proved to be successful Assets;
Wherein, the relaying is to go to trust with access authority to the first block chain and the second block chain Full node.
Optionally, the locking proves to carry at least one block checkpoint of the first block chain;
When the second block chain verifies locking proof, specifically include: the second block chain is to described Locking prove in the block head information of the effective block of at least one block checkpoint that carries carry out verifying and to it is described extremely The corresponding accounting nodes of block height of a few block checkpoint are verified;
And/or;
The unlock proves to carry at least one block checkpoint of the second block chain;
When the first block chain verifies unlock proof, specifically include: the first block chain is to described Unlock prove in the block head information of the effective block of at least one block checkpoint that carries carry out verifying and to it is described extremely The corresponding accounting nodes of block height of a few block checkpoint are verified.
Optionally, the sending module, is also used to:
When monitoring that the accounting nodes of the first block chain change, Xiang Suoshu the second block chain sends change card It is bright;And
After the second block chain proves that registration is completed according to the change, Xiang Suoshu the first block chain returns to registration It proves, the registration is proved for triggering the transaction in assets that by accounting nodes change occurs for the first block end of chain (EOC) and generates Pausing operation;
And/or;
The sending module, is also used to:
When monitoring that the accounting nodes of the second block chain change, Xiang Suoshu the first block chain sends change card It is bright;And
After the first block chain proves that registration is completed according to the change, Xiang Suoshu the second block chain returns to registration It proves, the registration proves to suspend for triggering the transaction in assets that the second block end of chain (EOC) is changed by accounting nodes and is generated Operation.
By this specification technical solution, relaying can not forge Transaction Information, only the locking of trading activity be submitted to prove, As long as the as full node of main chain and side chain can become the third across chain mutual concession so meet the condition of credible setting Fang Zhongji simultaneously provides across chain service, does not need to go to generate the relaying that can be trusted by complicated means in the prior art, thus The setting mechanism for simplifying relaying, by going the relaying trusted to simplify across chain service, and can be by the accounting nodes across chain both sides Alteration, which timely updates, is synchronized to other side, prevents from relaying and do evil together with the invalid accounting nodes left one's post, and guarantees across chain service Safety.In addition, it is not necessary that the block head Hash of all blocks, it is only necessary to track (the final change of effective accounting nodes Accounting nodes afterwards, can with when be individually also possible to the set of multiple accounting nodes) and across chain transaction occur when where block Block head Hash transaction is verified, thus, simplify across chain operation, promote across chain efficiency on the whole.
It should be understood that can be relaying across chain apparatus described in the present embodiment two, being somebody's turn to do can be with functional module across chain apparatus Form executes all technical solutions involved in across chain method, and realizes relevant art effect, and this will not be repeated here.
Embodiment three
This specification embodiment also provide a kind of block chain across catenary system, referring now still to shown in Fig. 4, comprising: the first block Chain 402, the second block chain 404 and relaying 406;
The first block chain 402 locks underlying scenario;
The relaying 406, the first block chain 402 where reading underlying scenario are raw after locking the underlying scenario At locking prove;And locking proof is sent to the second block chain 404;
The second block chain 404, to the locking proof verify, and after being proved to be successful generate with it is described primary The corresponding mapping assets of assets;
Wherein, the relaying 406 is to have access authority to the first block chain 402 and the second block chain 406 Go trust full node.
Example IV
The electronic equipment of this specification embodiment is discussed in detail referring to Fig. 5.Referring to FIG. 5, in hardware view, the electricity Sub- equipment includes processor, optionally further comprising internal bus, network interface, memory.Wherein, memory may be comprising interior It deposits, such as high-speed random access memory (Random-Access Memory, RAM), it is also possible to further include non-volatile memories Device (Non-Volatile Memory), for example, at least 1 magnetic disk storage etc..Certainly, which is also possible that other Hardware required for business.
Processor, network interface and memory can be connected with each other by internal bus, which can be industry Standard architecture (Industry Standard Architecture, ISA) bus, Peripheral Component Interconnect standard (Peripheral Component Interconnect, PCI) bus or expanding the industrial standard structure (Extended Industry Standard Architecture, EISA) bus etc..The bus can be divided into address bus, data/address bus, Control bus etc..Only to be indicated with a four-headed arrow in Fig. 5, it is not intended that an only bus or one kind convenient for indicating The bus of type.
Memory, for storing program.Specifically, program may include program code, and said program code includes calculating Machine operational order.Memory may include memory and nonvolatile memory, and provide instruction and data to processor.
Processor is from the then operation into memory of corresponding computer program is read in nonvolatile memory, in logical layer On face formed block chain across chain apparatus.Processor executes the program that memory is stored, and is specifically used for executing described previously Block chain across chain apparatus as executing subject when performed method operation.
Method disclosed in the above-mentioned implementation example figure 1a- embodiment illustrated in fig. 2 such as this specification can be applied in processor, or Person is realized by processor.Processor may be a kind of IC chip, the processing capacity with signal.During realization, Each step of the above method can be completed by the integrated logic circuit of the hardware in processor or the instruction of software form.On The processor stated can be at general processor, including central processing unit (Central Processing Unit, CPU), network Manage device (Network Processor, NP) etc.;Can also be digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate Array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or crystalline substance Body pipe logical device, discrete hardware components.It may be implemented or execute disclosed each method, the step in this specification embodiment And logic diagram.General processor can be microprocessor or the processor is also possible to any conventional processor etc..Knot The step of closing method disclosed in this specification embodiment can be embodied directly in hardware decoding processor and execute completion, Huo Zheyong Hardware and software module combination in decoding processor execute completion.Software module can be located at random access memory, flash memory, read-only The storage medium of this fields such as memory, programmable read only memory or electrically erasable programmable memory, register maturation In.The storage medium is located at memory, and processor reads the information in memory, and the step of the above method is completed in conjunction with its hardware Suddenly.
The method that the electronic equipment can also carry out Fig. 1 a- Fig. 2, and realize block chain across chain implementation shown in Fig. 1 a- Fig. 2 The function of example, details are not described herein for this specification embodiment.
Certainly, other than software realization mode, other realization sides are not precluded in the electronic equipment of this specification embodiment Formula, such as logical device or the mode of software and hardware combining etc., that is to say, that the executing subject of following process flow is simultaneously unlimited Due to each logic unit, it is also possible to hardware or logical device.
Embodiment five
This specification embodiment also provides a kind of computer readable storage medium, the computer-readable recording medium storage One or more programs, one or more of programs are when the server for being included multiple application programs executes, so that described Server executes following operation:
The locking that the first block chain where reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain, the locking is proved for triggering the second block chain to institute Stating locking proves to be verified, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the electronic equipment is there is access authority to write to the first block chain and the second block chain The full node appointed.
Wherein, the computer readable storage medium, such as read-only memory (Read-Only Memory, ROM), at random Access memory (Random Access Memory, RAM), magnetic or disk etc..
In short, being not intended to limit this specification the foregoing is merely the preferred embodiment of this specification embodiment The protection scope of embodiment.It is all this specification embodiment spirit and principle within, made any modification, equivalent replacement, Improve etc., it should be included within the protection scope of this specification embodiment.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
Various embodiments are described in a progressive manner in this specification embodiment, identical phase between each embodiment As partially may refer to each other, each embodiment focuses on the differences from other embodiments.Especially for For system embodiment, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to method The part of embodiment illustrates.

Claims (13)

1. a kind of across chain method of block chain, using in the side chain after under mode across in catenary system, which comprises
The locking that the first block chain where relaying reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain by the relaying, and the locking is proved for triggering the second block chain Locking proof is verified, and generates mapping assets corresponding with the underlying scenario after being proved to be successful;
Wherein, the relaying is the full section for going to trust to the first block chain and the second block chain with access authority Point.
2. the method as described in claim 1, the method also includes:
The second block chain where the relaying reads the mapping assets is destroying the unlock card for mapping and generating after assets It is bright;
Unlock proof is sent to the first block chain by the relaying, and the unlock is proved for triggering firstth area Block chain verifies unlock proof, and the underlying scenario is unlocked after being proved to be successful.
3. method according to claim 1 or 2, the locking proves to carry at least one block inspection of the first block chain Point;
When the second block chain verifies locking proof, specifically include: the second block chain is to the locking The block head information of the effective block of at least one the block checkpoint carried in proof carries out verifying and to described at least one The corresponding accounting nodes of block height of a block checkpoint are verified;
And/or;
The unlock proves to carry at least one block checkpoint of the second block chain;
When the first block chain verifies unlock proof, specifically include: the first block chain is to the unlock The block head information of the effective block of at least one the block checkpoint carried in proof carries out verifying and to described at least one The corresponding accounting nodes of block height of a block checkpoint are verified.
4. it is method according to claim 1 or 2, the method also includes:
When monitoring that the accounting nodes of the first block chain change, described relay to the second block chain sends change More prove;
After the second block chain proves that registration is completed according to the change, described relay returns to the first block chain Registration proves that the registration is proved for triggering the assets that by accounting nodes change occurs for the first block end of chain (EOC) and generates Trading halt operation;
And/or;
When monitoring that the accounting nodes of the second block chain change, described relay to the first block chain sends change More prove;
After the first block chain proves that registration is completed according to the change, described relay returns to the second block chain Registration proves that the registration is proved for triggering the transaction in assets that the second block end of chain (EOC) is changed by accounting nodes and is generated Pausing operation.
5. the method as described in claim 1, before the first block chain locks underlying scenario, the method also includes:
The accounting nodes of second block chain described in the first block chained record;
The accounting nodes of first block chain described in the second block chained record.
6. the common recognition mechanism that the method as described in claim 1, the first block chain and the second block chain use meets:
All accounting nodes are clear;
There are irreversible confirmation delays.
7. a kind of block chain across chain apparatus, using in the side chain after across in catenary system, described device includes: under mode
Read module, the locking card generated after locking the underlying scenario for the first block chain where reading underlying scenario It is bright;
Sending module, for locking proof to be sent to the second block chain, the locking is proved for triggering described second Block chain verifies locking proof, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the relaying is the full section for going to trust to the first block chain and the second block chain with access authority Point.
8. device as claimed in claim 7,
The read module, the second block chain where being also used to read the mapping assets are raw after destroying the mapping assets At unlock prove;
The sending module is also used to prove the unlock to be sent to the first block chain, and the unlock is proved for touching It sends out the first block chain described and unlock proof is verified, and unlock the underlying scenario after being proved to be successful.
9. device as claimed in claim 7 or 8, the locking proves to carry at least one block inspection of the first block chain Point;
When the second block chain verifies locking proof, specifically include: the second block chain is to the locking The block head information of the effective block of at least one the block checkpoint carried in proof carries out verifying and to described at least one The corresponding accounting nodes of block height of a block checkpoint are verified;
And/or;
The unlock proves to carry at least one block checkpoint of the second block chain;
When the first block chain verifies unlock proof, specifically include: the first block chain is to the unlock The block head information of the effective block of at least one the block checkpoint carried in proof carries out verifying and to described at least one The corresponding accounting nodes of block height of a block checkpoint are verified.
10. device as claimed in claim 7 or 8, the sending module, are also used to:
When monitoring that the accounting nodes of the first block chain change, Xiang Suoshu the second block chain sends change and proves; And
After the second block chain proves that registration is completed according to the change, Xiang Suoshu the first block chain returns to registration card Bright, the registration proves temporary for triggering the transaction in assets that by accounting nodes change occurs for the first block end of chain (EOC) and generates Stop operating;
And/or;
The sending module, is also used to:
When monitoring that the accounting nodes of the second block chain change, Xiang Suoshu the first block chain sends change and proves; And
After the first block chain proves that registration is completed according to the change, Xiang Suoshu the second block chain returns to registration card Bright, the registration is proved for triggering the transaction in assets pause behaviour that the second block end of chain (EOC) is changed by accounting nodes and is generated Make.
11. a kind of block chain across catenary system, comprising: the first block chain, the second block chain and relaying;
The first block chain locks underlying scenario;
The relaying, the locking card that the first block chain where reading underlying scenario generates after locking the underlying scenario It is bright;And locking proof is sent to the second block chain;
The second block chain is verified locking proof, and is generated and the underlying scenario pair after being proved to be successful The mapping assets answered;
Wherein, the relaying is the full section for going to trust to the first block chain and the second block chain with access authority Point.
12. a kind of electronic equipment, comprising: memory, processor and be stored on the memory and can be on the processor The computer program of operation, the computer program are executed by the processor:
The locking that the first block chain where reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain, the locking is proved for triggering the second block chain to the lock It is fixed to prove to be verified, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the electronic equipment is to go to trust with access authority to the first block chain and the second block chain Full node.
13. a kind of computer readable storage medium, the computer-readable recording medium storage one or more program, described one A or multiple programs are when the electronic equipment for being included multiple application programs executes, so that the electronic equipment executes following behaviour Make:
The locking that the first block chain where reading underlying scenario generates after locking the underlying scenario proves;
Locking proof is sent to the second block chain, the locking is proved for triggering the second block chain to the lock It is fixed to prove to be verified, and mapping assets corresponding with the underlying scenario are generated after being proved to be successful;
Wherein, the electronic equipment is to go to trust with access authority to the first block chain and the second block chain Full node.
CN201910456755.5A 2019-05-29 2019-05-29 A kind of across chain method, apparatus, system and the electronic equipment of block chain Pending CN110245517A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910456755.5A CN110245517A (en) 2019-05-29 2019-05-29 A kind of across chain method, apparatus, system and the electronic equipment of block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910456755.5A CN110245517A (en) 2019-05-29 2019-05-29 A kind of across chain method, apparatus, system and the electronic equipment of block chain

Publications (1)

Publication Number Publication Date
CN110245517A true CN110245517A (en) 2019-09-17

Family

ID=67885437

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910456755.5A Pending CN110245517A (en) 2019-05-29 2019-05-29 A kind of across chain method, apparatus, system and the electronic equipment of block chain

Country Status (1)

Country Link
CN (1) CN110245517A (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111368003A (en) * 2020-03-06 2020-07-03 安徽中科智链信息科技有限公司 Management method of multi-chain anchoring data
CN111539723A (en) * 2020-04-14 2020-08-14 浙江浙燃能源有限公司 Block chain transaction recording method, equipment, block chain node and computer medium
CN111666336A (en) * 2020-05-15 2020-09-15 西安纸贵互联网科技有限公司 Data intercommunication method and system among block chains and electronic equipment
CN112003889A (en) * 2020-07-10 2020-11-27 南京邮电大学 Distributed cross-chain system and cross-chain information interaction and system access control mechanism
CN112104607A (en) * 2020-08-13 2020-12-18 北京新盛云佳科技有限公司 Method, device, network node and storage medium for cross-link communication
CN112200681A (en) * 2020-12-04 2021-01-08 腾讯科技(深圳)有限公司 Service processing method, information processing method and node equipment of block chain network
CN112381650A (en) * 2020-11-18 2021-02-19 西安纸贵互联网科技有限公司 Cross-chain interoperation transaction processing method and device, electronic equipment and storage medium
CN112927075A (en) * 2021-02-26 2021-06-08 北京百度网讯科技有限公司 Processing method and device for cross-chain transaction, electronic equipment and readable storage medium
CN112953999A (en) * 2020-12-29 2021-06-11 合肥达朴汇联科技有限公司 Block chain information cross-chain interaction method, system and equipment applied to t1 node
CN112995211A (en) * 2021-04-21 2021-06-18 腾讯科技(深圳)有限公司 Data processing method, device and equipment based on block chain network and storage medium
CN113179273A (en) * 2021-04-29 2021-07-27 杭州丽冠科技有限公司 Block chain side chain-based block header verification method and device and computer-readable storage medium
CN113328997A (en) * 2021-05-10 2021-08-31 东软集团股份有限公司 Alliance chain cross-chain system and method
CN113377875A (en) * 2021-06-29 2021-09-10 北京百度网讯科技有限公司 Cross-link data processing method and device, electronic equipment and readable storage medium
CN113420090A (en) * 2021-06-29 2021-09-21 北京百度网讯科技有限公司 Cross-chain processing method and device, electronic equipment and readable storage medium
CN113781228A (en) * 2021-09-18 2021-12-10 北京俩撇科技有限公司 Cross-chain asset transfer method, device, equipment and storage medium
US11232441B2 (en) 2019-10-30 2022-01-25 Accenture Global Solutions Limited Cryptologic coordinated symmetric conditional key release
CN115225639A (en) * 2022-09-15 2022-10-21 杭州趣链科技有限公司 Changing method and device of consensus trusted cluster, computer equipment and medium
US11551204B2 (en) 2019-10-30 2023-01-10 Accenture Global Solutions Limited Leading-party-initiated cryptologic coordinated symmetric conditional key release

Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488722A (en) * 2015-11-30 2016-04-13 布比(北京)网络技术有限公司 Asset data processing method and device based on derivation chain
CN107679857A (en) * 2017-10-10 2018-02-09 马晶瑶 Across the chain method of commerce and storage medium of block chain
CN107888562A (en) * 2017-10-13 2018-04-06 布比(北京)网络技术有限公司 Interconnect serobila architecture
WO2018073564A1 (en) * 2016-10-17 2018-04-26 Arm Ltd Blockchain mining using trusted nodes
CN108009811A (en) * 2017-11-30 2018-05-08 中国人民解放军国防科技大学 Inter-cloud computing environment value exchange-oriented cross-chain communication method
CN108269190A (en) * 2018-01-17 2018-07-10 深圳四方精创资讯股份有限公司 Across chain method and its system based on across chain relaying platform
CN108288159A (en) * 2018-03-07 2018-07-17 物数(上海)信息科技有限公司 Across chain method of commerce, system, equipment and storage medium based on multi-tiling chain
CN108768659A (en) * 2018-05-24 2018-11-06 深圳前海益链网络科技有限公司 Across the chain tra nsfer system of Token assets between a kind of different blocks chain network
CN108876607A (en) * 2018-05-29 2018-11-23 阿里巴巴集团控股有限公司 Assets transfer method and device, electronic equipment
CN108880794A (en) * 2018-06-15 2018-11-23 浙江华信区块链科技服务有限公司 Across chain user identity and its digital asset management system
CN108881187A (en) * 2018-05-31 2018-11-23 杭州秘猿科技有限公司 A kind of across chain data transferring method and equipment suitable for permitting chain scene
CN109035012A (en) * 2018-06-11 2018-12-18 西安纸贵互联网科技有限公司 A kind of across the chain processing method and computer readable storage medium of block catenary system
CN109011583A (en) * 2018-05-28 2018-12-18 腾讯科技(深圳)有限公司 virtual resource transfer method and device, storage medium and electronic device
CN109146448A (en) * 2018-07-13 2019-01-04 杭州复杂美科技有限公司 Across chain assets transfer method, equipment and storage medium
CN109242456A (en) * 2018-09-04 2019-01-18 湖南宸瀚信息科技有限责任公司 Across the chain method of commerce of block chain, system and storage medium
CN109242485A (en) * 2018-08-13 2019-01-18 阿里巴巴集团控股有限公司 Block chain method of commerce and device, electronic equipment
CN109325762A (en) * 2018-08-30 2019-02-12 杭州复杂美科技有限公司 Across the chain method of commerce of parallel chain, equipment and storage medium
CN109359959A (en) * 2018-09-29 2019-02-19 衢州学院 Across chain assets transfer method, equipment and storage medium
US20190081773A1 (en) * 2017-09-12 2019-03-14 Northwestern University Peer auditing in a blockchain distribution network
CN109685489A (en) * 2018-12-28 2019-04-26 杭州云象网络技术有限公司 A kind of assets across chain method of commerce between block chain
CN109726251A (en) * 2018-12-28 2019-05-07 苏州鸿链信息科技有限公司 A kind of across chain distributed business system and method based on the development of block chain
CN109784921A (en) * 2018-12-29 2019-05-21 广州蓝石信息技术有限公司 General across chain communication mechanism based on decentralization gateway

Patent Citations (22)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105488722A (en) * 2015-11-30 2016-04-13 布比(北京)网络技术有限公司 Asset data processing method and device based on derivation chain
WO2018073564A1 (en) * 2016-10-17 2018-04-26 Arm Ltd Blockchain mining using trusted nodes
US20190081773A1 (en) * 2017-09-12 2019-03-14 Northwestern University Peer auditing in a blockchain distribution network
CN107679857A (en) * 2017-10-10 2018-02-09 马晶瑶 Across the chain method of commerce and storage medium of block chain
CN107888562A (en) * 2017-10-13 2018-04-06 布比(北京)网络技术有限公司 Interconnect serobila architecture
CN108009811A (en) * 2017-11-30 2018-05-08 中国人民解放军国防科技大学 Inter-cloud computing environment value exchange-oriented cross-chain communication method
CN108269190A (en) * 2018-01-17 2018-07-10 深圳四方精创资讯股份有限公司 Across chain method and its system based on across chain relaying platform
CN108288159A (en) * 2018-03-07 2018-07-17 物数(上海)信息科技有限公司 Across chain method of commerce, system, equipment and storage medium based on multi-tiling chain
CN108768659A (en) * 2018-05-24 2018-11-06 深圳前海益链网络科技有限公司 Across the chain tra nsfer system of Token assets between a kind of different blocks chain network
CN109011583A (en) * 2018-05-28 2018-12-18 腾讯科技(深圳)有限公司 virtual resource transfer method and device, storage medium and electronic device
CN108876607A (en) * 2018-05-29 2018-11-23 阿里巴巴集团控股有限公司 Assets transfer method and device, electronic equipment
CN108881187A (en) * 2018-05-31 2018-11-23 杭州秘猿科技有限公司 A kind of across chain data transferring method and equipment suitable for permitting chain scene
CN109035012A (en) * 2018-06-11 2018-12-18 西安纸贵互联网科技有限公司 A kind of across the chain processing method and computer readable storage medium of block catenary system
CN108880794A (en) * 2018-06-15 2018-11-23 浙江华信区块链科技服务有限公司 Across chain user identity and its digital asset management system
CN109146448A (en) * 2018-07-13 2019-01-04 杭州复杂美科技有限公司 Across chain assets transfer method, equipment and storage medium
CN109242485A (en) * 2018-08-13 2019-01-18 阿里巴巴集团控股有限公司 Block chain method of commerce and device, electronic equipment
CN109325762A (en) * 2018-08-30 2019-02-12 杭州复杂美科技有限公司 Across the chain method of commerce of parallel chain, equipment and storage medium
CN109242456A (en) * 2018-09-04 2019-01-18 湖南宸瀚信息科技有限责任公司 Across the chain method of commerce of block chain, system and storage medium
CN109359959A (en) * 2018-09-29 2019-02-19 衢州学院 Across chain assets transfer method, equipment and storage medium
CN109685489A (en) * 2018-12-28 2019-04-26 杭州云象网络技术有限公司 A kind of assets across chain method of commerce between block chain
CN109726251A (en) * 2018-12-28 2019-05-07 苏州鸿链信息科技有限公司 A kind of across chain distributed business system and method based on the development of block chain
CN109784921A (en) * 2018-12-29 2019-05-21 广州蓝石信息技术有限公司 General across chain communication mechanism based on decentralization gateway

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11232441B2 (en) 2019-10-30 2022-01-25 Accenture Global Solutions Limited Cryptologic coordinated symmetric conditional key release
US11551204B2 (en) 2019-10-30 2023-01-10 Accenture Global Solutions Limited Leading-party-initiated cryptologic coordinated symmetric conditional key release
CN111368003B (en) * 2020-03-06 2020-10-16 安徽中科智链信息科技有限公司 Management method of multi-chain anchoring data
CN111368003A (en) * 2020-03-06 2020-07-03 安徽中科智链信息科技有限公司 Management method of multi-chain anchoring data
CN111539723A (en) * 2020-04-14 2020-08-14 浙江浙燃能源有限公司 Block chain transaction recording method, equipment, block chain node and computer medium
CN111666336A (en) * 2020-05-15 2020-09-15 西安纸贵互联网科技有限公司 Data intercommunication method and system among block chains and electronic equipment
CN111666336B (en) * 2020-05-15 2023-05-23 西安纸贵互联网科技有限公司 Method, system and electronic equipment for data intercommunication among block chains
CN112003889A (en) * 2020-07-10 2020-11-27 南京邮电大学 Distributed cross-chain system and cross-chain information interaction and system access control mechanism
CN112003889B (en) * 2020-07-10 2022-11-08 南京邮电大学 Distributed cross-link system and cross-link information interaction and system access control method
CN112104607A (en) * 2020-08-13 2020-12-18 北京新盛云佳科技有限公司 Method, device, network node and storage medium for cross-link communication
CN112104607B (en) * 2020-08-13 2023-03-21 北京新盛云佳科技有限公司 Method, device, network node and storage medium for cross-link communication
CN112381650A (en) * 2020-11-18 2021-02-19 西安纸贵互联网科技有限公司 Cross-chain interoperation transaction processing method and device, electronic equipment and storage medium
CN112381650B (en) * 2020-11-18 2024-02-27 西安纸贵互联网科技有限公司 Cross-chain interoperation transaction processing method, device, electronic equipment and storage medium
CN112200681A (en) * 2020-12-04 2021-01-08 腾讯科技(深圳)有限公司 Service processing method, information processing method and node equipment of block chain network
CN112200681B (en) * 2020-12-04 2021-05-28 腾讯科技(深圳)有限公司 Service processing method, information processing method and node equipment of block chain network
CN112953999B (en) * 2020-12-29 2024-05-24 合肥达朴汇联科技有限公司 Block chain information cross-chain interaction method, system and equipment applied to t1 node
CN112953999A (en) * 2020-12-29 2021-06-11 合肥达朴汇联科技有限公司 Block chain information cross-chain interaction method, system and equipment applied to t1 node
CN112927075A (en) * 2021-02-26 2021-06-08 北京百度网讯科技有限公司 Processing method and device for cross-chain transaction, electronic equipment and readable storage medium
CN112927075B (en) * 2021-02-26 2023-11-17 北京百度网讯科技有限公司 Processing method and device of cross-chain transaction, electronic equipment and readable storage medium
CN112995211A (en) * 2021-04-21 2021-06-18 腾讯科技(深圳)有限公司 Data processing method, device and equipment based on block chain network and storage medium
CN113179273A (en) * 2021-04-29 2021-07-27 杭州丽冠科技有限公司 Block chain side chain-based block header verification method and device and computer-readable storage medium
CN113328997A (en) * 2021-05-10 2021-08-31 东软集团股份有限公司 Alliance chain cross-chain system and method
CN113377875B (en) * 2021-06-29 2024-03-22 北京百度网讯科技有限公司 Cross-chain data processing method and device, electronic equipment and readable storage medium
CN113420090A (en) * 2021-06-29 2021-09-21 北京百度网讯科技有限公司 Cross-chain processing method and device, electronic equipment and readable storage medium
CN113377875A (en) * 2021-06-29 2021-09-10 北京百度网讯科技有限公司 Cross-link data processing method and device, electronic equipment and readable storage medium
CN113781228A (en) * 2021-09-18 2021-12-10 北京俩撇科技有限公司 Cross-chain asset transfer method, device, equipment and storage medium
CN115225639B (en) * 2022-09-15 2022-12-27 杭州趣链科技有限公司 Changing method and device for consensus trusted cluster, computer equipment and medium
CN115225639A (en) * 2022-09-15 2022-10-21 杭州趣链科技有限公司 Changing method and device of consensus trusted cluster, computer equipment and medium

Similar Documents

Publication Publication Date Title
CN110245517A (en) A kind of across chain method, apparatus, system and the electronic equipment of block chain
US11190342B2 (en) Transaction processing in a service blockchain
US11195231B2 (en) Transaction processing in a service blockchain
CN110766550B (en) Asset query method and device based on block chain and electronic equipment
US11321783B2 (en) Method and device for data processing based on blockchain
Singh et al. Branch based blockchain technology in intelligent vehicle
CN111026789B (en) Block chain-based electronic bill query method and device and electronic equipment
US20210166326A1 (en) Claim settlement method and apparatus employing blockchain technology
CN111539731A (en) Block chain-based federal learning method and device and electronic equipment
EP3961974B1 (en) Block content editing methods and apparatuses
US11270388B2 (en) Blockchain-based data processing method and apparatus
CN108648078A (en) A kind of transaction preprocess method, device and electronic equipment
CN110009435A (en) Based on the invoice method of charging out and device of block chain, electronic equipment
CN108665946A (en) A kind of access method and device of business datum
EP3779760B1 (en) Blockchain-based data processing method and apparatus, and electronic device
CN110505311A (en) A kind of across the chain exchange method of isomorphism block chain and system
TWI737118B (en) Method, device and electronic equipment for reconciliation based on alliance chain
CN108804706A (en) Block chain data processing method, device, equipment and storage medium
CN111818095B (en) Tax refunding method and device based on block chain and electronic equipment
CN110012100A (en) A kind of the block chain common recognition method, apparatus and electronic equipment of bandwidth optimization
US20210319456A1 (en) Methods, apparatuses, devices, and systems for generating customs clearance confirmation information
Diáz et al. Automatic verification of the TLS handshake protocol
Xu et al. Exploring blockchain technology through a modular lens: A survey
CN110033367A (en) Based on the contract record method and device of block chain, electronic equipment
CN110428259A (en) Block chain business datum transaction system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190917

RJ01 Rejection of invention patent application after publication