CN114978526A - Block chain data transmission method, device and equipment and readable storage medium - Google Patents

Block chain data transmission method, device and equipment and readable storage medium Download PDF

Info

Publication number
CN114978526A
CN114978526A CN202210449984.6A CN202210449984A CN114978526A CN 114978526 A CN114978526 A CN 114978526A CN 202210449984 A CN202210449984 A CN 202210449984A CN 114978526 A CN114978526 A CN 114978526A
Authority
CN
China
Prior art keywords
data
service
standard
transmission
local
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210449984.6A
Other languages
Chinese (zh)
Other versions
CN114978526B (en
Inventor
熊剑平
刘昱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Quality Starker Technology Co Ltd
Original Assignee
Chengdu Quality Starker Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Quality Starker Technology Co Ltd filed Critical Chengdu Quality Starker Technology Co Ltd
Priority to CN202210449984.6A priority Critical patent/CN114978526B/en
Publication of CN114978526A publication Critical patent/CN114978526A/en
Application granted granted Critical
Publication of CN114978526B publication Critical patent/CN114978526B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention relates to the technical field of block chains, in particular to a block chain data transmission method, a device and equipment and a readable storage medium, wherein the method comprises the following steps: responding to first service data sent by a local service system, judging that the service system types of a first service data receiver are heterogeneous, calling a local standard template to convert first service files in the first service data into corresponding first standard service files; packaging the first service data and the first standard service file into first transmission data, and sending the first transmission data and the first standard service file to a data receiving party; the invention receives the confirmation information, and arranges a local template used for butting local service data with the block chain standard file on the block chain local node, so that a plurality of service messages with uniform standards are placed in each converted service file, and the standardized conversion of the message format is completed by a block chain digital dictionary commonly identified in the whole network, thereby achieving the mutual conversion between heterogeneous platforms of the service data.

Description

Block chain data transmission method, device, equipment and readable storage medium
Technical Field
The present invention relates to the field of block chain technologies, and in particular, to a block chain data transmission method, apparatus and device, and a readable storage medium.
Background
The block chain technology is built on a transmission network (also called as a block chain network), distributed node equipment (hereinafter referred to as nodes) in the transmission network generates block data by a preset consensus strategy through running a block chain program, and verifies and stores the block data by using a chain data structure, so that a data tamper-proof mechanism is finally realized, and a safe and reliable new technical idea is provided for business development.
In the existing block chain scenario, there is a large difference in business data between different financial institutions, which causes a large obstacle to the business transaction of multiple financial institutions accessing the block chain network.
Disclosure of Invention
The present invention is directed to a method, an apparatus, a device and a readable storage medium for transmitting block chain data, so as to solve the above-mentioned problems.
In order to achieve the above object, the embodiments of the present application provide the following technical solutions:
in one aspect, an embodiment of the present application provides a method for transmitting blockchain data, which is applicable to any data sending node in a blockchain network, and the method includes:
responding to first service data sent by a local service system, judging the type of a receiver service system of the first service data, if the type of the receiver service system is heterogeneous, calling a local standard template, and converting a plurality of first service files in the first service data into corresponding first standard service files through the local standard template, wherein the first standard service files are data containing standard messages; packaging the first service data and the first standard service file into first transmission data, and sending the first transmission data to a data receiving party so that the data receiving party feeds back information for confirming receiving; and receiving the confirmation information sent by the data receiving party.
Optionally, the converting, by the local standard template, each of the plurality of first service files in the first service data into a corresponding first standard service file includes:
calling the first service data, wherein the first service data comprises a plurality of first service files, and the first service files comprise a plurality of first messages;
analyzing the service type corresponding to each first message, and finding a corresponding mapping relation in the local standard template according to the service type, wherein the mapping relation comprises the corresponding relation between the first service file where the first message is located and a standard file and the corresponding relation between the service type of the first message and a service included in the standard file;
respectively converting each first message into the corresponding standard message according to the mapping relation;
and packaging a plurality of corresponding standard messages according to the service types contained in the standard files to obtain a plurality of first standard files.
Optionally, encapsulating the first service data and the first standard service file into first transmission data, and sending the first transmission data to a data receiving side, includes:
calculating a hash value of the first transmission data, and performing uplink consensus on the hash value so that the data receiver verifies the authenticity of the first transmission data;
and establishing a data security transmission channel with the data receiver, and sending the first transmission data to the data receiver through the data security transmission channel.
Optionally, sending the first transmission data to the data receiving side through the data secure transmission channel includes:
calling a public key of a data receiver from a local public account book;
encrypting the first transmission data through the public key of the data receiver to obtain first encrypted data;
and adding the signature of the local node to the first encrypted data to obtain the first transmission data, and sending the first transmission data to the data receiver.
In a second aspect, an embodiment of the present application provides a device for transmitting blockchain data, where the device is applicable to any data sending node in a blockchain network, and the device includes:
the system comprises a first calculation module, a second calculation module and a third calculation module, wherein the first calculation module is used for responding to first service data sent by a local service system, judging the type of a receiver service system of the first service data, calling a local standard template if the type of the receiver service system is heterogeneous, and converting a plurality of first service files in the first service data into corresponding first standard service files through the local standard template, wherein the first standard service files are data containing standard messages;
the second calculation module is used for packaging the first service data and the first standard service file into first transmission data and sending the first transmission data to a data receiving party so that the data receiving party feeds back information for confirming receiving;
and the first receiving module is used for receiving the confirmation information sent by the data receiving party.
Optionally, the first computing module includes:
a first retrieving unit, configured to retrieve the first service data, where the first service data includes a plurality of first service files, and the first service files include a plurality of first messages;
the first computing unit is used for analyzing the service type corresponding to each first message and finding a corresponding mapping relation in the local standard template according to the service type, wherein the mapping relation comprises the corresponding relation between the first service file where the first message is located and a standard file and the corresponding relation between the service type of the first message and a service contained in the standard file;
the second computing unit is used for respectively converting each first message into the corresponding standard message according to the mapping relation;
and the first packaging unit is used for packaging the plurality of standard messages according to the service types contained in the standard files to obtain the first standard files.
Optionally, the second computing unit includes:
the third calculation unit is used for calculating a hash value of the first transmission data and performing uplink consensus on the hash value so that the data receiving party can verify the authenticity of the first transmission data;
and the first transmission unit is used for establishing a data security transmission channel with the data receiving party and sending the first transmission data to the data receiving party through the data security transmission channel.
Optionally, the first transmission unit includes:
the first calling subunit is used for calling a public key of a data receiver in a local public ledger;
the first encryption subunit is used for encrypting the first transmission data through the public key of the data receiver to obtain first encrypted data;
and the first signature subunit is used for adding the signature of the local node to the first encrypted data to obtain the first transmission data and sending the first transmission data to the data receiver.
In a third aspect, an embodiment of the present application provides a device for transmitting block chain data, where the device includes a memory and a processor.
The memory is used for storing a computer program; the processor is used for realizing the steps of the block chain data transmission method when executing the computer program.
In a fourth aspect, the present application provides a readable storage medium, where a computer program is stored, and when executed by a processor, the computer program implements the steps of the above block chain data transmission method.
The invention has the beneficial effects that:
the invention standardizes the service files by arranging the local template for butting the local service data to the block chain standard file on the block chain local node, namely, a plurality of service messages with unified standards are placed in each service file, and the standardized conversion of the message format is completed by the block chain digital dictionary commonly identified in the whole network, thereby effectively solving the problem of difficult service interaction among a plurality of financial institutions caused by different service file formats generated by different service systems.
Additional features and advantages of the invention will be set forth in the description which follows, and in part will be obvious from the description, or may be learned by the practice of the embodiments of the invention. The objectives and other advantages of the invention will be realized and attained by the structure particularly pointed out in the written description and claims hereof as well as the appended drawings.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic flow chart illustrating a method for transmitting block chain data according to an embodiment of the present invention;
fig. 2 is a schematic structural diagram of a block chain data transmission apparatus according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a block chain data transmission apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. The components of embodiments of the present invention generally described and illustrated in the figures herein may be arranged and designed in a wide variety of different configurations. Thus, the following detailed description of the embodiments of the present invention, as presented in the figures, is not intended to limit the scope of the invention, as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It should be noted that: like reference numbers or letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined or explained in subsequent figures. Meanwhile, in the description of the present invention, the terms "first", "second", and the like are used only for distinguishing the description, and are not construed as indicating or implying relative importance.
Examples the associated nouns set forth:
the business data refers to data transmitted when business is carried out among a plurality of financial institutions, the data comprises a plurality of business documents such as 01 documents, 07 documents and the like, each document comprises at least one business message, for example, the 01 document can comprise a redeeming business transaction data message, an account opening application transaction message and the like, the composition elements of each message can be different, for example, the financial management A requires a user to submit an identity card number, but the bank B does not need the identity card number in the same business, so that the long messages and the short messages of the same business of the messages are inconsistent, and the contained information is inconsistent.
The business system and the existing business handling system of the financial institution are relatively closed, information islands are formed among the business systems, each business system of the financial institution has a set of own unique business data formats, for example, business data of a bank comprises 01 and 07 files, business data of a bank B comprises 1004 business files, 1503 interactive files and the like, business types corresponding to messages contained in each file are different, the components of the messages are different, and the components can be user information details such as names, ages, identity numbers and the like or transaction details.
The system comprises a block chain node (data sending node), an integrated server configured on a financial institution service system and used for connecting the service system and a block chain network, so as to realize related financial services based on the block chain network, such as service consensus, data consensus and the like.
Example 1
As shown in fig. 1, the present embodiment provides a method for transmitting blockchain data, which is applicable to any data sending node in a blockchain network, and the method includes steps S1, S2, and S3.
Step S1, responding to first service data sent by a local service system, judging the type of a receiver service system of the first service data, if the type of the receiver service system is heterogeneous, calling a local standard template, and converting a plurality of first service files in the first service data into corresponding first standard service files through the local standard template, wherein the first standard service files are data containing standard messages;
wherein, if the service system of the receiving party is similar to the service system of the sending party of the data, the service file structures of the two systems are similar, that is, the service types corresponding to the messages contained in the service files are the same, and the difference is only the difference of the component elements of the messages, at this time, the localized processing is not needed, only the service data is directly sent to the data receiving party, the data receiving party can directly carry out the standardized conversion on the messages in the service data according to the digital dictionary in the block chain public account book, and if the service system of the receiving party is not similar to the service system of the sending party of the data, the service system is a heterogeneous service system, at this time, the service types corresponding to the messages contained in the service files are different, the localized processing is needed, the messages are transmitted after being the standard files, the receiving party of the data can use the received standardized service data after the localized processing, the cross-system service data transmission is not the standardized processing or the localized processing of the service data, and needs to call a local template and a data dictionary, wherein the local template is used for butting the relation between a service file in the local service data and a service file in the standard service data, the difference of the service file layer is processed, the digital dictionary is used for processing the difference of message component elements, the digital dictionary is a common product identified through a block chain network, the digital dictionary on each node is the same, the local service template (standard template) is customized and used for butting the local service file and the standard service file, and the butting templates of different service systems are different;
the specific operation steps of converting all the first service files in the first service data into corresponding first standard service files through the local standard template in step S1 may be:
s11, calling the first service data, wherein the first service data comprises a plurality of first service files, and the first service files comprise a plurality of first messages;
s12, analyzing the service type corresponding to each first message, and finding a corresponding mapping relation in the local standard template according to the service type, wherein the mapping relation comprises the corresponding relation between the first service file where the first message is located and a standard file and the corresponding relation between the service type of the first message and a service included in the standard file;
specifically, the operation mode may be: one or more standard files corresponding to the first service file are found in a local standard template, then a standard message with the same service type as the first message in the first service file is found in the corresponding standard file, and then the constituent elements in the first message are placed on the specific fields in the corresponding standard message;
for example, the first service file corresponds to one or more standard files, such as the first service file includes a purchase request message and a redemption request message, and the standard file puts the messages of the two services in two separate service files;
similarly, the receiver of the data also compiles the standard service data into the corresponding local service data in the same way.
S13, converting each first message into the corresponding standard message according to the mapping relation;
and S14, packaging a plurality of corresponding standard messages according to the service types contained in the standard files to obtain a plurality of first standard files.
S2, packaging the first service data and the first standard service file into first transmission data, and sending the first transmission data to a data receiving party so that the data receiving party feeds back information for confirming receiving;
the specific data transmission mode may be:
step S21, calculating a hash value of the first transmission data, and performing uplink consensus on the hash value so that the data receiving party verifies the authenticity of the first transmission data;
and S22, establishing a data security transmission channel with the data receiver, and sending the first transmission data to the data receiver through the data security transmission channel.
Through the sending mode in the step S21-22, the public network data transmission pressure of the blockchain network can be effectively solved, that is, the blockchain network is only used for service consensus and data consensus and is not responsible for data transmission, data transmission is performed through the P2P secure channel, and after transmission, the receiver performs corresponding hash check on the received data to ensure that the received data is not tampered in the transmission process.
Secondly, in order to further prevent data leakage, encrypted transmission needs to be performed on transmitted data, the traditional encrypted transmission is TSL or SSL, it is complicated to negotiate a transmission private key for each transmission, and this embodiment encrypts the transmitted data through a public key of a receiving party stored in a block chain public account, which is simple and fast, and the specific operation mode may be:
step S221, a public key of a data receiver is called in a local public account book, and the public key is used for realizing the block chain network when a node is added;
step S222, encrypting the first transmission data through the public key of the data receiver to obtain first encrypted data;
step s223, adding a signature of a local node to the first encrypted data to obtain the first transmission data, and sending the first transmission data to the data receiver.
Step S3 receives the confirmation message sent by the data receiving side.
Example 2
As shown in fig. 2, the present embodiment provides a block chain data transmission apparatus, which is suitable for any data sending node in a block chain network, and the apparatus includes:
a first calculating module 71, configured to respond to first service data sent by a local service system, determine a receiver service system type of the first service data, if the receiver service system type is heterogeneous, invoke a local standard template, and convert, through the local standard template, all a plurality of first service files in the first service data into corresponding first standard service files, where each first standard service file is data including a standard packet;
the second calculation module 72 is configured to encapsulate the first service data and the first standard service file into first transmission data, and send the first transmission data to a data receiving party, so that the data receiving party feeds back information for confirming reception;
a first receiving module 73, configured to receive the confirmation information sent by the data receiving side.
Optionally, the first calculating module 71 includes:
a first retrieving unit 711, configured to retrieve the first service data, where the first service data includes a plurality of first service files, and the first service files include a plurality of first messages;
a first calculating unit 712, configured to analyze a service type corresponding to each first packet, and find a corresponding mapping relationship in the local standard template according to the service type, where the mapping relationship includes a corresponding relationship between the first service file where the first packet is located and a standard file, and a corresponding relationship between the service type of the first packet and a service included in the standard file;
a second calculating unit 713, configured to respectively convert each first packet into the corresponding standard packet according to the mapping relationship;
a first encapsulating unit 714, configured to encapsulate the multiple standard packets according to the service types included in the standard file, so as to obtain the first standard file.
Optionally, the second calculating module 72 includes:
a third calculating unit 721, configured to calculate a hash value of the first transmission data, and perform uplink consensus on the hash value, so that the data receiving side verifies the authenticity of the first transmission data;
the first transmission unit 722 is configured to establish a data security transmission channel with the data receiving side, and send the first transmission data to the data receiving side through the data security transmission channel.
Optionally, the first transmission unit 722 includes:
a first retrieving subunit 7221, configured to retrieve a public key of the data receiving party in the local public ledger;
a first encryption subunit 7222, configured to encrypt, by using the public key of the data receiver, the first transmission data to obtain first encrypted data;
a first signature subunit 7223, configured to add a signature of a local node to the first encrypted data to obtain the first transmission data, and send the first transmission data to the data receiving side.
It should be noted that, regarding the apparatus in the above embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated herein.
Example 3
Corresponding to the above method embodiments, the embodiments of the present disclosure further provide a block chain data transmission device, and a block chain data transmission device described below and a block chain data transmission method described above may be referred to correspondingly.
Fig. 3 is a block diagram illustrating a block chain data transmission apparatus 800 according to an example embodiment. As shown in fig. 3, the electronic device 800 may include: a processor 801, a memory 802. The electronic device 800 may also include one or more of a multimedia component 803, an input/output (I/O) interface 804, and a communications component 805.
The processor 801 is configured to control the overall operation of the electronic device 800, so as to complete all or part of the steps in the above block chain data transmission method. The memory 402 is used to store various types of data to support operation at the electronic device 800, such as instructions for any application or method operating on the electronic device 800 and application-related data, such as contact data, transmitted and received messages, pictures, audio, video, and so forth. The Memory 802 may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk or optical disk. The multimedia components 803 may include screen and audio components. Wherein the screen may be, for example, a touch screen and the audio component is used for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may further be stored in the memory 802 or transmitted through the communication component 805. The audio assembly also includes at least one speaker for outputting audio signals. The I/O interface 804 provides an interface between the processor 801 and other interface modules, such as a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 805 is used for wired or wireless communication between the electronic device 800 and other devices. Wireless communication, such as Wi-Fi, bluetooth, Near Field Communication (NFC), 2G, 3G, or 4G, or a combination of one or more of them, so that the corresponding communication component 805 may include: Wi-Fi module, bluetooth module, NFC module.
In an exemplary embodiment, the electronic Device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic components for performing the above-described block chain data transmission method.
In another exemplary embodiment, a computer readable storage medium including program instructions which, when executed by a processor, implement the steps of the above-described block chain data transmission method is also provided. For example, the computer readable storage medium may be the memory 802 described above that includes program instructions that are executable by the processor 801 of the electronic device 800 to perform the above-described blockchain data transmission method.
Example 4
Corresponding to the above method embodiment, the embodiment of the present disclosure further provides a readable storage medium, and a readable storage medium described below and a block chain data transmission method described above may be referred to correspondingly.
A readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the steps of the block chain data transmission method of the above method embodiment.
The readable storage medium may be a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and various other readable storage media capable of storing program codes.
The above description is only a preferred embodiment of the present invention and is not intended to limit the present invention, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.

Claims (10)

1. A method for transmitting data in a block chain is applicable to any data sending node in a block chain network, and is characterized in that the method comprises the following steps:
responding to first service data sent by a local service system, judging the type of a receiver service system of the first service data, if the type of the receiver service system is heterogeneous, calling a local standard template, and converting a plurality of first service files in the first service data into corresponding first standard service files through the local standard template, wherein the first standard service files are data containing standard messages;
packaging the first service data and the first standard service file into first transmission data, and sending the first transmission data to a data receiving party so that the data receiving party feeds back information for confirming receiving;
and receiving the confirmation information sent by the data receiving party.
2. The method according to claim 1, wherein converting each of the plurality of first service files in the first service data into a corresponding first standard service file through the local standard template comprises:
calling the first service data, wherein the first service data comprises a plurality of first service files, and the first service files comprise a plurality of first messages;
analyzing the service type corresponding to each first message, and finding a corresponding mapping relation in the local standard template according to the service type, wherein the mapping relation comprises the corresponding relation between the first service file where the first message is located and a standard file and the corresponding relation between the service type of the first message and a service included in the standard file;
respectively converting each first message into the corresponding standard message according to the mapping relation;
and packaging a plurality of corresponding standard messages according to the service types contained in the standard files to obtain a plurality of first standard files.
3. The method of claim 1, wherein encapsulating the first service data and the first standard service file into first transmission data and sending the first transmission data to a data receiver comprises:
calculating a hash value of the first transmission data, and performing uplink consensus on the hash value so that the data receiving party verifies the authenticity of the first transmission data;
and establishing a data security transmission channel with the data receiver, and sending the first transmission data to the data receiver through the data security transmission channel.
4. The method of claim 3, wherein sending the first transmission data to the data receiver via the data secure transmission channel comprises:
calling a public key of a data receiver from a local public account book;
encrypting the first transmission data through the public key of the data receiver to obtain first encrypted data;
and adding a signature of a local node to the first encrypted data to obtain the first transmission data, and sending the first transmission data to the data receiver.
5. A device for transmitting data in a blockchain, the device being adapted to any data transmitting node in a blockchain network, the device comprising:
the system comprises a first calculation module, a second calculation module and a third calculation module, wherein the first calculation module is used for responding to first service data sent by a local service system, judging the type of a receiver service system of the first service data, calling a local standard template if the type of the receiver service system is heterogeneous, and converting a plurality of first service files in the first service data into corresponding first standard service files through the local standard template, wherein the first standard service files are data containing standard messages;
the second calculation module is used for packaging the first service data and the first standard service file into first transmission data and sending the first transmission data to a data receiving party so that the data receiving party feeds back information for confirming receiving;
and the first receiving module is used for receiving the confirmation information sent by the data receiving party.
6. The device according to claim 5, wherein the first computing module comprises:
a first retrieving unit, configured to retrieve the first service data, where the first service data includes a plurality of first service files, and the first service files include a plurality of first messages;
the first computing unit is used for analyzing the service type corresponding to each first message and finding a corresponding mapping relation in the local standard template according to the service type, wherein the mapping relation comprises the corresponding relation between the first service file where the first message is located and a standard file and the corresponding relation between the service type of the first message and a service contained in the standard file;
the second computing unit is used for respectively converting each first message into the corresponding standard message according to the mapping relation;
and the first packaging unit is used for packaging the plurality of standard messages according to the service types contained in the standard files to obtain the first standard files.
7. The device according to claim 5, wherein the second computing module comprises:
the third calculation unit is used for calculating a hash value of the first transmission data and performing uplink consensus on the hash value so that the data receiving party can verify the authenticity of the first transmission data;
and the first transmission unit is used for establishing a data security transmission channel with the data receiving party and sending the first transmission data to the data receiving party through the data security transmission channel.
8. The device according to claim 3, wherein the first transmission unit comprises:
the first calling subunit is used for calling a public key of a data receiver in a local public ledger;
the first encryption subunit is used for encrypting the first transmission data through the public key of the data receiver to obtain first encrypted data;
and the first signature subunit is used for adding the signature of the local node to the first encrypted data to obtain the first transmission data and sending the first transmission data to the data receiver.
9. A block chain data transmission apparatus, comprising:
a memory for storing a computer program;
a processor for implementing the steps of the blockchain data transmission method according to any one of claims 1 to 4 when executing the computer program.
10. A readable storage medium, characterized by: the readable storage medium has stored thereon a computer program which, when being executed by a processor, carries out the steps of the blockchain data transmission method according to one of claims 1 to 4.
CN202210449984.6A 2022-04-26 2022-04-26 Block chain data transmission method, device, equipment and readable storage medium Active CN114978526B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210449984.6A CN114978526B (en) 2022-04-26 2022-04-26 Block chain data transmission method, device, equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210449984.6A CN114978526B (en) 2022-04-26 2022-04-26 Block chain data transmission method, device, equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN114978526A true CN114978526A (en) 2022-08-30
CN114978526B CN114978526B (en) 2023-11-28

Family

ID=82979254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210449984.6A Active CN114978526B (en) 2022-04-26 2022-04-26 Block chain data transmission method, device, equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN114978526B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107040585A (en) * 2017-02-22 2017-08-11 阿里巴巴集团控股有限公司 A kind of method and device of business verification
US20200293515A1 (en) * 2019-06-03 2020-09-17 Alibaba Group Holding Limited Service processing system and method based on blockchain
CN112967160A (en) * 2019-06-03 2021-06-15 创新先进技术有限公司 Service processing system and method based on block chain
CN113468272A (en) * 2021-07-14 2021-10-01 中国银行股份有限公司 Message forwarding method and device
US11188907B1 (en) * 2015-08-21 2021-11-30 United Services Automobile Association (Usaa) ACH authorization validation using public blockchains
CN113852687A (en) * 2021-09-24 2021-12-28 成都质数斯达克科技有限公司 File transmission method between block chain link points

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11188907B1 (en) * 2015-08-21 2021-11-30 United Services Automobile Association (Usaa) ACH authorization validation using public blockchains
CN107040585A (en) * 2017-02-22 2017-08-11 阿里巴巴集团控股有限公司 A kind of method and device of business verification
US20200293515A1 (en) * 2019-06-03 2020-09-17 Alibaba Group Holding Limited Service processing system and method based on blockchain
CN112967160A (en) * 2019-06-03 2021-06-15 创新先进技术有限公司 Service processing system and method based on block chain
CN113468272A (en) * 2021-07-14 2021-10-01 中国银行股份有限公司 Message forwarding method and device
CN113852687A (en) * 2021-09-24 2021-12-28 成都质数斯达克科技有限公司 File transmission method between block chain link points

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ANDROULAKI E 等: "A distributed operating system for permissioned blockchains", PROC.OF THE 13TH EUROSYS CONF. *
张亮;刘百祥;张如意;江斌鑫;刘一江;: "区块链技术综述", 计算机工程, no. 05 *

Also Published As

Publication number Publication date
CN114978526B (en) 2023-11-28

Similar Documents

Publication Publication Date Title
CN108416577B (en) Block chain service system
CN112583802B (en) Data sharing platform system and equipment based on block chain and data sharing method
CN111314172B (en) Block chain-based data processing method, device, equipment and storage medium
JP7235930B2 (en) Methods and apparatus, electronic devices, storage media and computer programs for processing data requests
CN112653556B (en) TOKEN-based micro-service security authentication method, device and storage medium
CN112039826A (en) Login method and device applied to applet terminal
CN114826733A (en) File transfer method, device, system, apparatus, medium, and program product
CN102902934A (en) Integration and interactive operation system for unknowable host
CN115085934A (en) Contract management method based on block chain and combined key and related equipment
CN113595724A (en) Accounting method, device, equipment and readable storage medium based on block chain
US20190089798A1 (en) Proxy system for bot connectivity to communication channels
CN101938478A (en) Set-top box browser, set-top box and method thereof
CN103647650A (en) Rule definition based automatic signature/signature verification device and method
CN114499893B (en) Bidding file encryption and evidence storage method and system based on block chain
CN114978526B (en) Block chain data transmission method, device, equipment and readable storage medium
CN112529642B (en) Invoice management method, system, equipment and storage medium based on block chain
CN113763178A (en) Multi-block chain cross-chain transaction method, device, equipment and readable storage medium
CN114500651A (en) Block chain data transmission method, device and equipment and readable storage medium
CN113542231A (en) Communication method, electronic device, and storage medium
CN105427100A (en) Bank card transaction method, apparatus and system
CN114928649B (en) Multi-platform service realization method, device and equipment based on block chain
CN114465976B (en) Method and device for distributing and aggregating messages
CN112437052B (en) Method, apparatus, electronic device, and computer-readable medium for processing information
CN116112172B (en) Android client gRPC interface security verification method and device
EP4325417A1 (en) Digital currency export method, recharging method, apparatus, and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant