CN110457942A - To the signature verification method, service node and medium of uplink data block - Google Patents
To the signature verification method, service node and medium of uplink data block Download PDFInfo
- Publication number
- CN110457942A CN110457942A CN201910672008.5A CN201910672008A CN110457942A CN 110457942 A CN110457942 A CN 110457942A CN 201910672008 A CN201910672008 A CN 201910672008A CN 110457942 A CN110457942 A CN 110457942A
- Authority
- CN
- China
- Prior art keywords
- accounting nodes
- public key
- service node
- key certificate
- block
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2141—Access rights, e.g. capability lists, access control lists, access tables, access matrices
Abstract
Present disclose provides the signature verification method of a kind of pair of uplink data block, service node and media.The described method includes: receiving the block head of the uplink data block sent by accounting nodes, containing the abstract and signature generated to the Transaction Information in the data block in the block head, the signature encrypts the abstract using the private key specific to the accounting nodes by the accounting nodes and is generated;The public key certificate of accounting nodes is obtained, the public key certificate generates the request of public key certificate in response to accounting nodes, contains the public key specific to the accounting nodes;From the public key certificate of the accounting nodes, the public key specific to the accounting nodes is obtained;Using the public key specific to the accounting nodes, the signature is decrypted, decrypted result and the abstract in block head are compared, to realize signature verification.The embodiment of the present disclosure improves the safety of block chain book keeping operation in the case where service node does not have the cochain of actual participation data block.
Description
The application be the applying date be on December 7th, 2018, application No. is 201811495782.5, it is entitled " in area
The divisional application of the application of method, agent node and the medium of inquiry Transaction Information in block chain network ".
Technical field
This disclosure relates to block chain field, and in particular to a kind of to test in block chain network the signature of uplink data block
Card method, service node and medium.
Background technique
In traditional alliance's block chain network, global administration's maintenance will be carried out to the member node of addition.General pass through is recognized
The identity information of member is safeguarded at card center.But it in frequent connection and common recognition, needs to carry out frequent identification, meeting
Substantially reduce the performance and operational efficiency of block chain.In addition, when block chain is in some scenes of government or commercial undertaking,
And not all node has enough resources and necessity to become the node for participating in block chain common recognition, and allow and be not involved in common recognition
Non- common recognition node can sufficiently trust the node of these common recognitions, become a challenge.
Therefore, how and not all node there is enough resources and necessity to become to participate in the section of block chain common recognition
In the case where point, the safety of Transaction Information on non-common recognition querying node block chain can be ensured, and will not reduce efficiency, be existing
There is technology to suffer from a problem that problem.
Summary of the invention
One purpose of the disclosure be to propose it is a kind of in block chain network to the signature verification side of uplink data block
Method, service node and medium improve the book keeping operation of block chain in the case where service node does not have the cochain of actual participation data block
Safety.
According to the one side of the embodiment of the present disclosure, disclose it is a kind of in block chain network to the signature of uplink data block
Verification method, the block chain network include accounting nodes sub-network and service node sub-network, the accounting nodes sub-network
Including accounting nodes data block being recorded on block chain, the service node sub-network includes that accounting nodes are recorded
The service node that the signature of uplink data block on block chain is verified, the method are executed by service node, the side
Method includes:
The block head of the uplink data block sent by accounting nodes is received, is contained in the block head to the data block
In Transaction Information generate abstract and signature, it is described signature by the accounting nodes utilize specific to the accounting nodes private key pair
The abstract is encrypted and is generated;
The public key certificate of accounting nodes is obtained, the public key certificate gives birth to the request of public key certificate in response to accounting nodes
At containing the public key specific to the accounting nodes;
From the public key certificate of the accounting nodes, the public key specific to the accounting nodes is obtained;
Using the public key specific to the accounting nodes, the signature is decrypted, it will be in decrypted result and block head
Abstract compare, to realize signature verification.
According to the one side of the embodiment of the present disclosure, the service node in a kind of block chain network, the block chain are disclosed
Network includes accounting nodes sub-network and service node sub-network, and the accounting nodes sub-network includes that data block is recorded
Accounting nodes on block chain, the service node sub-network include uplink data area accounting nodes being recorded on block chain
The service node that the signature of block is verified, the service node include:
Block head receiving unit, for receiving the block head of the uplink data block sent by accounting nodes, the block
Containing the abstract and signature generated to the Transaction Information in the data block in head, the signature is utilized specific by the accounting nodes
The abstract is encrypted in the private key of the accounting nodes and is generated;
Public key certificate acquiring unit, for obtaining the public key certificate of accounting nodes, the public key certificate is saved in response to book keeping operation
It puts the request to public key certificate and generates, contain the public key specific to the accounting nodes;
Public key acquisition unit, for obtaining the public key specific to the accounting nodes from the public key certificate of the accounting nodes;
Signature verification unit is decrypted the signature, will solve for utilizing the public key specific to the accounting nodes
Close result is compared with the abstract in block head, to realize signature verification.
According to the one side of the embodiment of the present disclosure, the service node in a kind of block chain network is disclosed, comprising: storage
Device is stored with computer-readable instruction;Processor reads the computer-readable instruction of memory storage, as described above to execute
Method.
According to the one side of the embodiment of the present disclosure, a kind of computer program medium is disclosed, being stored thereon with computer can
Reading instruction makes computer execute method as described above when the computer-readable instruction is executed by the processor of computer.
In the embodiment of the present disclosure, by signature verification, service node can the book keeping operation behavior to accounting nodes verify.
If collective practises fraud when accounting nodes are kept accounts, by signature verification, service node just remains the cheating of accounting nodes collective
Evidence, although having reached the cochain that service node does not have actual participation data block, but still play to the cochain of data block
The effect of witness.
Other characteristics and advantages of the disclosure will be apparent from by the following detailed description, or partially by the disclosure
Practice and acquistion.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited
It is open.
Detailed description of the invention
Its example embodiment is described in detail by referring to accompanying drawing, above and other target, feature and the advantage of the disclosure will
It becomes more fully apparent.
Figure 1A -1C shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure
Three kinds of architecture figures of the method for information.
Fig. 2A -2C shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure
The method of information applies the scene structure under three kinds of supply chain finance, electronic invoice, legal digital cash different application scenarios
Frame figure.
Fig. 3 A-3I shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure
The method of information applies the service node display interface figure under supply chain financial application scene, these surface charts illustrate supply
From Transaction Information cochain to the general procedure for inquiring Transaction Information and verify data block content under chain financial application scene.
Fig. 4 A-4I shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure
The method of information applies the service node display interface figure under electronic invoice application scenarios, these surface charts illustrate that electronics is sent out
From Transaction Information cochain to the general procedure for inquiring Transaction Information and verify data block content under ticket application scenarios.
Fig. 5 A-5I shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure
The method of information applies the service node display interface figure under legal digital cash application scenarios, these surface charts illustrate method
Determine under digital cash application scenarios from Transaction Information cochain to the general procedure for inquiring Transaction Information and verify data block content.
Fig. 6, which is shown, inquires data in block chain network by what agent node executed according to an embodiment of the present disclosure
The flow chart of the method for Transaction Information in block.
Fig. 7, which is shown, generates the specific of public key certificate by what Certificate Authority center executed according to an embodiment of the present disclosure
Flow chart.
Fig. 8 shows the target service according to service node executed by accounting nodes according to an embodiment of the present disclosure
Node permissions data, it is determined whether the specific flow chart of the Transaction Information into the service node returned data block.
Fig. 9 is shown in the block head to data block executed by service node according to an embodiment of the present disclosure
Signature carries out the specific flow chart of signature verification.
Figure 10 shows the detail flowchart of the step 320 according to an embodiment of the present disclosure.
Figure 11 shows the detail flowchart of the step 320 according to an embodiment of the present disclosure.
Figure 12 shows the detailed of the accounting nodes for sending inquiry request to according to the determination of an embodiment of the present disclosure
Flow chart.
Figure 13 shows the detail flowchart of step 730 in Figure 12 according to an embodiment of the present disclosure.
Figure 14 shows the detail flowchart of step 7303 in Figure 13 according to an embodiment of the present disclosure.
Figure 15 shows the detailed of the accounting nodes for sending inquiry request to according to the determination of an embodiment of the present disclosure
Flow chart.
Figure 16 shows the detail flowchart of step 760 in Figure 15 according to an embodiment of the present disclosure.
Figure 17 shows the transaction letters inquired in data block in block chain network according to an embodiment of the present disclosure
The module frame chart of the agent node of breath.
Figure 18 shows the transaction letter inquired in data block in block chain network according to an embodiment of the present disclosure
The hardware structure diagram of the agent node of breath.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes
Formula is implemented, and is not understood as limited to example set forth herein;On the contrary, providing these example embodiments makes the disclosure
Description will be more full and complete, and the design of example embodiment is comprehensively communicated to those skilled in the art.Attached drawing
The only schematic illustrations of the disclosure are not necessarily drawn to scale.Identical appended drawing reference indicates same or like in figure
Part, thus repetition thereof will be omitted.
In addition, described feature, structure or characteristic can be incorporated in one or more examples in any suitable manner
In embodiment.In the following description, many details are provided to provide filling to the example embodiment of the disclosure
Sub-argument solution.It will be appreciated, however, by one skilled in the art that the specific detail can be omitted with technical solution of the disclosure
In it is one or more, or can be using other methods, constituent element, step etc..In other cases, it is not shown in detail or retouches
Known features, method, realization or operation are stated to avoid a presumptuous guest usurps the role of the host and all aspects of this disclosure is made to thicken.
Some block diagrams shown in the drawings are functional entitys, not necessarily must be with physically or logically independent entity phase
It is corresponding.These functional entitys can be realized using software form, or in one or more hardware modules or integrated circuit in fact
These existing functional entitys, or these functions reality is realized in heterogeneous networks and/or processor device and/or microcontroller device
Body.
Architecture applied by the embodiment of the present disclosure once and overall flow are described with initial reference to Figure 1A -1C below.
Figure 1A shows a kind of architecture of block chain network applied by the embodiment of the present disclosure.Block chain network includes
Accounting nodes sub-network 2 and service node sub-network 1.Accounting nodes sub-network 2 includes data block being recorded on block chain
Accounting nodes 21.Service node sub-network 1 includes that data block accounting nodes being recorded on block chain is verified
Service node 11.It is connected between accounting nodes sub-network 2 and service node sub-network 1 by agent node 12.Agent node 12
It is a service node of service node sub-network 1, but a more special service node.It is responsible for accounting nodes 21
Service node 11 is passed to the information that service node 11 transmits.Service node 11 is to generate the various Transaction Informations for needing cochain
Counterparty terminal.They produce Transaction Information, but are recorded directly on block chain without right, it is necessary to be remembered by one
Transaction Information is recorded on block chain account node 21.It is kept accounts by a small number of accounting nodes 21 are unified, is also beneficial to the unification of affairs
Processing and supervision, and service node 11 can carry out transaction letter via the information that agent node 12 is sent by accounting nodes 21
Cease supervision and the witness of cochain.This in certain node collectives cheatings for both having needed unified supervision but being afraid of supervision thus needs the people
It is of great significance in the scene of crowd's supervision.In accounting nodes sub-network 2, each accounting nodes 21 generate a data field
After block, it is broadcast to other accounting nodes 21 and knows together, then carry out cochain.In Figure 1A, service node sub-network 1 uses P2P
Network mode.P2P network is a kind of Distributed Application framework that task and workload are distributed between fellow (Peer), is
A kind of networking or latticed form that P2P computing model is formed in application layer, i.e. " point-to-point " or " end-to-end " network.It can
With is defined as: the participant of network shares a part of hardware resource that they are possessed, and (processing capacity, storage capacity, network connect
Connect ability, printer etc.), these shared resources can directly be accessed by network offering services and content by other peer nodes
Without being subjected to intermediate entities.Participant in this network is both supplier and the resource, clothes of resource, service and content
Business obtains taker with content.Therefore, it in service node sub-network 1, is transmitted when agent node 12 is received from accounting nodes 21
The message to come over, peripherad service node 11 are propagated.Around service node 11 receive the message, then to surrounding industry
Business node 11 transmits, and propagates layer by layer, has reached the message in the propagation of each service node 11 of service node sub-network 1.
Figure 1B shows the architecture of another kind block chain network applied by the embodiment of the present disclosure.The architecture with
The architecture of Figure 1A the difference is that, in service node sub-network 1, do not take P2P network mode, take radio network
The mode of network.Agent node 12 receives the message passed over from accounting nodes 21, which is broadcast to service node
Other service nodes 11 in network 1.In this way, also achieving the message in each service node 11 of service node sub-network 1
Propagation.
Fig. 1 C shows the architecture of another kind block chain network applied by the embodiment of the present disclosure.The architecture with
The architecture of Figure 1A the difference is that, accounting nodes sub-network 2 is divided into multiple branch's accounting nodes sub-networks.Each
Branch's accounting nodes sub-network can be responsible for the record of the Transaction Information of a certain seed type.For example, a certain enterprise may have confession
Answer chain financial business, it may be necessary to it the contract information generated during supply and marketing, the payment for goods such as buys on dredit information and is recorded on block chain,
The enterprise will also issue invoice simultaneously, and also information of making out an invoice, invoice reimbursement information etc. are recorded on block chain.At this moment, in order to
Be conducive to the needs that accounting nodes are supervised by same department, the accounting nodes and record of supply chain financial business transaction may be recorded
The accounting nodes of transaction during invoice circulation will belong to different departments.For example, record supply chain financial business transaction
Accounting nodes are the accounting terminal of bank's setting, and the accounting nodes for recording the transaction during invoice circulation are Administration of State Bureau's settings
Accounting terminal.And the transaction during supply chain financial business transaction and record invoice circulation also may be eventually recorded in not
On same sub-block chain.At this moment, agent node 12 will be according to the transaction class carried from the Transaction Information that service node 11 is sent
Type sends the Transaction Information in branch's accounting nodes sub-network corresponding with the type of transaction.
Fig. 2A shows the transaction letter inquired in data block in block chain network according to an embodiment of the present disclosure
The method of breath applies the scene framework map under the application scenarios of supply chain finance.
Supply chain finance is such a business: manufacturing enterprise produces an equipment or product, is often not necessarily oneself
Enterprise produce all parts or component part of the equipment or product, the production of some of parts or component part needs outer
It wraps to other enterprises and goes to produce.Although manufacturing enterprise has concluded supply and marketing contract with order party in advance, only produce it is whole
Payment for goods can be taken when a equipment or product, and the money for purchasing part or component part in this process needs oneself to pad
It pays, causes manufacturing enterprise's capital turnover difficulty.Therefore, such a demand is produced, i.e. manufacturing enterprise can be with whole equipment
Or product conclude total purchase contract (wherein having cost and ordering party's information) assured to bank, when need to carry out part or
When the buying of component part, using the total purchase contract of the whole equipment or product crossed in bank gurantee as foundation, from the equipment or
The guarantee of buying of a part for the part or component part is transferred out in the total purchase contract of product in cost.In this way, raw
The production for carrying out the part or component part can be trusted at the enterprise of part or component part, due to not having to by bank gurantee
Worry that a part of payment for goods transferred out can not receive.Meanwhile manufacturing enterprise does not take out the money really at this time, but wait until
Corresponding a part is just paid to the production of part or component part when obtaining the practical payment for goods of the buying side of whole equipment or product
Quotient.
In traditional block chain network, due to being provided with all accounting nodes by bank, and this network is closing
, each Joint Enterprises on supply and marketing chain are nodes relevant to the data block cochain interests of supply chain finance, cannot but be supervised
And witness, the book keeping operation network of the unrelated side of this interests being made of accounting nodes can only be trusted completely.For example, manufacturing enterprise with it is whole
The ordering party of a equipment or product has concluded total purchase contract, or has signed a point buying with the generation side of part or component part
Contract requires the accounting nodes cochain that these contracts are transmitted to bank's setting.At this moment, each accounting nodes of bank's setting can be with
It supervises mutually and witnesses, but each Joint Enterprises on supply and marketing chain cannot be supervised and be witnessed.In addition, in traditional block chain network
In, the other any enterprise nodes unrelated with current supply and marketing chain, it is also possible to inquire current supply and marketing by corresponding accounting nodes
Any Transaction Information of enterprise's node cochain on chain.Therefore, great Transaction Information leakage hidden danger is brought.
However, in fig. 2, since accounting nodes sub-network 2 and service node sub-network 1 separate, accounting nodes sub-network
2 are exclusively used in keeping accounts, and service node sub-network 1 contains each Joint Enterprises terminal on supply and marketing chain, to the note of accounting nodes 21
Account is witnessed.Once 21 collective of accounting nodes practises fraud, each service node 11 of witness can remain with specific accounting nodes and do evil
Evidence.It when service node 11 needs to inquire Transaction Information, does not need to safeguard its identity in accounting nodes sub-network 2, only exist
Certificate authority safeguards the public key certificate of a service node.When agent node 12 is verified, agent node 12 is somebody's turn to do
Public key certificate, the public key being taken out specific to service node 11 carry out signature verification.Not to the signature verification of service node 11
Accounting nodes sub-network 2 is startled, is only carried out in agent node 12.In this way, in the base for the efficiency for not influencing accounting nodes sub-network
On plinth, the service node in service node sub-network can extend on a large scale, while guarantee to inquire the safety of cochain Transaction Information
Property.
In the example of an automobile SC finance, as shown in Figure 2 A, each service node 11 includes that automaker is whole
End, tiremaker terminal, rubber production quotient terminal, vehicle components supplying quotient terminal, banking terminal etc..Automaker and vapour
Vehicle ordering party has concluded total purchase contract, transfers to a part to be used for the buying of tire from the cost of total purchase contract, then transfer to
Corresponding part is used for the buying of vehicle components.Tiremaker using the contract concluded with automaker as foundation, then from this
Transfer to a part for manufacturing the buying of rubber needed for tire in the cost of contract.Relationship is purchased layer by layer in this way, just establishing.
When automaker and automobile ordering party concluded total purchase contract or automaker and tiremaker,
Vehicle components supplying agrees vertical point procurement contract or tiremaker and when rubber production agrees vertical point of procurement contract, by phase
The Transaction Information answered passes to agent node 12, selects an accounting nodes 21 by agent node 12.Agent node 12 will be corresponding
Transaction Information be sent to selection accounting nodes 21 cache.Accounting nodes 21 will not generally be individually for a Transaction Information and be packaged
It at a data block cochain, but is packaged according to block and requires (such as gather together enough enough item numbers or size), be packaged into one
Data block.The private key that accounting nodes 21 are generated specific to the accounting nodes is based on using the private key specific to the accounting nodes
The Transaction Information to be included in a data block being added on block chain generates signature.Generating the method signed is
Abstract first is generated to the Transaction Information in data block, then abstract is encrypted with the private key specific to the accounting nodes, is signed
Name.The Transaction Information is put into the block body of data block by accounting nodes 21, and the number is added in the abstract of generation and signature
According to the block head of block, cochain after being known together between all accounting nodes 21, while block head is passed through into agent node 12
The each service node 11 being sent in service node sub-network.
Accounting nodes 21 are generated specific to after the private key of accounting nodes 21, also request certificate authority (CA does not show) hair
Put the public key certificate specific to the accounting nodes 21.Specific method may is that request authentication center's (not shown) to accounting nodes 21
Identity authenticated.After certification passes through, public key certificate is generated into request and is sent to Certificate Authority center.The public key certificate generates
There is the private key specific to the accounting nodes in request.Certificate authority generates specific according to the private key specific to the accounting nodes
In the public key of the accounting nodes, and public key certificate is accordingly generated, is sent to service node 11.
After service node 11 receives block head, the public key certificate of the accounting nodes 21 is obtained, is taken out specific to this
The public key of accounting nodes.Service node 11 is decrypted the signature with the public key specific to the accounting nodes, obtains described
The abstract of Transaction Information in data block.If the abstract in block head is consistent with the abstract that decryption obtains, signature verification
Success.
Service node 11 has obtained the block head of data block, but does not obtain the block body of the data block, therefore, industry
Business node 11 can't see each Transaction Information.When service node 11 will check Transaction Information, need to ask to agent node 12
It asks.In order to guarantee the safety of inquiry, service node 11 will generate the private key specific to the service node, raw to the inquiry request
At signature.The method of signature be first to inquiry request according to predetermined digest algorithm generate make a summary, then to abstract using specific to
The private key encryption of the service node, is signed.
Service node 21 is generated specific to after the private key of service node 21, also request certificate authority (CA does not show) hair
Put the public key certificate specific to the service node 21.Specific method may is that request authentication center's (not shown) to service node 21
Identity authenticated.After certification passes through, public key certificate is generated into request and is sent to Certificate Authority center.The public key certificate generates
There is the private key specific to the service node in request.Certificate authority generates specific according to the private key specific to the service node
In the public key of the service node, and public key certificate is accordingly generated, is sent to agent node 11.
After agent node 12 receives inquiry request, the permission of service node 11 is verified, method is from public key
Certificate acquisition is specific to the public key of the service node, and then the public key with this specific to the service node tests the signature
Card.Specifically, agent node 12 is decrypted the signature with the public key specific to the service node, obtains inquiry request
Abstract, same predetermined cryptographic algorithm recalculates abstract to the inquiry request when according still further to signature, if recalculate
It makes a summary consistent with the abstract that decryption obtains, is then proved to be successful, 11 identity of service node is legal, sends book keeping operation section for inquiry request
Point 21, so that accounting nodes 21 are according to the target service node permissions data of service node, it is determined whether to the service node 11
Transaction Information in returned data block.
Illustrate under supply chain financial application scene below with reference to Fig. 3 A-3I from Transaction Information cochain to inquiring and verify big
Body process.Fig. 3 A-3I is the Transaction Information inquired in data block in block chain network according to an embodiment of the present disclosure
Method apply the service node display interface figure under supply chain financial application scene.
As shown in Figure 3A, B automobile factory is based on A retailer buying 10,000,000 purchase order of B automobile factory, in 10,000,000
2,000,000 go bail for, commission C tire plant produces the tire of 2,000,000 prices.Service node of the business personnel of B automobile factory in B automobile factory
After the above Transaction Information of 11 typings, " being submitted to accounting nodes " option is clicked, Transaction Information is sent to note by agent node 12
Account node 21.The Transaction Information to be included in the data block that accounting nodes 21 will be added on block chain is placed on one
In a block body.Accounting nodes 21 also generate the abstract of these Transaction Informations, such as Merkel's tree root of Fig. 3 B.Accounting nodes 21 are raw
At the private key specific to the accounting nodes, signature is generated to the Transaction Information in the data block using the private key.Accounting nodes
21 are placed on the abstract of previous data block on abstract, signature and block chain in block head together, by Transaction Information Fang Qu
In block.The data block of block head and block body composition cochain, the cochain after all accounting nodes 21 common recognition.
Block hair is also sent to each service node 11 by accounting nodes 21.It is shown on the screen of service node 11 current
The abstract of previous data block on the abstract (such as Merkel's tree root) of Transaction Information in data block, signature and block chain,
As shown in Figure 3B.Since accounting nodes 21 are generated specific to after the private key of accounting nodes 21, also generated by certificate authority public
There are the public key specific to accounting nodes 21 in key certificate, the inside.Accounting nodes 21 obtain public key certificate, and using it is therein specific to
The signature is decrypted in the public key of accounting nodes 21, obtains the abstract of the Transaction Information in the data block.If connect
The abstract in block head received and the abstract that decryption obtains are inconsistent, then signature verification fails, and show boundary as shown in Figure 3 C
Face.If Merkel's tree root in the block head received is consistent with Merkel's tree root that decryption obtains, signature verification success,
Show interface as shown in Figure 3D.Since during above, service node 11 only obtains the block head of data block, also
There is no the Transaction Information in block head.At this point, asking the user whether to request in the data block in the interface of Fig. 3 D
Transaction Information.
If user selects "Yes", service node 11 generates an inquiry request, and utilizes specific to service node 11
Private key signs to it.Meanwhile as shown in FIGURE 3 E, show on the screen whether the prompt of the public key certificate of requested service node 11.
If user selects "Yes", Certificate Authority center generates public key certificate for it, has in public key certificate specific to the service node 11
Public key.After agent node 12 receives inquiry request, the public key specific to the service node is obtained from public key certificate, so
The public key with this specific to the service node verifies the signature afterwards.If authentication failed, the interface of display such as Fig. 3 F, industry
Business node cannot continue Transaction Information inquiry.
If be proved to be successful, 11 identity of service node is legal, and inquiry request is sent accounting nodes 21 by agent node 12,
So that accounting nodes 21 are according to the target service node permissions data of service node, determination is to 11 returned data of service node
The cryptographic Hash of Transaction Information or Transaction Information in block.The transaction letter that accounting nodes 21 return is shown on the interface of Fig. 3 G
The cryptographic Hash of breath and Transaction Information.
After user selects " carrying out content verification " on the interface of Fig. 3 G, service node 11 is believed according to the transaction on Fig. 3 G
The abstract (such as Merkel's tree root) of Transaction Information, and is wrapped in block head in the cryptographic Hash calculation data area block of breath and Transaction Information
The abstract (such as Merkel's tree root) contained is compared, to carry out content verification.If the tampered data block of accounting nodes 21
Content, then calculated abstract is inconsistent with the abstract that includes in block head, shows " content verification mistake as shown in figure 3h
Lose " interface.If calculated abstract is consistent with the abstract for including in block head, " content verification as shown in fig. 31 is shown
The interface of success ".
Fig. 2 B shows the transaction letter inquired in data block in block chain network according to an embodiment of the present disclosure
The method of breath applies the scene framework map under the application scenarios of electronic invoice.
In the block chain application scenarios of traditional electronic invoice, Local Tax Bureau provides invoice, enterprise of making out an invoice to enterprise of making out an invoice
To neck ticket people invoicing, the reimbursement unit where neck ticket people to neck ticket people submits an expense account invoice.All these transaction require cochain,
It is recorded on block chain.But Local Tax Bureau, enterprise of making out an invoice, reimbursement these nodes of unit be not accounting nodes 21.They will entrust
Ask corresponding accounting nodes or super node by these transaction records on block chain.All these accounting nodes or super node
All it is that national tax department is unified to be arranged.It can supervise mutually and witness between them, but Local Tax Bureau, enterprise of making out an invoice, reimbursement unit
These nodes are the immediate parties of invoice, but cannot supervise and witness, and can only trust accounting nodes 21 completely.In addition, any
Enterprise can inquire any Transaction Information on block chain by its corresponding accounting nodes.But in some cases, enterprise
Invoice relevant information is not intended to be known by other enterprises.In the embodiments of the present disclosure, due to accounting nodes sub-network 2 and business
Node sub-network 1 separates, and accounting nodes sub-network 2 is exclusively used in keeping accounts, and service node sub-network 1 contains these invoice interests
Relevant node witnesses the book keeping operation of accounting nodes 21.Once 21 collective of accounting nodes practises fraud, each service node of witness
11 can remain with the evidence that specific accounting nodes are done evil.
In the example of an electronic invoice, as shown in Figure 2 B, each service node 11 includes make out an invoice unit terminal, claimer
Mobile phone, reimbursement unit terminal, Local Tax Bureau's terminal etc..
Local tax bureau provides invoice, unit of perhaps making out an invoice invoicing or claimer to reimbursement unit for unit of making out an invoice
When reimbursement, corresponding Transaction Information (transfer of invoice ownership) is passed into agent node 12, by the selection of agent node 12 one
A accounting nodes 21.Agent node 12 caches the accounting nodes 21 that corresponding Transaction Information is sent to selection.Then, book keeping operation section
Point 21 is packaged according to block to be required to be packaged into data block.Accounting nodes 21 generate the private key specific to accounting nodes 21, are based on
Transaction Information in data block generates abstract and signature, and abstract and signature are added to the block head of data block, transaction is believed
Breath cochain and gives block hair to service node 11 after the block body of data block is added, these processes and combines shown in Fig. 2A
Process it is similar.Public key in public key certificate at service node 11 using accounting nodes 21 carries out signature verification.Signature is tested
After card passes through, the content of Transaction Information is checked if necessary, generates the inquiry request to Transaction Information, and generate specific to business
The private key of node is signed with generating to inquiry request, is sent to agent node 12.Meanwhile Certificate Authority being requested to be centrally generated business
The public key certificate of node 11, wherein there is the public key specific to service node 11.Agent node 12 utilizes from certification the signature
The public key specific to service node 11 that the heart obtains carries out signature verification.After being proved to be successful, book keeping operation section is sent by inquiry request
Point 21 is returned to the cryptographic Hash of Transaction Information or Transaction Information by accounting nodes 21.Service node 11 utilizes Transaction Information or transaction
The cryptographic Hash of information carries out content verification, and also process shown in Fig. 2A above in conjunction is similar for verification process, therefore does not repeat.
Fig. 4 A-4I shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure
The method of information applies the service node display interface figure under electronic invoice application scenarios, these surface charts illustrate that electronics is sent out
Transaction Information cochain, inquiry and the general procedure verified under ticket application scenarios.
As shown in Figure 4 A, on October 22nd, 2018, Liu Shan to rainbow computer company is the purchase of unit one belongs to Hong Sheng company
One computer, 3000 yuan of Hua Liao.Rainbow computer company is that Liu Shan has issued an invoice, transaction id 000083.Rainbow computer
After staff's typing information above of company, " being submitted to accounting nodes " option is clicked, Transaction Information passes through agent node 12
It is sent to accounting nodes 21.The transaction letter to be included in the data block that accounting nodes 21 will be added on block chain
Breath is placed in a block body.Accounting nodes 21 also generate abstract and signature, by last data on abstract, signature and block chain
The abstract of block is placed on together in block head.Accounting nodes 21 are sent to each business by data block cochain, and by block hair
Node 11.Shown on the screen of service node 11 abstract, signature and block chain on previous data block abstract, such as Fig. 4 B
It is shown.
Then, accounting nodes 21 carry out signature verification, and the interface of Fig. 4 C or Fig. 4 D are shown according to verification result.If necessary
Transaction Information is inquired to accounting nodes 21, generate inquiry request and shows the interface for asking whether request public key certificate of Fig. 4 E.
Such as request, then certificate authority is that accounting nodes provide public key certificate, wherein there is the public key specific to accounting nodes.Agency's section
After point 12 receives the signature, the public key obtained from public key certificate specific to service node 11 carries out signature verification.If tested
Card failure, shows the interface of Fig. 4 F.If be proved to be successful, inquiry request is forwarded to accounting nodes 21 according to service node 11
Permissions data returns to the cryptographic Hash of Transaction Information or Transaction Information to service node 11, as shown in Figure 4 G.Service node 11 carries out
Content verification shows the interface of Fig. 4 H-4I then according to the verification result of content verification respectively.These processes and Fig. 3 C-3I institute
The process shown is similar, therefore does not repeat.
Fig. 2 C shows the transaction letter inquired in data block in block chain network according to an embodiment of the present disclosure
The method of breath applies the scene framework map under the application scenarios of legal digital cash.
In the scene of the civil digital cash of traditional such as bit coin hereinafter, each pen during the circulation of bit coin
Transaction all carries out cochain by the party concerned to trade.Each party concerned both can be used as accounting nodes and carry out uplink operation, can also be with
Witness the data block of other node cochains.Since each node is not only used as accounting nodes, but also as witness node, so that the public
Trust is compared for the use of this digital cash.However, the digital cash is sent out by official under the scene of legal digital cash
Row, it is necessary to it is supervised by official, and the public needs to trust it, prevents accounting nodes collective, official from practising fraud, and produces existing
The problem of in terms of the balance for thering is the network system to trust in face of government regulation and the common people.Moreover, in existing bit coin block chain network,
Each node is not only used as accounting nodes, but also as witness node, the user of node each in this way can see to be recorded on block chain
All Activity information, and the Transaction Information of some units is to be not intended to be exposed to proprietary, and produces secret protection
Problem.
In this case, the accounting nodes sub-network of the embodiment of the present disclosure and the separated scheme of service node sub-network,
Completely avoid this problem.Each accounting nodes of accounting nodes sub-network belong to official.It is had occurred at any service node
Block chain will be recorded by corresponding accounting nodes in the transaction of the legal digital cash by the transaction of legal digital cash
On.But each service node in service node sub-network can witness the book keeping operation of accounting nodes 21.Once book keeping operation
The cheating of 21 collective of node, each service node 11 of witness can remain with the evidence that specific accounting nodes are done evil, take into account government's prison
Pipe and the common people trust.
In the example of a legal digital cash, as shown in Figure 2 C, each service node 11 includes legal digital cash stream
Each transaction terminal involved in logical.When sending the Transaction Information of legal digital cash, transaction terminal will trade letter accordingly
Breath (transfer of legal digital cash ownership) passes to agent node 12, selects an accounting nodes 21 by agent node 12.
Agent node 12 caches the accounting nodes 21 that corresponding Transaction Information is sent to selection.Then, accounting nodes 21 are according to block
It is packaged and requires to be packaged into data block.Accounting nodes 21 generate the private key specific to accounting nodes 21, based in data block
Transaction Information generates abstract and signature, and abstract and signature are added to the block head of data block, data field is added in Transaction Information
Cochain after the block body of block, and give block hair to service node 11, these processes are similar with process shown in Fig. 2A is combined.
Accounting nodes 21 are generated specific to after the private key of accounting nodes 21, and also request certificate authority is saved to book keeping operation is generated
The public key certificate of point 21, wherein containing the public key specific to accounting nodes 21.After service node 11 receives block head, signed
Name verifying, inquiry particular transactions information, process also Fig. 2A institute above in conjunction that content verification is carried out to content in data block
The process shown is similar, therefore does not repeat.
Fig. 5 A-5I shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure
The method of information applies the service node display interface figure under legal digital cash application scenarios, these surface charts illustrate electricity
The general procedure kept accounts and witnessed under sub- invoice application scenarios.As shown in Figure 5A, on August 29th, 2018, because X company is public from Y
Department buys in the furniture that 3000 per unit system of price determines digital cash, pays Y company law and determines 3000 unit of digital cash.X company
Handler's typing information above after, click " being submitted to accounting nodes " option, Transaction Information is sent to by agent node 12
Accounting nodes 21.The Transaction Information to be included in the data block that accounting nodes 21 will be added on block chain is placed on
In the block body of data block.Accounting nodes 21 also generate the abstract and signature of Transaction Information in data block, by abstract, signature
And the abstract of previous data block is placed on together in the block head of data block on block chain.Accounting nodes 21 are by data block
Cochain, and block hair is sent to each service node 11.Abstract, signature and block are shown on the screen of service node 11
The abstract of previous data block on chain, as shown in Figure 5 B.
Then, service node 11 carries out signature verification, shows the interface of Fig. 5 C or Fig. 5 D according to verification result, and to agency
Node 12 inquires Transaction Information.Service node 11 signs to inquiry request with the private key specific to service node 11.Display
Interface as shown in fig. 5e asks whether request public key certificate.If request, certificate authority generates the public affairs of service node 11
Key certificate, wherein including the public key specific to service node 11.It is obtained when the verifying signature of agent node 12 with the public key certificate
Specific to the public key of service node 11, which is verified.If authentication failed, service node 11 is shown as illustrated in figure 5f
Interface.If be proved to be successful, inquiry request is sent accounting nodes 21 by agent node 12, so that accounting nodes 21 are according to industry
The target service node permissions data of business node 11, the determining Transaction Information into the 11 returned data block of service node is still
The digest value of Transaction Information.Fig. 5 G shows the digest value of Transaction Information or Transaction Information that the display of service node 11 receives
Interface.Service node 11 carries out the content verification of data block according to the digest value of these Transaction Informations or Transaction Information.According to
Content verification is as a result, show the interface of Fig. 5 H or Fig. 5 I.
As shown in fig. 6, providing one kind according to one embodiment of the disclosure and inquiring data block in block chain network
In Transaction Information method.As shown in figs. 1A-1 c, the block chain network includes accounting nodes sub-network 2 and service node
Sub-network 1.The accounting nodes sub-network 2 includes the accounting nodes 21 data block being recorded on block chain.The business
Node sub-network 1 includes the service node 11 that data block accounting nodes being recorded on block chain is verified.Book keeping operation section
Point sub-network 2 is communicated with service node sub-network 1 by agent node 12, and the agent node 12 is service node subnet
A service node in network 1.The method is executed by agent node 12, which comprises
Step 310 receives service node to the inquiry request of the Transaction Information in data block and with specific to the business
The signature that the private key of node generates the inquiry request;
Step 320, the public key certificate for obtaining the service node, the public key certificate is in response to service node to public key certificate
Request and generate, contain the public key specific to the service node;
Step 330, from the public key certificate of the service node, obtain specific to the service node public key;
Step 340 verifies the signature with the public key specific to the service node;
Step 350, in the case where being proved to be successful, send accounting nodes for inquiry request, so as to accounting nodes according to
The target service node permissions data of service node, it is determined whether the Transaction Information into the service node returned data block,
The target service node permissions data indicate the service node have the right inquiry target service node.
In one embodiment, service node asks the inquiry of the Transaction Information in data block to agent node transmission
Ask, is occurred after the block head that service node receives data block.That is, having the data block cochain of Transaction Information
Afterwards, block hair can be given service node by accounting nodes, notification data block cochain, if necessary to inquire specific hand over
If easy information, it can be inquired by agent node to accounting nodes.Therefore, description step 310-340 detailed process it
Before, it is necessary to the operation to the service node before the inquiry request of the Transaction Information in data block is sent to the service node
It is described.
In this embodiment, the service node is to the inquiry request of the Transaction Information in data block in the business section
Point is sent after carrying out signature verification to the signature in the block head of the data block.As shown in figure 9, to the block of the data block
Signature in head carries out signature verification
The block head of the data block that step 610, reception are sent by accounting nodes contains to the number in the block head
According to abstract and signature that the Transaction Information in block generates, the signature is utilized by the accounting nodes specific to the accounting nodes
Private key encrypts the abstract and is generated;
Step 620, the public key certificate for obtaining accounting nodes, the public key certificate is in response to accounting nodes to public key certificate
It requests and generates, contain the public key specific to the accounting nodes;
Step 630, from the public key certificate of the accounting nodes, obtain specific to the accounting nodes public key;
Step 640, using the public key specific to the accounting nodes, the signature is decrypted, by decrypted result with
Abstract in block head compares, to realize signature verification.
Step 610-640 is executed by service node.Step 610-640 is described in detail below.
In step 610, the block head of the data block sent by accounting nodes is received, is contained in the block head pair
The abstract and signature that Transaction Information in the data block generates, the signature are utilized by the accounting nodes specific to the book keeping operation section
The private key of point encrypts the abstract and is generated.
In general, the process of signature is such that apply message to be signed into abstract operation, obtains to be signed disappear
The abstract of breath, the key pair abstract encryption then used with signature, is signed.When verifying signature, need to utilize
The key pair signature decryption that solution signature uses, has obtained the abstract of message to be signed, has then applied again to message to be signed
Add same abstract operation, the abstract redefined.If it is consistent with the abstract redefined to decrypt obtained abstract,
Signature verification success.By signature verification, it is able to verify that out whether message to be signed is that signer is issued and message
It is whether complete.If the message is not that signer is sent out or message is lost a part in transmission process, signature verification is equal
Do not pass through.
In the situation of unsymmetrical key, predetermined digest algorithm can be utilized to the transaction in data block by accounting nodes
Information generates abstract.Then, a private key specific to the accounting nodes is generated, abstract is encrypted using it, generates signature.
The block head that the abstract of previous data block on abstract, signature, block chain can be put into data block, Transaction Information is put into
The block body of data block, cochain after data block is known together between all accounting nodes.
In step 620, the public key certificate of accounting nodes is obtained, the public key certificate demonstrate,proves public key in response to accounting nodes
The request of book and generate, contain the public key specific to the accounting nodes.
The public key certificate is generated by certificate authority (CA) in response to the request of authentication center.In one embodiment
In, the public key certificate of the accounting nodes is generated in the following way by certificate authority:
It receives the public key certificate for accounting nodes sent from authentication center and generates request, the public key certificate generation is asked
Mark in asking containing accounting nodes and the private key specific to the accounting nodes;
The mark that accounting nodes in request are generated for the public key certificate generates special in request according to the public key certificate
Due to the private key of the accounting nodes, the public key specific to the accounting nodes is generated;
The mark of accounting nodes and the public affairs specific to the accounting nodes generated in request are generated according to the public key certificate
Key generates the public key certificate of the accounting nodes.
Public key certificate generates request, and to be authentication center carry out after certification passes through for the identity of accounting nodes, to certificate granting
The request certificate authority that center issues provides the request of public key certificate.The public key certificate generates in request containing note
The mark of account node and private key specific to the accounting nodes.The former effect is to find public key certificate in public key certificate
Holder's node.The effect of the latter is that certificate authority is facilitated to generate accordingly specific to the public key of accounting nodes, so as to
Generate public key certificate.
Then, the mark of accounting nodes in request is generated for the public key certificate, certificate authority can basis
The public key certificate generates the private key in request specific to the accounting nodes, generates the public key specific to the accounting nodes.Later,
It can generate the mark of accounting nodes and the public affairs specific to the accounting nodes generated in request according to the public key certificate
Key generates the public key certificate of the accounting nodes.Public key certificate is generated using existing method.Generate public key certificate meaning be,
It is different from general public key, which is after being authenticated by permission of the authentication center to user, by certificate granting
Heart unified payment, have more reliability.The embodiment by way of by certificate authority unified payment public key certificate,
Improve reliability when service node signature verification.
In one embodiment, the public key certificate for accounting nodes generates request by authentication center according to lower section
Formula generates:
Receive the certification request that accounting nodes are sent, mark and registration letter with accounting nodes in the certification request
Breath;
The registration information is compared with registration information of the accounting nodes when block chain network is registered, it is such as consistent,
Success is then authenticated, the public key certificate is generated and generates request, to be sent to the certificate authority.
After private key of the accounting nodes generation specific to accounting nodes, certification request is sent to authentication center, it is described to recognize
Mark and registration information with accounting nodes in card request.Authentication center be one to the identity of accounting nodes verified from
And ensure the node of safety.The private key specific to accounting nodes that can also have accounting nodes to generate in certification request.
Authentication center is stored with registration information of the node in the registration of block chain network.It is by the registration information and accounting nodes in area
Registration information when block chain network is registered is compared, such as consistent, then authenticates success, generates the public key certificate and generates request,
To be sent to the certificate authority.The public key certificate generates the mark containing accounting nodes in request and saves specific to book keeping operation
The private key of point.
The advantages of embodiment is, by the authentication of authentication center, to improve the safety of public key certificate granting.
In step 630, since in public key certificate, the mark of accounting nodes and the public key specific to accounting nodes are that correspondence is deposited
Storage, it can therefrom obtain the public key specific to the accounting nodes.
In step 640, using the public key specific to the accounting nodes, the signature is decrypted, it should obtain
The abstract of Transaction Information in data block.It should be one with the abstract determined when signature to the Transaction Information in data block
Sample.Decrypted result and the abstract in block head are compared, if unanimously, illustrating that signature verification passes through.Service node can be with
Transaction Information is further inquired accordingly.
The benefit of the process of above-mentioned signature verification is that, by signature verification, service node can be to the book keeping operation of accounting nodes
Behavior is verified.If collective practises fraud when accounting nodes are kept accounts, by signature verification, service node just remains book keeping operation section
The evidence of point collective cheating, although having reached the cochain that service node does not have actual participation data block, but still to data field
The cochain of block plays the role of witness.
Step 310-350 is described in detail below.
In the step 310, receive service node to the inquiry request of the Transaction Information in data block and with specific to this
The signature that the private key of service node generates the inquiry request.
As described above, accounting nodes are by after data block cochain, service node has only obtained the block head of data block.
If service node wants inquiry particular transactions information, need to send inquiry request to agent node.Service node generates
One private key specific to service node signs to the inquiry request.The process of signature includes: first with predetermined digest algorithm to looking into
It askes request and determines abstract, then the private key with this specific to service node encrypts the abstract, obtains the signature of the inquiry request.
Service node sends inquiry request and the signature of generation to agent node.
In step 320, the public key certificate of service node is obtained, the public key certificate demonstrate,proves public key in response to service node
The request of book and generate, contain the public key specific to the service node.
The public key certificate is generated by certificate authority (CA) in response to the request of authentication center.In one embodiment
In, the public key certificate is generated in the following way by certificate authority:
It receives the public key certificate for service node sent from authentication center and generates request, the public key certificate generation is asked
Mark in asking containing service node and the private key specific to the service node;
The mark that service node in request is generated for the public key certificate generates special in request according to the public key certificate
Due to the private key of the service node, the public key specific to the service node is generated;
The mark of service node and the public affairs specific to the service node generated in request are generated according to the public key certificate
Key generates the public key certificate of the service node.
Public key certificate generates request, and to be authentication center carry out after certification passes through for the identity of service node, to certificate granting
The request certificate authority that center issues provides the request of public key certificate.The public key certificate, which generates in request, contains industry
Be engaged in node mark and private key specific to the service node.The former effect is to find public key certificate in public key certificate
Holder's node.The effect of the latter is that certificate authority is facilitated to generate accordingly specific to the public key of service node, so as to
Generate public key certificate.
Then, the mark of service node in request is generated for the public key certificate, certificate authority can basis
The public key certificate generates the private key in request specific to the service node, generates the public key specific to the service node.Later,
It can generate the mark of accounting nodes and the public affairs specific to the service node generated in request according to the public key certificate
Key generates the public key certificate of the service node.Public key certificate is generated using existing method.Generate public key certificate meaning be,
It is different from general public key, which is after being authenticated by permission of the authentication center to user, by certificate granting
Heart unified payment, have more reliability.The embodiment by way of by certificate authority unified payment public key certificate,
Improve reliability when agent node signature verification.
In one embodiment, the public key certificate for service node generates request by authentication center according to lower section
Formula generates:
Receive the certification request that service node is sent, mark and registration letter with service node in the certification request
Breath;
The registration information is compared with registration information of the service node when block chain network is registered, it is such as consistent,
Success is then authenticated, the public key certificate is generated and generates request, to be sent to the certificate authority.
After private key of the service node generation specific to service node, certification request is sent to authentication center, it is described to recognize
Mark and registration information with accounting nodes in card request.Authentication center be one to the identity of service node verified from
And ensure the node of safety.The private key specific to service node that can also have service node to generate in certification request.
Authentication center is stored with registration information of the service node in the registration of block chain network.It is by the registration information and service node
Registration information in the registration of block chain network is compared, such as consistent, then authenticates success, generates the public key certificate generation and asks
It asks, to be sent to the certificate authority.The public key certificate generates in request the mark containing service node and specific to industry
The private key of business node.
The advantages of embodiment is, by the authentication of authentication center, to improve the safety of public key certificate granting.
In one embodiment, as shown in Figure 10, step 320 includes:
Step 3201 receives the public key certificate generation notice that the certificate authority is issued to agent node;
Step 3202, Xiang Suoshu certificate authority send the request to the public key certificate;
Step 3203 receives the public key certificate from the certificate authority.
The embodiment use from certificate authority to agent node notify, agent node as needed to public key certificate into
Row pulls this mode.That is, certificate authority once generates public key certificate, corresponding public key certificate will be issued
Generate notice.If agent node is interesting to the public key certificate, it can take and pull and be stored in local this mode.Agency
Node issues the request to public key certificate from Certificate Authority center, which is sent to agent node by Certificate Authority center
Storage.
In the embodiment, as long as certificate authority generates a public key certificate, agent node is noted that pull.When
Agent node receives inquiry request and signature, when needing to verify signature, has obtained public key certificate, Ke Yizhi
It connects and is verified with the public key therein specific to the service node, accelerate the speed of signature verification.
In one embodiment, as shown in figure 11, step 320 includes:
Step 3204, the request that the public key certificate is sent to accounting nodes, so that the accounting nodes are from block chain
It include to obtain the public key certificate in the data block of the public key certificate, wherein described in the certificate authority generates
Accounting nodes are sent by the public key certificate after public key certificate, are recorded on block chain after data block is added by accounting nodes;
Step 3205 receives the public key certificate that accounting nodes return.
In this embodiment, public key certificate is safeguarded on block chain.Certificate authority is generated specific to the business
After the public key of node, since certificate authority is not the accounting nodes in accounting nodes sub-network, public key card can not be carried out
The cochain of book.It will be by the corresponding accounting nodes in accounting nodes sub-network come cochain.Therefore, certificate authority
Accounting nodes are sent by the public key certificate, after being known together between all accounting nodes in accounting nodes sub-network, note
Record is on block chain.When agent node needs to obtain the public key certificate to carry out signature verification, since it is not accounting nodes
An accounting nodes in sub-network will also send the request for obtaining the public key certificate to a corresponding accounting nodes.Book keeping operation
After node receives the request, from include on block chain the public key certificate data block in, obtain the public key certificate, and to
Agent node returns.
In one embodiment, the mark containing service node in the request of the public key certificate.Due in public key certificate
Mark containing public key and service node specific to service node, accounting nodes can find band on block chain
The public key certificate for stating the mark of service node is returned to agent node.
Cochain safeguards that the advantages of public key certificate is the occupancy to agent node memory space to be reduced, moreover, the public key of cochain
Certificate validity is higher, prevents from being tampered.
In a step 330, the public key with this specific to the service node verifies the signature.
In one embodiment, step 330 includes:
The signature is decrypted using the public key specific to the service node, obtains plucking for the inquiry request
It wants;
The inquiry request is calculated using predetermined digest algorithm and is made a summary, the predetermined digest algorithm and service node with specific to
It is identical that the private key of the service node generates digest algorithm used when signing to the inquiry request;
If calculated abstract is consistent with the abstract that decryption obtains, it is proved to be successful.
As described above, signing includes generating abstract using predetermined digest algorithm to inquiry request, then using described in utilization
The process encrypted specific to the private key of the service node.When signature verification, first with described specific to the service node
Public key to it is described signature be decrypted, obtain the abstract of the inquiry request.If the signature is the true label of accounting nodes
Name, and midway, without loss, which should be the same with that abstract generated when generating and signing.Therefore, then with generation
Same predetermined digest algorithm when the signature generates an abstract to inquiry request, if two abstracts are consistent, illustrates this
Signature is the actual signature of accounting nodes, and midway is without loss, signature verification success.
In one embodiment, step 310 only executes in the successful situation of signature verification, the case where signing failure
Under, service node must not carry out the inquiry of Transaction Information, ensure that the safety of Transaction Information inquiry.
In step 340, in the case where being proved to be successful, accounting nodes are sent by inquiry request, so as to accounting nodes
According to the target service node permissions data of service node, it is determined whether the transaction letter into the service node returned data block
Breath, the target service node permissions data indicate the service node have the right inquiry target service node.
In one embodiment, as shown in figure 8, the target service node permissions data according to service node, determines
Whether the Transaction Information into the service node returned data block, including the following steps executed by accounting nodes:
Step 510 obtains the corresponding target service node permissions data of the service node;
Step 420, for each Transaction Information in the data block, determine applying side or being by dynamic side for Transaction Information
No is one of the target service node indicated in the target service node permissions data, wherein if Transaction Information is applied
Side is one of the target service node indicated in the target service node permissions data by dynamic side, then is returned to the service node
Return the Transaction Information.
In one embodiment, a kind of service node and target service node permission number are safeguarded in advance in each accounting nodes
According to mapping table.Accounting nodes can obtain the corresponding target service of the service node by inquiring the mapping table
Node permissions data.
In another embodiment, each service node and block chain operator are concluded in advance intelligent contract.It can be from
In service node and the intelligent contract of block chain operator, the corresponding target service node permissions data of the service node is obtained.
It is well known that transaction is the behavior that a side causes another party.Causing a side of behavior is exactly Shi Dongfang, is caused row
For a side be exactly by dynamic side.For example, unit terminal of making out an invoice is exactly Shi Dongfang in the transaction for outputing electronic invoice, ticket people is led
Terminal is exactly by dynamic side.In the transfer transactions of legal digital cash, the side's of producing terminal of legal digital cash is exactly Shi Dongfang,
The side's of being transferred to terminal of legal digital cash is exactly by dynamic side.
Target service node permissions data indicate the service node have the right inquiry target service node.If transaction letter
Breath is applied just or be one of the target service node indicated in the target service node permissions data by dynamic side, and being all can be with
Transaction Information is returned to it.For example, there are two subsidiary, the business sections of the two subsidiaries for unit belonging to service node A
Point is A1 and A2.The target service node permissions data of service node A may indicate that service node A have the right inquiry target service
Node is A, A1 and A2.If one in A, A1 and A2 is applied just or had by dynamic side to Transaction Information, service node A has the right
Limit inquires this Transaction Information.
Side is applied there are two types of representation in Transaction Information, and one is directly indicate that another kind is with applying side's title
It is indicated with other Transaction Informations, indicates that the side that applies of this Transaction Information is other Transaction Informations by dynamic side.In this way, if should
The side that applies of Transaction Information is latter representation, i.e., applying for the Transaction Information is just another Transaction Information by dynamic side,
Another Transaction Information is one of the target service node indicated in the target service node permissions data by dynamic side, this
In the case of to be also in a disguised form equivalent to the side that applies of the Transaction Information be also to indicate in the target service node permissions data in fact
One of target service node, the service node should also have the right to inquire the target service node Transaction Information.
For example, the side that applies of Transaction Information TX4 is indicated with TX1+TX2, i.e. the side that applies of Transaction Information TX4 is Transaction Information
TX1 by dynamic side and Transaction Information TX2 by dynamic side.For example, Transaction Information TX4 is the Transaction Information of electronic invoice reimbursement, hand over
Easy information TX1 and TX2 are the Transaction Information that two electronic invoices are made out an invoice respectively.In Transaction Information TX1, A1 is neck ticket people.Transaction
In information TX2, B is neck ticket people.TX4 apply side TX1+TX2 indicate TX1 by dynamic side (i.e. neck ticket people A1) and TX2 by moving
(i.e. neck ticket people B) is submitted an expense account together for side.Therefore, the side that applies of Transaction Information TX4 is indicated with TX1+TX2 on surface, in fact, it
Applying side is A1+B.In this way, if target service node permissions data indicate service node A have the right inquiry business node A and
The Transaction Information of A1 (subsidiary that A1 is A), then the A1 in A1+B is that service node A has the right to inquire Transaction Information for it
's.Therefore, Transaction Information can be returned to the service node.
It is being that applying for Transaction Information is just indicated with other Transaction Informations (that is, this Transaction Information that the embodiment, which overcomes,
Applying side is other Transaction Informations by dynamic side) when, it is possible to individually judge from applying for Transaction Information just or by dynamic side
It whether is the incorrect problem of one of the target service node indicated in the target service node permissions data, because this
In the case of, Transaction Information apply side be substantially in the target service node permissions data target service node that indicates it
One, but be not in form, therefore cause to judge by accident.This embodiment improves determine whether that Transaction Information should be returned to service node
Accuracy.
In one embodiment, if Transaction Information applies side or by dynamic side neither the target service node permission
One of target service node indicated in data, nor another Transaction Information by dynamic side, and another Transaction Information by
Dynamic side is one of the target service node indicated in the target service node permissions data, then returns to the friendship to the service node
The cryptographic Hash of easy information.
(the first situation is applying side or being the mesh by dynamic side itself for Transaction Information that is, in above two situation
One of the target service node indicated in mark service node permissions data, second case are that the side that applies of the Transaction Information is another
One Transaction Information by dynamic side, and another Transaction Information is to indicate in the target service node permissions data by dynamic side
One of target service node), all it will be understood that the service node has the right to inquire the Transaction Information.If being not belonging to both feelings
Shape, i.e. Transaction Information apply side or by dynamic side neither the target service section indicated in the target service node permissions data
One of point, nor another Transaction Information by dynamic side, and another Transaction Information is the target service node by dynamic side
One of target service node indicated in permissions data, then it is assumed that the service node haves no right to inquire the Transaction Information, is at this moment not
Transaction Information should be returned to the service node, for content verification, the cryptographic Hash of Transaction Information can be returned only to.
In one embodiment, it is generated in advance the intelligent contract of service node Yu block chain operator, and by the intelligence of generation
Energy contract is synchronized to the storage of each accounting nodes in accounting nodes sub-network.In this way, the target service node permission in step 340
Data, so that it may be obtained from the intelligent contract of the service node and block chain operator that the accounting nodes store.
In the embodiment, the intelligent contract of each service node and block chain operator can be stored in accounting nodes subnet
In each accounting nodes in network.The benefit of the embodiment is, since intelligent contract is all locally stored in each accounting nodes, significantly
Improve the processing speed that Transaction Information or cryptographic Hash are returned to service node.
In another embodiment, intelligent contract is not each accounting nodes for being previously stored in accounting nodes sub-network
In, but upper chained record.In this way, can be searched when each accounting nodes need to obtain permissions data from intelligent contract with cochain.
The advantages of embodiment is that the intelligence compared to one each service node of database purchase of each accounting nodes internal maintenance is closed
About, the occupancy of intra-node memory space is saved.
In this embodiment, it is generated in advance the intelligent contract of service node Yu block chain operator, and by the intelligence of generation
Intelligent contract block corresponding with the service node is added in contract, is recorded on block chain.In this way, the target industry in step 340
Be engaged in node permissions data, so that it may from intelligence contract block corresponding with the service node on block chain the service node with
It is obtained in the intelligent contract of block chain operator.
As shown in figure 12, the accounting nodes in step 350 sent inquiry request to according to an embodiment of the present disclosure
It is selected in the following way from accounting nodes sub-network:
Step 710, the processing load for obtaining each accounting nodes in accounting nodes sub-network;
Step 720 determines each accounting nodes in accounting nodes sub-network to the service node for sending the inquiry request
Distance;
Step 730 is based on the processing load and the distance, determines the accounting nodes for sending inquiry request to.
Processing load is the parameter of the burden for the indicating that accounting nodes are being handled of the task.In one embodiment, it handles
Load can be measured with the untreated complete number of tasks of accounting nodes.Here task includes Transaction Information cochain task and inquiry
Task.These untreated complete number of tasks can represent the processing load of accounting nodes.
In one embodiment, step 710 includes:
It obtains the processing load that each accounting nodes are periodically sent and stores;
The processing load for the accounting nodes that accounting nodes the last time is stored is as the processing of the accounting nodes obtained
Load.
That is, in this embodiment, processing load can periodically (for example, every 5 seconds) be sent by each accounting nodes
To agent node.Agent node safeguards a processing load meter, and it is fixed that each accounting nodes received are recorded in the processing load meter
The processing load of phase broadcast.In this way, agent node can bear the processing for the accounting nodes that accounting nodes the last time stores
Processing load of the lotus as the accounting nodes obtained.
In this embodiment, agent node passively receives the processing load that accounting nodes are periodically sent.In another implementation
In example, the processing load of agent node active inquiry accounting nodes.In this embodiment, step 710 includes:
Into accounting nodes sub-network, each accounting nodes send processing load inquiry request;
Receive the processing load for the accounting nodes that each accounting nodes are sent.
In one embodiment, it in step 720, determines in accounting nodes sub-network and is looked into described in each accounting nodes to transmission
Ask the distance of the service node of request, comprising:
Into accounting nodes sub-network, each accounting nodes and the service node of the transmission inquiry request issue positioning
Information request;
Each accounting nodes and transmission institute are received from each accounting nodes and the service node for sending the inquiry request
State the location information of the service node of inquiry request;
Using the location information of each accounting nodes and the service node for sending the inquiry request, each book keeping operation section is determined
Distance of the point to the service node for sending the inquiry request.
Each service node and accounting nodes may have the positioning systems such as GPS, and therefore, they have from itself
The location information of itself can be obtained in GPS positioning system.It, will when receiving the location information requests that agent node is sent
The location information of itself obtained from GPS system is sent to agent node.When agent node obtain each accounting nodes and
After the location information for sending the service node of the inquiry request, these location informations are utilized, it will be able to determine each book keeping operation section
Distance of the point to the service node for sending the inquiry request.
In the above-described embodiments, location information is obtained using the mode by agent node activly request, is born with processing
Lotus is the same, the location information can also using from each accounting nodes and send the service node of the inquiry request periodically to
The mode that agent node is sent, therefore do not repeat.
The advantages of embodiment, is, when determining the accounting nodes for executing the method, considers not only each book keeping operation section
The processing load of point, it is also contemplated that each accounting nodes are with a distance from the service node for sending the inquiry request.Although may
The processing load of a certain accounting nodes is minimum, but the accounting nodes may be very from the service node for sending the inquiry request
Far, it is chosen as executing the accounting nodes of the method, increases network transmission burden, also reduce query processing speed.It should
Embodiment has comprehensively considered distance and processing load, and the book keeping operation section of inquiry is executed than determining according to distance or processing load merely
Point scheme, can substantially balanced each accounting nodes processing load and cause too big transmission burden to network.
In one embodiment, as shown in figure 13, step 730 may include:
Step 7301, the processing load based on each accounting nodes in accounting nodes sub-network, determine each book keeping operation
First score of node;
Step 7302, the distance based on each accounting nodes in accounting nodes sub-network, determine each accounting nodes
The second score;
Step 7303, the first score and the second score based on each accounting nodes, what determination sent inquiry request to
Accounting nodes.
In step 7301, based on the processing load of each accounting nodes in accounting nodes sub-network, determine each
First score of accounting nodes can take the form for searching pre-set processing load and the first score mapping table.It should
Processing load is preset with the first score mapping table, wherein processing load is bigger, the first score is lower.Such as:
It handles load (untreated complete number of tasks) | First score |
0-1 | 5 |
2-4 | 4 |
5-9 | 3 |
10-19 | 2 |
20-49 | 1 |
50 or more | 0 |
Table 1 handles load and the first score mapping table
In step 7302, based on the distance of each accounting nodes in accounting nodes sub-network, each book keeping operation section is determined
Second score of point can take the form for searching pre-set distance and the second score mapping table.The distance and second
Score mapping table is preset, wherein distance is bigger, the second score is lower.Such as:
Distance | Second score |
Within 50 meters | 5 |
50-200 meters | 4 |
200-1000 meters | 3 |
1000-5000 meters | 2 |
5000-20000 meters | 1 |
20000 meters or more | 0 |
2 distance of table and the second score mapping table
There are the first score and the second score of each accounting nodes, so that it may determine according to the first score and the second score
Execute the accounting nodes of the method.The advantages of embodiment, is, by the institute of accounting nodes each in accounting nodes sub-network
It states the described of each accounting nodes in processing load and accounting nodes sub-network and the side is executed to selection apart from the two factors
The influence fractionation of the accounting nodes of method improves the accuracy that selection executes the accounting nodes of the method.
In one embodiment, as shown in figure 14, step 7303 includes:
The weighted sum of step 73031, the first score for determining each accounting nodes and the second score;
Step 73032 is based on the weighted sum, determines the accounting nodes for sending inquiry request to.
In step 73031, when determining weighted sum, the weight distributed for the first score and the second score be can be according to warp
It tests preset.
In step 73032, the maximum accounting nodes of the weighted sum can be determined as receiving described to cochain transaction
Weighted sum can also be greater than in the accounting nodes of predetermined weighted sum threshold value optional one, as reception by the accounting nodes of information
The accounting nodes to cochain Transaction Information.It is all load as long as being believed that weighted sum is greater than predetermined weighted sum threshold value
Not counting it is too big and apart from the service node sent to cochain Transaction Information not counting too far, which chooses as the execution side
The accounting nodes of method are the same.In the latter matter, the equilibrium for also helping load prevents from all selecting in same time
The maximum accounting nodes of weighted sum, and cause the obvious overload state of the maximum accounting nodes of the weighted sum.
The advantages of embodiment is the weighted sum of the first score and the second score based on each accounting nodes, and determining will
The accounting nodes that inquiry request is sent to, compared to based on the first score and the second score and/or average value determine and ask inquiry
The scheme for seeking the accounting nodes being sent to has fully taken into account the first score and the second score and has sent inquiry request for determining
The otherness of the contribution of the accounting nodes arrived improves the reasonability for determining the accounting nodes for sending inquiry request to.
The embodiment for the accounting nodes that above-mentioned determination sends inquiry request to is mainly for Figure 1A -1B in accounting nodes
Sub-network end does not have the case where branch's accounting nodes sub-network.But the accounting nodes sub-network end shown in Fig. 1 C is divided into branch's note
It is then another situation in the embodiment of account node sub-network.
In this embodiment, Transaction Information type, e.g. supply chain financial transaction or electronics hair are had in inquiry request
Ticket transaction or the transaction of legal digital cash.Accounting nodes in accounting nodes sub-network are in advance according to the Transaction Information class of processing
Type classification, the accounting nodes of the every one kind being divided into separately constitute corresponding branch accounting nodes sub-network, for example, supply chain
Financial transaction branch accounting nodes sub-network or electronic invoice transaction branch's accounting nodes sub-network or legal digital cash are handed over
Easily branched accounting nodes sub-network, a kind of each branch's accounting nodes sub-network special disposal transaction class corresponding with type of transaction
Type.Therefore, which will be dealt into respective type according to the Transaction Information type carried in inquiry request by agent node
In an accounting nodes in branch's accounting nodes sub-network.In order to reach this point, accounting nodes are stored in agent node
The Transaction Information type corresponding record of mark and Transaction Information type mapping table, accounting nodes mark and processing is saved in book keeping operation
In point identification and Transaction Information type mapping table.
In this embodiment, as shown in figure 15, the accounting nodes sent inquiry request to are from accounting nodes sub-network
It selects in the following way:
Transaction Information type in step 740, acquisition inquiry request;
Step 750, the friendship from accounting nodes mark and Transaction Information type mapping table, in lookup and inquiry request
The easily corresponding accounting nodes mark of information type;
Step 760, from the accounting nodes that the accounting nodes that find identify, determine the book keeping operation section for sending inquiry request to
Point.
The benefit of the embodiment is to be divided into branch's accounting nodes sub-network for accounting nodes sub-network end shown in Fig. 1 C
Architecture, propose a kind of side of accounting nodes that the reasonable selection for being suitble to the architecture sends inquiry request to
Formula.
It in one embodiment, include Transaction Information type in the Transaction Information type field in inquiry request.Step 740
In, can Transaction Information type directly be read from the Transaction Information type field.
Due to being provided with accounting nodes mark and Transaction Information type mapping table on agent node, in one embodiment
In, in step 740, from the table, accounting nodes mark corresponding with the Transaction Information type in inquiry request can be found.
As shown in figure 16, in one embodiment, step 760 includes:
Step 7601, the processing load for determining the accounting nodes that the accounting nodes each found identify;
Step 7602 determines the accounting nodes of the accounting nodes mark each found to the business of the transmission inquiry request
The distance of node;
Step 7603 is based on the processing load and the distance, determines the accounting nodes for sending inquiry request to.
The specific implementation process of step 7601-7603 and the specific implementation process of step 710-730 are similar, and difference is only that
Determined in the embodiment of Figure 16 processing load and to the service node for sending the inquiry request distance accounting nodes model
Enclose the book keeping operation section of accounting nodes mark corresponding with Transaction Information type in inquiry request that is being only limitted to find in step 750
Point is not all accounting nodes in accounting nodes sub-network, therefore does not repeat.
According to one embodiment of the disclosure, as shown in figure 17, additionally provides one kind and inquire data in block chain network
The agent node of Transaction Information in block, the block chain network include accounting nodes sub-network and service node sub-network,
The accounting nodes sub-network includes accounting nodes data block being recorded on block chain, the service node sub-network packet
Include the service node verified to the data block that accounting nodes are recorded on block chain, accounting nodes sub-network and business section
Point sub-network is communicated by agent node, and the agent node is a service node in service node sub-network, institute
Stating agent node includes:
Inquiry request and signature receiving unit 910, for receiving service node looking into the Transaction Information in data block
The signature ask request and the inquiry request is generated with the private key specific to the service node;
Public key certificate acquiring unit 920, for obtaining the public key certificate of the service node, the public key certificate is in response to industry
Business node generates the request of public key certificate, contains the public key specific to the service node;
Service node public key acquisition unit 930, for obtaining specific to the business from the public key certificate of the service node
The public key of node;
Service node signature verification unit 940, for being tested with the public key specific to the service node the signature
Card;
Inquiry request transmission unit 950, for sending accounting nodes for inquiry request in the case where being proved to be successful,
So that accounting nodes are according to the target service node permissions data of service node, it is determined whether to the service node returned data area
Transaction Information in block, the target service node permissions data indicate the service node have the right inquiry target service node.
In one embodiment, the public key certificate is generated in the following way by certificate authority:
It receives the public key certificate for service node sent from authentication center and generates request, the public key certificate generation is asked
Mark in asking containing service node and the private key specific to the service node;
The mark that service node in request is generated for the public key certificate generates special in request according to the public key certificate
Due to the private key of the service node, the public key specific to the service node is generated;
The mark of service node and the public affairs specific to the service node generated in request are generated according to the public key certificate
Key generates the public key certificate of the service node.
In one embodiment, the public key certificate generates request and is generated in the following way by authentication center:
Receive the certification request that service node is sent, mark and registration letter with service node in the certification request
Breath;
The registration information is compared with registration information of the service node when block chain network is registered, it is such as consistent,
Success is then authenticated, the public key certificate is generated and generates request, to be sent to the certificate authority.
In one embodiment, the service node signature verification unit 940 is further used for:
The signature is decrypted using the public key specific to the service node, obtains plucking for the inquiry request
It wants;
The inquiry request is calculated using predetermined digest algorithm and is made a summary, the predetermined digest algorithm and service node with specific to
It is identical that the private key of the service node generates digest algorithm used when signing to the inquiry request;
If calculated abstract is consistent with the abstract that decryption obtains, it is proved to be successful.
In one embodiment, the target service node permissions data according to service node, it is determined whether to the industry
The Transaction Information being engaged in node returned data block, comprising:
Obtain the corresponding target service node permissions data of the service node;
For each Transaction Information in the data block, applying side or whether being described by dynamic side for Transaction Information is determined
One of the target service node indicated in target service node permissions data, wherein if Transaction Information applies side or by dynamic
Side is one of the target service node indicated in the target service node permissions data, then returns to the transaction to the service node
Information.
In one embodiment, if the side that applies of the Transaction Information is another Transaction Information by dynamic side, and this is another
Transaction Information is one of the target service node indicated in the target service node permissions data by dynamic side, then to the business
Node returns to the Transaction Information.
In one embodiment, if Transaction Information applies side or by dynamic side neither the target service node permission
One of target service node indicated in data, nor another Transaction Information by dynamic side, and another Transaction Information by
Dynamic side is one of the target service node indicated in the target service node permissions data, then returns to the friendship to the service node
The cryptographic Hash of easy information.
In one embodiment, the service node is to the inquiry request of the Transaction Information in data block in the business
Node is sent after carrying out signature verification to the signature in the block head of the data block, to the label in the block head of the data block
Name carries out signature verification
The block head of the data block sent by accounting nodes is received, is contained in the block head in the data block
Transaction Information generate abstract and signature, it is described signature by the accounting nodes utilize specific to the accounting nodes private key to institute
Abstract is stated to be encrypted and generated;
The public key certificate of accounting nodes is obtained, the public key certificate gives birth to the request of public key certificate in response to accounting nodes
At containing the public key specific to the accounting nodes;
From the public key certificate of the accounting nodes, the public key specific to the accounting nodes is obtained;
Using the public key specific to the accounting nodes, the signature is decrypted, it will be in decrypted result and block head
Abstract compare, to realize signature verification.
In one embodiment, the public key certificate of the accounting nodes is generated in the following way by certificate authority:
It receives the public key certificate for accounting nodes sent from authentication center and generates request, the public key certificate generation is asked
Mark in asking containing accounting nodes and the private key specific to the accounting nodes;
The mark that accounting nodes in request are generated for the public key certificate generates special in request according to the public key certificate
Due to the private key of the accounting nodes, the public key specific to the accounting nodes is generated;
The mark of accounting nodes and the public affairs specific to the accounting nodes generated in request are generated according to the public key certificate
Key generates the public key certificate of the accounting nodes.
In one embodiment, the public key certificate for accounting nodes generates request by authentication center according to lower section
Formula generates:
Receive the certification request that accounting nodes are sent, mark and registration letter with accounting nodes in the certification request
Breath;
The registration information is compared with registration information of the accounting nodes when block chain network is registered, it is such as consistent,
Success is then authenticated, the public key certificate is generated and generates request, to be sent to the certificate authority.
In one embodiment, the public key certificate acquiring unit is further used for:
It receives the public key certificate that the certificate authority is issued to agent node and generates notice;
The request to the public key certificate is sent to the certificate authority;
The public key certificate is received from the certificate authority.
In one embodiment, the public key certificate acquiring unit is further used for:
The request of the public key certificate is sent, to accounting nodes so that the accounting nodes include described from block chain
In the data block of public key certificate, the public key certificate is obtained, wherein after the certificate authority generates the public key certificate
Accounting nodes are sent by the public key certificate, are recorded on block chain after data block is added by accounting nodes;
Receive the public key certificate that accounting nodes return.
The method for inquiring the Transaction Information in data block in the block chain network according to the embodiment of the present disclosure can be by
The accounting nodes 21 for the Transaction Information of Figure 18 inquired in data block in block chain network are realized.It is retouched referring to Figure 18
State the accounting nodes 21 that the Transaction Information in data block is inquired in block chain network according to the embodiment of the present disclosure.Figure 18 is aobvious
The accounting nodes 21 of the Transaction Information inquired in data block in block chain network shown are only an example, should not be to this
The function and use scope of open embodiment bring any restrictions.
As shown in figure 18, the accounting nodes 21 of the Transaction Information in data block are inquired in block chain network in terms of general
Calculate the form performance of equipment.The component that the accounting nodes 21 of the Transaction Information in data block are inquired in block chain network can be with
Including but not limited to: at least one above-mentioned processing unit 810, at least one above-mentioned storage unit 820, the different system components of connection
The bus 830 of (including storage unit 820 and processing unit 810).
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 810
Row, so that the processing unit 810 executes described in the description section of this specification above-mentioned example method according to the present invention
The step of various illustrative embodiments.For example, the processing unit 810 can execute each step as shown in Figure 6.
Storage unit 820 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit
(RAM) 8201 and/or cache memory unit 8202, it can further include read-only memory unit (ROM) 8203.
Storage unit 820 can also include program/utility with one group of (at least one) program module 8205
8204, such program module 8205 includes but is not limited to: operating system, one or more application program, other program moulds
It may include the realization of network environment in block and program data, each of these examples or certain combination.
Bus 830 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage
Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures
Local bus.
The accounting nodes 21 that the Transaction Information in data block is inquired in block chain network can also be with one or more
External equipment 700 (such as keyboard, sensing equipment, bluetooth equipment etc.) communication, can also be enabled a user to one or more with
This inquires the transaction of the Transaction Information in data block inquired in data block in block chain network in block chain network
Information accounting nodes 21 interaction equipment communication, and/or with make the friendship inquired in data block in block chain network
Any equipment that the accounting nodes 21 of easy information can be communicated with one or more of the other calculating equipment (such as router, adjust
Modulator-demodulator etc.) communication.This communication can be carried out by input/output (I/O) interface 650.Also, in block chain network
The accounting nodes 21 of Transaction Information in middle inquiry data block can also pass through network adapter 860 and one or more net
Network (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) communication.As shown, Network adaptation
Other moulds that device 860 passes through bus 830 and the accounting nodes 21 for the Transaction Information inquired in data block in block chain network
Block communication.It should be understood that although not shown in the drawings, can be in conjunction with the Transaction Information inquired in block chain network in data block
Accounting nodes 21 use other hardware and/or software module, including but not limited to: microcode, device driver, redundancy processing
Unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented
Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure
The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one
Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating
Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment
Method.
In an exemplary embodiment of the disclosure, a kind of computer program medium is additionally provided, computer is stored thereon with
Readable instruction makes computer execute the above method and implements when the computer-readable instruction is executed by the processor of computer
The method of example part description.
According to one embodiment of the disclosure, a kind of journey for realizing the method in above method embodiment is additionally provided
Sequence product, can be using portable compact disc read only memory (CD-ROM) and including program code, and can set in terminal
It is standby, such as run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can
With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or
Person is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter
Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or
System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive
List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only
Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory
(CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal,
In carry readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal,
Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing
Matter, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or and its
The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have
Line, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages
Code, described program design language include object oriented program language-Java, C++ etc., further include conventional
Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user
It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating
Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far
Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network
(WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP
To be connected by internet).
It should be noted that although being referred to several modules or list for acting the equipment executed in the above detailed description
Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more
Module or the feature and function of unit can embody in a module or unit.Conversely, an above-described mould
The feature and function of block or unit can be to be embodied by multiple modules or unit with further division.
In addition, although describing each step of method in the disclosure in the accompanying drawings with particular order, this does not really want
These steps must be executed in this particular order by asking or implying, or having to carry out step shown in whole could realize
Desired result.Additional or alternative, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/
Or a step is decomposed into execution of multiple steps etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented
Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure
The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one
Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating
Equipment (can be personal computer, server, mobile terminal or network equipment etc.) is executed according to disclosure embodiment
Method.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure
Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or
Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure
Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by appended
Claim is pointed out.
Claims (7)
1. it is a kind of in block chain network to the signature verification method of uplink data block, which is characterized in that the block link network
Network includes accounting nodes sub-network and service node sub-network, and the accounting nodes sub-network includes that area is recorded in data block
Accounting nodes on block chain, the service node sub-network include uplink data block accounting nodes being recorded on block chain
The service node verified of signature, the method executes by service node, which comprises
The block head of the uplink data block sent by accounting nodes is received, is contained in the block head in the data block
The abstract and signature that Transaction Information generates, the signature utilize the private key specific to the accounting nodes to described by the accounting nodes
Abstract is encrypted and is generated;
The public key certificate of accounting nodes is obtained, the public key certificate generates the request of public key certificate in response to accounting nodes,
Contain the public key specific to the accounting nodes;
From the public key certificate of the accounting nodes, the public key specific to the accounting nodes is obtained;
Using the public key specific to the accounting nodes, the signature is decrypted, by decrypted result and plucking in block head
It compares, to realize signature verification.
2. the method according to claim 1, wherein the block head by the accounting nodes in the following manner
It generates:
The abstract is generated to the Transaction Information in data block using predetermined digest algorithm;
For the private key specific to the accounting nodes, abstract is encrypted using it, generates the signature;
The abstract of previous data block on the abstract, the signature and block chain is put into the block head of data block.
3. the method according to claim 1, wherein the block chain network further includes certificate authority and recognizes
Card center, the public key certificate for obtaining accounting nodes, comprising: the public key card of accounting nodes is obtained from the certificate authority
Book;
The public key certificate of the accounting nodes is generated in the following way by certificate authority:
It receives the public key certificate for accounting nodes sent from authentication center and generates request, the public key certificate generates in request
Mark containing accounting nodes and the private key specific to the accounting nodes;
For the public key certificate generate request in accounting nodes mark, according to the public key certificate generate request in specific to
The private key of the accounting nodes generates the public key specific to the accounting nodes;
The mark of accounting nodes and the public key specific to the accounting nodes generated in request are generated according to the public key certificate,
Generate the public key certificate of the accounting nodes.
4. according to the method described in claim 3, it is characterized in that, the public key certificate for accounting nodes generate request by
Authentication center generates in the following way:
Receive the certification request that accounting nodes are sent, mark and registration information with accounting nodes in the certification request;
The registration information is compared with registration information of the accounting nodes when block chain network is registered, it is such as consistent, then recognize
It demonstrate,proves successfully, generates the public key certificate and generate request, to be sent to the certificate authority.
5. the service node in a kind of block chain network, the block chain network includes accounting nodes sub-network and service node
Network, the accounting nodes sub-network include accounting nodes data block being recorded on block chain, service node
Network includes the service node that the signature for uplink data block accounting nodes being recorded on block chain is verified, institute
Stating service node includes:
Block head receiving unit, for receiving the block head of the uplink data block sent by accounting nodes, in the block head
Containing the abstract and signature generated to the Transaction Information in the data block, the signature is utilized by the accounting nodes specific to this
The private key of accounting nodes encrypts the abstract and is generated;
Public key certificate acquiring unit, for obtaining the public key certificate of accounting nodes, the public key certificate is in response to accounting nodes pair
The request of public key certificate and generate, contain the public key specific to the accounting nodes;
Public key acquisition unit, for obtaining the public key specific to the accounting nodes from the public key certificate of the accounting nodes;
Signature verification unit is decrypted the signature for utilizing the public key specific to the accounting nodes, and decryption is tied
Fruit compares with the abstract in block head, to realize signature verification.
6. the service node in a kind of block chain network characterized by comprising
Memory is stored with computer-readable instruction;
Processor reads the computer-readable instruction of memory storage, requires side described in any of 1-4 with perform claim
Method.
7. a kind of computer program medium, is stored thereon with computer-readable instruction, when the computer-readable instruction is calculated
When the processor of machine executes, computer perform claim is made to require method described in any of 1-4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910672008.5A CN110457942B (en) | 2018-12-07 | 2018-12-07 | Signature verification method for uplink data block, service node and medium |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910672008.5A CN110457942B (en) | 2018-12-07 | 2018-12-07 | Signature verification method for uplink data block, service node and medium |
CN201811495782.5A CN109635585B (en) | 2018-12-07 | 2018-12-07 | Method, proxy node and medium for querying transaction information in blockchain network |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811495782.5A Division CN109635585B (en) | 2018-12-07 | 2018-12-07 | Method, proxy node and medium for querying transaction information in blockchain network |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110457942A true CN110457942A (en) | 2019-11-15 |
CN110457942B CN110457942B (en) | 2022-11-04 |
Family
ID=66072039
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910672008.5A Active CN110457942B (en) | 2018-12-07 | 2018-12-07 | Signature verification method for uplink data block, service node and medium |
CN201811495782.5A Active CN109635585B (en) | 2018-12-07 | 2018-12-07 | Method, proxy node and medium for querying transaction information in blockchain network |
CN201911168761.7A Active CN110929288B (en) | 2018-12-07 | 2018-12-07 | Method for generating public key certificate, certificate authority and medium |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811495782.5A Active CN109635585B (en) | 2018-12-07 | 2018-12-07 | Method, proxy node and medium for querying transaction information in blockchain network |
CN201911168761.7A Active CN110929288B (en) | 2018-12-07 | 2018-12-07 | Method for generating public key certificate, certificate authority and medium |
Country Status (1)
Country | Link |
---|---|
CN (3) | CN110457942B (en) |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111131171A (en) * | 2019-12-03 | 2020-05-08 | 深圳前海微众银行股份有限公司 | Node authentication method and device based on block chain network |
CN111476617A (en) * | 2020-04-03 | 2020-07-31 | 腾讯科技(深圳)有限公司 | Data processing method, data processing device, computer equipment and medium |
CN111526015A (en) * | 2020-04-26 | 2020-08-11 | 昆明大棒客科技有限公司 | Data acquisition uplink method, device, equipment and storage medium |
CN111835783A (en) * | 2020-07-22 | 2020-10-27 | 东莞市盟大塑化科技有限公司 | Data retrieval method and device and computer equipment |
CN112100178A (en) * | 2020-09-08 | 2020-12-18 | 中国联合网络通信集团有限公司 | Delegation authorization verification method and system |
CN112131304A (en) * | 2020-02-10 | 2020-12-25 | 北京天德科技有限公司 | Novel calculation and storage architecture based on block chain technology |
CN112163213A (en) * | 2020-09-28 | 2021-01-01 | 日立楼宇技术(广州)有限公司 | Elevator authentication method and device, computer equipment and storage medium |
CN112217636A (en) * | 2020-09-17 | 2021-01-12 | 建信金融科技有限责任公司 | Data processing method and device based on block chain, computer equipment and medium |
CN112381540A (en) * | 2020-11-13 | 2021-02-19 | 从法信息科技有限公司 | Method and device for verifying signed document based on zero-knowledge proof and electronic equipment |
CN113542396A (en) * | 2021-07-13 | 2021-10-22 | 润联软件系统(深圳)有限公司 | Block chain storage and communication method, system and related components thereof |
CN114491671A (en) * | 2022-01-27 | 2022-05-13 | 宋舒涵 | Market supervision commodity label tracing method and system based on block chain |
WO2023168993A1 (en) * | 2022-03-07 | 2023-09-14 | 腾讯科技(深圳)有限公司 | Blockchain-based data processing method, apparatus, and device, medium, and product |
Families Citing this family (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110223128A (en) * | 2019-05-20 | 2019-09-10 | 深圳壹账通智能科技有限公司 | A kind of method and relevant apparatus of data processing |
US11252166B2 (en) | 2019-07-31 | 2022-02-15 | Advanced New Technologies Co., Ltd. | Providing data authorization based on blockchain |
US11057189B2 (en) | 2019-07-31 | 2021-07-06 | Advanced New Technologies Co., Ltd. | Providing data authorization based on blockchain |
CN110473094B (en) * | 2019-07-31 | 2021-05-18 | 创新先进技术有限公司 | Data authorization method and device based on block chain |
US11251963B2 (en) | 2019-07-31 | 2022-02-15 | Advanced New Technologies Co., Ltd. | Blockchain-based data authorization method and apparatus |
CN110602096B (en) | 2019-09-12 | 2021-07-13 | 腾讯科技(深圳)有限公司 | Data processing method, device, storage medium and equipment in block chain network |
CN111010382B (en) * | 2019-09-12 | 2021-06-01 | 腾讯科技(深圳)有限公司 | Method and apparatus for processing data requests in a blockchain network |
CN110995673B (en) * | 2019-11-20 | 2022-05-31 | 腾讯科技(深圳)有限公司 | Case evidence management method and device based on block chain, terminal and storage medium |
CN112926972B (en) * | 2019-12-05 | 2024-04-09 | 中移物联网有限公司 | Information processing method based on block chain, block chain system and terminal |
CN111177171A (en) * | 2019-12-31 | 2020-05-19 | 上海分布信息科技有限公司 | Service data authentication and management method and system based on block chain |
US11310051B2 (en) | 2020-01-15 | 2022-04-19 | Advanced New Technologies Co., Ltd. | Blockchain-based data authorization method and apparatus |
CN111489159B (en) * | 2020-04-09 | 2024-03-15 | 腾讯科技(深圳)有限公司 | Data processing method, device, computer equipment and medium |
CN111709053B (en) * | 2020-06-11 | 2024-04-05 | 中国工商银行股份有限公司 | Operation method and operation device based on loose coupling transaction network |
CN112100234B (en) * | 2020-08-12 | 2021-09-10 | 北京大学 | Content addressing method and system of graph type account book based on random consensus |
CN111934996B (en) | 2020-09-25 | 2021-01-12 | 支付宝(杭州)信息技术有限公司 | Message transmission method and device |
CN112434341B (en) * | 2020-11-02 | 2023-07-11 | 迅鳐成都科技有限公司 | Business tampering-resistant blockchain light node data acquisition method and device |
CN112395647B (en) * | 2020-11-02 | 2023-06-13 | 迅鳐成都科技有限公司 | Block chain light node data acquisition system |
CN112214519B (en) * | 2020-11-10 | 2022-03-04 | 支付宝(杭州)信息技术有限公司 | Data query method, device, equipment and readable medium |
CN112231741B (en) * | 2020-12-14 | 2021-03-19 | 腾讯科技(深圳)有限公司 | Data processing method, device, medium and electronic equipment based on block chain system |
CN112685505B (en) * | 2021-01-07 | 2022-06-24 | 腾讯科技(深圳)有限公司 | Transaction data processing method and device, computer equipment and storage medium |
CN112396423B (en) * | 2021-01-20 | 2021-04-13 | 腾讯科技(深圳)有限公司 | Transaction data processing method, device, equipment and storage medium |
CN112600671B (en) * | 2021-03-02 | 2021-06-01 | 腾讯科技(深圳)有限公司 | Data processing method, device, equipment and storage medium |
CN113379542B (en) * | 2021-05-28 | 2024-01-09 | 中邮信息科技(北京)有限公司 | Block chain transaction query method, device, medium and electronic equipment |
CN113282662B (en) * | 2021-06-03 | 2023-11-03 | 广东辰宜信息科技有限公司 | Block information processing method, device, equipment and medium |
CN113255014B (en) * | 2021-07-07 | 2021-09-28 | 腾讯科技(深圳)有限公司 | Data processing method based on block chain and related equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107395557A (en) * | 2017-03-28 | 2017-11-24 | 阿里巴巴集团控股有限公司 | A kind of processing method and processing device of service request |
CN107426170A (en) * | 2017-05-24 | 2017-12-01 | 阿里巴巴集团控股有限公司 | A kind of data processing method and equipment based on block chain |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
CN108322309A (en) * | 2017-12-27 | 2018-07-24 | 北京欧链科技有限公司 | Transaction processing method based on block chain and device |
CN108616539A (en) * | 2018-05-03 | 2018-10-02 | 东莞市翔实信息科技有限公司 | A kind of method and system that block chain transaction record accesses |
CN108717443A (en) * | 2018-05-17 | 2018-10-30 | 北京京东金融科技控股有限公司 | Data sharing method, block catenary system and computer readable storage medium |
Family Cites Families (16)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101637854B1 (en) * | 2015-10-16 | 2016-07-08 | 주식회사 코인플러그 | Certificate issuance system and method based on block chain, certificate authentication system and method based on block chain |
CN105591753A (en) * | 2016-01-13 | 2016-05-18 | 杭州复杂美科技有限公司 | Application method of CA certificate on block chain |
KR101780636B1 (en) * | 2016-05-16 | 2017-09-21 | 주식회사 코인플러그 | Method for issuing certificate information and blockchain-based server using the same |
CN108124502B (en) * | 2017-03-31 | 2021-01-05 | 北京大学深圳研究生院 | Top-level domain name management method and system based on alliance chain |
US10102265B1 (en) * | 2017-04-12 | 2018-10-16 | Vijay K. Madisetti | Method and system for tuning blockchain scalability for fast and low-cost payment and transaction processing |
CN107426157B (en) * | 2017-04-21 | 2020-04-17 | 杭州趣链科技有限公司 | Alliance chain authority control method based on digital certificate and CA authentication system |
CN107547514A (en) * | 2017-07-17 | 2018-01-05 | 招商银行股份有限公司 | Identity identifying method, system and computer-readable recording medium |
CN112865982A (en) * | 2017-07-26 | 2021-05-28 | 创新先进技术有限公司 | Digital certificate management method and device and electronic equipment |
CN107480555B (en) * | 2017-08-01 | 2020-03-13 | 中国联合网络通信集团有限公司 | Database access authority control method and device based on block chain |
CN107769925B (en) * | 2017-09-15 | 2020-06-19 | 山东大学 | Public key infrastructure system based on block chain and certificate management method thereof |
CN107623572A (en) * | 2017-09-27 | 2018-01-23 | 济南浪潮高新科技投资发展有限公司 | A kind of method of digital certificate granting on block chain |
CN108111314B (en) * | 2018-01-19 | 2021-04-02 | 苏州朗润创新知识产权运营有限公司 | Method and equipment for generating and verifying digital certificate |
CN108389615A (en) * | 2018-02-08 | 2018-08-10 | 罗梅琴 | A kind of pregnant baby retrospect deposit system and method based on block chain technology |
CN108599954B (en) * | 2018-03-16 | 2020-04-07 | 西安电子科技大学 | Identity verification method based on distributed account book |
CN108768657A (en) * | 2018-04-17 | 2018-11-06 | 深圳技术大学(筹) | A kind of digital certificate based on block platform chain issues system and method |
CN108810895B (en) * | 2018-07-12 | 2021-05-11 | 西安电子科技大学 | Wireless Mesh network identity authentication method based on block chain |
-
2018
- 2018-12-07 CN CN201910672008.5A patent/CN110457942B/en active Active
- 2018-12-07 CN CN201811495782.5A patent/CN109635585B/en active Active
- 2018-12-07 CN CN201911168761.7A patent/CN110929288B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107395557A (en) * | 2017-03-28 | 2017-11-24 | 阿里巴巴集团控股有限公司 | A kind of processing method and processing device of service request |
CN107426170A (en) * | 2017-05-24 | 2017-12-01 | 阿里巴巴集团控股有限公司 | A kind of data processing method and equipment based on block chain |
CN107911216A (en) * | 2017-10-26 | 2018-04-13 | 矩阵元技术(深圳)有限公司 | A kind of block chain transaction method for secret protection and system |
CN108322309A (en) * | 2017-12-27 | 2018-07-24 | 北京欧链科技有限公司 | Transaction processing method based on block chain and device |
CN108616539A (en) * | 2018-05-03 | 2018-10-02 | 东莞市翔实信息科技有限公司 | A kind of method and system that block chain transaction record accesses |
CN108717443A (en) * | 2018-05-17 | 2018-10-30 | 北京京东金融科技控股有限公司 | Data sharing method, block catenary system and computer readable storage medium |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111131171A (en) * | 2019-12-03 | 2020-05-08 | 深圳前海微众银行股份有限公司 | Node authentication method and device based on block chain network |
CN112131304A (en) * | 2020-02-10 | 2020-12-25 | 北京天德科技有限公司 | Novel calculation and storage architecture based on block chain technology |
CN111476617B (en) * | 2020-04-03 | 2021-06-25 | 腾讯科技(深圳)有限公司 | Data processing method, data processing device, computer equipment and medium |
CN111476617A (en) * | 2020-04-03 | 2020-07-31 | 腾讯科技(深圳)有限公司 | Data processing method, data processing device, computer equipment and medium |
CN111526015A (en) * | 2020-04-26 | 2020-08-11 | 昆明大棒客科技有限公司 | Data acquisition uplink method, device, equipment and storage medium |
CN111835783A (en) * | 2020-07-22 | 2020-10-27 | 东莞市盟大塑化科技有限公司 | Data retrieval method and device and computer equipment |
CN111835783B (en) * | 2020-07-22 | 2022-09-02 | 东莞盟大集团有限公司 | Data retrieval method and device and computer equipment |
CN112100178A (en) * | 2020-09-08 | 2020-12-18 | 中国联合网络通信集团有限公司 | Delegation authorization verification method and system |
CN112100178B (en) * | 2020-09-08 | 2023-05-12 | 中国联合网络通信集团有限公司 | Delegation authorization verification method and system |
CN112217636A (en) * | 2020-09-17 | 2021-01-12 | 建信金融科技有限责任公司 | Data processing method and device based on block chain, computer equipment and medium |
CN112217636B (en) * | 2020-09-17 | 2023-02-17 | 中国建设银行股份有限公司 | Data processing method and device based on block chain, computer equipment and medium |
CN112163213A (en) * | 2020-09-28 | 2021-01-01 | 日立楼宇技术(广州)有限公司 | Elevator authentication method and device, computer equipment and storage medium |
CN112163213B (en) * | 2020-09-28 | 2023-08-04 | 日立楼宇技术(广州)有限公司 | Authentication method and device for elevator, computer equipment and storage medium |
CN112381540A (en) * | 2020-11-13 | 2021-02-19 | 从法信息科技有限公司 | Method and device for verifying signed document based on zero-knowledge proof and electronic equipment |
CN113542396A (en) * | 2021-07-13 | 2021-10-22 | 润联软件系统(深圳)有限公司 | Block chain storage and communication method, system and related components thereof |
CN113542396B (en) * | 2021-07-13 | 2024-03-08 | 华润数字科技有限公司 | Block chain storage and communication method, system and related components thereof |
CN114491671A (en) * | 2022-01-27 | 2022-05-13 | 宋舒涵 | Market supervision commodity label tracing method and system based on block chain |
CN114491671B (en) * | 2022-01-27 | 2022-10-14 | 宋舒涵 | Market supervision commodity label tracing method and system based on block chain |
WO2023168993A1 (en) * | 2022-03-07 | 2023-09-14 | 腾讯科技(深圳)有限公司 | Blockchain-based data processing method, apparatus, and device, medium, and product |
Also Published As
Publication number | Publication date |
---|---|
CN110929288B (en) | 2021-06-01 |
CN109635585B (en) | 2021-06-08 |
CN110929288A (en) | 2020-03-27 |
CN109635585A (en) | 2019-04-16 |
CN110457942B (en) | 2022-11-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110457942A (en) | To the signature verification method, service node and medium of uplink data block | |
CN109447811A (en) | Method, accounting nodes and the medium of Transaction Information are inquired in block chain network | |
US11700257B2 (en) | System and method for storing and distributing consumer information | |
CN110471952A (en) | Method, agent node and the medium of accounting nodes are determined in block chain network | |
CN109522735B (en) | Data permission verification method and device based on intelligent contract | |
CN109447648A (en) | The method of recorded data zone block, accounting nodes and medium in block chain network | |
CN109684375A (en) | Method, accounting nodes and the medium of Transaction Information are inquired in block chain network | |
US20190354606A1 (en) | Private Cryptocoinage in Blockchain Environments | |
CN113297625B (en) | Data sharing system and method based on block chain and electronic equipment | |
CN105871786A (en) | User information authentication method, device and system | |
KR102280061B1 (en) | Corporation related certificate issue system and method using did based on blockchain | |
CN112560072B (en) | Key management method, device, medium and equipment based on block chain | |
CN110535807A (en) | A kind of service authentication method, device and medium | |
CN110247758A (en) | The method, apparatus and code management device of Password Management | |
CN110766548A (en) | Block chain based information processing method and device, storage medium and electronic equipment | |
CN115277122A (en) | Cross-border data flow and supervision system based on block chain | |
CA3050487A1 (en) | System and method for storing and distributing consumer information | |
CN114880715A (en) | Power data security sharing method and system based on homomorphic encryption intelligent contract | |
CN116451280A (en) | Asset management method and device based on blockchain | |
Zhang et al. | FutureText: A blockchain-based contract signing prototype with security and convenience | |
CN115801317A (en) | Service providing method, system, device, storage medium and electronic equipment | |
CN113706261A (en) | Block chain-based power transaction method, device and system | |
CN110492997A (en) | A kind of encryption system based on super account book, method, apparatus and storage medium | |
Lin et al. | A Blockchain-based Flexible Traceability System for IoT Cards | |
CN114116855A (en) | Data circulation system, method and device based on block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 40016803 Country of ref document: HK |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |