CN111010282A - Information processing method based on block chain and related device - Google Patents

Information processing method based on block chain and related device Download PDF

Info

Publication number
CN111010282A
CN111010282A CN201911289013.4A CN201911289013A CN111010282A CN 111010282 A CN111010282 A CN 111010282A CN 201911289013 A CN201911289013 A CN 201911289013A CN 111010282 A CN111010282 A CN 111010282A
Authority
CN
China
Prior art keywords
information
partner
signature
proposal
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911289013.4A
Other languages
Chinese (zh)
Other versions
CN111010282B (en
Inventor
刘攀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911289013.4A priority Critical patent/CN111010282B/en
Publication of CN111010282A publication Critical patent/CN111010282A/en
Application granted granted Critical
Publication of CN111010282B publication Critical patent/CN111010282B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/463Electronic voting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Power Engineering (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the application discloses an information processing method based on a block chain and a related device, wherein the method comprises the following steps: receiving first signature information, wherein the first signature information is obtained by signing first transaction information by using a first private key of a first partner, and the first transaction information comprises operation information corresponding to the first partner; verifying the first signature information by using a first public key of the first partner to obtain a first verification result; and if the first signature verification result is used for indicating that the first signature information passes the signature verification, calling an intelligent contract and executing the operation indicated by the operation information. By adopting the embodiment of the application, various operations of the partners can be managed through the block chains, the operation information is prevented from being tampered or lost, and the execution operation is triggered through the block chains, so that all the partners are public and transparent, and the interest dispute among the partners is reduced.

Description

Information processing method based on block chain and related device
Technical Field
The present application relates to the field of block chain technology, and in particular, to an information processing method and related apparatus based on a block chain.
Background
At present, the management mode of the enterprise partners is also based on manual centralized management, when the partners need to make a major decision, all the partners need to be summoned to the scene, and a major decision conference is played, which consumes manpower, material resources and time of the partners. And the various operations through manual management of partners also result in a management that is not openly transparent and unsupervised to some partners. The interests of each partner cannot be guaranteed. For example, for voting, a person who makes a statistical vote may falsify the voting results for various benefits.
Content of application
The embodiment of the application provides an information processing method and a related device based on a block chain, which can manage various operations of partners through the block chain, avoid the operation information from being tampered or lost, and trigger the execution operation through the block chain, so that all the partners are public and transparent, and the interest dispute among the partners is reduced.
In a first aspect, an embodiment of the present application provides an information processing method based on a block chain, including:
receiving first signature information, wherein the first signature information is obtained by signing first transaction information by using a first private key of a first partner, and the first transaction information comprises operation information corresponding to the first partner;
verifying the first signature information by using a first public key of the first partner to obtain a first verification result;
and if the first signature verification result is used for indicating that the first signature information passes the signature verification, calling an intelligent contract and executing the operation indicated by the operation information.
In a second aspect, an embodiment of the present application provides an information processing apparatus based on a block chain, including:
the first receiving module is used for receiving first signature information, wherein the first signature information is obtained by signing first transaction information by using a first private key of a first partner, and the first transaction information comprises operation information corresponding to the first partner;
the signature verification module is used for verifying the signature of the first signature information by utilizing a first public key of the first partner to obtain a first signature verification result;
and the execution module is used for calling the intelligent contract and executing the operation indicated by the operation information if the first signature verification result is used for indicating that the first signature information passes the signature verification.
With reference to the second aspect, in one possible implementation, the first transaction information further includes a first certificate identification and a second public key;
the device also includes:
the searching module is used for searching a first certificate corresponding to the first certificate identifier, wherein the first certificate comprises a third public key;
a determining module for determining that the second public key is the same as the third public key.
With reference to the second aspect, in a possible implementation manner, the first public key is the same as the third public key, and the first certificate identifier is a first digest hash value corresponding to the first certificate;
the device also includes:
a signing module, configured to, if a certificate application request of the first partner is received, sign the identity information of the first partner and the first public key of the first partner using a second private key of a certificate authority, and obtain the first certificate;
a first obtaining module, configured to perform a hash operation on the first certificate to obtain a hash value of the first digest corresponding to the first certificate;
a sending module for storing a correspondence between the first certificate and the first digest hash value and sending the first certificate and the first digest hash value to the first partner.
With reference to the second aspect, in one possible implementation, the certificate application request includes the identity information of the first partner and second signature information signed by the first private key of the first partner;
the device also includes:
and the second obtaining module is used for verifying the second signature information by utilizing the first public key of the first partner to obtain a second verification result, and the second verification result is used for indicating that the second signature information passes verification.
With reference to the second aspect, in one possible implementation, the operation information includes first proposal information, the first proposal information being proposal content of the first partner;
the execution module comprises:
the calling unit is used for calling the intelligent contract and determining whether the first partner has the authority of sending the first proposal information;
an obtaining unit, configured to perform a hash operation on the first proposal information if it is determined that the first partner has the authority to send the first proposal information, and obtain a second digest hash value corresponding to the first proposal information;
and the storage unit is used for storing the corresponding relation between the first proposal information and the second abstract hash value, wherein the first proposal information is used for a second partner to check and send first voting information aiming at the first proposal information.
With reference to the second aspect, in a possible implementation manner, the operation information includes second voting information and a third digest hash value corresponding to second proposal information, where the second voting information is the voting information of the first partner for the second proposal information, and the second proposal information is the proposal content of the second partner;
the execution module comprises:
the searching unit is used for calling the intelligent contract and searching the second proposal information corresponding to the third abstract hash value;
a determining unit, configured to determine whether the first partner has an authority to send the second voting information according to the second proposal information;
and the updating unit is used for updating the voting state information associated with the second proposal information according to the second voting information if the first partner is determined to have the authority of sending the second voting information.
With reference to the second aspect, in one possible implementation, the intelligent contract includes the partner agreement rule, and the apparatus further includes:
a second receiving module for receiving second transaction information, the second transaction information being used for requesting to create the partner agreement rule in the intelligent contract, the second transaction information including the partner agreement rule;
an obtaining module, configured to obtain third transaction information, where the third transaction information includes the second transaction information and third signature information, the third signature information includes multiple signature information, each signature information in the multiple signature information is obtained by multiple partners respectively signing the second transaction information with their own private keys, and the multiple partners include the first partner;
and the storage module is used for checking each signature information in the plurality of signature information, and storing the partner agreement rule in the intelligent contract if the check passes.
In a third aspect, an embodiment of the present application provides an information processing apparatus based on a block chain, including a processor, a memory, and an input/output interface, where the processor, the memory, and the input/output interface are connected to each other, where the input/output interface is used to input or output data, the memory is used to store a program code, and the processor is used to call the program code to execute the block chain based information processing method according to the first aspect.
In a fourth aspect, the present embodiment provides a computer-readable storage medium, where a computer program is stored in the computer-readable storage medium, where the computer program includes program instructions, and the program instructions, when executed by a processor, cause the processor to execute the method for processing information based on a block chain according to the first aspect.
The embodiment of the application receives first signature information, the first signature information is obtained by signing first transaction information by using a first private key of a first partner, the first transaction information comprises operation information corresponding to the first partner, a first public key of the first partner is used for verifying the first signature information to obtain a first verification result, and if the first verification result is used for indicating that the first signature information passes through verification, an intelligent contract is called to execute operation indicated by the operation information. By adopting the embodiment of the application, various operations of the partners can be managed through the block chains, the operation information is prevented from being tampered or lost, and the execution operation is triggered through the block chains, so that all the partners are public and transparent, and the interest dispute among the partners is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a system architecture diagram of an information processing method based on a block chain according to an embodiment of the present application;
fig. 2 is a schematic flowchart of an information processing method based on a block chain according to an embodiment of the present application;
fig. 3 is a schematic diagram illustrating a signature verification performed on first signature information according to an embodiment of the present application;
fig. 4 is a schematic flowchart of another information processing method based on a blockchain according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an information processing apparatus based on a block chain according to an embodiment of the present application;
fig. 6a is a schematic structural diagram of an execution module according to an embodiment of the present application;
FIG. 6b is a block diagram of another embodiment of an execution module according to the present disclosure;
fig. 7 is a schematic structural diagram of an information processing apparatus based on a block chain according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 1, fig. 1 is a system architecture diagram of an information processing method based on a blockchain according to an embodiment of the present application. As shown in fig. 1, the partner system management platform is operated based on a block chain and an intelligent contract, a first partner may generate first transaction information through the partner system management platform, and sign the first transaction information on the partner system management platform by using the first private key of the first partner to obtain first signature information, the first transaction information includes operation information corresponding to the first partner, and the first partner may upload the first signature information to the block chain through the partner system management platform; and the block link receives the first signature information, checks the first signature information by using a first public key of the first partner to obtain a first check result, and calls an intelligent contract to execute the operation indicated by the operation information if the first check result is used for indicating that the first signature information passes the check. The blockchain may be referred to as a distributed ledger, which is a technical solution for collectively maintaining a reliable database in an decentralized and untrusted manner, and the intelligent contract is a set of contracts defined, propagated, verified or executed in a digital form, including agreements on which contract participants can execute the contracts, and allows trusted transactions to be conducted without third parties, which transactions are traceable and irreversible, for example, the contract participants may be the first partner, and the transaction may be the first transaction corresponding to the first transaction information.
The embodiment of the application can provide a high-efficiency and transparent partner system management platform based on the block chain and the intelligent contract, and the block chain has the characteristics of decentralized multi-node backup data and tamper-proof traceability, so that the public transparency of a partner management enterprise is ensured, and the partner management enterprise can be supervised by all partners and enterprise employees, so that the rights and interests of all partners and enterprise employees are maintained.
Referring to fig. 2, fig. 2 is a schematic flowchart of an information processing method based on a block chain according to an embodiment of the present application. As shown in fig. 2, the information processing method based on a block chain according to the embodiment of the present application may include, but is not limited to, the following steps:
s201, receiving first signature information, where the first signature information is obtained by signing first transaction information with a first private key of a first partner, and the first transaction information includes operation information corresponding to the first partner.
In one possible implementation, the first signature information may be uploaded to a blockchain by a partner-level management platform, wherein the partner-level management platform is run based on the blockchain and an intelligent contract. Optionally, the partner degree management platform may perform a hash operation on the first transaction information to obtain a first hash value corresponding to the first transaction information, and sign the first hash value by using the first private key of the first partner to obtain first signature information. Optionally, the operation information may include first proposal information, the first proposal information being the proposal content of the first partner; or, the operation information may include second voting information and a third summary hash value corresponding to second proposal information, where the second voting information is the voting information of the first partner for the second proposal information, and the second proposal information is the proposal content of the second partner.
S202, the first signature information is checked by utilizing the first public key of the first partner, and a first signature checking result is obtained.
In a possible implementation, after the blocklink receives the first transaction information and the first signature information, the first signature information may be checked by using the first public key of the first partner to obtain a first check result, where the first check result may be used to indicate that the first signature information fails to pass the check or the first check result may be used to indicate that the first signature information passes the check.
For example, please refer to fig. 3, fig. 3 is a schematic diagram illustrating a signature verification performed on first signature information according to an embodiment of the present application. As shown in fig. 3, the first public key of the first partner may be utilized to verify the first signature information to obtain a second hash value, the first transaction information is hashed to obtain the first hash value corresponding to the first transaction information, and whether the first signature information passes verification is determined by comparing whether the first hash value is the same as the second hash value, so as to obtain a first verification result. Optionally, if the first hash value is different from the second hash value, obtaining a first signature verification result, where the first signature verification result indicates that the first signature information fails to pass signature verification; if the first hash value is the same as the second hash value, a first signature verification result is obtained, and the first signature verification result indicates that the first signature information passes signature verification.
And S203, if the first signature verification result is used for indicating that the first signature information passes the signature verification, calling an intelligent contract, and executing the operation indicated by the operation information.
In one possible implementation, the first transaction information may further include an enterprise partner contract address, a first certificate identification and a second public key, wherein the first certificate identification may be a first digest hash value corresponding to a first certificate of the first partner, the first certificate is issued by a certificate authority after real-name authentication of the first partner, and a third public key may be included in the first certificate. Optionally, if the first signature verification result is used to indicate that the first signature information passes the signature verification, the first transaction information may be placed in a transaction pool after the signature verification passes, and the first transaction information is uploaded to the initialized virtual machine instance, and the virtual machine executes the first transaction corresponding to the first transaction information. Alternatively, the enterprise partner intelligent contract address may be an enterprise partner intelligent contract address ID. Optionally, in the process of executing the first transaction, whether the intelligent contract is deployed or not may be found through the intelligent contract address managed by the enterprise partner, if the intelligent contract is found to be deployed, the intelligent contract address managed by the enterprise partner is checked to be passed, and if the intelligent contract is found not to be deployed, an execution failure result is returned; the authenticity check may be performed on the first certificate identifier, and after the first certificate identifier passes the verification, a third public key in the first certificate identifier is obtained, and the authenticity check is performed on the second public key through the third public key, where the second public key is the same as the first public key.
Optionally, if the operation information includes first proposal information, the first proposal information may be the proposal content of the first partner. Optionally, the method for invoking the smart contract and executing the operation indicated by the operation information may include, but is not limited to, the following steps: invoking an intelligent contract to determine whether the first partner has the right to send the first proposal information; if the first partner is determined to have the authority of sending the first proposal information, carrying out hash operation on the first proposal information to obtain a second abstract hash value corresponding to the first proposal information; and storing the corresponding relation between the first proposal information and the second abstract hash value, wherein the first proposal information is used for the second partner to check, and sending first voting information aiming at the first proposal information.
Optionally, if the operation information includes second voting information and a third summary hash value corresponding to second proposal information, the second voting information is voting information of the first partner for the second proposal information, and the second proposal information is proposal content of the second partner. Optionally, the method for invoking the smart contract and executing the operation indicated by the operation information may include, but is not limited to, the following steps: calling an intelligent contract, and searching the second proposal information corresponding to the third abstract hash value; determining whether the first partner has the right to send the second voting information according to the second proposal information; and if the first partner is determined to have the right to send the second voting information, updating the voting state information associated with the second proposal information according to the second voting information.
The embodiment of the application receives first signature information, the first signature information is obtained by signing first transaction information by using a first private key of a first partner, the first transaction information comprises operation information corresponding to the first partner, a first public key of the first partner is used for verifying the first signature information to obtain a first verification result, and if the first verification result is used for indicating that the first signature information passes through verification, an intelligent contract is called to execute operation indicated by the operation information. By adopting the embodiment of the application, various operations of the partners can be managed through the block chains, the operation information is prevented from being tampered or lost, and the execution operation is triggered through the block chains, so that all the partners are public and transparent, and the interest dispute among the partners is reduced.
Referring to fig. 4, fig. 4 is a schematic flowchart of another information processing method based on a blockchain according to an embodiment of the present application. As shown in fig. 4, another block chain-based information processing method according to the embodiment of the present application may include, but is not limited to, the following steps:
s401, if receiving the certificate application request of the first partner, using the first public key of the first partner to check the second signature information, and obtaining a second check result, where the second check result is used to indicate that the second signature information passes through the check.
In one possible implementation, the first partner may generate the first private key and the first public key locally and upload the first public key to a blockchain, and the first public key may be used to verify signature information signed by the first partner using the first private key. For example, the first public key may be used to verify the second signature information. Optionally, the identity information of the first partner may be hashed to obtain a third hash value, the third hash value is signed by the first private key to obtain second signature information, and the certificate application request is sent to the certificate authority, where the certificate application request may include the identity information of the first partner and the second signature information. Alternatively, the Certificate Authority may be a Certificate Authority (CA) Authority, which is an Authority responsible for issuing and managing certificates and acts as a trusted third party in e-commerce transactions, assuming responsibility for validity checking of the public key in the public key infrastructure, and which has its own second private key and second public key.
Optionally, if the certificate authority receives the certificate application request of the first partner, the certificate authority may use the first public key of the first partner to check the second signature information to obtain a fourth hash value corresponding to the second signature information, and if the fourth hash value is different from the third hash value, the second signature information fails in checking; if the fourth hash value is the same as the third hash value, a second signature verification result is obtained, and the second signature verification result indicates that the second signature information passes the signature verification.
S402, signing the identity information of the first partner and the first public key of the first partner by using a second private key of a certificate authority to obtain the first certificate.
In a possible implementation manner, if the second signature information passes the signature verification, the identity information of the first partner and the first public key of the first partner may be hashed to obtain a fifth hash value, the fifth hash value is signed by the second private key of the certificate authority to generate fourth signature information, and the first certificate is obtained according to the identity information of the first partner, the first public key of the first partner, and the fourth signature information.
Optionally, fourth transaction information sent by the certificate authority is received, where the fourth transaction information may include the first certificate, the first certificate may include identity information of the first partner, the first public key of the first partner, and the fourth signature information, the fourth signature information is signed through the second public key of the certificate authority to obtain a sixth hash value, and if the sixth hash value is different from the fifth hash value, the fourth signature information fails to be signed; and if the sixth hash value is the same as the fifth hash value, the fourth signature information passes the signature verification. Optionally, if the fourth signature information passes the signature verification, the fourth transaction information may be uploaded to the initialized virtual machine instance, and the virtual machine executes a fourth transaction corresponding to the fourth transaction information.
S403, perform a hash operation on the first certificate to obtain the first digest hash value corresponding to the first certificate.
In a possible implementation manner, the intelligent contract may be called to store the first certificate, hash operation may be performed on the first certificate to obtain the first digest hash value corresponding to the first certificate, whether the first certificate already exists in the intelligent contract is searched through the first digest hash value, and if the first certificate already exists in the intelligent contract, an execution failure result is returned; and if the first certificate does not exist in the intelligent contract, the first certificate passes verification.
S404, storing the corresponding relation between the first certificate and the first digest hash value, and sending the first certificate and the first digest hash value to the first partner.
In a possible embodiment, if the first certificate passes the verification, the correspondence between the first certificate and the first digest hash value may be stored in the smart contract. Optionally, the first digest hash value may be used as a key of a first key-value pair, the first certificate may be used as a value of the first key-value pair, and the first key-value pair may be stored in the smart contract. Optionally, the first certificate in the intelligent contract may be looked up through the first digest hash value and the first key-value pair. Optionally, the execution result corresponding to the fourth transaction information may be consensus-verified by a consensus node in the blockchain, and the fourth transaction information and the execution result of the fourth transaction information are written into the blockchain after the consensus verification passes, the blockchain may send the fourth transaction information, the execution result of the fourth transaction information, the uplink result corresponding to the fourth transaction information, and the first digest hash value to the certificate authority, the certificate authority may send the first certificate and the first digest hash value to the first partner, and the first certificate and the first digest hash value may be locally stored after the first partner receives the first certificate and the first digest hash value.
S405, second transaction information is received, the second transaction information is used for requesting to create the partner agreement rule in the intelligent contract, and the second transaction information comprises the partner agreement rule.
In one possible implementation, the second transaction information may be received by an enterprise partner management platform, wherein the enterprise partner management platform is run based on the blockchain and intelligent contracts. Optionally, the second transaction information may include the partner agreement rule and the enterprise partner settlement intelligent contract address, wherein the partner agreement rule may be a first partner agreement rule or a second partner agreement rule, the second partner agreement rule is obtained by changing a third partner agreement rule, and the reason for changing the third partner agreement rule may be that an enterprise increased qualification stock introduces a new partner or a partner withdraws. Alternatively, the enterprise partner intelligent contract address may be an enterprise partner intelligent contract address ID.
S406, obtaining third transaction information, where the third transaction information includes the second transaction information and third signature information, and the third signature information includes a plurality of signature information.
In a possible implementation, each signature information of the plurality of signature information is obtained by a plurality of partners respectively signing the second transaction information by using respective private keys, wherein the plurality of partners comprises the first partner. Optionally, the partner system management platform performs a hash operation on the second transaction information to obtain a hash value corresponding to the second transaction information, the multiple partners respectively use their own private keys to sign the hash value corresponding to the second transaction information to obtain multiple signature information in the third signature information, generate the third transaction information according to the second transaction information and the third signature information, and upload the third transaction information to the blockchain. Optionally, the third transaction information may further include a plurality of certificate identifications corresponding to a plurality of certificates of a plurality of partners and a plurality of public keys of the plurality of partners, wherein the plurality of certificate identifications corresponding to the plurality of certificates includes the first certificate identification of the first partner, the plurality of certificates are issued by the certificate authority for the plurality of partners, the plurality of public keys of the plurality of partners include the first public key of the first partner, and the plurality of certificate identifications may be digest hash values.
S407, verifying each signature information of the plurality of signature information, and if the verification passes, storing the partner agreement rule in the intelligent contract.
In a possible implementation manner, the public keys of the partners can be used to check the signature information in the third signature information respectively, so as to obtain hash values, and if any hash value in the hash values is different from the hash value corresponding to the second transaction information, the third signature information check fails; and if the plurality of hash values are the same as the hash values corresponding to the second transaction information, the third signature information passes the signature verification. Optionally, if the third signature information passes the verification of the signature, the second transaction information is uploaded to the initialized virtual machine instance, the virtual machine executes a second transaction corresponding to the second transaction information, and the partner agreement rule is created by invoking the intelligent contract. Optionally, in the process of executing the second transaction, whether the intelligent contract is deployed or not may be found through the intelligent contract address managed by the enterprise partner, if the intelligent contract is found to be deployed, the intelligent contract address managed by the enterprise partner is checked to be passed, and if the intelligent contract is found not to be deployed, an execution failure result is returned.
Optionally, if the partner agreement rule is a first partner agreement rule, invoking the intelligent contract to create the first partner agreement rule. Optionally, the certificates corresponding to the certificate identifications can be searched for through the certificate identifications, if the certificates are not searched, an execution failure result is returned, and if the certificates are searched, the certificate identifications pass verification; obtaining a plurality of public keys in the plurality of certificates from the searched plurality of certificates, if the plurality of public keys in the plurality of certificates are different from the plurality of public keys of the plurality of partners, returning an execution failure result, and if the plurality of public keys in the plurality of certificates are the same as the plurality of public keys of the plurality of partners, passing verification of the plurality of public keys of the plurality of partners; the hash operation may be performed on the first partner agreement rule to obtain a hash value corresponding to the first partner agreement rule, and whether the intelligent contract has created the first partner agreement rule is searched for by the hash value corresponding to the first partner agreement rule, if the intelligent contract has created the first partner agreement rule is found, an execution failure result is returned, and if the intelligent contract has not been found to have created the first partner agreement rule, the first partner agreement rule passes verification. Optionally, if the third signature information passes verification, and the first partner agreement rule, the certificate identifications, and the public keys of the partners pass verification, the hash value corresponding to the first partner agreement rule may be used as a key of a second key-value pair, the first partner agreement rule may be used as a value of the second key-value pair, the second key-value pair may be stored in the smart contract, the hash value corresponding to the first partner agreement rule may be used as a key of a third key-value pair, the hash value corresponding to the second transaction information may be used as a value of the third key-value pair, and the third key-value pair may be stored in the smart contract. Optionally, the first partner agreement rule in the intelligent contract may be searched for by the hash value corresponding to the first partner agreement rule and the second key-value pair; the hash value corresponding to the second transaction information in the intelligent contract can be searched through the hash value corresponding to the first partner agreement rule and the third key value pair, and then the second transaction information can be checked through the hash value corresponding to the second transaction information. Optionally, the execution result corresponding to the second transaction information may be consensus-identified by a consensus node in the blockchain, and after the consensus verification passes, the second transaction information and the execution result of the second transaction information are written into the blockchain, and the second transaction information, the execution result of the second transaction information, and the hash value corresponding to the first partner agreement rule are sent to the partner-level management platform, and the partner-level management platform may send the uplink result corresponding to the second transaction information to the plurality of partners, and the plurality of partners may view the first partner agreement rule in the blockchain.
Optionally, if the partner agreement rule is a second partner agreement rule, the second transaction information may further include a hash value corresponding to a third partner agreement rule, and the intelligent contract is invoked to create the second partner agreement rule, where the second partner agreement rule is obtained by changing the third partner agreement rule. Optionally, it may be configured to search for whether the third partner agreement rule exists in the intelligent contract through the hash value corresponding to the third partner agreement rule, if the third partner agreement rule does not exist, return an execution failure result, and if the third partner agreement rule exists, pass verification of the hash value corresponding to the third partner agreement rule; the certificates corresponding to the certificate identifications can be searched through the certificate identifications, if the certificates are not searched, an execution failure result is returned, and if the certificates are searched, the certificate identifications pass the verification; obtaining a plurality of public keys in the plurality of certificates from the searched plurality of certificates, if the plurality of public keys in the plurality of certificates are different from the plurality of public keys of the plurality of partners, returning an execution failure result, and if the plurality of public keys in the plurality of certificates are the same as the plurality of public keys of the plurality of partners, passing verification of the plurality of public keys of the plurality of partners; and carrying out hash operation on the second partner agreement rule to obtain a hash value corresponding to the second partner agreement rule, searching whether the intelligent contract creates the second partner agreement rule or not through the hash value corresponding to the second partner agreement rule, if the intelligent contract creates the second partner agreement rule, returning an execution failure result, and if the intelligent contract does not create the second partner agreement rule, checking the second partner agreement rule to be passed. Optionally, if the third signature information passes verification and the hash value corresponding to the third partner agreement rule, the second partner agreement rule, the certificate identifications and the public keys of the partners are verified, updating the agreement status of the third partner agreement rule to invalid according to the second partner agreement rule and the hash value corresponding to the second partner agreement rule, the hash value corresponding to the second partner agreement rule may be used as a key for a fourth key-value pair, the second partner agreement rule may be used as a value for the fourth key-value pair, and storing the fourth key-value pair in the intelligent contract, taking the hash value corresponding to the second partner agreement rule as a key word of a fifth key-value pair, taking the hash value corresponding to the second transaction information as a value of the fifth key-value pair, and storing the fifth key-value pair in the intelligent contract. Optionally, the second partner agreement rule in the intelligent contract may be searched for by the hash value corresponding to the second partner agreement rule and the fourth key value pair; the hash value corresponding to the second transaction information in the intelligent contract can be searched through the hash value corresponding to the second partner agreement rule and the fifth key value pair, and the second transaction information can be checked through the hash value corresponding to the second transaction information. Optionally, the execution result corresponding to the second transaction information may be consensus-identified by a consensus node in the blockchain, and after the consensus verification passes, the second transaction information and the execution result of the second transaction information are written into the blockchain, and the second transaction information, the execution result of the second transaction information, and the hash value corresponding to the second partner agreement rule are sent to the partner-level management platform, and the partner-level management platform may send the uplink result corresponding to the second transaction information to the plurality of partners, and the plurality of partners may view the second partner agreement rule in the blockchain.
Optionally, after the partner agreement rule is stored in the intelligent contract, the content in the partner agreement rule may be implemented by the intelligent contract, interference of a third-party factor is eliminated, and performing automatically when the content in the partner agreement rule reaches a trigger condition reduces risk of late stage partner benefit dispute.
S408, receiving first signature information, where the first signature information is obtained by signing first transaction information with a first private key of a first partner, and the first transaction information includes operation information corresponding to the first partner.
In a possible implementation manner, step S408 in the embodiment of the present application may refer to step S201 in the embodiment shown in fig. 2, and is not described herein again.
S409, using the first public key of the first partner to check the first signature information, and obtaining a first result.
In a possible implementation manner, step S409 in the embodiment of the present application may refer to step S202 in the embodiment shown in fig. 2, and details are not repeated here.
S410, if the first signature verification result is used for indicating that the first signature information passes the signature verification, searching for a first certificate corresponding to the first certificate identification, wherein the first certificate comprises a third public key.
In a possible implementation, the first transaction information further includes a first certificate identifier and a second public key, and the first certificate identifier may be a first digest hash value corresponding to the first certificate. Optionally, the first certificate may be searched for by the first digest hash value, and if the first certificate may be searched for by the first digest hash value, the first digest hash value passes verification and proves the authenticity of the first certificate; if the first certificate is not found through the first abstract hash value, the first certificate does not exist, and an execution failure result is returned. Optionally, if the first certificate corresponding to the first certificate identifier is found, the third public key in the first certificate may be obtained.
S411, it is determined that the second public key is the same as the third public key.
In a possible implementation manner, a third public key in the first certificate is matched with the second public key, and if the third public key is different from the second public key, an execution failure result is returned; if the third public key is the same as the second public key, the second public key passes the verification, and the second public key is proved to be really from the first certificate, wherein the third public key is the same as the first public key if the second public key is the same as the first public key.
And S412, calling the intelligent contract and executing the operation indicated by the operation information.
In one possible embodiment, if the operation information includes first proposal information, the first proposal information may be the proposal content of the first partner, and the first transaction information further includes a first partner identity, which may be a unique identity of the first partner. For example, the first partner identity may be the first partner's identity number, or the first partner identity may be a first partner ID. Optionally, the method for invoking the smart contract and executing the operation indicated by the operation information may include, but is not limited to, the following steps:
step one, calling an intelligent contract to determine whether the first partner has the authority to send the first proposal information.
Optionally, a partner agreement rule in the intelligent contract may be invoked, the partner agreement rule may include multiple proposal right information corresponding to multiple partners, it may be determined whether the first partner has a right to send the first proposal information according to the multiple proposal right information corresponding to the multiple partners, and if it is determined that the first partner does not have the right to send the first proposal information, an execution failure result is returned.
And step two, if the first partner is determined to have the authority of sending the first proposal information, carrying out hash operation on the first proposal information to obtain a second abstract hash value corresponding to the first proposal information.
In a possible implementation manner, if it is determined that the first partner has the authority to send the first proposal information, calculating a second digest hash value corresponding to the first proposal information, and searching whether the first proposal information already exists in the intelligent contract through the second digest hash value, if the first proposal information already exists in the intelligent contract, returning an execution failure result; and if the first proposal information does not exist in the intelligent contract, the first proposal information passes the verification.
And step three, storing the corresponding relation between the first proposal information and the second abstract hash value, wherein the first proposal information is used for a second partner to check, and sending first voting information aiming at the first proposal information.
Optionally, if the first proposal information, the first certificate identifier in the first transaction information, and the second public key are verified, storing the correspondence between the first proposal information and the second digest hash value in the intelligent contract. Optionally, the second digest hash value may be used as a key of a sixth key-value pair, the hash value corresponding to the first proposal information, the first partner identifier and the first transaction information is used as a value of the sixth key-value pair, the sixth key-value pair is stored in the intelligent contract, the vote and the second digest hash value are used as keys of a seventh key-value pair, third vote information is used as a value of the seventh key-value pair, and the seventh key-value pair is stored in the intelligent contract, where the third vote information is obtained by voting for the first partner with respect to the first proposal information. Optionally, the hash values corresponding to the first proposal information, the first partner identifier and the first transaction information in the intelligent contract may be searched through the second digest hash value and the sixth key value pair; the third voting information in the intelligent contract can be searched through the vote, the second digest hash value and the seventh key-value pair. Optionally, the execution result corresponding to the first transaction information may be identified by a common identification node in the blockchain, and after the common identification verification passes, the first transaction information and the execution result of the first transaction information are written into the blockchain, and the first transaction information, the execution result of the first transaction information, and the uplink result of the first transaction information are sent to the partner-level management platform, and the partner-level management platform may send the uplink result corresponding to the first transaction information to the first partner.
In a possible implementation manner, if the operation information includes the second voting information and the third summary hash value corresponding to the second proposal information, and the first transaction information further includes the first partner identifier, the first partner identifier may be a unique identifier of the first partner, the second voting information is the voting information of the first partner for the second proposal information, and the second proposal information is the proposal content of the second partner, the first partner may vote on the second proposal content by invoking an intelligent contract, and the voting process is publicly transparent and may be supervised by all partners and general staff. Alternatively, the second voting information may be a vote pass, or the second voting information may be a vote fail. Optionally, the method for invoking the smart contract and executing the operation indicated by the operation information may include, but is not limited to, the following steps:
step one, calling an intelligent contract, and searching the second proposal information corresponding to the third abstract hash value.
Optionally, an intelligent contract may be called, the second proposal information corresponding to the third digest hash value is searched for through the third digest hash value, hash operation is performed on the second proposal information to obtain a fourth digest hash value, and if the fourth digest hash value is different from the third digest hash value, an execution failure result is returned; if the fourth digest hash value is the same as the third digest hash value, the third digest hash value passes the verification, and it is indicated that the second proposal information corresponding to the third digest hash value can be found through the third digest hash value.
And step two, determining whether the first partner has the authority of sending the second voting information according to the second proposal information.
Optionally, a partner agreement rule in the intelligent contract may be invoked according to the second proposal information, where the partner agreement rule may include multiple pieces of voting right information corresponding to multiple partners, and it may be determined whether the first partner has a right to send the second voting information according to the multiple pieces of voting right information corresponding to the multiple partners, and if it is determined that the first partner does not have the right to send the second voting information, an execution failure result is returned.
And step three, if the first partner is determined to have the right to send the second voting information, updating the voting state information associated with the second proposal information according to the second voting information.
Optionally, if it is determined that the first partner has the right to send the second voting information, fourth voting information in the intelligent contract may be searched through voting and a third digest hash value, authenticity check may be performed on the second voting information according to the fourth voting information, it is checked whether the first partner has voted for the second proposal information, and if the fourth voting information is different from the second voting information, the second voting information passes the check, where the fourth voting information is obtained by the second partner by voting for the second proposal information. Optionally, if the second voting information, the first certificate identifier in the first transaction information, and the second public key are verified, the hash value corresponding to the second voting information and the first transaction information is stored in the intelligent contract, and the voting state information associated with the second proposal information is updated according to the second voting information. Optionally, if it is determined that the multiple partners have the right to send multiple pieces of voting information for the second proposal information, a first number of votes and a second number of votes corresponding to the multiple pieces of voting information may be counted according to the multiple pieces of voting information sent by the multiple partners for the second proposal information, where the first number of votes is the number of votes passed by the voting proposal, and the second number of votes is the number of votes rejected by the voting proposal, where the multiple pieces of voting information may include the second voting information and the fourth voting information. Optionally, if the first ratio of the first number of votes to the total number of votes corresponding to the plurality of pieces of voting information is greater than or equal to a first threshold, setting the proposal state of the second proposal information as that the proposal passes; if the second ratio of the second vote number to the total vote number corresponding to the plurality of voting information is greater than or equal to a second threshold value, setting the proposal state of the second proposal information as proposal rejection; if the first ratio is smaller than the first threshold, or if the second ratio is smaller than the second threshold, setting the proposal state of the second proposal information as that the proposal is not passed; otherwise, the proposal state of the second proposal information is set to be in the voting process. Optionally, the execution result corresponding to the first transaction information may be identified by the consensus node in the blockchain, and after the consensus verification passes, the first transaction information and the execution result of the first transaction information are written into the blockchain, and the proposal state of the second proposal information is sent to the partner system management platform, and the partner system management platform may send the proposal state of the second proposal information to the first partner. Optionally, if the proposal state of the second proposal information is that the proposal is passed, the related enterprise internal departments related to the subsequent work of the second proposal information may be linked to the blockchain as nodes of the blockchain, and after the fact that the director passes the proposal corresponding to the second proposal information is monitored, the related enterprise internal departments may perform subsequent operations according to the second proposal information.
Optionally, the departments, the meetings and the external right monitoring mechanisms of the enterprise may be linked to the blockchain in the form of blockchain nodes, and the blockchain is the same blockchain as the blockchain where the partner degree management platform is located, so that the departments, the meetings and the external right monitoring mechanisms of the enterprise may share the data on the partner degree management platform, where the data on the partner degree management platform may include but is not limited to: the partner agreement rules, the first proposal information, and the second proposal information, and so on. Optionally, each department, workshop, and external right monitoring mechanism of the enterprise may share each item of data on the partner degree management platform, so that the business process may be optimized, the operation cost may be reduced, and the cooperation efficiency may be improved.
The embodiment of the application receives first signature information, the first signature information is obtained by signing first transaction information by using a first private key of a first partner, the first transaction information comprises operation information corresponding to the first partner, a first public key of the first partner is used for verifying the first signature information to obtain a first verification result, and if the first verification result is used for indicating that the first signature information passes through verification, an intelligent contract is called to execute operation indicated by the operation information. By adopting the embodiment of the application, various operations of the partners can be managed through the block chains, the operation information is prevented from being tampered or lost, and the execution operation is triggered through the block chains, so that all the partners are public and transparent, and the interest dispute among the partners is reduced.
Referring to fig. 5, fig. 5 is a schematic structural diagram of an information processing apparatus based on a block chain according to an embodiment of the present application. As shown in fig. 5, the block chain-based information processing apparatus 50 includes:
a first receiving module 508, configured to receive first signature information, where the first signature information is obtained by signing first transaction information with a first private key of a first partner, and the first transaction information includes operation information corresponding to the first partner;
a signature verification module 509, configured to verify the signature of the first signature information by using the first public key of the first partner, so as to obtain a first signature verification result;
and the executing module 512 is configured to invoke the intelligent contract and execute the operation indicated by the operation information if the first signature verification result is used to indicate that the first signature information passes the signature verification.
In one possible embodiment, the first transaction information further includes a first certificate identification and a second public key;
the block chain-based information processing apparatus 50 further includes:
a searching module 510, configured to search for a first certificate corresponding to the first certificate identifier, where the first certificate includes a third public key;
a determining module 511, configured to determine that the second public key is the same as the third public key.
In a possible implementation manner, the first public key is the same as the third public key, and the first certificate identifier is a first digest hash value corresponding to the first certificate;
the block chain-based information processing apparatus 50 further includes:
a signing module 502, configured to, if a certificate application request of the first partner is received, sign the identity information of the first partner and the first public key of the first partner by using a second private key of a certificate authority, so as to obtain the first certificate;
a first obtaining module 503, configured to perform a hash operation on the first certificate to obtain the first digest hash value corresponding to the first certificate;
a sending module 504 is configured to store a correspondence between the first certificate and the first digest hash value and send the first certificate and the first digest hash value to the first partner.
In one possible embodiment, the certificate application request includes the first partner's identity information and second signature information signed by the first partner's identity information using the first private key of the first partner;
the block chain-based information processing apparatus 50 further includes:
a second obtaining module 501, configured to use the first public key of the first partner to check the second signature information, so as to obtain a second result of checking the signature, where the second result of checking the signature is used to indicate that the second signature information passes through the check of the signature.
In one possible embodiment, the operation information includes first proposal information, the first proposal information being the proposal content of the first partner;
for example, please refer to fig. 6a, fig. 6a is a schematic structural diagram of an execution module according to an embodiment of the present application, and as shown in fig. 6a, the execution module 512 includes:
a calling unit 601, configured to call an intelligent contract, and determine whether the first partner has a right to send the first proposal information;
an obtaining unit 602, configured to perform a hash operation on the first proposal information if it is determined that the first partner has the authority to send the first proposal information, so as to obtain a second digest hash value corresponding to the first proposal information;
a storage unit 603, configured to store a corresponding relationship between the first proposal information and the second digest hash value, where the first proposal information is used for a second partner to view, and send first voting information for the first proposal information.
In a possible implementation manner, the operation information includes second voting information and a third summary hash value corresponding to second proposal information, the second voting information is the voting information of the first partner for the second proposal information, and the second proposal information is the proposal content of the second partner;
for example, please refer to fig. 6b, where fig. 6b is a schematic structural diagram of another execution module provided in the embodiment of the present application, and as shown in fig. 6b, the execution module 512 includes:
a searching unit 604, configured to invoke an intelligent contract, and search for the second proposal information corresponding to the third digest hash value;
a determining unit 605, configured to determine whether the first partner has the right to send the second voting information according to the second proposal information;
an updating unit 606, configured to update the voting status information associated with the second proposal information according to the second voting information if it is determined that the first partner has the right to send the second voting information.
In one possible embodiment, the intelligent contract includes the partner agreement rules, and the blockchain-based information processing apparatus 50 further includes:
a second receiving module 505, configured to receive second transaction information, the second transaction information being used for requesting to create the partner agreement rule in the intelligent contract, the second transaction information including the partner agreement rule;
an obtaining module 506, configured to obtain third transaction information, where the third transaction information includes the second transaction information and third signature information, the third signature information includes a plurality of signature information, each signature information in the plurality of signature information is obtained by a plurality of partners respectively signing the second transaction information with respective private keys, and the plurality of partners include the first partner;
the storage module 507 is configured to check each of the plurality of signature information, and if the check passes, store the partner agreement rule in the intelligent contract.
It should be noted that, for the content that is not mentioned in the embodiment corresponding to fig. 5, reference may be made to the description of the method embodiment in fig. 2 and/or fig. 4, and details are not repeated here.
The embodiment of the application receives first signature information, the first signature information is obtained by signing first transaction information by using a first private key of a first partner, the first transaction information comprises operation information corresponding to the first partner, a first public key of the first partner is used for verifying the first signature information to obtain a first verification result, and if the first verification result is used for indicating that the first signature information passes through verification, an intelligent contract is called to execute operation indicated by the operation information. By adopting the embodiment of the application, various operations of the partners can be managed through the block chains, the operation information is prevented from being tampered or lost, and the execution operation is triggered through the block chains, so that all the partners are public and transparent, and the interest dispute among the partners is reduced.
Referring to fig. 7, fig. 7 is a schematic structural diagram of an information processing apparatus based on a blockchain according to an embodiment of the present application, where the information processing apparatus 70 based on a blockchain includes a processor 701, a memory 702, an input/output interface 703, and a communication bus 704. The processor 701 is connected to the memory 702 and the input output interface 703, for example, the processor 701 may be connected to the memory 702 and the input output interface 703 through a communication bus 704.
The processor 701 is configured to support the block chain based information processing apparatus to perform corresponding functions in the block chain based information processing method of fig. 2 and/or fig. 4. The Processor 701 may be a Central Processing Unit (CPU), a Network Processor (NP), a hardware chip, or any combination thereof. The hardware chip may be an Application-specific integrated circuit (ASIC), a Programmable Logic Device (pld), or a combination thereof. The PLD may be a Complex Programmable Logic Device (CPLD), a Field-Programmable Gate Array (FPGA), General Array Logic (GAL), or any combination thereof.
The memory 702 is used for storing program codes and the like. The Memory 702 may include Volatile Memory (VM), such as Random Access Memory (RAM); the Memory 702 may also include a Non-Volatile Memory (NVM), such as a Read-only Memory (ROM), a flash Memory (flash Memory), a Hard Disk Drive (HDD) or a Solid-State Drive (SSD); the memory 702 may also comprise a combination of the above types of memory.
The input/output interface 703 is used for inputting or outputting data.
The processor 701 may call the program code to perform the following operations:
receiving first signature information, wherein the first signature information is obtained by signing first transaction information by using a first private key of a first partner, and the first transaction information comprises operation information corresponding to the first partner;
verifying the first signature information by using a first public key of the first partner to obtain a verification result;
and if the signature checking result is used for indicating that the first signature information passes the signature checking, calling the intelligent contract and executing the operation indicated by the operation information.
It should be noted that, the implementation of each operation may also correspond to the corresponding description of the method embodiment shown in fig. 2 and/or fig. 4; the processor 701 may also cooperate with the input/output interface 703 to perform other operations in the above-described method embodiments.
Embodiments of the present application also provide a computer-readable storage medium storing a computer program, the computer program comprising program instructions, which when executed by a computer, cause the computer to execute the method according to the foregoing embodiments, the computer may be a part of the above-mentioned block chain-based information processing apparatus. Such as the processor 701 described above.
The terms "first," "second," "third," and "fourth," etc. in the description and claims of this application and the above-described drawings are used for distinguishing between different objects and not for describing a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those steps or elements listed, but may alternatively include other steps or elements not listed, or inherent to such process, method, article, or apparatus.
In the present application, "a and/or B" means one of the following cases: a, B, A and B. "at least one of … …" refers to any combination of the listed items or any number of the listed items, e.g., "at least one of A, B and C" refers to one of: any one of seven cases, a, B, C, a and B, B and C, a and C, A, B and C.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by a computer program, which can be stored in a computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. The storage medium may be a magnetic disk, an optical disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), or the like.
The method and the related apparatus provided by the embodiments of the present application are described with reference to the flowchart and/or the structural diagram of the method provided by the embodiments of the present application, and each flow and/or block of the flowchart and/or the structural diagram of the method, and the combination of the flow and/or block in the flowchart and/or the block diagram can be specifically implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block or blocks of the block diagram. These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block or blocks of the block diagram. These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block or blocks.
The above disclosure is only for the purpose of illustrating the preferred embodiments of the present application and is not to be construed as limiting the scope of the present application, so that the present application is not limited thereto, and all equivalent variations and modifications can be made to the present application.

Claims (10)

1. An information processing method based on a block chain, the method comprising:
receiving first signature information, wherein the first signature information is obtained by signing first transaction information by using a first private key of a first partner, and the first transaction information comprises operation information corresponding to the first partner;
verifying the first signature information by using a first public key of the first partner to obtain a first verification result;
and if the first signature verification result is used for indicating that the first signature information passes the signature verification, calling an intelligent contract and executing the operation indicated by the operation information.
2. The method of claim 1, wherein the first transaction information further comprises a first certificate identification and a second public key;
the invoking of the intelligent contract further includes, before executing the operation indicated by the operation information:
searching a first certificate corresponding to the first certificate identification, wherein the first certificate comprises a third public key;
determining that the second public key is the same as the third public key.
3. The method according to claim 2, wherein the first public key is the same as the third public key, and the first certificate identifier is a first digest hash value corresponding to the first certificate;
the method further comprises the following steps:
if a certificate application request of the first partner is received, signing the identity information of the first partner and the first public key of the first partner by using a second private key of a certificate authority to obtain the first certificate;
performing hash operation on the first certificate to obtain the first digest hash value corresponding to the first certificate;
storing a correspondence between the first certificate and the first digest hash value, and sending the first certificate and the first digest hash value to the first partner.
4. The method of claim 3 wherein the certificate application request includes identity information of the first partner and second signature information signed by the first private key of the first partner;
before signing the identity information of the first partner and the first public key of the first partner with the second private key of the certificate authority, the method further comprises:
and verifying the second signature information by using the first public key of the first partner to obtain a second verification result, wherein the second verification result is used for indicating that the second signature information passes verification.
5. The method according to any of claims 1-4, wherein the operational information includes first proposal information, the first proposal information being the proposal content of the first partner;
the calling of the intelligent contract and the execution of the operation indicated by the operation information comprise:
invoking an intelligent contract to determine whether the first partner has the right to send the first proposal information;
if the first partner is determined to have the authority of sending the first proposal information, carrying out hash operation on the first proposal information to obtain a second abstract hash value corresponding to the first proposal information;
and storing the corresponding relation between the first proposal information and the second abstract hash value, wherein the first proposal information is used for a second partner to check, and sending first voting information aiming at the first proposal information.
6. The method according to any one of claims 1-4, wherein the operation information includes second voting information and a third summary hash value corresponding to second proposal information, the second voting information is the voting information of the first partner for the second proposal information, and the second proposal information is the proposal content of the second partner;
the calling of the intelligent contract and the execution of the operation indicated by the operation information comprise:
calling an intelligent contract, and searching the second proposal information corresponding to the third abstract hash value;
determining whether the first partner has the right to send the second voting information according to the second proposal information;
and if the first partner is determined to have the right to send the second voting information, updating the voting state information associated with the second proposal information according to the second voting information.
7. The method of claim 1, wherein the intelligent contract includes partner agreement rules, and wherein prior to receiving the first signature information, further comprising:
receiving second transaction information requesting creation of the partner agreement rule in the smart contract, the second transaction information including the partner agreement rule;
acquiring third transaction information, wherein the third transaction information comprises the second transaction information and third signature information, the third signature information comprises a plurality of signature information, each signature information in the plurality of signature information is obtained by a plurality of partners respectively signing the second transaction information by using respective private keys, and the plurality of partners comprise the first partner;
and checking each signature information in the plurality of signature information, and if the check passes, storing the partner agreement rule in the intelligent contract.
8. An information processing apparatus based on a block chain, the apparatus comprising:
the first receiving module is used for receiving first signature information, wherein the first signature information is obtained by signing first transaction information by using a first private key of a first partner, and the first transaction information comprises operation information corresponding to the first partner;
the signature verification module is used for verifying the signature of the first signature information by using a first public key of the first partner to obtain a signature verification result;
and the execution module is used for calling the intelligent contract and executing the operation indicated by the operation information if the signature checking result is used for indicating that the first signature information passes the signature checking.
9. An information processing device based on a blockchain, comprising a processor, a memory and an input/output interface, wherein the processor, the memory and the input/output interface are connected with each other, the input/output interface is used for inputting or outputting data, the memory is used for storing program codes, and the processor is used for calling the program codes and executing the method according to any one of claims 1-7.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program comprising program instructions that, when executed by a processor, cause the processor to carry out the method according to any one of claims 1-7.
CN201911289013.4A 2019-12-12 2019-12-12 Block chain-based information processing method, related device and storage medium Active CN111010282B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911289013.4A CN111010282B (en) 2019-12-12 2019-12-12 Block chain-based information processing method, related device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911289013.4A CN111010282B (en) 2019-12-12 2019-12-12 Block chain-based information processing method, related device and storage medium

Publications (2)

Publication Number Publication Date
CN111010282A true CN111010282A (en) 2020-04-14
CN111010282B CN111010282B (en) 2022-07-12

Family

ID=70115257

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911289013.4A Active CN111010282B (en) 2019-12-12 2019-12-12 Block chain-based information processing method, related device and storage medium

Country Status (1)

Country Link
CN (1) CN111010282B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111818072A (en) * 2020-07-16 2020-10-23 中国联合网络通信集团有限公司 Verification method of digital certificate, user node and authentication authorization center
CN111815321A (en) * 2020-05-21 2020-10-23 北京金山云网络技术有限公司 Transaction proposal processing method, device, system, storage medium and electronic device
CN113672988A (en) * 2020-05-14 2021-11-19 腾讯科技(深圳)有限公司 Block chain-based information management method, system, medium, and electronic device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170344988A1 (en) * 2016-05-24 2017-11-30 Ubs Ag System and method for facilitating blockchain-based validation
US20180109516A1 (en) * 2016-10-13 2018-04-19 Coinplug, Inc. Method for providing certificate service based on smart contract and server using the same
US10102526B1 (en) * 2017-03-31 2018-10-16 Vijay K. Madisetti Method and system for blockchain-based combined identity, ownership, integrity and custody management
CN109934593A (en) * 2019-03-26 2019-06-25 众安信息技术服务有限公司 For realizing the design method and equipment of the block catenary system for supporting multi-signature
WO2019227336A1 (en) * 2018-05-30 2019-12-05 重庆小雨点小额贷款有限公司 Blockchain-based information processing method and device, and blockchain network

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170344988A1 (en) * 2016-05-24 2017-11-30 Ubs Ag System and method for facilitating blockchain-based validation
US20180109516A1 (en) * 2016-10-13 2018-04-19 Coinplug, Inc. Method for providing certificate service based on smart contract and server using the same
US10102526B1 (en) * 2017-03-31 2018-10-16 Vijay K. Madisetti Method and system for blockchain-based combined identity, ownership, integrity and custody management
WO2019227336A1 (en) * 2018-05-30 2019-12-05 重庆小雨点小额贷款有限公司 Blockchain-based information processing method and device, and blockchain network
CN109934593A (en) * 2019-03-26 2019-06-25 众安信息技术服务有限公司 For realizing the design method and equipment of the block catenary system for supporting multi-signature

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113672988A (en) * 2020-05-14 2021-11-19 腾讯科技(深圳)有限公司 Block chain-based information management method, system, medium, and electronic device
CN113672988B (en) * 2020-05-14 2023-11-10 腾讯科技(深圳)有限公司 Information management method, system, medium and electronic equipment based on block chain
CN111815321A (en) * 2020-05-21 2020-10-23 北京金山云网络技术有限公司 Transaction proposal processing method, device, system, storage medium and electronic device
CN111818072A (en) * 2020-07-16 2020-10-23 中国联合网络通信集团有限公司 Verification method of digital certificate, user node and authentication authorization center
CN111818072B (en) * 2020-07-16 2022-04-15 中国联合网络通信集团有限公司 Verification method of digital certificate, user node and authentication authorization center

Also Published As

Publication number Publication date
CN111010282B (en) 2022-07-12

Similar Documents

Publication Publication Date Title
CN110245186B (en) Service processing method based on block chain and related equipment
US11088854B2 (en) Securing blockchain access through a gateway on behalf of a communication device
US20190303623A1 (en) Promotion smart contracts for software development processes
US20190303579A1 (en) Decentralized, immutable, tamper-evident, directed acyclic graphs documenting software supply-chains with cryptographically signed records of software-development life cycle state and cryptographic digests of executable code
US20200013025A1 (en) Conditional deferred transactions for blockchain
US20190305957A1 (en) Execution smart contracts configured to establish trustworthiness of code before execution
CN111010282B (en) Block chain-based information processing method, related device and storage medium
JP2019004463A (en) Method, apparatus and non-transitory computer readable storage medium for transaction execution and validation in blockchain (transaction execution and validation in blockchain)
WO2020046509A1 (en) Eligibility of a digital asset for a transaction
CN112632629B (en) Voting management method, device, medium and electronic equipment based on block chain
US11196564B2 (en) Hierarchical distributed ledger
CN115769241A (en) Privacy preserving architecture for licensed blockchains
CN112597240B (en) Federal learning data processing method and system based on alliance chain
CN112671881B (en) Node organization management method and device, electronic equipment and readable storage medium
EP3776412A2 (en) System and method for consensus management
CN111090581A (en) Intelligent contract testing method and device, computer equipment and storage medium
CN111899019A (en) Method and system for cross validation and sharing of blacklist and multiple parties
CN112712452A (en) Approval information processing method and device based on block chain
CN112700251A (en) Identity confirmation method, device and system in financial scene
CN112069529B (en) Block chain-based volume management method and device, computer and storage medium
CN112037055B (en) Transaction processing method, device, electronic equipment and readable storage medium
CN111310945B (en) Operation and maintenance management method and device and electronic equipment
CN113704712A (en) Identity authentication method, device and system and electronic equipment
CN111552989A (en) Service data processing method, device, equipment and storage medium based on block chain
CN115913734A (en) User authority management method, device and equipment applied to alliance chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40022600

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant