CN112104701B - Method, device, network node and storage medium for cross-link communication - Google Patents

Method, device, network node and storage medium for cross-link communication Download PDF

Info

Publication number
CN112104701B
CN112104701B CN202010813042.2A CN202010813042A CN112104701B CN 112104701 B CN112104701 B CN 112104701B CN 202010813042 A CN202010813042 A CN 202010813042A CN 112104701 B CN112104701 B CN 112104701B
Authority
CN
China
Prior art keywords
information
blockchain
node
cross
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010813042.2A
Other languages
Chinese (zh)
Other versions
CN112104701A (en
Inventor
阮洋
曲会彬
耿丛
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Henan Zhongxin Guochuang Commercial Operation Management Co ltd
Original Assignee
Henan Zhongxin Guochuang Commercial Operation Management Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Henan Zhongxin Guochuang Commercial Operation Management Co ltd filed Critical Henan Zhongxin Guochuang Commercial Operation Management Co ltd
Priority to CN202010813042.2A priority Critical patent/CN112104701B/en
Publication of CN112104701A publication Critical patent/CN112104701A/en
Application granted granted Critical
Publication of CN112104701B publication Critical patent/CN112104701B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention is applicable to the technical field of blockchain, and provides a method, a device, a network node and a storage medium for cross-chain communication, wherein the cross-chain communication method comprises the following steps: when a first node accessing a first blockchain acquires first information of a user initiating a cross-chain request to a second blockchain, determining whether the first node is a trusted node of the first blockchain selected by the user; if yes, verifying whether the first node is a trusted node of the second blockchain; if the first node is a trusted node of the second blockchain, verifying the validity of a first signature in the first information, wherein the first information comprises the first signature of the user; if the first information is legal, the first node signs the first information to generate second information at least comprising the first information and the second signature; and sending the second information to a second blockchain. The invention solves the problem of reliability of cross-link communication in the prior art.

Description

Method, device, network node and storage medium for cross-link communication
Technical Field
The invention belongs to the technical field of blockchain, and particularly relates to a method, a device, a network node and a storage medium for cross-chain communication.
Background
Blockchain technology is based on a decentralized peer-to-peer network (also known as a P2P network) that maintains a distributed database, also known as a distributed ledger, through cryptography and consensus mechanisms. With the development of blockchain technology, numerous blockchain systems have been produced so far, such as public chains, private chains, and federated chains. However, these blockchain systems are in the form of information islands, and it is difficult to establish communication between different blockchains because no technology is available to ensure the security of data communication.
In the prior art, although various schemes, for example, cosmos and polkadot, etc., are open source schemes for attempting to solve the above-mentioned technical problems are being tried by those skilled in the art. However, the technical problems of ensuring the reliability of the cross-link communication and the like still exist in the scheme. To this end, how to provide a reliable method of cross-link communication is a technical problem that is currently being attempted to be solved by those skilled in the art.
Disclosure of Invention
In view of the technical problems in the background art, the embodiment of the invention provides a method, a device, a network node and a storage medium for cross-link communication, which are used for solving the problem of reliability of the cross-link communication in the prior art.
In a first aspect, the present invention provides a cross-chain communication method, which is executed by any node in a peer-to-peer network where a first blockchain or/and a second blockchain operates, and the information sending method includes: when a first node accessing a first blockchain acquires first information of a user initiating a cross-chain request to a second blockchain, determining whether the first node is a trusted node of the first blockchain selected by the user; if yes, verifying whether the first node is a trusted node of the second blockchain; if the first node is a trusted node of the second blockchain, verifying the validity of a first signature in the first information, wherein the first information comprises the first signature of the user; if the first information is legal, the first node signs the first information to generate second information at least comprising the first information and the second signature; and sending the second information to a second blockchain.
In some embodiments, the cross-chain communication method further comprises: verifying whether the first node is a trusted node of a second blockchain when a second node accessing at least the second blockchain receives the second information; if yes, determining the validity of the second information; and if the second information is legal, recording the second information on the second block chain.
In some embodiments, the determining the validity of the second information specifically includes: verifying the validity of the second signature; if so, then verifying whether the first signature is legal: if yes, determining that the second information is legal.
In some embodiments, at least the first information includes: initiating user information; first blockchain information; second blockchain information; information transferred by the first blockchain to the second blockchain; initiating a trusted node selected by a user; a first signature of the user to the above information is initiated.
In a second aspect, the present invention provides a cross-chain communication device, provided on any node in a peer-to-peer network where a first blockchain or/and a second blockchain operates, the cross-chain communication device comprising: the system comprises a cross-chain detection module, a cross-chain detection module and a cross-chain detection module, wherein the cross-chain detection module is configured to determine whether a first node accessed to a first blockchain is a trusted node of the first blockchain selected by a user when the first node acquires first information of a cross-chain request initiated by the user to a second blockchain; a first trusted node verification module configured to verify if the first node is a trusted node of the second blockchain if so; a first signature verification module configured to verify the validity of a first signature in the first information if the first node is a trusted node of the second blockchain, wherein the first information includes the first signature of the user; the signature module is configured to sign the first information if the first information is legal, and generate second information at least comprising the first information and the second signature; and a cross-chain transmission module configured to transmit the second information to a second blockchain.
In some embodiments, the cross-chain communication device further comprises: a second trusted node verification module configured to verify whether the first node is a trusted node of a second blockchain when at least a second node accessing the second blockchain receives the second information; the second signature verification module is configured to determine the validity of the second information if yes; and the cross-chain response module is configured to record the second information on the second block chain if the second information is legal.
In some embodiments, the second trusted node verification module specifically includes: a first signature verification unit configured to verify the validity of the second signature; a second signature verification unit configured to re-verify whether the first signature is legitimate if it is legitimate: and the legal confirmation unit is configured to determine that the second information is legal if the second information is legal.
In some embodiments, at least the first information includes: initiating user information; first blockchain information; second blockchain information; information transferred by the first blockchain to the second blockchain; initiating a trusted node selected by a user; a first signature of the user to the above information is initiated.
In a third aspect, the present invention provides a network node comprising any node in a peer-to-peer network having at least a first blockchain and a second blockchain running thereon, the network node comprising at least a memory and a processor, the memory having stored thereon a computer program executable on the processor, the computer program when executed by the processor implementing the steps of the method according to the first aspect.
In a fourth aspect, the present invention provides a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the method according to the first aspect.
The invention has the beneficial effects that: the method and the device are used for selecting the trusted node which is approved by the first block chain and the second block chain at the same time when the cross-chain communication is initiated to the second block chain, and recording the trusted node in the first information, so that the first information can only be used for executing the cross-chain task by the selected trusted node, the selected trusted node can be ensured to be an online node, and the safety and the real-time performance of the data cross-chain communication are realized.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a diagram of a system architecture to which the cross-chain communication method of the present invention may be applied;
FIG. 2 is a flow chart of a method of cross-chain communication provided in one embodiment of the present invention;
fig. 3 is a flow chart of a method of cross-chain communication provided in another embodiment of the present invention.
Fig. 4 is a schematic diagram of a cross-link communication device according to an embodiment of the present invention.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, techniques, etc., in order to provide a thorough understanding of the embodiments of the present invention. It will be apparent, however, to one skilled in the art that the present invention may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present invention with unnecessary detail.
In order to illustrate the technical scheme of the invention, the following description is made by specific examples.
First embodiment
Fig. 1 is a system architecture to which the cross-chain communication method of the present invention can be applied.
As shown in fig. 1, the system architecture 100 is a peer-to-peer network, also referred to as a P2P network, formed by a plurality of terminal devices 101, 102, 103, 104, 105, 106 interconnected by a network 107.
The network 107 is a communication link that interconnects the terminal devices 101, 102, 103, 104, 105, and 106, the network 107 may be an application, an algorithm, etc. that implements the communication link, and the network 107 may also be a device such as a network cable, an optical fiber, a router, a switch, etc., or the network 107 may be any combination of the above.
In practical applications, the number of terminal devices in the peer-to-peer network may be much larger than that shown in fig. 1, i.e. not limited to the above-mentioned terminal devices 101, 102, 103, 104, 105 and 106. And the terminal device 101, 102, 103, 104, 105 or 106 may specifically comprise hardware, software or a combination of both. For example, when the terminal device 101, 102, 103, 104, 105 or 106 is hardware, it may be specifically a computer, a server, a gateway, a smart phone, a smart wearable device, or the like; when the terminal device 101, 102, 103, 104, 105, or 106 is software, it may be specifically an application or a computer program or the like installed on the hardware; of course, the terminal device 101, 102, 103, 104, 105 or 106 may also be a combination of the above software and hardware.
In this embodiment, the system architecture is applied to the network base of the blockchain technology, so as to implement cross-chain communication between different blockchains.
Illustratively, assuming that a first blockchain is running in the peer-to-peer network while a second blockchain is also running in the peer-to-peer network, then a user logs in the first blockchain on any of the terminal devices 101, 102, 103, 104, 105 or 106 in the peer-to-peer network and then initiates a cross-chain communication based message to the second blockchain; at the same time, any on-line node of the second blockchain may receive the message. The implementation of the security of the message in the cross-link communication process can be described by the following specific embodiments.
Specifically, based on the blockchain technology, taking the first blockchain as an example, any one of the terminal devices 101, 102, 103, 104, 105 or 106 in the peer-to-peer network may install a first blockchain application or log on the first blockchain, when a user accesses the first blockchain on the terminal device, the terminal device is one of online nodes of the first blockchain, and if the node generates information under the first blockchain, the information is synchronously copied to other nodes of the first blockchain based on the peer-to-peer network.
It should be appreciated that any of the end devices 101, 102, 103, 104, 105, or 106 in the peer-to-peer network described above may be either a node of the first blockchain or a node of the second blockchain. That is, in the peer-to-peer network shown in fig. 1, more than one blockchain system may be running, or alternatively, any of the terminal devices 101, 102, 103, 104, 105 or 106 may access different blockchains, or multiple different blockchain applications simultaneously, etc.
In some embodiments, as shown in connection with fig. 1, the terminal device 101, 102, 103, 104, 105 or 106 may be a network node accessing the first blockchain or/and the second blockchain, and the network node may include a memory and a processor, where the memory stores a computer program executable on the processor, and the computer program implements the steps of the method for cross-chain communication provided in the following embodiments when the computer program is executed by the processor.
Based on the same inventive concept as the above-described embodiments, in some embodiments, a computer-readable storage medium storing a computer program which, when executed by a processor, implements the steps of the cross-chain communication method provided in the following embodiments may also be provided.
Second embodiment
In this embodiment, the cross-link communication method of the present invention will be described in more detail according to the application example of the first embodiment described above.
Fig. 2 is a flowchart of a method of cross-link communication provided in an embodiment of the present invention.
In this embodiment, the cross-chain communication method is used to implement cross-chain communication between different blockchains, for example, a user sends information to a second blockchain on any network node of the first blockchain. The main execution body of the above-mentioned cross-chain communication method may be any node in the peer-to-peer network where the first blockchain or/and the second blockchain operates, for example, any terminal device 101, 102, 103, 104, 105 or 106 in the peer-to-peer network shown in fig. 1.
As shown in fig. 2, the above-mentioned cross-link communication method includes the following steps:
S210: when a first node accessing a first blockchain acquires first information of a user initiating a cross-chain request to a second blockchain on the first blockchain, determining whether the first node is a trusted node of the first blockchain selected by the user.
Specifically, the first node refers to a main body capable of executing the cross-chain communication method, and is a relative referent object, which can be specifically any node accessing the first blockchain. For example, each terminal device in the peer-to-peer network shown in fig. 1 has access to a first zone cross-link, then the first node may be any of said terminal devices 101, 102, 103, 104, 105 or 106. In addition, the first node may not be the point where the user initiates the cross-chain communication, i.e., there is a user initiating the cross-chain communication based first information on other nodes accessing the first blockchain, and all nodes on the first blockchain may receive the first information. Obviously, the first node may also be the node that initiates the first information.
In addition, because the first area cross-link access equipment does not all require real-time online, in the first blockchain network, if the first area cross-link access equipment is offline, only online nodes can process related data or information if the cross-link information is performed at the moment, and when the number of online nodes is low, the safety of data transmission is difficult to ensure. Based on the above, in this embodiment, when the first node obtains the first information initiated by the user, it is verified whether the current first node is the trusted node selected by the user when initiating the cross-link communication and recorded in the first information, and if so, it is authorized to continue to perform the cross-link communication. That is, the first information includes trusted node information selected by a user when initiating cross-chain communication on the first blockchain and recorded in the first information, and the trusted node is at least a trusted node of the first blockchain.
Specifically, a trusted node refers to a node that is approved or authenticated by the first blockchain. The trusted node is also a node in the first blockchain, and is different from the common node in that the trusted node is a node approved by all nodes or most nodes, and has higher reliability. In general, a voting scheme may be employed to select a certain number of trusted nodes on a first blockchain. For example, taking a federation chain as an example, an account number that can be recognized by more than 2/3 of the nodes within the federation can become a trusted node (account number).
In particular, the trusted node may be added by the blockchain at startup, or at run-time.
S220: if so, verifying whether the first node is a trusted node of the second blockchain.
Specifically, in the case that the first node is the trusted node selected by the user, this step continues to verify whether the first node is a trusted node of the second blockchain. That is, the cross-chain communication method is allowed to be performed only if the first node is a trusted node of both the first blockchain and the second blockchain.
The function is as follows: the user can select the trusted node from the intersection set of the trusted node set of the first blockchain and the trusted node set of the second blockchain to execute the cross-link communication, so that on one hand, the reliability of the node can be ensured, and on the other hand, the selected trusted node is required to be online, and the real-time performance of the cross-link communication is ensured.
In addition, as can be seen from the above description about the trusted node, the second area cross-chain trusted node is known, and for this reason, the confirmation can be implemented on a single node, which is not described herein.
S230: and if the first node is a trusted node of the second blockchain, verifying the validity of a first signature in the first information, wherein the first information comprises the first signature of the user.
Specifically, to implement cross-link communication, the first information may include the following contents:
initiating user information, which is marked as u;
first blockchain information, denoted a;
second blockchain information, denoted B;
Information transferred from the first blockchain to the second blockchain is denoted as msg;
initiating a trusted node selected by a user, and marking the trusted node as b;
And the signature of the initiating user on the above information, i.e., the first signature, is noted usign. It can be seen that the content included in the first information can be expressed as: ((u, A, B, msg, B), usign).
Illustratively, the initiating user information u may be a user ID; the first blockchain information A and the second blockchain information B can be respectively a chain ID of a cross-chain communication starting blockchain and a chain ID of a target blockchain; the information msg transferred from the first blockchain to the second blockchain can be transaction information and the like; the trusted node b selected by the initiating user can be selected from a trusted node intersection set of a first blockchain and a second blockchain; the first signature usign may be specifically a hash value obtained by performing hash calculation on the initiating user information u, the first blockchain information a, the second blockchain information B, and the information msg transferred from the first blockchain to the second blockchain, or based on an asymmetric encryption algorithm, encrypt the hash value by using a user private key to obtain encrypted data, or the like.
From the above, verifying the validity of the first signature can confirm whether the user has tampered with the content (u, a, B, msg, B) in the first information based on the cross-chain communication. Thereby ensuring the reliability and safety of the data in the link.
For example, assume that the first signature is a hash of content (u, a, B, msg, B) to obtain a first hash value. Then, verifying the signature at the first node, only performing hash calculation on the content (u, a, B, msg, B) to obtain a second hash value, and comparing whether the second hash value is consistent with the first hash value: if so, it can be confirmed that the content (u, A, B, msg, B) is not modified; otherwise, the content (u, a, B, msg, B) is modified. Since signature and signature verification are basic knowledge of blockchain technology, they are not described in detail herein.
It should be noted that, in the first blockchain, when a node that is not a trusted node acquires the first information, no further processing will be performed on the first information, so that the processing case for the node that is not a trusted node is omitted here, and because this case is not a contribution of the present invention to the prior art, a detailed discussion will not be made here.
S240: and if the first information is legal, the first node signs the first information to generate second information at least comprising the first information and the second signature.
Specifically, under the condition that the first information is legal, the first node signs the first information again, so that the reliability of the first information in the link can be further ensured.
Illustratively, as shown above, the content of the first information is: ((u, a, B, msg, B), usign), then the signature of the first information by the first node may be noted bsign. For this purpose, the content of the second information may be noted as: (((u, A, B, msg, B), usign), bsign).
S250: and sending the second information to a second blockchain.
According to the embodiment, when the cross-link communication is initiated to the second blockchain, the trusted nodes which are simultaneously approved by the first blockchain and the second blockchain are selected and recorded in the first information, so that the first information can only be used for executing the cross-link task by the selected trusted nodes, the selected trusted nodes can be ensured to be online nodes, the safety of the data cross-link communication is ensured, and the real-time performance of the cross-link calculation is ensured.
As can be seen from the above description, the above cross-chain communication scheme is illustrated from the first blockchain side. On the basis of the technical scheme, the technical scheme of the invention is further described from the second blockchain side.
Fig. 3 is a flow chart of a method of cross-chain communication provided in another embodiment of the present invention.
As shown in fig. 3, the cross-link communication method may further include the following steps S310 to S340:
S310: and when a second node accessing at least a second blockchain receives the second information, verifying whether the first node is a trusted node of the second blockchain.
Specifically, the second node is a node accessing to the second blockchain, and similarly, the second node may be any node in the peer-to-peer network where the second blockchain is running as shown in fig. 1. It should be understood that the second node and the first node may be two different nodes in the peer-to-peer network, that is, the two nodes are sequentially connected to a single blockchain and a second blockchain; furthermore, the second node and the first node may also be the same node in the peer-to-peer network, i.e. the node accesses both the first and second blockchains.
Any node in the second blockchain network can receive the second information sent by the first node on the first blockchain. Because the second information contains the trusted node b selected by the initiating user, the second node can verify whether the trusted node b selected by the user is the trusted node of the second blockchain according to the second information, so that the credibility of the executing node is ensured.
S320: if yes, determining the validity of the second information.
In some embodiments, the first signature and the second signature are included in the second information. For this purpose, determining the validity of the second information comprises the following steps:
s410: verifying the validity of the second signature;
S420: if so, then verifying whether the first signature is legal:
S430: if yes, determining that the second information is legal.
Wherein if the second signature is verified or the first signature is not legal, the second information will not be processed at this time. In particular implementations, the invention is not limited herein to processing mechanisms that do not pass signature verification. Exemplary processing mechanisms that do not pass signature verification may include stopping execution, discarding the second information, etc., and are not described in detail herein
In addition, based on the above description, the verification of the second signature and the first signature is the prior art, so the description is not repeated here.
S330: and if the second information is legal, recording the second information on the second block chain.
Specifically, recording the second information on the second blockchain may include recording information msg in the second information transferred from the first blockchain to the second blockchain on the second blockchain, thereby completing the cross-chain communication. For example, the second information is recorded on a block under the second node.
In addition, the recording of the second information on the second blockchain may also include receiving, on the second blockchain, information msg sent by the user on the first blockchain across chains, so as to complete the across-chain communication. For example, assuming that the information msg is "send 100 money to B", this action of sending money is performed in response to the information msg to complete the cross-link communication.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present invention.
Third embodiment
Based on the same general inventive concept as the second embodiment, correspondingly, the present embodiment further provides a cross-link communication device. Since the technical problems to be solved by the cross-link communication device and the cross-link communication method, the adopted technical scheme and the expected technical effects are the same, the present embodiment will be briefly described below, and if a clearer and complete technical scheme is to be understood, reference may be made to the above second embodiment.
Fig. 4 is a schematic diagram of a cross-link communication device according to an embodiment of the present invention.
Specifically, the illustrated cross-chain communication device is configured to be disposed on any node in a peer-to-peer network where the first blockchain or/and the second blockchain operates, as shown in fig. 4, the cross-chain communication device 400 includes: the cross-chain detection module 401 is configured to determine whether a first node accessing a first blockchain is a trusted node of the first blockchain selected by a user when the first node obtains first information of a cross-chain request initiated by the user to a second blockchain; a first trusted node verification module 402 configured to verify if the first node is a trusted node of the second blockchain if it is; a first signature verification module 403 configured to verify the validity of a first signature in the first information if the first node is a trusted node of the second blockchain, wherein the first information includes the first signature of the user; a signature module 404 configured to, if legal, sign the first information by the first node and generate second information at least including the first information and a second signature; the cross-chain sending module 405 is configured to send the second information to a second blockchain.
In some embodiments, the cross-chain communication device further comprises: a second trusted node verification module configured to verify whether the first node is a trusted node of a second blockchain when at least a second node accessing the second blockchain receives the second information; the second signature verification module is configured to determine the validity of the second information if yes; and the cross-chain response module is configured to record the second information on the second block chain if the second information is legal.
In some embodiments, the second trusted node verification module specifically includes: a first signature verification unit configured to verify the validity of the second signature; a second signature verification unit configured to re-verify whether the first signature is legitimate if it is legitimate: and the legal confirmation unit is configured to determine that the second information is legal if the second information is legal.
Specifically, the first information at least includes: initiating user information; first blockchain information; second blockchain information; information transferred by the first blockchain to the second blockchain; initiating a trusted node selected by a user; a first signature of the user to the above information is initiated.
The above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention, and are intended to be included in the scope of the present invention.

Claims (6)

1. A method of cross-chain communication performed by any node in a peer-to-peer network where a first blockchain or/and a second blockchain operates, the method comprising:
when a first node accessing a first blockchain acquires first information of a user initiating a cross-chain request to a second blockchain, determining whether the first node is a trusted node of the first blockchain selected by the user;
If yes, the first node verifies whether the first node is a trusted node of the second blockchain;
if the first node is a trusted node of the second blockchain, verifying the validity of a first signature in the first information, wherein the first information comprises the first signature of the user;
if the first information is legal, the first node signs the first information to generate second information at least comprising the first information and the second signature;
transmitting the second information to a second blockchain;
When a second node accessing at least a second blockchain receives the second information, the second node verifies whether the first node is a trusted node of the second blockchain;
If yes, determining the validity of the second information;
If the second information is legal, recording the second information on the second block chain; the first node is a node which is selected by a user from the intersection set of the trusted node set of the first blockchain and the trusted node set of the second blockchain and is used for executing cross-chain communication, the first node is simultaneously the trusted nodes of the first blockchain and the second blockchain, and the trusted nodes are approved by all nodes or a great number of nodes;
The first information at least comprises: initiating user information; first blockchain information; second blockchain information; information transferred by the first blockchain to the second blockchain; initiating a trusted node selected by a user; a first signature of the user to the above information is initiated.
2. The method of cross-chain communication according to claim 1, wherein said determining the validity of the second information specifically comprises:
verifying the validity of the second signature;
if so, then verifying whether the first signature is legal:
if yes, determining that the second information is legal.
3. A cross-chain communication device disposed on any node in a peer-to-peer network where a first blockchain or/and a second blockchain operates, the cross-chain communication device comprising:
The system comprises a cross-chain detection module, a cross-chain detection module and a cross-chain communication module, wherein the cross-chain detection module is configured to determine whether a first node is a trusted node of a first blockchain selected by a user when the first node accessing the first blockchain acquires first information of the cross-chain request initiated by the user to a second blockchain, the first node is a trusted node selected by the user from an intersection set of the trusted nodes of the first blockchain and a set of the trusted nodes of the second blockchain, and is used for executing cross-chain communication, the first node is a trusted node of both the first blockchain and the second blockchain, and the trusted node is a node approved by all nodes or a vast number of nodes; the first information at least comprises: initiating user information; first blockchain information; second blockchain information; information transferred by the first blockchain to the second blockchain; initiating a trusted node selected by a user; initiating a first signature of the user on the information;
A first trusted node verification module configured to verify if the first node is a trusted node of the second blockchain if it is;
a first signature verification module configured to verify the validity of a first signature in the first information if the first node is a trusted node of the second blockchain, wherein the first information includes the first signature of the user;
the signature module is configured to sign the first information if the first information is legal, and generate second information at least comprising the first information and the second signature;
a cross-chain transmission module configured to transmit the second information to a second blockchain; a second trusted node verification module configured to verify whether the first node is a trusted node of a second blockchain when a second node accessing at least the second blockchain receives the second information;
the second signature verification module is configured to determine the validity of the second information if yes;
And the cross-chain response module is configured to record the second information on the second block chain if the second information is legal.
4. A cross-chain communication device according to claim 3, wherein the second trusted node verification module specifically comprises:
a first signature verification unit configured to verify the validity of the second signature;
a second signature verification unit configured to re-verify whether the first signature is legitimate if it is legitimate:
and the legal confirmation unit is configured to determine that the second information is legal if the second information is legal.
5. A network node comprising any one of a peer-to-peer network in which a first blockchain or/and a second blockchain operates, the network node comprising at least a memory and a processor, the memory having stored thereon a computer program operable on the processor, the computer program when executed by the processor implementing the steps of the method according to claim 1 or 2.
6. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor realizes the steps of the method according to claim 1 or 2.
CN202010813042.2A 2020-08-13 2020-08-13 Method, device, network node and storage medium for cross-link communication Active CN112104701B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010813042.2A CN112104701B (en) 2020-08-13 2020-08-13 Method, device, network node and storage medium for cross-link communication

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010813042.2A CN112104701B (en) 2020-08-13 2020-08-13 Method, device, network node and storage medium for cross-link communication

Publications (2)

Publication Number Publication Date
CN112104701A CN112104701A (en) 2020-12-18
CN112104701B true CN112104701B (en) 2024-04-19

Family

ID=73753623

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010813042.2A Active CN112104701B (en) 2020-08-13 2020-08-13 Method, device, network node and storage medium for cross-link communication

Country Status (1)

Country Link
CN (1) CN112104701B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112560113B (en) * 2020-12-24 2024-06-07 珠海格力电器股份有限公司 Node signature management method, system, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109242456A (en) * 2018-09-04 2019-01-18 湖南宸瀚信息科技有限责任公司 Across the chain method of commerce of block chain, system and storage medium
CN109345387A (en) * 2018-09-04 2019-02-15 湖南宸瀚信息科技有限责任公司 Across the chain method of commerce of block chain, across chain communication device and storage medium
CN110290021A (en) * 2019-06-19 2019-09-27 辽宁大学 Across chain common recognition time delay optimization method based on dynamic programming algorithm
CN111130808A (en) * 2020-03-26 2020-05-08 杭州智块网络科技有限公司 Cross-chain asset mapping method and system for block chain
CN111464536A (en) * 2020-03-31 2020-07-28 中国联合网络通信集团有限公司 Block chain cross-chain method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109242456A (en) * 2018-09-04 2019-01-18 湖南宸瀚信息科技有限责任公司 Across the chain method of commerce of block chain, system and storage medium
CN109345387A (en) * 2018-09-04 2019-02-15 湖南宸瀚信息科技有限责任公司 Across the chain method of commerce of block chain, across chain communication device and storage medium
CN110290021A (en) * 2019-06-19 2019-09-27 辽宁大学 Across chain common recognition time delay optimization method based on dynamic programming algorithm
CN111130808A (en) * 2020-03-26 2020-05-08 杭州智块网络科技有限公司 Cross-chain asset mapping method and system for block chain
CN111464536A (en) * 2020-03-31 2020-07-28 中国联合网络通信集团有限公司 Block chain cross-chain method and device

Also Published As

Publication number Publication date
CN112104701A (en) 2020-12-18

Similar Documents

Publication Publication Date Title
CN111066286B (en) Retrieving common data for blockchain networks using high availability trusted execution environments
CN111010376B (en) Master-slave chain-based Internet of things authentication system and method
CN112311735B (en) Credible authentication method, network equipment, system and storage medium
KR20200013680A (en) Script-based Blockchain Interaction
CN100474851C (en) Safety foundation structure of coordinate network name analytical agreement (PNRP) and method thereof
WO2021058298A1 (en) Consensus protocol for blockchain dag structure
CN113328997B (en) Alliance chain crossing system and method
CN110401640B (en) Trusted connection method based on trusted computing dual-system architecture
US11997210B2 (en) Protection of online applications and webpages using a blockchain
CN114629713B (en) Identity verification method, device and system
CN117155716B (en) Access verification method and device, storage medium and electronic equipment
CN112104701B (en) Method, device, network node and storage medium for cross-link communication
CN112118292A (en) Method, apparatus, network node and storage medium for cross-link communication
CN112104607B (en) Method, device, network node and storage medium for cross-link communication
CN115001707B (en) Device authentication method based on block chain and related device
US11399020B2 (en) System and method for authenticating server identity during connection establishment with client machine
CN113159774A (en) Monitorable zero-knowledge proof verification method and system in block chain
CN113922953B (en) Data processing method and device
CN111985927B (en) Block chain address authentication method and block chain transaction method based on social network
CN114615070B (en) Network security event capturing method and device based on trusted execution environment
Andréasson et al. Device Attestation for In-Vehicle Network
Haifeng et al. A Hierarchical Provable Massive Data Migration Method under Multicloud Storage
Nurkifli et al. Computer and Information Sciences
CN117097478A (en) Data processing method and device based on block chain and related equipment
CN117834312A (en) Network access method, network access device, and computer-readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240315

Address after: New Development Building 804, No. 6 Kangning Street, Dongfeng South Road, Zhengzhou Area (Zhengdong), Zhengzhou Pilot Free Trade Zone, Henan Province, 450016

Applicant after: Henan Zhongxin Guochuang Commercial Operation Management Co.,Ltd.

Country or region after: China

Address before: F651, floor 2, building 23, courtyard 1, gaolizhang Road, Haidian District, Beijing 100089

Applicant before: Beijing Xinsheng Yunjia Technology Co.,Ltd.

Country or region before: China

GR01 Patent grant
GR01 Patent grant