CN110602125A - Data processing method, device, terminal and storage medium - Google Patents

Data processing method, device, terminal and storage medium Download PDF

Info

Publication number
CN110602125A
CN110602125A CN201910899425.3A CN201910899425A CN110602125A CN 110602125 A CN110602125 A CN 110602125A CN 201910899425 A CN201910899425 A CN 201910899425A CN 110602125 A CN110602125 A CN 110602125A
Authority
CN
China
Prior art keywords
node
virtual machine
transaction data
client
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910899425.3A
Other languages
Chinese (zh)
Other versions
CN110602125B (en
Inventor
李茂材
周开班
王宗友
刘攀
张劲松
朱耿良
孔利
时一防
刘区城
陈秋平
杨常青
蓝虎
黄焕坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201910899425.3A priority Critical patent/CN110602125B/en
Publication of CN110602125A publication Critical patent/CN110602125A/en
Application granted granted Critical
Publication of CN110602125B publication Critical patent/CN110602125B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45595Network integration; Enabling network access in virtual machine instances

Landscapes

  • Engineering & Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computing Systems (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Power Engineering (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the invention discloses a data processing method, a device, a terminal and a storage medium, wherein the data processing method comprises the following steps: receiving a trade uplink request sent by a client, and sending a first verification request to a first virtual machine in a first node, wherein the first verification request is used for indicating that first verification is carried out on an identity and trade data of the client; and when the first check meets a first preset condition, sending a second check request to a second virtual machine in the first node, and when the second check meets a second preset condition, storing the transaction data into each node including the first node so as to respond to the transaction uplink request. The scheme can realize that a plurality of virtual machines can be simultaneously operated in one node, different virtual machines correspond to different calling functions, and different virtual machines can operate intelligent contracts of different languages.

Description

Data processing method, device, terminal and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a data processing method, an apparatus, a terminal, and a storage medium.
Background
At present, various online business requirements can be met by deploying intelligent contracts in a block chain network built based on an Ethernet shop protocol.
In practice, for some service requirements, when each node in the block chain network calls an intelligent contract corresponding to the service requirement through an ethernet virtual machine to execute a transaction, the node can only be limited to the virtual machines supporting one intelligent contract to operate simultaneously, and does not support multiple virtual machines to operate simultaneously.
Disclosure of Invention
The embodiment of the application provides a data processing method, a data processing device, a terminal and a storage medium, which can support a plurality of virtual machines to run simultaneously.
A first aspect of an embodiment of the present application provides a data processing method, which is applied to different block link points in a block link network, where at least a first virtual machine and a second virtual machine for running an intelligent contract are respectively deployed on the different block link points; the data processing method comprises the following steps:
receiving an uplink transaction request sent by a client, wherein the uplink transaction request carries an identity of the client and transaction data, and the uplink transaction request is used for indicating to store the transaction data;
sending a first check request to a first virtual machine in a first node, wherein the first check request is used for indicating that the identity identification and the transaction data of the client side are subjected to first check;
when the first check meets a first preset condition, sending a second check request to a second virtual machine in the first node, wherein the second check request is used for indicating that second check is carried out on the identity identification and the transaction data of the client;
and when the second check meets a second preset condition, storing the transaction data into each node including the first node so as to respond to the transaction uplink request.
A second aspect of the embodiments of the present application provides a data processing apparatus, including different block chain nodes in a block chain network, where the different block chain nodes are respectively at least deployed with a first virtual machine and a second virtual machine for running an intelligent contract; the data processing apparatus includes:
the system comprises a receiving request module, a receiving request module and a sending module, wherein the receiving request module is used for receiving an uplink transaction request sent by a client, the uplink transaction request carries an identity of the client and transaction data, and the uplink transaction request is used for indicating to store the transaction data;
the first checking module is used for sending a first checking request to a first virtual machine in a first node, wherein the first checking request is used for indicating that the first checking is carried out on the identity of the client and the transaction data;
the second check module is used for sending a second check request to a second virtual machine in the first node after the first check meets a first preset condition, wherein the second check request is used for indicating that second check is carried out on the identity identification and the transaction data of the client;
and the data storage module is used for storing the transaction data into each node including the first node after the second check meets a second preset condition so as to respond to the uplink transaction request.
Optionally, the data storage module is further configured to:
after the second check meets a second preset condition, storing the transaction data into each node including the first node so as to check the identity and the transaction data of the client through a consensus mechanism before responding to the uplink transaction request; and if the identity of the client passes the verification of the transaction data, triggering the transaction data to be stored in each node including the first node.
A third aspect of the embodiments of the present application provides a terminal, including a processor, an input device, an output device, and a memory, where the processor, the input device, the output device, and the memory are connected to each other, where the memory is used to store a computer program, and the computer program includes program instructions, and the processor is configured to call the program instructions to execute the method.
A fourth aspect of embodiments of the present application provides a computer-readable storage medium having a computer program stored thereon, the computer program being executable by a processor to implement the method.
The embodiment of the application has at least the following beneficial effects:
according to the embodiment of the application, a transaction uplink request sent by a client is received, a first check request is sent to a first virtual machine in a first node, when the first check meets a first preset condition, a second check request is sent to a second virtual machine in the first node, and when the second check meets a second preset condition, the transaction data are stored in each node including the first node so as to respond to the transaction uplink request. By adopting the scheme, various virtual machines can be operated simultaneously. The scheme can realize that a plurality of virtual machines can be simultaneously operated in one node, different virtual machines correspond to different calling functions, and different virtual machines can operate intelligent contracts of different languages.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Wherein:
fig. 1A is a schematic diagram of a data sharing system according to an embodiment of the present invention;
fig. 1B is a schematic diagram of a block chain system according to an embodiment of the present invention;
FIG. 2 is a flow chart of a data processing method according to an embodiment of the present invention;
FIG. 3 is a flow chart of a data processing method according to an embodiment of the present invention;
FIG. 4 is a flow chart illustrating a data processing method according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
Reference in the specification to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the specification. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein can be combined with other embodiments.
Related art of embodiments of the present invention mention: the blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The block chain underlying platform can comprise processing modules such as user management, basic service, intelligent contract and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
The platform product service layer provides basic capability and an implementation framework of typical application, and developers can complete block chain implementation of business logic based on the basic capability and the characteristics of the superposed business. The application service layer provides the application service based on the block chain scheme for the business participants to use.
Where smart contracts are generally considered an automatically secured account from the user's perspective, for example, a program will release and transfer funds when certain conditions are met. From a technical point of view, intelligent contracts are considered as network servers, except that these servers are not bridged over the internet using IP addresses, but on blockchains, on which specific contract programs can be run. But unlike a network server, all can see intelligent contracts because the code and state of these intelligent contracts are on blockchains (assuming blockchains are public). Moreover, unlike a network server, a smart contract does not rely on a particular hardware device, and in fact, the code of the smart contract is executed by all participating devices.
An intelligent contract is an assembly language programmed on a blockchain. Typically one will not write the bytecode itself, but will compile it from a higher level language, e.g. a proprietary language like Javascript in Solidity. These bytecodes do provide guidance to the functionality of the blockchain so that the code can easily interact with it, such as transferring cryptographic currency and recording events. Execution of the code is automatic, either successfully executed, or all state changes are undone (including information that has been sent or received from the currently failed contract). This is important because it avoids situations where the contract is partially executed (e.g., in a security purchase transaction, the security owner has transferred the security for delivery, but the payment transfer of the crypto currency has failed). This is particularly important in a blockchain environment, as there is no way to undo the adverse consequences of an execution error.
A Virtual Machine (Virtual Machine) refers to a complete computer system which has complete hardware system functions and is simulated by software and runs in a completely isolated environment. The blockchain system needs a consensus mechanism to ensure that the computation results output by each person are consistent. The BTC is sent to B in bitcoin example a, and the automatic transaction is converted into a code in order to implement the smart contract. The main task undertaken by the blockchain virtual machine is to run intelligent contracts. Essentially, a blockchain virtual machine is a running environment for code, thereby ensuring consistency of distributed nodes in a blockchain network.
Referring to the data sharing system shown in fig. 1A, the data sharing system 100 refers to a system for performing data sharing between nodes, the data sharing system may include a plurality of nodes 101, and the plurality of nodes 101 may refer to respective clients in the data sharing system. Each node 101 may receive input information while operating normally and maintain shared data within the data sharing system based on the received input information. In order to ensure information intercommunication in the data sharing system, information connection can exist between each node in the data sharing system, and information transmission can be carried out between the nodes through the information connection. For example, when an arbitrary node in the data sharing system receives input information, other nodes in the data sharing system acquire the input information according to a consensus algorithm, and store the input information as data in shared data, so that the data stored on all the nodes in the data sharing system are consistent.
Each node in the data sharing system has a node identifier corresponding thereto, and each node in the data sharing system may store a node identifier of another node in the data sharing system, so that the generated block is broadcast to the other node in the data sharing system according to the node identifier of the other node in the following. Each node may maintain a node identifier list as shown in the following table, and store the node name and the node identifier in the node identifier list correspondingly. The node identifier may be an IP (Internet Protocol) address and any other information that can be used to identify the node, and table 1 only illustrates the IP address as an example.
TABLE 1
Node name Node identification
Node 1 117.114.151.174
Node 2 117.116.189.145
Node N 119.123.789.258
Each node in the data sharing system stores one identical blockchain. The block chain is composed of a plurality of blocks, referring to fig. 1B, the block chain is composed of a plurality of blocks, the starting block includes a block header and a block main body, the block header stores an input information characteristic value, a version number, a timestamp and a difficulty value, and the block main body stores input information; the next block of the starting block takes the starting block as a parent block, the next block also comprises a block head and a block main body, the block head stores the input information characteristic value of the current block, the block head characteristic value of the parent block, the version number, the timestamp and the difficulty value, and the like, so that the block data stored in each block in the block chain is associated with the block data stored in the parent block, and the safety of the input information in the block is ensured.
When each block in the block chain is generated, when a node where the block chain is located receives input information, the input information is verified, after the verification is completed, the input information is stored in a memory pool, and a hash tree used for recording the input information is updated; and then, updating the updating time stamp to the time when the input information is received, trying different random numbers, and calculating the characteristic value for multiple times, so that the calculated characteristic value can meet the following formula:
SHA 256(SHA 256(version+prev_hash+merkle_root+ntime+nbits+x))<TARGET
wherein, SHA256 is a characteristic value algorithm used for calculating a characteristic value; version is version information of the relevant block protocol in the block chain; prev _ hash is a block head characteristic value of a parent block of the current block; merkle _ root is a characteristic value of the input information; ntime is the update time of the update timestamp; nbits is the current difficulty, is a fixed value within a period of time, and is determined again after exceeding a fixed time period; x is a random number; TARGET is a feature threshold, which can be determined from nbits.
Therefore, when the random number meeting the formula is obtained through calculation, the information can be correspondingly stored, and the block head and the block main body are generated to obtain the current block. And then, the node where the block chain is located respectively sends the newly generated blocks to other nodes in the data sharing system where the newly generated blocks are located according to the node identifications of the other nodes in the data sharing system, the newly generated blocks are verified by the other nodes, and the newly generated blocks are added to the block chain stored in the newly generated blocks after the verification is completed.
Referring to fig. 2, fig. 2 is a schematic flowchart illustrating a data processing method according to an embodiment of the present disclosure. The method is applied to different block chain nodes in a block chain network, and at least a first virtual machine and a second virtual machine for running an intelligent contract are respectively deployed on the different block chain nodes; as shown in fig. 2, it may include steps 201 and 204 as follows:
201. receiving an uplink transaction request sent by a client, wherein the uplink transaction request carries an identity of the client and transaction data, and the uplink transaction request is used for indicating to store the transaction data;
if there is a change in data information when a transaction occurs at the ue, it is necessary to send a transaction uplink request to the blockchain management device, so as to store the data information updated in real time. The block chain management device receives a trade uplink request sent by a client. The request carries at least the identity of the client and transaction data, and may also include transaction state change data, which is not specifically limited herein.
202. Sending a first check request to a first virtual machine in a first node, wherein the first check request is used for indicating that the identity identification and the transaction data of the client side are subjected to first check;
after receiving the trade uplink request, the block chain management device can perform arbitrary or ordered distribution of the nodes. Specifically, the blockchain management device sends a check request to a first node, where the first node includes at least a first virtual machine and a second virtual machine, and the first check request is sent to a first virtual machine in the first node, where the first check request is used to indicate that a first check is performed on an identity of the client and transaction data.
Optionally, the first check may be a preliminary check, or a first-aspect check, where the preliminary check or the first-aspect check may be a preliminary information confirmation of the identity of the client and the transaction data, for example, whether the identity exists may be confirmed, whether the transaction data conforms to a transaction habit, meets a minimum transaction, and the like. Further, the first check is that the first virtual machine of the first node invokes a first block verification contract to check the identity of the client and the transaction data.
Specifically, the sending a first check request to a first virtual machine in a first node includes:
sending the identity of the client to a first virtual machine in the first node, and instructing the first virtual machine to call the first block verification contract to verify the identity of the client;
if the identity identification verification of the client fails, sending a message of the failure of the trade uplink request to the client;
if the preset identification database contains the identification of the client, the verification is passed.
And if the identity identification of the client passes the verification, the transaction data is sent to a first virtual machine in the first node, and the first virtual machine is instructed to call the first block verification contract to verify the transaction data.
The sequence of verifying the identity identifier of the client and the transaction data is not limited, and the transaction data may be verified first, and then the identity identifier of the client is verified; or both may be synchronized.
Wherein sending the transaction data to a first virtual machine in the first node and instructing the first virtual machine to invoke the first block validation contract to validate the transaction data comprises:
sending the transaction data to a first virtual machine in the first node, and instructing the first virtual machine to call the first block verification contract to perform sensitive vocabulary data verification on the transaction data;
if the transaction data contain sensitive vocabulary data, indicating the first virtual machine to acquire the quantity of the sensitive vocabulary data;
and if the number of the sensitive vocabulary data exceeds a preset threshold value, confirming that the transaction data is not verified, otherwise, confirming that the transaction data is verified.
The sensitive vocabulary data verification is carried out on the transaction data, such as information which does not conform to the transaction regulations. Alternatively, it may be a verification of the authenticity of the transaction data, etc.
203. When the first check meets a first preset condition, sending a second check request to a second virtual machine in the first node, wherein the second check request is used for indicating that second check is carried out on the identity identification and the transaction data of the client;
the first preset condition may be that the identity of the client passes verification and the transaction data passes verification; or respectively carrying out verification scoring on the identity identification of the client during verification, carrying out verification scoring on the transaction data, and further obtaining a first verification score according to the preset weight. And when the first verification score exceeds the preset score, confirming that the first verification meets a first preset condition.
And when the first check meets a first preset condition, sending a second check request to a second virtual machine in the first node for checking again.
Specifically, the intelligent contract further includes a second block verification contract, the second check request carries the second block verification contract, and the sending of the second check request to the second virtual machine in the first node includes:
sending the identity of the client to a second virtual machine in the first node, and instructing the second virtual machine to call the second block verification contract to verify the identity of the client;
if the identity identification of the client passes the verification, the transaction data is sent to a second virtual machine in the first node, and the second virtual machine is instructed to call the second block verification contract to verify the transaction data;
the sending the transaction data to a second virtual machine in the first node and instructing the second virtual machine to invoke the second block validation contract to validate the transaction data includes:
sending the transaction data to a second virtual machine in the first node, and instructing the second virtual machine to call the second block verification contract to carry out sensitive vocabulary data verification on the transaction data;
if the transaction data contains sensitive vocabulary data, indicating the second virtual machine to acquire the quantity of the sensitive vocabulary data;
and if the number of the sensitive vocabulary data does not exceed a preset threshold value, confirming that the transaction data passes verification.
The first block verification contract and the second block verification contract are different contracts, which may be contracts of different languages, such as a C-voice intelligent contract for the first block verification contract, an intelligent contract for JS for the second block verification contract, and the like. Further, the contracts are contracts with different control logics. Such as a first block verification contract to a sensitive information verification contract, a second block verification contract to an information authenticity verification contract, etc. Alternatively, the first block verification result may be a preliminary information verification, the second block verification result may be a further information verification, and the like, which are not limited in the above.
204. And when the second check meets a second preset condition, storing the transaction data into each node including the first node so as to respond to the transaction uplink request.
The second preset condition may be that the score of the identity of the client obtained by performing verification based on the second block verification contract and the score of the transaction data obtained by performing verification exceed a preset score.
And when the verification is passed, storing the transaction data into each node including the first node so as to respond to the uplink transaction request.
According to the embodiment of the application, a transaction uplink request sent by a client is received, a first check request is sent to a first virtual machine in a first node, when the first check meets a first preset condition, a second check request is sent to a second virtual machine in the first node, and when the second check meets a second preset condition, the transaction data are stored in each node including the first node so as to respond to the transaction uplink request. By adopting the scheme, various virtual machines can be operated simultaneously, and mutual calling of contracts in one transaction can be supported. The scheme can realize that a plurality of virtual machines can be simultaneously operated in one node, different virtual machines correspond to different calling functions, and different virtual machines can operate intelligent contracts of different languages.
Referring to fig. 3, fig. 3 is a schematic flowchart of a data processing method according to an embodiment of the present application. The method is applied to different block chain nodes in a block chain network, and at least a first virtual machine and a second virtual machine for running an intelligent contract are respectively deployed on the different block chain nodes; as shown in fig. 3, it may include steps 301-308 as follows:
301. receiving an uplink transaction request sent by a client, wherein the uplink transaction request carries an identity of the client and transaction data, and the uplink transaction request is used for indicating to store the transaction data;
in this embodiment, the two pieces of information, i.e., the identity and the transaction data, of the client are not limited, but may also be other pieces of information, such as transaction time, specification and model information of the client, and the like.
302. Sending the identity of the client to a first virtual machine in the first node, and instructing the first virtual machine to call the first block verification contract to perform first verification on the identity of the client;
the first node is selected from a plurality of nodes, wherein the method specifically comprises the following steps:
acquiring node storage information within preset time;
the preset time may be the last three months or the last one month. The storage information comprises information stored by taking each node as a main node, wherein the main node is a node which firstly checks and/or verifies the information to be stored and then broadcasts the information.
Acquiring N nodes which are not used as main nodes for information storage within the preset time from the node storage information;
and acquiring a first node from the N nodes, wherein the first node is the node with the largest storage space in the N nodes.
And after the first node is confirmed, sending the identity of the client to a first virtual machine in the first node, and instructing the first virtual machine to call the first block verification contract to perform first verification on the identity of the client.
The method does not limit the verification of the identity identifier of the client side firstly and then the verification of the transaction data; the transaction data can be checked at the same time, or the transaction data can be checked first, and then the identity of the client can be checked.
303. If the identity identification verification of the client fails, sending a message of the failure of the trade uplink request to the client;
when the identity identification of the client is checked firstly, if the identity identification of the client is not verified, a message that the uplink transaction request fails is sent to the client, and the checking is stopped continuously.
The identity authentication of the client fails, which may be that the identity database does not store the identity of the client, or that the comparison similarity is smaller than a preset threshold, and the like.
304. If the identity identification of the client passes verification, the transaction data is sent to a first virtual machine in the first node, and the first virtual machine is instructed to call the first block verification contract to verify the transaction data;
305. after the transaction data passes the verification, the identity of the client is sent to a second virtual machine in the first node, and the second virtual machine is instructed to call the second block verification contract to verify the identity of the client;
and when the first virtual machine completes the verification of the information, the information is sent to the second virtual machine for verification.
306. If the identity identification of the client passes verification, the transaction data is sent to a second virtual machine in the first node, and the second virtual machine is instructed to call a second block verification contract to verify the transaction data;
optionally, the transaction data is sent to a second virtual machine in the first node, and the second virtual machine is instructed to call the second block verification contract to perform sensitive vocabulary data verification on the transaction data;
if the transaction data contain sensitive vocabulary data, indicating the second virtual machine to acquire the quantity of the sensitive vocabulary data; and if the number of the sensitive vocabulary data does not exceed a preset threshold value, confirming that the transaction data passes verification.
Step 302 and step 306 may not be limited to the above form, and may be that the first virtual machine only checks the identity, the second virtual machine only checks the transaction data, and so on.
When each virtual machine confirms different information, confirmation of different virtual machines for different information can be determined by the following method.
Firstly, confirming the identity grade of the client according to the identity label of the client;
confirming the transaction grade of the transaction data according to the transaction data;
and confirming whether the identity grade of the client is higher than the transaction grade of the transaction data, if so, confirming that the first virtual machine calls the first block verification contract to verify the transaction data, and calling the second block verification contract by the second virtual machine to verify the identity identification of the client.
And if the identity level of the client is lower than the transaction level of the transaction data, confirming that the first virtual machine calls the first block verification contract to verify the identity of the client, and calling the second block verification contract by the second virtual machine to verify the transaction data.
307. When the verification meets a second preset condition, verifying the identity identification and the transaction data of the client again through a consensus mechanism;
the second preset condition includes: when the second virtual machine calls the second block verification contract to verify the transaction data, the transaction data passes verification, and the quantity of the sensitive vocabulary data acquired by the first virtual machine is less than that acquired by the second virtual machine.
Or the check score obtained by the first virtual machine is lower than the check score obtained by the second virtual machine, or a value obtained by multiplying the check score obtained by the first virtual machine by the first weight and a value obtained by multiplying the check score obtained by the second virtual machine by the second weight exceed a preset value, and the like. The verification score obtained by the first virtual machine may be the sum of the score of the identity of the client obtained through verification and the score of the transaction data for verification.
308. And if the identity of the client and the transaction data pass verification, storing the transaction data into each node including the first node so as to respond to the uplink transaction request.
According to the embodiment of the application, a transaction uplink request sent by a client is received, a first check request is sent to a first virtual machine in a first node, when the first check meets a first preset condition, a second check request is sent to a second virtual machine in the first node, and when the second check meets a second preset condition, the transaction data are stored in each node including the first node so as to respond to the transaction uplink request. By adopting the scheme, various virtual machines can be operated simultaneously, and mutual calling of contracts in one transaction can be supported. The scheme can realize that a plurality of virtual machines can be simultaneously operated in one node, different virtual machines correspond to different calling functions, and different virtual machines can operate intelligent contracts of different languages.
In the above embodiment, each virtual machine respectively verifies the identity of the client and the transaction data, alternatively, the first virtual machine may only verify the identity of the client, and then the second virtual machine may only verify the transaction data. The result of the first virtual machine checking the identity of the client, such as the check score, may be input to the second virtual machine, so that the second virtual machine may check the transaction data according to the score with different standards.
The basic service module is deployed on all block link point devices and used for verifying the validity of the service request and recording the valid request after consensus is completed on storage, as shown in fig. 4, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, and transmits the encrypted service information to a shared account book (network communication) completely and consistently, and records and stores the encrypted service information; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
Among them, the etherhouse implements a runtime environment on the blockchain, called an Etherhouse Virtual Machine (EVM). Each node participating in the network will run the EVM as part of the block verification protocol. They verify each transaction covered in the block and run the transaction triggered code in the EVM. All nodes in each network perform the same calculations and store the same values. Contract execution is repeated many times in all nodes, which fact makes the consumption of contract execution expensive, which also forces operations that can be done down the chain to be done without putting them on the blockchain. There will be a specific consumption, in units of gas, for each command executed. Each contract may utilize a command having a corresponding gas value. Each transaction is required to include a gas limit and a fee to be paid for the unit gas. If the transaction requires less than or equal to the set gas limit for the number of gas used due to calculations, including the original message and some triggered other messages, then the transaction will be processed. If the total gas consumption exceeds the gas limit, then all operations are reinstated, but the transaction is established and the transaction fee is still charged by the miners. In the embodiment of the application, in the same transaction period, the virtual machines can call each other and share the same gasLimit control, and the accurate transmission of variables can be ensured through the gasLimit, for example, when the gasLimit in the virtual machine 1 is 1000, 1000 is transmitted to the virtual machine 2, after the gasLimit is processed in the virtual machine 2 is 500, 500 is transmitted to the virtual machine 3 by the virtual machine 2 for processing; and after the calling of each virtual machine, the results generated by the intelligent contracts of each virtual machine can be merged. By combining a plurality of virtual machines, the nodes can use intelligent contracts of different languages simultaneously.
In accordance with the foregoing embodiments, please refer to fig. 5, fig. 5 is a schematic structural diagram of a terminal according to an embodiment of the present application, and as shown in the drawing, the terminal includes a processor, an input device, an output device, and a memory, where the processor, the input device, the output device, and the memory are connected to each other, where the memory is used to store a computer program, the computer program includes program instructions, the processor is configured to call the program instructions, and the program includes instructions for performing the following steps;
receiving an uplink transaction request sent by a client, wherein the uplink transaction request carries an identity of the client and transaction data, and the uplink transaction request is used for indicating to store the transaction data;
sending a first check request to a first virtual machine in a first node, wherein the first check request is used for indicating that the identity identification and the transaction data of the client side are subjected to first check;
when the first check meets a first preset condition, sending a second check request to a second virtual machine in the first node, wherein the second check request is used for indicating that second check is carried out on the identity identification and the transaction data of the client;
and when the second check meets a second preset condition, storing the transaction data into each node including the first node so as to respond to the transaction uplink request.
According to the embodiment of the application, a transaction uplink request sent by a client is received, a first check request is sent to a first virtual machine in a first node, when the first check meets a first preset condition, a second check request is sent to a second virtual machine in the first node, and when the second check meets a second preset condition, the transaction data are stored in each node including the first node so as to respond to the transaction uplink request. By adopting the scheme, various virtual machines can be operated simultaneously, and mutual calling of contracts in one transaction can be supported. The scheme can realize that a plurality of virtual machines can be simultaneously operated in one node, different virtual machines correspond to different calling functions, and different virtual machines can operate intelligent contracts of different languages.
The above description has introduced the solution of the embodiment of the present application mainly from the perspective of the method-side implementation process. It is understood that the terminal includes corresponding hardware structures and/or software modules for performing the respective functions in order to implement the above-described functions. Those of skill in the art will readily appreciate that the present application is capable of hardware or a combination of hardware and computer software implementing the various illustrative elements and algorithm steps described in connection with the embodiments provided herein. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the terminal may be divided into the functional units according to the above method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
In accordance with the above, please refer to fig. 6, fig. 6 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application. It includes: the receiving request module 601, the first check module 602, the second check module 603, and the data storage module 604 are specifically as follows:
a receiving request module 601, configured to receive an uplink transaction request sent by a client, where the uplink transaction request carries an identity of the client and transaction data, and the uplink transaction request is used to instruct to store the transaction data;
a first checking module 602, configured to send a first checking request to a first virtual machine in a first node, where the first checking request is used to instruct to perform first checking on an identity of the client and transaction data;
a second check module 603, configured to send a second check request to a second virtual machine in the first node after the first check meets a first preset condition, where the second check request is used to instruct to perform a second check on the identity identifier and the transaction data of the client;
a data storage module 604, configured to store the transaction data in each node including the first node after the second check meets a second preset condition, so as to respond to the uplink transaction request.
It can be seen that, according to the embodiment of the present application, a transaction uplink request sent by a client is received, a first check request is sent to a first virtual machine in a first node, when the first check meets a first preset condition, a second check request is sent to a second virtual machine in the first node, and when the second check meets a second preset condition, the transaction data is stored in each node including the first node to respond to the transaction uplink request. By adopting the scheme, various virtual machines can be operated simultaneously, and mutual calling of contracts in one transaction can be supported. The scheme can realize that a plurality of virtual machines can be simultaneously operated in one node, different virtual machines correspond to different calling functions, and different virtual machines can operate intelligent contracts of different languages.
Embodiments of the present application also provide a computer storage medium, wherein the computer storage medium stores a computer program for electronic data exchange, and the computer program enables a computer to execute part or all of the steps of any one of the data processing methods as described in the above method embodiments.
Embodiments of the present application also provide a computer program product, which includes a non-transitory computer-readable storage medium storing a computer program, and the computer program causes a computer to execute part or all of the steps of any one of the data processing methods as described in the above method embodiments.
It should be noted that, for simplicity of description, the above-mentioned method embodiments are described as a series of acts or combination of acts, but those skilled in the art will recognize that the present application is not limited by the order of acts described, as some steps may occur in other orders or concurrently depending on the application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the division of the units is only one type of division of logical functions, and there may be other divisions when actually implementing, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of some interfaces, devices or units, and may be an electric or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may be implemented in the form of a software program module.
The integrated units, if implemented in the form of software program modules and sold or used as stand-alone products, may be stored in a computer readable memory. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method described in the embodiments of the present application. And the aforementioned memory comprises: various media capable of storing program codes, such as a usb disk, a read-only memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and the like.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash memory disks, read-only memory, random access memory, magnetic or optical disks, and the like.
The foregoing detailed description of the embodiments of the present application has been presented to illustrate the principles and implementations of the present application, and the above description of the embodiments is only provided to help understand the method and the core concept of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A data processing method is characterized in that the method is applied to different nodes in a block chain network, and at least a first virtual machine and a second virtual machine for running an intelligent contract are respectively deployed on the different nodes; the data processing method comprises the following steps:
receiving an uplink transaction request sent by a client, wherein the uplink transaction request carries an identity of the client and transaction data, and the uplink transaction request is used for indicating to store the transaction data;
sending a first check request to a first virtual machine in a first node, wherein the first check request is used for indicating that the identity identification and the transaction data of the client side are subjected to first check;
when the first check meets a first preset condition, sending a second check request to a second virtual machine in the first node, wherein the second check request is used for indicating that second check is carried out on the identity identification and the transaction data of the client;
and when the second check meets a second preset condition, storing the transaction data into each node including the first node so as to respond to the transaction uplink request.
2. The method of claim 1, wherein the intelligent contract comprises a first block verification contract, wherein the first check request carries the first block verification contract, and wherein sending the first check request to a first virtual machine in the first node comprises:
sending the identity of the client to a first virtual machine in the first node, and instructing the first virtual machine to call the first block verification contract to verify the identity of the client;
if the identity identification verification of the client fails, sending a message of the failure of the trade uplink request to the client;
and if the identity identification of the client passes the verification, the transaction data is sent to a first virtual machine in the first node, and the first virtual machine is instructed to call the first block verification contract to verify the transaction data.
3. The method of claim 2, wherein sending the transaction data to a first virtual machine in the first node and instructing the first virtual machine to invoke the first block verification contract to verify the transaction data comprises:
sending the transaction data to a first virtual machine in the first node, and instructing the first virtual machine to call the first block verification contract to perform sensitive vocabulary data verification on the transaction data;
if the transaction data contain sensitive vocabulary data, indicating the first virtual machine to acquire the quantity of the sensitive vocabulary data;
if the number of the sensitive vocabulary data exceeds a preset threshold value, confirming that the transaction data is not verified;
and if the number of the sensitive vocabulary data does not exceed the preset threshold value, the transaction data passes the verification.
4. The method of claim 1, wherein the smart contract further comprises a second block validation contract, wherein the second check-up request carries the second block validation contract, and wherein sending the second check-up request to a second virtual machine in the first node comprises:
sending the identity of the client to a second virtual machine in the first node, and instructing the second virtual machine to call the second block verification contract to verify the identity of the client;
if the identity identification of the client passes verification, the transaction data is sent to a second virtual machine in the first node, and the second virtual machine is instructed to call a second block verification contract to carry out sensitive vocabulary data verification on the transaction data;
if the transaction data contains sensitive vocabulary data, indicating the second virtual machine to acquire the quantity of the sensitive vocabulary data;
and if the number of the sensitive vocabulary data does not exceed a preset threshold value, confirming that the transaction data passes verification.
5. The method according to claim 4, wherein the second preset condition comprises:
when the second virtual machine calls the second block verification contract to verify the transaction data, the transaction data passes verification, and the quantity of the sensitive vocabulary data acquired by the first virtual machine is less than that acquired by the second virtual machine.
6. The method according to any one of claims 1 to 5, wherein, after the second check-up meets a second preset condition, before the storing the transaction data in each node including the first node, the method comprises:
verifying the identity of the client and the transaction data through a consensus mechanism;
and if the identity of the client passes the verification of the transaction data, triggering the transaction data to be stored in each node including the first node.
7. The data processing device is characterized by comprising different nodes in a block chain network, wherein at least a first virtual machine and a second virtual machine for running an intelligent contract are respectively deployed on the different nodes; the data processing apparatus includes:
the system comprises a receiving request module, a receiving request module and a sending module, wherein the receiving request module is used for receiving an uplink transaction request sent by a client, the uplink transaction request carries an identity of the client and transaction data, and the uplink transaction request is used for indicating to store the transaction data;
the first checking module is used for sending a first checking request to a first virtual machine in a first node, wherein the first checking request is used for indicating that the first checking is carried out on the identity of the client and the transaction data;
the second check module is used for sending a second check request to a second virtual machine in the first node after the first check meets a first preset condition, wherein the second check request is used for indicating that second check is carried out on the identity identification and the transaction data of the client;
and the data storage module is used for storing the transaction data into each node including the first node after the second check meets a second preset condition so as to respond to the uplink transaction request.
8. The apparatus of claim 7, wherein the data storage module is further configured to:
after the second check meets a second preset condition, before the transaction data is stored in each node including the first node, checking the identity and the transaction data of the client through a consensus mechanism; and if the identity of the client passes the verification of the transaction data, triggering the transaction data to be stored in each node including the first node.
9. A terminal, comprising a processor, an input device, an output device and a memory, the processor, the input device, the output device and the memory being interconnected, wherein the memory is configured to store a computer program comprising program instructions, the processor being configured to invoke the program instructions to perform the method of any of claims 1 to 6.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which is executed by a processor to implement the method of any one of claims 1 to 6.
CN201910899425.3A 2019-09-23 2019-09-23 Data processing method, device, terminal and storage medium Active CN110602125B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910899425.3A CN110602125B (en) 2019-09-23 2019-09-23 Data processing method, device, terminal and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910899425.3A CN110602125B (en) 2019-09-23 2019-09-23 Data processing method, device, terminal and storage medium

Publications (2)

Publication Number Publication Date
CN110602125A true CN110602125A (en) 2019-12-20
CN110602125B CN110602125B (en) 2021-04-13

Family

ID=68862321

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910899425.3A Active CN110602125B (en) 2019-09-23 2019-09-23 Data processing method, device, terminal and storage medium

Country Status (1)

Country Link
CN (1) CN110602125B (en)

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111176791A (en) * 2019-12-31 2020-05-19 杭州趣链科技有限公司 Cross-virtual machine calling method based on multi-virtual machine blockchain platform
CN111343142A (en) * 2020-01-22 2020-06-26 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network and storage medium
CN111369237A (en) * 2020-02-28 2020-07-03 腾讯科技(深圳)有限公司 Data processing method and device and computer storage medium
CN111600790A (en) * 2020-07-20 2020-08-28 百度在线网络技术(北京)有限公司 Block chain based message processing method, device, equipment and storage medium
CN112527466A (en) * 2020-12-22 2021-03-19 上海万向区块链股份公司 Multi-language intelligent contract compatibility method and system based on EVM and Wasm virtual machine
CN112529711A (en) * 2021-02-07 2021-03-19 腾讯科技(深圳)有限公司 Transaction processing method and device based on block chain virtual machine multiplexing
CN112597762A (en) * 2020-12-04 2021-04-02 广东省科学院智能制造研究所 Block chain system with intelligent contract data supervision function and supervision method
CN115455457A (en) * 2022-11-11 2022-12-09 北京共识数信科技有限公司 Chain data management method, system and storage medium based on intelligent big data
CN117874733A (en) * 2024-03-12 2024-04-12 北京营加品牌管理有限公司 Transaction execution method and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107423945A (en) * 2017-04-13 2017-12-01 葛武 Intelligent energy trade managing system and method based on block chain technology
WO2019120328A2 (en) * 2019-04-03 2019-06-27 Alibaba Group Holding Limited Processing and storing blockchain data under a trusted execution environment
CN110048846A (en) * 2018-12-12 2019-07-23 阿里巴巴集团控股有限公司 A kind of signature verification method and system based on block chain intelligence contract
CN110111104A (en) * 2019-04-23 2019-08-09 矩阵元技术(深圳)有限公司 Block chain intelligence contract implementation method, device, computer equipment and storage medium
WO2019170175A2 (en) * 2019-06-28 2019-09-12 Alibaba Group Holding Limited System and method for executing different types of blockchain contracts

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107423945A (en) * 2017-04-13 2017-12-01 葛武 Intelligent energy trade managing system and method based on block chain technology
CN110048846A (en) * 2018-12-12 2019-07-23 阿里巴巴集团控股有限公司 A kind of signature verification method and system based on block chain intelligence contract
WO2019120328A2 (en) * 2019-04-03 2019-06-27 Alibaba Group Holding Limited Processing and storing blockchain data under a trusted execution environment
CN110111104A (en) * 2019-04-23 2019-08-09 矩阵元技术(深圳)有限公司 Block chain intelligence contract implementation method, device, computer equipment and storage medium
WO2019170175A2 (en) * 2019-06-28 2019-09-12 Alibaba Group Holding Limited System and method for executing different types of blockchain contracts

Cited By (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111176791B (en) * 2019-12-31 2023-09-29 杭州趣链科技有限公司 Cross-virtual machine calling method based on multi-virtual machine blockchain platform
CN111176791A (en) * 2019-12-31 2020-05-19 杭州趣链科技有限公司 Cross-virtual machine calling method based on multi-virtual machine blockchain platform
CN111343142A (en) * 2020-01-22 2020-06-26 腾讯科技(深圳)有限公司 Data processing method and device based on block chain network and storage medium
CN111369237A (en) * 2020-02-28 2020-07-03 腾讯科技(深圳)有限公司 Data processing method and device and computer storage medium
CN111600790A (en) * 2020-07-20 2020-08-28 百度在线网络技术(北京)有限公司 Block chain based message processing method, device, equipment and storage medium
CN111600790B (en) * 2020-07-20 2021-08-17 百度在线网络技术(北京)有限公司 Block chain based message processing method, device, equipment and storage medium
CN112597762A (en) * 2020-12-04 2021-04-02 广东省科学院智能制造研究所 Block chain system with intelligent contract data supervision function and supervision method
CN112597762B (en) * 2020-12-04 2024-03-08 广东省科学院智能制造研究所 Blockchain system with intelligent contract data supervision function and supervision method
CN112527466A (en) * 2020-12-22 2021-03-19 上海万向区块链股份公司 Multi-language intelligent contract compatibility method and system based on EVM and Wasm virtual machine
CN112529711A (en) * 2021-02-07 2021-03-19 腾讯科技(深圳)有限公司 Transaction processing method and device based on block chain virtual machine multiplexing
CN115455457A (en) * 2022-11-11 2022-12-09 北京共识数信科技有限公司 Chain data management method, system and storage medium based on intelligent big data
CN117874733A (en) * 2024-03-12 2024-04-12 北京营加品牌管理有限公司 Transaction execution method and system
CN117874733B (en) * 2024-03-12 2024-05-24 北京营加品牌管理有限公司 Transaction execution method and system

Also Published As

Publication number Publication date
CN110602125B (en) 2021-04-13

Similar Documents

Publication Publication Date Title
CN110602125B (en) Data processing method, device, terminal and storage medium
CN109819443B (en) Registration authentication method, device and system based on block chain
CN110599173B (en) Block chain consensus node determination method, device, equipment and storage medium
CN111543031B (en) Method and control system for controlling and/or monitoring a device
CN111884807B (en) Article reservation method, apparatus, device and medium based on block chain
CN110443075A (en) A kind of method and device of block chain intelligence contract verifying deployment
CN112527912B (en) Data processing method and device based on block chain network and computer equipment
CN112700246B (en) Block chain-based data processing method, device, equipment and readable storage medium
CN111492355B (en) Method and control system for controlling and/or monitoring a device
CN110601896B (en) Data processing method and equipment based on block chain nodes
CN111291060A (en) Method, device and computer readable medium for managing block chain nodes
CN111369730B (en) Voting processing method and device based on block chain
CN108615195B (en) Resource transfer information transmission method and device, storage medium and electronic device
CN112613877B (en) Intelligent contract triggering method and device applied to block chain network and related equipment
US11757884B2 (en) Method and system for controlling the release of a resource
CN111292057A (en) Service processing method based on block chain
CN110941840B (en) Data processing method, system and terminal
CN109885790A (en) The method and apparatus for obtaining satisfaction evaluation data
CN112231755A (en) Data authorization method, device and system based on block chain
CN111274597A (en) Data processing method and equipment
CN111222963A (en) Bidding information processing method and device based on block chain
CN110955919A (en) Data processing method based on block chain network, related device and storage medium
CN113129002A (en) Data processing method and equipment
CN115701078B (en) Cross-chain transaction processing method, device, electronic equipment and storage medium
CN115913734A (en) User authority management method, device and equipment applied to alliance chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant