CN112801786A - Block chain system and method for joint operation based on same - Google Patents

Block chain system and method for joint operation based on same Download PDF

Info

Publication number
CN112801786A
CN112801786A CN202110065474.4A CN202110065474A CN112801786A CN 112801786 A CN112801786 A CN 112801786A CN 202110065474 A CN202110065474 A CN 202110065474A CN 112801786 A CN112801786 A CN 112801786A
Authority
CN
China
Prior art keywords
joint operation
target
target node
calculation
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110065474.4A
Other languages
Chinese (zh)
Inventor
陈杭
陈晓蕊
蒋腾
裴飞
曲亦直
赵雅譞
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110065474.4A priority Critical patent/CN112801786A/en
Publication of CN112801786A publication Critical patent/CN112801786A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The present disclosure provides a method for performing joint operation based on a blockchain system and a blockchain system. The joint operation request includes: the activity rules of the joint operation and the subjects participating in the joint operation activity. And loading respective system intelligent contracts in each target node according to the identity of the system intelligent contracts participating in joint operation calculation in all the target nodes. And the system intelligent contract of each target node acquires target data corresponding to the project name participating in joint operation calculation of the main body in the target node by calling the target service intelligent contract. And the system intelligent contract of each target node performs multi-party collaborative encryption calculation according to the calculation logic and the target data of the target node to obtain the activity calculation result of the main body. Based on the method and the block chain system, cross-scene data operation can be realized among different mechanisms.

Description

Block chain system and method for joint operation based on same
Technical Field
The present disclosure relates to the field of blockchain technology and finance, and more particularly, to a method for performing joint operation based on a blockchain system and a blockchain system.
Background
In a traditional centralized operation system, each organization needs to perform data interaction around a central system, a business process between cross-organizations needs to be circulated and processed through the central system, data processing is limited by the processing timeliness of the central system, and the processing timeliness is lower under the condition of high concurrent flow. In addition, each participant in the system is unwilling to share internal data in consideration of data privacy, business benefits and the like, so that a centralized operation system is easy to form a data island, a cross-subject and cross-scene joint operation mode is difficult to form, and a service development mode is limited.
In the course of implementing the disclosed concept, the inventors found that there are at least the following problems in the prior art: in the related technology, nodes of two different mechanisms can realize transaction between the two mechanisms through access to the same service channel, and for the scenes that different mechanisms need to cooperate based on different services and do not want to disclose respective internal service data, cross-scene data operation cannot be realized between different mechanisms due to the existence of a data isolation mechanism between different service channels.
Disclosure of Invention
In view of the above, the present disclosure provides a method for performing joint operation based on a blockchain system and a blockchain system.
A first aspect of the present disclosure provides a method for joint operation based on a blockchain system. The method comprises the following steps: and receiving a joint operation request initiated by the terminal. The joint operation request includes: the method comprises the following steps of activity rules of joint operation and main bodies participating in the joint operation activities, wherein the activity rules comprise: the identity of all target nodes participating in joint operation, the identity of a system intelligent contract participating in joint operation calculation in all target nodes, the project names participating in joint operation calculation in all target nodes, and the calculation logic required to be executed in joint operation. The method further comprises the following steps: and loading respective system intelligent contracts in each target node according to the identity of the system intelligent contracts participating in joint operation calculation in all the target nodes. The method further comprises the following steps: and the system intelligent contract of each target node acquires target data corresponding to the project name participating in joint operation calculation of the main body in the target node by calling the target service intelligent contract. The method further comprises the following steps: and the system intelligent contract of each target node performs multi-party collaborative encryption calculation according to the calculation logic and the target data of the target node to obtain the activity calculation result of the main body.
According to an embodiment of the present disclosure, all target nodes participating in joint operation include: a first target node of an originating organization operating jointly and a second target node of a joining organization operating jointly. The joint operation request initiated by the receiving terminal includes: a first target node of an initiating mechanism of joint operation receives a joint operation request initiated by a first terminal. The first terminal is a terminal of an initiating mechanism of joint operation, which has access right to the first target node. The joint operation request initiated by the receiving terminal further includes: the first target node broadcasts the joint operation request to a second target node of a joining mechanism of the joint operation according to the identity of all target nodes participating in the joint operation request, so that the second target node receives the joint operation request. And the joint operation activity rule carried by the joint operation request is formulated by an initiating mechanism of the joint operation.
According to another embodiment of the present disclosure, all target nodes participating in the joint operation include: a first target node of an originating organization operating jointly and a second target node of a joining organization operating jointly. The joint operation request initiated by the receiving terminal includes: and a specific target node in the second target nodes of the joining mechanism of the joint operation receives the joint operation request initiated by the second terminal. The second terminal is a terminal of a joint operation joining mechanism having access authority to a specific target node. The receiving of the joint operation request initiated by the terminal further includes: and the specific target node broadcasts the joint operation request to other target nodes in a first target node of an initiating mechanism of the joint operation and a second target node of a joining mechanism of the joint operation according to the identity of all target nodes participating in the joint operation request, so that the first target node and the other target nodes receive the joint operation request. And the joint operation activity rule carried by the joint operation request is formulated by an initiating mechanism of the joint operation.
According to an embodiment of the present disclosure, the method further includes: and carrying out consensus verification on the activity calculation results of the main body at all target nodes. The method further comprises the following steps: after the activity calculation results of the main body achieve consensus, writing the activity calculation results of the main body and intermediate results of the multi-party collaborative encryption calculation into an account book of the block chain system. The method further comprises the following steps: and feeding back the activity calculation result of the main body to the terminal initiating the joint operation request.
According to an embodiment of the present disclosure, all target nodes participating in the joint operation include: a first target node of an originating organization operating jointly and a second target node of a joining organization operating jointly. The method further comprises the following steps: and the second target node of the joining mechanism in the joint operation authorizes the encrypted use authority of the first target node of the initiating mechanism in the joint operation with respect to the target data corresponding to the project name participating in the joint operation calculation. And the target data with the encryption use authority as the second target node is used by the first target node after being encrypted so as to carry out multi-party collaborative encryption calculation. The duration of the encryption use permission is an activity period of the joint operation, and after the activity period of the joint operation is ended, the authorization is invalid.
According to an embodiment of the present disclosure, the activity rule further includes: a screening condition parameter for a particular target node. The system intelligent contract of each target node acquires target data corresponding to the project name of the main body participating in joint operation calculation in the target node by calling the target service intelligent contract, and the method comprises the following steps: the method comprises the steps that a system intelligent contract of a specific target node acquires initial data of a project name participating in joint operation calculation of a main body in the target node by calling a target service intelligent contract; and screening the initial data based on the screening condition parameters aiming at the specific target node to obtain target data of the project name which is subjected to joint operation calculation and is the main body of the specific target node after screening.
According to an embodiment of the present disclosure, the above-mentioned computation logic that needs to be executed in joint operation includes: first computational logic performed on the target data of all the target nodes. Or, the computation logic that needs to be executed by the joint operation includes: second computation logic performed on the target data of all the target nodes, and third computation logic performed on the computation results of all the target nodes. Or, the computation logic that needs to be executed by the joint operation includes: fourth calculation logic executed for target data in each target node, and fifth calculation logic executed for calculation results of all target nodes.
According to an embodiment of the present disclosure, the performing, by the system intelligent contract of each target node, multi-party collaborative encryption calculation according to calculation logic and target data of the target node to which the system intelligent contract belongs to obtain an activity calculation result of a main body includes: the system intelligent contract of each target node encrypts the target data of the target node; the encrypted target data is transmitted between the target node and other target nodes; and executing first calculation logic on the target data of all other target nodes and the local target data obtained by transmission at each target node to obtain the activity calculation result of the main body.
Or, the above-mentioned system intelligent contracts of each target node perform multi-party collaborative encryption calculation according to the calculation logic and the target data of the target node to which the system intelligent contracts belong, and obtain the activity calculation result of the main body, including: the system intelligent contract of each target node encrypts the target data of the target node; the encrypted target data is transmitted between the target node and other target nodes; executing second calculation logic on the target data of all other target nodes and the local target data which are obtained by transmission at each target node; and executing a third calculation logic on the calculation result obtained after the second calculation logic is executed to obtain the activity calculation result of the main body. Alternatively, the first and second electrodes may be,
the above-mentioned system intelligence contract of every goal node carries on many parties to cooperate the cryptographic computation according to the target data of computational logic and affiliated goal node, receive the activity calculated result of the body, including: executing fourth calculation logic aiming at target data in each target node, and encrypting the obtained result data; the result data after the encryption processing is transmitted between the target node and other target nodes; and executing a fifth calculation logic on the result data obtained by transmission and the local result data at each target node to obtain an activity calculation result of the main body.
According to an embodiment of the present disclosure, the method further includes: and configuring a target business intelligence contract. Configuring a target business intelligence contract comprises: and receiving a configuration request of the terminal to each target node. The configuration request includes the following information: the node access authority of the terminal, the address of the channel to be configured and the address of the service intelligent contract to be configured. Configuring the target business intelligence contract further comprises: and determining whether the configuration request aiming at the current target node is reasonable or not according to the node access authority of the terminal. Configuring the target business intelligence contract further comprises: and under the condition that the configuration request is reasonable, determining whether the current target node has the access right of the address of the channel to be configured and the address of the intelligent contract to be configured according to the preset access control right of the target node. Configuring the target business intelligence contract further comprises: and under the condition that the current target node has the access right of the address of the channel to be configured and the address of the intelligent contract of the service to be configured, configuring the address of the channel to be configured and the address of the intelligent contract of the service to be configured at the current target node so as to realize the configuration of the intelligent contract of the service of the target in the target channel, wherein the target channel is the service channel where the project participating in joint operation calculation is located.
According to an embodiment of the present disclosure, the method further includes: and configuring a monitoring port for multi-party cooperative encryption calculation. The above-mentioned monitor port for configuring multi-party cooperative encryption calculation includes: and receiving a listening port configuration request aiming at the current target node from the terminal. The listening port configuration request includes the following information: and the node access authority of the terminal and the parameters to be configured of the monitoring port. The configuring the listening port for multi-party collaborative encryption calculation further includes: and determining whether the monitoring port configuration request aiming at the current target node is reasonable or not according to the node access authority of the terminal. The configuring the listening port for multi-party collaborative encryption calculation further includes: and under the condition that the configuration request of the monitoring port is reasonable, configuring the parameters to be configured of the monitoring port at the current target node so as to realize the configuration of the monitoring port of the multi-party cooperative encryption calculation.
According to an embodiment of the present disclosure, the method further includes: and formulating an activity rule of joint operation. Wherein, the step of formulating the activity rule of the joint operation comprises the following steps: and acquiring an item name directory of nodes of an initiating mechanism and a non-initiating mechanism which are operated jointly in the blockchain system, wherein the item names in the item name directory of the non-initiating mechanism are authorized to be disclosed in the non-initiating mechanism. The step of formulating the activity rule of the joint operation further comprises the following steps: and determining the target nodes participating in joint operation and the projects of the target nodes according to the project name catalogs of the nodes of the initiating mechanism and the non-initiating mechanism. The step of formulating the activity rule of the joint operation further comprises the following steps: and determining the activity rule of the joint operation according to the target nodes participating in the joint operation, the project of the target nodes and the set calculation logic required to be executed by the joint operation.
A second aspect of the present disclosure provides a blockchain system for joint operation. The block chain system comprises: t nodes, T is more than or equal to 2, a transaction processing module and a system intelligent contract. The T nodes respectively correspond to M different mechanisms participating in joint operation, and M is more than or equal to 2 and less than or equal to T. The transaction processing module is respectively deployed in each target node of the M mechanisms, and the target nodes are nodes used for participating in joint operation in the T nodes. The transaction processing module is used for receiving a joint operation request initiated by a terminal. The joint operation request includes the following information: the activity rules of the joint operation and the subjects participating in the joint operation activity. The activity rules include: the identity of all target nodes participating in joint operation, the identity of a system intelligent contract participating in joint operation calculation in all target nodes, the project names participating in joint operation calculation in all target nodes, and the calculation logic required to be executed in joint operation. The system intelligent contracts are respectively deployed in each target node of the M mechanisms, and comprise: the system comprises a data acquisition module and a multi-party security calculation module. The data acquisition module of each target node is used for calling a service intelligent contract at the target node to acquire target data corresponding to a project name of a main body participating in joint operation calculation in the target node under the condition of receiving the joint operation request. And the multi-party security calculation module of each target node is used for carrying out multi-party collaborative encryption calculation according to the calculation logic and the target data of the target node to which the calculation logic belongs so as to obtain the activity calculation result of the main body.
According to an embodiment of the present disclosure, the above block chain system further includes: the device comprises a consensus verification module, a billing module and a result feedback module. The consensus verification module is respectively deployed in each target node of the M mechanisms and is used for performing consensus verification on the activity calculation results of the main body at all the target nodes. And the accounting module is used for writing the activity calculation result of the main body and the intermediate result of the multi-party collaborative encryption calculation into an account book of the block chain system after the activity calculation result of the main body achieves consensus. The result feedback module is used for feeding back the activity calculation result of the main body to the terminal initiating the joint operation request.
According to an embodiment of the present disclosure, the above block chain system further includes: and the target service intelligent contract configuration module is used for configuring a target service intelligent contract.
According to an embodiment of the present disclosure, the above block chain system further includes: and the monitoring port configuration module is used for configuring a monitoring port for multi-party collaborative encryption calculation.
According to an embodiment of the present disclosure, the above block chain system further includes: and the data use authorization module is arranged inside a second target node of the joint operation joining mechanism. The data use authorization module is used for authorizing the encrypted use authority of the first target node of the initiating mechanism of the joint operation with respect to the target data corresponding to the project name participating in the joint operation calculation.
According to an embodiment of the present disclosure, the above block chain system further includes: the terminal comprises a first terminal and a second terminal. All target nodes participating in the joint operation include: a first target node of an originating organization operating jointly and a second target node of a joining organization operating jointly. The first terminal is a terminal of an initiating mechanism of joint operation, which has access right to the first target node. The second terminal is a terminal of a joint operation joining mechanism having access right to the second target node. The joint operation activity rule carried by the joint operation request is formulated by an initiating organization of the joint operation. During the joint operation activity, the terminal initiating the joint operation request is the first terminal. Or, during the joint operation activity, the terminal initiating the joint operation request includes: a first terminal, and at least one of a second terminal.
According to an embodiment of the present disclosure, the first terminal and the second terminal each include: and a communication module. The communication module is used for information interaction between the terminal and the node. The communication module of the first terminal is used for sending the joint operation request and receiving the activity calculation result of the main body.
According to the embodiment of the present disclosure, the communication module is further configured to send a configuration request to the target node and/or send a listening port configuration request to the target node. The configuration request includes the following information: the node access authority of the terminal, the address of the channel to be configured and the address of the service intelligent contract to be configured. The listening port configuration request includes the following information: and the node access authority of the terminal and the parameters to be configured of the monitoring port.
When the terminal initiating the joint operation request is a first terminal during the joint operation activity, a communication module of the first terminal is used for sending the joint operation request to a first target node, receiving an activity calculation result of a main body from the first target node, and sending a configuration request and/or a monitoring port configuration request to the first target node; at this time, the communication module of the second terminal is configured to send a configuration request and/or a listening port configuration request to the second target node.
When the terminal initiating the joint operation request comprises at least one of the first terminal and the second terminal, the communication module of the first terminal is configured to send the joint operation request to the first target node and to receive the activity calculation result of the subject from the first target node, and to send the configuration request and/or listen to the port configuration request to the first target node. The communication module of the second terminal is configured to send a joint operation request to the second target node, receive an activity calculation result of the subject from the second target node, and send a configuration request and/or a listening port configuration request to the second target node.
According to an embodiment of the present disclosure, the first terminal further includes: and an activity rule making module. The activity rule making module is used for making an activity rule of joint operation. The activity rule making module comprises the following sub-modules: the system comprises a project name acquisition submodule, a target node and project determination submodule and an activity rule determination submodule. The project name acquisition submodule is used for acquiring a project name directory of nodes of an initiating mechanism and a non-initiating mechanism which are operated jointly in the blockchain system, and project names in the project name directory of the non-initiating mechanism are authorized and disclosed project names in the non-initiating mechanism. And the target node and project determining submodule is used for determining projects of the target node and the target node participating in joint operation according to the project name directories of the nodes of the initiating mechanism and the non-initiating mechanism. And the activity rule determining submodule is used for determining the activity rule of the joint operation according to the target node participating in the joint operation, the project of the target node and the set calculation logic which needs to be executed by the joint operation.
According to the embodiment of the disclosure, when a plurality of mechanisms perform joint operation, the system intelligent contract deployed by each target node can realize cross-channel multi-party cooperative encryption calculation aiming at target data of different service scenes by calling each service intelligent contract, cross-scene operation is realized on the premise of ensuring that the target data of each channel is not disclosed externally, and the problem that cross-scene data operation cannot be realized among different mechanisms due to the existence of a data isolation mechanism among different service channels can be at least partially solved.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent from the following description of embodiments of the present disclosure with reference to the accompanying drawings, in which:
fig. 1 schematically illustrates a method for joint operation based on a blockchain system and an application scenario of the blockchain system according to an embodiment of the present disclosure;
fig. 2 schematically illustrates a flow chart of a method for joint operation based on a blockchain system according to an embodiment of the present disclosure;
fig. 3 schematically illustrates a detailed implementation flowchart of operation S13 according to an embodiment of the present disclosure;
fig. 4 schematically illustrates an implementation process diagram of operation S13 according to an embodiment of the present disclosure;
fig. 5 schematically shows a detailed implementation flowchart of operation S13 according to another embodiment of the present disclosure;
fig. 6 schematically shows an implementation process schematic of operation S13 according to another embodiment of the present disclosure;
fig. 7 schematically illustrates an implementation process diagram of operation S14 according to an embodiment of the present disclosure;
fig. 8 schematically illustrates an implementation process diagram of operation S15 according to an embodiment of the present disclosure;
fig. 9 schematically illustrates an implementation process diagram of operation S13 according to yet another embodiment of the present disclosure;
fig. 10 schematically illustrates an implementation process of operation S15 according to another embodiment of the present disclosure;
fig. 11 schematically shows a schematic diagram of an implementation procedure of operation S16 according to an embodiment of the present disclosure, where (a) illustrates an implementation procedure of multi-party cooperative encryption calculation on the target data in the embodiment shown in fig. 8, and (b) illustrates an implementation procedure of multi-party cooperative encryption calculation on the target data in the embodiment shown in fig. 10;
FIG. 12 is a schematic diagram illustrating an implementation process of performing multi-party cooperative encryption calculation and result feedback according to calculation logic and target data of a target node according to an embodiment of the present disclosure;
fig. 13 schematically shows an implementation process of performing multi-party cooperative encryption calculation according to an embodiment of the present disclosure, in which (a) illustrates an exemplary manner of performing encryption processing on target data and distributing the encrypted target data to other nodes, and (b) illustrates an implementation process of performing a first calculation logic on target data of all other target nodes obtained by transmission and local target data;
FIG. 14 is a schematic diagram illustrating an implementation process of performing multi-party cooperative encryption calculation and result feedback according to calculation logic and target data of a target node according to another embodiment of the present disclosure;
fig. 15 schematically illustrates a flow chart of a method of joint operation based on a blockchain system according to another embodiment of the present disclosure;
fig. 16 schematically shows a detailed implementation flowchart of operation S10 according to an embodiment of the present disclosure;
FIG. 17 is a flowchart illustrating a detailed implementation of operation S121 for configuring a target business intelligence contract according to an embodiment of the present disclosure;
fig. 18 schematically shows a flowchart of a detailed implementation of operation S122 of configuring a listening port of multi-party cooperative encryption calculation according to an embodiment of the present disclosure;
fig. 19 schematically shows a flowchart further including operations S17-S19 after operation S16 according to still another embodiment of the present disclosure;
FIG. 20 schematically illustrates a block chain system according to an embodiment of the disclosure;
FIG. 21 schematically illustrates a block diagram of a target node according to an embodiment of the present disclosure;
FIG. 22 schematically illustrates a block diagram of a target node according to another embodiment of the present disclosure;
fig. 23 schematically shows a block diagram of a blockchain system according to another embodiment of the present disclosure; and
fig. 24 schematically shows a block diagram of a first terminal according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). "A and/or B" means that A is included alone, or B is included alone, or both A and B are included.
The embodiment of the disclosure provides a method for performing joint operation based on a block chain system and the block chain system. The method for performing joint operation includes: and receiving a joint operation request initiated by the terminal. The joint operation request includes the following information: the method comprises the following steps of activity rules of joint operation and main bodies participating in the joint operation activities, wherein the activity rules comprise: the identity of all target nodes participating in joint operation, the identity of a system intelligent contract participating in joint operation calculation in all target nodes, the project names participating in joint operation calculation in all target nodes, and the calculation logic required to be executed in joint operation. The method further comprises the following steps: and loading respective system intelligent contracts in each target node according to the identity of the system intelligent contracts participating in joint operation calculation in all the target nodes. The method further comprises the following steps: and the system intelligent contract of each target node acquires target data corresponding to the project name participating in joint operation calculation of the main body in the target node by calling the target service intelligent contract. The method further comprises the following steps: and the system intelligent contract of each target node performs multi-party collaborative encryption calculation according to the calculation logic and the target data of the target node to obtain the activity calculation result of the main body.
Fig. 1 schematically illustrates a method for performing joint operation based on a blockchain system and an application scenario of the blockchain system according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of an application scenario in which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, but does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
The decentralized, non-falsifiable and traceable characteristics of the blockchain system provide a good solution for solving the problems encountered by centralized operation, but in practical application, there are still some problems to be solved in terms of data privacy protection, for example, due to the existence of a physical channel data isolation mechanism in the blockchain, data among channels are not visible, and cross-scene and cross-organization data transfer applications among various organizations are limited to a certain extent.
Referring to fig. 1, three different mechanisms are illustrated, mechanism 1, mechanism 2 and mechanism 3. Each facility may have one or more blockchain nodes, which for the sake of simplicity of description will be referred to as nodes for short. The node is the minimum execution carrier in the blockchain system, is mainly responsible for functions such as transaction endorsement, verification, accounting, blockchain synchronization and the like, belongs to the inside of an organization, and an organization at least has one node, and can not perform any operation in the blockchain system without the node. Nodes within an organization generally serve only the organization to which the node belongs, and do not interfere with nodes of other organizations.
The organization distinguishes in the block chain system through methods such as configuration, certificate, identity mark, and the like, and each plays its own role and respectively completes the related business.
A channel is a logical concept in a blockchain system, which can be used to distinguish different business applications, and all transactions are performed in the channel. Multiple channels can be created in a blockchain system, and transactions of different service scenes are carried out in different channels without mutual interference. The block chain node must be added into the channel to carry out transaction operation, and the node is added into different channels according to different service application requirements. A channel may contain multiple nodes and a node may join multiple different channels.
Referring to fig. 1, nodes 1, 2, 3, 4, and 5 are used to schematically illustrate nodes added to a blockchain system, and each node corresponds to its own organizational structure, for example, node 1 belongs to organization 1, nodes 2 and 3 belong to organization 2, and nodes 4 and 5 belong to organization 3. The above-mentioned organizations may be in the form of banks, companies, schools, markets, supermarkets or other organizations, and the respective business types of the above-mentioned organizations may be online transaction types or offline transaction types, that is, the business of each organization may be the business generated by an entity organization having a money transaction business, or the business generated by an online service platform corresponding to an entity organization having a money transaction business, and the above-mentioned financial business includes: consumption, investment financing, and money transfer, among others.
In the related art, when there is a service going to and from an organization, a service channel may be created in a blockchain system, the service channel is shown by referring to a channel a, a channel B, a channel C, a channel D, a channel E, and a channel F in fig. 1, the related organization adds its own node to the channel, then deploys an intelligent contract for processing the related service at the node on the channel, and the node in the channel may complete a transaction operation in the channel through the intelligent contract, while an organization without a node added to the channel cannot perform a transaction in the channel or cannot acquire data and related information in the channel. For example, there is a traffic to and from the institution 1 and the institution 2, taking a traffic a corresponding to the channel a as an example, the institution 1 adds the internal node 1 to the channel a, the institution 2 adds the internal node 3 to the channel a, the institution 1 deploys an intelligent contract for processing the traffic a at the node 1, and the institution 2 deploys an intelligent contract for processing the traffic a at the node 3, so that the institution 1 and the institution 2 can perform a transaction in the channel a based on the respective intelligent contracts.
In the process, the nodes of two different mechanisms can realize the transaction between the two mechanisms through accessing the same service channel, but because the account book data in the channel is physically isolated and stored, the nodes which are not added into the channel can not store the account book data of the channel. The channel and the external environment, and the channel are not interfered with each other, the service requirements specified in the channel are respectively completed, and simultaneously, the channel data is only visible to the inside of the channel and is invisible to the outside. For a scenario that different organizations need to cooperate based on different businesses and do not want to disclose their internal business data, for example, organization 1 wants to invite organization 2 and organization 3 to perform joint operation, during the activity of the joint operation, the business data of different scenarios of organization 1, organization 2, and organization 3 need to be used, and then whether the subject meets the activity rule is determined according to the business data of the subject participating in the joint operation activity in a plurality of different business scenarios. Because a data isolation mechanism exists between different service channels, cross-scene data operation between different mechanisms cannot be realized.
In view of the above, a first exemplary embodiment of the present disclosure provides a method for joint operation based on a blockchain system.
Fig. 2 schematically shows a flowchart of a method for joint operation based on a blockchain system according to an embodiment of the present disclosure.
Referring to fig. 2, the method for performing joint operation based on the blockchain system of the present embodiment includes the following operations: S13-S16.
In operation S13, a joint operation request initiated by a terminal is received, where the joint operation request includes: the method comprises the following steps of activity rules of joint operation and main bodies participating in the joint operation activities, wherein the activity rules comprise: the identity of all target nodes participating in joint operation, the identity of a system intelligent contract participating in joint operation calculation in all target nodes, the project names participating in joint operation calculation in all target nodes, and the calculation logic required to be executed in joint operation.
In operation S14, a respective system intelligence contract is loaded at each target node according to the identity of the system intelligence contract participating in joint operation computation in all target nodes.
In operation S15, the system intelligence contract of each target node obtains target data corresponding to the project names of the subjects participating in the joint operation calculation in the target node by calling the target service intelligence contract.
In operation S16, the system intelligence contract of each target node performs multi-party collaborative encryption calculation according to the calculation logic and the target data of the target node to which the contract belongs, so as to obtain the activity calculation result of the subject.
During the joint operation activity, there may be a plurality of processes of initiating and processing the joint operation request, where each time the joint operation request is initiated is a terminal, and the terminal may be a first terminal corresponding to an initiating mechanism of the joint operation. Or one of the first terminal and a second terminal corresponding to a joining organization of the joint operation.
The above-mentioned operations S13 to S16 are performed during the joint operation activity, one joint operation request corresponds to one subject participating in the joint operation activity, and the result of activity calculation of the subject is obtained by performing the above-mentioned operations S13 to S16, thereby determining whether the subject participating in the joint operation activity can enjoy the benefit scheme in the activity rule. The above operations S13-S16 may be performed by target nodes participating in joint operations computation in the blockchain system.
The following describes exemplarily the subject of transaction occurrence under various activity rules and the scenario of joint operation activity occurrence with reference to fig. 1.
According to an embodiment of the present disclosure, the activity rule includes: the identity of all target nodes participating in joint operation, the identity of a system intelligent contract participating in joint operation calculation in all target nodes, the project names participating in joint operation calculation in all target nodes, and the calculation logic required to be executed in joint operation. Different calculation logics can be set according to different joint operation requirements. The calculation logic includes at least one of mathematical operation, logical operation, and conditional judgment.
Referring to fig. 1, a main body is shown as a hexagon star, and the main body is consumed in the mechanism 1 for the item a, the main body is consumed in the mechanism 2 for the item B, and the main body is consumed in the mechanism 3 for the item E. The initiating mechanism of the joint operation is the mechanism 1, the joining mechanism of the joint operation is the mechanism 2 and the mechanism 3, and the mechanism 1 can make the activity rule of the joint operation according to the actual requirement.
Fig. 1 illustrates three activity rules, activity rule 1, activity rule 2, and activity rule 3, and the activity rules in the present disclosure are not limited to the embodiment and may be other activity rules, and these 3 activity rules are taken as examples here.
Referring to fig. 1, in activity rule 1, if the total sum of the consumptions of any one of the subjects at item a of facility 1, item B of facility 2, and item E of facility 3 exceeds x, then a full x minus x benefit is enjoyed at facility 1. In the scenario of the activity rule 1, it is necessary to count the total amount of consumption of the subject in the item a of the institution 1, the item B of the institution 2, and the item E of the institution 3, and calculate whether the total amount of consumption exceeds ×. The scenario corresponding to the activity rule 1 may be that the organization 1 initiated by the joint operation is a host organization of the joint operation activity, and the data that needs to be counted by the activity comes from three organizations. For example, the organization 1 is a supermarket, the organization 2 is a mobile phone business hall, the organization 3 is a movie theater, in the joint operation activity initiated by the supermarket, if the total consumption of the same mobile phone number in the supermarket, the mobile phone business hall and the movie theater is full of 100 yuan during the activity, the mobile phone business hall and the movie theater can enjoy discount in the supermarket, and the mobile phone business hall and the movie theater are only used as data participants of the joint operation and are not used as participation organizations preferential for the actual operation activity.
In activity rule 2, if the total amount of consumption of any subject in item a of institution 1, item B of institution 2, and item E of institution 3 exceeds x, the subject enjoys a full x minus x preference in each of institution 1, institution 2, and institution 3. Under the scenario of the campaign rule 2, the organization 1 initiated by the joint operation and the organizations 2 and 3 joined by the joint operation are all sponsoring organizations for the campaign, and during the campaign period of the joint operation, 3 organizations all perform the transaction process of the joint operation. The activity rule is formulated by the initiator of the joint operation, namely the activity rule is formulated by the organization 1, and after the activity rule is formulated, the main body can participate in the joint operation activity at the organizations 1, 2 and 3 and enjoy the activity preference. In other embodiments, the above scenario may also be: the main body can participate in the activity preferential of the joint operation at the mechanism 1 and the mechanism 2, and the mechanism 3 only provides data participating in the collaborative encryption calculation, so that the main body does not enjoy the full reduction preferential. For example, the organization 1 is a supermarket, the organization 2 is a mobile phone business hall, the organization 3 is a movie theater, in the joint operation activity initiated by the supermarket, if the total consumption of the same mobile phone number in the supermarket, the mobile phone business hall and the movie theater is full of 100 yuan during the activity, the mobile phone number can enjoy preferential discount in the supermarket, the mobile phone business hall and the movie theater, and the mobile phone business hall and the movie theater not only serve as data participants of the joint operation, but also serve as participation mechanisms of the actual operation activity preferential discount.
In activity rule 3, if any subject consumes full x in item B of institution 2 or full x in item E of institution 3 with a particular bank card, that subject enjoys a full x minus x benefit in item a of institution 1. In the scenario of the activity rule 3, it is necessary to count whether the subject satisfies preset conditions at the institutions 2 and 3, and then determine whether the subject's consumption at the institution 1 with respect to the item a satisfies the corresponding preset conditions. The scenario corresponding to the activity rule 1 may be that the organization 1 initiated by the joint operation is a host organization of the joint operation activity, data to be counted by the activity comes from three organizations, and the subject participates in the joint operation activity at the organization 1. For example, the organization 1 is a supermarket, the organization 2 is a mobile phone business hall, the organization 3 is a movie theater, and in the joint operation activities initiated by the supermarket, if the consumption of the same mobile phone number in the mobile phone business hall is full of 50 or the consumption of the same mobile phone number in the movie theater is full of 50 during the activities, the mobile phone business hall and the movie theater can enjoy the preference of being full of 100 minus 50 in the supermarket, and both the mobile phone business hall and the movie theater serve as data participants of the joint operation and do not serve as participation mechanisms of the preference of the actual operation activities.
According to the embodiment of the disclosure, the main body is an object targeted by the joint operation activity, for example, the joint operation activity is a total consumption amount of the same bank account in different institutions, and the main body is the bank account.
The above-mentioned x, xxx and xxx indicate set values, and the setting of the above-mentioned values may be performed by each of the mechanisms initiating the joint operation as required by the activity rule.
In an embodiment of the present disclosure, all target nodes participating in the joint operation include: a first target node of an originating organization operating jointly and a second target node of a joining organization operating jointly. For example, referring to fig. 1, an organization 1 is an initiating organization of joint operation, a node 1 is a first target node, an organization 2 and an organization 3 are joining organizations of joint operation, and a node 2 and a node 4 are second target nodes.
Fig. 3 schematically illustrates a detailed implementation flowchart of operation S13 according to an embodiment of the present disclosure; fig. 4 schematically illustrates an implementation process diagram of operation S13 according to an embodiment of the present disclosure.
In an embodiment of the present disclosure, referring to fig. 3, the operation S13 for receiving the joint operation request initiated by the terminal includes the following sub-operations: s131a and S132 a. In this embodiment, the scenario may correspond to activity rule 1, activity rule 2, or activity rule 3 in the above example.
In sub-operation S131a, a first target node of an originating entity in a joint operation receives a joint operation request initiated by a first terminal, where the first terminal is a terminal of the originating entity in the joint operation that has access right to the first target node.
In suboperation S132a, the first target node broadcasts the joint operation request to a second target node of the joining authority of the joint operation according to the identities of all target nodes participating in the joint operation request, so that the second target node receives the joint operation request.
In this embodiment, the joint operation activity rule carried by the joint operation request is formulated by the joint operation initiating mechanism.
Referring to fig. 4, in this embodiment, in sub-operation S131a, the initiating mechanism of the joint operation is mechanism 1, the first target node is node 1, the first terminal is terminal 1, and terminal 1 initiates the joint operation request to node 1. The joint operation request includes: the method comprises the following steps of activity rules of joint operation and main bodies participating in the joint operation activities, wherein the activity rules comprise: the identity of all target nodes participating in joint operation, the identity of a system intelligent contract participating in joint operation calculation in all target nodes, the project names participating in joint operation calculation in all target nodes, and the calculation logic required to be executed in joint operation. The identity of the target node can be the IP address of the target node, the identity of the system intelligent contract can be the ID of the system intelligent contract, and the storage address of the system intelligent contract can be found in the node according to the ID of the system intelligent contract.
Illustratively, the joint operation request of the present embodiment includes: { a bank account; IP of node 1, ID of system intelligent contract 1, item A; the IP of the node 2, the ID of the system intelligent contract 2 and the project B; the IP of the node 4, the ID of the system intelligent contract 4 and the item E; the calculation logic: is the total amount of consumption for item a, item B, and item E exceed 100? }.
Then, the sub-operation S132a is executed, the node 1 broadcasts the joint operation request to the second target nodes of the joining entity of the joint operation according to all the target nodes IP in the joint operation request, where the second target nodes are the node 2 and the node 4, and the node 1 broadcasts the joint operation request to the node 2 and the node 4 according to the IP addresses of the node 2 and the node 4 in the joint operation request, so that the node 2 and the node 4 receive the joint operation request.
Fig. 5 schematically shows a detailed implementation flowchart of operation S13 according to another embodiment of the present disclosure; fig. 6 schematically shows an implementation process diagram of operation S13 according to another embodiment of the present disclosure.
In another embodiment of the present disclosure, the operation S13 of receiving the joint operation request initiated by the terminal includes the following sub-operations: s131b and S132 b. In this embodiment, the scenario may correspond to the activity rule 2 in the above example.
In sub-operation S131b, a specific target node among second target nodes of the joining authority for joint operation receives a joint operation request initiated by a second terminal, which is a terminal of the joining authority for joint operation having an access right to the specific target node.
At suboperation S132b, the particular target node broadcasts the joint operation request to the remaining target nodes of the first target node of the initiating authority of the joint operation and the second target nodes of the joining authority of the joint operation according to the identities of all target nodes participating in the joint operation request, so that the first target node and the remaining target nodes receive the joint operation request.
In this embodiment, the joint operation activity rule carried by the joint operation request is formulated by the joint operation initiating mechanism.
Referring to fig. 6, the present embodiment is different from the previous embodiment in that the terminal initiating the joint operation request of the present embodiment is different from the terminal of the first embodiment, in other words, the target node of the present embodiment receiving the joint operation request is different from the target node of the first embodiment, where the difference represents the difference of the participation mechanism for implementing the actual operation activity benefit in the scenario.
In this embodiment, the joining mechanism of the joint operation is the mechanism 2 and the mechanism 3, the second target node includes the node 2 and the node 4, and when the specific target node is exemplified by the node 2, the first target node is the node 1, and the remaining target nodes are the nodes 4, referring to the path shown by the solid arrow in fig. 6, in the sub-operation S131b, the node 2 receives the joint operation request from the terminal 2. Then, the node 2 performs a sub-operation S132b, and the node 2 broadcasts a joint operation request to the nodes 1 and 4, so that the nodes 1 and 4 receive the joint operation request.
In fig. 6, a scene in which a specific target node is the node 4 is also illustrated by a dashed racetrack-shaped box and a dashed arrow, the node 4 receives a joint operation request from the terminal 4, and then broadcasts the joint operation request to the nodes 1 and 2, so that the nodes 1 and 2 receive the joint operation request.
The difference between the above-mentioned request receiving process and the process of transmitting inside the blockchain represents the difference of the participating mechanism actually used as the operation activity privilege, during the period of the joint operation activity, there may be several processes of initiating and processing the joint operation request, each time the joint operation request is initiated is a terminal, which may be the first terminal corresponding to the initiating mechanism of the joint operation. Or one of the first terminal and a second terminal corresponding to a joining organization of the joint operation.
Fig. 7 schematically illustrates an implementation process diagram of operation S14 according to an embodiment of the present disclosure.
In operation S14, a respective system intelligence contract is loaded at each target node according to the identity of the system intelligence contract participating in joint operation computation in all target nodes. Referring to fig. 7, taking an example in which all target nodes include node 1, node 2, and node 4, system intelligence contract 1 is loaded at node 1 according to the ID of system intelligence contract 1 in the joint operation request, system intelligence contract 2 is loaded at node 2 according to the ID of system intelligence contract 2 in the joint operation request, and system intelligence contract 4 is loaded at node 4 according to the ID of system intelligence contract 4 in the joint operation request.
Fig. 8 schematically illustrates an implementation process diagram of operation S15 according to an embodiment of the present disclosure.
In operation S15, the system intelligence contract of each target node obtains target data corresponding to the project names of the subjects participating in the joint operation calculation in the target node by calling the target service intelligence contract. Referring to fig. 8, taking all target nodes including node 1, node 2 and node 4 as an example, the system intelligence contract 1 of node 1 invokes the service intelligence contract a according to the project a participating in the joint operation calculation in the joint operation request, and obtains the transaction data X of the subject on the path a of the project a based on the service intelligence contract a, where the transaction data X is the target data of node 1. Similarly, the system intelligent contract 2 of the node 2 calls the service intelligent contract B according to the project B participating in the joint operation calculation in the joint operation request, and obtains the transaction data Y of the main body in the channel B related to the project B based on the service intelligent contract B, wherein the transaction data Y is the target data of the node 2. And the system intelligent contract 4 of the node 4 calls a business intelligent contract E according to the project E participating in joint operation calculation in the joint operation request, and acquires transaction data Z of the main body on a channel E of the project E based on the business intelligent contract E, wherein the transaction data Z is target data of the node 4.
According to another embodiment of the present disclosure, the activity rule includes, in addition to: the method is used for the identity of all target nodes participating in joint operation, the identity of a system intelligent contract participating in joint operation calculation in all target nodes, the project names participating in joint operation calculation in all target nodes, and the calculation logic required to be executed in joint operation, and also comprises the following steps: and (5) screening condition parameters.
Fig. 9 schematically shows an implementation process diagram of operation S13 according to yet another embodiment of the present disclosure. In the embodiment where the activity rule includes the filtering condition parameters, the information carried by the activity rule received in operation S13 is changed, and the filtering condition parameters are added, as shown in fig. 9 with specific reference to underlines.
Fig. 10 schematically shows an implementation process diagram of operation S15 according to another embodiment of the present disclosure.
Referring to fig. 10, in the embodiment where the activity rule includes the filtering condition parameter, the operation S15 of acquiring the target data may also be different from the previous embodiment.
In this embodiment, the operation S15 of obtaining target data corresponding to the project name participating in joint operation calculation in the subject of the target node by calling the target service intelligent contract by the system intelligent contract of each target node includes the following sub-operations S151 and S152.
In operation S151, the system intelligence contract of a specific target node acquires initial data of project names of subjects participating in joint operation calculation in the target node by calling a target service intelligence contract.
In operation S152, the initial data is filtered based on the filtering condition parameters for the specific target node, and target data of project names participating in joint operation calculation, of which the filtered data is the subject of the specific target node, is obtained.
Referring to fig. 10, compared to the aforementioned embodiment in which the activity rule does not include the screening condition parameter, the present embodiment adds an operation of screening the initial data based on the screening condition parameter, and is applicable to some application scenarios, for example, in the activity rule 3, if any subject consumes full × in the item B of the institution 2 or consumes full x in the item E of the institution 3 by using a specific bank card, the subject enjoys a benefit of full × minus x in the item a of the institution 1, the data consumed in the item E of the institution 3 is the initial data, and the screening is further performed based on the screening condition parameter of the bank card number, so as to obtain the data consumed in the item E of the institution 3 by using the specific bank card, which is the target data. Fig. 10 illustrates a case where each target node needs to filter the initial data, in other embodiments, part of the data of the target node may be directly acquired by the service intelligence contract, and another part of the data of the target node needs to be further filtered after being acquired to obtain the target data.
In operation S16, the system intelligence contract of each target node performs multi-party collaborative encryption calculation according to the calculation logic and the target data of the target node, so as to obtain the activity calculation result of the subject.
Fig. 11 schematically shows a schematic diagram of an implementation process of operation S16 according to an embodiment of the present disclosure, where (a) illustrates an implementation process of performing multi-party cooperative encryption calculation on the target data in the embodiment shown in fig. 8, and (b) illustrates an implementation process of performing multi-party cooperative encryption calculation on the target data in the embodiment shown in fig. 10.
In an embodiment, the target data to be subjected to multi-party collaborative encryption calculation in operation S16 may be data directly acquired by a user intelligent contract, as shown in fig. 11 (a). In another embodiment, the target data to be subjected to multi-party collaborative encryption calculation in operation S16 may also be target data obtained by obtaining initial data by a user intelligent contract and then filtering, as shown in fig. 11 (b). In another embodiment, the target data to be subjected to multi-party collaborative encryption calculation in operation S16 may be that part of the data of the target node is directly acquired target data, and part of the data of the target node is filtered obtained target data.
According to the embodiment of the disclosure, the calculation logic needed to be executed by the joint operation comprises: first computational logic performed on the target data of all the target nodes. Or, the computation logic that needs to be executed by the joint operation includes: second computation logic performed on the target data of all the target nodes, and third computation logic performed on the computation results of all the target nodes. Or, the computation logic that needs to be executed by the joint operation includes: fourth calculation logic executed for target data in each target node, and fifth calculation logic executed for calculation results of all target nodes.
Fig. 12 is a schematic diagram illustrating an implementation process of performing multi-party cooperative encryption calculation and result feedback according to calculation logic and target data of a target node according to an embodiment of the present disclosure.
Referring to fig. 12, operation S16, where the system intelligence contract of each target node performs multi-party cooperative encryption calculation according to the calculation logic and the target data of the target node, to obtain the active calculation result of the subject, includes the following sub-operations: s161a, S162a, and S163 a.
In suboperation S161a, the system intelligence contract of each target node encrypts the target data of the target node to which it belongs.
In suboperation S162a, the encrypted target data is transmitted between the target node and other target nodes.
In suboperation S163a, the first calculation logic is executed on each target node to transfer the obtained target data of all other target nodes and the local target data, resulting in an activity calculation result of the subject.
Fig. 13 schematically shows an implementation process of performing multi-party cooperative encryption calculation according to an embodiment of the present disclosure, where (a) illustrates an exemplary manner of performing encryption processing on target data and distributing the encrypted target data to other nodes, and (b) illustrates an implementation process of performing a first calculation logic on target data of all other target nodes obtained by transmission and local target data.
Referring to fig. 13 (a), in sub-operation S161a, the method for the system intelligence contract of each target node to encrypt the target data of the target node may be to encrypt and fragment the target data X of the target node 1 to obtain a plurality of ciphertext fragments, for example, the node 1 may obtain 4 ciphertext fragments including 1a, 2b, 3c, and 4d after being encrypted and fragmented, the node 2 may obtain 4 ciphertext fragments including 1e, 2f, 3g, and 4h after being encrypted and fragmented, and the node 4 may obtain 4 ciphertext fragments including 1i, 2j, 3k, and 41 after being encrypted and fragmented.
Then, the suboperation S162a is performed, and the encrypted target data is transmitted between the target node and other target nodes.
In this embodiment, the node 2 and the node 4 may send the encrypted data to the node 1.
Further performing sub-operation S163a, the system intelligence contract 1 of node 1 performs the first computation logic on the target data of all other target nodes obtained by transmission and the local target data, and obtains the activity computation result of the subject. Referring to (b) in fig. 12 and 13, the calculation logic that needs to be executed in the joint operation is illustrated to include: in the case of the first calculation logic executed for the target data of all the target nodes, in this case, the first calculation logic is executed for the target data X ', Y ', and Z ' after the encryption processing: calculating the sum of X ', Y ' and Z ', and then judging whether the sum is greater than or equal to 100, i.e. the first calculation logic is expressed in the form of the following expression: determining whether the following expression is satisfied: x ' + Y ' + Z ' is not less than 100.
Referring to fig. 12, operation S16, where the system intelligence contract of each target node performs multi-party cooperative encryption calculation according to the calculation logic and the target data of the target node, to obtain the active calculation result of the subject, includes the following sub-operations: s161b, S162b, S163b and S164 b.
In suboperation S161b, the system intelligence contract of each target node encrypts the target data of the target node to which it belongs.
In suboperation S162b, the encrypted target data is transmitted between the target node and other target nodes.
In suboperation S163b, the second calculation logic is performed at each target node to transfer the obtained target data of all other target nodes with the local target data.
In sub-operation S164b, a third calculation logic is performed on the calculation result obtained after the second calculation logic is performed, resulting in an active calculation result of the subject.
The sub-operations S161 b-S162 b may be performed in accordance with the sub-operations S161 a-S162 a described above.
Referring to the dashed arrow in fig. 12 and the dashed box illustrated in fig. 13 (b), another case of the calculation logic is illustrated. In sub-operation S163b, a second calculation logic is performed on the target data of all the target nodes, and in the second calculation logic, it is determined whether the following expression is satisfied: x ' + Y ' + Z ' is not less than 199. Sub-operation S164b is then performed, executing a third computation logic for the computation results of all target nodes, computing the result of X '+ Y' + Z '-100 if X' + Y '+ Z' ≧ 199.
Fig. 14 is a schematic diagram illustrating an implementation process of performing multi-party cooperative encryption calculation and result feedback according to calculation logic and target data of a target node according to another embodiment of the present disclosure.
Referring to fig. 14, operation S16, where the system intelligence contract of each target node performs multi-party cooperative encryption calculation according to the calculation logic and the target data of the target node, to obtain the active calculation result of the subject, includes the following sub-operations: s161c, S162c, and S163 c.
In suboperation S161c, a fourth calculation logic is performed on the target data in each target node, and the resulting data is subjected to encryption processing.
In suboperation S162c, the result data after the encryption process is transferred between the belonging target node and other target nodes.
In suboperation S163c, the fifth calculation logic is performed on the result data obtained by transferring and the result data of the local at each target node, resulting in an activity calculation result of the subject.
Referring to fig. 14, in the present embodiment, target data S, R and T obtained after the target data of node 1, node 2, and node 4 are screened are illustrated. The activity rule corresponding to the calculation logic is as follows: the subject may enjoy the event of giving a 50-dollar movie ticket free of charge if the amount of consumption of the subject at node 1 exceeds 50 at node 2 based on a particular bank card or 50 at node 4 based on a particular account, while the amount of consumption of the subject at node 1 is 100 at full in any 3 days during the event.
In sub-operation S161c, the fourth calculation logic is executed at node 1, node 2, and node 4, respectively, and it is determined for node 2 whether the target data R satisfies: r is more than or equal to 50, and whether the target data T meets the following conditions is determined at the node 4: t is more than or equal to 50; determining at node 1 whether the target data S satisfies: s is more than or equal to 100. A yes or no determination results after executing the fourth calculation logic.
Then, sub-operation S162c is performed, and the respective system intelligence contracts of node 2 and node 4 transmit the result data after the encryption processing to node 1.
Next, a sub-operation S163c is performed, in which the system intelligence contract 1 of the node 1 performs an or logical operation on the encrypted result 2 of the node 2 and the encrypted result 3 of the node 4, and if the determination result of one of the results 2 and 3 is yes, the result obtained after the or logical operation is yes, and then the result obtained after the or logical operation is further and-logically operated with the encrypted result 1, so as to obtain the activity calculation result of the subject.
In the three calculation logics of the above example, since the data acquired by each node to other nodes in the multi-party collaborative encryption calculation process are all in an encrypted form, and the calculation operation is executed locally at each node, the finally obtained encryption result is not subjected to reverse engineering to crack the initial data, so that the calculation between the transaction information of a plurality of different service channels according to the predetermined calculation logic can be realized under the condition of avoiding data leakage, and the active calculation results of the same main body under a plurality of scenes can be obtained.
Fig. 15 schematically shows a flowchart of a method for joint operation based on a blockchain system according to another embodiment of the present disclosure.
Referring to fig. 15, the method for joint operation based on a blockchain system according to an embodiment of the present disclosure includes at least one of the following operations S10, S11, and S12 in addition to the above-described operations S13 to S16.
In operation S10, an activity rule of the joint operation is formulated.
This operation S10 may be formulated by the co-operating initiator in the blockchain system based on the first terminal being a terminal having access to the first target node of the co-operating initiator. That is, the above operation S10 is performed by the first terminal in the blockchain system.
In operation S11, the second target node of the joining organization in the joint operation authorizes the first target node of the initiating organization in the joint operation to encrypt the usage right with respect to the target data corresponding to the project name participating in the joint operation calculation.
And the target data with the encryption use authority as the second target node is used by the first target node after being encrypted so as to carry out multi-party collaborative encryption calculation. The duration of the encryption use permission is an activity period of the joint operation, and after the activity period of the joint operation is ended, the authorization is invalid.
When entity mechanisms carry out joint operation, because the respective data ownership rights among the mechanisms are expected to be reserved, namely the data cannot be separated from the local, when the mechanisms join the joint operation initiating mechanism to carry out joint operation together, the data use rights corresponding to the respective project names participating in the joint operation at least need to be donated, multi-party cooperative encryption calculation is adopted in the data use process, and under the condition that the data in the mechanisms cannot be leaked, the joint operation of a plurality of different mechanisms across scenes is also realized.
In operation S12, a target service intelligence contract is configured and/or a listening port of a multi-party collaborative cryptographic calculation is configured. Operation S12 may be performed by a system intelligence contract of each target node in the blockchain system, where the target node and the terminal of the affiliated entity are capable of receiving the configuration request sent by the terminal at the target node and sending the configuration result to the terminal by mutual communication.
Fig. 16 schematically shows a detailed implementation flowchart of operation S10 according to an embodiment of the present disclosure.
Referring to fig. 16, the above operation S10 of formulating an activity rule of a joint operation includes the following sub-operations: s101, S102 and S103.
In sub-operation S101, an item name directory of nodes of an originating entity and a non-originating entity that operate jointly in the blockchain system is acquired.
In sub-operation S102, the target node and the project of the target node participating in the joint operation are determined according to the project name directories of the nodes of the initiating organization and the non-initiating organization.
In sub-operation S103, the activity rule of the joint operation is determined according to the target node participating in the joint operation, the project of the target node, and the set calculation logic that needs to be executed by the joint operation.
In the sub-operation S101, the node of the initiating mechanism in the blockchain system may communicate with the node of the non-initiating mechanism to obtain the item name directory of the node of the non-initiating mechanism, and then the node of the initiating mechanism transmits the item name directory of the node of the initiating mechanism and the item name directory of the node of the non-initiating mechanism to the terminal of the initiating mechanism.
The acquired item names in the item name directory of the non-initiating organization are the authorized item names disclosed in the non-initiating organization. In a practical scenario, for a case where a non-originating entity is unwilling to disclose an internal confidential project name, the jointly operated originating entity can only achieve the acquisition of an authorized public project name through communication between nodes of the blockchain system. Here, it is limited to acquiring the item name, and the data corresponding to the item name is not open to the outside.
In sub-operation S102, the target node and the project of the target node participating in the joint operation are determined according to the project name directories of the nodes of the initiating agency and the non-initiating agency. The method comprises the steps of selecting a target node to participate in joint operation and a project of the target node in project name catalogues of nodes of an initiating mechanism and a non-initiating mechanism, wherein the process can be obtained by screening a machine through a preset model or forming a preset rule base after being evaluated by experts or business personnel, and selecting the project name catalogues of the nodes of the initiating mechanism and the non-initiating mechanism by adopting the preset rule base to obtain the projects of the target node and the target node participating in the joint operation.
In sub-operation S103, the activity rule of the joint operation is determined according to the target node participating in the joint operation, the project of the target node, and the set calculation logic that needs to be executed by the joint operation. The calculation logic to be executed in the joint operation may be preset, for example, the preset calculation logic may be as follows: and determining the calculation logic required to be executed by the joint operation according to the cost of the joint operation investment, the scale of the joint operation and the expected consumption increase so as to ensure that the income of the joint operation is greater than the cost. The scale of the joint operation is the estimated total number of the consumption groups of all the organizations participating in the actual preferential activities of the joint operation, and the estimated total number can be obtained by accumulating the average consumption number of all the organizations.
The above-mentioned operation S12 includes operations S121 and S122. In operation S121, a target business intelligence contract is configured. In operation S122, a listening port for multi-party cooperative encryption calculation is configured. The operation S121 of configuring the target service intelligence contract and the operation S122 of configuring the listening port of the multi-party cooperative encryption calculation in the above embodiments are performed by the system intelligence contract built in each node.
Fig. 17 schematically shows a detailed implementation flowchart of operation S121 of configuring a target business intelligence contract according to an embodiment of the present disclosure.
Referring to fig. 17, operation S121 of configuring the target service intelligence contract includes the following sub-operations: s1211, S1212, S1213, and S1214.
In sub-operation S1211, a configuration request for each target node by the terminal is received, the configuration request including the following information: the node access authority of the terminal, the address of the channel to be configured and the address of the service intelligent contract to be configured.
The number of the terminals is the same as that of the target nodes, and the terminals correspond to the target nodes one by one; or the number of the terminals is smaller than that of the target nodes, and one terminal corresponds to at least 2 different target nodes.
According to an embodiment of the present disclosure, P target nodes are used for example, P ≧ 2. P target nodes have mutually independent node access rights, the terminals are independent P terminals, the P terminals respectively have the access rights to the P target nodes, and in the process of configuring the target service intelligent contract by the P target nodes, the configuration information of any one target node is not disclosed to the configuration information of other target nodes. This embodiment corresponds to the case where the access right of each target node is limited to only one independent terminal. For example, in an actual scenario, each target node belongs to different organizations, and data between the organizations needs to be kept secret and not disclosed, so that only terminals with administrator rights inside the organizations can access the nodes.
According to another embodiment of the disclosure, P target nodes have mutually independent node access rights, the terminals are Q terminals, Q is less than P and P is greater than or equal to 3, at least one of the Q terminals has access rights to at least two target nodes, and in the process of configuring a target service intelligent contract by the P target nodes, configuration information of at least one target node is not disclosed to configuration information of other target nodes. The access authority corresponding to at least 2 target nodes in this embodiment may correspond to the same terminal, for example, in a practical scenario, two target nodes may belong to a common organization, and the two target nodes in the organization may be accessed by a terminal authorized by an administrator inside the organization.
In sub-operation S1212, it is determined whether the configuration request for the current target node is reasonable according to the node access right of the terminal.
In case the terminal sending the configuration request does not have access to the target node receiving the configuration request, the configuration request is considered unreasonable. And when the terminal sending the configuration request has the access right to the target node receiving the configuration request, the configuration request is considered to be reasonable.
In some scenarios, there are some malicious requests, some terminals do not have access rights to other nodes, and when a request is sent, it is desirable to configure other nodes without access rights to implement illegal access, and then steal data of other nodes, the setting of the sub-operation S122 helps to avoid the situation of illegal setting, and the setting operation of each node is limited to be executed only by a terminal with an operation right, so that each node is effectively prevented from being illegally set.
In sub-operation S1213, in case that the configuration request is reasonable, it is determined whether the current target node has an access right to the address of the channel to be configured and the address of the service intelligent contract to be configured according to the preset access control right of the target node.
Each target node is preset with access control authority to a specific channel and a service intelligent contract, and whether the current target node has access authority to the address of the channel to be configured and the address of the service intelligent contract to be configured can be determined by comparing whether the preset specific channel and the service intelligent contract are consistent with the channel to be configured and the service intelligent contract to be configured. For example, the channel to be configured received by the node 4 is the channel B, and since the node 4 has access control authority over the channels D and E according to the access control authority of the preset target node, it can be known through channel information comparison that the node 3 does not have a channel to be configured: the access right of the channel B, so that the operation of configuring the channel address is not executed. The judgment of the service intelligent contract is the same as the judgment process of the channel, and the details are not repeated here.
In sub-operation S1214, when the current target node has an access right to the address of the channel to be configured and the address of the intelligent contract for the service to be configured, the address of the channel to be configured and the address of the intelligent contract for the service to be configured are configured in the current target node, so as to implement configuration of the intelligent contract for the service for the target in the target channel, where the target channel is a service channel where a project participating in joint operation calculation is located.
Fig. 18 schematically shows a detailed implementation flowchart of operation S122 of configuring a listening port of multi-party cooperative encryption calculation according to an embodiment of the present disclosure.
Referring to fig. 18, operation S122 of configuring a listening port for multi-party collaborative encryption calculation includes the following sub-operations: s1221, S1222, and S1223.
In sub-operation S1221, a listening port configuration request for a current target node is received from a terminal, where the listening port configuration request includes the following information: and the node access authority of the terminal and the parameters to be configured of the monitoring port.
The correspondence relationship between the terminal and the target node in the sub-operation S1221 is consistent with the relationship between the terminal and the target node that sent the configuration request for configuring the target service intelligence contract in the foregoing sub-operation S1211, and reference may be made to the description in the foregoing sub-operation S1211.
In sub-operation S1222, it is determined whether the listening port configuration request for the current target node is reasonable according to the node access authority of the terminal.
And when the terminal sending the monitoring port configuration request does not have the access right to the target node receiving the configuration request, the monitoring port configuration request is considered to be unreasonable. And when the terminal sending the monitoring port configuration request has the access right to the target node receiving the configuration request, the monitoring port configuration request is considered to be reasonable.
In sub-operation S1223, under the condition that the request for configuring the monitor port is reasonable, the parameters to be configured of the monitor port are configured at the current target node, so as to implement the configuration of the monitor port for the multi-party cooperative encryption calculation.
Fig. 19 schematically shows a flowchart further including operations S17 to S19 after operation S16 according to still another embodiment of the present disclosure.
Referring to fig. 19, according to an embodiment of the present disclosure, the method includes the following operations in addition to operations S13 to S16, or at least one of operations S10, S11, and S12, and operations S13 to S16: s17, S18, and S19. The above operations S17-S19 are performed by the target node in the blockchain system.
In operation S17, consensus verification is performed on the subject' S activity calculation results at all target nodes.
In operation S18, after the activity calculation result of the subject reaches consensus, the activity calculation result of the subject and the intermediate result of the multi-party collaborative encryption calculation are written into the ledger of the blockchain system.
In operation S19, the activity calculation result of the subject is fed back to the terminal that initiated the joint operation request.
All target nodes: after the system intelligent contract built in the node 1, the node 2 and the node 4 executes operation S16 to obtain the activity calculation results of the subject at the 3 target nodes, the activity calculation results are returned to the node to which the subject node performs transaction endorsement signature, and each node performs endorsement signature for the transaction by using the node identity and then transfers the endorsement signature to the blockchain system. And the blockchain system receives the transactions which are sent by the 3 target nodes and are subjected to endorsement signature, performs consensus on the transactions, writes the activity calculation result of the main body and the intermediate result of the multiparty collaborative encryption calculation into an account book of the blockchain system after the consensus is successful, and feeds back the activity calculation result of the main body to the terminal initiating the joint operation request.
In summary, embodiments of the present disclosure provide a method for performing joint operation based on a blockchain system, where when multiple mechanisms perform joint operation, a system intelligent contract deployed by each target node can implement cross-channel multi-party collaborative encryption calculation for target data of different service scenarios by calling each service intelligent contract, and implement cross-scenario operation on the premise of ensuring that the target data of each channel is not disclosed externally, which can at least partially solve the following problems: because a data isolation mechanism exists between different service channels, the problem that cross-scene data operation cannot be realized between different mechanisms is solved.
A second exemplary embodiment of the present disclosure provides a block chain system for joint operation.
Fig. 20 schematically shows a structural diagram of a blockchain system according to an embodiment of the present disclosure. Fig. 21 schematically shows a block diagram of a target node according to an embodiment of the present disclosure.
Referring to fig. 20 and 21, the blockchain system of the present embodiment includes: t nodes, T is more than or equal to 2, a transaction processing module and a system intelligent contract.
The T nodes respectively correspond to M different mechanisms participating in joint operation, and M is more than or equal to 2 and less than or equal to T.
The transaction processing module 211 is respectively disposed inside each target node 21 of the M institutions, and the target node 21 is a node for participating in joint operation among the T nodes.
The transaction processing module 211 is configured to receive a joint operation request initiated by a terminal. The joint operation request includes the following information: the activity rules of the joint operation and the subjects participating in the joint operation activity. The activity rules include: the identity of all target nodes participating in joint operation, the identity of a system intelligent contract participating in joint operation calculation in all target nodes, the project names participating in joint operation calculation in all target nodes, and the calculation logic required to be executed in joint operation.
System intelligence contracts 212 are deployed inside respective target nodes of the M organizations, respectively, and system intelligence contracts 212 include: a data acquisition module 2121 and a multi-party security computation module 2122.
The data obtaining module 2121 of each target node is configured to, in a case that the joint operation request is received, invoke a service intelligence contract at the target node to obtain target data corresponding to a project name of a main body in the target node, where the project name participates in joint operation calculation.
The multi-party security calculation module 2122 of each target node is configured to perform multi-party collaborative encryption calculation according to the calculation logic and the target data of the target node to which the calculation logic belongs, so as to obtain an activity calculation result of the main body.
Fig. 22 schematically shows a block diagram of a target node according to another embodiment of the present disclosure.
Referring to fig. 22, the blockchain system includes: t nodes, T is more than or equal to 2, the transaction processing module 211 and the system intelligent contract 212 also comprise: a consensus verification module 213, a billing module 214, and a result feedback module 215.
The consensus verification module 213 is deployed inside each target node of the M organizations, and the consensus verification module 213 is configured to perform consensus verification on the activity calculation results of the subject at all the target nodes.
The accounting module 214 is configured to write the activity calculation result of the subject and the intermediate result of the multi-party collaborative encryption calculation into the ledger of the block chain system after the activity calculation result of the subject reaches consensus.
The result feedback module 215 is configured to feed back the activity calculation result of the main body to the terminal that initiated the joint operation request.
Referring to the dashed box in fig. 22, in the target node 21 of the blockchain system, the system intelligence contract 212 further includes: target service intelligence contract configuration module 2123 and/or listening port configuration module 2124. In this disclosure, the target service intelligent contract configuration module 2123 and/or the snoop port configuration module 2124 may be set in the first target node and the second target node according to the computing process implementation subject.
Target service intelligent contract configuration module 2123 is used for configuring a target service intelligent contract.
The interception port configuration module 2124 is configured to configure an interception port for multi-party cooperative encryption calculation.
According to an embodiment of the present disclosure, referring to the two-dot chain line block in fig. 22, the block chain system further includes: data use authorization module 2125. The data usage authorization module 2125 is located inside a second target node of the jointly operating joining authority.
The data use authorization module 2125 is configured to authorize, by the first target node of the initiating entity in the joint operation, an encrypted use permission with respect to the target data corresponding to the project name participating in the joint operation calculation.
Fig. 23 schematically shows a block diagram of a blockchain system according to another embodiment of the present disclosure.
Referring to fig. 23, the blockchain system 2 includes, in addition to the target node 21: a terminal 22, the terminal 22 comprising a first terminal 22a and a second terminal 22 b. The number of the first terminals 22a is 1, and the number of the second terminals 22b is 1 or more.
All target nodes participating in the joint operation include: a first target node of an originating organization operating jointly and a second target node of a joining organization operating jointly. The first terminal is a terminal of an initiating mechanism of joint operation, which has access right to the first target node. The second terminal is a terminal of a joint operation joining mechanism having access right to the second target node. The joint operation activity rule carried by the joint operation request is formulated by an initiating organization of the joint operation.
During the joint operation activity, the terminal that initiates the joint operation request is the first terminal, referring to the scenario illustrated by activity rule 1 or activity rule 3. Or, during the joint operation activity, the terminal initiating the joint operation request includes: the first terminal, and at least one of the second terminals, refer to the scenario illustrated by the activity rule 2.
Fig. 24 schematically shows a block diagram of a first terminal according to an embodiment of the present disclosure.
According to an embodiment of the present disclosure, the first terminal 22a and the second terminal 22b each include: the communication module 220 is illustrated in fig. 24 as a structure of a first terminal.
The communication module 220 is used for information interaction between the terminal 22 and the target node 21. For example, the communication module 220 of the first terminal 22a is used for sending the joint operation request and for receiving the activity calculation result of the subject.
According to an embodiment of the present disclosure, the communication module 220 is further configured to send a configuration request to the target node and/or send a listening port configuration request to the target node. The configuration request includes the following information: the node access authority of the terminal, the address of the channel to be configured and the address of the service intelligent contract to be configured. The listening port configuration request includes the following information: and the node access authority of the terminal and the parameters to be configured of the monitoring port.
When the terminal initiating the joint operation request is a first terminal during the joint operation activity, a communication module of the first terminal is used for sending the joint operation request to a first target node, receiving an activity calculation result of a main body from the first target node, and sending a configuration request and/or a monitoring port configuration request to the first target node; at this time, the communication module of the second terminal is configured to send a configuration request and/or a listening port configuration request to the second target node.
When the terminal initiating the joint operation request comprises at least one of the first terminal and the second terminal, the communication module of the first terminal is configured to send the joint operation request to the first target node and to receive the activity calculation result of the subject from the first target node, and to send the configuration request and/or listen to the port configuration request to the first target node. The communication module of the second terminal is configured to send a joint operation request to the second target node, receive an activity calculation result of the subject from the second target node, and send a configuration request and/or a listening port configuration request to the second target node.
According to an embodiment of the present disclosure, referring to fig. 24, the first terminal 22a further includes: an activity rule formulation module 221. The activity rule making module 221 is used for making activity rules of the joint operation.
The activity rule formulation module 221 includes the following sub-modules: a project name acquisition sub-module 2211, a target node and project determination sub-module 2212, and an activity rule determination sub-module 2213.
The project name obtaining sub-module 2211 is configured to obtain project name directories of nodes of an initiating entity and a non-initiating entity that operate jointly in the blockchain system, where a project name in the project name directory of the non-initiating entity is a project name authorized to be disclosed by the non-initiating entity.
The target node and project determination submodule 2212 is configured to determine projects of the target node and the target node participating in the joint operation according to the project name directories of the nodes of the initiating institution and the non-initiating institution.
The activity rule determining sub-module 2213 is configured to determine an activity rule of the joint operation according to the target node participating in the joint operation, the project of the target node, and the set calculation logic that needs to be executed by the joint operation.
Any number of modules, sub-modules, units, sub-units, or at least part of the functionality of any number thereof according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, and sub-units according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware implementations. Alternatively, one or more of the modules, sub-modules, units, sub-units according to embodiments of the disclosure may be at least partially implemented as a computer program module, which when executed may perform the corresponding functions.
For example, any of the data acquisition module 2121, the multi-party security computation module 2122, and the result feedback module 215 may be combined and implemented in one module, or any of them may be split into multiple modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the communication module 220 and the activity rule making module 221 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware by any other reasonable manner of integrating or packaging a circuit, or in any one of three implementations of software, hardware, and firmware, or in a suitable combination of any of them. Alternatively, at least one of target node 21, system intelligent contract 212, target service intelligent contract configuration module 2123, and snoop port configuration module 2124 may be implemented at least in part as computer program modules that, when executed, may perform corresponding functions.
Each target node in the above-described blockchain system may be a program module having a specific function in an electronic device or a program module stored in a computer-readable storage medium.
The electronic device includes: one or more processors; and storage means for storing one or more computer programs. Wherein the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method to be performed by each target node.
The electronic device is, for example, a server. The computer readable storage medium is a tangible storage medium such as an optical storage device or a magnetic storage device. The program modules, when executed by a processor, perform corresponding functions. The target node is internally provided with a system intelligent contract, the system intelligent contract can also be realized as a program module with a specific function, and the configuration of the system intelligent contract on the target node can be realized by compiling the program code of the target node and the program code of the system intelligent contract to be configured together.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include ROM and/or RAM and/or one or more memories other than ROM and RAM.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (17)

1. A method for joint operation based on a blockchain system comprises the following steps:
receiving a joint operation request initiated by a terminal, wherein the joint operation request comprises: activity rules of a joint operation and a subject participating in a joint operation activity, the activity rules including: the identity of all target nodes participating in joint operation, the identity of a system intelligent contract participating in joint operation calculation in all the target nodes, the project names participating in joint operation calculation in all the target nodes and the calculation logic to be executed in the joint operation;
loading respective system intelligent contracts on each target node according to the identity of the system intelligent contracts participating in joint operation calculation in all the target nodes;
the system intelligent contract of each target node acquires target data corresponding to the project name of the main body participating in joint operation calculation in the target node by calling the target service intelligent contract; and
and the system intelligent contract of each target node performs multi-party collaborative encryption calculation according to the calculation logic and the target data of the target node to obtain the activity calculation result of the main body.
2. The method of claim 1, wherein all target nodes participating in a joint operation comprise: a first target node of an initiating organization in joint operation and a second target node of a joining organization in joint operation; the joint operation request initiated by the receiving terminal comprises:
a first target node of an initiating mechanism of joint operation receives the joint operation request initiated by a first terminal; the first terminal is a terminal of the joint operation initiating mechanism, which has access right to a first target node;
the first target node broadcasts the joint operation request to a second target node of a joining organization of joint operation according to the identity of all target nodes participating in the joint operation request, so that the second target node receives the joint operation request;
and the joint operation activity rule carried by the joint operation request is formulated by an initiating mechanism of the joint operation.
3. The method of claim 1, wherein all target nodes participating in a joint operation comprise: a first target node of an initiating organization in joint operation and a second target node of a joining organization in joint operation; the joint operation request initiated by the receiving terminal comprises:
a specific target node in second target nodes of a joining mechanism of joint operation receives the joint operation request initiated by a second terminal; the second terminal is a terminal of the joint operation joining mechanism, which has access right to the specific target node;
the specific target node broadcasts the joint operation request to other target nodes in a first target node of an initiating mechanism of the joint operation and a second target node of a joining mechanism of the joint operation according to the identity of all target nodes participating in the joint operation request, so that the first target node and the other target nodes receive the joint operation request;
and the joint operation activity rule carried by the joint operation request is formulated by an initiating mechanism of the joint operation.
4. The method of claim 2 or 3, further comprising:
performing consensus verification on the activity calculation results of the main body at all target nodes;
after the active calculation results of the main body reach consensus, writing the active calculation results of the main body and the intermediate results of the multi-party collaborative encryption calculation into an account book of a block chain system; and
and feeding back the activity calculation result of the main body to a terminal initiating the joint operation request.
5. The method of claim 1, the all target nodes participating in a joint operation comprising: a first target node of an initiating organization in joint operation and a second target node of a joining organization in joint operation; the method further comprises the following steps:
a second target node of a joining mechanism in joint operation authorizes a first target node of an initiating mechanism in joint operation about encrypted use permission of target data corresponding to a project name participating in joint operation calculation, wherein the encrypted use permission is used by the first target node after the target data of the second target node is encrypted so as to perform multi-party collaborative encryption calculation;
the duration of the encryption use permission is an activity period of joint operation, and after the activity period of the joint operation is ended, the authorization is invalid.
6. The method of claim 1, wherein the activity rule further comprises: screening condition parameters for a specific target node;
the system intelligent contract of each target node acquires target data corresponding to the project name of the main body participating in joint operation calculation in the target node by calling the target service intelligent contract, and the method comprises the following steps:
the system intelligent contract of the specific target node acquires initial data of the project name of the main body participating in joint operation calculation in the target node by calling a target service intelligent contract; and
and screening the initial data based on the screening condition parameters aiming at the specific target node to obtain target data of the project name participating in joint operation calculation of the main body of the specific target node after screening.
7. The method of claim 1, the joint operation requiring computational logic to be performed comprising:
first computation logic executed for target data of all target nodes; alternatively, the first and second electrodes may be,
second calculation logic executed for target data of all target nodes, and third calculation logic executed for calculation results of all target nodes; alternatively, the first and second electrodes may be,
fourth calculation logic executed for target data in each target node, and fifth calculation logic executed for calculation results of all target nodes.
8. The method of claim 7, wherein the performing, by the system intelligence contract of each target node, multi-party collaborative encryption calculation according to the calculation logic and target data of the target node to obtain an activity calculation result of the subject includes:
the system intelligent contract of each target node encrypts the target data of the target node; the encrypted target data is transmitted between the target node and other target nodes; executing a first calculation logic on the target data of all other target nodes and the local target data obtained by transmission at each target node to obtain an activity calculation result of the main body; alternatively, the first and second electrodes may be,
the system intelligent contract of each target node encrypts the target data of the target node; the encrypted target data is transmitted between the target node and other target nodes; executing second calculation logic on the target data of all other target nodes and the local target data which are obtained by transmission at each target node; executing a third calculation logic on the calculation result obtained after the second calculation logic is executed to obtain an activity calculation result of the main body; alternatively, the first and second electrodes may be,
executing fourth calculation logic aiming at target data in each target node, and encrypting the obtained result data; the result data after the encryption processing is transmitted between the target node and other target nodes; and executing a fifth calculation logic on the result data obtained by transmission and the local result data at each target node to obtain an activity calculation result of the main body.
9. The method of claim 1, further comprising: configuring a target business intelligence contract, the configuring the target business intelligence contract comprising:
receiving a configuration request of a terminal to each target node, wherein the configuration request comprises the following information: the node access authority of the terminal, the address of a channel to be configured and the address of an intelligent contract of a service to be configured;
determining whether a configuration request for the current target node is reasonable or not according to the node access authority of the terminal;
under the condition that the configuration request is reasonable, determining whether the current target node has the access right of the address of the channel to be configured and the address of the intelligent contract of the service to be configured according to the access control right of the preset target node; and
under the condition that a current target node has access authority of an address of a channel to be configured and an address of an intelligent contract of a service to be configured, the address of the channel to be configured and the address of the intelligent contract of the service to be configured are configured at the current target node so as to realize the configuration of the intelligent contract of the service of the target in the target channel, wherein the target channel is the service channel where a project participating in joint operation calculation is located.
10. The method of claim 1, further comprising: configuring a monitoring port for multi-party collaborative encryption calculation;
the configuring of the listening port for the multi-party collaborative encryption calculation includes:
receiving a listening port configuration request aiming at a current target node from a terminal, wherein the listening port configuration request comprises the following information: the node access authority of the terminal and the parameters to be configured of the monitoring port are set;
determining whether a monitoring port configuration request aiming at the current target node is reasonable or not according to the node access authority of the terminal; and
and under the condition that the configuration request of the monitoring port is reasonable, configuring parameters to be configured of the monitoring port at the current target node so as to realize the configuration of the monitoring port of the multi-party cooperative encryption calculation.
11. The method of claim 1, further comprising: making an activity rule of joint operation;
wherein the formulating the activity rule of the joint operation comprises:
acquiring a project name directory of nodes of an initiating mechanism and a non-initiating mechanism which are operated jointly in a block chain system, wherein the project names in the project name directory of the non-initiating mechanism are authorized to be disclosed in the non-initiating mechanism;
determining the projects of the target nodes and the target nodes participating in joint operation according to the project name catalogs of the nodes of the initiating mechanism and the non-initiating mechanism; and
and determining the activity rule of the joint operation according to the target nodes participating in the joint operation, the project of the target nodes and the set calculation logic required to be executed by the joint operation.
12. A blockchain system for joint operations, comprising:
t nodes, wherein T is more than or equal to 2, the T nodes respectively correspond to M different mechanisms participating in joint operation, and M is more than or equal to 2 and less than or equal to T;
the transaction processing module is respectively deployed inside each target node of the M mechanisms, the target node is a node which is used for participating in joint operation in the T nodes, the transaction processing module is used for receiving a joint operation request initiated by a terminal, and the joint operation request comprises the following information: activity rules of a joint operation and a subject participating in a joint operation activity, the activity rules including: the identity of all target nodes participating in joint operation, the identity of a system intelligent contract participating in joint operation calculation in all the target nodes, the project names participating in joint operation calculation in all the target nodes and the calculation logic to be executed in the joint operation; and
the system intelligent contracts are respectively deployed in each target node of the M mechanisms, and comprise: the system comprises a data acquisition module and a multi-party security calculation module;
the data acquisition module of each target node is used for calling a service intelligent contract at the target node to acquire target data corresponding to the project name of the main body participating in joint operation calculation in the target node under the condition of receiving the joint operation request;
and the multi-party security calculation module of each target node is used for carrying out multi-party collaborative encryption calculation according to the calculation logic and the target data of the target node to obtain the activity calculation result of the main body.
13. The blockchain system of claim 12, further comprising:
the consensus verification module is respectively deployed in each target node of the M mechanisms and is used for performing consensus verification on the activity calculation result of the main body at all the target nodes;
the accounting module is used for writing the activity calculation result of the main body and the intermediate result of the multi-party collaborative encryption calculation into an account book of a block chain system after the activity calculation result of the main body achieves consensus; and
and the result feedback module is used for feeding back the activity calculation result of the main body to the terminal initiating the joint operation request.
14. The blockchain system of claim 12, further comprising at least one of:
the target service intelligent contract configuration module is used for configuring a target service intelligent contract;
the monitoring port configuration module is used for configuring a monitoring port for multi-party collaborative encryption calculation;
and the data use authorization module is arranged in a second target node of the joining mechanism in joint operation, and is used for authorizing the encrypted use permission of the target data corresponding to the project name participating in the joint operation calculation to the first target node of the initiating mechanism in joint operation.
15. The blockchain system of claim 12, further comprising: the terminal comprises a first terminal and a second terminal;
all target nodes participating in joint operation comprise: a first target node of an initiating organization in joint operation and a second target node of a joining organization in joint operation;
the first terminal is a terminal of the joint operation initiating mechanism, which has access right to a first target node;
the second terminal is a terminal of the joint operation joining mechanism, which has access authority to a second target node;
the joint operation request carries joint operation activity rules which are formulated by an initiating mechanism of the joint operation;
during the joint operation activity, the terminal initiating the joint operation request is the first terminal, or during the joint operation activity, the terminal initiating the joint operation request includes: at least one of the first terminal and the second terminal.
16. The blockchain system of claim 15, wherein,
the first terminal and the second terminal include: the communication module is used for information interaction between the terminal and the target node;
the communication module of the first terminal is used for sending the joint operation request and receiving the activity calculation result of the main body;
the communication module is also used for sending a configuration request to the target node and/or sending a monitoring port configuration request to the target node; wherein the configuration request includes the following information: the node access authority of the terminal, the address of a channel to be configured and the address of an intelligent contract of a service to be configured; the listening port configuration request includes the following information: and the node access authority of the terminal and the parameters to be configured of the monitoring port.
17. The blockchain system of claim 15, wherein the first terminal includes: the activity rule making module is used for making an activity rule of joint operation;
wherein the activity rule making module comprises:
the project name acquisition submodule is used for acquiring a project name directory of nodes of an initiating mechanism and a non-initiating mechanism which are operated jointly in the blockchain system, and the project names in the project name directory of the non-initiating mechanism are authorized and disclosed project names in the non-initiating mechanism;
the target node and project determining submodule is used for determining projects of the target node and the target node participating in joint operation according to project name catalogues of nodes of an initiating mechanism and a non-initiating mechanism; and
and the activity rule determining submodule is used for determining the activity rule of the joint operation according to the target node participating in the joint operation, the project of the target node and the set calculation logic which needs to be executed by the joint operation.
CN202110065474.4A 2021-01-18 2021-01-18 Block chain system and method for joint operation based on same Pending CN112801786A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110065474.4A CN112801786A (en) 2021-01-18 2021-01-18 Block chain system and method for joint operation based on same

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110065474.4A CN112801786A (en) 2021-01-18 2021-01-18 Block chain system and method for joint operation based on same

Publications (1)

Publication Number Publication Date
CN112801786A true CN112801786A (en) 2021-05-14

Family

ID=75810197

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110065474.4A Pending CN112801786A (en) 2021-01-18 2021-01-18 Block chain system and method for joint operation based on same

Country Status (1)

Country Link
CN (1) CN112801786A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409952A (en) * 2018-10-22 2019-03-01 联动优势科技有限公司 A kind of marketing data acquisition system and method based on block chain
CN110348830A (en) * 2019-06-20 2019-10-18 国家信息中心 A kind of network system based on block chain, authentication method, equipment and storage medium
CN111353783A (en) * 2018-12-21 2020-06-30 西安佰才邦网络技术有限公司 Block chain based signing method and equipment
CN111640209A (en) * 2020-05-15 2020-09-08 支付宝(杭州)信息技术有限公司 Riding charging method and device and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109409952A (en) * 2018-10-22 2019-03-01 联动优势科技有限公司 A kind of marketing data acquisition system and method based on block chain
CN111353783A (en) * 2018-12-21 2020-06-30 西安佰才邦网络技术有限公司 Block chain based signing method and equipment
CN110348830A (en) * 2019-06-20 2019-10-18 国家信息中心 A kind of network system based on block chain, authentication method, equipment and storage medium
CN111640209A (en) * 2020-05-15 2020-09-08 支付宝(杭州)信息技术有限公司 Riding charging method and device and electronic equipment

Similar Documents

Publication Publication Date Title
US11250518B2 (en) Method for secure ledger distribution and computer system using secure distributed ledger technology
CN106982205B (en) Block chain-based digital asset processing method and device
CN109478298B (en) Method and system for realizing block chain
JP7102425B2 (en) Computer-implemented systems and methods
CN111461712B (en) Transaction privacy protection and hierarchical supervision in blockchain supply chain financial scenarios
CN109388957B (en) Block chain-based information transfer method, device, medium and electronic equipment
CN110770773A (en) Multiple round token distribution system and method using blockchain network
CN108876669A (en) Course notarization system and method applied to multi-platform shared education resources
Kolachala et al. SoK: Money laundering in cryptocurrencies
Zie et al. Extending atomic cross-chain swaps
CN112766943A (en) Anonymous computing block chain data processing method, system, medium, device and application
CN112149077B (en) Supply chain billing method, system and computer equipment based on block chain technology
CN112600830A (en) Service data processing method and device, electronic equipment and storage medium
CN112910858B (en) Method and node for determining alliance chain transaction statistical information and transaction processing
Muftic et al. Overview and analysis of the concept and applications of virtual currencies
KR20200086402A (en) Block chain system and method thereof
CN112884562B (en) Mortgage processing method and device based on blockchain and readable storage medium
CN112308700A (en) Method and device for processing enterprise credit investigation data, computer equipment and storage medium
US20200177394A1 (en) Device and method for processing public key of user in communication system that includes a plurality of nodes
US20230229795A1 (en) Evidence management method, evidence management system, and node
CN112801786A (en) Block chain system and method for joint operation based on same
Malki et al. Automating ex-post enforcement for spectrum sharing: A new application for block-chain technology
Suzuki et al. Implementation and evaluation of spectrum sharing technology using smart contracts
CN106534047A (en) Information transmitting method and apparatus based on Trust application
CN112384939A (en) Computer-implemented system and method for out-of-chain exchange of distributed ledger-related transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination