CN115001783A - Voting method, system and storage medium - Google Patents

Voting method, system and storage medium Download PDF

Info

Publication number
CN115001783A
CN115001783A CN202210587596.4A CN202210587596A CN115001783A CN 115001783 A CN115001783 A CN 115001783A CN 202210587596 A CN202210587596 A CN 202210587596A CN 115001783 A CN115001783 A CN 115001783A
Authority
CN
China
Prior art keywords
voting
block chain
user
node
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210587596.4A
Other languages
Chinese (zh)
Inventor
沈金泳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202210587596.4A priority Critical patent/CN115001783A/en
Publication of CN115001783A publication Critical patent/CN115001783A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/30Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy
    • H04L9/3066Public key, i.e. encryption algorithm being computationally infeasible to invert or user's encryption keys not requiring secrecy involving algebraic varieties, e.g. elliptic or hyper-elliptic curves
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution
    • H04L2209/601Broadcast encryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/72Signcrypting, i.e. digital signing and encrypting simultaneously

Abstract

The application relates to the technical field of artificial intelligence, and provides a voting method, a voting system and a storage medium, wherein the voting method comprises the following steps: the first block chain link point creates an account for each voting choice according to the voting options, and releases the voting transfer money to the second block chain link point corresponding to the voting user identification; the second block chain link point transfers the voting transfer coins to the account corresponding to any voting option and broadcasts the voting transfer coins in the block chain; determining a voting result, broadcasting in a block chain, verifying the access right of a user according to an intelligent contract of a pre-deployed access control strategy when transaction information of an access block chain is received, and allowing the transaction information to be acquired when the access right verification is passed; and when the transaction result in the access block chain network is received and verified as a credible user, allowing access to the voting result. The voting data can not be tampered, the safety and the fairness of the voting data are guaranteed, the voting process can be traced, the privacy is high, and the voting result can be obtained conveniently.

Description

Voting method, system and storage medium
Technical Field
The present application belongs to the technical field of artificial intelligence, and in particular, to a voting method, system and storage medium.
Background
"bankruptcy" is "when debtors cannot pay due debts or debts exceed the capital, the court enforces all its properties by force, the whole debtors are paid fairly, or under the supervision of the court, the debtors and the debtor meetings reach an agreement, in the bankruptcy program, in order to ensure the orderly operation of the bankruptcy program, the whole debtors can be paid fairly, it is necessary to establish the debtor meeting of bankruptcy clearing, in the process of the meeting holding, there are items needing to be negotiated, such as the options of the debtor committee, etc., the negotiation of the whole debtor is needed to be consistent to draw conclusions, therefore, the negotiation needs to be carried out by voting, etc., and no one or any organization can decide by self.
Currently, an online voting mode can be adopted, and the result is published by a manager subsequently. Many traditional voting modes can support software for online voting, vote counting and result publishing, but the problems of effective voting, data modification, voting information forgery and the like exist in the middle of the effective voting. The bankruptcy case manager cannot answer directly when being challenged by all parties. Therefore, the voting result is not always approved by the court, the creditor, the debtor, the investor and the like, which undoubtedly increases the difficulty of the follow-up work of the conference. The voting data in the creditor conference is at risk of being tampered, the voting result cannot be verified, and the like, so that the safety and the fairness of the voting data in the creditor conference cannot be guaranteed.
Disclosure of Invention
The embodiment of the application provides a voting method, a voting system and a storage medium, and aims to solve the problem that the voting data security and fairness in the existing creditor conference are low.
In a first aspect, an embodiment of the present application provides a voting method, which is applied to a voting system, where the voting system includes a plurality of blockchain nodes, and the method includes:
after a voting instruction is detected through the first block chain link point, voting options and voting user identifications are obtained;
the first block chain link point creates an account for each voting choice according to the voting options;
the first block chain node sends a voting transfer coin to a second block chain node corresponding to the voting user identifier;
transferring the voting transfer money to an account corresponding to any voting option through the second block chain node point, and broadcasting the corresponding transaction information selected from the second block chain node to any voting in the block chain network so that the nodes in the block chain network store the corresponding transaction information;
selecting corresponding transaction information according to each vote to determine a voting result, and broadcasting the voting result in a block chain so that nodes in the block chain store the voting result;
when any block chain node storing the voting process receives transaction information of a first user accessing a block chain network, verifying the access right of the first user according to an intelligent contract of a pre-deployed access control strategy, and allowing the first user to acquire the transaction information when the access right of the first user passes the verification;
and when any block chain link point storing the voting result receives a transaction result in a second user access block chain network, verifying whether the second user is a credible node, and when the second user is a credible user, allowing the second user to access the voting result.
In one embodiment, the transferring the account number corresponding to any voting option through the second block link point, and broadcasting the transaction information corresponding to the second block link node to any voting option in a block link network, includes:
and associating the digital signature with the voting transfer coin through the second block chain link point, transferring the voting transfer coin associated with the digital signature to an account corresponding to any voting option, and selecting corresponding transaction information from any voting to the second block chain node to broadcast in the block chain network.
In one embodiment, after the digital signature corresponding to the vote transfer money is associated with the vote transfer money through the second block link point, and the vote transfer money associated with the digital signature is transferred to an account corresponding to any one voting option, the method further comprises the following steps:
after receiving the voting transfer currency comprising the digital signature through the first block chain node, verifying whether the data signature is matched with the identity information of any node in the second block chain node with the authority;
and if the identity information of any node in the second block chain nodes with the authority is matched, judging that the corresponding voting money transfer is valid.
In one embodiment, the selecting the corresponding transaction information according to each vote to determine a voting result, and broadcasting the voting result in the blockchain includes:
and determining a voting result according to the judged valid voting transfer money, and broadcasting the voting result in the block chain.
In one embodiment, the associating, by the second block link point, a digital signature corresponding to the voting transfer coin, and transferring the voting transfer coin after being associated with the digital signature to a place before an account corresponding to any voting option, includes:
the second block chain link point selects one encryption algorithm from a plurality of pre-stored encryption algorithms through a random algorithm to serve as a target encryption algorithm;
encrypting the digital signature through a target encryption algorithm to obtain an encrypted digital signature;
sending the encrypted digital signature and the identifier corresponding to the target encryption algorithm to an account corresponding to any voting option; and each encryption algorithm in the pre-stored plurality of encryption algorithms corresponds to one identifier.
In one embodiment, the verifying whether the data signature matches the identity information of any of the second blockchain nodes having authority after receiving the voting transfer currency including the digital signature through the first blockchain node comprises:
the first block chain link point selects a corresponding decryption algorithm according to the received identifier to serve as a target decryption algorithm;
and decrypting the received encrypted digital signature according to the target decryption algorithm to obtain the digital signature.
In one embodiment, said verifying whether said second user is a trusted user comprises:
verifying whether the identity information of the second user meets the identity information of a preset credible condition;
and when the identity information of the second user meets the identity information of a preset credible condition, judging that the second user is a credible user.
In a second aspect, embodiments of the present application provide a voting system comprising a plurality of blockchain nodes, the plurality of blockchain nodes comprising a first blockchain node and a second blockchain node;
after the first block chain link point detects a voting instruction, a voting option and a voting user identifier are obtained;
the first block chain link point creates an account for each voting choice according to the voting options;
the first block chain node sends a voting transfer coin to a second block chain node corresponding to the voting user identifier;
the second block chain node transfers the voting transfer money to an account corresponding to any voting option, and selects corresponding transaction information from the second block chain node to any voting option to broadcast in a block chain network so that the nodes in the block chain network store the corresponding transaction information;
the second block chain link point selects corresponding transaction information according to each vote to determine a voting result, and broadcasts the voting result in the block chain so as to enable the nodes in the block chain to store the voting result;
when any block chain node storing the voting process receives transaction information of a first user accessing a block chain network, verifying the access right of the first user according to an intelligent contract of a pre-deployed access control strategy, and allowing the first user to acquire the transaction information when the access right of the first user passes the verification;
and when any block chain link point storing the voting result receives a transaction result in a second user access block chain network, verifying whether the second user is a credible node, and when the second user is a credible user, allowing the second user to access the voting result.
In a third aspect, an embodiment of the present application provides a voting system, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, where the processor implements the steps of the voting method when executing the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium, which stores a computer program, and the computer program realizes the steps of the voting method when executed by a processor.
In a fifth aspect, embodiments of the present application provide a computer program product, which, when run on an electronic device, causes the electronic device to execute the steps of the voting method described above.
Compared with the prior art, the embodiment of the application has the advantages that: after a voting instruction is detected by a first block chain link point, a block chain account can be established for each voting option, and voting transfer coins are sent to a second block chain link point corresponding to the voting user identification; and transferring the voting transfer money to an account corresponding to any voting option through the second block chain node point, and selecting corresponding transaction information from the second block chain node to any vote to broadcast in a block chain network. On one hand, the nodes in the block chain network can store corresponding transaction information, and the transaction information is broadcasted in the block chain network and can be written into the block chain, so that the voting data cannot be tampered, and the safety and the fairness of the voting data are ensured; on the other hand, for voting process data, tracing is usually difficult, and since a block chain has no centralized official organization, participating block chain nodes can automatically enter and exit a network, and the authority of reading and writing the data is not limited by a system, the privacy of the voting process is poor, and in order to be traceable and protect the privacy of the voting process, the voting process can be regarded as transaction information on the block chain, the transaction information is stored in the block chain and is stored in the block chain in an intelligent contract manner through an access control strategy, and the access is performed based on an intelligent contract for deploying the access control strategy, so that the tracing of the voting process is ensured and the privacy is high; for the voting result, when the user is verified to be a credible user, the voting result is allowed to be accessed, the voting result only comprises that the result does not include how the specific user votes, namely the voting process, so that the access of the voting result stored on the block chain does not set an access right, the voting result can be obtained by a credible node, and the convenience for obtaining the voting result is ensured, so that the voting data cannot be falsified, the safety and the fairness of the voting data are ensured, and meanwhile, the traceability of the voting process, the high privacy and the high convenience for obtaining the voting result can be ensured.
It is understood that the beneficial effects of the second aspect to the fifth aspect can be referred to the related description of the first aspect, and are not described herein again.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings without creative efforts.
Fig. 1 is a schematic flowchart of a voting method according to an embodiment of the present application;
fig. 2 is a schematic flowchart of a voting method provided in the second embodiment of the present application;
fig. 3 is a schematic flowchart of another voting method provided in the second embodiment of the present application;
fig. 4 is a schematic flowchart of another voting method provided in the second embodiment of the present application;
fig. 5 is a schematic flow chart of a voting system provided in the third embodiment of the present application;
fig. 6 is a schematic structural diagram of a blockchain node according to a fourth embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth, such as particular system structures, techniques, etc. in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It should also be understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
As used in this specification and the appended claims, the term "if" may be interpreted contextually as "when", "upon" or "in response to" determining "or" in response to detecting ". Similarly, the phrase "if it is determined" or "if a [ described condition or event ] is detected" may be interpreted contextually to mean "upon determining" or "in response to determining" or "upon detecting [ described condition or event ]" or "in response to detecting [ described condition or event ]".
Furthermore, in the description of the present application and the appended claims, the terms "first," "second," "third," and the like are used for distinguishing between descriptions and not necessarily for describing or implying relative importance.
Reference throughout this specification to "one embodiment" or "some embodiments," or the like, means that a particular feature, structure, or characteristic described in connection with the embodiment is included in one or more embodiments of the present application. Thus, appearances of the phrases "in one embodiment," "in some embodiments," "in other embodiments," or the like, in various places throughout this specification are not necessarily all referring to the same embodiment, but rather "one or more but not all embodiments" unless specifically stated otherwise. The terms "comprising," "including," "having," and variations thereof mean "including, but not limited to," unless expressly specified otherwise.
The voting method provided by the embodiment of the present application can be applied to a voting system, where the voting system includes a plurality of block link nodes, and a block link has transparency and non-tamper-resistance, and can enable each node to efficiently achieve consensus on validity of block data in a de-centralized system with a highly dispersed decision right, that is, the consensus mechanism characteristic of the block link, where the steps of the voting method in the embodiment of the present application can be jointly completed by a plurality of nodes in the block link system, and are not limited thereto, where the block link nodes include but are not limited to: terminal equipment such as desktop computer, panel computer, server, cell-phone terminal. The embodiment of the present application does not set any limit to the specific type of the terminal device.
In order to explain the technical solutions described in the present application, the following description is given by way of specific examples.
Example one
Referring to fig. 1, a schematic flow chart of a voting method provided in the embodiment of the present application is shown, where the voting method includes:
step S101, after a voting command is detected through the first block chain node, voting options and voting user identifications are obtained.
Specifically, if a management node (e.g., court related personnel) can be used as a first block chain node, and a corresponding node of a creditor and a creditee can be used as a second block chain node, a management user can input a voting instruction in the first block chain node, and after the voting instruction is detected by the first block chain node, the input voting option and the user identifier with the voting right are acquired within a preset effective time period.
Step S102, the first block link point creates an account for each voting choice according to the voting options.
Specifically, the first block chain link point generates an account number for each voting option, each account number has an account address, and the initial voting transfer currency of each account number is 0, and the voting transfer currency can be a virtual currency for transaction with a specific voting identifier issued according to each initiated voting instruction.
And step S103, the first block link node sends the voting money transfer money to a second block link node corresponding to the voting user identifier.
Specifically, the second block chain node corresponding to the voting authority may have an ownership of a voting transfer coin, the first block chain node releases a voting transfer coin to the second block chain node having the voting authority, and the second block chain node having the voting authority can select the corresponding account number to transfer the voting transfer coin to the voting of the psychograph after acquiring the voting transfer coin.
And step S104, transferring the voting transfer coins to account numbers corresponding to any voting option through the second block chain node point, selecting corresponding transaction information from the second block chain node to any voting option, and broadcasting the transaction information in the block chain network so that the nodes in the block chain network store the corresponding transaction information.
Specifically, the second blockchain node can transfer the voting transfer coins to the corresponding blockchain account numbers in a transfer mode, and record transaction information of the voting transfer coins on the blockchain. Specifically, the transaction information transferred to the account corresponding to any voting option by the second block chain node is broadcasted in the block chain network, and each block chain node stores the transaction, so that the process of counting tickets can be traced.
And step S105, selecting corresponding transaction information according to each vote to determine a voting result, and broadcasting the voting result in the block chain so that the nodes in the block chain store the voting result.
Specifically, after the voting is finished, the number of votes is counted to obtain a voting result, and the voting result does not include voting information of which users specifically belong to, so that the voting result is stored in a block chain, and the storage of the voting result and the transaction information of the voting process are respectively stored in different block chain accounts.
And step S106, when any block chain node storing the voting process receives the transaction information of the first user access block chain network, verifying the access right of the first user according to an intelligent contract of a pre-deployed access control strategy, and allowing the first user to acquire the transaction information when the access right verification of the first user passes.
Specifically, since the block chain has no centralized official organization, the participating block link nodes can automatically enter and exit the network, and the authority for reading and writing data is not limited by the system, so that the privacy of the voting process is poor, in order to protect the privacy of the voting process, an Access authority can be set in advance Based on the role Based Access Control (ABAC), for example, the Access authority of the voting user is only able to acquire the voting transaction information of the user, the Access authority of the user who manages the user or whose identity information meets the preset Access condition can acquire the Access authority of the whole transaction information, and the user can Access the corresponding authority according to the role of the user. The intelligent contract is a protocol which achieves automatic execution by writing a code program, and can be automatically executed without the supervision of a third-party manager as long as the terms of the contract are met, so that the access control strategy related to the intelligent contract can be deployed based on the intelligent contract, the intelligent contract is issued in a block chain, and the access right of a user can be managed based on the intelligent contract for deploying the access control strategy, so that the traceability of voting transaction information is ensured, and the concealment of voting users is ensured.
Step S107, when any block chain node storing the voting result receives a transaction result in the second user access block chain network, verifying whether the second user is a trusted node, and when the second user is a trusted user, allowing the second user to access the voting result.
Specifically, the voting result does not include the voting information of which users specifically belong to, and all users on the blockchain can know the result, so that the voting result can be the authority of the trusted node participating in the blockchain to obtain the voting result.
The verifying whether the second user is a trusted user comprises: verifying whether the identity information of the second user meets the identity information of a preset credible condition; and when the identity information of the second user meets the identity information of a preset credible condition, judging that the second user is a credible user.
Specifically, the user whose user identity information that the second user has successfully registered in the blockchain network in advance meets the preset trusted condition may be verified, if the preset trusted condition may be that a preset trusted value is greater than a preset threshold value, the user may be determined as a trusted user, the trusted value may be a preset initial value of the user who has successfully registered in the blockchain network, and then the value may be added or subtracted according to a preset behavior of the user account, for example, the preset value is subtracted from the preset malicious behavior data.
After a voting instruction is detected by a first block chain link point, a block chain account can be established for each voting option, and voting transfer coins are issued to a second block chain link point corresponding to the voting user identification; and transferring the voting transfer money to an account corresponding to any voting option through the second block chain node point, and selecting corresponding transaction information from the second block chain node to any vote to broadcast in a block chain network. On one hand, the nodes in the block chain network can store corresponding transaction information, and the transaction information is broadcasted in the block chain network and can be written into the block chain, so that the voting data cannot be tampered, and the safety and the fairness of the voting data are ensured; on the other hand, for voting process data, tracing is usually difficult, and since a block chain has no centralized official organization, participating block chain nodes can automatically enter and exit a network, and the authority of reading and writing the data is not limited by a system, the privacy of the voting process is poor, and in order to be traceable and protect the privacy of the voting process, the voting process can be regarded as transaction information on the block chain, the transaction information is stored in the block chain and is stored in the block chain in an intelligent contract manner through an access control strategy, and the access is performed based on an intelligent contract for deploying the access control strategy, so that the tracing of the voting process is ensured and the privacy is high; for the voting result, when the user is verified to be a credible user, the voting result is allowed to be accessed, the voting result only comprises that the result does not include how the specific user votes, namely the voting process, so that the access of the voting result stored on the block chain does not set an access right, the voting result can be obtained by a credible node, and the convenience for obtaining the voting result is ensured, so that the voting data cannot be falsified, the safety and the fairness of the voting data are ensured, and meanwhile, the traceability of the voting process, the high privacy and the high convenience for obtaining the voting result can be ensured.
Example two
The present embodiment is further described in the first embodiment, and reference may be specifically made to the related description of the first embodiment where the same or similar to the first embodiment, and details are not described herein again. As shown in fig. 2, the voting method of the present embodiment includes:
step S201, after detecting a voting command through the first block link point, acquiring a voting option and a voting user identifier.
Step S202, the first block link point creates an account for each voting choice according to the voting options.
And step S203, the first block chain node sends the voting money transfer money to a second block chain node corresponding to the voting user identifier.
Specifically, the points from step S201 to step S203 that are the same as or similar to the points from step S101 to step S103 may refer to the related descriptions from step S101 to step S103, and are not repeated herein.
Step S204, the digital signature corresponding to the voting transfer currency is associated through the second block chain node, the voting transfer currency associated with the digital signature is transferred to an account corresponding to any voting option, and the second block chain node selects corresponding transaction information from any voting to broadcast in the block chain network.
Specifically, a user where the first block link point is located may initiate voting information according to meeting requirements, for example, the first block link node may broadcast the voting information in the block chain, and the second block link point having a voting authority may associate a digital signature of the voting money with the voting money, where the digital signature may be a ciphertext obtained by encrypting, by the second block link point, the identity information of the user through a preset encryption algorithm, and may be identity information obtained by decrypting, by a preset decryption algorithm, the digital signature, and verify the correctness of the identity of the user. The preset encryption algorithm and the preset decryption algorithm can adopt asymmetric encryption algorithms, the preset decryption algorithm is stored in the first block chain node, and the preset encryption algorithm is stored in the second block chain node.
In one embodiment, as shown in fig. 3, before the associating the digital signature with the voting transfer coin through the second block link point, transferring the voting transfer coin after associating the digital signature to an account corresponding to any voting option includes steps S2041 to S2043:
step S2041, selecting one encryption algorithm from a plurality of pre-stored encryption algorithms by the second block link point through a random algorithm, and using the selected encryption algorithm as a target encryption algorithm.
Specifically, a plurality of encryption algorithms are stored in the second blockchain node in advance, each encryption algorithm corresponds to one identifier, for example, the plurality of encryption algorithms include but are not limited to at least two of an RSA encryption algorithm, an EIGmamal encryption algorithm, an elliptic curve encryption algorithm, and a hash encryption algorithm. Also, each encryption algorithm corresponds to an identity. The identifiers corresponding to the decryption algorithm and the encryption algorithm are the same, for example, the EIGmamal encryption algorithm and the EIGmamal decryption algorithm correspond to the same identifier, and the elliptic curve encryption algorithm and the elliptic curve decryption algorithm correspond to the same identifier. Firstly, one encryption algorithm is selected from a plurality of pre-stored encryption algorithms through a random algorithm, and after the selection is determined, the selected encryption algorithm can be used as a target encryption algorithm.
Step S2042, the digital signature is encrypted through a target encryption algorithm, and the encrypted digital signature is obtained.
Specifically, a target encryption algorithm is selected from a plurality of pre-stored encryption algorithms through a random selection algorithm to encrypt the digital signature, so that an encrypted digital signature is obtained.
Step S2043, the encrypted digital signature and the identification corresponding to the target encryption algorithm are sent to an account corresponding to any voting option; and each encryption algorithm in the pre-stored plurality of encryption algorithms corresponds to one identifier.
Specifically, the encrypted digital signature and the identifier corresponding to the target encryption algorithm are sent to the first blockchain node.
Step S205, after receiving the voting transfer currency comprising the digital signature through the first block chain node, verifying whether the data signature is matched with the identity information of any node in the second block chain node with the authority.
Specifically, after receiving the voting transfer coins including the digital signatures of the second block link points, the first block link points may verify the voting transfer coins according to the received digital signatures associated with the voting transfer coins, specifically, decrypt the received digital signatures according to a preset decryption algorithm to obtain the identity information of the user, and verify whether the identity information of the user matches any one of the identity information of the second block link points having the authority.
In one embodiment, as shown in fig. 4, before verifying whether the data signature matches the identity information of any one of the second block chain nodes having authority after receiving the voting transfer money including the digital signature through the first block chain node, the method includes steps S2051 to S2052:
step S2051, the first block link point selects a corresponding decryption algorithm according to the received identifier, and uses the decryption algorithm as a target decryption algorithm.
Specifically, a plurality of decryption algorithms are stored in the first blockchain node in advance, each decryption algorithm corresponds to one identifier, and for example, the plurality of decryption algorithms include, but are not limited to, at least two decryption algorithms of an RSA decryption algorithm, an EIGmamal decryption algorithm, an elliptic curve decryption algorithm, and a hash decryption algorithm. Each decryption algorithm corresponds to an identifier.
Step S2052 is to decrypt the received encrypted digital signature according to the target decryption algorithm to obtain a digital signature.
Specifically, the identifiers corresponding to a pair of decryption algorithms and encryption algorithms are the same, for example, the same identifier corresponds to the EIGmamal encryption algorithm and the EIGmamal decryption algorithm, and the same identifier corresponds to the elliptic curve encryption algorithm and the elliptic curve decryption algorithm. Therefore, when the first blockchain node needs to decrypt, the corresponding decryption algorithm can be selected based on the received identifier to decrypt.
Because various cryptographic techniques can be used in the field of block chain technology to ensure security, a plurality of decryption algorithms can be stored in a first block chain node in advance, each decryption algorithm corresponds to an identifier, a plurality of encryption algorithms are stored in a second block chain node, each encryption algorithm corresponds to one decryption algorithm in the first block chain node, before encryption is performed on a second block chain node, an encryption algorithm is selected from the plurality of prestored encryption algorithms through a random algorithm, after selection is determined, the identifier corresponding to the selected encryption algorithm can be sent to the first block chain node, and when the first block chain node needs to decrypt, the corresponding decryption algorithm can be selected to decrypt based on the received identifier, so that randomness of encryption and decryption is increased, and the security of the user identity in the voting process is further improved.
And step S206, if the identity information of any node in the second block chain nodes with the authority is matched, judging that the corresponding voting money transfer is valid.
Specifically, when the identity information of the authenticated user is the same as any one of the identity information of the second blockchain node having the authority, the voting choice is determined to be valid.
Step S207, determining a voting result according to the judged valid voting transfer money, and broadcasting the voting result in the block chain so that the node in the block chain stores the voting result;
specifically, when the voting result is determined according to the determined valid voting data, since the block chain is a distributed network system, it has a mechanism characteristic that each node can efficiently achieve consensus on the validity of the block data in a decentralized system with highly dispersed decision weights, that is, the consensus mechanism of the block chain. Therefore, the voting result is broadcasted in the block chain, so that the nodes in the block chain are stored, the evidence can be stored, and the characteristics of non-falsification are provided.
Step S208, when any block chain node storing the voting process receives the transaction information of the first user accessing the block chain network, verifying the access right of the first user according to an intelligent contract of a pre-deployed access control strategy, and allowing the first user to acquire the transaction information when the access right of the first user is verified;
step S209, when any block chain node storing the voting result receives a transaction result in the second user access block chain network, verifying whether the second user is a trusted node, and when the second user is a trusted user, allowing the second user to access the voting result.
Specifically, the points from step S208 to step S209 that are the same as or similar to the points from step S106 to step S107 can be referred to the related descriptions from step S106 to step S107, and are not repeated herein.
According to the embodiment of the application, the digital signature corresponding to the correlation of the voting transfer currency is associated with the voting transfer currency through the second block chain node, the voting transfer currency after the digital signature is associated is transferred to the account corresponding to any voting option, and after the voting transfer currency including the digital signature is received through the first block chain node, whether the data signature is matched with the identity information of any node in the second block chain node with the authority is verified. If the identity information of the second block chain node with the authority is matched with the identity information of any node in the second block chain node with the authority, the corresponding voting transfer coin is judged to be valid after the digital signature is verified successfully, the voting data security is guaranteed, and finally the voting result is broadcasted in the block chain, so that the voting of the legal voting user is guaranteed to be valid voting, and the voting data security and the fairness in the creditor conference are further guaranteed.
EXAMPLE III
Corresponding to the voting method of the above embodiment, fig. 5 shows a structural block diagram of the voting system provided in the embodiment of the present application, and for convenience of illustration, only the part related to the embodiment of the present application is shown, where the voting system 500 includes a plurality of block link nodes, and the plurality of block link nodes includes at least one first block link node 501 and a plurality of second block link nodes 502:
after the first block chain node 501 detects a voting instruction, a voting option and a voting user identifier are obtained;
the first block chain node 501 creates an account for each voting choice according to the voting options;
the first block link node 501 sends a voting money transfer coin to a second block link node corresponding to the voting user identifier;
the second blockchain node 502 transfers the voting money to an account corresponding to any voting option, and selects corresponding transaction information from the second blockchain node to any voting option to broadcast in a blockchain network, so that the nodes in the blockchain network store the corresponding transaction information;
the second blockchain node 502 selects corresponding transaction information according to each vote to determine a voting result, and broadcasts the voting result in a blockchain, so that the nodes in the blockchain store the voting result;
when any block chain node storing the voting process receives transaction information of a first user accessing a block chain network, verifying the access right of the first user according to an intelligent contract of a pre-deployed access control strategy, and allowing the first user to acquire the transaction information when the access right verification of the first user passes;
and when any block chain link point storing the voting result receives a transaction result in a second user access block chain network, verifying whether the second user is a credible node, and when the second user is a credible user, allowing the second user to access the voting result.
In one embodiment, the second block link point specifically associates the digital signature with the voting transfer currency, transfers the voting transfer currency associated with the digital signature to an account corresponding to any voting option, and selects corresponding transaction information from the second block link node to any voting to broadcast in the block link network.
In one embodiment, the first blockchain node verifies whether the data signature matches the identity information of any of the second blockchain nodes having authority after receiving the voting transfer coins including the digital signature; and if the identity information of any node in the second block chain nodes with the authority is matched, judging that the corresponding voting money transfer is valid.
In one embodiment, the second block link point determines a voting result according to the determined valid voting money transfer money, and broadcasts the voting result in the block chain, so that the nodes in the block chain store the voting result.
In one embodiment, the second blockchain node further selects one encryption algorithm from a plurality of pre-stored encryption algorithms through a random algorithm as a target encryption algorithm; encrypting the digital signature through a target encryption algorithm to obtain an encrypted digital signature; sending the encrypted digital signature and the identifier corresponding to the target encryption algorithm to an account corresponding to any voting option; and each encryption algorithm in the pre-stored plurality of encryption algorithms corresponds to one identifier.
In one embodiment, the first blockchain node further selects a corresponding decryption algorithm as a target decryption algorithm according to the received identifier; and decrypting the received encrypted digital signature according to the target decryption algorithm to obtain the digital signature.
In one embodiment, said verifying whether said second user is a trusted user comprises: verifying whether the identity information of the second user meets the identity information of a preset credible condition; and when the identity information of the second user meets the identity information of a preset credible condition, judging that the second user is a credible user.
It should be noted that, for the information interaction, execution process, and other contents between the above-mentioned devices/units, the specific functions and technical effects thereof are based on the same concept as those of the embodiment of the method of the present application, and specific reference may be made to the part of the embodiment of the method, which is not described herein again.
Example four
As shown in fig. 6, an embodiment of the present application further provides a voting system comprising a plurality of blockchain nodes, each blockchain node 600 comprising at least one processor 601, a memory 602 and a computer program 603 stored in said memory 602 and operable on said processor 601. The processor 601 of each blockchain node, when executing the computer program 603, collectively implements the steps in each voting method embodiment described above.
The blockchain node 600 may include, but is not limited to, a plurality of blockchain nodes including at least one first blockchain node and a plurality of second blockchain nodes. Those skilled in the art will appreciate that fig. 6 is merely an example of a blockchain node 600, and does not constitute a limitation of blockchain node 600, and may include more or fewer components than shown, or combine certain components, or different components, e.g., the computing device may also include input-output devices, network access devices, buses, etc.
The Processor 601 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 602 may be an internal storage unit of the blockchain node 600, such as a hard disk or a memory of the blockchain node 600. The memory 602 may also be an external storage device of the blockchain node 600, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the blockchain node 600. Further, the memory 602 may also include both internal storage units and external storage devices of the blockchain node 600. The memory 602 is used to store the computer programs and other programs and data required by the computing device. The memory 602 may also be used to temporarily store data that has been output or is to be output.
It should be clear to those skilled in the art that, for convenience and simplicity of description, the foregoing division of the functional units and modules is only used for illustration, and in practical applications, the above function distribution may be performed by different functional units and modules as needed, that is, the internal structure of the apparatus may be divided into different functional units or modules to perform all or part of the above described functions. Each functional unit and module in the embodiments may be integrated in one processing unit, or each unit may exist alone physically, or two or more units are integrated in one unit, and the integrated unit may be implemented in a form of hardware, or in a form of software functional unit. In addition, specific names of the functional units and modules are only for convenience of distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working processes of the units and modules in the system may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and reference may be made to the related descriptions of other embodiments for parts that are not described or illustrated in a certain embodiment.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided by the present invention, it should be understood that the disclosed apparatus/computing device and method may be implemented in other ways. For example, the above-described apparatus/computing device embodiments are merely illustrative, and for example, the division of the modules or units is merely a logical division, and other divisions may be realized in practice, for example, multiple units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated module, if implemented in the form of a software functional unit and sold or used as a separate product, may be stored in a computer-readable storage medium. Based on such understanding, all or part of the flow of the method according to the embodiments of the present invention may also be implemented by a computer program, which may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the method embodiments described above may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer-readable medium may contain suitable additions or subtractions depending on the requirements of legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer-readable media may not include electrical carrier signals or telecommunication signals in accordance with legislation and patent practice.
The above-mentioned embodiments are only used for illustrating the technical solutions of the present invention, and not for limiting the same; although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some technical features may be equivalently replaced; such modifications and substitutions do not substantially depart from the spirit and scope of the embodiments of the present invention, and are intended to be included within the scope of the present invention.

Claims (10)

1. A voting method applied to a voting system comprising a plurality of blockchain nodes, the method comprising:
after a voting instruction is detected through the first block chain link point, voting options and voting user identifications are obtained;
the first block chain link point creates an account for each voting choice according to the voting options;
the first block chain node sends a voting transfer coin to a second block chain node corresponding to the voting user identifier;
transferring the voting transfer money to an account corresponding to any voting option through the second block chain node point, and selecting corresponding transaction information from the second block chain node to any voting to broadcast in a block chain network so that the corresponding transaction information is stored in the nodes in the block chain network;
selecting corresponding transaction information according to each vote to determine a voting result, and broadcasting the voting result in the block chain so that nodes in the block chain store the voting result;
when any block chain node storing the voting process receives transaction information of a first user accessing a block chain network, verifying the access right of the first user according to an intelligent contract of a pre-deployed access control strategy, and allowing the first user to acquire the transaction information when the access right of the first user passes the verification;
and when any block chain link point storing the voting result receives a transaction result in a second user access block chain network, verifying whether the second user is a credible node, and when the second user is a credible user, allowing the second user to access the voting result.
2. The method of claim 1, wherein the transferring the account number corresponding to any one voting choice through the second block link point, and the broadcasting of the transaction information corresponding to the second block link node selection to any one voting in a block link network, comprises:
and associating the digital signature with the voting transfer coin through the second block chain link point, transferring the voting transfer coin associated with the digital signature to an account corresponding to any voting option, and selecting corresponding transaction information from any voting to the second block chain node to broadcast in the block chain network.
3. The method of claim 2, wherein after associating the digital signature with the voting transfer money through the second block link point, and transferring the voting transfer money associated with the digital signature to an account corresponding to any one voting choice, the method further comprises:
after receiving the voting transfer currency comprising the digital signature through the first block chain node, verifying whether the data signature is matched with the identity information of any node in the second block chain node with the authority;
and if the identity information of any node in the second block chain nodes with the authority is matched, judging that the corresponding voting money transfer is valid.
4. The method of claim 3, wherein selecting the corresponding transaction information according to each vote to determine a voting result and broadcasting the voting result in a blockchain comprises:
and determining a voting result according to the judged valid voting transfer money, and broadcasting the voting result in the block chain.
5. The method of claim 4, wherein associating the digital signature with the voting transfer money through the second block link point, and transferring the voting transfer money after the digital signature is associated to the account number corresponding to any voting choice comprises:
the second block chain link point selects one encryption algorithm from a plurality of pre-stored encryption algorithms through a random algorithm to serve as a target encryption algorithm;
encrypting the digital signature through a target encryption algorithm to obtain an encrypted digital signature;
sending the encrypted digital signature and the identifier corresponding to the target encryption algorithm to an account corresponding to any voting option; and each encryption algorithm in the pre-stored plurality of encryption algorithms corresponds to one identifier.
6. The method of claim 5, wherein verifying that the data signature matches the identity information of any of the second blockchain nodes having the authority after receiving the voting money including the digital signature through the first blockchain node comprises:
the first block chain link point selects a corresponding decryption algorithm according to the received identifier to serve as a target decryption algorithm;
and decrypting the received encrypted digital signature according to the target decryption algorithm to obtain the digital signature.
7. The method according to any one of claims 1 to 6, wherein the verifying whether the second user is a trusted user comprises:
verifying whether the identity information of the second user meets the identity information of a preset credible condition;
and when the identity information of the second user meets the identity information of a preset credible condition, judging that the second user is a credible user.
8. A voting system, characterized in that the voting system comprises a plurality of blockchain nodes, including a first blockchain node and a second blockchain node;
after the first block chain link point detects a voting instruction, a voting option and a voting user identifier are obtained;
the first block chain link point creates an account for each voting choice according to the voting options;
the first block chain node sends a voting transfer coin to a second block chain node corresponding to the voting user identifier;
the second block chain node transfers the voting transfer money to an account corresponding to any voting option, and selects corresponding transaction information from the second block chain node to any voting option to broadcast in the block chain network, so that the nodes in the block chain network store the corresponding transaction information;
the second block chain link point selects corresponding transaction information according to each vote to determine a voting result, and broadcasts the voting result in the block chain so as to enable the nodes in the block chain to store the voting result;
when any block chain node storing the voting process receives transaction information of a first user accessing a block chain network, verifying the access right of the first user according to an intelligent contract of a pre-deployed access control strategy, and allowing the first user to acquire the transaction information when the access right of the first user passes the verification;
and when any block chain link point storing the voting result receives a transaction result in a second user access block chain network, verifying whether the second user is a credible node, and when the second user is a credible user, allowing the second user to access the voting result.
9. A voting system comprising a memory, a processor and a computer program stored in the memory and executable on the processor, wherein the processor implements the method of any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1 to 7.
CN202210587596.4A 2022-05-27 2022-05-27 Voting method, system and storage medium Pending CN115001783A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210587596.4A CN115001783A (en) 2022-05-27 2022-05-27 Voting method, system and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210587596.4A CN115001783A (en) 2022-05-27 2022-05-27 Voting method, system and storage medium

Publications (1)

Publication Number Publication Date
CN115001783A true CN115001783A (en) 2022-09-02

Family

ID=83028866

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210587596.4A Pending CN115001783A (en) 2022-05-27 2022-05-27 Voting method, system and storage medium

Country Status (1)

Country Link
CN (1) CN115001783A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115604121A (en) * 2022-11-27 2023-01-13 中国信息通信研究院(Cn) Industrial Internet service processing method, device and equipment based on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110245183A (en) * 2019-05-05 2019-09-17 上海链度科技有限公司 A kind of encrypted electronic voting system and method based on alliance's block chain technology
CN111355719A (en) * 2020-02-25 2020-06-30 深圳市万物云科技有限公司 Community voting method, device, equipment and storage medium based on block chain technology
CN111416709A (en) * 2020-03-18 2020-07-14 腾讯科技(深圳)有限公司 Voting method, device, equipment and storage medium based on block chain system

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110245183A (en) * 2019-05-05 2019-09-17 上海链度科技有限公司 A kind of encrypted electronic voting system and method based on alliance's block chain technology
CN111355719A (en) * 2020-02-25 2020-06-30 深圳市万物云科技有限公司 Community voting method, device, equipment and storage medium based on block chain technology
CN111416709A (en) * 2020-03-18 2020-07-14 腾讯科技(深圳)有限公司 Voting method, device, equipment and storage medium based on block chain system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115604121A (en) * 2022-11-27 2023-01-13 中国信息通信研究院(Cn) Industrial Internet service processing method, device and equipment based on block chain
CN115604121B (en) * 2022-11-27 2023-03-14 中国信息通信研究院 Industrial Internet service processing method, device and equipment based on block chain

Similar Documents

Publication Publication Date Title
CN108492180B (en) Asset management method and device and electronic equipment
CN111429254B (en) Business data processing method and device and readable storage medium
CN110046996B (en) Data processing method and device
KR102025837B1 (en) Access control system with blockchain network and smart contract
CN101908106B (en) Memory system with versatile content control
CN113537984A (en) Content verification method and device based on block chain and electronic equipment
CA3017579A1 (en) Systems and methods for providing a personal distributed ledger
CN109388957B (en) Block chain-based information transfer method, device, medium and electronic equipment
CN111476572B (en) Block chain-based data processing method, device, storage medium and equipment
CN109039652B (en) Digital certificate generation and application method
CN102981980A (en) Method for control access in storage device
CN113472720B (en) Digital certificate key processing method, device, terminal equipment and storage medium
CN110517145B (en) Data transaction method based on multi-block chain and related equipment
CN110908786A (en) Intelligent contract calling method, device and medium
CN105868970A (en) Authentication method and electronic device
KR20190107601A (en) Method and system for the generation of user-initiated federated identities
CN112950201B (en) Node management method and related device applied to block chain system
CN111949335A (en) Method and apparatus for sharing financial data
CN115131022B (en) Block chain based digital asset transaction method, device, equipment and medium
CN116192405A (en) Electronic voting method and related device
CN115001783A (en) Voting method, system and storage medium
KR101876672B1 (en) Digital signature method using block chain and system performing the same
CN110134837B (en) Information management method and device
CN113395257B (en) Method and device for realizing tax data processing system
CN116258494A (en) Copyright transaction circulation method and device based on blockchain and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination