CN110457942A - To the signature verification method, service node and medium of uplink data block - Google Patents

To the signature verification method, service node and medium of uplink data block Download PDF

Info

Publication number
CN110457942A
CN110457942A CN201910672008.5A CN201910672008A CN110457942A CN 110457942 A CN110457942 A CN 110457942A CN 201910672008 A CN201910672008 A CN 201910672008A CN 110457942 A CN110457942 A CN 110457942A
Authority
CN
China
Prior art keywords
accounting nodes
public key
service node
key certificate
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910672008.5A
Other languages
Chinese (zh)
Other versions
CN110457942B (en
Inventor
李茂材
王宗友
孔利
周开班
张劲松
蓝虎
时一防
丁勇
刘区城
朱耿良
杨常青
陈秋平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Intellectual Tax Chain Technology Co Ltd
Original Assignee
Shenzhen Intellectual Tax Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Intellectual Tax Chain Technology Co Ltd filed Critical Shenzhen Intellectual Tax Chain Technology Co Ltd
Priority to CN201910672008.5A priority Critical patent/CN110457942B/en
Publication of CN110457942A publication Critical patent/CN110457942A/en
Application granted granted Critical
Publication of CN110457942B publication Critical patent/CN110457942B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Abstract

Present disclose provides the signature verification method of a kind of pair of uplink data block, service node and media.The described method includes: receiving the block head of the uplink data block sent by accounting nodes, containing the abstract and signature generated to the Transaction Information in the data block in the block head, the signature encrypts the abstract using the private key specific to the accounting nodes by the accounting nodes and is generated;The public key certificate of accounting nodes is obtained, the public key certificate generates the request of public key certificate in response to accounting nodes, contains the public key specific to the accounting nodes;From the public key certificate of the accounting nodes, the public key specific to the accounting nodes is obtained;Using the public key specific to the accounting nodes, the signature is decrypted, decrypted result and the abstract in block head are compared, to realize signature verification.The embodiment of the present disclosure improves the safety of block chain book keeping operation in the case where service node does not have the cochain of actual participation data block.

Description

To the signature verification method, service node and medium of uplink data block
The application be the applying date be on December 7th, 2018, application No. is 201811495782.5, it is entitled " in area The divisional application of the application of method, agent node and the medium of inquiry Transaction Information in block chain network ".
Technical field
This disclosure relates to block chain field, and in particular to a kind of to test in block chain network the signature of uplink data block Card method, service node and medium.
Background technique
In traditional alliance's block chain network, global administration's maintenance will be carried out to the member node of addition.General pass through is recognized The identity information of member is safeguarded at card center.But it in frequent connection and common recognition, needs to carry out frequent identification, meeting Substantially reduce the performance and operational efficiency of block chain.In addition, when block chain is in some scenes of government or commercial undertaking, And not all node has enough resources and necessity to become the node for participating in block chain common recognition, and allow and be not involved in common recognition Non- common recognition node can sufficiently trust the node of these common recognitions, become a challenge.
Therefore, how and not all node there is enough resources and necessity to become to participate in the section of block chain common recognition In the case where point, the safety of Transaction Information on non-common recognition querying node block chain can be ensured, and will not reduce efficiency, be existing There is technology to suffer from a problem that problem.
Summary of the invention
One purpose of the disclosure be to propose it is a kind of in block chain network to the signature verification side of uplink data block Method, service node and medium improve the book keeping operation of block chain in the case where service node does not have the cochain of actual participation data block Safety.
According to the one side of the embodiment of the present disclosure, disclose it is a kind of in block chain network to the signature of uplink data block Verification method, the block chain network include accounting nodes sub-network and service node sub-network, the accounting nodes sub-network Including accounting nodes data block being recorded on block chain, the service node sub-network includes that accounting nodes are recorded The service node that the signature of uplink data block on block chain is verified, the method are executed by service node, the side Method includes:
The block head of the uplink data block sent by accounting nodes is received, is contained in the block head to the data block In Transaction Information generate abstract and signature, it is described signature by the accounting nodes utilize specific to the accounting nodes private key pair The abstract is encrypted and is generated;
The public key certificate of accounting nodes is obtained, the public key certificate gives birth to the request of public key certificate in response to accounting nodes At containing the public key specific to the accounting nodes;
From the public key certificate of the accounting nodes, the public key specific to the accounting nodes is obtained;
Using the public key specific to the accounting nodes, the signature is decrypted, it will be in decrypted result and block head Abstract compare, to realize signature verification.
According to the one side of the embodiment of the present disclosure, the service node in a kind of block chain network, the block chain are disclosed Network includes accounting nodes sub-network and service node sub-network, and the accounting nodes sub-network includes that data block is recorded Accounting nodes on block chain, the service node sub-network include uplink data area accounting nodes being recorded on block chain The service node that the signature of block is verified, the service node include:
Block head receiving unit, for receiving the block head of the uplink data block sent by accounting nodes, the block Containing the abstract and signature generated to the Transaction Information in the data block in head, the signature is utilized specific by the accounting nodes The abstract is encrypted in the private key of the accounting nodes and is generated;
Public key certificate acquiring unit, for obtaining the public key certificate of accounting nodes, the public key certificate is saved in response to book keeping operation It puts the request to public key certificate and generates, contain the public key specific to the accounting nodes;
Public key acquisition unit, for obtaining the public key specific to the accounting nodes from the public key certificate of the accounting nodes;
Signature verification unit is decrypted the signature, will solve for utilizing the public key specific to the accounting nodes Close result is compared with the abstract in block head, to realize signature verification.
According to the one side of the embodiment of the present disclosure, the service node in a kind of block chain network is disclosed, comprising: storage Device is stored with computer-readable instruction;Processor reads the computer-readable instruction of memory storage, as described above to execute Method.
According to the one side of the embodiment of the present disclosure, a kind of computer program medium is disclosed, being stored thereon with computer can Reading instruction makes computer execute method as described above when the computer-readable instruction is executed by the processor of computer.
In the embodiment of the present disclosure, by signature verification, service node can the book keeping operation behavior to accounting nodes verify. If collective practises fraud when accounting nodes are kept accounts, by signature verification, service node just remains the cheating of accounting nodes collective Evidence, although having reached the cochain that service node does not have actual participation data block, but still play to the cochain of data block The effect of witness.
Other characteristics and advantages of the disclosure will be apparent from by the following detailed description, or partially by the disclosure Practice and acquistion.
It should be understood that the above general description and the following detailed description are merely exemplary, this can not be limited It is open.
Detailed description of the invention
Its example embodiment is described in detail by referring to accompanying drawing, above and other target, feature and the advantage of the disclosure will It becomes more fully apparent.
Figure 1A -1C shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure Three kinds of architecture figures of the method for information.
Fig. 2A -2C shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure The method of information applies the scene structure under three kinds of supply chain finance, electronic invoice, legal digital cash different application scenarios Frame figure.
Fig. 3 A-3I shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure The method of information applies the service node display interface figure under supply chain financial application scene, these surface charts illustrate supply From Transaction Information cochain to the general procedure for inquiring Transaction Information and verify data block content under chain financial application scene.
Fig. 4 A-4I shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure The method of information applies the service node display interface figure under electronic invoice application scenarios, these surface charts illustrate that electronics is sent out From Transaction Information cochain to the general procedure for inquiring Transaction Information and verify data block content under ticket application scenarios.
Fig. 5 A-5I shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure The method of information applies the service node display interface figure under legal digital cash application scenarios, these surface charts illustrate method Determine under digital cash application scenarios from Transaction Information cochain to the general procedure for inquiring Transaction Information and verify data block content.
Fig. 6, which is shown, inquires data in block chain network by what agent node executed according to an embodiment of the present disclosure The flow chart of the method for Transaction Information in block.
Fig. 7, which is shown, generates the specific of public key certificate by what Certificate Authority center executed according to an embodiment of the present disclosure Flow chart.
Fig. 8 shows the target service according to service node executed by accounting nodes according to an embodiment of the present disclosure Node permissions data, it is determined whether the specific flow chart of the Transaction Information into the service node returned data block.
Fig. 9 is shown in the block head to data block executed by service node according to an embodiment of the present disclosure Signature carries out the specific flow chart of signature verification.
Figure 10 shows the detail flowchart of the step 320 according to an embodiment of the present disclosure.
Figure 11 shows the detail flowchart of the step 320 according to an embodiment of the present disclosure.
Figure 12 shows the detailed of the accounting nodes for sending inquiry request to according to the determination of an embodiment of the present disclosure Flow chart.
Figure 13 shows the detail flowchart of step 730 in Figure 12 according to an embodiment of the present disclosure.
Figure 14 shows the detail flowchart of step 7303 in Figure 13 according to an embodiment of the present disclosure.
Figure 15 shows the detailed of the accounting nodes for sending inquiry request to according to the determination of an embodiment of the present disclosure Flow chart.
Figure 16 shows the detail flowchart of step 760 in Figure 15 according to an embodiment of the present disclosure.
Figure 17 shows the transaction letters inquired in data block in block chain network according to an embodiment of the present disclosure The module frame chart of the agent node of breath.
Figure 18 shows the transaction letter inquired in data block in block chain network according to an embodiment of the present disclosure The hardware structure diagram of the agent node of breath.
Specific embodiment
Example embodiment is described more fully with reference to the drawings.However, example embodiment can be with a variety of shapes Formula is implemented, and is not understood as limited to example set forth herein;On the contrary, providing these example embodiments makes the disclosure Description will be more full and complete, and the design of example embodiment is comprehensively communicated to those skilled in the art.Attached drawing The only schematic illustrations of the disclosure are not necessarily drawn to scale.Identical appended drawing reference indicates same or like in figure Part, thus repetition thereof will be omitted.
In addition, described feature, structure or characteristic can be incorporated in one or more examples in any suitable manner In embodiment.In the following description, many details are provided to provide filling to the example embodiment of the disclosure Sub-argument solution.It will be appreciated, however, by one skilled in the art that the specific detail can be omitted with technical solution of the disclosure In it is one or more, or can be using other methods, constituent element, step etc..In other cases, it is not shown in detail or retouches Known features, method, realization or operation are stated to avoid a presumptuous guest usurps the role of the host and all aspects of this disclosure is made to thicken.
Some block diagrams shown in the drawings are functional entitys, not necessarily must be with physically or logically independent entity phase It is corresponding.These functional entitys can be realized using software form, or in one or more hardware modules or integrated circuit in fact These existing functional entitys, or these functions reality is realized in heterogeneous networks and/or processor device and/or microcontroller device Body.
Architecture applied by the embodiment of the present disclosure once and overall flow are described with initial reference to Figure 1A -1C below.
Figure 1A shows a kind of architecture of block chain network applied by the embodiment of the present disclosure.Block chain network includes Accounting nodes sub-network 2 and service node sub-network 1.Accounting nodes sub-network 2 includes data block being recorded on block chain Accounting nodes 21.Service node sub-network 1 includes that data block accounting nodes being recorded on block chain is verified Service node 11.It is connected between accounting nodes sub-network 2 and service node sub-network 1 by agent node 12.Agent node 12 It is a service node of service node sub-network 1, but a more special service node.It is responsible for accounting nodes 21 Service node 11 is passed to the information that service node 11 transmits.Service node 11 is to generate the various Transaction Informations for needing cochain Counterparty terminal.They produce Transaction Information, but are recorded directly on block chain without right, it is necessary to be remembered by one Transaction Information is recorded on block chain account node 21.It is kept accounts by a small number of accounting nodes 21 are unified, is also beneficial to the unification of affairs Processing and supervision, and service node 11 can carry out transaction letter via the information that agent node 12 is sent by accounting nodes 21 Cease supervision and the witness of cochain.This in certain node collectives cheatings for both having needed unified supervision but being afraid of supervision thus needs the people It is of great significance in the scene of crowd's supervision.In accounting nodes sub-network 2, each accounting nodes 21 generate a data field After block, it is broadcast to other accounting nodes 21 and knows together, then carry out cochain.In Figure 1A, service node sub-network 1 uses P2P Network mode.P2P network is a kind of Distributed Application framework that task and workload are distributed between fellow (Peer), is A kind of networking or latticed form that P2P computing model is formed in application layer, i.e. " point-to-point " or " end-to-end " network.It can With is defined as: the participant of network shares a part of hardware resource that they are possessed, and (processing capacity, storage capacity, network connect Connect ability, printer etc.), these shared resources can directly be accessed by network offering services and content by other peer nodes Without being subjected to intermediate entities.Participant in this network is both supplier and the resource, clothes of resource, service and content Business obtains taker with content.Therefore, it in service node sub-network 1, is transmitted when agent node 12 is received from accounting nodes 21 The message to come over, peripherad service node 11 are propagated.Around service node 11 receive the message, then to surrounding industry Business node 11 transmits, and propagates layer by layer, has reached the message in the propagation of each service node 11 of service node sub-network 1.
Figure 1B shows the architecture of another kind block chain network applied by the embodiment of the present disclosure.The architecture with The architecture of Figure 1A the difference is that, in service node sub-network 1, do not take P2P network mode, take radio network The mode of network.Agent node 12 receives the message passed over from accounting nodes 21, which is broadcast to service node Other service nodes 11 in network 1.In this way, also achieving the message in each service node 11 of service node sub-network 1 Propagation.
Fig. 1 C shows the architecture of another kind block chain network applied by the embodiment of the present disclosure.The architecture with The architecture of Figure 1A the difference is that, accounting nodes sub-network 2 is divided into multiple branch's accounting nodes sub-networks.Each Branch's accounting nodes sub-network can be responsible for the record of the Transaction Information of a certain seed type.For example, a certain enterprise may have confession Answer chain financial business, it may be necessary to it the contract information generated during supply and marketing, the payment for goods such as buys on dredit information and is recorded on block chain, The enterprise will also issue invoice simultaneously, and also information of making out an invoice, invoice reimbursement information etc. are recorded on block chain.At this moment, in order to Be conducive to the needs that accounting nodes are supervised by same department, the accounting nodes and record of supply chain financial business transaction may be recorded The accounting nodes of transaction during invoice circulation will belong to different departments.For example, record supply chain financial business transaction Accounting nodes are the accounting terminal of bank's setting, and the accounting nodes for recording the transaction during invoice circulation are Administration of State Bureau's settings Accounting terminal.And the transaction during supply chain financial business transaction and record invoice circulation also may be eventually recorded in not On same sub-block chain.At this moment, agent node 12 will be according to the transaction class carried from the Transaction Information that service node 11 is sent Type sends the Transaction Information in branch's accounting nodes sub-network corresponding with the type of transaction.
Fig. 2A shows the transaction letter inquired in data block in block chain network according to an embodiment of the present disclosure The method of breath applies the scene framework map under the application scenarios of supply chain finance.
Supply chain finance is such a business: manufacturing enterprise produces an equipment or product, is often not necessarily oneself Enterprise produce all parts or component part of the equipment or product, the production of some of parts or component part needs outer It wraps to other enterprises and goes to produce.Although manufacturing enterprise has concluded supply and marketing contract with order party in advance, only produce it is whole Payment for goods can be taken when a equipment or product, and the money for purchasing part or component part in this process needs oneself to pad It pays, causes manufacturing enterprise's capital turnover difficulty.Therefore, such a demand is produced, i.e. manufacturing enterprise can be with whole equipment Or product conclude total purchase contract (wherein having cost and ordering party's information) assured to bank, when need to carry out part or When the buying of component part, using the total purchase contract of the whole equipment or product crossed in bank gurantee as foundation, from the equipment or The guarantee of buying of a part for the part or component part is transferred out in the total purchase contract of product in cost.In this way, raw The production for carrying out the part or component part can be trusted at the enterprise of part or component part, due to not having to by bank gurantee Worry that a part of payment for goods transferred out can not receive.Meanwhile manufacturing enterprise does not take out the money really at this time, but wait until Corresponding a part is just paid to the production of part or component part when obtaining the practical payment for goods of the buying side of whole equipment or product Quotient.
In traditional block chain network, due to being provided with all accounting nodes by bank, and this network is closing , each Joint Enterprises on supply and marketing chain are nodes relevant to the data block cochain interests of supply chain finance, cannot but be supervised And witness, the book keeping operation network of the unrelated side of this interests being made of accounting nodes can only be trusted completely.For example, manufacturing enterprise with it is whole The ordering party of a equipment or product has concluded total purchase contract, or has signed a point buying with the generation side of part or component part Contract requires the accounting nodes cochain that these contracts are transmitted to bank's setting.At this moment, each accounting nodes of bank's setting can be with It supervises mutually and witnesses, but each Joint Enterprises on supply and marketing chain cannot be supervised and be witnessed.In addition, in traditional block chain network In, the other any enterprise nodes unrelated with current supply and marketing chain, it is also possible to inquire current supply and marketing by corresponding accounting nodes Any Transaction Information of enterprise's node cochain on chain.Therefore, great Transaction Information leakage hidden danger is brought.
However, in fig. 2, since accounting nodes sub-network 2 and service node sub-network 1 separate, accounting nodes sub-network 2 are exclusively used in keeping accounts, and service node sub-network 1 contains each Joint Enterprises terminal on supply and marketing chain, to the note of accounting nodes 21 Account is witnessed.Once 21 collective of accounting nodes practises fraud, each service node 11 of witness can remain with specific accounting nodes and do evil Evidence.It when service node 11 needs to inquire Transaction Information, does not need to safeguard its identity in accounting nodes sub-network 2, only exist Certificate authority safeguards the public key certificate of a service node.When agent node 12 is verified, agent node 12 is somebody's turn to do Public key certificate, the public key being taken out specific to service node 11 carry out signature verification.Not to the signature verification of service node 11 Accounting nodes sub-network 2 is startled, is only carried out in agent node 12.In this way, in the base for the efficiency for not influencing accounting nodes sub-network On plinth, the service node in service node sub-network can extend on a large scale, while guarantee to inquire the safety of cochain Transaction Information Property.
In the example of an automobile SC finance, as shown in Figure 2 A, each service node 11 includes that automaker is whole End, tiremaker terminal, rubber production quotient terminal, vehicle components supplying quotient terminal, banking terminal etc..Automaker and vapour Vehicle ordering party has concluded total purchase contract, transfers to a part to be used for the buying of tire from the cost of total purchase contract, then transfer to Corresponding part is used for the buying of vehicle components.Tiremaker using the contract concluded with automaker as foundation, then from this Transfer to a part for manufacturing the buying of rubber needed for tire in the cost of contract.Relationship is purchased layer by layer in this way, just establishing.
When automaker and automobile ordering party concluded total purchase contract or automaker and tiremaker, Vehicle components supplying agrees vertical point procurement contract or tiremaker and when rubber production agrees vertical point of procurement contract, by phase The Transaction Information answered passes to agent node 12, selects an accounting nodes 21 by agent node 12.Agent node 12 will be corresponding Transaction Information be sent to selection accounting nodes 21 cache.Accounting nodes 21 will not generally be individually for a Transaction Information and be packaged It at a data block cochain, but is packaged according to block and requires (such as gather together enough enough item numbers or size), be packaged into one Data block.The private key that accounting nodes 21 are generated specific to the accounting nodes is based on using the private key specific to the accounting nodes The Transaction Information to be included in a data block being added on block chain generates signature.Generating the method signed is Abstract first is generated to the Transaction Information in data block, then abstract is encrypted with the private key specific to the accounting nodes, is signed Name.The Transaction Information is put into the block body of data block by accounting nodes 21, and the number is added in the abstract of generation and signature According to the block head of block, cochain after being known together between all accounting nodes 21, while block head is passed through into agent node 12 The each service node 11 being sent in service node sub-network.
Accounting nodes 21 are generated specific to after the private key of accounting nodes 21, also request certificate authority (CA does not show) hair Put the public key certificate specific to the accounting nodes 21.Specific method may is that request authentication center's (not shown) to accounting nodes 21 Identity authenticated.After certification passes through, public key certificate is generated into request and is sent to Certificate Authority center.The public key certificate generates There is the private key specific to the accounting nodes in request.Certificate authority generates specific according to the private key specific to the accounting nodes In the public key of the accounting nodes, and public key certificate is accordingly generated, is sent to service node 11.
After service node 11 receives block head, the public key certificate of the accounting nodes 21 is obtained, is taken out specific to this The public key of accounting nodes.Service node 11 is decrypted the signature with the public key specific to the accounting nodes, obtains described The abstract of Transaction Information in data block.If the abstract in block head is consistent with the abstract that decryption obtains, signature verification Success.
Service node 11 has obtained the block head of data block, but does not obtain the block body of the data block, therefore, industry Business node 11 can't see each Transaction Information.When service node 11 will check Transaction Information, need to ask to agent node 12 It asks.In order to guarantee the safety of inquiry, service node 11 will generate the private key specific to the service node, raw to the inquiry request At signature.The method of signature be first to inquiry request according to predetermined digest algorithm generate make a summary, then to abstract using specific to The private key encryption of the service node, is signed.
Service node 21 is generated specific to after the private key of service node 21, also request certificate authority (CA does not show) hair Put the public key certificate specific to the service node 21.Specific method may is that request authentication center's (not shown) to service node 21 Identity authenticated.After certification passes through, public key certificate is generated into request and is sent to Certificate Authority center.The public key certificate generates There is the private key specific to the service node in request.Certificate authority generates specific according to the private key specific to the service node In the public key of the service node, and public key certificate is accordingly generated, is sent to agent node 11.
After agent node 12 receives inquiry request, the permission of service node 11 is verified, method is from public key Certificate acquisition is specific to the public key of the service node, and then the public key with this specific to the service node tests the signature Card.Specifically, agent node 12 is decrypted the signature with the public key specific to the service node, obtains inquiry request Abstract, same predetermined cryptographic algorithm recalculates abstract to the inquiry request when according still further to signature, if recalculate It makes a summary consistent with the abstract that decryption obtains, is then proved to be successful, 11 identity of service node is legal, sends book keeping operation section for inquiry request Point 21, so that accounting nodes 21 are according to the target service node permissions data of service node, it is determined whether to the service node 11 Transaction Information in returned data block.
Illustrate under supply chain financial application scene below with reference to Fig. 3 A-3I from Transaction Information cochain to inquiring and verify big Body process.Fig. 3 A-3I is the Transaction Information inquired in data block in block chain network according to an embodiment of the present disclosure Method apply the service node display interface figure under supply chain financial application scene.
As shown in Figure 3A, B automobile factory is based on A retailer buying 10,000,000 purchase order of B automobile factory, in 10,000,000 2,000,000 go bail for, commission C tire plant produces the tire of 2,000,000 prices.Service node of the business personnel of B automobile factory in B automobile factory After the above Transaction Information of 11 typings, " being submitted to accounting nodes " option is clicked, Transaction Information is sent to note by agent node 12 Account node 21.The Transaction Information to be included in the data block that accounting nodes 21 will be added on block chain is placed on one In a block body.Accounting nodes 21 also generate the abstract of these Transaction Informations, such as Merkel's tree root of Fig. 3 B.Accounting nodes 21 are raw At the private key specific to the accounting nodes, signature is generated to the Transaction Information in the data block using the private key.Accounting nodes 21 are placed on the abstract of previous data block on abstract, signature and block chain in block head together, by Transaction Information Fang Qu In block.The data block of block head and block body composition cochain, the cochain after all accounting nodes 21 common recognition.
Block hair is also sent to each service node 11 by accounting nodes 21.It is shown on the screen of service node 11 current The abstract of previous data block on the abstract (such as Merkel's tree root) of Transaction Information in data block, signature and block chain, As shown in Figure 3B.Since accounting nodes 21 are generated specific to after the private key of accounting nodes 21, also generated by certificate authority public There are the public key specific to accounting nodes 21 in key certificate, the inside.Accounting nodes 21 obtain public key certificate, and using it is therein specific to The signature is decrypted in the public key of accounting nodes 21, obtains the abstract of the Transaction Information in the data block.If connect The abstract in block head received and the abstract that decryption obtains are inconsistent, then signature verification fails, and show boundary as shown in Figure 3 C Face.If Merkel's tree root in the block head received is consistent with Merkel's tree root that decryption obtains, signature verification success, Show interface as shown in Figure 3D.Since during above, service node 11 only obtains the block head of data block, also There is no the Transaction Information in block head.At this point, asking the user whether to request in the data block in the interface of Fig. 3 D Transaction Information.
If user selects "Yes", service node 11 generates an inquiry request, and utilizes specific to service node 11 Private key signs to it.Meanwhile as shown in FIGURE 3 E, show on the screen whether the prompt of the public key certificate of requested service node 11. If user selects "Yes", Certificate Authority center generates public key certificate for it, has in public key certificate specific to the service node 11 Public key.After agent node 12 receives inquiry request, the public key specific to the service node is obtained from public key certificate, so The public key with this specific to the service node verifies the signature afterwards.If authentication failed, the interface of display such as Fig. 3 F, industry Business node cannot continue Transaction Information inquiry.
If be proved to be successful, 11 identity of service node is legal, and inquiry request is sent accounting nodes 21 by agent node 12, So that accounting nodes 21 are according to the target service node permissions data of service node, determination is to 11 returned data of service node The cryptographic Hash of Transaction Information or Transaction Information in block.The transaction letter that accounting nodes 21 return is shown on the interface of Fig. 3 G The cryptographic Hash of breath and Transaction Information.
After user selects " carrying out content verification " on the interface of Fig. 3 G, service node 11 is believed according to the transaction on Fig. 3 G The abstract (such as Merkel's tree root) of Transaction Information, and is wrapped in block head in the cryptographic Hash calculation data area block of breath and Transaction Information The abstract (such as Merkel's tree root) contained is compared, to carry out content verification.If the tampered data block of accounting nodes 21 Content, then calculated abstract is inconsistent with the abstract that includes in block head, shows " content verification mistake as shown in figure 3h Lose " interface.If calculated abstract is consistent with the abstract for including in block head, " content verification as shown in fig. 31 is shown The interface of success ".
Fig. 2 B shows the transaction letter inquired in data block in block chain network according to an embodiment of the present disclosure The method of breath applies the scene framework map under the application scenarios of electronic invoice.
In the block chain application scenarios of traditional electronic invoice, Local Tax Bureau provides invoice, enterprise of making out an invoice to enterprise of making out an invoice To neck ticket people invoicing, the reimbursement unit where neck ticket people to neck ticket people submits an expense account invoice.All these transaction require cochain, It is recorded on block chain.But Local Tax Bureau, enterprise of making out an invoice, reimbursement these nodes of unit be not accounting nodes 21.They will entrust Ask corresponding accounting nodes or super node by these transaction records on block chain.All these accounting nodes or super node All it is that national tax department is unified to be arranged.It can supervise mutually and witness between them, but Local Tax Bureau, enterprise of making out an invoice, reimbursement unit These nodes are the immediate parties of invoice, but cannot supervise and witness, and can only trust accounting nodes 21 completely.In addition, any Enterprise can inquire any Transaction Information on block chain by its corresponding accounting nodes.But in some cases, enterprise Invoice relevant information is not intended to be known by other enterprises.In the embodiments of the present disclosure, due to accounting nodes sub-network 2 and business Node sub-network 1 separates, and accounting nodes sub-network 2 is exclusively used in keeping accounts, and service node sub-network 1 contains these invoice interests Relevant node witnesses the book keeping operation of accounting nodes 21.Once 21 collective of accounting nodes practises fraud, each service node of witness 11 can remain with the evidence that specific accounting nodes are done evil.
In the example of an electronic invoice, as shown in Figure 2 B, each service node 11 includes make out an invoice unit terminal, claimer Mobile phone, reimbursement unit terminal, Local Tax Bureau's terminal etc..
Local tax bureau provides invoice, unit of perhaps making out an invoice invoicing or claimer to reimbursement unit for unit of making out an invoice When reimbursement, corresponding Transaction Information (transfer of invoice ownership) is passed into agent node 12, by the selection of agent node 12 one A accounting nodes 21.Agent node 12 caches the accounting nodes 21 that corresponding Transaction Information is sent to selection.Then, book keeping operation section Point 21 is packaged according to block to be required to be packaged into data block.Accounting nodes 21 generate the private key specific to accounting nodes 21, are based on Transaction Information in data block generates abstract and signature, and abstract and signature are added to the block head of data block, transaction is believed Breath cochain and gives block hair to service node 11 after the block body of data block is added, these processes and combines shown in Fig. 2A Process it is similar.Public key in public key certificate at service node 11 using accounting nodes 21 carries out signature verification.Signature is tested After card passes through, the content of Transaction Information is checked if necessary, generates the inquiry request to Transaction Information, and generate specific to business The private key of node is signed with generating to inquiry request, is sent to agent node 12.Meanwhile Certificate Authority being requested to be centrally generated business The public key certificate of node 11, wherein there is the public key specific to service node 11.Agent node 12 utilizes from certification the signature The public key specific to service node 11 that the heart obtains carries out signature verification.After being proved to be successful, book keeping operation section is sent by inquiry request Point 21 is returned to the cryptographic Hash of Transaction Information or Transaction Information by accounting nodes 21.Service node 11 utilizes Transaction Information or transaction The cryptographic Hash of information carries out content verification, and also process shown in Fig. 2A above in conjunction is similar for verification process, therefore does not repeat.
Fig. 4 A-4I shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure The method of information applies the service node display interface figure under electronic invoice application scenarios, these surface charts illustrate that electronics is sent out Transaction Information cochain, inquiry and the general procedure verified under ticket application scenarios.
As shown in Figure 4 A, on October 22nd, 2018, Liu Shan to rainbow computer company is the purchase of unit one belongs to Hong Sheng company One computer, 3000 yuan of Hua Liao.Rainbow computer company is that Liu Shan has issued an invoice, transaction id 000083.Rainbow computer After staff's typing information above of company, " being submitted to accounting nodes " option is clicked, Transaction Information passes through agent node 12 It is sent to accounting nodes 21.The transaction letter to be included in the data block that accounting nodes 21 will be added on block chain Breath is placed in a block body.Accounting nodes 21 also generate abstract and signature, by last data on abstract, signature and block chain The abstract of block is placed on together in block head.Accounting nodes 21 are sent to each business by data block cochain, and by block hair Node 11.Shown on the screen of service node 11 abstract, signature and block chain on previous data block abstract, such as Fig. 4 B It is shown.
Then, accounting nodes 21 carry out signature verification, and the interface of Fig. 4 C or Fig. 4 D are shown according to verification result.If necessary Transaction Information is inquired to accounting nodes 21, generate inquiry request and shows the interface for asking whether request public key certificate of Fig. 4 E. Such as request, then certificate authority is that accounting nodes provide public key certificate, wherein there is the public key specific to accounting nodes.Agency's section After point 12 receives the signature, the public key obtained from public key certificate specific to service node 11 carries out signature verification.If tested Card failure, shows the interface of Fig. 4 F.If be proved to be successful, inquiry request is forwarded to accounting nodes 21 according to service node 11 Permissions data returns to the cryptographic Hash of Transaction Information or Transaction Information to service node 11, as shown in Figure 4 G.Service node 11 carries out Content verification shows the interface of Fig. 4 H-4I then according to the verification result of content verification respectively.These processes and Fig. 3 C-3I institute The process shown is similar, therefore does not repeat.
Fig. 2 C shows the transaction letter inquired in data block in block chain network according to an embodiment of the present disclosure The method of breath applies the scene framework map under the application scenarios of legal digital cash.
In the scene of the civil digital cash of traditional such as bit coin hereinafter, each pen during the circulation of bit coin Transaction all carries out cochain by the party concerned to trade.Each party concerned both can be used as accounting nodes and carry out uplink operation, can also be with Witness the data block of other node cochains.Since each node is not only used as accounting nodes, but also as witness node, so that the public Trust is compared for the use of this digital cash.However, the digital cash is sent out by official under the scene of legal digital cash Row, it is necessary to it is supervised by official, and the public needs to trust it, prevents accounting nodes collective, official from practising fraud, and produces existing The problem of in terms of the balance for thering is the network system to trust in face of government regulation and the common people.Moreover, in existing bit coin block chain network, Each node is not only used as accounting nodes, but also as witness node, the user of node each in this way can see to be recorded on block chain All Activity information, and the Transaction Information of some units is to be not intended to be exposed to proprietary, and produces secret protection Problem.
In this case, the accounting nodes sub-network of the embodiment of the present disclosure and the separated scheme of service node sub-network, Completely avoid this problem.Each accounting nodes of accounting nodes sub-network belong to official.It is had occurred at any service node Block chain will be recorded by corresponding accounting nodes in the transaction of the legal digital cash by the transaction of legal digital cash On.But each service node in service node sub-network can witness the book keeping operation of accounting nodes 21.Once book keeping operation The cheating of 21 collective of node, each service node 11 of witness can remain with the evidence that specific accounting nodes are done evil, take into account government's prison Pipe and the common people trust.
In the example of a legal digital cash, as shown in Figure 2 C, each service node 11 includes legal digital cash stream Each transaction terminal involved in logical.When sending the Transaction Information of legal digital cash, transaction terminal will trade letter accordingly Breath (transfer of legal digital cash ownership) passes to agent node 12, selects an accounting nodes 21 by agent node 12. Agent node 12 caches the accounting nodes 21 that corresponding Transaction Information is sent to selection.Then, accounting nodes 21 are according to block It is packaged and requires to be packaged into data block.Accounting nodes 21 generate the private key specific to accounting nodes 21, based in data block Transaction Information generates abstract and signature, and abstract and signature are added to the block head of data block, data field is added in Transaction Information Cochain after the block body of block, and give block hair to service node 11, these processes are similar with process shown in Fig. 2A is combined.
Accounting nodes 21 are generated specific to after the private key of accounting nodes 21, and also request certificate authority is saved to book keeping operation is generated The public key certificate of point 21, wherein containing the public key specific to accounting nodes 21.After service node 11 receives block head, signed Name verifying, inquiry particular transactions information, process also Fig. 2A institute above in conjunction that content verification is carried out to content in data block The process shown is similar, therefore does not repeat.
Fig. 5 A-5I shows the transaction inquired in data block in block chain network according to an embodiment of the present disclosure The method of information applies the service node display interface figure under legal digital cash application scenarios, these surface charts illustrate electricity The general procedure kept accounts and witnessed under sub- invoice application scenarios.As shown in Figure 5A, on August 29th, 2018, because X company is public from Y Department buys in the furniture that 3000 per unit system of price determines digital cash, pays Y company law and determines 3000 unit of digital cash.X company Handler's typing information above after, click " being submitted to accounting nodes " option, Transaction Information is sent to by agent node 12 Accounting nodes 21.The Transaction Information to be included in the data block that accounting nodes 21 will be added on block chain is placed on In the block body of data block.Accounting nodes 21 also generate the abstract and signature of Transaction Information in data block, by abstract, signature And the abstract of previous data block is placed on together in the block head of data block on block chain.Accounting nodes 21 are by data block Cochain, and block hair is sent to each service node 11.Abstract, signature and block are shown on the screen of service node 11 The abstract of previous data block on chain, as shown in Figure 5 B.
Then, service node 11 carries out signature verification, shows the interface of Fig. 5 C or Fig. 5 D according to verification result, and to agency Node 12 inquires Transaction Information.Service node 11 signs to inquiry request with the private key specific to service node 11.Display Interface as shown in fig. 5e asks whether request public key certificate.If request, certificate authority generates the public affairs of service node 11 Key certificate, wherein including the public key specific to service node 11.It is obtained when the verifying signature of agent node 12 with the public key certificate Specific to the public key of service node 11, which is verified.If authentication failed, service node 11 is shown as illustrated in figure 5f Interface.If be proved to be successful, inquiry request is sent accounting nodes 21 by agent node 12, so that accounting nodes 21 are according to industry The target service node permissions data of business node 11, the determining Transaction Information into the 11 returned data block of service node is still The digest value of Transaction Information.Fig. 5 G shows the digest value of Transaction Information or Transaction Information that the display of service node 11 receives Interface.Service node 11 carries out the content verification of data block according to the digest value of these Transaction Informations or Transaction Information.According to Content verification is as a result, show the interface of Fig. 5 H or Fig. 5 I.
As shown in fig. 6, providing one kind according to one embodiment of the disclosure and inquiring data block in block chain network In Transaction Information method.As shown in figs. 1A-1 c, the block chain network includes accounting nodes sub-network 2 and service node Sub-network 1.The accounting nodes sub-network 2 includes the accounting nodes 21 data block being recorded on block chain.The business Node sub-network 1 includes the service node 11 that data block accounting nodes being recorded on block chain is verified.Book keeping operation section Point sub-network 2 is communicated with service node sub-network 1 by agent node 12, and the agent node 12 is service node subnet A service node in network 1.The method is executed by agent node 12, which comprises
Step 310 receives service node to the inquiry request of the Transaction Information in data block and with specific to the business The signature that the private key of node generates the inquiry request;
Step 320, the public key certificate for obtaining the service node, the public key certificate is in response to service node to public key certificate Request and generate, contain the public key specific to the service node;
Step 330, from the public key certificate of the service node, obtain specific to the service node public key;
Step 340 verifies the signature with the public key specific to the service node;
Step 350, in the case where being proved to be successful, send accounting nodes for inquiry request, so as to accounting nodes according to The target service node permissions data of service node, it is determined whether the Transaction Information into the service node returned data block, The target service node permissions data indicate the service node have the right inquiry target service node.
In one embodiment, service node asks the inquiry of the Transaction Information in data block to agent node transmission Ask, is occurred after the block head that service node receives data block.That is, having the data block cochain of Transaction Information Afterwards, block hair can be given service node by accounting nodes, notification data block cochain, if necessary to inquire specific hand over If easy information, it can be inquired by agent node to accounting nodes.Therefore, description step 310-340 detailed process it Before, it is necessary to the operation to the service node before the inquiry request of the Transaction Information in data block is sent to the service node It is described.
In this embodiment, the service node is to the inquiry request of the Transaction Information in data block in the business section Point is sent after carrying out signature verification to the signature in the block head of the data block.As shown in figure 9, to the block of the data block Signature in head carries out signature verification
The block head of the data block that step 610, reception are sent by accounting nodes contains to the number in the block head According to abstract and signature that the Transaction Information in block generates, the signature is utilized by the accounting nodes specific to the accounting nodes Private key encrypts the abstract and is generated;
Step 620, the public key certificate for obtaining accounting nodes, the public key certificate is in response to accounting nodes to public key certificate It requests and generates, contain the public key specific to the accounting nodes;
Step 630, from the public key certificate of the accounting nodes, obtain specific to the accounting nodes public key;
Step 640, using the public key specific to the accounting nodes, the signature is decrypted, by decrypted result with Abstract in block head compares, to realize signature verification.
Step 610-640 is executed by service node.Step 610-640 is described in detail below.
In step 610, the block head of the data block sent by accounting nodes is received, is contained in the block head pair The abstract and signature that Transaction Information in the data block generates, the signature are utilized by the accounting nodes specific to the book keeping operation section The private key of point encrypts the abstract and is generated.
In general, the process of signature is such that apply message to be signed into abstract operation, obtains to be signed disappear The abstract of breath, the key pair abstract encryption then used with signature, is signed.When verifying signature, need to utilize The key pair signature decryption that solution signature uses, has obtained the abstract of message to be signed, has then applied again to message to be signed Add same abstract operation, the abstract redefined.If it is consistent with the abstract redefined to decrypt obtained abstract, Signature verification success.By signature verification, it is able to verify that out whether message to be signed is that signer is issued and message It is whether complete.If the message is not that signer is sent out or message is lost a part in transmission process, signature verification is equal Do not pass through.
In the situation of unsymmetrical key, predetermined digest algorithm can be utilized to the transaction in data block by accounting nodes Information generates abstract.Then, a private key specific to the accounting nodes is generated, abstract is encrypted using it, generates signature. The block head that the abstract of previous data block on abstract, signature, block chain can be put into data block, Transaction Information is put into The block body of data block, cochain after data block is known together between all accounting nodes.
In step 620, the public key certificate of accounting nodes is obtained, the public key certificate demonstrate,proves public key in response to accounting nodes The request of book and generate, contain the public key specific to the accounting nodes.
The public key certificate is generated by certificate authority (CA) in response to the request of authentication center.In one embodiment In, the public key certificate of the accounting nodes is generated in the following way by certificate authority:
It receives the public key certificate for accounting nodes sent from authentication center and generates request, the public key certificate generation is asked Mark in asking containing accounting nodes and the private key specific to the accounting nodes;
The mark that accounting nodes in request are generated for the public key certificate generates special in request according to the public key certificate Due to the private key of the accounting nodes, the public key specific to the accounting nodes is generated;
The mark of accounting nodes and the public affairs specific to the accounting nodes generated in request are generated according to the public key certificate Key generates the public key certificate of the accounting nodes.
Public key certificate generates request, and to be authentication center carry out after certification passes through for the identity of accounting nodes, to certificate granting The request certificate authority that center issues provides the request of public key certificate.The public key certificate generates in request containing note The mark of account node and private key specific to the accounting nodes.The former effect is to find public key certificate in public key certificate Holder's node.The effect of the latter is that certificate authority is facilitated to generate accordingly specific to the public key of accounting nodes, so as to Generate public key certificate.
Then, the mark of accounting nodes in request is generated for the public key certificate, certificate authority can basis The public key certificate generates the private key in request specific to the accounting nodes, generates the public key specific to the accounting nodes.Later, It can generate the mark of accounting nodes and the public affairs specific to the accounting nodes generated in request according to the public key certificate Key generates the public key certificate of the accounting nodes.Public key certificate is generated using existing method.Generate public key certificate meaning be, It is different from general public key, which is after being authenticated by permission of the authentication center to user, by certificate granting Heart unified payment, have more reliability.The embodiment by way of by certificate authority unified payment public key certificate, Improve reliability when service node signature verification.
In one embodiment, the public key certificate for accounting nodes generates request by authentication center according to lower section Formula generates:
Receive the certification request that accounting nodes are sent, mark and registration letter with accounting nodes in the certification request Breath;
The registration information is compared with registration information of the accounting nodes when block chain network is registered, it is such as consistent, Success is then authenticated, the public key certificate is generated and generates request, to be sent to the certificate authority.
After private key of the accounting nodes generation specific to accounting nodes, certification request is sent to authentication center, it is described to recognize Mark and registration information with accounting nodes in card request.Authentication center be one to the identity of accounting nodes verified from And ensure the node of safety.The private key specific to accounting nodes that can also have accounting nodes to generate in certification request. Authentication center is stored with registration information of the node in the registration of block chain network.It is by the registration information and accounting nodes in area Registration information when block chain network is registered is compared, such as consistent, then authenticates success, generates the public key certificate and generates request, To be sent to the certificate authority.The public key certificate generates the mark containing accounting nodes in request and saves specific to book keeping operation The private key of point.
The advantages of embodiment is, by the authentication of authentication center, to improve the safety of public key certificate granting.
In step 630, since in public key certificate, the mark of accounting nodes and the public key specific to accounting nodes are that correspondence is deposited Storage, it can therefrom obtain the public key specific to the accounting nodes.
In step 640, using the public key specific to the accounting nodes, the signature is decrypted, it should obtain The abstract of Transaction Information in data block.It should be one with the abstract determined when signature to the Transaction Information in data block Sample.Decrypted result and the abstract in block head are compared, if unanimously, illustrating that signature verification passes through.Service node can be with Transaction Information is further inquired accordingly.
The benefit of the process of above-mentioned signature verification is that, by signature verification, service node can be to the book keeping operation of accounting nodes Behavior is verified.If collective practises fraud when accounting nodes are kept accounts, by signature verification, service node just remains book keeping operation section The evidence of point collective cheating, although having reached the cochain that service node does not have actual participation data block, but still to data field The cochain of block plays the role of witness.
Step 310-350 is described in detail below.
In the step 310, receive service node to the inquiry request of the Transaction Information in data block and with specific to this The signature that the private key of service node generates the inquiry request.
As described above, accounting nodes are by after data block cochain, service node has only obtained the block head of data block. If service node wants inquiry particular transactions information, need to send inquiry request to agent node.Service node generates One private key specific to service node signs to the inquiry request.The process of signature includes: first with predetermined digest algorithm to looking into It askes request and determines abstract, then the private key with this specific to service node encrypts the abstract, obtains the signature of the inquiry request.
Service node sends inquiry request and the signature of generation to agent node.
In step 320, the public key certificate of service node is obtained, the public key certificate demonstrate,proves public key in response to service node The request of book and generate, contain the public key specific to the service node.
The public key certificate is generated by certificate authority (CA) in response to the request of authentication center.In one embodiment In, the public key certificate is generated in the following way by certificate authority:
It receives the public key certificate for service node sent from authentication center and generates request, the public key certificate generation is asked Mark in asking containing service node and the private key specific to the service node;
The mark that service node in request is generated for the public key certificate generates special in request according to the public key certificate Due to the private key of the service node, the public key specific to the service node is generated;
The mark of service node and the public affairs specific to the service node generated in request are generated according to the public key certificate Key generates the public key certificate of the service node.
Public key certificate generates request, and to be authentication center carry out after certification passes through for the identity of service node, to certificate granting The request certificate authority that center issues provides the request of public key certificate.The public key certificate, which generates in request, contains industry Be engaged in node mark and private key specific to the service node.The former effect is to find public key certificate in public key certificate Holder's node.The effect of the latter is that certificate authority is facilitated to generate accordingly specific to the public key of service node, so as to Generate public key certificate.
Then, the mark of service node in request is generated for the public key certificate, certificate authority can basis The public key certificate generates the private key in request specific to the service node, generates the public key specific to the service node.Later, It can generate the mark of accounting nodes and the public affairs specific to the service node generated in request according to the public key certificate Key generates the public key certificate of the service node.Public key certificate is generated using existing method.Generate public key certificate meaning be, It is different from general public key, which is after being authenticated by permission of the authentication center to user, by certificate granting Heart unified payment, have more reliability.The embodiment by way of by certificate authority unified payment public key certificate, Improve reliability when agent node signature verification.
In one embodiment, the public key certificate for service node generates request by authentication center according to lower section Formula generates:
Receive the certification request that service node is sent, mark and registration letter with service node in the certification request Breath;
The registration information is compared with registration information of the service node when block chain network is registered, it is such as consistent, Success is then authenticated, the public key certificate is generated and generates request, to be sent to the certificate authority.
After private key of the service node generation specific to service node, certification request is sent to authentication center, it is described to recognize Mark and registration information with accounting nodes in card request.Authentication center be one to the identity of service node verified from And ensure the node of safety.The private key specific to service node that can also have service node to generate in certification request. Authentication center is stored with registration information of the service node in the registration of block chain network.It is by the registration information and service node Registration information in the registration of block chain network is compared, such as consistent, then authenticates success, generates the public key certificate generation and asks It asks, to be sent to the certificate authority.The public key certificate generates in request the mark containing service node and specific to industry The private key of business node.
The advantages of embodiment is, by the authentication of authentication center, to improve the safety of public key certificate granting.
In one embodiment, as shown in Figure 10, step 320 includes:
Step 3201 receives the public key certificate generation notice that the certificate authority is issued to agent node;
Step 3202, Xiang Suoshu certificate authority send the request to the public key certificate;
Step 3203 receives the public key certificate from the certificate authority.
The embodiment use from certificate authority to agent node notify, agent node as needed to public key certificate into Row pulls this mode.That is, certificate authority once generates public key certificate, corresponding public key certificate will be issued Generate notice.If agent node is interesting to the public key certificate, it can take and pull and be stored in local this mode.Agency Node issues the request to public key certificate from Certificate Authority center, which is sent to agent node by Certificate Authority center Storage.
In the embodiment, as long as certificate authority generates a public key certificate, agent node is noted that pull.When Agent node receives inquiry request and signature, when needing to verify signature, has obtained public key certificate, Ke Yizhi It connects and is verified with the public key therein specific to the service node, accelerate the speed of signature verification.
In one embodiment, as shown in figure 11, step 320 includes:
Step 3204, the request that the public key certificate is sent to accounting nodes, so that the accounting nodes are from block chain It include to obtain the public key certificate in the data block of the public key certificate, wherein described in the certificate authority generates Accounting nodes are sent by the public key certificate after public key certificate, are recorded on block chain after data block is added by accounting nodes;
Step 3205 receives the public key certificate that accounting nodes return.
In this embodiment, public key certificate is safeguarded on block chain.Certificate authority is generated specific to the business After the public key of node, since certificate authority is not the accounting nodes in accounting nodes sub-network, public key card can not be carried out The cochain of book.It will be by the corresponding accounting nodes in accounting nodes sub-network come cochain.Therefore, certificate authority Accounting nodes are sent by the public key certificate, after being known together between all accounting nodes in accounting nodes sub-network, note Record is on block chain.When agent node needs to obtain the public key certificate to carry out signature verification, since it is not accounting nodes An accounting nodes in sub-network will also send the request for obtaining the public key certificate to a corresponding accounting nodes.Book keeping operation After node receives the request, from include on block chain the public key certificate data block in, obtain the public key certificate, and to Agent node returns.
In one embodiment, the mark containing service node in the request of the public key certificate.Due in public key certificate Mark containing public key and service node specific to service node, accounting nodes can find band on block chain The public key certificate for stating the mark of service node is returned to agent node.
Cochain safeguards that the advantages of public key certificate is the occupancy to agent node memory space to be reduced, moreover, the public key of cochain Certificate validity is higher, prevents from being tampered.
In a step 330, the public key with this specific to the service node verifies the signature.
In one embodiment, step 330 includes:
The signature is decrypted using the public key specific to the service node, obtains plucking for the inquiry request It wants;
The inquiry request is calculated using predetermined digest algorithm and is made a summary, the predetermined digest algorithm and service node with specific to It is identical that the private key of the service node generates digest algorithm used when signing to the inquiry request;
If calculated abstract is consistent with the abstract that decryption obtains, it is proved to be successful.
As described above, signing includes generating abstract using predetermined digest algorithm to inquiry request, then using described in utilization The process encrypted specific to the private key of the service node.When signature verification, first with described specific to the service node Public key to it is described signature be decrypted, obtain the abstract of the inquiry request.If the signature is the true label of accounting nodes Name, and midway, without loss, which should be the same with that abstract generated when generating and signing.Therefore, then with generation Same predetermined digest algorithm when the signature generates an abstract to inquiry request, if two abstracts are consistent, illustrates this Signature is the actual signature of accounting nodes, and midway is without loss, signature verification success.
In one embodiment, step 310 only executes in the successful situation of signature verification, the case where signing failure Under, service node must not carry out the inquiry of Transaction Information, ensure that the safety of Transaction Information inquiry.
In step 340, in the case where being proved to be successful, accounting nodes are sent by inquiry request, so as to accounting nodes According to the target service node permissions data of service node, it is determined whether the transaction letter into the service node returned data block Breath, the target service node permissions data indicate the service node have the right inquiry target service node.
In one embodiment, as shown in figure 8, the target service node permissions data according to service node, determines Whether the Transaction Information into the service node returned data block, including the following steps executed by accounting nodes:
Step 510 obtains the corresponding target service node permissions data of the service node;
Step 420, for each Transaction Information in the data block, determine applying side or being by dynamic side for Transaction Information No is one of the target service node indicated in the target service node permissions data, wherein if Transaction Information is applied Side is one of the target service node indicated in the target service node permissions data by dynamic side, then is returned to the service node Return the Transaction Information.
In one embodiment, a kind of service node and target service node permission number are safeguarded in advance in each accounting nodes According to mapping table.Accounting nodes can obtain the corresponding target service of the service node by inquiring the mapping table Node permissions data.
In another embodiment, each service node and block chain operator are concluded in advance intelligent contract.It can be from In service node and the intelligent contract of block chain operator, the corresponding target service node permissions data of the service node is obtained.
It is well known that transaction is the behavior that a side causes another party.Causing a side of behavior is exactly Shi Dongfang, is caused row For a side be exactly by dynamic side.For example, unit terminal of making out an invoice is exactly Shi Dongfang in the transaction for outputing electronic invoice, ticket people is led Terminal is exactly by dynamic side.In the transfer transactions of legal digital cash, the side's of producing terminal of legal digital cash is exactly Shi Dongfang, The side's of being transferred to terminal of legal digital cash is exactly by dynamic side.
Target service node permissions data indicate the service node have the right inquiry target service node.If transaction letter Breath is applied just or be one of the target service node indicated in the target service node permissions data by dynamic side, and being all can be with Transaction Information is returned to it.For example, there are two subsidiary, the business sections of the two subsidiaries for unit belonging to service node A Point is A1 and A2.The target service node permissions data of service node A may indicate that service node A have the right inquiry target service Node is A, A1 and A2.If one in A, A1 and A2 is applied just or had by dynamic side to Transaction Information, service node A has the right Limit inquires this Transaction Information.
Side is applied there are two types of representation in Transaction Information, and one is directly indicate that another kind is with applying side's title It is indicated with other Transaction Informations, indicates that the side that applies of this Transaction Information is other Transaction Informations by dynamic side.In this way, if should The side that applies of Transaction Information is latter representation, i.e., applying for the Transaction Information is just another Transaction Information by dynamic side, Another Transaction Information is one of the target service node indicated in the target service node permissions data by dynamic side, this In the case of to be also in a disguised form equivalent to the side that applies of the Transaction Information be also to indicate in the target service node permissions data in fact One of target service node, the service node should also have the right to inquire the target service node Transaction Information.
For example, the side that applies of Transaction Information TX4 is indicated with TX1+TX2, i.e. the side that applies of Transaction Information TX4 is Transaction Information TX1 by dynamic side and Transaction Information TX2 by dynamic side.For example, Transaction Information TX4 is the Transaction Information of electronic invoice reimbursement, hand over Easy information TX1 and TX2 are the Transaction Information that two electronic invoices are made out an invoice respectively.In Transaction Information TX1, A1 is neck ticket people.Transaction In information TX2, B is neck ticket people.TX4 apply side TX1+TX2 indicate TX1 by dynamic side (i.e. neck ticket people A1) and TX2 by moving (i.e. neck ticket people B) is submitted an expense account together for side.Therefore, the side that applies of Transaction Information TX4 is indicated with TX1+TX2 on surface, in fact, it Applying side is A1+B.In this way, if target service node permissions data indicate service node A have the right inquiry business node A and The Transaction Information of A1 (subsidiary that A1 is A), then the A1 in A1+B is that service node A has the right to inquire Transaction Information for it 's.Therefore, Transaction Information can be returned to the service node.
It is being that applying for Transaction Information is just indicated with other Transaction Informations (that is, this Transaction Information that the embodiment, which overcomes, Applying side is other Transaction Informations by dynamic side) when, it is possible to individually judge from applying for Transaction Information just or by dynamic side It whether is the incorrect problem of one of the target service node indicated in the target service node permissions data, because this In the case of, Transaction Information apply side be substantially in the target service node permissions data target service node that indicates it One, but be not in form, therefore cause to judge by accident.This embodiment improves determine whether that Transaction Information should be returned to service node Accuracy.
In one embodiment, if Transaction Information applies side or by dynamic side neither the target service node permission One of target service node indicated in data, nor another Transaction Information by dynamic side, and another Transaction Information by Dynamic side is one of the target service node indicated in the target service node permissions data, then returns to the friendship to the service node The cryptographic Hash of easy information.
(the first situation is applying side or being the mesh by dynamic side itself for Transaction Information that is, in above two situation One of the target service node indicated in mark service node permissions data, second case are that the side that applies of the Transaction Information is another One Transaction Information by dynamic side, and another Transaction Information is to indicate in the target service node permissions data by dynamic side One of target service node), all it will be understood that the service node has the right to inquire the Transaction Information.If being not belonging to both feelings Shape, i.e. Transaction Information apply side or by dynamic side neither the target service section indicated in the target service node permissions data One of point, nor another Transaction Information by dynamic side, and another Transaction Information is the target service node by dynamic side One of target service node indicated in permissions data, then it is assumed that the service node haves no right to inquire the Transaction Information, is at this moment not Transaction Information should be returned to the service node, for content verification, the cryptographic Hash of Transaction Information can be returned only to.
In one embodiment, it is generated in advance the intelligent contract of service node Yu block chain operator, and by the intelligence of generation Energy contract is synchronized to the storage of each accounting nodes in accounting nodes sub-network.In this way, the target service node permission in step 340 Data, so that it may be obtained from the intelligent contract of the service node and block chain operator that the accounting nodes store.
In the embodiment, the intelligent contract of each service node and block chain operator can be stored in accounting nodes subnet In each accounting nodes in network.The benefit of the embodiment is, since intelligent contract is all locally stored in each accounting nodes, significantly Improve the processing speed that Transaction Information or cryptographic Hash are returned to service node.
In another embodiment, intelligent contract is not each accounting nodes for being previously stored in accounting nodes sub-network In, but upper chained record.In this way, can be searched when each accounting nodes need to obtain permissions data from intelligent contract with cochain. The advantages of embodiment is that the intelligence compared to one each service node of database purchase of each accounting nodes internal maintenance is closed About, the occupancy of intra-node memory space is saved.
In this embodiment, it is generated in advance the intelligent contract of service node Yu block chain operator, and by the intelligence of generation Intelligent contract block corresponding with the service node is added in contract, is recorded on block chain.In this way, the target industry in step 340 Be engaged in node permissions data, so that it may from intelligence contract block corresponding with the service node on block chain the service node with It is obtained in the intelligent contract of block chain operator.
As shown in figure 12, the accounting nodes in step 350 sent inquiry request to according to an embodiment of the present disclosure It is selected in the following way from accounting nodes sub-network:
Step 710, the processing load for obtaining each accounting nodes in accounting nodes sub-network;
Step 720 determines each accounting nodes in accounting nodes sub-network to the service node for sending the inquiry request Distance;
Step 730 is based on the processing load and the distance, determines the accounting nodes for sending inquiry request to.
Processing load is the parameter of the burden for the indicating that accounting nodes are being handled of the task.In one embodiment, it handles Load can be measured with the untreated complete number of tasks of accounting nodes.Here task includes Transaction Information cochain task and inquiry Task.These untreated complete number of tasks can represent the processing load of accounting nodes.
In one embodiment, step 710 includes:
It obtains the processing load that each accounting nodes are periodically sent and stores;
The processing load for the accounting nodes that accounting nodes the last time is stored is as the processing of the accounting nodes obtained Load.
That is, in this embodiment, processing load can periodically (for example, every 5 seconds) be sent by each accounting nodes To agent node.Agent node safeguards a processing load meter, and it is fixed that each accounting nodes received are recorded in the processing load meter The processing load of phase broadcast.In this way, agent node can bear the processing for the accounting nodes that accounting nodes the last time stores Processing load of the lotus as the accounting nodes obtained.
In this embodiment, agent node passively receives the processing load that accounting nodes are periodically sent.In another implementation In example, the processing load of agent node active inquiry accounting nodes.In this embodiment, step 710 includes:
Into accounting nodes sub-network, each accounting nodes send processing load inquiry request;
Receive the processing load for the accounting nodes that each accounting nodes are sent.
In one embodiment, it in step 720, determines in accounting nodes sub-network and is looked into described in each accounting nodes to transmission Ask the distance of the service node of request, comprising:
Into accounting nodes sub-network, each accounting nodes and the service node of the transmission inquiry request issue positioning Information request;
Each accounting nodes and transmission institute are received from each accounting nodes and the service node for sending the inquiry request State the location information of the service node of inquiry request;
Using the location information of each accounting nodes and the service node for sending the inquiry request, each book keeping operation section is determined Distance of the point to the service node for sending the inquiry request.
Each service node and accounting nodes may have the positioning systems such as GPS, and therefore, they have from itself The location information of itself can be obtained in GPS positioning system.It, will when receiving the location information requests that agent node is sent The location information of itself obtained from GPS system is sent to agent node.When agent node obtain each accounting nodes and After the location information for sending the service node of the inquiry request, these location informations are utilized, it will be able to determine each book keeping operation section Distance of the point to the service node for sending the inquiry request.
In the above-described embodiments, location information is obtained using the mode by agent node activly request, is born with processing Lotus is the same, the location information can also using from each accounting nodes and send the service node of the inquiry request periodically to The mode that agent node is sent, therefore do not repeat.
The advantages of embodiment, is, when determining the accounting nodes for executing the method, considers not only each book keeping operation section The processing load of point, it is also contemplated that each accounting nodes are with a distance from the service node for sending the inquiry request.Although may The processing load of a certain accounting nodes is minimum, but the accounting nodes may be very from the service node for sending the inquiry request Far, it is chosen as executing the accounting nodes of the method, increases network transmission burden, also reduce query processing speed.It should Embodiment has comprehensively considered distance and processing load, and the book keeping operation section of inquiry is executed than determining according to distance or processing load merely Point scheme, can substantially balanced each accounting nodes processing load and cause too big transmission burden to network.
In one embodiment, as shown in figure 13, step 730 may include:
Step 7301, the processing load based on each accounting nodes in accounting nodes sub-network, determine each book keeping operation First score of node;
Step 7302, the distance based on each accounting nodes in accounting nodes sub-network, determine each accounting nodes The second score;
Step 7303, the first score and the second score based on each accounting nodes, what determination sent inquiry request to Accounting nodes.
In step 7301, based on the processing load of each accounting nodes in accounting nodes sub-network, determine each First score of accounting nodes can take the form for searching pre-set processing load and the first score mapping table.It should Processing load is preset with the first score mapping table, wherein processing load is bigger, the first score is lower.Such as:
It handles load (untreated complete number of tasks) First score
0-1 5
2-4 4
5-9 3
10-19 2
20-49 1
50 or more 0
Table 1 handles load and the first score mapping table
In step 7302, based on the distance of each accounting nodes in accounting nodes sub-network, each book keeping operation section is determined Second score of point can take the form for searching pre-set distance and the second score mapping table.The distance and second Score mapping table is preset, wherein distance is bigger, the second score is lower.Such as:
Distance Second score
Within 50 meters 5
50-200 meters 4
200-1000 meters 3
1000-5000 meters 2
5000-20000 meters 1
20000 meters or more 0
2 distance of table and the second score mapping table
There are the first score and the second score of each accounting nodes, so that it may determine according to the first score and the second score Execute the accounting nodes of the method.The advantages of embodiment, is, by the institute of accounting nodes each in accounting nodes sub-network It states the described of each accounting nodes in processing load and accounting nodes sub-network and the side is executed to selection apart from the two factors The influence fractionation of the accounting nodes of method improves the accuracy that selection executes the accounting nodes of the method.
In one embodiment, as shown in figure 14, step 7303 includes:
The weighted sum of step 73031, the first score for determining each accounting nodes and the second score;
Step 73032 is based on the weighted sum, determines the accounting nodes for sending inquiry request to.
In step 73031, when determining weighted sum, the weight distributed for the first score and the second score be can be according to warp It tests preset.
In step 73032, the maximum accounting nodes of the weighted sum can be determined as receiving described to cochain transaction Weighted sum can also be greater than in the accounting nodes of predetermined weighted sum threshold value optional one, as reception by the accounting nodes of information The accounting nodes to cochain Transaction Information.It is all load as long as being believed that weighted sum is greater than predetermined weighted sum threshold value Not counting it is too big and apart from the service node sent to cochain Transaction Information not counting too far, which chooses as the execution side The accounting nodes of method are the same.In the latter matter, the equilibrium for also helping load prevents from all selecting in same time The maximum accounting nodes of weighted sum, and cause the obvious overload state of the maximum accounting nodes of the weighted sum.
The advantages of embodiment is the weighted sum of the first score and the second score based on each accounting nodes, and determining will The accounting nodes that inquiry request is sent to, compared to based on the first score and the second score and/or average value determine and ask inquiry The scheme for seeking the accounting nodes being sent to has fully taken into account the first score and the second score and has sent inquiry request for determining The otherness of the contribution of the accounting nodes arrived improves the reasonability for determining the accounting nodes for sending inquiry request to.
The embodiment for the accounting nodes that above-mentioned determination sends inquiry request to is mainly for Figure 1A -1B in accounting nodes Sub-network end does not have the case where branch's accounting nodes sub-network.But the accounting nodes sub-network end shown in Fig. 1 C is divided into branch's note It is then another situation in the embodiment of account node sub-network.
In this embodiment, Transaction Information type, e.g. supply chain financial transaction or electronics hair are had in inquiry request Ticket transaction or the transaction of legal digital cash.Accounting nodes in accounting nodes sub-network are in advance according to the Transaction Information class of processing Type classification, the accounting nodes of the every one kind being divided into separately constitute corresponding branch accounting nodes sub-network, for example, supply chain Financial transaction branch accounting nodes sub-network or electronic invoice transaction branch's accounting nodes sub-network or legal digital cash are handed over Easily branched accounting nodes sub-network, a kind of each branch's accounting nodes sub-network special disposal transaction class corresponding with type of transaction Type.Therefore, which will be dealt into respective type according to the Transaction Information type carried in inquiry request by agent node In an accounting nodes in branch's accounting nodes sub-network.In order to reach this point, accounting nodes are stored in agent node The Transaction Information type corresponding record of mark and Transaction Information type mapping table, accounting nodes mark and processing is saved in book keeping operation In point identification and Transaction Information type mapping table.
In this embodiment, as shown in figure 15, the accounting nodes sent inquiry request to are from accounting nodes sub-network It selects in the following way:
Transaction Information type in step 740, acquisition inquiry request;
Step 750, the friendship from accounting nodes mark and Transaction Information type mapping table, in lookup and inquiry request The easily corresponding accounting nodes mark of information type;
Step 760, from the accounting nodes that the accounting nodes that find identify, determine the book keeping operation section for sending inquiry request to Point.
The benefit of the embodiment is to be divided into branch's accounting nodes sub-network for accounting nodes sub-network end shown in Fig. 1 C Architecture, propose a kind of side of accounting nodes that the reasonable selection for being suitble to the architecture sends inquiry request to Formula.
It in one embodiment, include Transaction Information type in the Transaction Information type field in inquiry request.Step 740 In, can Transaction Information type directly be read from the Transaction Information type field.
Due to being provided with accounting nodes mark and Transaction Information type mapping table on agent node, in one embodiment In, in step 740, from the table, accounting nodes mark corresponding with the Transaction Information type in inquiry request can be found.
As shown in figure 16, in one embodiment, step 760 includes:
Step 7601, the processing load for determining the accounting nodes that the accounting nodes each found identify;
Step 7602 determines the accounting nodes of the accounting nodes mark each found to the business of the transmission inquiry request The distance of node;
Step 7603 is based on the processing load and the distance, determines the accounting nodes for sending inquiry request to.
The specific implementation process of step 7601-7603 and the specific implementation process of step 710-730 are similar, and difference is only that Determined in the embodiment of Figure 16 processing load and to the service node for sending the inquiry request distance accounting nodes model Enclose the book keeping operation section of accounting nodes mark corresponding with Transaction Information type in inquiry request that is being only limitted to find in step 750 Point is not all accounting nodes in accounting nodes sub-network, therefore does not repeat.
According to one embodiment of the disclosure, as shown in figure 17, additionally provides one kind and inquire data in block chain network The agent node of Transaction Information in block, the block chain network include accounting nodes sub-network and service node sub-network, The accounting nodes sub-network includes accounting nodes data block being recorded on block chain, the service node sub-network packet Include the service node verified to the data block that accounting nodes are recorded on block chain, accounting nodes sub-network and business section Point sub-network is communicated by agent node, and the agent node is a service node in service node sub-network, institute Stating agent node includes:
Inquiry request and signature receiving unit 910, for receiving service node looking into the Transaction Information in data block The signature ask request and the inquiry request is generated with the private key specific to the service node;
Public key certificate acquiring unit 920, for obtaining the public key certificate of the service node, the public key certificate is in response to industry Business node generates the request of public key certificate, contains the public key specific to the service node;
Service node public key acquisition unit 930, for obtaining specific to the business from the public key certificate of the service node The public key of node;
Service node signature verification unit 940, for being tested with the public key specific to the service node the signature Card;
Inquiry request transmission unit 950, for sending accounting nodes for inquiry request in the case where being proved to be successful, So that accounting nodes are according to the target service node permissions data of service node, it is determined whether to the service node returned data area Transaction Information in block, the target service node permissions data indicate the service node have the right inquiry target service node.
In one embodiment, the public key certificate is generated in the following way by certificate authority:
It receives the public key certificate for service node sent from authentication center and generates request, the public key certificate generation is asked Mark in asking containing service node and the private key specific to the service node;
The mark that service node in request is generated for the public key certificate generates special in request according to the public key certificate Due to the private key of the service node, the public key specific to the service node is generated;
The mark of service node and the public affairs specific to the service node generated in request are generated according to the public key certificate Key generates the public key certificate of the service node.
In one embodiment, the public key certificate generates request and is generated in the following way by authentication center:
Receive the certification request that service node is sent, mark and registration letter with service node in the certification request Breath;
The registration information is compared with registration information of the service node when block chain network is registered, it is such as consistent, Success is then authenticated, the public key certificate is generated and generates request, to be sent to the certificate authority.
In one embodiment, the service node signature verification unit 940 is further used for:
The signature is decrypted using the public key specific to the service node, obtains plucking for the inquiry request It wants;
The inquiry request is calculated using predetermined digest algorithm and is made a summary, the predetermined digest algorithm and service node with specific to It is identical that the private key of the service node generates digest algorithm used when signing to the inquiry request;
If calculated abstract is consistent with the abstract that decryption obtains, it is proved to be successful.
In one embodiment, the target service node permissions data according to service node, it is determined whether to the industry The Transaction Information being engaged in node returned data block, comprising:
Obtain the corresponding target service node permissions data of the service node;
For each Transaction Information in the data block, applying side or whether being described by dynamic side for Transaction Information is determined One of the target service node indicated in target service node permissions data, wherein if Transaction Information applies side or by dynamic Side is one of the target service node indicated in the target service node permissions data, then returns to the transaction to the service node Information.
In one embodiment, if the side that applies of the Transaction Information is another Transaction Information by dynamic side, and this is another Transaction Information is one of the target service node indicated in the target service node permissions data by dynamic side, then to the business Node returns to the Transaction Information.
In one embodiment, if Transaction Information applies side or by dynamic side neither the target service node permission One of target service node indicated in data, nor another Transaction Information by dynamic side, and another Transaction Information by Dynamic side is one of the target service node indicated in the target service node permissions data, then returns to the friendship to the service node The cryptographic Hash of easy information.
In one embodiment, the service node is to the inquiry request of the Transaction Information in data block in the business Node is sent after carrying out signature verification to the signature in the block head of the data block, to the label in the block head of the data block Name carries out signature verification
The block head of the data block sent by accounting nodes is received, is contained in the block head in the data block Transaction Information generate abstract and signature, it is described signature by the accounting nodes utilize specific to the accounting nodes private key to institute Abstract is stated to be encrypted and generated;
The public key certificate of accounting nodes is obtained, the public key certificate gives birth to the request of public key certificate in response to accounting nodes At containing the public key specific to the accounting nodes;
From the public key certificate of the accounting nodes, the public key specific to the accounting nodes is obtained;
Using the public key specific to the accounting nodes, the signature is decrypted, it will be in decrypted result and block head Abstract compare, to realize signature verification.
In one embodiment, the public key certificate of the accounting nodes is generated in the following way by certificate authority:
It receives the public key certificate for accounting nodes sent from authentication center and generates request, the public key certificate generation is asked Mark in asking containing accounting nodes and the private key specific to the accounting nodes;
The mark that accounting nodes in request are generated for the public key certificate generates special in request according to the public key certificate Due to the private key of the accounting nodes, the public key specific to the accounting nodes is generated;
The mark of accounting nodes and the public affairs specific to the accounting nodes generated in request are generated according to the public key certificate Key generates the public key certificate of the accounting nodes.
In one embodiment, the public key certificate for accounting nodes generates request by authentication center according to lower section Formula generates:
Receive the certification request that accounting nodes are sent, mark and registration letter with accounting nodes in the certification request Breath;
The registration information is compared with registration information of the accounting nodes when block chain network is registered, it is such as consistent, Success is then authenticated, the public key certificate is generated and generates request, to be sent to the certificate authority.
In one embodiment, the public key certificate acquiring unit is further used for:
It receives the public key certificate that the certificate authority is issued to agent node and generates notice;
The request to the public key certificate is sent to the certificate authority;
The public key certificate is received from the certificate authority.
In one embodiment, the public key certificate acquiring unit is further used for:
The request of the public key certificate is sent, to accounting nodes so that the accounting nodes include described from block chain In the data block of public key certificate, the public key certificate is obtained, wherein after the certificate authority generates the public key certificate Accounting nodes are sent by the public key certificate, are recorded on block chain after data block is added by accounting nodes;
Receive the public key certificate that accounting nodes return.
The method for inquiring the Transaction Information in data block in the block chain network according to the embodiment of the present disclosure can be by The accounting nodes 21 for the Transaction Information of Figure 18 inquired in data block in block chain network are realized.It is retouched referring to Figure 18 State the accounting nodes 21 that the Transaction Information in data block is inquired in block chain network according to the embodiment of the present disclosure.Figure 18 is aobvious The accounting nodes 21 of the Transaction Information inquired in data block in block chain network shown are only an example, should not be to this The function and use scope of open embodiment bring any restrictions.
As shown in figure 18, the accounting nodes 21 of the Transaction Information in data block are inquired in block chain network in terms of general Calculate the form performance of equipment.The component that the accounting nodes 21 of the Transaction Information in data block are inquired in block chain network can be with Including but not limited to: at least one above-mentioned processing unit 810, at least one above-mentioned storage unit 820, the different system components of connection The bus 830 of (including storage unit 820 and processing unit 810).
Wherein, the storage unit is stored with program code, and said program code can be held by the processing unit 810 Row, so that the processing unit 810 executes described in the description section of this specification above-mentioned example method according to the present invention The step of various illustrative embodiments.For example, the processing unit 810 can execute each step as shown in Figure 6.
Storage unit 820 may include the readable medium of volatile memory cell form, such as Random Access Storage Unit (RAM) 8201 and/or cache memory unit 8202, it can further include read-only memory unit (ROM) 8203.
Storage unit 820 can also include program/utility with one group of (at least one) program module 8205 8204, such program module 8205 includes but is not limited to: operating system, one or more application program, other program moulds It may include the realization of network environment in block and program data, each of these examples or certain combination.
Bus 830 can be to indicate one of a few class bus structures or a variety of, including storage unit bus or storage Cell controller, peripheral bus, graphics acceleration port, processing unit use any bus structures in a variety of bus structures Local bus.
The accounting nodes 21 that the Transaction Information in data block is inquired in block chain network can also be with one or more External equipment 700 (such as keyboard, sensing equipment, bluetooth equipment etc.) communication, can also be enabled a user to one or more with This inquires the transaction of the Transaction Information in data block inquired in data block in block chain network in block chain network Information accounting nodes 21 interaction equipment communication, and/or with make the friendship inquired in data block in block chain network Any equipment that the accounting nodes 21 of easy information can be communicated with one or more of the other calculating equipment (such as router, adjust Modulator-demodulator etc.) communication.This communication can be carried out by input/output (I/O) interface 650.Also, in block chain network The accounting nodes 21 of Transaction Information in middle inquiry data block can also pass through network adapter 860 and one or more net Network (such as local area network (LAN), wide area network (WAN) and/or public network, such as internet) communication.As shown, Network adaptation Other moulds that device 860 passes through bus 830 and the accounting nodes 21 for the Transaction Information inquired in data block in block chain network Block communication.It should be understood that although not shown in the drawings, can be in conjunction with the Transaction Information inquired in block chain network in data block Accounting nodes 21 use other hardware and/or software module, including but not limited to: microcode, device driver, redundancy processing Unit, external disk drive array, RAID system, tape drive and data backup storage system etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, terminal installation or network equipment etc.) is executed according to disclosure embodiment Method.
In an exemplary embodiment of the disclosure, a kind of computer program medium is additionally provided, computer is stored thereon with Readable instruction makes computer execute the above method and implements when the computer-readable instruction is executed by the processor of computer The method of example part description.
According to one embodiment of the disclosure, a kind of journey for realizing the method in above method embodiment is additionally provided Sequence product, can be using portable compact disc read only memory (CD-ROM) and including program code, and can set in terminal It is standby, such as run on PC.However, program product of the invention is without being limited thereto, in this document, readable storage medium storing program for executing can With to be any include or the tangible medium of storage program, the program can be commanded execution system, device or device use or Person is in connection.
Described program product can be using any combination of one or more readable mediums.Readable medium can be readable letter Number medium or readable storage medium storing program for executing.Readable storage medium storing program for executing for example can be but be not limited to electricity, magnetic, optical, electromagnetic, infrared ray or System, device or the device of semiconductor, or any above combination.The more specific example of readable storage medium storing program for executing is (non exhaustive List) include: electrical connection with one or more conducting wires, portable disc, hard disk, random access memory (RAM), read-only Memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read only memory (CD-ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.
Computer-readable signal media may include in a base band or as carrier wave a part propagate data-signal, In carry readable program code.The data-signal of this propagation can take various forms, including but not limited to electromagnetic signal, Optical signal or above-mentioned any appropriate combination.Readable signal medium can also be any readable Jie other than readable storage medium storing program for executing Matter, the readable medium can send, propagate or transmit for by instruction execution system, device or device use or and its The program of combined use.
The program code for including on readable medium can transmit with any suitable medium, including but not limited to wirelessly, have Line, optical cable, RF etc. or above-mentioned any appropriate combination.
The program for executing operation of the present invention can be write with any combination of one or more programming languages Code, described program design language include object oriented program language-Java, C++ etc., further include conventional Procedural programming language-such as " C " language or similar programming language.Program code can be fully in user It calculates and executes in equipment, partly executes on a user device, being executed as an independent software package, partially in user's calculating Upper side point is executed on a remote computing or is executed in remote computing device or server completely.It is being related to far Journey calculates in the situation of equipment, and remote computing device can pass through the network of any kind, including local area network (LAN) or wide area network (WAN), it is connected to user calculating equipment, or, it may be connected to external computing device (such as utilize ISP To be connected by internet).
It should be noted that although being referred to several modules or list for acting the equipment executed in the above detailed description Member, but this division is not enforceable.In fact, according to embodiment of the present disclosure, it is above-described two or more Module or the feature and function of unit can embody in a module or unit.Conversely, an above-described mould The feature and function of block or unit can be to be embodied by multiple modules or unit with further division.
In addition, although describing each step of method in the disclosure in the accompanying drawings with particular order, this does not really want These steps must be executed in this particular order by asking or implying, or having to carry out step shown in whole could realize Desired result.Additional or alternative, it is convenient to omit multiple steps are merged into a step and executed by certain steps, and/ Or a step is decomposed into execution of multiple steps etc..
Through the above description of the embodiments, those skilled in the art is it can be readily appreciated that example described herein is implemented Mode can also be realized by software realization in such a way that software is in conjunction with necessary hardware.Therefore, according to the disclosure The technical solution of embodiment can be embodied in the form of software products, which can store non-volatile at one Property storage medium (can be CD-ROM, USB flash disk, mobile hard disk etc.) in or network on, including some instructions are so that a calculating Equipment (can be personal computer, server, mobile terminal or network equipment etc.) is executed according to disclosure embodiment Method.
Those skilled in the art after considering the specification and implementing the invention disclosed here, will readily occur to its of the disclosure Its embodiment.This application is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes or Person's adaptive change follows the general principles of this disclosure and including the undocumented common knowledge in the art of the disclosure Or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by appended Claim is pointed out.

Claims (7)

1. it is a kind of in block chain network to the signature verification method of uplink data block, which is characterized in that the block link network Network includes accounting nodes sub-network and service node sub-network, and the accounting nodes sub-network includes that area is recorded in data block Accounting nodes on block chain, the service node sub-network include uplink data block accounting nodes being recorded on block chain The service node verified of signature, the method executes by service node, which comprises
The block head of the uplink data block sent by accounting nodes is received, is contained in the block head in the data block The abstract and signature that Transaction Information generates, the signature utilize the private key specific to the accounting nodes to described by the accounting nodes Abstract is encrypted and is generated;
The public key certificate of accounting nodes is obtained, the public key certificate generates the request of public key certificate in response to accounting nodes, Contain the public key specific to the accounting nodes;
From the public key certificate of the accounting nodes, the public key specific to the accounting nodes is obtained;
Using the public key specific to the accounting nodes, the signature is decrypted, by decrypted result and plucking in block head It compares, to realize signature verification.
2. the method according to claim 1, wherein the block head by the accounting nodes in the following manner It generates:
The abstract is generated to the Transaction Information in data block using predetermined digest algorithm;
For the private key specific to the accounting nodes, abstract is encrypted using it, generates the signature;
The abstract of previous data block on the abstract, the signature and block chain is put into the block head of data block.
3. the method according to claim 1, wherein the block chain network further includes certificate authority and recognizes Card center, the public key certificate for obtaining accounting nodes, comprising: the public key card of accounting nodes is obtained from the certificate authority Book;
The public key certificate of the accounting nodes is generated in the following way by certificate authority:
It receives the public key certificate for accounting nodes sent from authentication center and generates request, the public key certificate generates in request Mark containing accounting nodes and the private key specific to the accounting nodes;
For the public key certificate generate request in accounting nodes mark, according to the public key certificate generate request in specific to The private key of the accounting nodes generates the public key specific to the accounting nodes;
The mark of accounting nodes and the public key specific to the accounting nodes generated in request are generated according to the public key certificate, Generate the public key certificate of the accounting nodes.
4. according to the method described in claim 3, it is characterized in that, the public key certificate for accounting nodes generate request by Authentication center generates in the following way:
Receive the certification request that accounting nodes are sent, mark and registration information with accounting nodes in the certification request;
The registration information is compared with registration information of the accounting nodes when block chain network is registered, it is such as consistent, then recognize It demonstrate,proves successfully, generates the public key certificate and generate request, to be sent to the certificate authority.
5. the service node in a kind of block chain network, the block chain network includes accounting nodes sub-network and service node Network, the accounting nodes sub-network include accounting nodes data block being recorded on block chain, service node Network includes the service node that the signature for uplink data block accounting nodes being recorded on block chain is verified, institute Stating service node includes:
Block head receiving unit, for receiving the block head of the uplink data block sent by accounting nodes, in the block head Containing the abstract and signature generated to the Transaction Information in the data block, the signature is utilized by the accounting nodes specific to this The private key of accounting nodes encrypts the abstract and is generated;
Public key certificate acquiring unit, for obtaining the public key certificate of accounting nodes, the public key certificate is in response to accounting nodes pair The request of public key certificate and generate, contain the public key specific to the accounting nodes;
Public key acquisition unit, for obtaining the public key specific to the accounting nodes from the public key certificate of the accounting nodes;
Signature verification unit is decrypted the signature for utilizing the public key specific to the accounting nodes, and decryption is tied Fruit compares with the abstract in block head, to realize signature verification.
6. the service node in a kind of block chain network characterized by comprising
Memory is stored with computer-readable instruction;
Processor reads the computer-readable instruction of memory storage, requires side described in any of 1-4 with perform claim Method.
7. a kind of computer program medium, is stored thereon with computer-readable instruction, when the computer-readable instruction is calculated When the processor of machine executes, computer perform claim is made to require method described in any of 1-4.
CN201910672008.5A 2018-12-07 2018-12-07 Signature verification method for uplink data block, service node and medium Active CN110457942B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910672008.5A CN110457942B (en) 2018-12-07 2018-12-07 Signature verification method for uplink data block, service node and medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910672008.5A CN110457942B (en) 2018-12-07 2018-12-07 Signature verification method for uplink data block, service node and medium
CN201811495782.5A CN109635585B (en) 2018-12-07 2018-12-07 Method, proxy node and medium for querying transaction information in blockchain network

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201811495782.5A Division CN109635585B (en) 2018-12-07 2018-12-07 Method, proxy node and medium for querying transaction information in blockchain network

Publications (2)

Publication Number Publication Date
CN110457942A true CN110457942A (en) 2019-11-15
CN110457942B CN110457942B (en) 2022-11-04

Family

ID=66072039

Family Applications (3)

Application Number Title Priority Date Filing Date
CN201910672008.5A Active CN110457942B (en) 2018-12-07 2018-12-07 Signature verification method for uplink data block, service node and medium
CN201811495782.5A Active CN109635585B (en) 2018-12-07 2018-12-07 Method, proxy node and medium for querying transaction information in blockchain network
CN201911168761.7A Active CN110929288B (en) 2018-12-07 2018-12-07 Method for generating public key certificate, certificate authority and medium

Family Applications After (2)

Application Number Title Priority Date Filing Date
CN201811495782.5A Active CN109635585B (en) 2018-12-07 2018-12-07 Method, proxy node and medium for querying transaction information in blockchain network
CN201911168761.7A Active CN110929288B (en) 2018-12-07 2018-12-07 Method for generating public key certificate, certificate authority and medium

Country Status (1)

Country Link
CN (3) CN110457942B (en)

Cited By (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131171A (en) * 2019-12-03 2020-05-08 深圳前海微众银行股份有限公司 Node authentication method and device based on block chain network
CN111476617A (en) * 2020-04-03 2020-07-31 腾讯科技(深圳)有限公司 Data processing method, data processing device, computer equipment and medium
CN111526015A (en) * 2020-04-26 2020-08-11 昆明大棒客科技有限公司 Data acquisition uplink method, device, equipment and storage medium
CN111835783A (en) * 2020-07-22 2020-10-27 东莞市盟大塑化科技有限公司 Data retrieval method and device and computer equipment
CN112100178A (en) * 2020-09-08 2020-12-18 中国联合网络通信集团有限公司 Delegation authorization verification method and system
CN112131304A (en) * 2020-02-10 2020-12-25 北京天德科技有限公司 Novel calculation and storage architecture based on block chain technology
CN112163213A (en) * 2020-09-28 2021-01-01 日立楼宇技术(广州)有限公司 Elevator authentication method and device, computer equipment and storage medium
CN112217636A (en) * 2020-09-17 2021-01-12 建信金融科技有限责任公司 Data processing method and device based on block chain, computer equipment and medium
CN112381540A (en) * 2020-11-13 2021-02-19 从法信息科技有限公司 Method and device for verifying signed document based on zero-knowledge proof and electronic equipment
CN113542396A (en) * 2021-07-13 2021-10-22 润联软件系统(深圳)有限公司 Block chain storage and communication method, system and related components thereof
CN114491671A (en) * 2022-01-27 2022-05-13 宋舒涵 Market supervision commodity label tracing method and system based on block chain
WO2023168993A1 (en) * 2022-03-07 2023-09-14 腾讯科技(深圳)有限公司 Blockchain-based data processing method, apparatus, and device, medium, and product

Families Citing this family (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110223128A (en) * 2019-05-20 2019-09-10 深圳壹账通智能科技有限公司 A kind of method and relevant apparatus of data processing
US11252166B2 (en) 2019-07-31 2022-02-15 Advanced New Technologies Co., Ltd. Providing data authorization based on blockchain
US11057189B2 (en) 2019-07-31 2021-07-06 Advanced New Technologies Co., Ltd. Providing data authorization based on blockchain
CN110473094B (en) * 2019-07-31 2021-05-18 创新先进技术有限公司 Data authorization method and device based on block chain
US11251963B2 (en) 2019-07-31 2022-02-15 Advanced New Technologies Co., Ltd. Blockchain-based data authorization method and apparatus
CN110602096B (en) 2019-09-12 2021-07-13 腾讯科技(深圳)有限公司 Data processing method, device, storage medium and equipment in block chain network
CN111010382B (en) * 2019-09-12 2021-06-01 腾讯科技(深圳)有限公司 Method and apparatus for processing data requests in a blockchain network
CN110995673B (en) * 2019-11-20 2022-05-31 腾讯科技(深圳)有限公司 Case evidence management method and device based on block chain, terminal and storage medium
CN112926972B (en) * 2019-12-05 2024-04-09 中移物联网有限公司 Information processing method based on block chain, block chain system and terminal
CN111177171A (en) * 2019-12-31 2020-05-19 上海分布信息科技有限公司 Service data authentication and management method and system based on block chain
US11310051B2 (en) 2020-01-15 2022-04-19 Advanced New Technologies Co., Ltd. Blockchain-based data authorization method and apparatus
CN111489159B (en) * 2020-04-09 2024-03-15 腾讯科技(深圳)有限公司 Data processing method, device, computer equipment and medium
CN111709053B (en) * 2020-06-11 2024-04-05 中国工商银行股份有限公司 Operation method and operation device based on loose coupling transaction network
CN112100234B (en) * 2020-08-12 2021-09-10 北京大学 Content addressing method and system of graph type account book based on random consensus
CN111934996B (en) 2020-09-25 2021-01-12 支付宝(杭州)信息技术有限公司 Message transmission method and device
CN112434341B (en) * 2020-11-02 2023-07-11 迅鳐成都科技有限公司 Business tampering-resistant blockchain light node data acquisition method and device
CN112395647B (en) * 2020-11-02 2023-06-13 迅鳐成都科技有限公司 Block chain light node data acquisition system
CN112214519B (en) * 2020-11-10 2022-03-04 支付宝(杭州)信息技术有限公司 Data query method, device, equipment and readable medium
CN112231741B (en) * 2020-12-14 2021-03-19 腾讯科技(深圳)有限公司 Data processing method, device, medium and electronic equipment based on block chain system
CN112685505B (en) * 2021-01-07 2022-06-24 腾讯科技(深圳)有限公司 Transaction data processing method and device, computer equipment and storage medium
CN112396423B (en) * 2021-01-20 2021-04-13 腾讯科技(深圳)有限公司 Transaction data processing method, device, equipment and storage medium
CN112600671B (en) * 2021-03-02 2021-06-01 腾讯科技(深圳)有限公司 Data processing method, device, equipment and storage medium
CN113379542B (en) * 2021-05-28 2024-01-09 中邮信息科技(北京)有限公司 Block chain transaction query method, device, medium and electronic equipment
CN113282662B (en) * 2021-06-03 2023-11-03 广东辰宜信息科技有限公司 Block information processing method, device, equipment and medium
CN113255014B (en) * 2021-07-07 2021-09-28 腾讯科技(深圳)有限公司 Data processing method based on block chain and related equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395557A (en) * 2017-03-28 2017-11-24 阿里巴巴集团控股有限公司 A kind of processing method and processing device of service request
CN107426170A (en) * 2017-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
CN108322309A (en) * 2017-12-27 2018-07-24 北京欧链科技有限公司 Transaction processing method based on block chain and device
CN108616539A (en) * 2018-05-03 2018-10-02 东莞市翔实信息科技有限公司 A kind of method and system that block chain transaction record accesses
CN108717443A (en) * 2018-05-17 2018-10-30 北京京东金融科技控股有限公司 Data sharing method, block catenary system and computer readable storage medium

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101637854B1 (en) * 2015-10-16 2016-07-08 주식회사 코인플러그 Certificate issuance system and method based on block chain, certificate authentication system and method based on block chain
CN105591753A (en) * 2016-01-13 2016-05-18 杭州复杂美科技有限公司 Application method of CA certificate on block chain
KR101780636B1 (en) * 2016-05-16 2017-09-21 주식회사 코인플러그 Method for issuing certificate information and blockchain-based server using the same
CN108124502B (en) * 2017-03-31 2021-01-05 北京大学深圳研究生院 Top-level domain name management method and system based on alliance chain
US10102265B1 (en) * 2017-04-12 2018-10-16 Vijay K. Madisetti Method and system for tuning blockchain scalability for fast and low-cost payment and transaction processing
CN107426157B (en) * 2017-04-21 2020-04-17 杭州趣链科技有限公司 Alliance chain authority control method based on digital certificate and CA authentication system
CN107547514A (en) * 2017-07-17 2018-01-05 招商银行股份有限公司 Identity identifying method, system and computer-readable recording medium
CN112865982A (en) * 2017-07-26 2021-05-28 创新先进技术有限公司 Digital certificate management method and device and electronic equipment
CN107480555B (en) * 2017-08-01 2020-03-13 中国联合网络通信集团有限公司 Database access authority control method and device based on block chain
CN107769925B (en) * 2017-09-15 2020-06-19 山东大学 Public key infrastructure system based on block chain and certificate management method thereof
CN107623572A (en) * 2017-09-27 2018-01-23 济南浪潮高新科技投资发展有限公司 A kind of method of digital certificate granting on block chain
CN108111314B (en) * 2018-01-19 2021-04-02 苏州朗润创新知识产权运营有限公司 Method and equipment for generating and verifying digital certificate
CN108389615A (en) * 2018-02-08 2018-08-10 罗梅琴 A kind of pregnant baby retrospect deposit system and method based on block chain technology
CN108599954B (en) * 2018-03-16 2020-04-07 西安电子科技大学 Identity verification method based on distributed account book
CN108768657A (en) * 2018-04-17 2018-11-06 深圳技术大学(筹) A kind of digital certificate based on block platform chain issues system and method
CN108810895B (en) * 2018-07-12 2021-05-11 西安电子科技大学 Wireless Mesh network identity authentication method based on block chain

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107395557A (en) * 2017-03-28 2017-11-24 阿里巴巴集团控股有限公司 A kind of processing method and processing device of service request
CN107426170A (en) * 2017-05-24 2017-12-01 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain
CN107911216A (en) * 2017-10-26 2018-04-13 矩阵元技术(深圳)有限公司 A kind of block chain transaction method for secret protection and system
CN108322309A (en) * 2017-12-27 2018-07-24 北京欧链科技有限公司 Transaction processing method based on block chain and device
CN108616539A (en) * 2018-05-03 2018-10-02 东莞市翔实信息科技有限公司 A kind of method and system that block chain transaction record accesses
CN108717443A (en) * 2018-05-17 2018-10-30 北京京东金融科技控股有限公司 Data sharing method, block catenary system and computer readable storage medium

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111131171A (en) * 2019-12-03 2020-05-08 深圳前海微众银行股份有限公司 Node authentication method and device based on block chain network
CN112131304A (en) * 2020-02-10 2020-12-25 北京天德科技有限公司 Novel calculation and storage architecture based on block chain technology
CN111476617B (en) * 2020-04-03 2021-06-25 腾讯科技(深圳)有限公司 Data processing method, data processing device, computer equipment and medium
CN111476617A (en) * 2020-04-03 2020-07-31 腾讯科技(深圳)有限公司 Data processing method, data processing device, computer equipment and medium
CN111526015A (en) * 2020-04-26 2020-08-11 昆明大棒客科技有限公司 Data acquisition uplink method, device, equipment and storage medium
CN111835783A (en) * 2020-07-22 2020-10-27 东莞市盟大塑化科技有限公司 Data retrieval method and device and computer equipment
CN111835783B (en) * 2020-07-22 2022-09-02 东莞盟大集团有限公司 Data retrieval method and device and computer equipment
CN112100178A (en) * 2020-09-08 2020-12-18 中国联合网络通信集团有限公司 Delegation authorization verification method and system
CN112100178B (en) * 2020-09-08 2023-05-12 中国联合网络通信集团有限公司 Delegation authorization verification method and system
CN112217636A (en) * 2020-09-17 2021-01-12 建信金融科技有限责任公司 Data processing method and device based on block chain, computer equipment and medium
CN112217636B (en) * 2020-09-17 2023-02-17 中国建设银行股份有限公司 Data processing method and device based on block chain, computer equipment and medium
CN112163213A (en) * 2020-09-28 2021-01-01 日立楼宇技术(广州)有限公司 Elevator authentication method and device, computer equipment and storage medium
CN112163213B (en) * 2020-09-28 2023-08-04 日立楼宇技术(广州)有限公司 Authentication method and device for elevator, computer equipment and storage medium
CN112381540A (en) * 2020-11-13 2021-02-19 从法信息科技有限公司 Method and device for verifying signed document based on zero-knowledge proof and electronic equipment
CN113542396A (en) * 2021-07-13 2021-10-22 润联软件系统(深圳)有限公司 Block chain storage and communication method, system and related components thereof
CN113542396B (en) * 2021-07-13 2024-03-08 华润数字科技有限公司 Block chain storage and communication method, system and related components thereof
CN114491671A (en) * 2022-01-27 2022-05-13 宋舒涵 Market supervision commodity label tracing method and system based on block chain
CN114491671B (en) * 2022-01-27 2022-10-14 宋舒涵 Market supervision commodity label tracing method and system based on block chain
WO2023168993A1 (en) * 2022-03-07 2023-09-14 腾讯科技(深圳)有限公司 Blockchain-based data processing method, apparatus, and device, medium, and product

Also Published As

Publication number Publication date
CN110929288B (en) 2021-06-01
CN109635585B (en) 2021-06-08
CN110929288A (en) 2020-03-27
CN109635585A (en) 2019-04-16
CN110457942B (en) 2022-11-04

Similar Documents

Publication Publication Date Title
CN110457942A (en) To the signature verification method, service node and medium of uplink data block
CN109447811A (en) Method, accounting nodes and the medium of Transaction Information are inquired in block chain network
US11700257B2 (en) System and method for storing and distributing consumer information
CN110471952A (en) Method, agent node and the medium of accounting nodes are determined in block chain network
CN109522735B (en) Data permission verification method and device based on intelligent contract
CN109447648A (en) The method of recorded data zone block, accounting nodes and medium in block chain network
CN109684375A (en) Method, accounting nodes and the medium of Transaction Information are inquired in block chain network
US20190354606A1 (en) Private Cryptocoinage in Blockchain Environments
CN113297625B (en) Data sharing system and method based on block chain and electronic equipment
CN105871786A (en) User information authentication method, device and system
KR102280061B1 (en) Corporation related certificate issue system and method using did based on blockchain
CN112560072B (en) Key management method, device, medium and equipment based on block chain
CN110535807A (en) A kind of service authentication method, device and medium
CN110247758A (en) The method, apparatus and code management device of Password Management
CN110766548A (en) Block chain based information processing method and device, storage medium and electronic equipment
CN115277122A (en) Cross-border data flow and supervision system based on block chain
CA3050487A1 (en) System and method for storing and distributing consumer information
CN114880715A (en) Power data security sharing method and system based on homomorphic encryption intelligent contract
CN116451280A (en) Asset management method and device based on blockchain
Zhang et al. FutureText: A blockchain-based contract signing prototype with security and convenience
CN115801317A (en) Service providing method, system, device, storage medium and electronic equipment
CN113706261A (en) Block chain-based power transaction method, device and system
CN110492997A (en) A kind of encryption system based on super account book, method, apparatus and storage medium
Lin et al. A Blockchain-based Flexible Traceability System for IoT Cards
CN114116855A (en) Data circulation system, method and device based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40016803

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant