CN114021205A - Block chain checking method, storage medium and device for achieving block chain tamper resistance - Google Patents
Block chain checking method, storage medium and device for achieving block chain tamper resistance Download PDFInfo
- Publication number
- CN114021205A CN114021205A CN202111421426.0A CN202111421426A CN114021205A CN 114021205 A CN114021205 A CN 114021205A CN 202111421426 A CN202111421426 A CN 202111421426A CN 114021205 A CN114021205 A CN 114021205A
- Authority
- CN
- China
- Prior art keywords
- block
- chain
- transaction
- check
- signature
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 29
- 238000012795 verification Methods 0.000 claims description 79
- 230000002159 abnormal effect Effects 0.000 claims description 8
- 238000004590 computer program Methods 0.000 claims description 6
- 230000008569 process Effects 0.000 claims description 6
- 238000005308 sum rule Methods 0.000 claims description 6
- 230000006870 function Effects 0.000 claims description 2
- 238000012827 research and development Methods 0.000 abstract description 2
- 230000006978 adaptation Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003044 adaptive effect Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000002349 favourable effect Effects 0.000 description 1
- 230000001737 promoting effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44521—Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
- G06F9/44526—Plug-ins; Add-ons
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3825—Use of electronic signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3827—Use of message hashing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Finance (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a block chain checking and storing medium and a device for realizing block chain tamper resistance, wherein the method comprises the following steps: reading a designated block book file through the check directory configuration of the national password adapter and the different national password algorithm configuration of the assembly configuration thereof, and preliminarily checking the book file to obtain corresponding block chain information; analyzing the block chain information and selecting a specified chain type mode for checking; the national password adapter is provided with a plurality of plug-ins to obtain check results of various types and compare the check results, meanwhile, the check is carried out on a plurality of files, the integrity and the correctness of block chain information are guaranteed, block chain tamper resistance is achieved, the check results are divided into a plurality of files due to the fact that accounts are enlarged, therefore, the check results are obtained through the plug-ins, each plug-in obtains the corresponding file, and research and development efficiency and system stability are facilitated.
Description
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a block chain verification method, a storage medium and a device for achieving block chain tamper resistance.
Background
In order to ensure the legality of the transaction and the security of the whole system, the block chain carries out various checks in the running process, wherein the check for block tampering is the check for integrity, signature and signature chain of the block and the transaction thereof.
The current block and transaction verification performance loss is huge, and is mainly reflected in that: signature and identity certificate signature chain verification is performed on each block, each transaction and all proposals and endorsements thereof, so that the overall verification efficiency is low, and the research and development efficiency and the system stability are not facilitated.
Therefore, a new method for verifying a block chain to prevent tampering of the block chain is needed, so as to achieve flexible configuration of verification logic and application of more scenes.
Disclosure of Invention
Based on the background and the problems in the prior art, the invention designs the block chain verification method, the storage medium and the device for realizing block chain tamper resistance, can realize the promotion of verification performance, the adaptation of a national cryptographic algorithm and the support of multi-file verification after the verification logic is modified, and is beneficial to promoting the efficiency of the block chain verification process and the stability of the system.
In order to achieve these objects and other advantages, the present invention provides a method for verifying a blockchain, which includes:
reading a designated block book file through the check directory configuration of the national password adapter and the different national password algorithm configuration of the assembly configuration thereof, and preliminarily checking the book file to obtain corresponding block chain information; the blockchain information comprises blockchain information, transaction information and signature information, wherein the signature information comprises a signature of the blockfile and a certificate issuing chain associated with the blockfile;
analyzing the block chain information and selecting a specified chain type mode for checking; the checking process is adaptive to a national cryptographic algorithm, and the block book file is analyzed into block information to be checked, transaction information and signature information; analyzing the block chain information to obtain a block and a transaction, verifying the specified chain type mode, including verifying the block and verifying the transaction, wherein verifying the block includes verifying a signature and a signature chain of a hash value, a block number, a latest configuration block and metadata, and verifying the transaction includes verifying a certificate signature chain, a transaction signature, a transaction proposal certificate signature chain and an endorsement certificate signature chain of the transaction;
the national password adapter is provided with a plurality of plug-ins to obtain check results of various types, the check results are compared, meanwhile, the check is carried out on a plurality of files, the integrity and the correctness of block chain information are guaranteed, the block chain is prevented from being tampered, the check results are divided into a plurality of files due to the fact that accounts are enlarged, and therefore the check results are obtained through the plug-ins, and each plug-in obtains the corresponding file.
In the foregoing solution, the verifying the block specifically includes:
initializing parameters used for verification;
starting to acquire block information based on the parameters, initializing a providing server of the block, and caching the information of the block to be checked;
and judging whether the block check is legal or not, checking the cached information when the check is legal, and returning a check result.
In the above scheme, the verifying the transaction specifically includes performing another round of verification on the block verification result after the block is verified.
In the foregoing scheme of the first aspect, the verifying block chain information specifically includes:
obtaining the hash value of the last block of the information of the block to be checked on the chain, and checking the hash value of the block if the hash value is legal, or checking the metadata signature if the hash value is illegal;
the hash value check-sum rule of the block outputs a check passing result, and the transaction check is started if the hash value check-sum rule is not matched;
the metadata signature chain verification is carried out by the metadata signature check rule, the block abnormity verification result is output by the metadata signature check or metadata signature chain check ineligibility rule, and the transaction verification is carried out by the metadata signature chain rule;
the transaction verification comprises verifying the legality of the transaction signature, if the transaction signature is legal, the transaction identity signature chain is verified, and if the transaction signature chain is legal, a transaction abnormal verification result is output;
if the transaction identity signature chain is verified to be legal, transaction proposal and endorsement verification are carried out, and if not, a transaction abnormal verification result is output;
and if the transaction proposal and the endorsement check pass, judging that the block chain to be checked and the transaction are normal.
In the above scheme of the first aspect, the comparing the check results of each type includes: .
Performing hash check comparison, comparing the current hash value with the calculated first hash value, and if the current hash value is the same as the calculated first hash value, passing the check or being legal;
comparing the hash value of the current block with the hash value calculated by the current block, and if the hash value of the current block is the same as the hash value of the current block, checking the hash value to be passed or legal;
if the block number of the current block latest configuration block is less than or equal to the block number of the current block, the check is passed or legal;
and checking each signature of the metadata of the current block, verifying a certificate signature chain of the current block, and checking whether the current block is legal or not if the current block is verified.
In a second aspect, the invention provides a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the method steps as described above.
In a third aspect, the present invention also provides a block chain verification apparatus for implementing block chain tamper resistance, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the method steps described above when executing the computer program.
Compared with the prior art, the block-based tamper-proof check logic is modified and optimized, conditions are set in the block check, the signature and signature chain check, the transaction signature and the transaction identity signature chain check to judge the validity of the check logic, redundant steps are reduced, and the check efficiency is improved; meanwhile, the method also supports national cryptographic algorithm adaptation and multi-file verification, realizes the expansion of the verification function, can be applied to more service scenes, and is favorable for the verification efficiency of the block chain and the stability of the system.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts, and the concrete implementation flows that can be obviously made in the process are further concrete embodiments of the present invention and fall into the protection scope of the present invention.
FIG. 1 is a flow chart of block chain verification for implementing block chain tamper resistance according to the present invention;
FIG. 2 is a block diagram of the overall logic of the transaction verification according to the present invention.
Detailed Description
In order to clearly illustrate the present invention and make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, so that those skilled in the art can implement the technical solutions in reference to the description text.
Example 1:
the technology of the present invention will be described in detail below with reference to the accompanying drawings in conjunction with specific embodiments. As shown in fig. 1, the present invention provides a block chain verification method for implementing block chain tamper resistance, which includes the following specific steps:
step 1: reading a designated block ledger file through a state cipher adapter and a component configuration of the state cipher adapter, configuring different state cipher algorithm check catalog configurations, performing preliminary check on the ledger file, and acquiring corresponding block chain information, wherein the block chain information comprises block information, transaction information and signature information on a chain, and the signature information comprises a signature of the block file and a certificate issuing chain associated with the block file;
the verification method also supports a national cryptographic algorithm, wherein the national cryptographic algorithm is a series of algorithms specified by the national cipher administration, and the algorithms comprise a symmetric encryption algorithm, an elliptic curve asymmetric encryption algorithm, a hash algorithm and the like.
The checking method further comprises the step of supporting multi-file checking, wherein the multi-file checking refers to checking between block files read by the directory configuration.
Step 2: acquiring a block source, analyzing block chain information, selecting a specified chain type mode for verification, selecting a fabric-block mode for block verification, wherein the fabric-block mode refers to the specified chain type and can also comprise a verification ledger file and an intellectual property database; analyzing the block chain information to obtain a block and a transaction, verifying the specified chain type mode, including verifying the block and verifying the transaction, wherein the verifying the block includes verifying a signature and a signature chain of a hash value, a block number, a latest configuration block and metaData (metaData verification), and the verifying the transaction includes verifying a certificate signature chain, a transaction signature, a transaction proposal certificate signature chain and an endorsement certificate signature chain of the transaction; the check on the Hash value comprises a previous Hash check and a Hash check, wherein the previous Hash check is used for checking whether the previous Hash of the current block is equal to the Hash value calculated by the last block or not, and the Hash check is used for checking whether the Hash of the current block is equal to the Hash calculated currently or not;
s21: in general, the verifying the block chain information includes:
s211: obtaining the hash value of the last block of the information of the block to be checked on the chain, and checking the hash value of the block if the hash value is legal, or checking the metadata signature if the hash value is illegal;
s212: the hash value check-sum rule of the block outputs a check passing result, and the transaction check is started if the hash value check-sum rule is not matched;
s213: the metadata signature chain verification is carried out by the metadata signature check rule, the block abnormity verification result is output by the metadata signature check or metadata signature chain check ineligibility rule, and the transaction verification is carried out by the metadata signature chain rule;
s214: the transaction verification comprises verifying the legality of the transaction signature, if the transaction signature is legal, the transaction identity signature chain is verified, and if the transaction signature chain is legal, a transaction abnormal verification result is output;
s215: if the transaction identity signature chain is verified to be legal, transaction proposal and endorsement verification are carried out, and if not, a transaction abnormal verification result is output;
s216: and if the transaction proposal and the endorsement check pass, judging that the block chain to be checked and the transaction are normal.
S22: the block is verified, and the specific implementation steps include:
s221: initializing parameters used for verification;
s222: starting to acquire block information based on the parameters, initializing a providing server of the block, and caching the information of the block to be checked;
s223: and judging whether the block check is legal or not, checking the cached information when the check is legal, and returning a check result.
Step 3: the national password adapter is provided with a plurality of plug-ins to obtain check results of various types, the check results are compared, meanwhile, a plurality of files are checked, the integrity and the correctness of block chain information are guaranteed, block chain tamper resistance is achieved, the check results are divided into a plurality of files due to the fact that accounts are enlarged, and therefore each plug-in obtains a corresponding file through the plurality of plug-ins and returns the check result; comparing the check results of various types, and the specific implementation steps comprise: .
S31: performing hash check comparison, comparing the current hash value with the calculated first hash value, and if the current hash value is the same as the calculated first hash value, passing the check or being legal;
s32: comparing the hash value of the current block with the hash value calculated by the current block, and if the hash value of the current block is the same as the hash value of the current block, checking the hash value to be passed or legal;
s33: if the block number (blockNumber value) of the latest configuration block of the current block is less than or equal to the block number of the current block, the check is passed or legal;
s34: and checking each signature of the metadata of the current block, verifying a certificate signature chain of the current block, and checking whether the current block is legal or not if the current block is verified.
Example 2:
the block verification comprises the following steps:
1) verifying the previous Hash, and verifying that the previous Hash of the current block is equal to the Hash value calculated by the last block;
2) hash check, namely verifying that the Hash of the current block is equal to the Hash value calculated by the current block;
3) checking the latest configuration block, and verifying that the block number value of the latest configuration block of the current block is less than or equal to the block number value of the current block;
4) metaData (metaData) verification, which verifies each signature of metaData [0] under the current chunk, and verifies the certificate signature chain;
the transaction verification comprises the following steps:
1) verifying the transaction certificate signature chain, namely verifying the certificate signature chain of each transaction;
2) a transaction signature chain, which is used for verifying each transaction signature;
3) and (4) transaction proposal and multiple verification, namely verifying the signature chain of the proposal identity certificate and the endorsement identity certificate.
As shown in fig. 2, the verification process of integrity of blocks and transactions in the present invention is described, and the specific implementation steps include:
step 1: when the verification is started, block verification is carried out, previousHash verification is carried out firstly, the validity is set and judged, Hash verification is carried out if the validity is legal, and meta data signature verification is carried out if the validity is not legal; wherein:
judging the validity of the previous Hash check, and then dividing the validity into two conditions:
s11: performing Hash check, judging the validity of the Hash check, outputting a result of successful check if the Hash check is valid, finishing the check, and starting transaction check if the Hash check is not valid;
s12: the metaData signature verification is carried out, the validity of the metaData signature verification is judged, if the metaData signature chain is valid, the metaData signature chain verification is carried out, and if the metaData signature chain is invalid, a result of abnormal verification is output; wherein:
checking the metaData signature chain to judge the validity, starting transaction checking if the metaData signature chain is valid, and outputting a checking abnormal result if the metaData signature chain is invalid;
step 3: the transaction signature, the transaction identity signature chain, the transaction day and the endorsement in the transaction verification are verified respectively, the legality of each verification is judged, if the verification is legal, the next verification is continued until a verification result is output, and if the verification result is not legal, the verification is stopped and the verification result is directly output;
the embodiments described above are presented to enable a person having ordinary skill in the art to make and use the invention. It is to be understood that the present invention is not limited to the application of the above-mentioned examples, and it is obvious to those skilled in the art that various modifications can be easily made to the above-mentioned examples, and those skilled in the art should make improvements and modifications to the present invention based on the disclosure of the present invention within the protection scope of the present invention.
Claims (10)
1. A block chain checking method for realizing block chain tamper resistance is characterized by comprising the following concrete implementation steps:
reading a designated block book file through the check directory configuration of the national password adapter and the different national password algorithm configuration of the assembly configuration thereof, and preliminarily checking the book file to obtain corresponding block chain information;
analyzing the block chain information and selecting a specified chain type mode for checking to obtain checking results of various types;
the state password adapter is provided with a plurality of plug-ins to obtain check results of various types and compare the check results, and meanwhile, the check is carried out on a plurality of files corresponding to the appointed chains of various types.
2. The blockchain verification method of claim 1, wherein the blockchain information includes blockchain information, transaction information, and signature information, and the signature information includes a signature for the blockchain ledger file and a certificate issuance chain associated with the blockchain document.
3. The method as claimed in claim 1, wherein the block chain information is analyzed to obtain a block and a transaction, the specified chain type mode is verified, the block is verified and the transaction is verified, the block verification comprises verifying a signature and a signature chain of a hash value, a block number, a newly configured block and metadata, and the transaction verification comprises verifying a certificate signature chain, a transaction signature, a transaction proposal certificate signature chain and an endorsement certificate signature chain of the transaction.
4. The method as claimed in claim 3, wherein the verification process is adapted to a cryptographic algorithm, and the blockbook file is parsed into blockbook information to be verified, transaction information and signature information.
5. The method for verifying the block chain with the tamper-proof function according to claim 3, wherein the verifying the block comprises the following specific steps:
initializing parameters used for verification;
starting to acquire block information based on the parameters, initializing a providing server of the block, and caching the information of the block to be checked;
and judging whether the block check is legal or not, checking the cached information when the check is legal, and returning a check result.
6. The blockchain verification method of claim 3 or 5, wherein the verifying the transaction, specifically after the verifying the block, further comprises performing another round of verification on the block verification result.
7. The method for verifying the block chain based on the tamper-proofing of the block chain according to claim 1, wherein the step of verifying the specified chain type mode includes:
obtaining the hash value of the last block of the information of the block to be checked on the chain, and checking the hash value of the block if the hash value is legal, or checking the metadata signature if the hash value is illegal;
the hash value check-sum rule of the block outputs a check passing result, and the transaction check is started if the hash value check-sum rule is not matched;
the metadata signature chain verification is carried out by the metadata signature check rule, the block abnormity verification result is output by the metadata signature check or metadata signature chain check ineligibility rule, and the transaction verification is carried out by the metadata signature chain rule;
the transaction verification comprises verifying the legality of the transaction signature, if the transaction signature is legal, the transaction identity signature chain is verified, and if the transaction signature chain is legal, a transaction abnormal verification result is output;
if the transaction identity signature chain is verified to be legal, transaction proposal and endorsement verification are carried out, and if not, a transaction abnormal verification result is output;
and if the transaction proposal and the endorsement check pass, judging that the block chain to be checked and the transaction are normal.
8. The method for verifying the block chain with tamper resistance of the block chain according to claim 1, wherein the specific implementation steps for comparing the verification results of each type include: .
Performing hash check comparison, comparing the current hash value with the calculated first hash value, and if the current hash value is the same as the calculated first hash value, passing the check or being legal;
comparing the hash value of the current block with the hash value calculated by the current block, and if the hash value of the current block is the same as the hash value of the current block, checking the hash value to be passed or legal;
if the block number of the current block latest configuration block is less than or equal to the block number of the current block, the check is passed or legal;
and checking each signature of the metadata of the current block, verifying a certificate signature chain of the current block, and checking whether the current block is legal or not if the current block is verified.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method steps of any one of claims 1 to 8.
10. A blockchain verification apparatus implementing blockchain tamper resistance, comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the method steps according to any one of claims 1 to 8 when executing the computer program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111421426.0A CN114021205A (en) | 2021-11-26 | 2021-11-26 | Block chain checking method, storage medium and device for achieving block chain tamper resistance |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111421426.0A CN114021205A (en) | 2021-11-26 | 2021-11-26 | Block chain checking method, storage medium and device for achieving block chain tamper resistance |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114021205A true CN114021205A (en) | 2022-02-08 |
Family
ID=80066593
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111421426.0A Pending CN114021205A (en) | 2021-11-26 | 2021-11-26 | Block chain checking method, storage medium and device for achieving block chain tamper resistance |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114021205A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200226268A1 (en) * | 2019-01-16 | 2020-07-16 | EMC IP Holding Company LLC | Blockchain technology for regulatory compliance of data management systems |
CN111428277A (en) * | 2020-03-20 | 2020-07-17 | 中国建设银行股份有限公司 | Block chain data verification method, device and system |
CN113037827A (en) * | 2021-03-02 | 2021-06-25 | 上海旺链信息科技有限公司 | Voting method based on block chain, self-organization management method and computer equipment |
CN113452521A (en) * | 2021-06-28 | 2021-09-28 | 杭州云象网络技术有限公司 | Block chain state password adaptation method, state password adapter, system and device |
-
2021
- 2021-11-26 CN CN202111421426.0A patent/CN114021205A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20200226268A1 (en) * | 2019-01-16 | 2020-07-16 | EMC IP Holding Company LLC | Blockchain technology for regulatory compliance of data management systems |
CN111428277A (en) * | 2020-03-20 | 2020-07-17 | 中国建设银行股份有限公司 | Block chain data verification method, device and system |
CN113037827A (en) * | 2021-03-02 | 2021-06-25 | 上海旺链信息科技有限公司 | Voting method based on block chain, self-organization management method and computer equipment |
CN113452521A (en) * | 2021-06-28 | 2021-09-28 | 杭州云象网络技术有限公司 | Block chain state password adaptation method, state password adapter, system and device |
Non-Patent Citations (1)
Title |
---|
黄步添;刘琦;何钦铭;刘振广;陈建海;: "基于语义嵌入模型与交易信息的智能合约自动分类系统", 自动化学报, no. 09, 30 September 2017 (2017-09-30) * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108370318B (en) | Method and system for blockchain variants using digital signatures | |
US11366932B2 (en) | Consensus method and data verification method, apparatus, and system of consortium blockchain | |
US7805765B2 (en) | Execution validation using header containing validation data | |
BR112019016598A2 (en) | COMPUTER IMPLEMENTED METHODS, NON-TRANSITIONAL STORAGE MEDIA AND SYSTEMS | |
CN108009445B (en) | Semi-centralized trusted data management system | |
US20200117550A1 (en) | Method, device and computer program product for backing up data | |
EP2284754A1 (en) | Optimized integrity verification procedures | |
US11563560B2 (en) | Blockchain-based data evidence storage method and apparatus | |
CN112508560A (en) | Block chain cross-chain identity authentication and authority control method and device and computer equipment | |
Nadiya et al. | Block summarization and compression in bitcoin blockchain | |
CN112037058B (en) | Data verification method, device and storage medium | |
CN109981588B (en) | Data transaction service processing method and system based on block chain | |
CN110880143A (en) | System and method for processing transaction verification operations in decentralized applications | |
WO2019178763A1 (en) | Certificate importing method and terminal | |
CN108540447B (en) | Block chain-based certificate verification method and system | |
CN113343313A (en) | Verification report validity identification method, legal service system and readable storage medium | |
US9860230B1 (en) | Systems and methods for digitally signing executables with reputation information | |
CN117473020B (en) | Data access method, system, computer storage medium and terminal device | |
CN109033818B (en) | Terminal, authentication method, and computer-readable storage medium | |
CN114462998A (en) | Log tamper-proofing method, system and storage medium | |
CN114021205A (en) | Block chain checking method, storage medium and device for achieving block chain tamper resistance | |
CN111953477B (en) | Terminal equipment, generation method of identification token of terminal equipment and interaction method of client | |
CN114866260B (en) | Chameleon hash distributed identity using method and system | |
CN116579026A (en) | Cloud data integrity auditing method, device, equipment and storage medium | |
CN116644485A (en) | Anti-counterfeiting authentication method and device for server memory, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |