CN114021205A - Block chain checking method, storage medium and device for achieving block chain tamper resistance - Google Patents

Block chain checking method, storage medium and device for achieving block chain tamper resistance Download PDF

Info

Publication number
CN114021205A
CN114021205A CN202111421426.0A CN202111421426A CN114021205A CN 114021205 A CN114021205 A CN 114021205A CN 202111421426 A CN202111421426 A CN 202111421426A CN 114021205 A CN114021205 A CN 114021205A
Authority
CN
China
Prior art keywords
block
chain
transaction
check
signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111421426.0A
Other languages
Chinese (zh)
Inventor
黄步添
詹冠冠
刘成永
何钦铭
刘振广
罗春凤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Yunxiang Network Technology Co Ltd
Original Assignee
Hangzhou Yunxiang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Yunxiang Network Technology Co Ltd filed Critical Hangzhou Yunxiang Network Technology Co Ltd
Priority to CN202111421426.0A priority Critical patent/CN114021205A/en
Publication of CN114021205A publication Critical patent/CN114021205A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44521Dynamic linking or loading; Link editing at or after load time, e.g. Java class loading
    • G06F9/44526Plug-ins; Add-ons
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a block chain checking and storing medium and a device for realizing block chain tamper resistance, wherein the method comprises the following steps: reading a designated block book file through the check directory configuration of the national password adapter and the different national password algorithm configuration of the assembly configuration thereof, and preliminarily checking the book file to obtain corresponding block chain information; analyzing the block chain information and selecting a specified chain type mode for checking; the national password adapter is provided with a plurality of plug-ins to obtain check results of various types and compare the check results, meanwhile, the check is carried out on a plurality of files, the integrity and the correctness of block chain information are guaranteed, block chain tamper resistance is achieved, the check results are divided into a plurality of files due to the fact that accounts are enlarged, therefore, the check results are obtained through the plug-ins, each plug-in obtains the corresponding file, and research and development efficiency and system stability are facilitated.

Description

Block chain checking method, storage medium and device for achieving block chain tamper resistance
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a block chain verification method, a storage medium and a device for achieving block chain tamper resistance.
Background
In order to ensure the legality of the transaction and the security of the whole system, the block chain carries out various checks in the running process, wherein the check for block tampering is the check for integrity, signature and signature chain of the block and the transaction thereof.
The current block and transaction verification performance loss is huge, and is mainly reflected in that: signature and identity certificate signature chain verification is performed on each block, each transaction and all proposals and endorsements thereof, so that the overall verification efficiency is low, and the research and development efficiency and the system stability are not facilitated.
Therefore, a new method for verifying a block chain to prevent tampering of the block chain is needed, so as to achieve flexible configuration of verification logic and application of more scenes.
Disclosure of Invention
Based on the background and the problems in the prior art, the invention designs the block chain verification method, the storage medium and the device for realizing block chain tamper resistance, can realize the promotion of verification performance, the adaptation of a national cryptographic algorithm and the support of multi-file verification after the verification logic is modified, and is beneficial to promoting the efficiency of the block chain verification process and the stability of the system.
In order to achieve these objects and other advantages, the present invention provides a method for verifying a blockchain, which includes:
reading a designated block book file through the check directory configuration of the national password adapter and the different national password algorithm configuration of the assembly configuration thereof, and preliminarily checking the book file to obtain corresponding block chain information; the blockchain information comprises blockchain information, transaction information and signature information, wherein the signature information comprises a signature of the blockfile and a certificate issuing chain associated with the blockfile;
analyzing the block chain information and selecting a specified chain type mode for checking; the checking process is adaptive to a national cryptographic algorithm, and the block book file is analyzed into block information to be checked, transaction information and signature information; analyzing the block chain information to obtain a block and a transaction, verifying the specified chain type mode, including verifying the block and verifying the transaction, wherein verifying the block includes verifying a signature and a signature chain of a hash value, a block number, a latest configuration block and metadata, and verifying the transaction includes verifying a certificate signature chain, a transaction signature, a transaction proposal certificate signature chain and an endorsement certificate signature chain of the transaction;
the national password adapter is provided with a plurality of plug-ins to obtain check results of various types, the check results are compared, meanwhile, the check is carried out on a plurality of files, the integrity and the correctness of block chain information are guaranteed, the block chain is prevented from being tampered, the check results are divided into a plurality of files due to the fact that accounts are enlarged, and therefore the check results are obtained through the plug-ins, and each plug-in obtains the corresponding file.
In the foregoing solution, the verifying the block specifically includes:
initializing parameters used for verification;
starting to acquire block information based on the parameters, initializing a providing server of the block, and caching the information of the block to be checked;
and judging whether the block check is legal or not, checking the cached information when the check is legal, and returning a check result.
In the above scheme, the verifying the transaction specifically includes performing another round of verification on the block verification result after the block is verified.
In the foregoing scheme of the first aspect, the verifying block chain information specifically includes:
obtaining the hash value of the last block of the information of the block to be checked on the chain, and checking the hash value of the block if the hash value is legal, or checking the metadata signature if the hash value is illegal;
the hash value check-sum rule of the block outputs a check passing result, and the transaction check is started if the hash value check-sum rule is not matched;
the metadata signature chain verification is carried out by the metadata signature check rule, the block abnormity verification result is output by the metadata signature check or metadata signature chain check ineligibility rule, and the transaction verification is carried out by the metadata signature chain rule;
the transaction verification comprises verifying the legality of the transaction signature, if the transaction signature is legal, the transaction identity signature chain is verified, and if the transaction signature chain is legal, a transaction abnormal verification result is output;
if the transaction identity signature chain is verified to be legal, transaction proposal and endorsement verification are carried out, and if not, a transaction abnormal verification result is output;
and if the transaction proposal and the endorsement check pass, judging that the block chain to be checked and the transaction are normal.
In the above scheme of the first aspect, the comparing the check results of each type includes: .
Performing hash check comparison, comparing the current hash value with the calculated first hash value, and if the current hash value is the same as the calculated first hash value, passing the check or being legal;
comparing the hash value of the current block with the hash value calculated by the current block, and if the hash value of the current block is the same as the hash value of the current block, checking the hash value to be passed or legal;
if the block number of the current block latest configuration block is less than or equal to the block number of the current block, the check is passed or legal;
and checking each signature of the metadata of the current block, verifying a certificate signature chain of the current block, and checking whether the current block is legal or not if the current block is verified.
In a second aspect, the invention provides a computer-readable storage medium, in which a computer program is stored, which, when being executed by a processor, carries out the method steps as described above.
In a third aspect, the present invention also provides a block chain verification apparatus for implementing block chain tamper resistance, including a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the method steps described above when executing the computer program.
Compared with the prior art, the block-based tamper-proof check logic is modified and optimized, conditions are set in the block check, the signature and signature chain check, the transaction signature and the transaction identity signature chain check to judge the validity of the check logic, redundant steps are reduced, and the check efficiency is improved; meanwhile, the method also supports national cryptographic algorithm adaptation and multi-file verification, realizes the expansion of the verification function, can be applied to more service scenes, and is favorable for the verification efficiency of the block chain and the stability of the system.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to these drawings without creative efforts, and the concrete implementation flows that can be obviously made in the process are further concrete embodiments of the present invention and fall into the protection scope of the present invention.
FIG. 1 is a flow chart of block chain verification for implementing block chain tamper resistance according to the present invention;
FIG. 2 is a block diagram of the overall logic of the transaction verification according to the present invention.
Detailed Description
In order to clearly illustrate the present invention and make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention are clearly and completely described below with reference to the drawings in the embodiments of the present invention, so that those skilled in the art can implement the technical solutions in reference to the description text.
Example 1:
the technology of the present invention will be described in detail below with reference to the accompanying drawings in conjunction with specific embodiments. As shown in fig. 1, the present invention provides a block chain verification method for implementing block chain tamper resistance, which includes the following specific steps:
step 1: reading a designated block ledger file through a state cipher adapter and a component configuration of the state cipher adapter, configuring different state cipher algorithm check catalog configurations, performing preliminary check on the ledger file, and acquiring corresponding block chain information, wherein the block chain information comprises block information, transaction information and signature information on a chain, and the signature information comprises a signature of the block file and a certificate issuing chain associated with the block file;
the verification method also supports a national cryptographic algorithm, wherein the national cryptographic algorithm is a series of algorithms specified by the national cipher administration, and the algorithms comprise a symmetric encryption algorithm, an elliptic curve asymmetric encryption algorithm, a hash algorithm and the like.
The checking method further comprises the step of supporting multi-file checking, wherein the multi-file checking refers to checking between block files read by the directory configuration.
Step 2: acquiring a block source, analyzing block chain information, selecting a specified chain type mode for verification, selecting a fabric-block mode for block verification, wherein the fabric-block mode refers to the specified chain type and can also comprise a verification ledger file and an intellectual property database; analyzing the block chain information to obtain a block and a transaction, verifying the specified chain type mode, including verifying the block and verifying the transaction, wherein the verifying the block includes verifying a signature and a signature chain of a hash value, a block number, a latest configuration block and metaData (metaData verification), and the verifying the transaction includes verifying a certificate signature chain, a transaction signature, a transaction proposal certificate signature chain and an endorsement certificate signature chain of the transaction; the check on the Hash value comprises a previous Hash check and a Hash check, wherein the previous Hash check is used for checking whether the previous Hash of the current block is equal to the Hash value calculated by the last block or not, and the Hash check is used for checking whether the Hash of the current block is equal to the Hash calculated currently or not;
s21: in general, the verifying the block chain information includes:
s211: obtaining the hash value of the last block of the information of the block to be checked on the chain, and checking the hash value of the block if the hash value is legal, or checking the metadata signature if the hash value is illegal;
s212: the hash value check-sum rule of the block outputs a check passing result, and the transaction check is started if the hash value check-sum rule is not matched;
s213: the metadata signature chain verification is carried out by the metadata signature check rule, the block abnormity verification result is output by the metadata signature check or metadata signature chain check ineligibility rule, and the transaction verification is carried out by the metadata signature chain rule;
s214: the transaction verification comprises verifying the legality of the transaction signature, if the transaction signature is legal, the transaction identity signature chain is verified, and if the transaction signature chain is legal, a transaction abnormal verification result is output;
s215: if the transaction identity signature chain is verified to be legal, transaction proposal and endorsement verification are carried out, and if not, a transaction abnormal verification result is output;
s216: and if the transaction proposal and the endorsement check pass, judging that the block chain to be checked and the transaction are normal.
S22: the block is verified, and the specific implementation steps include:
s221: initializing parameters used for verification;
s222: starting to acquire block information based on the parameters, initializing a providing server of the block, and caching the information of the block to be checked;
s223: and judging whether the block check is legal or not, checking the cached information when the check is legal, and returning a check result.
Step 3: the national password adapter is provided with a plurality of plug-ins to obtain check results of various types, the check results are compared, meanwhile, a plurality of files are checked, the integrity and the correctness of block chain information are guaranteed, block chain tamper resistance is achieved, the check results are divided into a plurality of files due to the fact that accounts are enlarged, and therefore each plug-in obtains a corresponding file through the plurality of plug-ins and returns the check result; comparing the check results of various types, and the specific implementation steps comprise: .
S31: performing hash check comparison, comparing the current hash value with the calculated first hash value, and if the current hash value is the same as the calculated first hash value, passing the check or being legal;
s32: comparing the hash value of the current block with the hash value calculated by the current block, and if the hash value of the current block is the same as the hash value of the current block, checking the hash value to be passed or legal;
s33: if the block number (blockNumber value) of the latest configuration block of the current block is less than or equal to the block number of the current block, the check is passed or legal;
s34: and checking each signature of the metadata of the current block, verifying a certificate signature chain of the current block, and checking whether the current block is legal or not if the current block is verified.
Example 2:
the block verification comprises the following steps:
1) verifying the previous Hash, and verifying that the previous Hash of the current block is equal to the Hash value calculated by the last block;
2) hash check, namely verifying that the Hash of the current block is equal to the Hash value calculated by the current block;
3) checking the latest configuration block, and verifying that the block number value of the latest configuration block of the current block is less than or equal to the block number value of the current block;
4) metaData (metaData) verification, which verifies each signature of metaData [0] under the current chunk, and verifies the certificate signature chain;
the transaction verification comprises the following steps:
1) verifying the transaction certificate signature chain, namely verifying the certificate signature chain of each transaction;
2) a transaction signature chain, which is used for verifying each transaction signature;
3) and (4) transaction proposal and multiple verification, namely verifying the signature chain of the proposal identity certificate and the endorsement identity certificate.
As shown in fig. 2, the verification process of integrity of blocks and transactions in the present invention is described, and the specific implementation steps include:
step 1: when the verification is started, block verification is carried out, previousHash verification is carried out firstly, the validity is set and judged, Hash verification is carried out if the validity is legal, and meta data signature verification is carried out if the validity is not legal; wherein:
judging the validity of the previous Hash check, and then dividing the validity into two conditions:
s11: performing Hash check, judging the validity of the Hash check, outputting a result of successful check if the Hash check is valid, finishing the check, and starting transaction check if the Hash check is not valid;
s12: the metaData signature verification is carried out, the validity of the metaData signature verification is judged, if the metaData signature chain is valid, the metaData signature chain verification is carried out, and if the metaData signature chain is invalid, a result of abnormal verification is output; wherein:
checking the metaData signature chain to judge the validity, starting transaction checking if the metaData signature chain is valid, and outputting a checking abnormal result if the metaData signature chain is invalid;
step 3: the transaction signature, the transaction identity signature chain, the transaction day and the endorsement in the transaction verification are verified respectively, the legality of each verification is judged, if the verification is legal, the next verification is continued until a verification result is output, and if the verification result is not legal, the verification is stopped and the verification result is directly output;
the embodiments described above are presented to enable a person having ordinary skill in the art to make and use the invention. It is to be understood that the present invention is not limited to the application of the above-mentioned examples, and it is obvious to those skilled in the art that various modifications can be easily made to the above-mentioned examples, and those skilled in the art should make improvements and modifications to the present invention based on the disclosure of the present invention within the protection scope of the present invention.

Claims (10)

1. A block chain checking method for realizing block chain tamper resistance is characterized by comprising the following concrete implementation steps:
reading a designated block book file through the check directory configuration of the national password adapter and the different national password algorithm configuration of the assembly configuration thereof, and preliminarily checking the book file to obtain corresponding block chain information;
analyzing the block chain information and selecting a specified chain type mode for checking to obtain checking results of various types;
the state password adapter is provided with a plurality of plug-ins to obtain check results of various types and compare the check results, and meanwhile, the check is carried out on a plurality of files corresponding to the appointed chains of various types.
2. The blockchain verification method of claim 1, wherein the blockchain information includes blockchain information, transaction information, and signature information, and the signature information includes a signature for the blockchain ledger file and a certificate issuance chain associated with the blockchain document.
3. The method as claimed in claim 1, wherein the block chain information is analyzed to obtain a block and a transaction, the specified chain type mode is verified, the block is verified and the transaction is verified, the block verification comprises verifying a signature and a signature chain of a hash value, a block number, a newly configured block and metadata, and the transaction verification comprises verifying a certificate signature chain, a transaction signature, a transaction proposal certificate signature chain and an endorsement certificate signature chain of the transaction.
4. The method as claimed in claim 3, wherein the verification process is adapted to a cryptographic algorithm, and the blockbook file is parsed into blockbook information to be verified, transaction information and signature information.
5. The method for verifying the block chain with the tamper-proof function according to claim 3, wherein the verifying the block comprises the following specific steps:
initializing parameters used for verification;
starting to acquire block information based on the parameters, initializing a providing server of the block, and caching the information of the block to be checked;
and judging whether the block check is legal or not, checking the cached information when the check is legal, and returning a check result.
6. The blockchain verification method of claim 3 or 5, wherein the verifying the transaction, specifically after the verifying the block, further comprises performing another round of verification on the block verification result.
7. The method for verifying the block chain based on the tamper-proofing of the block chain according to claim 1, wherein the step of verifying the specified chain type mode includes:
obtaining the hash value of the last block of the information of the block to be checked on the chain, and checking the hash value of the block if the hash value is legal, or checking the metadata signature if the hash value is illegal;
the hash value check-sum rule of the block outputs a check passing result, and the transaction check is started if the hash value check-sum rule is not matched;
the metadata signature chain verification is carried out by the metadata signature check rule, the block abnormity verification result is output by the metadata signature check or metadata signature chain check ineligibility rule, and the transaction verification is carried out by the metadata signature chain rule;
the transaction verification comprises verifying the legality of the transaction signature, if the transaction signature is legal, the transaction identity signature chain is verified, and if the transaction signature chain is legal, a transaction abnormal verification result is output;
if the transaction identity signature chain is verified to be legal, transaction proposal and endorsement verification are carried out, and if not, a transaction abnormal verification result is output;
and if the transaction proposal and the endorsement check pass, judging that the block chain to be checked and the transaction are normal.
8. The method for verifying the block chain with tamper resistance of the block chain according to claim 1, wherein the specific implementation steps for comparing the verification results of each type include: .
Performing hash check comparison, comparing the current hash value with the calculated first hash value, and if the current hash value is the same as the calculated first hash value, passing the check or being legal;
comparing the hash value of the current block with the hash value calculated by the current block, and if the hash value of the current block is the same as the hash value of the current block, checking the hash value to be passed or legal;
if the block number of the current block latest configuration block is less than or equal to the block number of the current block, the check is passed or legal;
and checking each signature of the metadata of the current block, verifying a certificate signature chain of the current block, and checking whether the current block is legal or not if the current block is verified.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method steps of any one of claims 1 to 8.
10. A blockchain verification apparatus implementing blockchain tamper resistance, comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the method steps according to any one of claims 1 to 8 when executing the computer program.
CN202111421426.0A 2021-11-26 2021-11-26 Block chain checking method, storage medium and device for achieving block chain tamper resistance Pending CN114021205A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111421426.0A CN114021205A (en) 2021-11-26 2021-11-26 Block chain checking method, storage medium and device for achieving block chain tamper resistance

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111421426.0A CN114021205A (en) 2021-11-26 2021-11-26 Block chain checking method, storage medium and device for achieving block chain tamper resistance

Publications (1)

Publication Number Publication Date
CN114021205A true CN114021205A (en) 2022-02-08

Family

ID=80066593

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111421426.0A Pending CN114021205A (en) 2021-11-26 2021-11-26 Block chain checking method, storage medium and device for achieving block chain tamper resistance

Country Status (1)

Country Link
CN (1) CN114021205A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200226268A1 (en) * 2019-01-16 2020-07-16 EMC IP Holding Company LLC Blockchain technology for regulatory compliance of data management systems
CN111428277A (en) * 2020-03-20 2020-07-17 中国建设银行股份有限公司 Block chain data verification method, device and system
CN113037827A (en) * 2021-03-02 2021-06-25 上海旺链信息科技有限公司 Voting method based on block chain, self-organization management method and computer equipment
CN113452521A (en) * 2021-06-28 2021-09-28 杭州云象网络技术有限公司 Block chain state password adaptation method, state password adapter, system and device

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200226268A1 (en) * 2019-01-16 2020-07-16 EMC IP Holding Company LLC Blockchain technology for regulatory compliance of data management systems
CN111428277A (en) * 2020-03-20 2020-07-17 中国建设银行股份有限公司 Block chain data verification method, device and system
CN113037827A (en) * 2021-03-02 2021-06-25 上海旺链信息科技有限公司 Voting method based on block chain, self-organization management method and computer equipment
CN113452521A (en) * 2021-06-28 2021-09-28 杭州云象网络技术有限公司 Block chain state password adaptation method, state password adapter, system and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
黄步添;刘琦;何钦铭;刘振广;陈建海;: "基于语义嵌入模型与交易信息的智能合约自动分类系统", 自动化学报, no. 09, 30 September 2017 (2017-09-30) *

Similar Documents

Publication Publication Date Title
CN108370318B (en) Method and system for blockchain variants using digital signatures
US11366932B2 (en) Consensus method and data verification method, apparatus, and system of consortium blockchain
US7805765B2 (en) Execution validation using header containing validation data
BR112019016598A2 (en) COMPUTER IMPLEMENTED METHODS, NON-TRANSITIONAL STORAGE MEDIA AND SYSTEMS
CN108009445B (en) Semi-centralized trusted data management system
US20200117550A1 (en) Method, device and computer program product for backing up data
EP2284754A1 (en) Optimized integrity verification procedures
US11563560B2 (en) Blockchain-based data evidence storage method and apparatus
CN112508560A (en) Block chain cross-chain identity authentication and authority control method and device and computer equipment
Nadiya et al. Block summarization and compression in bitcoin blockchain
CN112037058B (en) Data verification method, device and storage medium
CN109981588B (en) Data transaction service processing method and system based on block chain
CN110880143A (en) System and method for processing transaction verification operations in decentralized applications
WO2019178763A1 (en) Certificate importing method and terminal
CN108540447B (en) Block chain-based certificate verification method and system
CN113343313A (en) Verification report validity identification method, legal service system and readable storage medium
US9860230B1 (en) Systems and methods for digitally signing executables with reputation information
CN117473020B (en) Data access method, system, computer storage medium and terminal device
CN109033818B (en) Terminal, authentication method, and computer-readable storage medium
CN114462998A (en) Log tamper-proofing method, system and storage medium
CN114021205A (en) Block chain checking method, storage medium and device for achieving block chain tamper resistance
CN111953477B (en) Terminal equipment, generation method of identification token of terminal equipment and interaction method of client
CN114866260B (en) Chameleon hash distributed identity using method and system
CN116579026A (en) Cloud data integrity auditing method, device, equipment and storage medium
CN116644485A (en) Anti-counterfeiting authentication method and device for server memory, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination