CN111415153A - Processing method, electronic equipment and transaction method based on block chain - Google Patents
Processing method, electronic equipment and transaction method based on block chain Download PDFInfo
- Publication number
- CN111415153A CN111415153A CN202010185576.5A CN202010185576A CN111415153A CN 111415153 A CN111415153 A CN 111415153A CN 202010185576 A CN202010185576 A CN 202010185576A CN 111415153 A CN111415153 A CN 111415153A
- Authority
- CN
- China
- Prior art keywords
- transaction information
- endorsement
- node
- transaction
- visible
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3821—Electronic credentials
- G06Q20/38215—Use of certificates or encrypted proofs of transaction rights
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Abstract
The application discloses a transaction information processing method, electronic equipment and a transaction method based on a block chain, which are used for reducing the probability of transaction information leakage in the endorsement process, so that the security of the transaction information is improved. The method comprises the following steps: extracting transaction information from a commit node within the blockchain; extracting an identifier of the transaction information, wherein the identifier is used for representing a visible range of the transaction information; uniquely determining a first operating environment for shielding other endorsement nodes under the condition that the identification of the transaction information represents that the transaction information is that at least one endorsement node is visible, wherein the number of the endorsement nodes for which the transaction information is visible is less than the total number of the endorsement nodes in the block chain; and completing the endorsement operation of the transaction information of the block chain in the first operation environment. By adopting the scheme provided by the application, the probability of revealing the transaction information in the endorsement process can be reduced, and the security of the transaction information is improved.
Description
Technical Field
The present application relates to the field of internet, and in particular, to a processing method, an electronic device, and a transaction method based on a blockchain.
Background
In recent years, the block chain technology is rapidly developed, but due to the particularity of the block chain, data on a public chain is completely and publicly shared, and the data is still in a shared state inside a permission chain, so that the transaction security problem caused by the fact that the privacy of the block chain cannot be guaranteed is regarded as a short board which currently restricts the healthy development of the industry.
For example, in the process of endorsement of a blockchain transaction information by an endorsement node, other endorsement nodes in communication with the endorsement node can see the specific endorsement process of the endorsement node on the transaction information, but some endorsement nodes are not necessarily safe in nature, that is, the endorsement process is visible to other endorsement nodes, and the risk of transaction information leakage also exists. Therefore, how to reduce the probability of the transaction information leakage in the endorsement process, thereby improving the security of the transaction information, is a technical problem to be solved urgently.
Disclosure of Invention
The embodiment of the application aims to provide a transaction information processing method, electronic equipment and a transaction method based on a block chain, so that the probability of transaction information leakage in an endorsement process is reduced, and the security of the transaction information is improved.
In order to solve the technical problem, the embodiment of the application adopts the following technical scheme: a transaction information processing method, comprising:
extracting transaction information from a commit node within the blockchain;
extracting an identifier of the transaction information, wherein the identifier is used for representing a visible range of the transaction information;
uniquely determining a first operating environment for shielding other endorsement nodes under the condition that the identification of the transaction information represents that the transaction information is that at least one endorsement node is visible, wherein the number of the endorsement nodes for which the transaction information is visible is less than the total number of the endorsement nodes in the block chain;
and completing the endorsement operation of the transaction information of the block chain in the first operation environment.
The beneficial effect of this application lies in: and under the condition that the identification of the transaction information represents that the transaction information is visible for at least one endorsement node, uniquely determining a first operation environment for shielding other endorsement nodes, and completing the endorsement operation on the transaction information of the block chain in the first operation environment, so that the other nodes cannot see locally executed endorsement operation, the probability of the transaction information leakage in the endorsement process is reduced, and the safety of the transaction information is improved.
In one embodiment, completing an endorsement operation on transaction information for a blockchain in the first operating environment comprises:
in a first operation environment, simulating and executing a transaction process corresponding to the transaction information;
verifying whether the transaction information is legal or not according to the simulation execution result;
generating an endorsement signature under the condition that the transaction information is legal;
and generating a verification result that the transaction is illegal under the condition that the transaction information is illegal.
In one embodiment, further comprising:
and setting the access authority of the endorsement result corresponding to the endorsement operation based on the visible range represented by the identification of the transaction information.
In one embodiment, the setting of the access right of the endorsement result corresponding to the endorsement operation based on the identification of the transaction information comprises:
based on the visible range represented by the identification of the transaction information is visible for the designated nodes, the set access authority is that the endorsement result can be accessed by the designated nodes and the submitting node;
and/or
And setting the access right that the endorsement result can be accessed by the submitting node based on the fact that the visible range represented by the identification of the transaction information is only locally visible.
In one embodiment, further comprising:
and responding to the execution of the endorsement operation, and feeding back the endorsement result to the submission node.
In one embodiment, the extracting the identification of the transaction information includes:
and under the condition that newly submitted transaction information exists, extracting an identification which is generated by the submitting node according to the determined visible range of the transaction information and corresponds to the visible range.
In one embodiment, further comprising:
under the condition that the identification of the transaction information represents that the transaction information is globally visible, determining that the operating environment of the transaction information is a second operating environment, wherein the second operating environment is a first operating environment or other operating environments;
and executing endorsement operation on the transaction information in a mode of shielding or not shielding other endorsement nodes in a second operation environment.
The application also provides a transaction information processing method, which comprises the following steps:
determining a visible range of transaction information in case of receiving the transaction information;
generating an identifier corresponding to the visible range according to the visible range of the transaction information;
and sending the transaction information and the identification corresponding to the transaction information to an endorsement node.
The application also provides a transaction method based on the block chain, which comprises the following steps:
under the condition of receiving the endorsement result fed back by the endorsement node, judging whether the transaction information is legal or not according to the endorsement result;
and under the condition that the transaction information is legal, sending the transaction information to a confirmation node so that the confirmation node anchors a data block generated based on the transaction information in a block chain after confirming the transaction information.
The present application further provides an electronic device, comprising:
the first extraction module is used for extracting transaction information from a submission node in the blockchain;
the second extraction module is used for extracting the identification of the transaction information, and the identification is used for representing the visible range of the transaction information;
the determining module is used for uniquely determining a first operating environment for shielding other endorsement nodes under the condition that the identification of the transaction information represents that the transaction information is visible by at least one endorsement node, wherein the number of the endorsement nodes for which the transaction information is visible is less than the total number of the endorsement nodes in the block chain;
and the endorsement module is used for completing the endorsement operation on the transaction information of the block chain in the first operation environment.
In one embodiment, an endorsement module comprises:
the simulation submodule is used for simulating and executing a transaction process corresponding to the transaction information in a first operating environment;
the verification submodule is used for verifying whether the transaction information is legal or not according to the simulation execution result;
the first generation submodule is used for generating an endorsement signature under the condition that the transaction information is legal;
and the second generation submodule is used for generating a verification result that the transaction is illegal under the condition that the transaction information is illegal.
In one embodiment, further comprising:
and the setting module is used for setting the access authority of the endorsement result corresponding to the endorsement operation based on the visible range represented by the identification of the transaction information.
In one embodiment, a setup module includes:
the first setting submodule is used for setting the access authority of the endorsement result to be accessible to the designated nodes and the submitting node based on the visibility range represented by the identification of the transaction information being visible to the designated nodes;
and the second setting submodule is used for setting the access right that the submission node can access the endorsement result based on that the visible range represented by the identification of the transaction information is appointed to be only locally visible.
In one embodiment, further comprising:
and the feedback module is used for responding to the execution of the endorsement operation and feeding back the endorsement result to the submission node.
In one embodiment, the second extraction module comprises:
and the extraction submodule is used for extracting the identification which is generated by the submitting node according to the determined visible range of the transaction information and corresponds to the visible range under the condition that the newly submitted transaction information exists.
In one embodiment, further comprising:
the determining module is used for determining that the operating environment of the transaction information is a second operating environment under the condition that the identification of the transaction information represents that the transaction information is globally visible, wherein the second operating environment is a first operating environment or other operating environments;
and the execution module is used for executing endorsement operation on the transaction information in a mode of shielding or not shielding other endorsement nodes in a second operation environment.
Drawings
Fig. 1 is a flowchart of a transaction information processing method according to an embodiment of the present application;
FIG. 2 is a flow chart of a transaction information processing method according to another embodiment of the present application;
FIG. 3 is a flow chart of a transaction information processing method according to another embodiment of the present application;
fig. 4 is a flowchart of a transaction method based on a blockchain according to an embodiment of the present application;
fig. 5 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Various aspects and features of the present application are described herein with reference to the drawings.
It will be understood that various modifications may be made to the embodiments of the present application. Accordingly, the foregoing description should not be construed as limiting, but merely as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the application and, together with a general description of the application given above and the detailed description of the embodiments given below, serve to explain the principles of the application.
These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment, given as non-limiting examples, with reference to the attached drawings.
It should also be understood that, although the present application has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of application, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.
The above and other aspects, features and advantages of the present application will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present application are described hereinafter with reference to the accompanying drawings; however, it is to be understood that the disclosed embodiments are merely exemplary of the application, which can be embodied in various forms. Well-known and/or repeated functions and constructions are not described in detail to avoid obscuring the application of unnecessary or unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present application in virtually any appropriately detailed structure.
The specification may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments in accordance with the application.
A transaction information processing method according to an embodiment of the present application is applied to an endorsement node, and as shown in fig. 1, the method includes the following steps S11 to S14:
in step S11, transaction information is extracted from the commit node within the blockchain;
in step S12, extracting an identifier of the transaction information, the identifier being used for characterizing a visible range of the transaction information;
in step S13, uniquely determining a first operating environment for shielding other endorsement nodes when the identification of the transaction information indicates that the transaction information is visible by at least one endorsement node, where the number of endorsement nodes of the visible transaction information is less than the total number of endorsement nodes in the block chain;
in step S14, the endorsement operation for the transaction information of the blockchain is completed in the first operating environment.
The execution subject of this embodiment may be an endorsement node, and in this embodiment, transaction information is extracted from a submission node in the blockchain;
the transaction corresponding to the transaction information mentioned in the application relates to data exchange in a block chain, wherein one implementation mode is as follows:
the client submits a data transfer application to a submitting node, for example, data of the client is transferred to another client (the data may be data corresponding to cryptocurrency or other types of data), the submitting node performs whole network broadcasting to an endorsement node in a block chain, then the endorsement node verifies transaction information, and feeds back a verification result to the submitting node, the submitting node performs subsequent processing based on the verification result, for example, when the verification is passed, the transaction information is subjected to an in-chain operation, that is, the transaction is anchored on the block chain, when the verification is not passed, the data transfer application submitted by the client is rejected, and prompt information that the verification is not passed is fed back to the client. Therefore, the transaction corresponding to the transaction information mentioned in the present application may be an information interaction and processing process.
The transaction information comprises an identifier for representing the visible range of the transaction information. Extracting the identification in the transaction information, judging the visible range of the transaction information through the identification, and if the identification of the transaction information indicates that the transaction information is that at least one endorsement node is visible, namely one or more endorsement nodes, but the condition that all nodes are visible is not included, namely the number of the endorsement nodes of the visible transaction information is less than the total number of the endorsement nodes in the block chain; then, the first operation environment for shielding other endorsement nodes is uniquely determined, and the endorsement operation on the transaction information of the block chain is completed in the first operation environment.
The first operating Environment may be an independent and closed operating Environment such as a TEE (Trusted Execution Environment), so as to shield other nodes from viewing endorsement operations in the operating Environment, reduce the probability of transaction information being leaked by other nodes in the endorsement process, and improve the security of the transaction information.
In the prior art, when transaction information is broadcast in a block chain, all endorsement nodes can see the transaction information and endorse the transaction information. In this embodiment, setting the visible range of the endorsement node may be implemented in an encrypted manner, for example, the submitting node may store a password in advance, send the password to a trusted node, encrypt the transaction information when receiving new transaction information, broadcast the encrypted transaction information, and at this time, only the trusted node that has received the password sent by the submitting node in advance may decrypt the encrypted transaction information.
In addition, the visible range of the transaction information can be set based on a password and policy double verification mode, specifically, the submitting node can encrypt the transaction information, then generate a target policy, and add the target policy to the transaction information, where the target policy can be a condition, and at this time, after the transaction information is broadcasted, the endorsement node can see the transaction information, but only the endorsement node that can decrypt the transaction information and satisfy the target policy can see the specific content in the transaction information and perform an endorsement operation on the transaction information.
Of course, the visible range of the transaction information may also be set in other ways.
The beneficial effect of this application lies in: under the condition that the identification of the transaction information indicates that the transaction information is visible for at least one endorsement node, uniquely determining a first operation environment for shielding other endorsement nodes, and completing the endorsement operation on the transaction information of the block chain in the first operation environment, so that the other nodes cannot see the locally executed endorsement operation, the probability of the transaction information leakage in the endorsement process is reduced, and the safety of the transaction information is improved.
In one embodiment, as shown in FIG. 2, the above step S14 can be implemented as the following steps S21-S24:
in step S21, in the first operating environment, a transaction process corresponding to the transaction information is simulated to be executed;
in step S22, whether the transaction information is legal is verified according to the result of the simulation execution;
in step S23, in the case where the transaction information is legitimate, an endorsement signature is generated;
in step S24, in the case where the transaction information is not legitimate, a verification result that the transaction is not legitimate is generated.
When the endorsement node performs the endorsement operation, the simulation transaction is locally performed to judge whether the transaction is legal, for example, judge whether the number of data transfer from the node A to the node B exceeds a threshold value, if the number exceeds the threshold value, the transaction information is determined to be illegal, if the number does not exceed the threshold value, the transaction information is determined to be legal or other conditions are continuously judged, and the process is called as simulation chain code execution. In this embodiment, in a first operating environment, performing simulated chain code execution; verifying whether the transaction information is legal or not according to the simulation execution result; generating an endorsement signature under the condition that the transaction information is legal; and generating a verification result of the illegal transaction under the condition that the transaction information is illegal.
In one embodiment, the method may also be implemented as the steps of:
and setting the access authority of the endorsement result corresponding to the endorsement operation based on the visible range represented by the identification of the transaction information.
In one embodiment, the setting of the access right to the endorsement result corresponding to the endorsement operation based on the identification of the transaction information in the above steps may be implemented as the following steps a1 and/or a 2:
in step a1, based on the visibility range represented by the identification of the transaction information being visible for the designated plurality of nodes, the set access authority is that the designated plurality of nodes and the submitting node can access the endorsement result;
in step a2, based on the identification of the transaction information that the characterized visibility range is designated as locally visible only, the access rights set are such that the submitting node can access the endorsement result.
In this embodiment, if the visible range represented by the identifier of the transaction information is that the designated multiple nodes are visible, the endorsement result can be seen by both the designated multiple nodes and the submitting node, and if the visible range represented by the identifier of the transaction information is that one node is visible, it indicates that the visible range represented by the identifier of the transaction information is that the endorsement result is only locally visible, and at this time, the set access authority is that the submitting node can access the endorsement result.
In one embodiment, the method may also be implemented as the steps of:
and feeding back the endorsement result to the submission node in response to the execution of the endorsement operation.
In this embodiment, after the endorsement node performs the endorsement operation, the endorsement result is fed back to the submitting node. Specifically, when the endorsement result comprises an endorsement signature or an illegal verification result of the transaction, a signature data packet is generated based on the endorsement signature under the condition that the endorsement result is the endorsement signature, and then the signature data packet is fed back to the submission node, and under the condition that the endorsement result is prompt information failed in verification, prompt information failed in verification is directly fed back to the submission node.
In one embodiment, the step S12 can be implemented as the following steps:
and under the condition that newly submitted transaction information exists, extracting an identification which is generated by the submitting node according to the visible range of the determined transaction information and corresponds to the visible range.
In this embodiment, when newly submitted transaction information exists, the extraction submission node generates an identifier corresponding to the visible range according to the visible range of the transaction information determined by the extraction submission node. For example, if the transaction information is globally visible, then its corresponding identifier is "public". If the visible range of the transaction information is that a plurality of designated nodes are visible, the corresponding identifier is "partially visible", and if the visible range of the transaction information is that one designated node is visible, the corresponding identifier is "private".
In one embodiment, the method may also be implemented as steps B1-B2:
in step B1, in a case that the identification of the transaction information indicates that the transaction information is globally visible, determining that the operating environment of the transaction information is a second operating environment, where the second operating environment is the first operating environment or another operating environment;
in step B2, an endorsement operation is performed on the transaction information in a second operating environment with or without masking other endorsement nodes.
In the present embodiment, for example, in the case where the identification of the transaction information is "public", it is determined that the operating environment of the transaction information is the second operating environment. The second operating environment may be the first operating environment, and in addition, the second operating environment may be another operating environment, such as a general purpose operating environment.
A transaction information processing method according to an embodiment of the present application is used for submitting a node, and as shown in fig. 3, the method includes the following steps S31 to S33:
in step S31, in the case where the transaction information is received, determining a visible range of the transaction information;
in step S32, generating an identifier corresponding to the visible range according to the visible range of the transaction information;
in step S33, the transaction information and the identifier corresponding to the transaction information are sent to the endorsement node.
In this embodiment, in the case that the transaction information is received, the visible range of the transaction information is determined, and then the identifier corresponding to the visible range is generated according to the visible range of the transaction information. If the visible range of the transaction information is that the designated nodes are visible, the generated corresponding identifier is "partially visible", and if the visible range of the transaction information is that the designated node is visible, the generated corresponding identifier is "private". And after the identifier corresponding to the visible range is generated according to the visible range of the transaction information, the transaction information and the identifier corresponding to the transaction information are sent to the endorsement node.
A block chain based transaction method according to an embodiment of the present application, for submitting nodes, as shown in fig. 4, includes the following steps S41-S42:
in step S41, when the endorsement result fed back by the endorsement node is received, determining whether the transaction information is legal according to the endorsement result;
in step S42, in the event that the transaction information is legitimate, the transaction information is sent to the confirmation node so that the confirmation node anchors the data block generated based on the transaction information in the blockchain after confirming the transaction information.
In this embodiment, when the submission node receives the endorsement result fed back by the endorsement node, it is determined whether the transaction information is legal according to the endorsement result, and when the transaction information is legal, the transaction information is sent to the confirmation node, so that the confirmation node anchors the data block generated based on the transaction information in the block chain after confirming the transaction information.
It should be noted that if the visible range of the transaction information is that one endorsement node is specified to be visible, if the endorsement result is a signature data packet, the transaction information is determined to be legal, the transaction information is sent to a confirmation node, and if the endorsement result is prompt information for failure of verification, the transaction is determined to be illegal.
If the visible range of the transaction information is that a plurality of endorsement nodes are specified to be visible, judging whether the transaction information is legal according to the endorsement result can be realized on the basis of the following modes:
in a first mode
Receiving a signature data packet and/or prompt information of verification failure returned by the endorsement node aiming at the transaction information; determining the number of endorsement nodes sending the consensus information; judging whether the ratio of the number of the received signature data packets to the number of endorsement nodes sending the consensus information reaches a preset ratio or not; and determining that the transaction is legal under the condition that the ratio of the number of the received signature data packets to the number of endorsement nodes sending the consensus information reaches a preset ratio.
For example, assume that the preset proportion is 60%, and there are 10 endorsement nodes sending the consensus information, where 7 endorsement nodes verify that the transaction corresponding to the transaction information is legal, and therefore the 7 endorsement nodes want to send the signature data packet locally, and the other 3 endorsement nodes verify that the transaction corresponding to the transaction information is illegal, and then the 3 endorsement nodes return prompt information indicating that the verification fails. It means that the ratio of the number of the received signature packets to the number of endorsement nodes sending the consensus information is 70%, which reaches a preset ratio, and thus the transaction information is legal.
In addition, it is understood that the signature packet and/or the prompt message indicating that the verification fails in the present application means that the present application may receive only the signature packet without receiving the prompt message indicating that the verification fails, or only receive the prompt message indicating that the verification fails without receiving the signature packet, or receive both the signature packet and the prompt message indicating that the verification fails. For example, 10 endorsement nodes send the consensus information, and if the verification results of the 10 endorsement nodes on the transaction information are all passed, only 10 signature data packets are locally received, and no prompt information indicating that the verification fails exists. If 7 nodes in the 10 nodes pass the verification result of the transaction information and 3 endorsement nodes fail to verify the transaction information, 7 signature data packets and 3 prompt messages of failed verification are locally received. If the 10 endorsement nodes fail to verify the transaction information, only 10 prompt messages of which the verification fails are locally received, and no signature data packet is generated.
Mode two
Receiving a signature data packet and/or prompt information of verification failure returned by the endorsement node aiming at the transaction information; judging whether the number of the received signature data packets reaches a preset number or not; and under the condition that the number of the received signature data packets reaches a preset number, determining that the transaction meets a preset condition.
For example, assuming that the preset number is 3, after receiving a signature data packet and/or prompt information of verification failure returned by the endorsement node for the transaction information, counting whether the number in the signature data packet is greater than or equal to 3, if so, determining that the transaction information is legal, and if not, determining that the transaction information is illegal.
In step S42, the transaction information is sent to the confirmation node, which then determines the transaction information based on:
and for the globally visible transaction, verifying a signature data packet of the transaction, confirming the transaction based on the endorsement signature in the signature data packet, for the partially visible transaction, verifying whether the transaction is visible by a confirmation node, if so, verifying the signature data packet of the transaction, confirming the transaction based on the endorsement signature in the signature data packet, and if not, recording the transaction hash value.
Generating a hash value for the transaction in the block chain, and when the confirmation node confirms the transaction, if the hash value corresponding to the transaction cannot be inquired, inquiring the sensitive information under a trusted execution environment if the sensitive record is quoted by the transaction information; the query may ask the submitter of the transaction information to provide the information; the query may also ask the endorsement node that endorses the transaction information to provide the information; and then, according to the obtained information, performing confirmation operation on the current data block. Data blocks generated based on the transaction information are anchored in the blockchain after the transaction information is validated.
In addition, it should be noted that, because multiple transaction information may need to be linked in the whole network at the same time, the data block generated by the transaction information is anchored before the blockchain, the confirmation node may also send the confirmed transaction information generated data block to the sorting node, and the sorting node sorts the data block generated by the transaction information of the whole network. Therefore, the chain entering operation of the whole network is more orderly, and the chain entering speed is also improved. When the sorting node enters the chain of the transaction information, the verification is also performed, but the transaction content itself is not verified, and only the identifier corresponding to the transaction, for example, the hash value of the transaction, is verified. To determine the validity of the transaction.
As shown in fig. 5, an electronic device according to an embodiment of the present application includes:
a first extraction module 51, configured to extract transaction information from a commit node in the blockchain;
a second extracting module 52, configured to extract an identifier of the transaction information, where the identifier is used to characterize a visible range of the transaction information;
the determining module 53 is configured to uniquely determine a first operating environment for shielding other endorsement nodes under the condition that the identification of the transaction information indicates that the transaction information is that at least one endorsement node is visible, where the number of endorsement nodes of the visible transaction information is less than the total number of endorsement nodes in the block chain;
and the endorsement module 54 is used for completing the endorsement operation on the transaction information of the block chain in the first operation environment.
In one embodiment, endorsement module 54 comprises:
the simulation submodule is used for simulating and executing a transaction process corresponding to the transaction information in a first operating environment;
the verification submodule is used for verifying whether the transaction information is legal or not according to the simulation execution result;
the first generation submodule is used for generating an endorsement signature under the condition that the transaction information is legal;
and the second generation submodule is used for generating a verification result that the transaction is illegal under the condition that the transaction information is illegal.
In one embodiment, further comprising:
and the setting module is used for setting the access authority of the endorsement result corresponding to the endorsement operation based on the visible range represented by the identification of the transaction information.
In one embodiment, a setup module includes:
the first setting submodule is used for setting the access authority of the endorsement result to be accessible to the designated nodes and the submitting node based on the visibility range represented by the identification of the transaction information being visible to the designated nodes;
and the second setting submodule is used for setting the access right that the submission node can access the endorsement result based on that the visible range represented by the identification of the transaction information is appointed to be only locally visible.
In one embodiment, further comprising:
and the feedback module is used for responding to the execution of the endorsement operation and feeding back the endorsement result to the submission node.
In one embodiment, the second extraction module 52 includes:
and the extraction submodule is used for extracting the identification which is generated by the submitting node according to the determined visible range of the transaction information and corresponds to the visible range under the condition that the newly submitted transaction information exists.
In one embodiment, further comprising:
the determining module is used for determining that the operating environment of the transaction information is a second operating environment under the condition that the identification of the transaction information represents that the transaction information is globally visible, wherein the second operating environment is a first operating environment or other operating environments;
and the execution module is used for executing endorsement operation on the transaction information in a mode of shielding or not shielding other endorsement nodes in a second operation environment.
The above embodiments are only exemplary embodiments of the present application, and are not intended to limit the present application, and the protection scope of the present application is defined by the claims. Various modifications and equivalents may be made by those skilled in the art within the spirit and scope of the present application and such modifications and equivalents should also be considered to be within the scope of the present application.
Claims (10)
1. A transaction information processing method, comprising:
extracting transaction information from a commit node within the blockchain;
extracting an identifier of the transaction information, wherein the identifier is used for representing a visible range of the transaction information;
uniquely determining a first operating environment for shielding other endorsement nodes under the condition that the identification of the transaction information represents that the transaction information is that at least one endorsement node is visible, wherein the number of the endorsement nodes for which the transaction information is visible is less than the total number of the endorsement nodes in the block chain;
and completing the endorsement operation of the transaction information of the block chain in the first operation environment.
2. The method of claim 1, wherein completing an endorsement operation on transaction information for a blockchain in the first operating environment comprises:
in a first operation environment, simulating and executing a transaction process corresponding to the transaction information;
verifying whether the transaction information is legal or not according to the simulation execution result;
generating an endorsement signature under the condition that the transaction information is legal;
and generating a verification result that the transaction is illegal under the condition that the transaction information is illegal.
3. The method of claim 1, further comprising:
and setting the access authority of the endorsement result corresponding to the endorsement operation based on the visible range represented by the identification of the transaction information.
4. The method of claim 3, wherein setting access rights to endorsement results corresponding to the endorsement operation based on the identification of the transaction information comprises:
based on the visible range represented by the identification of the transaction information is visible for the designated nodes, the set access authority is that the endorsement result can be accessed by the designated nodes and the submitting node;
and/or
And setting the access right that the endorsement result can be accessed by the submitting node based on the fact that the visible range represented by the identification of the transaction information is only locally visible.
5. The method of claim 3, further comprising:
and responding to the execution of the endorsement operation, and feeding back the endorsement result to the submission node.
6. The method of any of claims 1-5, the extracting the identification of the transaction information, comprising:
and under the condition that newly submitted transaction information exists, extracting an identification which is generated by the submitting node according to the determined visible range of the transaction information and corresponds to the visible range.
7. The method of claim 1, further comprising:
under the condition that the identification of the transaction information represents that the transaction information is globally visible, determining that the operating environment of the transaction information is a second operating environment, wherein the second operating environment is a first operating environment or other operating environments;
and executing endorsement operation on the transaction information in a mode of shielding or not shielding other endorsement nodes in a second operation environment.
8. A transaction information processing method, comprising:
determining a visible range of transaction information in case of receiving the transaction information;
generating an identifier corresponding to the visible range according to the visible range of the transaction information;
and sending the transaction information and the identification corresponding to the transaction information to an endorsement node.
9. A blockchain based transaction method based on the method of any one of claims 1 to 7 or the method of claim 8, further comprising:
under the condition of receiving the endorsement result fed back by the endorsement node, judging whether the transaction information is legal or not according to the endorsement result;
and under the condition that the transaction information is legal, sending the transaction information to a confirmation node so that the confirmation node anchors a data block generated based on the transaction information in a block chain after confirming the transaction information.
10. An electronic device, comprising:
the first extraction module is used for extracting transaction information from a submission node in the blockchain;
the second extraction module is used for extracting the identification of the transaction information, and the identification is used for representing the visible range of the transaction information;
the determining module is used for uniquely determining a first operating environment for shielding other endorsement nodes under the condition that the identification of the transaction information represents that the transaction information is visible by at least one endorsement node, wherein the number of the endorsement nodes for which the transaction information is visible is less than the total number of the endorsement nodes in the block chain;
and the endorsement module is used for completing the endorsement operation on the transaction information of the block chain in the first operation environment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010185576.5A CN111415153A (en) | 2020-03-17 | 2020-03-17 | Processing method, electronic equipment and transaction method based on block chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010185576.5A CN111415153A (en) | 2020-03-17 | 2020-03-17 | Processing method, electronic equipment and transaction method based on block chain |
Publications (1)
Publication Number | Publication Date |
---|---|
CN111415153A true CN111415153A (en) | 2020-07-14 |
Family
ID=71493026
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010185576.5A Pending CN111415153A (en) | 2020-03-17 | 2020-03-17 | Processing method, electronic equipment and transaction method based on block chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111415153A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113379420A (en) * | 2021-06-25 | 2021-09-10 | 远光软件股份有限公司 | Block chain execution intelligent contract method, computer equipment and block chain system |
CN114513317A (en) * | 2020-10-27 | 2022-05-17 | 香港城市大学深圳研究院 | Method, system, equipment and storage medium for resisting distributed denial of service attack |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109936626A (en) * | 2019-02-19 | 2019-06-25 | 阿里巴巴集团控股有限公司 | Method, node and the storage medium of secret protection are realized in block chain |
CN110162992A (en) * | 2019-05-31 | 2019-08-23 | 联想(北京)有限公司 | Data processing method, data processing equipment and computer system |
CN110266659A (en) * | 2019-05-31 | 2019-09-20 | 联想(北京)有限公司 | A kind of data processing method and equipment |
CN110335043A (en) * | 2019-07-03 | 2019-10-15 | 中国银行股份有限公司 | A kind of transaction method for secret protection, equipment and system based on block catenary system |
-
2020
- 2020-03-17 CN CN202010185576.5A patent/CN111415153A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109936626A (en) * | 2019-02-19 | 2019-06-25 | 阿里巴巴集团控股有限公司 | Method, node and the storage medium of secret protection are realized in block chain |
CN110162992A (en) * | 2019-05-31 | 2019-08-23 | 联想(北京)有限公司 | Data processing method, data processing equipment and computer system |
CN110266659A (en) * | 2019-05-31 | 2019-09-20 | 联想(北京)有限公司 | A kind of data processing method and equipment |
CN110335043A (en) * | 2019-07-03 | 2019-10-15 | 中国银行股份有限公司 | A kind of transaction method for secret protection, equipment and system based on block catenary system |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114513317A (en) * | 2020-10-27 | 2022-05-17 | 香港城市大学深圳研究院 | Method, system, equipment and storage medium for resisting distributed denial of service attack |
CN113379420A (en) * | 2021-06-25 | 2021-09-10 | 远光软件股份有限公司 | Block chain execution intelligent contract method, computer equipment and block chain system |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3424178B1 (en) | Deterministic reproduction of client/server computer state or output sent to one or more client computers | |
WO2021012552A1 (en) | Login processing method and related device | |
CN108616504B (en) | Sensor node identity authentication system and method based on Internet of things | |
CN110276198B (en) | Embedded variable granularity control flow verification method and system based on probability prediction | |
CN114139203B (en) | Block chain-based heterogeneous identity alliance risk assessment system and method and terminal | |
CN110855624A (en) | Safety verification method based on web interface and related equipment | |
CN111415153A (en) | Processing method, electronic equipment and transaction method based on block chain | |
CN111865993B (en) | Identity authentication management method, distributed system and readable storage medium | |
CN112865959A (en) | Consensus method of distributed node equipment, node equipment and distributed network | |
CN111131303A (en) | Request data verification system and method | |
CN113395406A (en) | Encryption authentication method and system based on power equipment fingerprints | |
CN110572392A (en) | Identity authentication method based on HyperLegger network | |
CN112954039A (en) | Block chain evidence storage method | |
CN111106929B (en) | Hash-based approval method | |
CN111401898B (en) | Transaction information verification method and electronic equipment | |
WO2021027504A1 (en) | Consensus protocol-based information processing method, and related device | |
CN109995888B (en) | Data updating method and network node of block chain Domain Name System (DNS) system | |
CN111327624B (en) | On-chain detection method and system for key information system | |
CN116934239A (en) | Flow control data processing method and device | |
CN112261008A (en) | Authentication method based on temporary token, client and server | |
CN112822217A (en) | Server access method, device, equipment and storage medium | |
Wachter et al. | Analysis of the DoIP Protocol for Security Vulnerabilities | |
CN112307519B (en) | Hierarchical verifiable query system based on selective leakage | |
CN109040031B (en) | Method for processing data message based on same local area network | |
CN114925361B (en) | Trusted platform based embedded equipment software remote auditing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |