CN114598496B - Alliance chain supervision system and method based on HyperLedger Fabric system chain code - Google Patents
Alliance chain supervision system and method based on HyperLedger Fabric system chain code Download PDFInfo
- Publication number
- CN114598496B CN114598496B CN202210080079.8A CN202210080079A CN114598496B CN 114598496 B CN114598496 B CN 114598496B CN 202210080079 A CN202210080079 A CN 202210080079A CN 114598496 B CN114598496 B CN 114598496B
- Authority
- CN
- China
- Prior art keywords
- chain
- code
- supervision
- data
- service
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 22
- 239000004744 fabric Substances 0.000 title claims abstract description 20
- 238000012544 monitoring process Methods 0.000 claims description 30
- 238000007726 management method Methods 0.000 claims description 24
- 238000012795 verification Methods 0.000 claims description 15
- 238000012217 deletion Methods 0.000 claims description 12
- 230000037430 deletion Effects 0.000 claims description 12
- 238000013523 data management Methods 0.000 claims description 9
- 238000011161 development Methods 0.000 claims description 7
- 238000012986 modification Methods 0.000 claims description 4
- 230000004048 modification Effects 0.000 claims description 4
- 230000008569 process Effects 0.000 claims description 4
- 238000004891 communication Methods 0.000 claims description 3
- 230000010354 integration Effects 0.000 claims description 3
- 230000003993 interaction Effects 0.000 claims description 3
- 238000012216 screening Methods 0.000 claims description 3
- 230000009466 transformation Effects 0.000 claims description 3
- 238000007792 addition Methods 0.000 claims description 2
- 230000001131 transforming effect Effects 0.000 abstract 1
- 238000005516 engineering process Methods 0.000 description 9
- 230000007246 mechanism Effects 0.000 description 6
- 230000000873 masking effect Effects 0.000 description 3
- 230000001105 regulatory effect Effects 0.000 description 2
- 230000002411 adverse Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000010276 construction Methods 0.000 description 1
- 230000010485 coping Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000002757 inflammatory effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/10—Network architectures or network communication protocols for network security for controlling access to devices or network resources
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/21—Design, administration or maintenance of databases
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/20—Network architectures or network communication protocols for network security for managing network security; network security policies in general
- H04L63/205—Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computing Systems (AREA)
- Databases & Information Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Hardware Design (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention is a alliance chain supervisory system and method based on HyperLedger Fabric system chain code, wherein the method includes transforming Hyperledger Fabric node bottom layer code, for the up-chain request, through increasing system supervisory contract for intercepting the call request of business contract, supervising the on-going date to analyze the request and checking according to the set supervisory rule, checking pass, releasing the call request to business contract operation, if checking fails, rejecting the follow-up execution of the call request, and returning the result to the user; by arranging the chain-of-custody code in the lower layer of the block chain, the system chain-of-custody code is integrated into the node, so that the request of the service chain code is required to pass the rule check of the chain-of-custody code, the compliance of the uplink data is ensured, and meanwhile, the illegal data on the chain can be hidden and deleted in time.
Description
Technical Field
The invention relates to the field of blockchains, in particular to a alliance chain supervision system and method based on HyperLedger Fabric system chain codes.
Background
The generation of the encrypted digital currency starts in 2008, and has undergone 10 years of vigorous development, and at present, the blockchain technology has started to gradually surpass the programmable currency era and enter a new era based on intelligent contract large-scale application.
In the wave of digital reform, the system data of each organization department lacks a safe and effective sharing mode. The blockchain technology is used for coping with the actual pain point, integrates the technologies of distributed storage, a consensus mechanism, an encryption algorithm, P2P and the like, and establishes a safe intercommunication sharing mechanism on the Internet for different mechanisms.
Wherein the intelligent contract is a code contract and algorithm contract which can be driven by events and has states and is formed by expressing business logic which is cooperated by multiple parties and agreements observed by all parties in a code form. The intelligent contract technology is introduced into the blockchain, and the characteristics of the blockchain enable the intelligent contract to have the characteristics of decentralization, autonomy, observability, verifiability, information sharing and the like, so that the programmable finance and the programmable society can be effectively constructed. The consensus mechanism enables the business among the institutions expressed by the intelligent contracts to share data information, and achieves information intercommunication among a plurality of nodes in the blockchain peer-to-peer network, thereby achieving value circulation among the institutions. However, because the blockchain itself has the characteristics of decentralization, non-tampering, non-repudiation, non-deletion and low cost, if harmful information, network rumors, and inflammatory and aggressive information are transmitted by the blockchain, the industrial layout and development of the blockchain technology are adversely affected, and meanwhile, the blockchain technology also has serious challenges for the regulatory authorities.
In recent years, the national demand for compliance with internet regulations is increasing, and the development of blockchain technology is not separated from technical regulations. The intelligent contract is used as business logic of multiparty contract, contains a main carrier of shared data of multiparty cooperation, and needs to be ensured to be monitored and emergent. However, the conventional supervision methods such as passive query in the current blockchain system are difficult to implement in the blockchain distributed environment. There is therefore a need for a federated chain of custody system and method based on HyperLedger Fabric system chain codes.
Disclosure of Invention
The invention aims to solve the defects of the prior art and provides a alliance chain supervision system and method based on HyperLedger Fabric system chain codes.
In order to solve the problems, the invention adopts the following technical scheme:
a alliance chain supervision method based on HyperLedger Fabric system chain codes comprises the following steps:
step 1: finishing the transformation of the node end through the set chain code; the reconstruction process is realized through a node-end integrated system chain of custody code;
step 2: completing deployment of the node end; the node end after deployment is connected with the supervision end, and the supervision end can complete the query, addition, modification and deletion operations of the supervision rules in the node end; the supervision rules are arranged in the data space of the corresponding supervision chain codes;
step 3: deploying the developed service chain codes into a node end, and deploying the application system integration into the service end; interaction is realized through the application system and the service chain code;
step 4: the data uploaded by the service end is monitored through the monitoring end;
step 5: monitoring the data on the chain through a monitoring end;
step 6: screening the violation data in the step 4 and the step 5 according to the set chain of supervision codes, correlating the violation data with the service chain codes, and carrying out violation data statistics;
step 7: and comparing the number of the illegal data of the service end with a set value, pulling the service chain code exceeding the set value into a blacklist, and ending the step.
Further, the system chain of supervision code in step 1 includes adding supervision rules in batch, updating supervision rules, deleting check rules, checking supervision rules, stopping operation of the violation service contracts, deleting the violation service contracts, exporting data on the chain, and deleting the violation data.
Further, the step 4 of monitoring the uploaded data means that verification of the uploaded data is completed according to the supervision rule in the set supervision chain code, the checked data is subjected to endorsement and chaining, and the data which does not pass the verification is returned to the service end.
Further, the step 4 of monitoring the uploaded data includes the following steps:
step 41: the data uploading is completed through the service end, and a uplink request is sent to the node end according to the service chain code;
step 42: the node receives the uplink request and sends the uplink request to the chain of custody code;
step 43: the chain of supervision code checks the analytic content of the uplink request according to the set supervision rule; if the verification is passed, the uplink request is returned to the service chain code, the service chain code performs service operation on the uplink request according to a set service contract, the result of the service operation is returned to the service end, and the service result is endorsed at the block chain node; if the verification is not passed, marking the uplink request as illegal data, and returning an error to the service end.
Further, the on-chain data monitoring in step 5 includes the following steps:
step 51: checking the data on the chain through the monitoring end;
step 52: judging the data on the chain according to the receiving information of the monitoring end; the received information comprises deletion and hiding of the data on the chain, and the deleted and hidden data on the chain is judged to be illegal data.
In the step 52, the received information of the monitor terminal is judged by the input of the monitor terminal, and the input of the monitor terminal is external input.
Furthermore, the blacklist in the step 7 can be managed through the monitoring end, including adding and deleting operations on the blacklist.
A alliance chain supervision system based on HyperLedger Fabric system chain codes is based on the supervision method, and comprises a supervision rule management module, a supervision chain code management module, an on-chain data management module and a node end. The supervision rule management module, the supervision chain code management module and the on-chain data management module are arranged at the supervision end; the monitoring end is connected with the node end.
Further, the node end comprises a service chain code, a supervision chain code, a state database, an index library and a plurality of block files; the service chain code and the chain code are connected with the chain code and are respectively connected with the state database, the index library and a plurality of block files; the block file is also connected with the state data block and the index library respectively; the chain-of-custody code is obtained through a custody rule management module, and the business chain code is obtained through development of a developer; the application system is also arranged corresponding to the service chain code, is also developed and obtained by a developer, and is used for interacting with the block chain deployed with the service chain code; the application system is deployed at the service end, so that the service end is in communication connection with the node end; the blockchain node is a transformed coalition chain node containing the chain of custody code.
Further, the supervision rule management module comprises functions of adding, modifying, deleting and inquiring supervision rules;
the chain-of-custody code management module comprises a function of adding and deleting service chain codes and a blacklist; the blacklist is arranged in the chain of custody code;
the on-chain data management module comprises a summarization query of on-chain data and a deletion function of illegal data.
The beneficial effects of the invention are as follows:
by arranging the chain-of-custody code at the bottom layer of the block chain, namely in the system chain code, a mode of merging the system chain-of-custody code into a node is adopted, so that a request of the service chain code is required to pass the rule verification of the chain-of-custody code, the compliance of uplink data is ensured, and meanwhile, the illegal data on the chain can be hidden and deleted in time; in addition, the chain of custody code is encoded in the code of the node, so that various forms of contract virtual machines can be adapted;
by setting the service chain code blacklist on the supervision chain code, the block chain node does not accept the service chain code request in the blacklist any more, thereby limiting the request authority of the service chain code and ensuring the compliance of the service chain code.
Drawings
FIG. 1 is a block diagram of an overall architecture connection according to a first embodiment of the present invention;
FIG. 2 is a flowchart of an automatic monitoring of uploading data according to a first embodiment of the present invention;
FIG. 3 is a flowchart of checking and judging on-link data according to a first embodiment of the present invention;
fig. 4 is a flowchart of pulling a service chain code into a blacklist in a first embodiment of the present invention.
Detailed Description
Other advantages and effects of the present invention will become apparent to those skilled in the art from the following disclosure, which describes the embodiments of the present invention with reference to specific examples. The invention may be practiced or carried out in other embodiments that depart from the specific details, and the details of the present description may be modified or varied from the spirit and scope of the present invention. It should be noted that the following embodiments and features in the embodiments may be combined with each other without conflict.
It should be noted that the illustrations provided in the following embodiments merely illustrate the basic concept of the present invention by way of illustration, and only the components related to the present invention are shown in the drawings and are not drawn according to the number, shape and size of the components in actual implementation, and the form, number and proportion of the components in actual implementation may be arbitrarily changed, and the layout of the components may be more complicated.
In the application, the block chain represents a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like;
the alliance chain represents a block chain deployment form, and only aims at a specific group member, a strict node admittance mechanism is provided;
hyperledger Fabric, enterprise-level distributed ledger technology sourced by the Linux foundation;
smart contracts represent a computer protocol that aims to propagate, verify or execute contracts in an informative manner;
chain code (chaincode) represents an implementation of intelligence on the order of Hyperledger Fabric.
Embodiment one:
as shown in fig. 1, the alliance chain supervision system based on HyperLedger Fabric system chain codes comprises a supervision rule management module, a supervision chain code management module, an on-chain data management module and a node end. The supervision rule management module, the supervision chain code management module and the on-chain data management module are arranged at the supervision end; the monitoring end is connected with the node end.
The node terminal comprises a service chain code, a supervision chain code, a state database, an index library and a block file. The service chain code and the chain code are connected with the chain code and are respectively connected with the state database, the index library and a plurality of block files; the block files are also respectively connected with the state data blocks and the index library. The chain-of-custody code is obtained through a custody rule management module, the service chain code is obtained through development of a developer, an application System (SDK) is further arranged corresponding to the service chain code, the application system is also obtained through development of the developer, and the application system is used for interacting with the blockchain deployed with the service chain code. The application system is deployed at the service end, so that the service end is in communication connection with the node end. The blockchain node is a transformed coalition chain node containing the chain of custody code.
The supervision rule management module comprises functions of adding, modifying, deleting, inquiring and the like of the supervision rule.
The chain of custody code management module comprises functions of adding service chain codes, adding and deleting blacklists and the like. The blacklist is set in the chain of custody code.
The on-chain data management module comprises functions of summarizing and inquiring on-chain data, deleting illegal data and the like.
As shown in fig. 2-4, a federation chain supervision method based on HyperLedger Fabric system chain codes includes the following steps:
step 1: finishing the transformation of the node end through the set chain code; the reconstruction process is realized through a node-end integrated system chain of custody code;
step 2: completing deployment of the node end; the node end after deployment is connected with the supervision end, and the supervision end can finish the operations of inquiring, adding, modifying, deleting and the like of the supervision rules in the node end, wherein the supervision rules are arranged in the data space corresponding to the supervision chain codes;
step 3: deploying the developed service chain codes into a node end, and deploying the application system integration into the service end; interaction is realized through the application system and the service chain code;
step 4: the data uploaded by the service end is monitored by the monitoring end in combination with the chain of supervision code;
step 5: monitoring the data on the chain through a monitoring end;
step 6: screening the violation data in the step 4 and the step 5 according to the set chain of supervision codes, correlating the violation data with the service chain codes, and carrying out violation data statistics;
step 7: and comparing the number of the illegal data of the service end with a set value, and pulling the service chain code exceeding the set value into a blacklist, wherein the node end refuses to accept the service chain code request in the blacklist, and ending the step.
In the step 1, a system chain code is set in a Hyperledger Fabric architecture for processing a life management cycle related operation including a service chain code; and adding a chain of supervision code into the system chain code by modifying the node code. The system supervision chain code comprises batch addition of supervision rules, updating of supervision rules, deletion of check rules, supervision rule check, stopping of operation of the violation business contracts, deletion of the violation business contracts, export of on-chain data and deletion of the violation data. Wherein the batch addition regulatory rule is expressed as PutNewSupervisorule (rule [ ] string) error; the update supervision rule is expressed as an update supervisrule (rule string) error; the erasure checking rule is denoted DeleteSuperviseRule (ruleId int) error; the supervision rule check is expressed as verifysupervisrule (running) error; stopping the violation business contract run is denoted StopIllegalCC (ccid string) error; delete violation business contracts are denoted deleteIllegalCC (ccid string) error; exporting the on-chain data representation as DumpData () error; the deletion violation data is denoted DeleteIllegalData (txId string) error.
And 4, monitoring the uploaded data in the step, namely finishing verification of the uploaded data according to the supervision rule in the set supervision chain code, carrying out endorsement and chaining on the data passing the verification, and returning the data which does not pass the verification to the service end. The method specifically comprises the following steps:
step 41: the data uploading is completed through the service end, and a uplink request is sent to the node end according to the service chain code;
step 42: the node receives the uplink request and sends the uplink request to the chain of custody code;
step 43: the chain of supervision code checks the analytic content of the uplink request according to the set supervision rule; if the verification is passed, the uplink request is returned to the service chain code, the service chain code performs service operation on the uplink request according to a set service contract, the result of the service operation is returned to the service end, and the service result is endorsed at the block chain node; if the verification is not passed, marking the uplink request as illegal data, and returning an error to the service end.
In step 43, the supervision rules include masking offending words, masking offending links, masking offending images, videos, etc.; if the resolved content of the uplink request contains the shielding information, the resolved content is regarded as illegal data, and the uplink request is returned to the service end.
The on-chain data monitoring in step 5 comprises the following steps:
step 51: checking the data on the chain through the monitoring end;
step 52: judging the data on the chain according to the receiving information of the monitoring end; wherein the received information includes deletion and concealment of the on-chain data, the deleted and concealed on-chain data being marked as offending data.
In the step 52, the received information of the monitor terminal is judged by the input of the monitor terminal, and the input of the monitor terminal is external input, including manual input of a monitor. In this case, the hidden and deleted on-link data cannot be checked again through the service link code.
The blacklist in the step 7 can be managed through a chain of custody code management module of the monitoring end, and the blacklist adding and deleting operation is included. In this example, node information on the blacklist is difficult to upload into the blockchain.
In the implementation process, the chain of supervision code is arranged in the lower layer of the block chain, and a mode of merging the system chain of supervision code into a node is adopted, so that the request of the service chain code is required to be checked by the rule of the chain of supervision code, the compliance of the uplink data is ensured, and meanwhile, the illegal data on the chain can be hidden and deleted in time; by setting the service chain code blacklist on the supervision chain code, the block chain node does not accept the service chain code request in the blacklist any more, thereby limiting the request authority of the service chain code and ensuring the compliance of the service chain code.
The above description is only one specific example of the present invention and does not constitute any limitation on the present invention. It will be apparent to those skilled in the art that various modifications and changes in form and details may be made without departing from the principles and construction of the invention, but these modifications and changes based on the inventive concept are still within the scope of the appended claims.
Claims (7)
1. The alliance chain supervision method based on HyperLedger Fabric system chain codes is characterized by comprising the following steps of:
step 1: finishing the transformation of the node end through the set chain code; the reconstruction process is realized through a node-end integrated system chain of custody code;
step 2: completing deployment of the node end; the node end after deployment is connected with the supervision end, and the supervision end can complete the query, addition, modification and deletion operations of the supervision rules in the node end; the supervision rules are arranged in the data space of the corresponding supervision chain codes;
step 3: deploying the developed service chain codes into a node end, and deploying the application system integration into the service end; interaction is realized through the application system and the service chain code;
step 4: the data uploaded by the service end is monitored through the monitoring end, verification of the uploaded data is completed according to the supervision rules in the set supervision chain codes, the data which pass the verification are subjected to endorsement and are linked, and the data which do not pass the verification are returned to the service end;
step 5: the monitoring of the data on the chain through the monitoring end comprises the following steps:
step 51: checking the data on the chain through the monitoring end;
step 52: judging the data on the chain according to the receiving information of the monitoring end; the receiving information comprises deletion and hiding of the data on the chain, and the deleted and hidden data on the chain is judged to be illegal data;
in the step 52, the receiving information of the monitoring terminal is judged by the input of the monitoring terminal, and the input of the monitoring terminal is external input;
step 6: screening the violation data in the step 4 and the step 5 according to the set chain of supervision codes, correlating the violation data with the service chain codes, and carrying out violation data statistics;
step 7: and comparing the number of the illegal data of the service end with a set value, pulling the service chain code exceeding the set value into a blacklist, and ending the step.
2. The method according to claim 1, wherein the step 1 of the chain of federation supervision method based on the HyperLedger Fabric chain of system codes includes adding supervision rules in batch, updating supervision rules, deleting check rules, checking supervision rules, stopping operation of the illegal service contracts, deleting the illegal service contracts, exporting in-chain data, and deleting the illegal data.
3. The method for federation chain supervision based on HyperLedger Fabric system chain codes according to claim 1, wherein the step 4 of monitoring the uploaded data comprises the steps of:
step 41: the data uploading is completed through the service end, and a uplink request is sent to the node end according to the service chain code;
step 42: the node receives the uplink request and sends the uplink request to the chain of custody code;
step 43: the chain of supervision code checks the analytic content of the uplink request according to the set supervision rule; if the verification is passed, the uplink request is returned to the service chain code, the service chain code performs service operation on the uplink request according to a set service contract, the result of the service operation is returned to the service end, and the service result is endorsed at the block chain node; if the verification is not passed, marking the uplink request as illegal data, and returning an error to the service end.
4. The method for federation chain supervision based on HyperLedger Fabric system chain codes according to claim 1, wherein the blacklist in step 7 is further managed by a supervision terminal, including adding and deleting operations to the blacklist.
5. A alliance chain supervision system based on HyperLedger Fabric system chain codes, which is characterized in that the system is based on the supervision method of any one of claims 1-4, and the supervision system comprises a supervision rule management module, a supervision chain code management module, an in-chain data management module and a node end; the supervision rule management module, the supervision chain code management module and the on-chain data management module are arranged at the supervision end; the monitoring end is connected with the node end.
6. The system of claim 5, wherein the node comprises a chain of business code, a chain of custody code, a status database, an index library, and a plurality of block files; the service chain code and the chain code are connected with the chain code and are respectively connected with the state database, the index library and a plurality of block files; the block file is also connected with the state data block and the index library respectively; the chain-of-custody code is obtained through a custody rule management module, and the business chain code is obtained through development of a developer; the application system is also arranged corresponding to the service chain code, is also developed and obtained by a developer, and is used for interacting with the block chain deployed with the service chain code; the application system is deployed at the service end, so that the service end is in communication connection with the node end; the blockchain node is a transformed coalition chain node containing the chain of custody code.
7. The HyperLedger Fabric system chain code based federated chain management system of claim 5 wherein the supervisory rule management module includes supervisory rule add, modify, delete, query functions;
the chain-of-custody code management module comprises a function of adding and deleting service chain codes and a blacklist; the blacklist is arranged in the chain of custody code;
the on-chain data management module comprises a summarization query of on-chain data and a deletion function of illegal data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210080079.8A CN114598496B (en) | 2022-01-24 | 2022-01-24 | Alliance chain supervision system and method based on HyperLedger Fabric system chain code |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210080079.8A CN114598496B (en) | 2022-01-24 | 2022-01-24 | Alliance chain supervision system and method based on HyperLedger Fabric system chain code |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114598496A CN114598496A (en) | 2022-06-07 |
CN114598496B true CN114598496B (en) | 2024-02-20 |
Family
ID=81804270
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210080079.8A Active CN114598496B (en) | 2022-01-24 | 2022-01-24 | Alliance chain supervision system and method based on HyperLedger Fabric system chain code |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114598496B (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108830686A (en) * | 2018-06-08 | 2018-11-16 | 中链科技有限公司 | A kind of assets information processing method and server based on block chain |
CN109871669A (en) * | 2019-03-14 | 2019-06-11 | 哈尔滨工程大学 | A kind of data sharing solution based on block chain technology |
CN110288307A (en) * | 2019-05-13 | 2019-09-27 | 西安电子科技大学 | Intelligent contract co-development system and data processing method based on Fabric block chain |
CN110852886A (en) * | 2019-11-21 | 2020-02-28 | 西南石油大学 | Second-hand transaction and article borrowing and returning system based on alliance chain |
CN111163165A (en) * | 2019-12-28 | 2020-05-15 | 北京工业大学 | Voting consensus method based on Fabric alliance chain |
US10673617B1 (en) * | 2018-04-24 | 2020-06-02 | George Antoniou | Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity |
CN111369221A (en) * | 2020-03-09 | 2020-07-03 | 浙江大学 | Intelligent contract monitoring method and system for block chain supervision |
CN111598436A (en) * | 2020-05-14 | 2020-08-28 | 云账户技术(天津)有限公司 | Voucher management system, method and medium |
CN111767211A (en) * | 2020-06-15 | 2020-10-13 | 北京同邦卓益科技有限公司 | Test method and device of alliance chain, storage medium and electronic device |
CN111989705A (en) * | 2018-05-15 | 2020-11-24 | 国际商业机器公司 | Priority in licensed block chains |
CN112837023A (en) * | 2020-12-03 | 2021-05-25 | 杭州趣链科技有限公司 | Business collaboration platform, method and device of organization and electronic equipment |
CN113222758A (en) * | 2021-05-08 | 2021-08-06 | 华中科技大学 | Alliance chain transaction information monitoring method, system and terminal on the premise of privacy |
CN113536149A (en) * | 2021-07-31 | 2021-10-22 | 河海大学 | Social platform public opinion optimization system and method based on alliance chain and text classification |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102298716B1 (en) * | 2020-01-15 | 2021-09-06 | 성기운 | Communication node, method of operating thereof and collaborative system |
-
2022
- 2022-01-24 CN CN202210080079.8A patent/CN114598496B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US10673617B1 (en) * | 2018-04-24 | 2020-06-02 | George Antoniou | Methods, system and point-to-point encryption device microchip for AES-sea 512-bit key using identity access management utilizing blockchain ecosystem to improve cybersecurity |
CN111989705A (en) * | 2018-05-15 | 2020-11-24 | 国际商业机器公司 | Priority in licensed block chains |
CN108830686A (en) * | 2018-06-08 | 2018-11-16 | 中链科技有限公司 | A kind of assets information processing method and server based on block chain |
CN109871669A (en) * | 2019-03-14 | 2019-06-11 | 哈尔滨工程大学 | A kind of data sharing solution based on block chain technology |
CN110288307A (en) * | 2019-05-13 | 2019-09-27 | 西安电子科技大学 | Intelligent contract co-development system and data processing method based on Fabric block chain |
CN110852886A (en) * | 2019-11-21 | 2020-02-28 | 西南石油大学 | Second-hand transaction and article borrowing and returning system based on alliance chain |
CN111163165A (en) * | 2019-12-28 | 2020-05-15 | 北京工业大学 | Voting consensus method based on Fabric alliance chain |
CN111369221A (en) * | 2020-03-09 | 2020-07-03 | 浙江大学 | Intelligent contract monitoring method and system for block chain supervision |
CN111598436A (en) * | 2020-05-14 | 2020-08-28 | 云账户技术(天津)有限公司 | Voucher management system, method and medium |
CN111767211A (en) * | 2020-06-15 | 2020-10-13 | 北京同邦卓益科技有限公司 | Test method and device of alliance chain, storage medium and electronic device |
CN112837023A (en) * | 2020-12-03 | 2021-05-25 | 杭州趣链科技有限公司 | Business collaboration platform, method and device of organization and electronic equipment |
CN113222758A (en) * | 2021-05-08 | 2021-08-06 | 华中科技大学 | Alliance chain transaction information monitoring method, system and terminal on the premise of privacy |
CN113536149A (en) * | 2021-07-31 | 2021-10-22 | 河海大学 | Social platform public opinion optimization system and method based on alliance chain and text classification |
Non-Patent Citations (2)
Title |
---|
"Module Research of Blockchain-based Power Equipment Inspection and Data Asset Sharing";A. Yan;《 2021 International Conference on Power System Technology (POWERCON)》;全文 * |
基于Fabric的区块链慈善业务管理系统设计;蔡栋;金波;;中国高新科技(03);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN114598496A (en) | 2022-06-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20210073284A1 (en) | Querying graph-based models | |
Du et al. | An optimized consortium blockchain for medical information sharing | |
CN111431903B (en) | Cross-link relay method, device and computer readable storage medium | |
CN111444210A (en) | Block chain consensus node management method, device, equipment and storage medium | |
CN111355780A (en) | Block chain-based Internet of things monitoring management method and system | |
CN118313834A (en) | Implementing logic gate functions using blockchain | |
CN112334848B (en) | Layered and distributed account book | |
CN111343212B (en) | Message processing method, device, equipment and storage medium | |
Cachin et al. | The transaction graph for modeling blockchain semantics | |
CN112269838B (en) | Blockchain-based supervision method and device, electronic equipment and storage medium | |
Mehmood et al. | Solution of fully bipolar fuzzy linear programming models | |
CN113628049A (en) | Block chain intelligent contract conflict resolution method based on group intelligence | |
CN113626519A (en) | Data cascade system | |
CN114598496B (en) | Alliance chain supervision system and method based on HyperLedger Fabric system chain code | |
de Mues et al. | Towards a distributed intelligent ICT architecture for the smart grid | |
Liu et al. | Using blockchain technology in IoT manufacture environment for intelligence prediction | |
CN112699136A (en) | Cross-link certificate storage method and related device | |
Wu et al. | Evolution process and supply chain adaptation of smart contracts in blockchain | |
CN115714645A (en) | Block chain-based data privacy and security protection method, device and equipment | |
Zhu | [Retracted] Interoperability of Multimedia Network Public Opinion Knowledge Base Group Based on Multisource Text Mining | |
CN114036577A (en) | Coalition chain-oriented supervision method and supervision digital twin model | |
CN114066655A (en) | Predictive controller data aggregation method and device | |
CN115250354A (en) | Resource allocation method, device, equipment and storage medium based on block chain network | |
Qu et al. | Exploration on the Fusion of Artificial Intelligence and Blockchain | |
CN110049109A (en) | Accounting method, system and the computer readable storage medium of the shared storage of block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |