CN114598496B - Alliance chain supervision system and method based on HyperLedger Fabric system chain code - Google Patents

Alliance chain supervision system and method based on HyperLedger Fabric system chain code Download PDF

Info

Publication number
CN114598496B
CN114598496B CN202210080079.8A CN202210080079A CN114598496B CN 114598496 B CN114598496 B CN 114598496B CN 202210080079 A CN202210080079 A CN 202210080079A CN 114598496 B CN114598496 B CN 114598496B
Authority
CN
China
Prior art keywords
chain
code
supervision
data
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210080079.8A
Other languages
Chinese (zh)
Other versions
CN114598496A (en
Inventor
周芸
刘伟
雷霰霆
武兵
叶贞丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huashu Cloud Technology Co ltd
Original Assignee
Huashu Cloud Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huashu Cloud Technology Co ltd filed Critical Huashu Cloud Technology Co ltd
Priority to CN202210080079.8A priority Critical patent/CN114598496B/en
Publication of CN114598496A publication Critical patent/CN114598496A/en
Application granted granted Critical
Publication of CN114598496B publication Critical patent/CN114598496B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention is a alliance chain supervisory system and method based on HyperLedger Fabric system chain code, wherein the method includes transforming Hyperledger Fabric node bottom layer code, for the up-chain request, through increasing system supervisory contract for intercepting the call request of business contract, supervising the on-going date to analyze the request and checking according to the set supervisory rule, checking pass, releasing the call request to business contract operation, if checking fails, rejecting the follow-up execution of the call request, and returning the result to the user; by arranging the chain-of-custody code in the lower layer of the block chain, the system chain-of-custody code is integrated into the node, so that the request of the service chain code is required to pass the rule check of the chain-of-custody code, the compliance of the uplink data is ensured, and meanwhile, the illegal data on the chain can be hidden and deleted in time.

Description

Alliance chain supervision system and method based on HyperLedger Fabric system chain code
Technical Field
The invention relates to the field of blockchains, in particular to a alliance chain supervision system and method based on HyperLedger Fabric system chain codes.
Background
The generation of the encrypted digital currency starts in 2008, and has undergone 10 years of vigorous development, and at present, the blockchain technology has started to gradually surpass the programmable currency era and enter a new era based on intelligent contract large-scale application.
In the wave of digital reform, the system data of each organization department lacks a safe and effective sharing mode. The blockchain technology is used for coping with the actual pain point, integrates the technologies of distributed storage, a consensus mechanism, an encryption algorithm, P2P and the like, and establishes a safe intercommunication sharing mechanism on the Internet for different mechanisms.
Wherein the intelligent contract is a code contract and algorithm contract which can be driven by events and has states and is formed by expressing business logic which is cooperated by multiple parties and agreements observed by all parties in a code form. The intelligent contract technology is introduced into the blockchain, and the characteristics of the blockchain enable the intelligent contract to have the characteristics of decentralization, autonomy, observability, verifiability, information sharing and the like, so that the programmable finance and the programmable society can be effectively constructed. The consensus mechanism enables the business among the institutions expressed by the intelligent contracts to share data information, and achieves information intercommunication among a plurality of nodes in the blockchain peer-to-peer network, thereby achieving value circulation among the institutions. However, because the blockchain itself has the characteristics of decentralization, non-tampering, non-repudiation, non-deletion and low cost, if harmful information, network rumors, and inflammatory and aggressive information are transmitted by the blockchain, the industrial layout and development of the blockchain technology are adversely affected, and meanwhile, the blockchain technology also has serious challenges for the regulatory authorities.
In recent years, the national demand for compliance with internet regulations is increasing, and the development of blockchain technology is not separated from technical regulations. The intelligent contract is used as business logic of multiparty contract, contains a main carrier of shared data of multiparty cooperation, and needs to be ensured to be monitored and emergent. However, the conventional supervision methods such as passive query in the current blockchain system are difficult to implement in the blockchain distributed environment. There is therefore a need for a federated chain of custody system and method based on HyperLedger Fabric system chain codes.
Disclosure of Invention
The invention aims to solve the defects of the prior art and provides a alliance chain supervision system and method based on HyperLedger Fabric system chain codes.
In order to solve the problems, the invention adopts the following technical scheme:
a alliance chain supervision method based on HyperLedger Fabric system chain codes comprises the following steps:
step 1: finishing the transformation of the node end through the set chain code; the reconstruction process is realized through a node-end integrated system chain of custody code;
step 2: completing deployment of the node end; the node end after deployment is connected with the supervision end, and the supervision end can complete the query, addition, modification and deletion operations of the supervision rules in the node end; the supervision rules are arranged in the data space of the corresponding supervision chain codes;
step 3: deploying the developed service chain codes into a node end, and deploying the application system integration into the service end; interaction is realized through the application system and the service chain code;
step 4: the data uploaded by the service end is monitored through the monitoring end;
step 5: monitoring the data on the chain through a monitoring end;
step 6: screening the violation data in the step 4 and the step 5 according to the set chain of supervision codes, correlating the violation data with the service chain codes, and carrying out violation data statistics;
step 7: and comparing the number of the illegal data of the service end with a set value, pulling the service chain code exceeding the set value into a blacklist, and ending the step.
Further, the system chain of supervision code in step 1 includes adding supervision rules in batch, updating supervision rules, deleting check rules, checking supervision rules, stopping operation of the violation service contracts, deleting the violation service contracts, exporting data on the chain, and deleting the violation data.
Further, the step 4 of monitoring the uploaded data means that verification of the uploaded data is completed according to the supervision rule in the set supervision chain code, the checked data is subjected to endorsement and chaining, and the data which does not pass the verification is returned to the service end.
Further, the step 4 of monitoring the uploaded data includes the following steps:
step 41: the data uploading is completed through the service end, and a uplink request is sent to the node end according to the service chain code;
step 42: the node receives the uplink request and sends the uplink request to the chain of custody code;
step 43: the chain of supervision code checks the analytic content of the uplink request according to the set supervision rule; if the verification is passed, the uplink request is returned to the service chain code, the service chain code performs service operation on the uplink request according to a set service contract, the result of the service operation is returned to the service end, and the service result is endorsed at the block chain node; if the verification is not passed, marking the uplink request as illegal data, and returning an error to the service end.
Further, the on-chain data monitoring in step 5 includes the following steps:
step 51: checking the data on the chain through the monitoring end;
step 52: judging the data on the chain according to the receiving information of the monitoring end; the received information comprises deletion and hiding of the data on the chain, and the deleted and hidden data on the chain is judged to be illegal data.
In the step 52, the received information of the monitor terminal is judged by the input of the monitor terminal, and the input of the monitor terminal is external input.
Furthermore, the blacklist in the step 7 can be managed through the monitoring end, including adding and deleting operations on the blacklist.
A alliance chain supervision system based on HyperLedger Fabric system chain codes is based on the supervision method, and comprises a supervision rule management module, a supervision chain code management module, an on-chain data management module and a node end. The supervision rule management module, the supervision chain code management module and the on-chain data management module are arranged at the supervision end; the monitoring end is connected with the node end.
Further, the node end comprises a service chain code, a supervision chain code, a state database, an index library and a plurality of block files; the service chain code and the chain code are connected with the chain code and are respectively connected with the state database, the index library and a plurality of block files; the block file is also connected with the state data block and the index library respectively; the chain-of-custody code is obtained through a custody rule management module, and the business chain code is obtained through development of a developer; the application system is also arranged corresponding to the service chain code, is also developed and obtained by a developer, and is used for interacting with the block chain deployed with the service chain code; the application system is deployed at the service end, so that the service end is in communication connection with the node end; the blockchain node is a transformed coalition chain node containing the chain of custody code.
Further, the supervision rule management module comprises functions of adding, modifying, deleting and inquiring supervision rules;
the chain-of-custody code management module comprises a function of adding and deleting service chain codes and a blacklist; the blacklist is arranged in the chain of custody code;
the on-chain data management module comprises a summarization query of on-chain data and a deletion function of illegal data.
The beneficial effects of the invention are as follows:
by arranging the chain-of-custody code at the bottom layer of the block chain, namely in the system chain code, a mode of merging the system chain-of-custody code into a node is adopted, so that a request of the service chain code is required to pass the rule verification of the chain-of-custody code, the compliance of uplink data is ensured, and meanwhile, the illegal data on the chain can be hidden and deleted in time; in addition, the chain of custody code is encoded in the code of the node, so that various forms of contract virtual machines can be adapted;
by setting the service chain code blacklist on the supervision chain code, the block chain node does not accept the service chain code request in the blacklist any more, thereby limiting the request authority of the service chain code and ensuring the compliance of the service chain code.
Drawings
FIG. 1 is a block diagram of an overall architecture connection according to a first embodiment of the present invention;
FIG. 2 is a flowchart of an automatic monitoring of uploading data according to a first embodiment of the present invention;
FIG. 3 is a flowchart of checking and judging on-link data according to a first embodiment of the present invention;
fig. 4 is a flowchart of pulling a service chain code into a blacklist in a first embodiment of the present invention.
Detailed Description
Other advantages and effects of the present invention will become apparent to those skilled in the art from the following disclosure, which describes the embodiments of the present invention with reference to specific examples. The invention may be practiced or carried out in other embodiments that depart from the specific details, and the details of the present description may be modified or varied from the spirit and scope of the present invention. It should be noted that the following embodiments and features in the embodiments may be combined with each other without conflict.
It should be noted that the illustrations provided in the following embodiments merely illustrate the basic concept of the present invention by way of illustration, and only the components related to the present invention are shown in the drawings and are not drawn according to the number, shape and size of the components in actual implementation, and the form, number and proportion of the components in actual implementation may be arbitrarily changed, and the layout of the components may be more complicated.
In the application, the block chain represents a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like;
the alliance chain represents a block chain deployment form, and only aims at a specific group member, a strict node admittance mechanism is provided;
hyperledger Fabric, enterprise-level distributed ledger technology sourced by the Linux foundation;
smart contracts represent a computer protocol that aims to propagate, verify or execute contracts in an informative manner;
chain code (chaincode) represents an implementation of intelligence on the order of Hyperledger Fabric.
Embodiment one:
as shown in fig. 1, the alliance chain supervision system based on HyperLedger Fabric system chain codes comprises a supervision rule management module, a supervision chain code management module, an on-chain data management module and a node end. The supervision rule management module, the supervision chain code management module and the on-chain data management module are arranged at the supervision end; the monitoring end is connected with the node end.
The node terminal comprises a service chain code, a supervision chain code, a state database, an index library and a block file. The service chain code and the chain code are connected with the chain code and are respectively connected with the state database, the index library and a plurality of block files; the block files are also respectively connected with the state data blocks and the index library. The chain-of-custody code is obtained through a custody rule management module, the service chain code is obtained through development of a developer, an application System (SDK) is further arranged corresponding to the service chain code, the application system is also obtained through development of the developer, and the application system is used for interacting with the blockchain deployed with the service chain code. The application system is deployed at the service end, so that the service end is in communication connection with the node end. The blockchain node is a transformed coalition chain node containing the chain of custody code.
The supervision rule management module comprises functions of adding, modifying, deleting, inquiring and the like of the supervision rule.
The chain of custody code management module comprises functions of adding service chain codes, adding and deleting blacklists and the like. The blacklist is set in the chain of custody code.
The on-chain data management module comprises functions of summarizing and inquiring on-chain data, deleting illegal data and the like.
As shown in fig. 2-4, a federation chain supervision method based on HyperLedger Fabric system chain codes includes the following steps:
step 1: finishing the transformation of the node end through the set chain code; the reconstruction process is realized through a node-end integrated system chain of custody code;
step 2: completing deployment of the node end; the node end after deployment is connected with the supervision end, and the supervision end can finish the operations of inquiring, adding, modifying, deleting and the like of the supervision rules in the node end, wherein the supervision rules are arranged in the data space corresponding to the supervision chain codes;
step 3: deploying the developed service chain codes into a node end, and deploying the application system integration into the service end; interaction is realized through the application system and the service chain code;
step 4: the data uploaded by the service end is monitored by the monitoring end in combination with the chain of supervision code;
step 5: monitoring the data on the chain through a monitoring end;
step 6: screening the violation data in the step 4 and the step 5 according to the set chain of supervision codes, correlating the violation data with the service chain codes, and carrying out violation data statistics;
step 7: and comparing the number of the illegal data of the service end with a set value, and pulling the service chain code exceeding the set value into a blacklist, wherein the node end refuses to accept the service chain code request in the blacklist, and ending the step.
In the step 1, a system chain code is set in a Hyperledger Fabric architecture for processing a life management cycle related operation including a service chain code; and adding a chain of supervision code into the system chain code by modifying the node code. The system supervision chain code comprises batch addition of supervision rules, updating of supervision rules, deletion of check rules, supervision rule check, stopping of operation of the violation business contracts, deletion of the violation business contracts, export of on-chain data and deletion of the violation data. Wherein the batch addition regulatory rule is expressed as PutNewSupervisorule (rule [ ] string) error; the update supervision rule is expressed as an update supervisrule (rule string) error; the erasure checking rule is denoted DeleteSuperviseRule (ruleId int) error; the supervision rule check is expressed as verifysupervisrule (running) error; stopping the violation business contract run is denoted StopIllegalCC (ccid string) error; delete violation business contracts are denoted deleteIllegalCC (ccid string) error; exporting the on-chain data representation as DumpData () error; the deletion violation data is denoted DeleteIllegalData (txId string) error.
And 4, monitoring the uploaded data in the step, namely finishing verification of the uploaded data according to the supervision rule in the set supervision chain code, carrying out endorsement and chaining on the data passing the verification, and returning the data which does not pass the verification to the service end. The method specifically comprises the following steps:
step 41: the data uploading is completed through the service end, and a uplink request is sent to the node end according to the service chain code;
step 42: the node receives the uplink request and sends the uplink request to the chain of custody code;
step 43: the chain of supervision code checks the analytic content of the uplink request according to the set supervision rule; if the verification is passed, the uplink request is returned to the service chain code, the service chain code performs service operation on the uplink request according to a set service contract, the result of the service operation is returned to the service end, and the service result is endorsed at the block chain node; if the verification is not passed, marking the uplink request as illegal data, and returning an error to the service end.
In step 43, the supervision rules include masking offending words, masking offending links, masking offending images, videos, etc.; if the resolved content of the uplink request contains the shielding information, the resolved content is regarded as illegal data, and the uplink request is returned to the service end.
The on-chain data monitoring in step 5 comprises the following steps:
step 51: checking the data on the chain through the monitoring end;
step 52: judging the data on the chain according to the receiving information of the monitoring end; wherein the received information includes deletion and concealment of the on-chain data, the deleted and concealed on-chain data being marked as offending data.
In the step 52, the received information of the monitor terminal is judged by the input of the monitor terminal, and the input of the monitor terminal is external input, including manual input of a monitor. In this case, the hidden and deleted on-link data cannot be checked again through the service link code.
The blacklist in the step 7 can be managed through a chain of custody code management module of the monitoring end, and the blacklist adding and deleting operation is included. In this example, node information on the blacklist is difficult to upload into the blockchain.
In the implementation process, the chain of supervision code is arranged in the lower layer of the block chain, and a mode of merging the system chain of supervision code into a node is adopted, so that the request of the service chain code is required to be checked by the rule of the chain of supervision code, the compliance of the uplink data is ensured, and meanwhile, the illegal data on the chain can be hidden and deleted in time; by setting the service chain code blacklist on the supervision chain code, the block chain node does not accept the service chain code request in the blacklist any more, thereby limiting the request authority of the service chain code and ensuring the compliance of the service chain code.
The above description is only one specific example of the present invention and does not constitute any limitation on the present invention. It will be apparent to those skilled in the art that various modifications and changes in form and details may be made without departing from the principles and construction of the invention, but these modifications and changes based on the inventive concept are still within the scope of the appended claims.

Claims (7)

1. The alliance chain supervision method based on HyperLedger Fabric system chain codes is characterized by comprising the following steps of:
step 1: finishing the transformation of the node end through the set chain code; the reconstruction process is realized through a node-end integrated system chain of custody code;
step 2: completing deployment of the node end; the node end after deployment is connected with the supervision end, and the supervision end can complete the query, addition, modification and deletion operations of the supervision rules in the node end; the supervision rules are arranged in the data space of the corresponding supervision chain codes;
step 3: deploying the developed service chain codes into a node end, and deploying the application system integration into the service end; interaction is realized through the application system and the service chain code;
step 4: the data uploaded by the service end is monitored through the monitoring end, verification of the uploaded data is completed according to the supervision rules in the set supervision chain codes, the data which pass the verification are subjected to endorsement and are linked, and the data which do not pass the verification are returned to the service end;
step 5: the monitoring of the data on the chain through the monitoring end comprises the following steps:
step 51: checking the data on the chain through the monitoring end;
step 52: judging the data on the chain according to the receiving information of the monitoring end; the receiving information comprises deletion and hiding of the data on the chain, and the deleted and hidden data on the chain is judged to be illegal data;
in the step 52, the receiving information of the monitoring terminal is judged by the input of the monitoring terminal, and the input of the monitoring terminal is external input;
step 6: screening the violation data in the step 4 and the step 5 according to the set chain of supervision codes, correlating the violation data with the service chain codes, and carrying out violation data statistics;
step 7: and comparing the number of the illegal data of the service end with a set value, pulling the service chain code exceeding the set value into a blacklist, and ending the step.
2. The method according to claim 1, wherein the step 1 of the chain of federation supervision method based on the HyperLedger Fabric chain of system codes includes adding supervision rules in batch, updating supervision rules, deleting check rules, checking supervision rules, stopping operation of the illegal service contracts, deleting the illegal service contracts, exporting in-chain data, and deleting the illegal data.
3. The method for federation chain supervision based on HyperLedger Fabric system chain codes according to claim 1, wherein the step 4 of monitoring the uploaded data comprises the steps of:
step 41: the data uploading is completed through the service end, and a uplink request is sent to the node end according to the service chain code;
step 42: the node receives the uplink request and sends the uplink request to the chain of custody code;
step 43: the chain of supervision code checks the analytic content of the uplink request according to the set supervision rule; if the verification is passed, the uplink request is returned to the service chain code, the service chain code performs service operation on the uplink request according to a set service contract, the result of the service operation is returned to the service end, and the service result is endorsed at the block chain node; if the verification is not passed, marking the uplink request as illegal data, and returning an error to the service end.
4. The method for federation chain supervision based on HyperLedger Fabric system chain codes according to claim 1, wherein the blacklist in step 7 is further managed by a supervision terminal, including adding and deleting operations to the blacklist.
5. A alliance chain supervision system based on HyperLedger Fabric system chain codes, which is characterized in that the system is based on the supervision method of any one of claims 1-4, and the supervision system comprises a supervision rule management module, a supervision chain code management module, an in-chain data management module and a node end; the supervision rule management module, the supervision chain code management module and the on-chain data management module are arranged at the supervision end; the monitoring end is connected with the node end.
6. The system of claim 5, wherein the node comprises a chain of business code, a chain of custody code, a status database, an index library, and a plurality of block files; the service chain code and the chain code are connected with the chain code and are respectively connected with the state database, the index library and a plurality of block files; the block file is also connected with the state data block and the index library respectively; the chain-of-custody code is obtained through a custody rule management module, and the business chain code is obtained through development of a developer; the application system is also arranged corresponding to the service chain code, is also developed and obtained by a developer, and is used for interacting with the block chain deployed with the service chain code; the application system is deployed at the service end, so that the service end is in communication connection with the node end; the blockchain node is a transformed coalition chain node containing the chain of custody code.
7. The HyperLedger Fabric system chain code based federated chain management system of claim 5 wherein the supervisory rule management module includes supervisory rule add, modify, delete, query functions;
the chain-of-custody code management module comprises a function of adding and deleting service chain codes and a blacklist; the blacklist is arranged in the chain of custody code;
the on-chain data management module comprises a summarization query of on-chain data and a deletion function of illegal data.
CN202210080079.8A 2022-01-24 2022-01-24 Alliance chain supervision system and method based on HyperLedger Fabric system chain code Active CN114598496B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210080079.8A CN114598496B (en) 2022-01-24 2022-01-24 Alliance chain supervision system and method based on HyperLedger Fabric system chain code

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210080079.8A CN114598496B (en) 2022-01-24 2022-01-24 Alliance chain supervision system and method based on HyperLedger Fabric system chain code

Publications (2)

Publication Number Publication Date
CN114598496A CN114598496A (en) 2022-06-07
CN114598496B true CN114598496B (en) 2024-02-20

Family

ID=81804270

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210080079.8A Active CN114598496B (en) 2022-01-24 2022-01-24 Alliance chain supervision system and method based on HyperLedger Fabric system chain code

Country Status (1)

Country Link
CN (1) CN114598496B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108830686A (en) * 2018-06-08 2018-11-16 中链科技有限公司 A kind of assets information processing method and server based on block chain
CN109871669A (en) * 2019-03-14 2019-06-11 哈尔滨工程大学 A kind of data sharing solution based on block chain technology
CN110288307A (en) * 2019-05-13 2019-09-27 西安电子科技大学 Intelligent contract co-development system and data processing method based on Fabric block chain
CN110852886A (en) * 2019-11-21 2020-02-28 西南石油大学 Second-hand transaction and article borrowing and returning system based on alliance chain
CN111163165A (en) * 2019-12-28 2020-05-15 北京工业大学 Voting consensus method based on Fabric alliance chain
US10673617B1 (en) * 2018-04-24 2020-06-02 George Antoniou Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity
CN111369221A (en) * 2020-03-09 2020-07-03 浙江大学 Intelligent contract monitoring method and system for block chain supervision
CN111598436A (en) * 2020-05-14 2020-08-28 云账户技术(天津)有限公司 Voucher management system, method and medium
CN111767211A (en) * 2020-06-15 2020-10-13 北京同邦卓益科技有限公司 Test method and device of alliance chain, storage medium and electronic device
CN111989705A (en) * 2018-05-15 2020-11-24 国际商业机器公司 Priority in licensed block chains
CN112837023A (en) * 2020-12-03 2021-05-25 杭州趣链科技有限公司 Business collaboration platform, method and device of organization and electronic equipment
CN113222758A (en) * 2021-05-08 2021-08-06 华中科技大学 Alliance chain transaction information monitoring method, system and terminal on the premise of privacy
CN113536149A (en) * 2021-07-31 2021-10-22 河海大学 Social platform public opinion optimization system and method based on alliance chain and text classification

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102298716B1 (en) * 2020-01-15 2021-09-06 성기운 Communication node, method of operating thereof and collaborative system

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10673617B1 (en) * 2018-04-24 2020-06-02 George Antoniou Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity
CN111989705A (en) * 2018-05-15 2020-11-24 国际商业机器公司 Priority in licensed block chains
CN108830686A (en) * 2018-06-08 2018-11-16 中链科技有限公司 A kind of assets information processing method and server based on block chain
CN109871669A (en) * 2019-03-14 2019-06-11 哈尔滨工程大学 A kind of data sharing solution based on block chain technology
CN110288307A (en) * 2019-05-13 2019-09-27 西安电子科技大学 Intelligent contract co-development system and data processing method based on Fabric block chain
CN110852886A (en) * 2019-11-21 2020-02-28 西南石油大学 Second-hand transaction and article borrowing and returning system based on alliance chain
CN111163165A (en) * 2019-12-28 2020-05-15 北京工业大学 Voting consensus method based on Fabric alliance chain
CN111369221A (en) * 2020-03-09 2020-07-03 浙江大学 Intelligent contract monitoring method and system for block chain supervision
CN111598436A (en) * 2020-05-14 2020-08-28 云账户技术(天津)有限公司 Voucher management system, method and medium
CN111767211A (en) * 2020-06-15 2020-10-13 北京同邦卓益科技有限公司 Test method and device of alliance chain, storage medium and electronic device
CN112837023A (en) * 2020-12-03 2021-05-25 杭州趣链科技有限公司 Business collaboration platform, method and device of organization and electronic equipment
CN113222758A (en) * 2021-05-08 2021-08-06 华中科技大学 Alliance chain transaction information monitoring method, system and terminal on the premise of privacy
CN113536149A (en) * 2021-07-31 2021-10-22 河海大学 Social platform public opinion optimization system and method based on alliance chain and text classification

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
"Module Research of Blockchain-based Power Equipment Inspection and Data Asset Sharing";A. Yan;《 2021 International Conference on Power System Technology (POWERCON)》;全文 *
基于Fabric的区块链慈善业务管理系统设计;蔡栋;金波;;中国高新科技(03);全文 *

Also Published As

Publication number Publication date
CN114598496A (en) 2022-06-07

Similar Documents

Publication Publication Date Title
US20210073284A1 (en) Querying graph-based models
Du et al. An optimized consortium blockchain for medical information sharing
CN111431903B (en) Cross-link relay method, device and computer readable storage medium
CN111444210A (en) Block chain consensus node management method, device, equipment and storage medium
CN111355780A (en) Block chain-based Internet of things monitoring management method and system
CN118313834A (en) Implementing logic gate functions using blockchain
CN112334848B (en) Layered and distributed account book
CN111343212B (en) Message processing method, device, equipment and storage medium
Cachin et al. The transaction graph for modeling blockchain semantics
CN112269838B (en) Blockchain-based supervision method and device, electronic equipment and storage medium
Mehmood et al. Solution of fully bipolar fuzzy linear programming models
CN113628049A (en) Block chain intelligent contract conflict resolution method based on group intelligence
CN113626519A (en) Data cascade system
CN114598496B (en) Alliance chain supervision system and method based on HyperLedger Fabric system chain code
de Mues et al. Towards a distributed intelligent ICT architecture for the smart grid
Liu et al. Using blockchain technology in IoT manufacture environment for intelligence prediction
CN112699136A (en) Cross-link certificate storage method and related device
Wu et al. Evolution process and supply chain adaptation of smart contracts in blockchain
CN115714645A (en) Block chain-based data privacy and security protection method, device and equipment
Zhu [Retracted] Interoperability of Multimedia Network Public Opinion Knowledge Base Group Based on Multisource Text Mining
CN114036577A (en) Coalition chain-oriented supervision method and supervision digital twin model
CN114066655A (en) Predictive controller data aggregation method and device
CN115250354A (en) Resource allocation method, device, equipment and storage medium based on block chain network
Qu et al. Exploration on the Fusion of Artificial Intelligence and Blockchain
CN110049109A (en) Accounting method, system and the computer readable storage medium of the shared storage of block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant