CN111415153A - Processing method, electronic equipment and transaction method based on block chain - Google Patents

Processing method, electronic equipment and transaction method based on block chain Download PDF

Info

Publication number
CN111415153A
CN111415153A CN202010185576.5A CN202010185576A CN111415153A CN 111415153 A CN111415153 A CN 111415153A CN 202010185576 A CN202010185576 A CN 202010185576A CN 111415153 A CN111415153 A CN 111415153A
Authority
CN
China
Prior art keywords
transaction information
endorsement
node
transaction
visible
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010185576.5A
Other languages
Chinese (zh)
Inventor
王云浩
帅斌成
李永鹏
杨四雄
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Lenovo Beijing Ltd
Original Assignee
Lenovo Beijing Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Lenovo Beijing Ltd filed Critical Lenovo Beijing Ltd
Priority to CN202010185576.5A priority Critical patent/CN111415153A/en
Publication of CN111415153A publication Critical patent/CN111415153A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The application discloses a transaction information processing method, electronic equipment and a transaction method based on a block chain, which are used for reducing the probability of transaction information leakage in the endorsement process, so that the security of the transaction information is improved. The method comprises the following steps: extracting transaction information from a commit node within the blockchain; extracting an identifier of the transaction information, wherein the identifier is used for representing a visible range of the transaction information; uniquely determining a first operating environment for shielding other endorsement nodes under the condition that the identification of the transaction information represents that the transaction information is that at least one endorsement node is visible, wherein the number of the endorsement nodes for which the transaction information is visible is less than the total number of the endorsement nodes in the block chain; and completing the endorsement operation of the transaction information of the block chain in the first operation environment. By adopting the scheme provided by the application, the probability of revealing the transaction information in the endorsement process can be reduced, and the security of the transaction information is improved.

Description

Processing method, electronic equipment and transaction method based on block chain
Technical Field
The present application relates to the field of internet, and in particular, to a processing method, an electronic device, and a transaction method based on a blockchain.
Background
In recent years, the block chain technology is rapidly developed, but due to the particularity of the block chain, data on a public chain is completely and publicly shared, and the data is still in a shared state inside a permission chain, so that the transaction security problem caused by the fact that the privacy of the block chain cannot be guaranteed is regarded as a short board which currently restricts the healthy development of the industry.
For example, in the process of endorsement of a blockchain transaction information by an endorsement node, other endorsement nodes in communication with the endorsement node can see the specific endorsement process of the endorsement node on the transaction information, but some endorsement nodes are not necessarily safe in nature, that is, the endorsement process is visible to other endorsement nodes, and the risk of transaction information leakage also exists. Therefore, how to reduce the probability of the transaction information leakage in the endorsement process, thereby improving the security of the transaction information, is a technical problem to be solved urgently.
Disclosure of Invention
The embodiment of the application aims to provide a transaction information processing method, electronic equipment and a transaction method based on a block chain, so that the probability of transaction information leakage in an endorsement process is reduced, and the security of the transaction information is improved.
In order to solve the technical problem, the embodiment of the application adopts the following technical scheme: a transaction information processing method, comprising:
extracting transaction information from a commit node within the blockchain;
extracting an identifier of the transaction information, wherein the identifier is used for representing a visible range of the transaction information;
uniquely determining a first operating environment for shielding other endorsement nodes under the condition that the identification of the transaction information represents that the transaction information is that at least one endorsement node is visible, wherein the number of the endorsement nodes for which the transaction information is visible is less than the total number of the endorsement nodes in the block chain;
and completing the endorsement operation of the transaction information of the block chain in the first operation environment.
The beneficial effect of this application lies in: and under the condition that the identification of the transaction information represents that the transaction information is visible for at least one endorsement node, uniquely determining a first operation environment for shielding other endorsement nodes, and completing the endorsement operation on the transaction information of the block chain in the first operation environment, so that the other nodes cannot see locally executed endorsement operation, the probability of the transaction information leakage in the endorsement process is reduced, and the safety of the transaction information is improved.
In one embodiment, completing an endorsement operation on transaction information for a blockchain in the first operating environment comprises:
in a first operation environment, simulating and executing a transaction process corresponding to the transaction information;
verifying whether the transaction information is legal or not according to the simulation execution result;
generating an endorsement signature under the condition that the transaction information is legal;
and generating a verification result that the transaction is illegal under the condition that the transaction information is illegal.
In one embodiment, further comprising:
and setting the access authority of the endorsement result corresponding to the endorsement operation based on the visible range represented by the identification of the transaction information.
In one embodiment, the setting of the access right of the endorsement result corresponding to the endorsement operation based on the identification of the transaction information comprises:
based on the visible range represented by the identification of the transaction information is visible for the designated nodes, the set access authority is that the endorsement result can be accessed by the designated nodes and the submitting node;
and/or
And setting the access right that the endorsement result can be accessed by the submitting node based on the fact that the visible range represented by the identification of the transaction information is only locally visible.
In one embodiment, further comprising:
and responding to the execution of the endorsement operation, and feeding back the endorsement result to the submission node.
In one embodiment, the extracting the identification of the transaction information includes:
and under the condition that newly submitted transaction information exists, extracting an identification which is generated by the submitting node according to the determined visible range of the transaction information and corresponds to the visible range.
In one embodiment, further comprising:
under the condition that the identification of the transaction information represents that the transaction information is globally visible, determining that the operating environment of the transaction information is a second operating environment, wherein the second operating environment is a first operating environment or other operating environments;
and executing endorsement operation on the transaction information in a mode of shielding or not shielding other endorsement nodes in a second operation environment.
The application also provides a transaction information processing method, which comprises the following steps:
determining a visible range of transaction information in case of receiving the transaction information;
generating an identifier corresponding to the visible range according to the visible range of the transaction information;
and sending the transaction information and the identification corresponding to the transaction information to an endorsement node.
The application also provides a transaction method based on the block chain, which comprises the following steps:
under the condition of receiving the endorsement result fed back by the endorsement node, judging whether the transaction information is legal or not according to the endorsement result;
and under the condition that the transaction information is legal, sending the transaction information to a confirmation node so that the confirmation node anchors a data block generated based on the transaction information in a block chain after confirming the transaction information.
The present application further provides an electronic device, comprising:
the first extraction module is used for extracting transaction information from a submission node in the blockchain;
the second extraction module is used for extracting the identification of the transaction information, and the identification is used for representing the visible range of the transaction information;
the determining module is used for uniquely determining a first operating environment for shielding other endorsement nodes under the condition that the identification of the transaction information represents that the transaction information is visible by at least one endorsement node, wherein the number of the endorsement nodes for which the transaction information is visible is less than the total number of the endorsement nodes in the block chain;
and the endorsement module is used for completing the endorsement operation on the transaction information of the block chain in the first operation environment.
In one embodiment, an endorsement module comprises:
the simulation submodule is used for simulating and executing a transaction process corresponding to the transaction information in a first operating environment;
the verification submodule is used for verifying whether the transaction information is legal or not according to the simulation execution result;
the first generation submodule is used for generating an endorsement signature under the condition that the transaction information is legal;
and the second generation submodule is used for generating a verification result that the transaction is illegal under the condition that the transaction information is illegal.
In one embodiment, further comprising:
and the setting module is used for setting the access authority of the endorsement result corresponding to the endorsement operation based on the visible range represented by the identification of the transaction information.
In one embodiment, a setup module includes:
the first setting submodule is used for setting the access authority of the endorsement result to be accessible to the designated nodes and the submitting node based on the visibility range represented by the identification of the transaction information being visible to the designated nodes;
and the second setting submodule is used for setting the access right that the submission node can access the endorsement result based on that the visible range represented by the identification of the transaction information is appointed to be only locally visible.
In one embodiment, further comprising:
and the feedback module is used for responding to the execution of the endorsement operation and feeding back the endorsement result to the submission node.
In one embodiment, the second extraction module comprises:
and the extraction submodule is used for extracting the identification which is generated by the submitting node according to the determined visible range of the transaction information and corresponds to the visible range under the condition that the newly submitted transaction information exists.
In one embodiment, further comprising:
the determining module is used for determining that the operating environment of the transaction information is a second operating environment under the condition that the identification of the transaction information represents that the transaction information is globally visible, wherein the second operating environment is a first operating environment or other operating environments;
and the execution module is used for executing endorsement operation on the transaction information in a mode of shielding or not shielding other endorsement nodes in a second operation environment.
Drawings
Fig. 1 is a flowchart of a transaction information processing method according to an embodiment of the present application;
FIG. 2 is a flow chart of a transaction information processing method according to another embodiment of the present application;
FIG. 3 is a flow chart of a transaction information processing method according to another embodiment of the present application;
fig. 4 is a flowchart of a transaction method based on a blockchain according to an embodiment of the present application;
fig. 5 is a block diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Various aspects and features of the present application are described herein with reference to the drawings.
It will be understood that various modifications may be made to the embodiments of the present application. Accordingly, the foregoing description should not be construed as limiting, but merely as exemplifications of embodiments. Those skilled in the art will envision other modifications within the scope and spirit of the application.
The accompanying drawings, which are incorporated in and constitute a part of the specification, illustrate embodiments of the application and, together with a general description of the application given above and the detailed description of the embodiments given below, serve to explain the principles of the application.
These and other characteristics of the present application will become apparent from the following description of preferred forms of embodiment, given as non-limiting examples, with reference to the attached drawings.
It should also be understood that, although the present application has been described with reference to some specific examples, a person of skill in the art shall certainly be able to achieve many other equivalent forms of application, having the characteristics as set forth in the claims and hence all coming within the field of protection defined thereby.
The above and other aspects, features and advantages of the present application will become more apparent in view of the following detailed description when taken in conjunction with the accompanying drawings.
Specific embodiments of the present application are described hereinafter with reference to the accompanying drawings; however, it is to be understood that the disclosed embodiments are merely exemplary of the application, which can be embodied in various forms. Well-known and/or repeated functions and constructions are not described in detail to avoid obscuring the application of unnecessary or unnecessary detail. Therefore, specific structural and functional details disclosed herein are not to be interpreted as limiting, but merely as a basis for the claims and as a representative basis for teaching one skilled in the art to variously employ the present application in virtually any appropriately detailed structure.
The specification may use the phrases "in one embodiment," "in another embodiment," "in yet another embodiment," or "in other embodiments," which may each refer to one or more of the same or different embodiments in accordance with the application.
A transaction information processing method according to an embodiment of the present application is applied to an endorsement node, and as shown in fig. 1, the method includes the following steps S11 to S14:
in step S11, transaction information is extracted from the commit node within the blockchain;
in step S12, extracting an identifier of the transaction information, the identifier being used for characterizing a visible range of the transaction information;
in step S13, uniquely determining a first operating environment for shielding other endorsement nodes when the identification of the transaction information indicates that the transaction information is visible by at least one endorsement node, where the number of endorsement nodes of the visible transaction information is less than the total number of endorsement nodes in the block chain;
in step S14, the endorsement operation for the transaction information of the blockchain is completed in the first operating environment.
The execution subject of this embodiment may be an endorsement node, and in this embodiment, transaction information is extracted from a submission node in the blockchain;
the transaction corresponding to the transaction information mentioned in the application relates to data exchange in a block chain, wherein one implementation mode is as follows:
the client submits a data transfer application to a submitting node, for example, data of the client is transferred to another client (the data may be data corresponding to cryptocurrency or other types of data), the submitting node performs whole network broadcasting to an endorsement node in a block chain, then the endorsement node verifies transaction information, and feeds back a verification result to the submitting node, the submitting node performs subsequent processing based on the verification result, for example, when the verification is passed, the transaction information is subjected to an in-chain operation, that is, the transaction is anchored on the block chain, when the verification is not passed, the data transfer application submitted by the client is rejected, and prompt information that the verification is not passed is fed back to the client. Therefore, the transaction corresponding to the transaction information mentioned in the present application may be an information interaction and processing process.
The transaction information comprises an identifier for representing the visible range of the transaction information. Extracting the identification in the transaction information, judging the visible range of the transaction information through the identification, and if the identification of the transaction information indicates that the transaction information is that at least one endorsement node is visible, namely one or more endorsement nodes, but the condition that all nodes are visible is not included, namely the number of the endorsement nodes of the visible transaction information is less than the total number of the endorsement nodes in the block chain; then, the first operation environment for shielding other endorsement nodes is uniquely determined, and the endorsement operation on the transaction information of the block chain is completed in the first operation environment.
The first operating Environment may be an independent and closed operating Environment such as a TEE (Trusted Execution Environment), so as to shield other nodes from viewing endorsement operations in the operating Environment, reduce the probability of transaction information being leaked by other nodes in the endorsement process, and improve the security of the transaction information.
In the prior art, when transaction information is broadcast in a block chain, all endorsement nodes can see the transaction information and endorse the transaction information. In this embodiment, setting the visible range of the endorsement node may be implemented in an encrypted manner, for example, the submitting node may store a password in advance, send the password to a trusted node, encrypt the transaction information when receiving new transaction information, broadcast the encrypted transaction information, and at this time, only the trusted node that has received the password sent by the submitting node in advance may decrypt the encrypted transaction information.
In addition, the visible range of the transaction information can be set based on a password and policy double verification mode, specifically, the submitting node can encrypt the transaction information, then generate a target policy, and add the target policy to the transaction information, where the target policy can be a condition, and at this time, after the transaction information is broadcasted, the endorsement node can see the transaction information, but only the endorsement node that can decrypt the transaction information and satisfy the target policy can see the specific content in the transaction information and perform an endorsement operation on the transaction information.
Of course, the visible range of the transaction information may also be set in other ways.
The beneficial effect of this application lies in: under the condition that the identification of the transaction information indicates that the transaction information is visible for at least one endorsement node, uniquely determining a first operation environment for shielding other endorsement nodes, and completing the endorsement operation on the transaction information of the block chain in the first operation environment, so that the other nodes cannot see the locally executed endorsement operation, the probability of the transaction information leakage in the endorsement process is reduced, and the safety of the transaction information is improved.
In one embodiment, as shown in FIG. 2, the above step S14 can be implemented as the following steps S21-S24:
in step S21, in the first operating environment, a transaction process corresponding to the transaction information is simulated to be executed;
in step S22, whether the transaction information is legal is verified according to the result of the simulation execution;
in step S23, in the case where the transaction information is legitimate, an endorsement signature is generated;
in step S24, in the case where the transaction information is not legitimate, a verification result that the transaction is not legitimate is generated.
When the endorsement node performs the endorsement operation, the simulation transaction is locally performed to judge whether the transaction is legal, for example, judge whether the number of data transfer from the node A to the node B exceeds a threshold value, if the number exceeds the threshold value, the transaction information is determined to be illegal, if the number does not exceed the threshold value, the transaction information is determined to be legal or other conditions are continuously judged, and the process is called as simulation chain code execution. In this embodiment, in a first operating environment, performing simulated chain code execution; verifying whether the transaction information is legal or not according to the simulation execution result; generating an endorsement signature under the condition that the transaction information is legal; and generating a verification result of the illegal transaction under the condition that the transaction information is illegal.
In one embodiment, the method may also be implemented as the steps of:
and setting the access authority of the endorsement result corresponding to the endorsement operation based on the visible range represented by the identification of the transaction information.
In one embodiment, the setting of the access right to the endorsement result corresponding to the endorsement operation based on the identification of the transaction information in the above steps may be implemented as the following steps a1 and/or a 2:
in step a1, based on the visibility range represented by the identification of the transaction information being visible for the designated plurality of nodes, the set access authority is that the designated plurality of nodes and the submitting node can access the endorsement result;
in step a2, based on the identification of the transaction information that the characterized visibility range is designated as locally visible only, the access rights set are such that the submitting node can access the endorsement result.
In this embodiment, if the visible range represented by the identifier of the transaction information is that the designated multiple nodes are visible, the endorsement result can be seen by both the designated multiple nodes and the submitting node, and if the visible range represented by the identifier of the transaction information is that one node is visible, it indicates that the visible range represented by the identifier of the transaction information is that the endorsement result is only locally visible, and at this time, the set access authority is that the submitting node can access the endorsement result.
In one embodiment, the method may also be implemented as the steps of:
and feeding back the endorsement result to the submission node in response to the execution of the endorsement operation.
In this embodiment, after the endorsement node performs the endorsement operation, the endorsement result is fed back to the submitting node. Specifically, when the endorsement result comprises an endorsement signature or an illegal verification result of the transaction, a signature data packet is generated based on the endorsement signature under the condition that the endorsement result is the endorsement signature, and then the signature data packet is fed back to the submission node, and under the condition that the endorsement result is prompt information failed in verification, prompt information failed in verification is directly fed back to the submission node.
In one embodiment, the step S12 can be implemented as the following steps:
and under the condition that newly submitted transaction information exists, extracting an identification which is generated by the submitting node according to the visible range of the determined transaction information and corresponds to the visible range.
In this embodiment, when newly submitted transaction information exists, the extraction submission node generates an identifier corresponding to the visible range according to the visible range of the transaction information determined by the extraction submission node. For example, if the transaction information is globally visible, then its corresponding identifier is "public". If the visible range of the transaction information is that a plurality of designated nodes are visible, the corresponding identifier is "partially visible", and if the visible range of the transaction information is that one designated node is visible, the corresponding identifier is "private".
In one embodiment, the method may also be implemented as steps B1-B2:
in step B1, in a case that the identification of the transaction information indicates that the transaction information is globally visible, determining that the operating environment of the transaction information is a second operating environment, where the second operating environment is the first operating environment or another operating environment;
in step B2, an endorsement operation is performed on the transaction information in a second operating environment with or without masking other endorsement nodes.
In the present embodiment, for example, in the case where the identification of the transaction information is "public", it is determined that the operating environment of the transaction information is the second operating environment. The second operating environment may be the first operating environment, and in addition, the second operating environment may be another operating environment, such as a general purpose operating environment.
A transaction information processing method according to an embodiment of the present application is used for submitting a node, and as shown in fig. 3, the method includes the following steps S31 to S33:
in step S31, in the case where the transaction information is received, determining a visible range of the transaction information;
in step S32, generating an identifier corresponding to the visible range according to the visible range of the transaction information;
in step S33, the transaction information and the identifier corresponding to the transaction information are sent to the endorsement node.
In this embodiment, in the case that the transaction information is received, the visible range of the transaction information is determined, and then the identifier corresponding to the visible range is generated according to the visible range of the transaction information. If the visible range of the transaction information is that the designated nodes are visible, the generated corresponding identifier is "partially visible", and if the visible range of the transaction information is that the designated node is visible, the generated corresponding identifier is "private". And after the identifier corresponding to the visible range is generated according to the visible range of the transaction information, the transaction information and the identifier corresponding to the transaction information are sent to the endorsement node.
A block chain based transaction method according to an embodiment of the present application, for submitting nodes, as shown in fig. 4, includes the following steps S41-S42:
in step S41, when the endorsement result fed back by the endorsement node is received, determining whether the transaction information is legal according to the endorsement result;
in step S42, in the event that the transaction information is legitimate, the transaction information is sent to the confirmation node so that the confirmation node anchors the data block generated based on the transaction information in the blockchain after confirming the transaction information.
In this embodiment, when the submission node receives the endorsement result fed back by the endorsement node, it is determined whether the transaction information is legal according to the endorsement result, and when the transaction information is legal, the transaction information is sent to the confirmation node, so that the confirmation node anchors the data block generated based on the transaction information in the block chain after confirming the transaction information.
It should be noted that if the visible range of the transaction information is that one endorsement node is specified to be visible, if the endorsement result is a signature data packet, the transaction information is determined to be legal, the transaction information is sent to a confirmation node, and if the endorsement result is prompt information for failure of verification, the transaction is determined to be illegal.
If the visible range of the transaction information is that a plurality of endorsement nodes are specified to be visible, judging whether the transaction information is legal according to the endorsement result can be realized on the basis of the following modes:
in a first mode
Receiving a signature data packet and/or prompt information of verification failure returned by the endorsement node aiming at the transaction information; determining the number of endorsement nodes sending the consensus information; judging whether the ratio of the number of the received signature data packets to the number of endorsement nodes sending the consensus information reaches a preset ratio or not; and determining that the transaction is legal under the condition that the ratio of the number of the received signature data packets to the number of endorsement nodes sending the consensus information reaches a preset ratio.
For example, assume that the preset proportion is 60%, and there are 10 endorsement nodes sending the consensus information, where 7 endorsement nodes verify that the transaction corresponding to the transaction information is legal, and therefore the 7 endorsement nodes want to send the signature data packet locally, and the other 3 endorsement nodes verify that the transaction corresponding to the transaction information is illegal, and then the 3 endorsement nodes return prompt information indicating that the verification fails. It means that the ratio of the number of the received signature packets to the number of endorsement nodes sending the consensus information is 70%, which reaches a preset ratio, and thus the transaction information is legal.
In addition, it is understood that the signature packet and/or the prompt message indicating that the verification fails in the present application means that the present application may receive only the signature packet without receiving the prompt message indicating that the verification fails, or only receive the prompt message indicating that the verification fails without receiving the signature packet, or receive both the signature packet and the prompt message indicating that the verification fails. For example, 10 endorsement nodes send the consensus information, and if the verification results of the 10 endorsement nodes on the transaction information are all passed, only 10 signature data packets are locally received, and no prompt information indicating that the verification fails exists. If 7 nodes in the 10 nodes pass the verification result of the transaction information and 3 endorsement nodes fail to verify the transaction information, 7 signature data packets and 3 prompt messages of failed verification are locally received. If the 10 endorsement nodes fail to verify the transaction information, only 10 prompt messages of which the verification fails are locally received, and no signature data packet is generated.
Mode two
Receiving a signature data packet and/or prompt information of verification failure returned by the endorsement node aiming at the transaction information; judging whether the number of the received signature data packets reaches a preset number or not; and under the condition that the number of the received signature data packets reaches a preset number, determining that the transaction meets a preset condition.
For example, assuming that the preset number is 3, after receiving a signature data packet and/or prompt information of verification failure returned by the endorsement node for the transaction information, counting whether the number in the signature data packet is greater than or equal to 3, if so, determining that the transaction information is legal, and if not, determining that the transaction information is illegal.
In step S42, the transaction information is sent to the confirmation node, which then determines the transaction information based on:
and for the globally visible transaction, verifying a signature data packet of the transaction, confirming the transaction based on the endorsement signature in the signature data packet, for the partially visible transaction, verifying whether the transaction is visible by a confirmation node, if so, verifying the signature data packet of the transaction, confirming the transaction based on the endorsement signature in the signature data packet, and if not, recording the transaction hash value.
Generating a hash value for the transaction in the block chain, and when the confirmation node confirms the transaction, if the hash value corresponding to the transaction cannot be inquired, inquiring the sensitive information under a trusted execution environment if the sensitive record is quoted by the transaction information; the query may ask the submitter of the transaction information to provide the information; the query may also ask the endorsement node that endorses the transaction information to provide the information; and then, according to the obtained information, performing confirmation operation on the current data block. Data blocks generated based on the transaction information are anchored in the blockchain after the transaction information is validated.
In addition, it should be noted that, because multiple transaction information may need to be linked in the whole network at the same time, the data block generated by the transaction information is anchored before the blockchain, the confirmation node may also send the confirmed transaction information generated data block to the sorting node, and the sorting node sorts the data block generated by the transaction information of the whole network. Therefore, the chain entering operation of the whole network is more orderly, and the chain entering speed is also improved. When the sorting node enters the chain of the transaction information, the verification is also performed, but the transaction content itself is not verified, and only the identifier corresponding to the transaction, for example, the hash value of the transaction, is verified. To determine the validity of the transaction.
As shown in fig. 5, an electronic device according to an embodiment of the present application includes:
a first extraction module 51, configured to extract transaction information from a commit node in the blockchain;
a second extracting module 52, configured to extract an identifier of the transaction information, where the identifier is used to characterize a visible range of the transaction information;
the determining module 53 is configured to uniquely determine a first operating environment for shielding other endorsement nodes under the condition that the identification of the transaction information indicates that the transaction information is that at least one endorsement node is visible, where the number of endorsement nodes of the visible transaction information is less than the total number of endorsement nodes in the block chain;
and the endorsement module 54 is used for completing the endorsement operation on the transaction information of the block chain in the first operation environment.
In one embodiment, endorsement module 54 comprises:
the simulation submodule is used for simulating and executing a transaction process corresponding to the transaction information in a first operating environment;
the verification submodule is used for verifying whether the transaction information is legal or not according to the simulation execution result;
the first generation submodule is used for generating an endorsement signature under the condition that the transaction information is legal;
and the second generation submodule is used for generating a verification result that the transaction is illegal under the condition that the transaction information is illegal.
In one embodiment, further comprising:
and the setting module is used for setting the access authority of the endorsement result corresponding to the endorsement operation based on the visible range represented by the identification of the transaction information.
In one embodiment, a setup module includes:
the first setting submodule is used for setting the access authority of the endorsement result to be accessible to the designated nodes and the submitting node based on the visibility range represented by the identification of the transaction information being visible to the designated nodes;
and the second setting submodule is used for setting the access right that the submission node can access the endorsement result based on that the visible range represented by the identification of the transaction information is appointed to be only locally visible.
In one embodiment, further comprising:
and the feedback module is used for responding to the execution of the endorsement operation and feeding back the endorsement result to the submission node.
In one embodiment, the second extraction module 52 includes:
and the extraction submodule is used for extracting the identification which is generated by the submitting node according to the determined visible range of the transaction information and corresponds to the visible range under the condition that the newly submitted transaction information exists.
In one embodiment, further comprising:
the determining module is used for determining that the operating environment of the transaction information is a second operating environment under the condition that the identification of the transaction information represents that the transaction information is globally visible, wherein the second operating environment is a first operating environment or other operating environments;
and the execution module is used for executing endorsement operation on the transaction information in a mode of shielding or not shielding other endorsement nodes in a second operation environment.
The above embodiments are only exemplary embodiments of the present application, and are not intended to limit the present application, and the protection scope of the present application is defined by the claims. Various modifications and equivalents may be made by those skilled in the art within the spirit and scope of the present application and such modifications and equivalents should also be considered to be within the scope of the present application.

Claims (10)

1. A transaction information processing method, comprising:
extracting transaction information from a commit node within the blockchain;
extracting an identifier of the transaction information, wherein the identifier is used for representing a visible range of the transaction information;
uniquely determining a first operating environment for shielding other endorsement nodes under the condition that the identification of the transaction information represents that the transaction information is that at least one endorsement node is visible, wherein the number of the endorsement nodes for which the transaction information is visible is less than the total number of the endorsement nodes in the block chain;
and completing the endorsement operation of the transaction information of the block chain in the first operation environment.
2. The method of claim 1, wherein completing an endorsement operation on transaction information for a blockchain in the first operating environment comprises:
in a first operation environment, simulating and executing a transaction process corresponding to the transaction information;
verifying whether the transaction information is legal or not according to the simulation execution result;
generating an endorsement signature under the condition that the transaction information is legal;
and generating a verification result that the transaction is illegal under the condition that the transaction information is illegal.
3. The method of claim 1, further comprising:
and setting the access authority of the endorsement result corresponding to the endorsement operation based on the visible range represented by the identification of the transaction information.
4. The method of claim 3, wherein setting access rights to endorsement results corresponding to the endorsement operation based on the identification of the transaction information comprises:
based on the visible range represented by the identification of the transaction information is visible for the designated nodes, the set access authority is that the endorsement result can be accessed by the designated nodes and the submitting node;
and/or
And setting the access right that the endorsement result can be accessed by the submitting node based on the fact that the visible range represented by the identification of the transaction information is only locally visible.
5. The method of claim 3, further comprising:
and responding to the execution of the endorsement operation, and feeding back the endorsement result to the submission node.
6. The method of any of claims 1-5, the extracting the identification of the transaction information, comprising:
and under the condition that newly submitted transaction information exists, extracting an identification which is generated by the submitting node according to the determined visible range of the transaction information and corresponds to the visible range.
7. The method of claim 1, further comprising:
under the condition that the identification of the transaction information represents that the transaction information is globally visible, determining that the operating environment of the transaction information is a second operating environment, wherein the second operating environment is a first operating environment or other operating environments;
and executing endorsement operation on the transaction information in a mode of shielding or not shielding other endorsement nodes in a second operation environment.
8. A transaction information processing method, comprising:
determining a visible range of transaction information in case of receiving the transaction information;
generating an identifier corresponding to the visible range according to the visible range of the transaction information;
and sending the transaction information and the identification corresponding to the transaction information to an endorsement node.
9. A blockchain based transaction method based on the method of any one of claims 1 to 7 or the method of claim 8, further comprising:
under the condition of receiving the endorsement result fed back by the endorsement node, judging whether the transaction information is legal or not according to the endorsement result;
and under the condition that the transaction information is legal, sending the transaction information to a confirmation node so that the confirmation node anchors a data block generated based on the transaction information in a block chain after confirming the transaction information.
10. An electronic device, comprising:
the first extraction module is used for extracting transaction information from a submission node in the blockchain;
the second extraction module is used for extracting the identification of the transaction information, and the identification is used for representing the visible range of the transaction information;
the determining module is used for uniquely determining a first operating environment for shielding other endorsement nodes under the condition that the identification of the transaction information represents that the transaction information is visible by at least one endorsement node, wherein the number of the endorsement nodes for which the transaction information is visible is less than the total number of the endorsement nodes in the block chain;
and the endorsement module is used for completing the endorsement operation on the transaction information of the block chain in the first operation environment.
CN202010185576.5A 2020-03-17 2020-03-17 Processing method, electronic equipment and transaction method based on block chain Pending CN111415153A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010185576.5A CN111415153A (en) 2020-03-17 2020-03-17 Processing method, electronic equipment and transaction method based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010185576.5A CN111415153A (en) 2020-03-17 2020-03-17 Processing method, electronic equipment and transaction method based on block chain

Publications (1)

Publication Number Publication Date
CN111415153A true CN111415153A (en) 2020-07-14

Family

ID=71493026

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010185576.5A Pending CN111415153A (en) 2020-03-17 2020-03-17 Processing method, electronic equipment and transaction method based on block chain

Country Status (1)

Country Link
CN (1) CN111415153A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113379420A (en) * 2021-06-25 2021-09-10 远光软件股份有限公司 Block chain execution intelligent contract method, computer equipment and block chain system
CN114513317A (en) * 2020-10-27 2022-05-17 香港城市大学深圳研究院 Method, system, equipment and storage medium for resisting distributed denial of service attack

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109936626A (en) * 2019-02-19 2019-06-25 阿里巴巴集团控股有限公司 Method, node and the storage medium of secret protection are realized in block chain
CN110162992A (en) * 2019-05-31 2019-08-23 联想(北京)有限公司 Data processing method, data processing equipment and computer system
CN110266659A (en) * 2019-05-31 2019-09-20 联想(北京)有限公司 A kind of data processing method and equipment
CN110335043A (en) * 2019-07-03 2019-10-15 中国银行股份有限公司 A kind of transaction method for secret protection, equipment and system based on block catenary system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109936626A (en) * 2019-02-19 2019-06-25 阿里巴巴集团控股有限公司 Method, node and the storage medium of secret protection are realized in block chain
CN110162992A (en) * 2019-05-31 2019-08-23 联想(北京)有限公司 Data processing method, data processing equipment and computer system
CN110266659A (en) * 2019-05-31 2019-09-20 联想(北京)有限公司 A kind of data processing method and equipment
CN110335043A (en) * 2019-07-03 2019-10-15 中国银行股份有限公司 A kind of transaction method for secret protection, equipment and system based on block catenary system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114513317A (en) * 2020-10-27 2022-05-17 香港城市大学深圳研究院 Method, system, equipment and storage medium for resisting distributed denial of service attack
CN113379420A (en) * 2021-06-25 2021-09-10 远光软件股份有限公司 Block chain execution intelligent contract method, computer equipment and block chain system

Similar Documents

Publication Publication Date Title
EP3424178B1 (en) Deterministic reproduction of client/server computer state or output sent to one or more client computers
WO2021012552A1 (en) Login processing method and related device
CN108616504B (en) Sensor node identity authentication system and method based on Internet of things
CN110276198B (en) Embedded variable granularity control flow verification method and system based on probability prediction
CN114139203B (en) Block chain-based heterogeneous identity alliance risk assessment system and method and terminal
CN110855624A (en) Safety verification method based on web interface and related equipment
CN111415153A (en) Processing method, electronic equipment and transaction method based on block chain
CN111865993B (en) Identity authentication management method, distributed system and readable storage medium
CN112865959A (en) Consensus method of distributed node equipment, node equipment and distributed network
CN111131303A (en) Request data verification system and method
CN113395406A (en) Encryption authentication method and system based on power equipment fingerprints
CN110572392A (en) Identity authentication method based on HyperLegger network
CN112954039A (en) Block chain evidence storage method
CN111106929B (en) Hash-based approval method
CN111401898B (en) Transaction information verification method and electronic equipment
WO2021027504A1 (en) Consensus protocol-based information processing method, and related device
CN109995888B (en) Data updating method and network node of block chain Domain Name System (DNS) system
CN111327624B (en) On-chain detection method and system for key information system
CN116934239A (en) Flow control data processing method and device
CN112261008A (en) Authentication method based on temporary token, client and server
CN112822217A (en) Server access method, device, equipment and storage medium
Wachter et al. Analysis of the DoIP Protocol for Security Vulnerabilities
CN112307519B (en) Hierarchical verifiable query system based on selective leakage
CN109040031B (en) Method for processing data message based on same local area network
CN114925361B (en) Trusted platform based embedded equipment software remote auditing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination