CN112104607B - Method, device, network node and storage medium for cross-link communication - Google Patents

Method, device, network node and storage medium for cross-link communication Download PDF

Info

Publication number
CN112104607B
CN112104607B CN202010813044.1A CN202010813044A CN112104607B CN 112104607 B CN112104607 B CN 112104607B CN 202010813044 A CN202010813044 A CN 202010813044A CN 112104607 B CN112104607 B CN 112104607B
Authority
CN
China
Prior art keywords
information
node
signature
blockchain
cross
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010813044.1A
Other languages
Chinese (zh)
Other versions
CN112104607A (en
Inventor
阮洋
曲会彬
耿丛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Xinsheng Yunjia Technology Co ltd
Original Assignee
Beijing Xinsheng Yunjia Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Xinsheng Yunjia Technology Co ltd filed Critical Beijing Xinsheng Yunjia Technology Co ltd
Priority to CN202010813044.1A priority Critical patent/CN112104607B/en
Publication of CN112104607A publication Critical patent/CN112104607A/en
Application granted granted Critical
Publication of CN112104607B publication Critical patent/CN112104607B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1061Peer-to-peer [P2P] networks using node-based peer discovery mechanisms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0876Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint

Abstract

The invention is suitable for the technical field of block chains, and provides a method, a device, a network node and a storage medium for cross-chain communication, wherein the cross-chain communication method comprises the following steps: when a first node accessed to a first block chain acquires first information of a cross-chain request initiated to a second block chain by a user, determining whether the first node is a trusted node selected by the user in a trusted node set common to the first block chain and the second block chain, wherein the first information at least comprises a trusted node set and a first signature of the user; if the first node is a trusted node in the set of trusted nodes, verifying the validity of a first signature in the first information; if the first information is legal, the first node signs the first information to generate second information at least comprising the first information, the first node and a second signature; sending the second information to a second blockchain. The invention solves the problem of cross-link communication reliability in the prior art.

Description

Method, device, network node and storage medium for cross-link communication
Technical Field
The present invention relates to the field of block chain technologies, and in particular, to a method and an apparatus for cross-chain communication, a network node, and a storage medium.
Background
The blockchain technology is based on a decentralized peer-to-peer network (also called P2P network), and maintains a distributed database, also called a distributed ledger, through cryptography and consensus mechanisms. With the development of blockchain technology, a large number of blockchain systems such as public, private, and alliance chains have been produced to date. However, these blockchain systems exist as islands of information, and it is difficult to establish communication between different blockchains because there is no technology to ensure the security of data communication.
In the prior art, although various solutions are being tried by those skilled in the art, for example, cosmos and polkadot, etc. are open source solutions for trying to solve the above technical problems. However, the scheme has the technical problems of ensuring the reliability of cross-link communication and the like. Therefore, how to provide a reliable cross-link communication method is a technical problem that those skilled in the art are trying to solve at present.
Disclosure of Invention
In view of the technical problems in the background art, embodiments of the present invention provide a method, an apparatus, a network node, and a storage medium for cross-link communication, so as to solve the problem of reliability of cross-link communication in the prior art.
In a first aspect, the present invention provides a cross-chain communication method, which is performed by any node in a peer-to-peer network where a first blockchain or/and a second blockchain operate, where the information sending method includes: when a first node accessed to a first block chain acquires first information of a cross-chain request initiated to a second block chain by a user, determining whether the first node is a trusted node selected by the user in a trusted node set common to the first block chain and the second block chain, wherein the first information at least comprises a first signature of the trusted node set and the user; if the first node is a trusted node in the set of trusted nodes, verifying the validity of a first signature in the first information; if the first information is legal, the first node signs the first information to generate second information at least comprising the first information, the first node and a second signature; sending the second information to a second blockchain.
In some embodiments, the cross-chain communication method further comprises: when a second node at least accessing a second block chain receives the second information, verifying the validity of the second information; if the second information is legal, recording the second information on the second block chain; and when the second block link receives the second information successfully sent by all the trusted nodes in the trusted node set, accepting the second information.
In some embodiments, the verifying the validity of the second information specifically includes: verifying the validity of the second signature; if so, verifying whether the first signature is legal or not: and if so, determining that the second information is legal.
In some embodiments, the first information includes at least: initiating user information; first block chain information; second block chain information; information passed from the first blockchain to the second blockchain; initiating a trusted node set selected by a user; the initiating user signs the above information first.
In a second aspect, the present invention further provides a cross-chain communication device, which is disposed on any node in a peer-to-peer network where a first blockchain or/and a second blockchain operates, and includes: the system comprises a cross-chain detection module, a cross-chain detection module and a cross-chain detection module, wherein the cross-chain detection module is configured to determine whether a first node accessed to a first block chain is a trusted node selected by a user and in a trusted node set common to the first block chain and a second block chain when the first node acquires first information that the user initiates a cross-chain request to the second block chain, wherein the first information at least comprises a first signature of the trusted node set and the user; a first signature verification module configured to verify the validity of a first signature in the first information if the first node is a trusted node in the set of trusted nodes; the signature module is configured to sign the first information by the first node if the first information is legal and generate second information at least comprising the first information, the first node and a second signature; a cross-chain sending module configured to send the second information to a second blockchain.
In some embodiments, the cross-chain communication device further comprises: the second signature verification module is configured to verify the validity of the second information when a second node accessing at least a second blockchain receives the second information; a recording module configured to record the second information on the second block chain if the second information is legal; a cross-chain response module configured to accept the second information when the second blocklink receives the second information successfully sent by all trusted nodes in the set of trusted nodes.
In some embodiments, the second signature verification module specifically includes: a first signature verification unit configured to verify validity of the second signature when a second node accessing at least a second blockchain receives the second information; a second signature verification unit configured to, if the first signature is legal, re-verify whether the first signature is legal: and the legal confirmation unit is configured to determine that the second information is legal if the second information is legal.
In some embodiments, the first information includes at least: initiating user information; first block chain information; second block chain information; information passed from the first blockchain to the second blockchain; initiating a trusted node set selected by a user; the initiating user signs the above information first.
In a third aspect, the present invention provides a network node comprising any node in a peer-to-peer network running at least a first blockchain and a second blockchain, the network node comprising at least a memory and a processor, the memory having stored thereon a computer program operable on the processor, the computer program, when executed by the processor, performing the steps of the method according to the first aspect.
In a fourth aspect, the invention provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method according to the first aspect.
The invention has the beneficial effects that: when the cross-link communication is initiated to the second block chain, the trusted nodes approved by the first block chain and the second block chain at the same time are selected and recorded in the first information, so that the first information can only execute the cross-link task by the selected trusted node set, the selected trusted nodes can be ensured to be online nodes, and the safety and the real-time performance of the data cross-link communication are realized.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed for the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
FIG. 1 is a system architecture in which the present invention may be applied to a cross-link communication method;
FIG. 2 is a flow chart of a method of cross-chain communication provided in one embodiment of the present invention;
FIG. 3 is a flow chart of a method of cross-chain communication provided in another embodiment of the present invention.
Fig. 4 is a schematic diagram of a cross-link communication device provided in an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to explain the technical means of the present invention, the following description will be given by way of specific examples.
First embodiment
FIG. 1 is a system architecture for implementing the cross-link communication method of the present invention.
As shown in fig. 1, the system architecture 100 is a peer-to-peer network formed by a plurality of terminal devices 101, 102, 103, 104, 105, 106 interconnected via a network 107, also referred to as a P2P network.
The network 107 is a communication link for interconnecting the terminal devices 101, 102, 103, 104, 105, and 106, the network 107 may be an application, an algorithm, or the like for implementing the communication link, meanwhile, the network 107 may also be a device such as a network cable, an optical fiber, a router, a switch, or the like, or the network 107 may be any combination of the above.
In practical applications, the number of terminal devices in the peer-to-peer network may be much larger than that shown in fig. 1, i.e. not limited to the terminal devices 101, 102, 103, 104, 105 and 106 described above. And the terminal device 101, 102, 103, 104, 105 or 106 may specifically include hardware, software or a combination of both. For example, when the terminal device 101, 102, 103, 104, 105, or 106 is hardware, it may be specifically a computer, a server, a gateway, a smart phone, a smart wearable device, or the like; when the terminal device 101, 102, 103, 104, 105 or 106 is software, it may specifically be an application or a computer program installed on the hardware; of course, the terminal device 101, 102, 103, 104, 105 or 106 may also be a combination of the above software and hardware.
In the present embodiment, the system architecture is applied to the network base of the blockchain technology, so as to implement the cross-chain communication between different blockchains.
For example, assuming that a first blockchain runs in the peer-to-peer network and a second blockchain also runs in the peer-to-peer network, a user logs in the first blockchain on any terminal device 101, 102, 103, 104, 105 or 106 in the peer-to-peer network and then initiates a message based on cross-chain communication to the second blockchain; at the same time, any online node of the second blockchain may receive the message. The security of the message in the process of cross-link communication can be realized through the following specific embodiments.
Specifically, based on the blockchain technology, for example, the first blockchain may be installed in any terminal device 101, 102, 103, 104, 105, or 106 in the peer-to-peer network or log in the first blockchain, when a user accesses the first blockchain on the terminal device, the terminal device is one of the online nodes of the first blockchain, and if the node generates information under the first blockchain, the information is synchronously copied to other nodes of the first blockchain based on the peer-to-peer network.
It is to be understood that any terminal device 101, 102, 103, 104, 105 or 106 in the peer-to-peer network described above may be a node of both the first and second blockchains. That is, in the peer-to-peer network shown in fig. 1, more than one blockchain system may run, or any terminal device 101, 102, 103, 104, 105, or 106 may access different blockchains, or multiple different blockchain applications at the same time, and so on.
In some embodiments, as shown in fig. 1, the terminal device 101, 102, 103, 104, 105, or 106 may be a network node accessing a first blockchain or/and a second blockchain, and may include a memory and a processor on the network node, where the memory stores a computer program executable on the processor, and the computer program, when executed by the processor, implements the steps of the cross-chain communication method provided in the following embodiments of the present invention.
Based on the same inventive concept as the above embodiments, in some embodiments, a computer readable storage medium may also be provided, which stores a computer program that, when executed by a processor, implements the steps of the cross-chain communication method provided by the present invention in the following embodiments.
Second embodiment
In this embodiment, a more detailed description will be given of the cross-link communication method according to the application example of the first embodiment.
Fig. 2 is a flowchart of a cross-link communication method provided in an embodiment of the present invention.
In this embodiment, the cross-chain communication method is used to implement cross-chain communication between different blockchains, for example, a user sends information to a second blockchain on any network node of a first blockchain. The execution main body of the cross-chain communication method may be executed by any node in the peer-to-peer network where the first blockchain or/and the second blockchain operate, for example, any terminal device 101, 102, 103, 104, 105, or 106 in the peer-to-peer network shown in fig. 1.
As shown in fig. 2, the above-mentioned cross-link communication method includes the following steps:
s210: when a first node accessed to a first block chain acquires first information of a cross-chain request initiated by a user to a second block chain on the first block chain, determining whether the first node is a trusted node selected by the user and in a trusted node set common to the first block chain and the second block chain, wherein the first information at least comprises the trusted node set and a first signature of the user.
Specifically, the first node is a main body that can execute the cross-chain communication method, and is a relative referent object, which may specifically be any node accessing the first block chain. For example, each terminal device in the peer-to-peer network shown in fig. 1 has access to the first zone cross-chain, and the first node may be any one of the terminal devices 101, 102, 103, 104, 105, or 106. In addition, the first node may not be the point where the user initiates the cross-chain communication, that is, the user initiates the first information based on the cross-chain communication on other nodes accessing the first blockchain, and all nodes on the first blockchain can receive the first information. Obviously, the first node may also be the node originating the first information.
Specifically, the cross-chain communication method is executed only if the first node is one of the set of trusted nodes selected by the user. This has the effect of: the user may select a set of trusted nodes from the intersection of the set of trusted nodes of the first blockchain and the set of trusted nodes of the second blockchain to perform cross-chain communication, which may ensure the trustworthiness of the nodes.
In addition, since the devices accessing the first zone cross-link do not all require real-time online, in the first blockchain network, if many nodes are offline, only the online nodes can process relevant data or information if cross-link information is performed, and when the number of online nodes is low, it is difficult to ensure the security of data transmission. Based on the above situation, in this embodiment, when the first node acquires the first information initiated by the user, it is verified whether the current first node is one of the trusted node sets selected by the user when initiating the cross-link communication and recorded in the first information, and if so, the first node has the right to continue to execute the cross-link communication. That is, the first information includes a set of trusted nodes selected by a user when initiating cross-chain communication on the first blockchain and recorded in the first information, and the set of trusted nodes should be trusted nodes commonly approved by the first blockchain and the second blockchain. The function is as follows: the user can select a trusted node set from an intersection of the trusted node set of the first block chain and the trusted node set of the second block chain to execute cross-chain communication, on one hand, one trusted node set is used for proving one-time cross-chain communication, reliability can be guaranteed, on the other hand, the selected trusted node is generally on-line, and therefore the real-time performance of cross-chain communication calculation can be guaranteed.
In particular, a trusted node refers to a node that is approved or authenticated by the first blockchain. The trusted node is also a node in the first block chain, and is different from the ordinary node in that the trusted node is a node approved by all nodes or a great number of nodes, and has higher reliability. Generally, voting may be used to elect a certain number of trusted nodes on the first blockchain. For example, taking a federation chain as an example, an account that can be approved by more than 2/3 of nodes in a federation can become a trusted node (account).
Specifically, the trusted node may be added by the blockchain at startup or at runtime.
S220: and if the first node is a trusted node in the trusted node set, verifying the validity of the first signature in the first information.
Specifically, to implement cross-link communication, the first information may include the following:
initiating user information, and recording as u;
first block chain information is marked as A;
second block chain information, denoted as B;
the information transmitted from the first block chain to the second block chain is marked as msg;
initiating a user-selected set of trusted nodes, denoted as (a, b, c, d.);
and the signature of the initiating user on the above information, namely the first signature, is marked as usign. As can be seen, the content included in the first information may be represented as: ((u, A, B, msg, (a, B, c, d.)), usign).
Illustratively, the initiating user information u may be a user ID; the first blockchain information a and the second blockchain information B may be a chain ID of a cross-chain communication starting blockchain and a chain ID of a destination blockchain, respectively; the information msg transmitted from the first blockchain to the second blockchain may be transaction information or the like; the trusted node (a, b, c, d.) selected by the initiating user may be a set of trusted nodes selected from an intersection of trusted nodes of the first blockchain and the second blockchain; the first signature usign may specifically be a hash value obtained by performing hash calculation on the initiating user information u, the first blockchain information a, the second blockchain information B, and the information msg transmitted from the first blockchain to the second blockchain, or based on an asymmetric encryption algorithm, the hash value is encrypted by using a user private key to obtain encrypted data, and the like.
From the above, the validity of the first signature is verified, and it can be confirmed whether the user has been tampered with based on the content (u, a, B, msg, (a, B, c, d.)) in the first information of the cross-chain communication. Therefore, the reliability and safety of the data in the link are ensured.
For example, assume that the first signature is a hash of the content (u, a, B, msg, (a, B, c, d.)) to obtain a first hash value. Then, the signature is verified at the first node, and only the content (u, a, B, msg, (a, B, c, d.)) needs to be hashed again to obtain a second hash value, and then whether the second hash value is consistent with the first hash value is compared: if so, it can be confirmed that the content (u, a, B, msg, (a, B, c, d.)) is not modified; otherwise, the content (u, a, B, msg, (a, B, c, d.)) is modified. Since signature and signature verification are the basic knowledge of the blockchain technique, they are not described herein.
S230: and if the first information is legal, the first node signs the first information to generate second information at least comprising the first information, the first node and the second signature.
Specifically, when the first information is determined to be legal, the first node signs the first information again, so that the reliability of the first information in this link can be further ensured.
Exemplarily, as shown above, the content of the first information is: ((u, A, B, msg, (a, B, c, d.)), usign), which can be denoted as a because the first node is one of the set of trusted nodes. Then the signature of the first information by the first node, i.e. the second signature, may be denoted as asign. As can be seen, for the content in the second information, it can be written as: ((u, A, B, msg, (a, B, c, d.)), usign), a, asign).
S240: sending the second information to a second blockchain.
In the embodiment, when the cross-chain communication is initiated to the second block chain, the trusted node set authorized by the first block chain and the second block chain at the same time is selected and recorded in the first information, so that only the nodes in the trusted node set are authorized to execute the cross-chain task, thereby ensuring the safety of the cross-chain task, and meanwhile, the selected trusted nodes are all online nodes, thereby realizing the safety and real-time performance of the cross-chain communication.
As can be seen from the above description, the above-mentioned cross-chain communication solution is illustrated from the first blockchain side. On the basis of the above technical solution, the technical solution of the present invention will be further explained from the second blockchain side.
FIG. 3 is a flow chart of a method of cross-chain communication provided in another embodiment of the present invention.
As shown in fig. 3, the cross-chain communication method may further include the following steps S310 to S340:
s310: and when a second node at least accessing a second block chain receives the second information, verifying the validity of the second information.
Specifically, the second node is any node accessing the second block chain, and similarly, the second node may be any node in the peer-to-peer network where the second block chain operates as shown in fig. 1. It should be understood that the second node and the first node may be two different nodes in the peer-to-peer network, that is, two nodes are sequentially connected to a single blockchain and a second blockchain; in addition, the second node and the first node may also be the same node in the peer-to-peer network, that is, the nodes are simultaneously accessed to the first blockchain and the second blockchain.
Specifically, the validity of the second information is verified, that is, the validity of the first signature and the second signature in the second information is verified. Therefore, the method for determining the validity of the second information specifically comprises the following steps:
s410: verifying the validity of the second signature;
s420: if so, verifying whether the first signature is legal or not:
s430: and if so, determining that the second information is legal.
And if the second signature or the first signature is verified to be illegal, the second information is not processed at the moment. In particular implementations, the present invention is not limited herein to processing mechanisms by which signature verification does not pass. For example, the processing mechanism for failing to pass the signature verification may include stopping execution, discarding the second information, and so on, which will not be described in detail herein
In addition, as can be seen from the above description, the verification of the second signature and the first signature are prior art, and therefore, the detailed description thereof is omitted here.
S320: and if the second information is legal, recording the second information on the second block chain.
Specifically, recording the second information on the second block chain may include recording information msg, which is transferred from the first block chain to the second block chain, in the second information on the second block chain. For example, the second information is recorded on a block under the second node.
S330: and when the second block link receives the second information successfully sent by all the trusted nodes in the trusted node set, accepting the second information.
Only the second blockchain receives the second information sent by all nodes in the trusted node set, that is, the cross-chain information is considered to be proved by one trusted node set, so that the reliability of the cross-chain communication is ensured.
In particular, it should be understood that the recording of the second information on the second block chain and the receiving of the second information are different. The second blockchain receives the second information, specifically, the second blockchain receives the information msg transferred from the first blockchain to the second blockchain, i.e., responds to the information msg. For example, assuming that the information msg is "send 100 blocks to B", the recording simply records the information "send 100 blocks to B" on the second block chain, and does not go execution. And accepting, i.e. responding to the message msg, will execute the action of sending money to complete the cross-link communication.
It should be understood that, the sequence numbers of the steps in the foregoing embodiments do not imply an execution sequence, and the execution sequence of each process should be determined by its function and inherent logic, and should not constitute any limitation to the implementation process of the embodiments of the present invention.
Third embodiment
Based on the same general inventive concept of the second embodiment, correspondingly, the present embodiment further provides a cross-link communication device. Since the technical problems to be solved by the cross-link communication device and the cross-link communication method, the adopted technical solutions and the expected technical effects are the same, the present embodiment will be briefly described below, and if a clearer and more complete technical solution is to be understood, reference may be made to the second embodiment.
Fig. 4 is a schematic diagram of a cross-link communication device provided in an embodiment of the present invention.
Specifically, the illustrated cross-chain communication device is configured to be disposed on any node in a peer-to-peer network where a first blockchain or/and a second blockchain operate, as shown in fig. 4, the cross-chain communication device 400 includes: a chain crossing detection module 401, configured to determine, when a first node accessing a first blockchain acquires first information that a user initiates a chain crossing request to a second blockchain, whether the first node is a trusted node selected by the user and in a trusted node set common to the first blockchain and the second blockchain, where the first information at least includes a first signature of the user and the trusted node set; a first signature verification module 402, configured to verify validity of a first signature in the first information if the first node is a trusted node in the set of trusted nodes; a signature module 403, configured to, if the first node is legal, sign the first information by the first node, and generate second information at least including the first information, the first node, and a second signature; a cross-chain sending module 404 configured to send the second information to a second blockchain.
In some embodiments, the cross-chain communication device further comprises: the second signature verification module is configured to verify the validity of the second information when a second node accessing at least a second blockchain receives the second information; a recording module configured to record the second information on the second block chain if the second information is legal; a cross-chain response module configured to accept the second information when the second blocklink receives the second information successfully sent by all trusted nodes in the set of trusted nodes.
In some embodiments, the second signature verification module specifically includes: a first signature verification unit configured to verify validity of the second signature when a second node accessing at least a second blockchain receives the second information; a second signature verification unit configured to, if the first signature is legal, re-verify whether the first signature is legal: and the legal confirmation unit is configured to determine that the second information is legal if the second information is legal.
Specifically, the first information at least includes: initiating user information; first block chain information; second block chain information; information passed from the first blockchain to the second blockchain; initiating a trusted node set selected by a user; the initiating user signs the above information first.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (8)

1. A cross-chain communication method, executed by any node in a peer-to-peer network where a first blockchain or/and a second blockchain operate, is characterized by comprising the following steps:
when a first node accessed to a first block chain acquires first information of a cross-chain request initiated to a second block chain by a user, determining whether the first node is a trusted node selected by the user and in a trusted node set common to the first block chain and the second block chain, wherein the first information at least comprises a first signature of the trusted node set and the user, the first signature is a first hash value, and the first hash value is obtained by performing hash calculation on other information except the first signature in the first information by the user;
if the first node is a trusted node in the set of trusted nodes, verifying validity of a first signature in the first information, wherein the verifying validity of the first signature in the first information includes: performing hash calculation on other information except the first signature in the first information to obtain a second hash value, verifying that the first signature is legal when the second hash value is consistent with the first hash value, and verifying that the first signature is illegal when the second hash value is inconsistent with the first hash value;
if the first information is legal, the first node signs the first information to generate second information at least comprising the first information, the first node and a second signature;
sending the second information to a second blockchain;
when a second node at least accessing a second block chain receives the second information, verifying the validity of the second information;
if the second information is legal, recording the second information on the second block chain;
and when the second block link receives the second information successfully sent by all the trusted nodes in the trusted node set, accepting the second information.
2. The method according to claim 1, wherein the verifying the validity of the second information specifically includes:
verifying the validity of the second signature;
if so, verifying whether the first signature is legal or not:
and if so, determining that the second information is legal.
3. The method according to claim 1 or 2, wherein the first information comprises at least:
initiating user information;
first block chain information;
second block chain information;
information passed from the first blockchain to the second blockchain;
initiating a trusted node set selected by a user;
the initiating user signs the above information first.
4. A cross-chain communication device, which is disposed on any node in a peer-to-peer network where a first blockchain or/and a second blockchain operate, is characterized in that the cross-chain communication device comprises:
the system comprises a cross-chain detection module, a cross-chain detection module and a cross-chain detection module, wherein the cross-chain detection module is configured to determine whether a first node which is accessed to a first block chain is a trusted node which is selected by a user and is in a trusted node set which is common to the first block chain and a second block chain when the first node acquires first information which is initiated by the user to the second block chain, wherein the first information at least comprises a first signature of the trusted node set and the user, the first signature is a first hash value, and the first hash value is obtained by performing hash calculation on other information except the first signature in the first information by the user;
a first signature verification module configured to verify validity of a first signature in the first information if the first node is a trusted node in the set of trusted nodes, wherein the verifying validity of the first signature in the first information includes: performing hash calculation on other information except the first signature in the first information to obtain a second hash value, verifying that the first signature is legal when the second hash value is consistent with the first hash value, and verifying that the first signature is illegal when the second hash value is inconsistent with the first hash value;
the signature module is configured to sign the first information by the first node if the first information is legal and generate second information at least comprising the first information, the first node and a second signature;
a cross-chain sending module configured to send the second information to a second blockchain;
the second signature verification module is configured to verify the validity of the second information when a second node accessing at least a second blockchain receives the second information;
a recording module configured to record the second information on the second block chain if the second information is legal;
a cross-chain response module configured to accept the second information when the second blocklink receives the second information successfully sent by all trusted nodes in the set of trusted nodes.
5. The cross-chain communication device according to claim 4, wherein the second signature verification module specifically includes:
a first signature verification unit configured to verify validity of the second signature when a second node accessing at least a second blockchain receives the second information;
a second signature verification unit configured to, if the first signature is legal, re-verify whether the first signature is legal:
and the legal confirmation unit is configured to determine that the second information is legal if the second information is legal.
6. The device according to claim 4 or 5, wherein the first information comprises at least:
initiating user information;
first block chain information;
second block chain information;
information passed from the first blockchain to the second blockchain;
initiating a trusted node set selected by a user;
the first signature of the user on the above information is initiated.
7. A network node comprising any node in a peer-to-peer network in which a first blockchain or/and a second blockchain operate, the network node comprising at least a memory and a processor, the memory having stored thereon a computer program operable on the processor, wherein the computer program, when executed by the processor, performs the steps of the method according to any one of claims 1 to 3.
8. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 3.
CN202010813044.1A 2020-08-13 2020-08-13 Method, device, network node and storage medium for cross-link communication Active CN112104607B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010813044.1A CN112104607B (en) 2020-08-13 2020-08-13 Method, device, network node and storage medium for cross-link communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010813044.1A CN112104607B (en) 2020-08-13 2020-08-13 Method, device, network node and storage medium for cross-link communication

Publications (2)

Publication Number Publication Date
CN112104607A CN112104607A (en) 2020-12-18
CN112104607B true CN112104607B (en) 2023-03-21

Family

ID=73753550

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010813044.1A Active CN112104607B (en) 2020-08-13 2020-08-13 Method, device, network node and storage medium for cross-link communication

Country Status (1)

Country Link
CN (1) CN112104607B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113645278B (en) * 2021-07-23 2022-09-20 湖南大学 Cross-chain message transmission method, device and storage medium of block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110245517A (en) * 2019-05-29 2019-09-17 杭州秘猿科技有限公司 A kind of across chain method, apparatus, system and the electronic equipment of block chain
CN110993044A (en) * 2019-11-28 2020-04-10 周口师范学院 Lightweight dynamic autonomous cross-link interaction method for medical alliance link
CN111222876A (en) * 2018-11-26 2020-06-02 厦门本能管家科技有限公司 Method and system for solving cross-chain coupling

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109344628B (en) * 2018-08-23 2022-07-08 达闼机器人股份有限公司 Method for managing trusted nodes in block chain network, nodes and storage medium
CN110290021B (en) * 2019-06-19 2022-07-19 辽宁大学 Cross-chain consensus time delay optimization method based on dynamic programming algorithm
CN111464536B (en) * 2020-03-31 2022-06-07 中国联合网络通信集团有限公司 Block chain cross-chain method and device
CN111464538B (en) * 2020-03-31 2022-02-01 中国联合网络通信集团有限公司 Asset transaction method and system, storage medium and asset transaction background
CN111464632B (en) * 2020-03-31 2021-12-07 中国联合网络通信集团有限公司 Block chain cross-chain forwarding method and block chain link point

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111222876A (en) * 2018-11-26 2020-06-02 厦门本能管家科技有限公司 Method and system for solving cross-chain coupling
CN110245517A (en) * 2019-05-29 2019-09-17 杭州秘猿科技有限公司 A kind of across chain method, apparatus, system and the electronic equipment of block chain
CN110993044A (en) * 2019-11-28 2020-04-10 周口师范学院 Lightweight dynamic autonomous cross-link interaction method for medical alliance link

Also Published As

Publication number Publication date
CN112104607A (en) 2020-12-18

Similar Documents

Publication Publication Date Title
JP7093428B2 (en) Digital certificate management methods, devices, computer devices and computer programs
CN109242685B (en) Block chain-based consensus and verification method and device
US11336455B2 (en) Consensus protocol for blockchain DAG structure
CN108111314B (en) Method and equipment for generating and verifying digital certificate
CN111010376B (en) Master-slave chain-based Internet of things authentication system and method
CN112311735B (en) Credible authentication method, network equipment, system and storage medium
WO2020258912A1 (en) Blockchain consensus method, device and system
US8484460B1 (en) Post attack man-in-the-middle detection
CN111066286A (en) Retrieving common data for blockchain networks using high availability trusted execution environments
CN109118230B (en) Information processing method and device based on block chain
CN110177124B (en) Identity authentication method based on block chain and related equipment
CN113328997B (en) Alliance chain crossing system and method
JPH07264179A (en) Method for safe communication and safe computation
Tate et al. Multi-user dynamic proofs of data possession using trusted hardware
CN110149323B (en) Processing device with ten-million-level TPS (platform secure protocol) contract processing capacity
JP2022534677A (en) Protecting online applications and web pages that use blockchain
CN112118292A (en) Method, apparatus, network node and storage medium for cross-link communication
CN112104607B (en) Method, device, network node and storage medium for cross-link communication
CN112104701B (en) Method, device, network node and storage medium for cross-link communication
CN115001707B (en) Device authentication method based on block chain and related device
Witanto et al. Blockchain-based OCF Firmware Update
CN116561820B (en) Trusted data processing method and related device
CN114553575B (en) Token-based cross-chain communication authentication method
CN112686668B (en) Alliance chain crossing system and method
US20230222509A1 (en) Method, terminal, and coin register for transmitting electronic coin data sets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant