CN111176668B - Predicter deployment method, device, electronic equipment and storage medium - Google Patents
Predicter deployment method, device, electronic equipment and storage medium Download PDFInfo
- Publication number
- CN111176668B CN111176668B CN201911398048.1A CN201911398048A CN111176668B CN 111176668 B CN111176668 B CN 111176668B CN 201911398048 A CN201911398048 A CN 201911398048A CN 111176668 B CN111176668 B CN 111176668B
- Authority
- CN
- China
- Prior art keywords
- language
- machine
- intelligent contract
- certificate
- predictive
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 50
- 238000003860 storage Methods 0.000 title claims abstract description 34
- 238000009434 installation Methods 0.000 claims abstract description 104
- 238000012795 verification Methods 0.000 claims abstract description 58
- 238000012544 monitoring process Methods 0.000 claims abstract description 8
- 230000006399 behavior Effects 0.000 description 12
- 238000010586 diagram Methods 0.000 description 12
- 238000004422 calculation algorithm Methods 0.000 description 10
- 230000008569 process Effects 0.000 description 10
- 230000008859 change Effects 0.000 description 6
- 238000005516 engineering process Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 6
- 230000008520 organization Effects 0.000 description 5
- 230000003993 interaction Effects 0.000 description 4
- 238000012545 processing Methods 0.000 description 4
- 238000004364 calculation method Methods 0.000 description 3
- 238000004891 communication Methods 0.000 description 3
- 230000007246 mechanism Effects 0.000 description 3
- RTZKZFJDLAIYFH-UHFFFAOYSA-N Diethyl ether Chemical compound CCOCC RTZKZFJDLAIYFH-UHFFFAOYSA-N 0.000 description 2
- 230000009471 action Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 239000003795 chemical substances by application Substances 0.000 description 2
- 230000000977 initiatory effect Effects 0.000 description 2
- 230000004044 response Effects 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- 241000270295 Serpentes Species 0.000 description 1
- 230000001133 acceleration Effects 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000013480 data collection Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 229910021389 graphene Inorganic materials 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000003999 initiator Substances 0.000 description 1
- 238000005304 joining Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 239000003607 modifier Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 230000001960 triggered effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
- G06F8/61—Installation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/51—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Computer Hardware Design (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present specification provides a predictive speech allocation method, apparatus, electronic device and storage medium, including: when monitoring the installation operation of the predictive phone corresponding to the business intelligent contract, sending a target transaction to the node equipment of the block chain, so that the node equipment of the block chain responds to the target transaction and inquires the download link and the check information of the installation file of the predictive phone on the block chain; acquiring download link and check information inquired by node equipment of the block chain; downloading the language predictive machine installation file through the download link, and installing the language predictive machine corresponding to the service intelligent contract in the system environment of the electronic equipment based on the language predictive machine installation file after the language predictive machine installation file is verified by using verification information.
Description
Technical Field
One or more embodiments of the present description relate to the field of computers, and in particular, to a method and apparatus for predicting word expression, an electronic device, and a storage medium.
Background
The block chain technology, also called distributed ledger technology, is an emerging technology in which several computing devices participate in "accounting" together, and a complete distributed database is maintained together. The blockchain technology has been widely used in many fields due to its characteristics of decentralization, transparency, participation of each computing device in database records, and rapid data synchronization between computing devices.
Disclosure of Invention
The present specification proposes a prediction machine deployment method, apparatus, electronic device, and storage medium.
According to a first aspect of the present specification, there is provided a method of predicting a speech utterance, the method being applied to an electronic device, the method including:
when monitoring the installation operation of the predictive phone corresponding to the business intelligent contract, sending a target transaction to the node equipment of the block chain, so that the node equipment of the block chain responds to the target transaction and inquires the download link and the check information of the installation file of the predictive phone on the block chain;
acquiring download link and check information inquired by node equipment of the block chain;
downloading the language predictive machine installation file through the download link, and installing the language predictive machine corresponding to the service intelligent contract in the system environment of the electronic equipment based on the language predictive machine installation file after the language predictive machine installation file is verified by using verification information.
Optionally, the method further includes:
generating a public and private key pair for the installed pre-talker;
sending a certificate acquisition request to a certification authority; the certificate acquisition request comprises a public key of the language predicting machine, so that after the certification authority passes the verification of the public key, a CA (certificate authority) certificate is established for the language predicting machine based on the public key, and the established CA certificate is returned to the electronic equipment;
and locally storing the CA certificate, and issuing the CA certificate to a language predictive machine intelligent contract which is deployed on the blockchain and corresponds to the language predictive machine for storage.
Optionally, the method further includes:
acquiring external data called by the service intelligent contract;
the external data are signed based on a private key of the language predicting machine, the signed external data are sent to the intelligent contract of the language predicting machine in a transaction mode, so that the intelligent contract of the language predicting machine verifies the signature of the external data based on a stored public key of the language predicting machine, and after the verification is passed, the external data are stored, and the external data are called by the intelligent contract of the business.
Optionally, the electronic device is an internet of things device.
According to a second aspect of the present specification, there is provided a prediction machine deployment apparatus, the apparatus being applied to an electronic device, the method including:
the system comprises a first sending module, a second sending module and a third sending module, wherein the first sending module is used for sending a target transaction to node equipment of a block chain when a language predictive controller installation operation corresponding to a business intelligent contract is monitored, so that the node equipment of the block chain responds to the target transaction and inquires a download link and check information of a language predictive controller installation file on the block chain;
the first acquisition module is used for acquiring the download link and the check information inquired by the node equipment of the block chain;
and the installation module is used for downloading the language predictive machine installation file through the download link, and installing the language predictive machine corresponding to the service intelligent contract in the system environment of the electronic equipment based on the language predictive machine installation file after the language predictive machine installation file is verified by using verification information.
Optionally, the apparatus further comprises:
the certificate acquisition module is used for generating a public and private key pair for the mounted talker; sending a certificate acquisition request to a certification authority; the certificate acquisition request comprises a public key of the language predicting machine, so that after the certification authority passes the verification of the public key, a CA (certificate authority) certificate is established for the language predicting machine based on the public key, and the established CA certificate is returned to the electronic equipment; and locally storing the CA certificate, and issuing the CA certificate to a language predictive machine intelligent contract which is deployed on the blockchain and corresponds to the language predictive machine for storage.
Optionally, the apparatus further comprises:
the second acquisition module is used for acquiring external data called by the service intelligent contract;
and the second sending module is used for signing the external data based on a private key of the language predictive machine, sending the signed external data to the intelligent contract of the language predictive machine in a transaction form, so that the intelligent contract of the language predictive machine verifies the signature of the external data based on the stored public key of the language predictive machine, and storing the external data after the verification is passed so as to enable the intelligent contract of the service to call the external data.
Optionally, the electronic device is an internet of things device.
According to a third aspect of the present specification, there is provided an electronic apparatus comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor implements the method of predictive word deployment by executing the executable instructions.
According to a fourth aspect of the present description, there is provided a computer readable storage medium having stored thereon computer instructions which, when executed by a processor, implement the above prophetic deployment.
As can be seen from the above description, on the one hand, when the electronic device outside the chain detects the installation operation of the predictive speech machine, the electronic device outside the chain can automatically acquire the download link and the verification information from the block chain, acquire the installation file of the predictive speech machine based on the download link and the verification information, and install the predictive speech machine locally, thereby implementing the automatic installation of the predictive speech machine and greatly improving the installation efficiency of the predictive speech machine.
On the other hand, the predicting machine is installed on an electronic device (such as an internet of things device) outside the chain, and the electronic device directly sends the data outside the chain collected by the device to the intelligent contract of the predicting machine through the predicting machine on the device, so that the data outside the chain sent to the intelligent contract of the predicting machine can be prevented from being tampered, and the safety of the data outside the chain is improved. In addition, because the internet of things equipment is usually non-open source equipment, a user cannot change programs on the internet of things equipment, and the like, the fact that the predicting machine is deployed on the internet of things equipment can prevent the user from modifying the programs of the predicting machine, and the safety that the predicting machine sends data to the intelligent contract of the predicting machine is guaranteed.
Drawings
FIG. 1 is a schematic diagram of a process for creating an intelligent contract, as shown in an exemplary embodiment of the present description;
FIG. 2 is a schematic diagram of a call to an intelligent contract, shown in an exemplary embodiment of the present description;
FIG. 3 is a schematic diagram illustrating the creation of an intelligent contract and invocation of an intelligent contract in accordance with an exemplary embodiment of the present specification;
FIG. 4 is a schematic diagram illustrating a predictive engine and smart contract communications in accordance with an exemplary embodiment of the present description;
FIG. 5 is a flow chart of a method of predictive deployment shown in an exemplary embodiment of the present description;
FIG. 6 is a schematic diagram of a prophetic deployment shown in an exemplary embodiment of the present description;
fig. 7 is a schematic structural diagram of an electronic device shown in an exemplary embodiment of the present specification;
fig. 8 is a block diagram of a propheter deployment device, shown in an exemplary embodiment of the present description.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with one or more embodiments of the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of one or more embodiments of the specification, as detailed in the claims which follow.
It should be noted that: in other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described herein. In some other embodiments, the method may include more or fewer steps than those described herein. Moreover, a single step described in this specification may be broken down into multiple steps for description in other embodiments; multiple steps described in this specification may be combined into a single step in other embodiments.
Blockchains are generally divided into three types: public chain (Public Blockchain), Private chain (Private Blockchain) and alliance chain (Consortium Blockchain). Furthermore, there may be a combination of the above types, such as private chain + federation chain, federation chain + public chain, and so on.
Among them, the most decentralized is the public chain. The public chain is represented by bitcoin and ether house, and participants (also called nodes in the block chain) joining the public chain can read data records on the chain, participate in transactions, compete for accounting rights of new blocks, and the like. Moreover, each node can freely join or leave the network and perform related operations.
Private chains are the opposite, with the network's write rights controlled by an organization or organization and the data read rights specified by the organization. Briefly, a private chain may be a weakly centralized system with strict restrictions on nodes and a small number of nodes. This type of blockchain is more suitable for use within a particular establishment.
A federation chain is a block chain between a public chain and a private chain, and "partial decentralization" can be achieved. Each node in a federation chain typically has a physical organization or organization corresponding to it; the nodes are authorized to join the network and form a benefit-related alliance, and block chain operation is maintained together.
Based on the basic characteristics of a blockchain, a blockchain is usually composed of several blocks. The time stamps corresponding to the creation time of the block are recorded in the blocks respectively, and all the blocks form a time-ordered data chain according to the time stamps recorded in the blocks strictly.
The real data generated by the physical world can be constructed into a standard transaction (transaction) format supported by a block chain, then is issued to the block chain, the node equipment in the block chain performs consensus processing on the received transaction, and after the consensus is achieved, the node equipment serving as an accounting node in the block chain packs the transaction into a block and performs persistent evidence storage in the block chain.
The consensus algorithm supported in the blockchain may include:
the first kind of consensus algorithm, namely the consensus algorithm that the node device needs to contend for the accounting right of each round of accounting period; consensus algorithms such as Proof of Work (POW), Proof of equity (POS), Proof of commission rights (DPOS), etc.;
the second kind of consensus algorithm, namely the consensus algorithm which elects accounting nodes in advance for each accounting period (without competing for accounting right); for example, a consensus algorithm such as a Practical Byzantine Fault Tolerance (PBFT) is used.
In a blockchain network employing a first type of consensus algorithm, node devices competing for billing rights can execute a transaction upon receipt. One of the node devices competing for the accounting right may win in the process of competing for the accounting right in the current round, and become an accounting node. The accounting node may package the received transaction with other transactions to generate a latest block and send the generated latest block or a block header of the latest block to other node devices for consensus.
In the block chain network adopting the second type of consensus algorithm, the node equipment with the accounting right is agreed before accounting in the current round. Thus, the node device, after receiving the transaction, may send the transaction to the accounting node if it is not the accounting node of its own round. For the accounting node of the current round, the transaction may be performed during or before packaging the transaction with other transactions to generate the latest block. After generating the latest block, the accounting node may send the latest block or a block header of the latest block to other node devices for consensus.
As described above, regardless of which consensus algorithm is used by the blockchain, the accounting node of the current round may pack the received transaction to generate the latest block, and send the generated latest block or the block header of the latest block to other node devices for consensus verification. If no problem is verified after other node equipment receives the latest block or the block header of the latest block, the latest block can be added to the tail of the original block chain, so that the accounting process of the block chain is completed. The transaction contained in the block may also be performed by other nodes in verifying the new block or block header sent by the accounting node.
In practical applications, whether public, private, or alliance, it is possible to provide the functionality of a Smart contract (Smart contract). An intelligent contract on a blockchain is a contract on a blockchain that can be executed triggered by a transaction. An intelligent contract may be defined in the form of code.
Taking an Etherhouse as an example, a user is supported to create and call some complex logic in the Etherhouse network. The ethernet workshop is used as a programmable block chain, and the core of the ethernet workshop is an ethernet workshop virtual machine (EVM), and each ethernet workshop node can run the EVM. The EVM is a well-behaved virtual machine through which various complex logic can be implemented. The user issuing and invoking smart contracts in the etherhouse is running on the EVM. In fact, the EVM directly runs virtual machine code (virtual machine bytecode, hereinafter referred to as "bytecode"), so the intelligent contract deployed on the blockchain may be bytecode.
After Bob sends a Transaction (Transaction) containing information to create a smart contract to the ethernet network, each node can execute the Transaction in the EVM, as shown in fig. 1. In fig. 1, the From field of the transaction is used To record the address of the account initiating the creation of the intelligent contract, the contract code stored in the field value of the Data field of the transaction may be bytecode, and the field value of the To field of the transaction is a null account. After the nodes reach the agreement through the consensus mechanism, the intelligent contract is successfully created, and the follow-up user can call the intelligent contract.
After the intelligent contract is established, a contract account corresponding to the intelligent contract appears on the block chain, and the block chain has a specific address; for example, "0 x68e12cf284 …" in each node in fig. 1 represents the address of the contract account created; the contract Code (Code) and account store (Storage) will be maintained in the account store for that contract account. The behavior of the intelligent contract is controlled by the contract code, while the account storage of the intelligent contract preserves the state of the contract. In other words, the intelligent contract causes a virtual account to be generated on the blockchain that contains the contract code and account storage.
As mentioned above, the Data field containing the transaction that created the intelligent contract may hold the byte code of the intelligent contract. A bytecode consists of a series of bytes, each of which can identify an operation. Based on the multiple considerations of development efficiency, readability and the like, a developer can select a high-level language to write intelligent contract codes instead of directly writing byte codes. For example, the high-level language may employ a language such as Solidity, Serpent, LLL, and the like. For intelligent contract code written in a high-level language, the intelligent contract code can be compiled by a compiler to generate byte codes which can be deployed on a blockchain.
Taking the Solidity language as an example, the contract code written by it is very similar to a Class (Class) in the object-oriented programming language, and various members including state variables, functions, function modifiers, events, etc. can be declared in one contract. A state variable is a value permanently stored in an account Storage (Storage) field of an intelligent contract to save the state of the contract.
As shown in FIG. 2, still taking the Etherhouse as an example, after Bob sends a transaction containing the information of the calling intelligent contract to the Etherhouse network, each node can execute the transaction in the EVM. In fig. 2, the From field of the transaction is used To record the address of the account initiating the intelligent contract invocation, the To field is used To record the address of the intelligent contract invocation, and the Data field of the transaction is used To record the method and parameters of the intelligent contract invocation. After invoking the smart contract, the account status of the contract account may change. Subsequently, a client may view the account status of the contract account through the accessed block link point (e.g., node 1 in fig. 2).
The intelligent contract can be independently executed at each node in the blockchain network in a specified mode, and all execution records and data are stored on the blockchain, so that after the transaction is executed, transaction certificates which cannot be tampered and lost are stored on the blockchain.
A schematic diagram of creating an intelligent contract and invoking the intelligent contract is shown in fig. 3. An intelligent contract is created in an Ethernet workshop and needs to be subjected to the processes of compiling the intelligent contract, changing the intelligent contract into byte codes, deploying the intelligent contract to a block chain and the like. The intelligent contract is called in the Ethernet workshop, a transaction pointing to the intelligent contract address is initiated, the EVM of each node can respectively execute the transaction, and the intelligent contract code is distributed and operated in the virtual machine of each node in the Ethernet workshop network.
However, the blockchain is a deterministic and closed system environment, and currently, the blockchain can only acquire data in the chain but cannot acquire data of a real world outside the chain, and the blockchain is fractured from the real world.
However, in practical applications, execution of a deployed intelligent contract on a blockchain requires not only certified data on the blockchain, but also external data under the chain. In order to make the intelligent contract accessible to external data under the chain, the prediction machine application generates the external data. The intelligent contract can use the data on the data entities outside the chain through the prediction machine, and then the data interaction between the intelligent contract and the data entities of the real world is realized. The data entities outside the chain may include, for example, centralized servers or data centers disposed outside the chain.
Referring to FIG. 4, FIG. 4 is a schematic diagram illustrating a prediction machine and intelligent contract communication in accordance with an exemplary embodiment of the present description.
As shown in fig. 4, business intelligence contracts and propheter intelligence contracts are typically deployed on a blockchain.
The intelligent contract of the prediction machine is used for interacting with the prediction machine, acquiring the off-link data required by the intelligent contract of the service from the prediction machine and providing the off-link data to the intelligent contract of the service. The prediction machine intelligence can include: an Oracle contract. The prediction machine intelligent contract is only exemplified and not particularly limited.
The service intelligent contract can be deployed on a blockchain by a user and used for completing service processing to be executed. For example, if a user needs to complete a check service, the user may deploy a service intelligent contract on the blockchain, and the node device of the blockchain may execute a check logic in the service intelligent contract to complete check processing.
Each business intelligence contract corresponds to a language prediction machine. The prediction machine can send out-of-chain data to be called by the business intelligent contract to the prediction machine intelligent contract. And then, the intelligent contract of the prediction machine sends the off-link data sent by the prediction machine to the intelligent contract of the service, thereby realizing the data interaction between the intelligent contract of the service and the off-link data entity.
The present specification aims at providing a prediction machine deployment method, in which when monitoring a prediction machine installation operation corresponding to a business intelligent contract, an electronic device outside a chain sends a target transaction to a node device of a block chain, so that the node device of the block chain queries a download link and check information of a prediction machine installation file on the block chain in response to the target transaction; receiving a download link and check information returned by the node equipment of the block chain; downloading the language predictive machine installation file through the download link, and installing the language predictive machine corresponding to the service intelligent contract in the system environment of the electronic equipment based on the language predictive machine installation file after the verification of the installation file by using verification information is passed.
On one hand, when the electronic equipment outside the chain detects the installation operation of the predictive speech machine, the electronic equipment can automatically acquire the download link and the check information from the block chain, acquire the installation file of the predictive speech machine based on the download link and the check information, and install the predictive speech machine locally, so that the automatic installation of the predictive speech machine is realized, and the installation efficiency of the predictive speech machine is greatly improved.
On the other hand, the predicting machine is installed on an electronic device (such as an internet of things device) outside the chain, and the electronic device directly sends the data outside the chain collected by the device to the intelligent contract of the predicting machine through the predicting machine on the device, so that the data outside the chain sent to the intelligent contract of the predicting machine can be prevented from being tampered, and the safety of the data outside the chain is improved. In addition, because the internet of things equipment is usually non-open source equipment, a user cannot change programs on the internet of things equipment, and the like, the fact that the predicting machine is deployed on the internet of things equipment can prevent the user from modifying the programs of the predicting machine, and the safety that the predicting machine sends data to the intelligent contract of the predicting machine is guaranteed.
Referring to fig. 5, fig. 5 is a flowchart illustrating a method for pre-speaking a program, which may be applied to an electronic device and may include the following steps, according to an exemplary embodiment of the present disclosure.
Step 502: when monitoring the installation operation of the predictive phone corresponding to the business intelligent contract, the electronic equipment sends a target transaction to the node equipment of the block chain, so that the node equipment of the block chain responds to the target transaction and inquires the download link and the verification information of the installation file of the predictive phone on the block chain.
Step 504: the electronic equipment can acquire the download link and the verification information returned by the block link point equipment.
It should be noted that, the electronic device described in this specification may include: internet of things equipment and the like. The internet of things equipment is equipment which can collect data and can perform network communication. For example, the internet of things device may include: cameras, microphones, smart bands, and the like. The internet of things device is only exemplified and not particularly limited herein.
The advantage of deploying the prediction machine on the internet of things equipment is as follows:
on the one hand, the internet of things equipment is usually non-open source equipment, a user cannot change programs on the internet of things equipment, the predicting machine is deployed on the internet of things equipment, the user can be prevented from modifying the programs of the predicting machine, and the safety of sending data to the intelligent contract of the predicting machine by the predicting machine is guaranteed.
On the other hand, the internet of things equipment can directly send the off-chain data acquired by the equipment to the intelligent contract of the language prediction machine through the language prediction machine on the equipment, so that the off-chain data sent to the intelligent contract of the language prediction machine can be prevented from being tampered, and the safety of the off-chain data is improved.
After the internet of things device provided in this specification is introduced, step 502 is described in detail below.
The developer can issue the deployed service intelligent contract identifier and the download link and the verification information of the predictive engine installation file corresponding to the service intelligent contract to the block chain for evidence storage, so that the block chain stores and verifies the corresponding relation between the service intelligent contract identifier and the download link and the verification information of the predictive engine installation file.
When monitoring the installation operation of the prediction machine corresponding to the business intelligent contract, the electronic equipment can send the target transaction to the node equipment of the block chain. The target transaction carries a business intelligence contract identifier.
In an optional implementation manner, the block link point device may directly search the download link and the check information of the language predictive controller installation file corresponding to the intelligent service combination identifier carried in the target transaction in the corresponding relationship of the block link certificate, and return the download link and the check information of the language predictive controller installation file corresponding to the intelligent service combination identifier carried in the target transaction to the electronic device. The electronic equipment can receive the download link and the verification information of the predictive speaker installation file returned by the blockchain node equipment.
In another optional implementation manner, the block link node device may invoke a search logic in an intelligent contract deployed on the block chain and used for searching for the predictive engine installation file, search for the download link and the check information of the business intelligent contract identifier corresponding to the predictive engine installation file carried in the target transaction in the corresponding relationship certified on the block chain, and write the download link and the check information of the searched predictive engine installation file into the transaction log of the target transaction in an event form.
The electronic equipment can monitor the transaction log of the target transaction and acquire the download link and the verification information of the language-predictive controller installation file from the transaction log of the target transaction.
Step 506: the electronic equipment can download the language predicting machine installation file through the download link, and install the language predicting machine corresponding to the business intelligent contract in the system environment of the electronic equipment based on the language predicting machine installation file after the verification of the installation file by using the verification information is passed.
The download link may be a URL connection or other connections, and here, the download link is only described by way of example, and the download link is not specifically limited. The predictive engine installation files may be stored on data entities down the chain. The electronic device can download the predictive speaker installation file from the data entity based on the download link. The data entities may include, for example, centralized servers or data centers deployed outside the chain, and so on.
The verification information is information for verifying the installation file of the prediction machine. For example, the check information may be a hash value of the predictive engine mount file, or the like. Here, the check information is merely exemplary and is not particularly limited.
In an embodiment of the present specification, the electronic device may access, through the download link, the data entity storing the predictive speaker installation file, and download the predictive speaker installation file from the data entity. The electronic device may then verify the predictive player installation file using the verification information. After the predictive engine installation file passes the verification, the electronic device may install the predictive engine corresponding to the business intelligence contract in a system environment of the electronic device based on the predictive engine installation file. If the predictive player installation file does not pass the verification, the electronic equipment can download the predictive player installation file again based on the download link, verify the predictive player installation file again, and reinstall the predictive player based on the predictive player installation file after the verification passes. And if the predicted machine installation files downloaded for multiple times do not pass the verification, sending prompt information to prompt a user that the predicted machine installation fails.
The following describes a manner of "checking the predictive-machine installation file using the check information".
For example, if the verification information is a hash value of the predictive machine installation file. During verification, the electronic device may perform hash operation on the downloaded predictive engine installation file to obtain a hash value of the predictive engine installation file. The electronic equipment can detect whether the check information is consistent with the hash value of the predicted machine installation file obtained through calculation. And if the verification information is consistent with the hash value of the predictive language machine installation file obtained through calculation, determining that the predictive language machine installation file passes verification. And if the verification information is inconsistent with the hash value of the predictive engine installation file obtained by calculation, determining that the predictive engine installation file is not verified.
The way of verifying the installation file of the prediction machine is described here by way of example, but there are other ways in practical application, and the verification method is not specifically limited here.
Further, in embodiments of the present specification, after the installation of the language predictive machine is completed, the electronic device may generate a public-private key pair for the installation-completed language predictive machine. The electronic device may then store the private key of the predicting machine locally and send a certificate acquisition request to the certification authority. The certificate acquisition request carries the public key of the predicting machine.
The certification authority may verify the public key of the predicting machine. After the public key is verified, the certification Authority may create a CA (certification Authority) Certificate for the talker based on the public key and return the created CA Certificate to the electronic device.
The electronic equipment can locally store the CA certificate and issue the CA certificate to a language predictive machine intelligent contract which is deployed on the blockchain and corresponds to the language predictive machine for storage.
It should be noted that the certification authority may be deployed on an off-chain data entity storing the predictive-machine installation file. Of course, in practical application, the function of applying for the CA certificate may be completed through the blockchain. The deployment location of the certification authority is not specifically limited herein.
For example, intelligent contracts for CA checking are deployed on the blockchain.
When applying for the CA certificate, the electronic device may send a transaction for applying for the CA certificate to the node device of the blockchain, where the transaction carries at least the public key of the predicting machine.
And the node equipment of the block chain can respond to the transaction, call CA (certificate Authority) verification logic in an intelligent contract deployed on the block chain, verify the public key of the prediction machine, create a CA certificate for the prediction machine based on the public key of the prediction machine after the verification is passed, and then store the created CA certificate on the block chain.
When the electronic device monitors the CA certificate of the blockchain certificate, the CA certificate of the blockchain certificate can be acquired.
The method of applying for the CA certificate for the propheter is only exemplified here, and is not particularly limited.
In addition, in this embodiment of the present specification, after the electronic device acquires the CA certificate, the electronic device may acquire external data called by the service intelligent contract. For example, the electronic device may invoke data collection hardware on the device to collect external data. Or, the electronic device may further perform analysis based on the acquired data to obtain external data to be invoked by the service intelligent contract. The electronic device is not specifically limited to acquiring the external data.
The electronic device may sign the external data based on a private key of the language predictive agent and send the signed external data to the intelligent contract of the language predictive agent in the form of a transaction.
And the intelligent contract of the language prediction machine verifies the signature of the external data based on the public key of the language prediction machine stored in the block chain, and stores the external data after the verification is passed. The intelligent contract of the prediction machine can send the stored external data to the intelligent contract of the business, or the intelligent contract of the business can call the external data stored by the intelligent contract of the prediction machine when executing.
In an alternative implementation, the electronic device may actively send external data to the predictive-machine smart contract.
For example, the electronic device may periodically obtain the external data called by the service intelligent contract, sign the external data with a private key, and send the signed external data to the language predictive intelligent contract.
In another optional implementation manner, when a service intelligent contract on a blockchain is called, if external data required by the service intelligent contract is not read from an account storage space of the forecast machine intelligent contract, the forecast machine intelligent contract may interact with the forecast machine by using an event mechanism of the intelligent contract, and the forecast machine sends the external data required by the service intelligent contract to the account storage space of the forecast machine intelligent contract.
For example, when a business intelligence contract on a blockchain is called, if external data required by the business intelligence contract is not read from an account storage space of the language prediction machine intelligence contract, the language prediction machine intelligence contract can generate an external data acquisition event, record the external data acquisition event into a transaction log of the transaction calling the intelligence contract, and store the transaction log into a storage space of a node device; the predicting machine can monitor a transaction log generated by the intelligent contract of the predicting machine stored in the storage space of the node equipment, respond to the monitored external data acquisition event after monitoring the external data acquisition event in the transaction log, and send the external data required by the intelligent contract of the service to the intelligent contract of the predicting machine.
The event mechanism of the intelligent contract is a mode for the interaction between the intelligent contract and the out-of-chain entity. For intelligent contracts deployed on blockchains, direct interaction with out-of-chain entities is generally not possible; for example, the intelligent contract cannot generally send the call result of the intelligent contract to the call initiator of the intelligent contract point to point after the call is completed.
The call results (including intermediate results and final call results) generated during the call of the intelligent contract are usually recorded in the form of events (events) to the transaction log (transactions logs) of the transaction that called the intelligent contract, and stored in the memory space of the node device. The entity outside the chain which needs to interact with the intelligent contract can acquire the calling result of the intelligent contract by monitoring the transaction log stored in the storage space of the node equipment;
for example, in the case of an Etherhouse, the transaction log will eventually be stored in the MPT receipt tree described above as part of the receipt (receipt) of the transaction pen transaction that invoked the smart contract. And the entity outside the chain interacting with the intelligent contract can monitor the transaction receipts stored in the storage space of the node device on the MPT receipt tree and acquire the events generated by the intelligent contract from the monitored transaction receipts.
As can be seen from the above description, on the one hand, when the electronic device outside the chain detects the installation operation of the predictive speech machine, the electronic device outside the chain can automatically acquire the download link and the verification information from the block chain, acquire the installation file of the predictive speech machine based on the download link and the verification information, and install the predictive speech machine locally, thereby implementing the automatic installation of the predictive speech machine and greatly improving the installation efficiency of the predictive speech machine.
On the other hand, the predicting machine is installed on an electronic device (such as an internet of things device) outside the chain, and the electronic device directly sends the data outside the chain collected by the device to the intelligent contract of the predicting machine through the predicting machine on the device, so that the data outside the chain sent to the intelligent contract of the predicting machine can be prevented from being tampered, and the safety of the data outside the chain is improved. In addition, the internet of things equipment is usually non-open source equipment, a user cannot change programs on the internet of things equipment, and the like, and the fact that the predicting machine is deployed on the internet of things equipment can prevent the user from modifying the programs of the predicting machine, and the safety that the predicting machine sends data to the intelligent contract of the predicting machine is guaranteed.
The method for deploying the pre-talker is described below by taking an electronic device as an internet of things device (e.g., a vehicle-mounted device) and taking the data entity as a TSM (trusted service manager) platform as an example.
Referring to fig. 6, fig. 6 is a schematic diagram of a prophetic deployment shown in an exemplary embodiment of the present description,
among them, the in-vehicle device in fig. 6 may collect vehicle travel data and determine driver behavior information based on the vehicle travel data. Wherein the vehicle driving data may include: vehicle speed, steering wheel rotation angle, vehicle acceleration, etc. The examples are illustrative only and not intended to be limiting.
Service intelligence contract 1, president intelligence contract and ota (over The air) intelligence contract are deployed on The zone chain in fig. 6.
The service intelligent contract 1 is used for judging the behavior of the driver based on external driving behavior information of the driver, and further judging insurance claim settlement cost and the like when the vehicle has an accident.
The intelligent contract of the prediction machine is used for interacting with the prediction machine and acquiring external data sent by the prediction machine, such as driving behavior information of a driver.
And the OTA intelligent contract is used for inquiring the download link and the verification information of the predictive player installation file.
The TSM platform in fig. 6 stores the propheter installation file and provides a CA verification function.
When the vehicle-mounted equipment detects the language predictive machine installation operation corresponding to the business intelligent contract 1, the vehicle-mounted equipment can send target transactions to the block chain.
And the node equipment of the blockchain can respond to the target transaction, call the query logic in the OTA intelligent contract deployed on the blockchain, query the downloading link and the verification information of the predictive machine installation file of the predictive machine corresponding to the service intelligent contract 1 on the blockchain, and record the downloading link and the verification information of the predictive machine installation file in an event form in a transaction log of the target transaction.
The vehicle-mounted equipment can monitor the transaction log of the target transaction and acquire the download link and the verification information of the language prediction machine installation file from the transaction log of the target transaction.
The vehicle-mounted device can download the predictive player installation file from the TSM platform based on the download link of the predictive player installation file. And then, the vehicle-mounted equipment can adopt the verification information to verify the downloaded installation file, and if the verification of the installation file passes, the vehicle-mounted equipment can locally install the prediction machine corresponding to the service intelligent contract 1 based on the installation file.
The vehicle-mounted equipment can generate a public and private key pair for the mounted pre-talker. The vehicle-mounted device can locally store the private key of the language prediction machine and send a certificate acquisition request to the TSM platform, wherein the certificate acquisition request carries the public key of the language prediction machine.
After receiving the certificate acquisition request, the TSM platform can verify a public key in the certificate acquisition request, and after the certificate is verified, a CA certificate is created for the language prediction machine based on the public key, and the created CA integer is returned to the vehicle-mounted equipment.
The vehicle-mounted equipment can locally store the CA certificate and issue the CA certificate to a language predictive machine intelligent contract which is deployed on the blockchain and corresponds to the language predictive machine for storage.
After the vehicle-mounted equipment acquires the CA certificate, the vehicle-mounted equipment can acquire the vehicle driving data which can be acquired, and determines the driver behavior information based on the vehicle driving data. Then, the vehicle-mounted equipment signs the driver behavior information based on the private key of the language prediction machine, and sends the signed driver behavior information to the intelligent contract of the language prediction machine in a transaction form. The intelligent contract of the forecasting machine verifies the signature of the driver behavior information based on the public key of the forecasting machine stored in the block chain, and stores the driver behavior information after the verification is passed, so that the stored driver behavior information is called by the intelligent contract 1 when the insurance claim settlement cost is determined, the driver behavior is judged, and the insurance claim settlement cost is determined.
The present specification also provides embodiments of a predictive speech machine deployment apparatus, corresponding to the above-described embodiments of predictive speech machine deployment methods.
Corresponding to the embodiment of the method for deploying the prediction machine, the specification also provides an embodiment of a device for deploying the prediction machine. Embodiments of the prophetic deployment apparatus of the present description may be applied to electronic devices. The device embodiments may be implemented by software, or by hardware, or by a combination of hardware and software. Taking a software implementation as an example, as a logical device, the device is formed by reading, by a processor of the electronic device where the device is located, a corresponding computer program instruction in the nonvolatile memory into the memory for operation. From a hardware aspect, as shown in fig. 7, a hardware structure diagram of an electronic device in which a predictive speech machine deployment apparatus of this specification is located is shown, except for a processor, a memory, a network interface, and a nonvolatile memory shown in fig. 7, the electronic device in which the apparatus is located in the embodiment may also include other hardware according to an actual function of the electronic device, which is not described again.
Referring to fig. 8, fig. 8 is a block diagram of a prophetic deployment device according to an exemplary embodiment of the present disclosure.
The device is applied to the electronic equipment, and the method comprises the following steps:
a first sending module 801, configured to send a target transaction to a node device of a block chain when a predictive engine installation operation corresponding to a service intelligent contract is monitored, so that the node device of the block chain responds to the target transaction, and queries, on the block chain, a download link and check information of a predictive engine installation file;
a first obtaining module 802, configured to obtain a download link and check information queried by a node device of the block chain;
the installation module 803 is configured to download the language predicting machine installation file through the download link, and install the language predicting machine corresponding to the service intelligent contract in the system environment of the electronic device based on the language predicting machine installation file after the language predicting machine installation file is verified by using the verification information.
Optionally, the apparatus further comprises:
a certificate acquisition module 804 (not shown in fig. 8) configured to generate a public-private key pair for the installed talker; sending a certificate acquisition request to a certification authority; the certificate acquisition request comprises a public key of the language predicting machine, so that after the certification authority passes the verification of the public key, a CA (certificate authority) certificate is established for the language predicting machine based on the public key, and the established CA certificate is returned to the electronic equipment; and locally storing the CA certificate, and issuing the CA certificate to a language predictive machine intelligent contract which is deployed on the blockchain and corresponds to the language predictive machine for storage.
Optionally, the apparatus further comprises:
a second obtaining module 805 (not shown in fig. 8) configured to obtain external data invoked by the service intelligent contract;
a second sending module 806 (not shown in fig. 8) configured to sign the external data based on the private key of the dialer, and send the signed external data to the dialer smart contract in a form of transaction, so that the dialer smart contract verifies the signature of the external data based on the stored public key of the dialer, and after the verification is passed, stores the external data, so that the service smart contract invokes the external data.
Optionally, the electronic device is an internet of things device.
The implementation process of the functions and actions of each module in the above device is specifically described in the implementation process of the corresponding step in the above method, and is not described herein again.
For the device embodiments, since they substantially correspond to the method embodiments, reference may be made to the partial description of the method embodiments for relevant points. The above-described embodiments of the apparatus are merely illustrative, wherein the modules described as separate parts may or may not be physically separate, and the parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network modules. Some or all of the modules can be selected according to actual needs to achieve the purpose of the solution in the specification. One of ordinary skill in the art can understand and implement it without inventive effort.
The systems, devices, modules or modules illustrated in the above embodiments may be implemented by a computer chip or an entity, or by an article of manufacture with certain functionality. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
In a typical configuration, a computer includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic disk storage, quantum memory, graphene-based storage media or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
The foregoing description has been directed to specific embodiments of this disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The terminology used in the description of the one or more embodiments is for the purpose of describing the particular embodiments only and is not intended to be limiting of the description of the one or more embodiments. As used in one or more embodiments of the present specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used in one or more embodiments of the present description to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope of one or more embodiments herein. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The above description is only for the purpose of illustrating the preferred embodiments of the one or more embodiments of the present disclosure, and is not intended to limit the scope of the one or more embodiments of the present disclosure, and any modifications, equivalent substitutions, improvements, etc. made within the spirit and principle of the one or more embodiments of the present disclosure should be included in the scope of the one or more embodiments of the present disclosure.
Claims (10)
1. A method of predictive signature, the method being applied to an electronic device, the method comprising:
when the fact that the installation operation of the language predictive machine corresponding to the intelligent business contract is monitored, sending a target transaction to node equipment of a block chain, so that the node equipment of the block chain responds to the target transaction, and searching for a downloading link and verification information of the installation file of the language predictive machine corresponding to the intelligent business contract identification according to the intelligent business contract identification carried by the target transaction in the corresponding relation among the intelligent business contract identification stored on the block chain, the downloading link and the verification information of the installation file of the language predictive machine;
acquiring download link and check information inquired by node equipment of the block chain;
downloading the language predictive machine installation file through the download link, and installing the language predictive machine corresponding to the service intelligent contract in the system environment of the electronic equipment based on the language predictive machine installation file after the language predictive machine installation file is verified by using verification information.
2. The method of claim 1, further comprising:
generating a public and private key pair for the installed pre-talker;
sending a certificate acquisition request to a certification authority; the certificate acquisition request comprises a public key of the language predicting machine, so that after the certification authority passes the verification of the public key, a CA (certificate authority) certificate is established for the language predicting machine based on the public key, and the established CA certificate is returned to the electronic equipment;
and locally storing the CA certificate, and issuing the CA certificate to a language predictive machine intelligent contract which is deployed on the blockchain and corresponds to the language predictive machine for storage.
3. The method of claim 2, further comprising:
acquiring external data called by the service intelligent contract;
the external data are signed based on a private key of the language predicting machine, the signed external data are sent to the intelligent contract of the language predicting machine in a transaction mode, so that the intelligent contract of the language predicting machine verifies the signature of the external data based on a stored public key of the language predicting machine, and after the verification is passed, the external data are stored, and the external data are called by the intelligent contract of the business.
4. The method of claim 1, the electronic device being an internet of things device.
5. A propler deployment apparatus, the apparatus being applied to an electronic device, the apparatus comprising:
the device comprises a first sending module, a second sending module and a third sending module, wherein the first sending module is used for sending a target transaction to node equipment of a block chain when monitoring the installation operation of a language predictive controller corresponding to a business intelligent contract, so that the node equipment of the block chain responds to the target transaction, and searching for a downloading link and verification information of a language predictive controller installation file corresponding to the business intelligent contract identifier according to the corresponding relation of the business intelligent contract identifier carried by the target transaction among a business intelligent contract identifier, a downloading link and verification information of the language predictive controller installation file stored on the block chain;
the first acquisition module is used for acquiring the download link and the check information inquired by the node equipment of the block chain;
and the installation module is used for downloading the language predictive machine installation file through the download link, and installing the language predictive machine corresponding to the service intelligent contract in the system environment of the electronic equipment based on the language predictive machine installation file after the language predictive machine installation file is verified by using verification information.
6. The apparatus of claim 5, the apparatus further comprising:
the certificate acquisition module is used for generating a public and private key pair for the mounted talker; sending a certificate acquisition request to a certification authority; the certificate acquisition request comprises a public key of the language predicting machine, so that after the certification authority passes the verification of the public key, a CA (certificate authority) certificate is established for the language predicting machine based on the public key, and the established CA certificate is returned to the electronic equipment; and locally storing the CA certificate, and issuing the CA certificate to a language predictive machine intelligent contract which is deployed on the blockchain and corresponds to the language predictive machine for storage.
7. The apparatus of claim 5, the apparatus further comprising:
the second acquisition module is used for acquiring external data called by the service intelligent contract;
and the second sending module is used for signing the external data based on a private key of the language predictive machine, sending the signed external data to the intelligent contract of the language predictive machine in a transaction form, so that the intelligent contract of the language predictive machine verifies the signature of the external data based on the stored public key of the language predictive machine, and storing the external data after the verification is passed so as to enable the intelligent contract of the service to call the external data.
8. The apparatus of claim 5, the electronic device being an Internet of things device.
9. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor implements the method of any one of claims 1-4 by executing the executable instructions.
10. A computer readable storage medium having stored thereon computer instructions which, when executed by a processor, carry out the steps of the method according to any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911398048.1A CN111176668B (en) | 2019-12-30 | 2019-12-30 | Predicter deployment method, device, electronic equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911398048.1A CN111176668B (en) | 2019-12-30 | 2019-12-30 | Predicter deployment method, device, electronic equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111176668A CN111176668A (en) | 2020-05-19 |
CN111176668B true CN111176668B (en) | 2022-04-22 |
Family
ID=70657595
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911398048.1A Active CN111176668B (en) | 2019-12-30 | 2019-12-30 | Predicter deployment method, device, electronic equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111176668B (en) |
Families Citing this family (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111401903B (en) * | 2020-06-03 | 2020-09-11 | 腾讯科技(深圳)有限公司 | Block chain message processing method, device, computer and readable storage medium |
CN112214502B (en) * | 2020-08-28 | 2023-07-07 | 迅鳐成都科技有限公司 | User contract deployment method, device and system of alliance chain and storage medium |
CN112417034A (en) * | 2020-10-19 | 2021-02-26 | 易联众信息技术股份有限公司 | Block chain-based method and system for selecting predictive speech machine service |
CN112948465B (en) * | 2021-03-10 | 2022-09-06 | 工银科技有限公司 | Data processing method and device based on block chain |
CN113010561B (en) * | 2021-03-31 | 2022-09-06 | 工银科技有限公司 | Data acquisition method and device based on super account book and computer system |
CN113076371A (en) * | 2021-04-29 | 2021-07-06 | 中国工商银行股份有限公司 | Service management method, device and system based on language prediction machine-as-a-service platform |
CN113469658A (en) * | 2021-07-12 | 2021-10-01 | 支付宝(杭州)信息技术有限公司 | Block chain-based physical seal using method and device and electronic equipment |
CN113469827B (en) * | 2021-07-23 | 2023-04-18 | 电子科技大学 | Insurance claim settlement device and method based on hybrid intelligent contract |
CN113872828B (en) * | 2021-09-27 | 2022-12-30 | 深圳前海微众银行股份有限公司 | State monitoring method for block chain prediction machine |
CN114781003B (en) * | 2022-05-19 | 2024-09-24 | 马上消费金融股份有限公司 | Data verification and data updating method and system |
CN115396165B (en) * | 2022-08-15 | 2024-05-14 | 中国联合网络通信集团有限公司 | File management method and device, electronic equipment and storage medium |
CN116684430B (en) * | 2023-06-13 | 2024-03-08 | 山东大学 | Distributed bidirectional predictor and blockchain system |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105786564A (en) * | 2016-02-22 | 2016-07-20 | 上海新炬网络信息技术有限公司 | Automatic custom installation and deployment method for Oracle |
CN106325954A (en) * | 2016-08-30 | 2017-01-11 | 广西电网有限责任公司 | Oracle and Weblogic combined one-key automatic deployment method |
CN108768657A (en) * | 2018-04-17 | 2018-11-06 | 深圳技术大学(筹) | A kind of digital certificate based on block platform chain issues system and method |
CN108830714A (en) * | 2018-05-28 | 2018-11-16 | 拜迪网络科技(上海)有限公司 | Block chain foretells machine |
CN109375943A (en) * | 2018-10-18 | 2019-02-22 | 中国银行股份有限公司 | A kind of program file generation method and device |
CN109727131A (en) * | 2018-12-28 | 2019-05-07 | 苏州鸿链信息科技有限公司 | Method of commerce and system are executed under a kind of chain based on block chain contract layer |
CN110471984A (en) * | 2019-07-15 | 2019-11-19 | 阿里巴巴集团控股有限公司 | Method for processing business and device, electronic equipment based on block chain |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7716240B2 (en) * | 2005-12-29 | 2010-05-11 | Nextlabs, Inc. | Techniques and system to deploy policies intelligently |
-
2019
- 2019-12-30 CN CN201911398048.1A patent/CN111176668B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105786564A (en) * | 2016-02-22 | 2016-07-20 | 上海新炬网络信息技术有限公司 | Automatic custom installation and deployment method for Oracle |
CN106325954A (en) * | 2016-08-30 | 2017-01-11 | 广西电网有限责任公司 | Oracle and Weblogic combined one-key automatic deployment method |
CN108768657A (en) * | 2018-04-17 | 2018-11-06 | 深圳技术大学(筹) | A kind of digital certificate based on block platform chain issues system and method |
CN108830714A (en) * | 2018-05-28 | 2018-11-16 | 拜迪网络科技(上海)有限公司 | Block chain foretells machine |
CN109375943A (en) * | 2018-10-18 | 2019-02-22 | 中国银行股份有限公司 | A kind of program file generation method and device |
CN109727131A (en) * | 2018-12-28 | 2019-05-07 | 苏州鸿链信息科技有限公司 | Method of commerce and system are executed under a kind of chain based on block chain contract layer |
CN110471984A (en) * | 2019-07-15 | 2019-11-19 | 阿里巴巴集团控股有限公司 | Method for processing business and device, electronic equipment based on block chain |
Non-Patent Citations (3)
Title |
---|
Install Your Oracle Blockchain Platform Instance;佚名;《https://docs.oracle.com/en/database/other-databases/blockchain-enterprise/19.3/administer/install-your-blockchain-platform-instance.html#GUID-B6390464-6C35-4611-B607-F4773202284F》;20190826;全文 * |
蚂蚁区块链第18课 区块链预言机(ORACLE)的定义及在蚂蚁BAAS中的使用;笔名辉哥;《https://www.jianshu.com/p/2b9ff4add943》;20190410;全文 * |
贝尔链(BaerChain):区块链中的预言机是什么?;传媒电讯;《https://www.jianshu.com/p/0c40bf408f84》;20181217;全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN111176668A (en) | 2020-05-19 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111176668B (en) | Predicter deployment method, device, electronic equipment and storage medium | |
US10785168B2 (en) | Allocating virtual resource based on block chain | |
CN113836227B (en) | Asset purchasing method and device based on blockchain and electronic equipment | |
CN107562513B (en) | Intelligent contract life cycle management method based on JAVA | |
CN110032599B (en) | Data structure reading and updating method and device, and electronic equipment | |
CN112200571B (en) | Resource distribution method and device based on block chain and electronic equipment | |
CN111079101B (en) | Method and device for obtaining evidence of infringement based on block chain, electronic equipment and storage medium | |
CN111681017A (en) | Goods batch true checking method and device based on block chain and electronic equipment | |
CN113554516A (en) | Block chain-based default asset processing method and device and electronic equipment | |
CN113037817B (en) | Method and device for starting intelligent contract, electronic equipment and storage medium | |
CN112101938B (en) | Digital seal using method and device based on block chain and electronic equipment | |
CN112819616A (en) | Block chain-based original work transaction method and device and electronic equipment | |
CN110046523B (en) | Intelligent contract checking method and device and electronic equipment | |
CN111651467B (en) | Block chain node interface issuing and calling method and device | |
CN112200568B (en) | Block chain based account creation method and device and electronic equipment | |
CN112200567A (en) | Resource management method and device based on block chain and electronic equipment | |
CN111679902B (en) | Intelligent contract calling method and device based on block chain and electronic equipment | |
CN111506652A (en) | Traffic accident handling method and device based on block chain and electronic equipment | |
CN112200572A (en) | Resource distribution method and device based on block chain and electronic equipment | |
CN113469815A (en) | Data management method and device | |
CN113077260A (en) | Data access method and device based on block chain and electronic equipment | |
CN112200570A (en) | Resource distribution method and device based on block chain and electronic equipment | |
CN114119243B (en) | Pool financing management method and device based on blockchain, medium and electronic equipment | |
CN113536384B (en) | Block chain-based private data mapping method, block chain-based private data mapping device, block chain-based private data mapping medium and electronic equipment | |
CN115203746A (en) | Data account access authorization method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20200702 Address after: Unit 02, 20 / F, block a, building 4, Lane 838, Huangpi South Road, Huangpu District, Shanghai 200025 Applicant after: Ant blockchain Technology (Shanghai) Co., Ltd Address before: 801-11, Section B, 8th floor, No. 556, Xixi Road, Xihu District, Hangzhou City, Zhejiang Province Applicant before: Alipay (Hangzhou) Information Technology Co.,Ltd. |
|
GR01 | Patent grant | ||
GR01 | Patent grant |