CN115204856B - Block chain crossing method and related equipment - Google Patents

Block chain crossing method and related equipment Download PDF

Info

Publication number
CN115204856B
CN115204856B CN202211107148.6A CN202211107148A CN115204856B CN 115204856 B CN115204856 B CN 115204856B CN 202211107148 A CN202211107148 A CN 202211107148A CN 115204856 B CN115204856 B CN 115204856B
Authority
CN
China
Prior art keywords
user side
funds
default
time
exchange
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202211107148.6A
Other languages
Chinese (zh)
Other versions
CN115204856A (en
Inventor
秦素娟
温巧燕
吴少阳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing University of Posts and Telecommunications
Original Assignee
Beijing University of Posts and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing University of Posts and Telecommunications filed Critical Beijing University of Posts and Telecommunications
Priority to CN202211107148.6A priority Critical patent/CN115204856B/en
Publication of CN115204856A publication Critical patent/CN115204856A/en
Application granted granted Critical
Publication of CN115204856B publication Critical patent/CN115204856B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1059Inter-group management mechanisms, e.g. splitting, merging or interconnection of groups
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Abstract

The application provides a blockchain crossing method and related equipment. The hash value is encrypted and verified to judge whether the hash value is tampered in the transmission process, a transaction withdrawal mechanism under various conditions is set to realize transaction withdrawal in a transaction time lock, and limit duration of multiple stages in the default fund and blockchain asset exchange process and different punishment mechanisms respectively corresponding to the limit duration are set to reduce the occurrence of malicious default conditions. According to the scheme, the default transaction rate and the overtime transaction amount on the blockchain network are reduced, so that congestion of the blockchain network is avoided, and the risk of digital assets of a user is reduced.

Description

Block chain crossing method and related equipment
Technical Field
The present disclosure relates to the field of blockchain technologies, and in particular, to a blockchain crossing method and related devices.
Background
Blockchains are a technique that enables collective maintenance of a reliable database by means of decentralization and de-trust. In the development of blockchain technology, different blockchain types are generated, and the blockchains of different types may have technical heterogeneity, so that efficient data circulation and value transfer between the different blockchains are difficult.
To realize value circulation, assets among different blockchains need to be exchanged, and hash locking is a main blockchain cross-chain technology. For hash locking in the related art, a large number of timeout transactions are easily generated due to lack of penalty mechanism, resulting in congestion of the blockchain network.
Disclosure of Invention
Accordingly, it is an object of the present application to provide a blockchain crossing method and related apparatus to solve or partially solve the above-mentioned problems.
In a first aspect of the present application, a blockchain cross-linking method is provided, including:
the first user side divides the first asset into a first exchange fund and a first default fund according to a preset component proportion, and locks the first default fund into a first default fund pool; the second user side divides the second asset into a second exchange fund and a second default fund according to the component proportion, and locks the second default fund into a second default fund pool;
the first user terminal randomly constructs an original image value, and hashes the original image value according to a preselected hash function to obtain a hash value;
the first user side locks the first exchange funds according to the hash value to obtain the locked first exchange funds, and sets a first time lock;
The first user side signs the hash value by using a private key to obtain a message digest, and sends the hash value and the message digest to the second user side under a blockchain;
the second user side verifies the hash value, and in response to determining that the hash value is not tampered in the transmission process, the second user side locks the second exchange funds according to the hash value to obtain locked second exchange funds, and sets a second time lock;
the first user side unlocks the locked second exchange funds so as to acquire the second exchange funds before the end time of the second time lock;
the second user side unlocks the locked first exchange funds so as to acquire the first exchange funds before the end time of the first time lock;
the first user side releases first default funds in the first default fund pool and sends the first default funds to the second user side; and the second user side releases and sends the second default funds in the second default funds pool to the first user side.
In a second aspect of the present application, there is provided a blockchain cross-chain device, comprising:
The initial locking module is configured to divide the first asset into a first exchange fund and a first default fund according to a preset component proportion by the first user side, and lock the first default fund into a first default fund pool; the second user side divides the second asset into a second exchange fund and a second default fund according to the component proportion, and locks the second default fund into a second default fund pool;
the construction module is configured to randomly construct an original image value by the first user terminal, and hash the original image value according to a preselected hash function to obtain a hash value;
the first locking module is configured to lock the first exchange funds first asset according to the hash value by the first user side to obtain a locked first exchange funds first asset, and set a first time lock;
the sending module is configured to sign the hash value by using a private key by the first user side to obtain a message digest, and send the hash value and the message digest to the second user side under a blockchain;
the second locking module is configured to verify the hash value by the second user side, and in response to determining that the hash value is not tampered in the transmission process, the second user side locks the second asset of the second exchange funds according to the hash value to obtain a locked second asset of the second exchange funds, and sets a second time lock;
The first unlocking module is configured to unlock the locked second exchange funds second asset by the first user side so as to acquire the second exchange funds second asset before the end time of the second time lock;
the second unlocking module is configured to unlock the locked first exchange funds first asset by the second user side so as to acquire the first exchange funds first asset before the end time of the first time lock;
the release module is configured to release and send the first default funds in the first default funds pool to the second user side by the first user side; and the second user side releases and sends the second default funds in the second default funds pool to the first user side.
In a third aspect of the present application, there is provided an electronic device comprising a memory, a processor and a computer program stored on the memory and executable by the processor, characterized in that the processor implements the method according to the first aspect when executing the computer program.
As can be seen from the above, the blockchain cross-link method and the related device provided by the application determine whether the hash value is tampered in the transmission process by encrypting and verifying the hash value, and set default funds to prevent various malicious default conditions, so as to reduce default transaction rate and timeout transaction amount on the blockchain network, avoid congestion of the blockchain network, and reduce risk of digital assets of users.
Drawings
In order to more clearly illustrate the technical solutions of the present application or related art, the drawings that are required to be used in the description of the embodiments or related art will be briefly described below, and it is apparent that the drawings in the following description are only embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort to those of ordinary skill in the art.
FIG. 1 is a flow chart of a blockchain cross-chain method in accordance with an embodiment of the present application;
FIG. 2 is a block chain crossing device according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the present application more apparent, the following detailed description of the embodiments of the present application is given with reference to the accompanying drawings.
It should be noted that unless otherwise defined, technical or scientific terms used in the embodiments of the present application should be given the ordinary meaning as understood by one of ordinary skill in the art to which the present application belongs. The terms "first," "second," and the like, as used in embodiments of the present application, do not denote any order, quantity, or importance, but rather are used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that elements or items preceding the word are included in the element or item listed after the word and equivalents thereof, but does not exclude other elements or items. The terms "connected" or "connected," and the like, are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. "upper", "lower", "left", "right", etc. are used merely to indicate relative positional relationships, which may also be changed when the absolute position of the object to be described is changed.
Blockchains are a technique that enables collective maintenance of a reliable database by means of decentralization and de-trust. In the development of blockchain technology, different blockchain types are generated, and the blockchains of different types may have technical heterogeneity, so that efficient data circulation and value transfer between the different blockchains are difficult. To achieve value circulation, assets between different blockchains need to be exchanged through blockchain cross-chain technology.
Cross-chain on a blockchain is the ability to pass value across the barriers between chains by some technique, such that value originally stored on a particular blockchain is converted to value on another chain, thereby enabling the circulation of value. The mainstream cross-chain technology is notary technology, side chain technology and hash locking technology. Introducing a commonly trusted third party as an intermediary based on a notary mechanism, and verifying and forwarding a cross-chain message by the commonly trusted intermediary; a chain crossing technology based on a side chain is adopted, a blockchain (side chain) is additionally started, the bitcoin asset on the main chain is transferred to the side chain, and conversely, the asset on the side chain can be transferred back to the main chain; based on the hash locking cross-chain technology, on the basis of intelligent contracts, two parties are enabled to lock the asset first, and if the original image value of the correct hash value is input in the specified time, the transaction can be completed.
However, in the related art, the processing performance of the cross-chain technology based on hash locking has yet to be optimized. In response to an attacker creating a large number of cross-chain transactions under the chain in a short time and deliberately timeout these cross-chain transactions, a lot of timeout transaction information will be caused on the chain, eventually leading to congestion of the blockchain network and failure to operate properly. For hash locking in the related art, a punishment mechanism is lack, so that a party not adhering to the convention has lower default cost, so that a large number of overtime transactions are easy to generate on a chain, and congestion of a blockchain network and invalid transactions among users are caused.
In view of this, the embodiments of the present application provide a blockchain cross-linking method and related devices, by encrypting and verifying a hash value to determine whether the hash value is tampered in a transmission process, setting a transaction withdrawal mechanism under multiple conditions to implement transaction withdrawable in a transaction time lock, and setting constraint durations of multiple stages in a default fund and blockchain asset exchange process and different penalty mechanisms corresponding to the constraint durations respectively to reduce occurrence of a malicious default condition, thereby reducing default transaction rate and timeout transaction amount on a blockchain network, avoiding congestion of the blockchain network, improving speed of cross-linking transaction, and reducing risks of user digital assets.
It should be noted that, in the embodiment of the present application, the first ue and the second ue are respectively located in different blockchains. In the present specification, the first user terminal may be a user in a bitcoin network, and the second user terminal is a user in an ethernet network; or the first user terminal is a user of the Ethernet network, and the second user terminal is a user of the bitcoin network.
FIG. 1 illustrates a flow diagram of a blockchain cross-chain method 100 in accordance with an embodiment of the present application. As shown in fig. 1, the method 100 may include the following steps.
Step S101, a first user side divides a first asset into a first exchange fund and a first default fund according to a preset component proportion, and locks the first default fund into a first default fund pool; and the second user side divides the second asset into a second exchange fund and a second default fund according to the component proportion, and locks the second default fund into a second default fund pool.
In this embodiment, the first user side and the second user side divide the respective assets into the assets for exchange (first exchange funds/second exchange funds) and the assets for default punishment (first default funds/second default funds) according to the preset duty ratio, and set the first default funds pool/second default funds pool to lock the first default funds/second default funds. For example, the first user side uses 95% of the X bitcoin on the account as the first exchange funds, uses 5% of the X bitcoin as the first default funds, and locks the first default funds in the first default funds pool; and the second user side takes 95% of the Y pieces of Ethernet coins on the account as second exchange funds, takes 5% of the Y pieces of Ethernet coins as second default funds, and locks the second default funds in a second default fund pool. In this way, the locked first default funds, second default funds may be used to penalize the default condition, thereby reducing timeout transactions. The specific penalty mechanism will be described later.
In implementation, the time when the first user end completes locking the first default funds and the time when the second user end completes locking the second default funds need to meet contracts, wherein the contracts are agreed by the first user end and the second user end before the transaction begins. Specifically, in response to the first client not locking the first default funds into the first pool of default funds prior to the initial limit time in the contract, the second client may terminate the transaction by broadcasting; in response to the second client not locking the second default funds into the second pool of default funds prior to the initial limit time, the first client may terminate the transaction by broadcasting. In this way, when one of the first user side and the second user side does not obey the contract at the beginning of the transaction, the transaction is ended, the influence on the completion time of the subsequent steps is avoided, the overtime transaction is reduced, and the normal operation of the double-chain asset exchange transaction is promoted to a certain extent.
Step S102, the first user terminal randomly constructs an original image value, and hashes the original image value according to a preselected hash function to obtain a hash value.
In this embodiment, the first ue randomly constructs a string s as a primary image value, and hashes the constructed primary image value with a hash function to obtain a hash value h, i.e. calculates
Figure 527569DEST_PATH_IMAGE001
A hash value is obtained. The hash function is determined by the first user side and the second user side in the consensus stage before the transaction starts, and can be commonly supported by the blockchain (bit coin network) of the first user side and the blockchain (Ethernet network) of the second user side. For example, SHA-256 hash functions supported by both bitcoin and Ethernet networks.
Step 103, the first user side locks the first exchange funds according to the hash value to obtain the locked first exchange funds, and sets a first time lock.
In this embodiment, the first client locks the first exchange funds (95% of the X bitcoins on the account of the first client) in the first fund pool by Ha Xisuo (the hash value obtained above).
In this embodiment, the first user side sets a first time lock to limit the time for the subsequent second user side to unlock the first exchange funds in the first fund pool. Specifically, in response to the second user side not unlocking and acquiring the first exchange funds before the end time of the first time lock, the first exchange funds in the first funds pool are returned to the account of the first user side, and the transaction is ended.
In particular, for setting the first time lock, the first client needs to adhere to the setting limit of the first time lock in the contract agreed with the second client before the transaction starts, that is, the set ending time of the first time lock is later than the agreed first lower limit and earlier than the agreed first upper limit. Specific definitions for the agreed first lower limit and first upper limit will be described later.
In this embodiment, the first user side sets an unlock condition for the first exchange funds. The second user side provides a primary image value corresponding to the hash value for locking the first exchange funds before the end time of the first time lock, and the primary image value is used for unlocking the first exchange funds.
Step S104, the first user terminal signs the hash value by using a private key to obtain a message digest, and sends the hash value and the message digest to the second user terminal under a blockchain.
In this embodiment, for the completion time of the first ue sending the hash value and the message digest to the second ue, the time limit in the agreed contract needs to be satisfied. Specifically, in response to the first client not transmitting the hash value and the message digest to the second client under the blockchain before the first limit time in the contract, the second client may terminate the transaction by broadcasting, and the first client releases and transmits the first default funds in the first default funds pool to the second client. It can be appreciated that in the transmission process of the hash value and the message digest, due to transmission errors or delays caused by abnormal intelligent contracts, the second user end cannot successfully receive the hash value and the message digest before the corresponding time limit, and the first user end does not need to send the first default fund to the second user end, and based on the intelligent contracts, abnormal conditions can be broadcasted in the whole network and transactions can be terminated.
Step S105, the second user side verifies the hash value, and in response to determining that the hash value is not tampered in the transmission process, the second user side locks the second exchange funds according to the hash value to obtain locked second exchange funds, and sets a second time lock.
In this embodiment, the second ue verifies the received hash value, and in response to determining that the value obtained by decrypting the received message digest by the second ue using the public key of the first ue is consistent with the hash value, it is determined that the hash value is not tampered in the transmission process. It should be understood that, if the value obtained by decrypting the message digest is inconsistent with the hash value, the hash value is tampered in the transmission process, and thus the second user terminal cannot perform subsequent operations. Therefore, whether the hash value is tampered in the transmission process or not is judged by encrypting and verifying the hash value, and the safety and atomicity of the cross-chain transaction are ensured.
In this embodiment, the second user side locks the second exchange funds (95% of the Y ethernet coins on the account of the second user side) in the second fund pool by using the received hash value.
In implementation, the second user side locks the second exchange funds to obtain the completion time of the locked second exchange funds, so that the time limit in the agreed contract needs to be met. Specifically, in response to the second user side not locking the second exchange funds according to the received hash value before the second limit time in the contract to obtain the locked second exchange funds, the first user side may terminate the transaction by broadcasting, and the second user side releases and sends the second default funds in the second default funds pool to the first user side. It can be understood that, in the process of locking the second exchange funds by the second user end, due to errors or delays caused by abnormal intelligent contracts, the second user end cannot complete locking the second exchange funds before the second limiting time, the second user end does not need to send the second default funds to the first user end, and based on the intelligent contracts, abnormal conditions can be broadcasted in the whole network and transactions can be terminated.
In this embodiment, the second user side sets a second time lock to limit the time for the subsequent first user side to unlock the second exchange funds in the second fund pool. Specifically, in response to the first user side not unlocking and acquiring the second exchange funds before the end time of the second time lock, the second exchange funds in the second funds pool are returned to the account of the second user side, and the transaction is ended.
In particular, for setting the second time lock, the second client needs to adhere to the setting restriction for the second time lock in the agreed contract, that is, the set ending time of the second time lock is later than the agreed second lower limit and earlier than the agreed second upper limit. Specific definitions of the second lower limit and the second upper limit for convention will be described later.
In this embodiment, the second user side sets an unlock condition for the second exchange funds. The first user side provides a primary image value corresponding to the hash value for locking the second exchange funds before the end time of the second time lock, and the primary image value is used for unlocking the second exchange funds.
Step S106, the first user side unlocks the locked second exchange funds to obtain the second exchange funds before the end time of the second time lock.
In this embodiment, the first user side sends the original image value to the second user side to unlock the second exchange funds, so as to obtain the second exchange funds.
In implementation, for the duration of unlocking the second exchange funds by the first user, the duration limit in the agreed contract needs to be satisfied. After the second user side locks the second exchange funds according to the hash value to obtain the locked second exchange funds, the second user side can terminate the transaction through broadcasting in response to the first user side not unlocking the locked second exchange funds within the first limit time in the contract, and the first user side releases and sends the first default funds in the first default funds pool to the second user side. It will be appreciated that in response to the transaction ending, a first exchange of funds in the first pool of funds will be returned to the account of the first user and a second exchange of funds in the second pool of funds will be returned to the account of the second user.
Step S107, the second user side unlocks the locked first exchange funds to acquire the first exchange funds before the end time of the first time lock.
In this embodiment, the second user side unlocks the first exchange funds according to the primary image value sent by the first user side, so as to obtain the first exchange funds.
In implementation, for the duration of unlocking the first exchange funds by the second user side, the duration limit in the agreed contract needs to be satisfied. After the first user side unlocks the locked second exchange funds to obtain the second exchange funds, the first user side can terminate the transaction by broadcasting in response to the second user side not unlocking the locked first exchange funds within a second limit duration in the contract, and the second user side releases and sends the second default funds in the second default funds pool to the first user side. It will be appreciated that in response to the transaction ending, the first exchange funds will be returned to the account of the first user and the second exchange funds will be returned to the account of the second user.
Step S108, the first user side releases and sends first default funds in the first default fund pool to the second user side; and the second user side releases and sends the second default funds in the second default funds pool to the first user side.
In this embodiment, in response to the first user side acquiring the first exchange funds before the end time of the second time lock, and the second user side acquiring the first exchange funds before the end time of the first time lock, and the situation that no first user side or second user side violates the contract in the transaction process, the first default funds in the first default funds pool and the second default funds in the second default funds pool are released, and the first default funds and the second default funds in the second default funds pool are sent to the account of the other party. Thus, the first user side and the second user side successfully complete the cross-link transaction, and the exchange of all the assets of the two sides is realized. That is, the first user side successfully completes the exchange of the X bitcoins on the account with the Y Ethernet coins on the account of the second user side.
According to the embodiment of the application, before the cross-chain transaction starts, the first user terminal and the second user terminal negotiate under the blockchain to achieve consensus. Specifically, in response to determining that the selected hash function is commonly supported by the blockchain of the first user side and the blockchain of the second user side, determining that the first user side has a corresponding first personal account on the blockchain of the second user side, determining that the second user side has a corresponding second personal account on the blockchain of the first user side, determining an initial limit time, a first limit time, a second limit time, a first limit duration and a second limit duration, determining a first lower limit and a first upper limit of an end time of the first time lock, determining a second lower limit and a second upper limit of an end time of the second time lock, and determining that the first user side and the second user side agree under the blockchain. In this way, by setting time limits of multiple stages in the cross-chain transaction process, different punishment mechanisms corresponding to the time limits are set for each time limit, thereby reducing the occurrence of malicious default conditions and further reducing the default transaction rate and the overtime transaction amount on the blockchain network.
Further, in response to the first user side and the second user side achieving consensus under the blockchain, the first user side and the second user side broadcast the first limit time, the second limit time, the first limit time and the second limit time, the first lower limit and the first upper limit of the end time of the first time lock, and the second lower limit and the second upper limit of the end time of the second time lock.
In some embodiments, the second client terminates the transaction by broadcasting in response to the first client not locking the first default funds into a first pool of default funds prior to the initial limit time; and in response to the second client not locking the second default funds into a second pool of default funds prior to the initial limit time, the first client terminates the transaction by broadcasting.
In some embodiments, in response to the first client not sending the hash value and the message digest under a blockchain to a second client prior to the first limit time, the second client terminates the transaction by broadcasting and the first client releases and sends a first default funds in the first default funds pool to the second client.
In some embodiments, in response to the second user terminal not locking the second exchange funds according to the hash value prior to the second limit time to obtain a locked second exchange funds, the first user terminal terminates the transaction by broadcasting and the second user terminal releases and sends a second default funds in the second default funds pool to the first user terminal.
In some alternative embodiments, after the second user side locks the second exchange funds according to the hash value to obtain the locked second exchange funds, in response to the first user side not unlocking the locked second exchange funds within the first limited duration, the second user side terminates the transaction by broadcasting, and the first user side releases and sends the first default funds in the first default funds pool to the second user side. It will be appreciated that in response to the transaction ending, a first exchange of funds in the first pool of funds will be returned to the account of the first user and a second exchange of funds in the second pool of funds will be returned to the account of the second user.
In some alternative embodiments, after the first user side unlocks the locked second exchange funds to obtain the second exchange funds, the first user side terminates the transaction by broadcasting in response to the second user side not unlocking the locked first exchange funds within the second limit duration, and the second user side releases and sends the second default funds in the second default funds pool to the first user side. It will be appreciated that in response to the transaction ending, the first exchange funds will be returned to the account of the first user and the second exchange funds will be returned to the account of the second user.
Further, for a second lower limit and a second upper limit of the end time of the second time lock, the second lower limit is a time when the second limit time passes through the first limit time, and the second upper limit is a time when the second limit time passes through 1.5 times the first limit time; for a first lower limit and a first upper limit of the end time of the first time lock, the first lower limit is the time when the second upper limit passes the second limiting time period, and the first upper limit is the time when the second upper limit passes 1.5 times the second limiting time period. It will be appreciated that by setting a first upper limit on the end time of the first time lock, congestion caused by too many locks on the blockchain for a long period of time is prevented.
In some embodiments, in response to the end of the first time lock being earlier than a first lower limit or later than a first upper limit, the second user terminates the transaction by broadcasting, and the first user releases and sends a first default funds in the first pool of default funds to the second user.
In some embodiments, in response to the end time of the second time lock being earlier or later than a second lower limit or a second upper limit, the first user end terminates the transaction by broadcasting and the second user end releases and sends a second default funds in the second default funds pool to the first user end. It will be appreciated that in response to the transaction ending, a first exchange of funds in the first pool of funds will be returned to the account of the first user and a second exchange of funds in the second pool of funds will be returned to the account of the second user.
It can be appreciated that, in the cross-link transaction process, the first user side or the second user side does not need to perform the penalty mechanism because the intelligent contract is abnormal and causes the set time limit to be exceeded, and based on the intelligent contract, the abnormal situation is broadcasted in the whole network and the transaction is terminated.
Further, in some embodiments, responsive to the first or second client having an asset withdrawal requirement and meeting the withdrawal condition, the first or second client terminates the transaction by broadcasting. Wherein the withdrawal condition comprises: the first user terminal does not acquire the second exchange funds before the end time of the second time lock, and the first user terminal and the second user terminal carry out signature authorization. In this way, the transaction within the transaction time lock is made retractable by setting the transaction retraction mechanism.
It should be noted that some embodiments of the present application are described above. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments described above and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
Based on the same technical concept, the present application also provides a blockchain cross-chain device 200 corresponding to any of the above embodiment methods.
Referring to fig. 2, the blockchain cross-chain device 200 includes:
an initial locking module 201 configured to divide a first asset into a first exchanged funds and a first default funds according to a preset component ratio by a first user side, and lock the first default funds into a first default funds pool; the second user side divides the second asset into a second exchange fund and a second default fund according to the component proportion, and locks the second default fund into a second default fund pool;
the construction module 202 is configured to randomly construct a primary image value by the first user terminal, and hash the primary image value according to a preselected hash function to obtain a hash value;
a first locking module 203, configured to lock the first exchange funds first asset according to the hash value by the first user side to obtain a locked first exchange funds first asset, and set a first time lock;
a sending module 204, configured to sign the hash value by using a private key by the first user side to obtain a message digest, and send the hash value and the message digest to the second user side under a blockchain;
A second locking module 205 configured to verify the hash value by the second user, and in response to determining that the hash value is not tampered with in the transmission process, the second user locks the second asset of the second exchange funds according to the hash value to obtain a locked second asset of the second exchange funds, and sets a second time lock;
a first unlocking module 206 configured to unlock the locked second exchange funds second asset by the first user side to acquire the second exchange funds second asset before the end of the second time lock;
a second unlocking module 207 configured to unlock the locked first exchange funds first asset by the second user side to acquire the first exchange funds first asset before the end of the first time lock;
a release module 208 configured to release and send the first default funds in the first default funds pool to the second user side; and the second user side releases and sends the second default funds in the second default funds pool to the first user side.
The blockchain cross-chain device 200 encrypts and verifies the hash value by using the sending module 204 and the second locking module 205 to determine whether the hash value is tampered in the transmission process, so that the security and atomicity of cross-chain transaction are ensured; the default funds are set by the initial locking module 201 to prevent various malicious default conditions, so that the default transaction rate and the overtime transaction amount on the blockchain network are reduced, the congestion of the blockchain network is avoided, and the speed of the cross-chain transaction is improved.
For convenience of description, the above devices are described as being functionally divided into various modules, respectively. Of course, the functions of each module may be implemented in the same piece or pieces of software and/or hardware when implementing the present application.
The apparatus of the foregoing embodiments is configured to implement the corresponding blockchain cross-linking method in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiments, which are not described herein.
Based on the same technical concept, the application also provides an electronic device corresponding to the method of any embodiment, which comprises a memory, a processor and a computer program stored on the memory and executable by the processor, wherein the processor realizes the blockchain crossing method according to any embodiment when executing the computer program.
Fig. 3 shows a more specific hardware architecture of an electronic device according to this embodiment, where the device may include: a processor 1010, a memory 1020, an input/output interface 1030, a communication interface 1040, and a bus 1050. Wherein processor 1010, memory 1020, input/output interface 1030, and communication interface 1040 implement communication connections therebetween within the device via a bus 1050.
The processor 1010 may be implemented by a general-purpose CPU (Central Processing Unit ), microprocessor, application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits, etc. for executing relevant programs to implement the technical solutions provided in the embodiments of the present disclosure.
The Memory 1020 may be implemented in the form of ROM (Read Only Memory), RAM (Random Access Memory ), static storage device, dynamic storage device, or the like. Memory 1020 may store an operating system and other application programs, and when the embodiments of the present specification are implemented in software or firmware, the associated program code is stored in memory 1020 and executed by processor 1010.
The input/output interface 1030 is used to connect with an input/output module for inputting and outputting information. The input/output module may be configured as a component in a device (not shown) or may be external to the device to provide corresponding functionality. Wherein the input devices may include a keyboard, mouse, touch screen, microphone, various types of sensors, etc., and the output devices may include a display, speaker, vibrator, indicator lights, etc.
Communication interface 1040 is used to connect communication modules (not shown) to enable communication interactions of the present device with other devices. The communication module may implement communication through a wired manner (such as USB, network cable, etc.), or may implement communication through a wireless manner (such as mobile network, WIFI, bluetooth, etc.).
Bus 1050 includes a path for transferring information between components of the device (e.g., processor 1010, memory 1020, input/output interface 1030, and communication interface 1040).
It should be noted that although the above-described device only shows processor 1010, memory 1020, input/output interface 1030, communication interface 1040, and bus 1050, in an implementation, the device may include other components necessary to achieve proper operation. Furthermore, it will be understood by those skilled in the art that the above-described apparatus may include only the components necessary to implement the embodiments of the present description, and not all the components shown in the drawings.
The electronic device of the foregoing embodiment is configured to implement the corresponding blockchain spanning method in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which is not described herein.
Those of ordinary skill in the art will appreciate that: the discussion of any of the embodiments above is merely exemplary and is not intended to suggest that the scope of the application (including the claims) is limited to these examples; the technical features of the above embodiments or in the different embodiments may also be combined within the idea of the present application, the steps may be implemented in any order, and there are many other variations of the different aspects of the embodiments of the present application as described above, which are not provided in detail for the sake of brevity.
Additionally, well-known power/ground connections to Integrated Circuit (IC) chips and other components may or may not be shown within the provided figures, in order to simplify the illustration and discussion, and so as not to obscure the embodiments of the present application. Furthermore, the devices may be shown in block diagram form in order to avoid obscuring the embodiments of the present application, and this also takes into account the fact that specifics with respect to implementation of such block diagram devices are highly dependent upon the platform on which the embodiments of the present application are to be implemented (i.e., such specifics should be well within purview of one skilled in the art). Where specific details (e.g., circuits) are set forth in order to describe example embodiments of the application, it should be apparent to one skilled in the art that embodiments of the application can be practiced without, or with variation of, these specific details. Accordingly, the description is to be regarded as illustrative in nature and not as restrictive.
While the present application has been described in conjunction with specific embodiments thereof, many alternatives, modifications, and variations of those embodiments will be apparent to those skilled in the art in light of the foregoing description. For example, other memory architectures (e.g., dynamic RAM (DRAM)) may use the embodiments discussed.
The present embodiments are intended to embrace all such alternatives, modifications and variances which fall within the broad scope of the appended claims. Accordingly, any omissions, modifications, equivalents, improvements and/or the like which are within the spirit and principles of the embodiments are intended to be included within the scope of the present application.

Claims (8)

1. A blockchain crossing method, comprising:
the first user side divides the first asset into a first exchange fund and a first default fund according to a preset component proportion, and locks the first default fund into a first default fund pool; the second user side divides the second asset into a second exchange fund and a second default fund according to the component proportion, and locks the second default fund into a second default fund pool; the time for the first user side to lock the first default funds and the time for the second user side to lock the second default funds are required to meet contracts; the contracts are agreed contracts which are agreed by the first user side and the second user side before the transaction starts;
The first user terminal randomly constructs an original image value, and hashes the original image value according to a preselected hash function to obtain a hash value;
the first user side locks the first exchange funds according to the hash value to obtain the locked first exchange funds, and sets a first time lock to limit the time for the second user side to unlock the first exchange funds; wherein the end time of the first time lock is later than a first lower limit and earlier than a first upper limit;
the first user side signs the hash value by using a private key to obtain a message digest, and sends the hash value and the message digest to the second user side under a blockchain;
the second user side verifies the hash value, and in response to determining that the hash value is not tampered in the transmission process, the second user side locks the second exchange funds according to the hash value to obtain locked second exchange funds, and sets a second time lock; wherein the end time of the second time lock is later than a second lower limit and earlier than a second upper limit;
the first user side unlocks the locked second exchange funds so as to acquire the second exchange funds before the end time of the second time lock;
The second user side unlocks the locked first exchange funds so as to acquire the first exchange funds before the end time of the first time lock;
the first user side releases first default funds in the first default fund pool and sends the first default funds to the second user side; the second user side releases and sends second default funds in the second default fund pool to the first user side;
before the first user side divides a first asset into a first exchange fund and a first default fund according to a preset component proportion and locks the first default fund in a first default fund pool, the first user side and the second user side achieve consensus under a blockchain;
the first ue and the second ue agree under a blockchain, including:
determining an initial limit time, a first limit time, a second limit time, a first limit time and a second limit time, determining a first lower limit and a first upper limit of the end time of the first time lock, determining a second lower limit and a second upper limit of the end time of the second time lock, and judging that the first user side and the second user side agree under a block chain;
The second lower limit is a time when the second limit time passes through the first limit time period, and the second upper limit is a time when the second limit time passes through 1.5 times the first limit time period;
the first lower limit is a time when the second upper limit passes through the second limiting time period, and the first upper limit is a time when the second upper limit passes through 1.5 times the second limiting time period;
the method further comprises the steps of:
responsive to the first client not locking the first default funds in a first pool of default funds prior to the initial limit time, the second client terminating the transaction by broadcasting;
responsive to the second client not locking the second default funds in a second pool of default funds prior to the initial limit time, the first client terminating the transaction by broadcasting;
in response to the first client not transmitting the hash value and the message digest under a blockchain to a second client before the first limit time, the second client terminating the transaction by broadcasting and the first client releasing and transmitting a first default funds in the first default funds pool to the second client; responding to the abnormal condition of the intelligent contract, so that the first user side does not send the hash value and the message digest to a second user side under a blockchain before the first limiting moment, broadcasting the abnormal condition and terminating the transaction based on the whole network of the intelligent contract, and the first user side does not need to send the first default fund to the second user side;
Responding to the second user end not locking the second exchange funds according to the hash value before the second limiting moment to obtain the locked second exchange funds, wherein the first user end terminates the transaction through broadcasting, and releases and sends second default funds in the second default funds pool to the first user end; responding to the abnormal condition of the intelligent contract, so that the second user side does not lock the second exchange funds according to the hash value before the second limiting moment to obtain locked second exchange funds, broadcasting the abnormal condition and terminating the transaction based on the whole network of the intelligent contract, and the second user side does not need to send second default funds to the first user side;
responsive to the end time of the first time lock being earlier than a first lower limit or later than a first upper limit, the second client terminating the transaction by broadcasting, and the first client releasing and sending a first default fund in the first default fund pool to the second client;
responding to the fact that the ending time of the second time lock is earlier than a second lower limit or later than a second upper limit, the first user end terminates the transaction through broadcasting, and the second user end releases and sends second default funds in the second default funds pool to the first user end;
After the second user side locks the second exchange funds according to the hash value to obtain locked second exchange funds, responding to the first user side not unlocking the locked second exchange funds within the first limit time, terminating the transaction by broadcasting by the second user side, and releasing and sending the first default funds in the first default funds pool to the second user side by the first user side;
after the first user side unlocks the locked second exchange funds to obtain the second exchange funds, the first user side terminates the transaction by broadcasting in response to the second user side not unlocking the locked first exchange funds within the second limit duration, and the second user side releases and sends the second default funds in the second default funds pool to the first user side.
2. The method of claim 1, wherein the responding to determining that the hash value has not been tampered with during transmission comprises:
and in response to determining that the value obtained by decrypting the message digest by the second user side by using the public key of the first user side is consistent with the hash value, judging that the hash value is not tampered in the transmission process.
3. The method of claim 1, wherein the first client and the second client agree under a blockchain, further comprising:
in response to determining that the hash function is commonly supported by the blockchain of the first user and the blockchain of the second user, determining that the first user has a corresponding first personal account on the blockchain of the second user, and determining that the second user has a corresponding second personal account on the blockchain of the first user, determining that the first user and the second user agree under the blockchain.
4. A method according to claim 3, characterized in that the method further comprises:
and in response to the first user side and the second user side achieving consensus under a blockchain, the first user side and the second user side broadcast the first limit time, the second limit time, the first lower limit and the first upper limit, and the second lower limit and the second upper limit.
5. The method according to claim 1, wherein the method further comprises:
responding to the first user side or the second user side with the asset withdrawal requirement and meeting the withdrawal condition, and terminating the transaction by broadcasting by the first user side or the second user side;
Wherein the withdrawal condition comprises: the first user terminal does not acquire the second exchange funds before the end time of the second time lock, and the first user terminal and the second user terminal perform signature authorization.
6. The method of claim 1, wherein the first client unlocking the locked second exchange funds comprises: sending the primary image value to the second user side to unlock the second exchange funds;
the second user end unlock the locked first exchange funds, including: and unlocking the first exchange funds according to the original image value sent by the first user side.
7. A blockchain crossing device, comprising:
the initial locking module is configured to divide the first asset into a first exchange fund and a first default fund according to a preset component proportion by the first user side, and lock the first default fund into a first default fund pool; the second user side divides the second asset into a second exchange fund and a second default fund according to the component proportion, and locks the second default fund into a second default fund pool; the time for the first user side to lock the first default funds and the time for the second user side to lock the second default funds are required to meet contracts; the contracts are agreed contracts which are agreed by the first user side and the second user side before the transaction starts;
The construction module is configured to randomly construct an original image value by the first user terminal, and hash the original image value according to a preselected hash function to obtain a hash value;
the first locking module is configured to lock the first exchange funds first asset according to the hash value by the first user side to obtain a locked first exchange funds first asset, and set a first time lock to limit the time for the second user side to unlock the first exchange funds; wherein the end time of the first time lock is later than a first lower limit and earlier than a first upper limit;
the sending module is configured to sign the hash value by using a private key by the first user side to obtain a message digest, and send the hash value and the message digest to the second user side under a blockchain;
the second locking module is configured to verify the hash value by the second user side, and in response to determining that the hash value is not tampered in the transmission process, the second user side locks the second asset of the second exchange funds according to the hash value to obtain a locked second asset of the second exchange funds, and sets a second time lock; wherein the end time of the second time lock is later than a second lower limit and earlier than a second upper limit;
The first unlocking module is configured to unlock the locked second exchange funds second asset by the first user side so as to acquire the second exchange funds second asset before the end time of the second time lock;
the second unlocking module is configured to unlock the locked first exchange funds first asset by the second user side so as to acquire the first exchange funds first asset before the end time of the first time lock;
the release module is configured to release and send the first default funds in the first default funds pool to the second user side by the first user side; the second user side releases and sends second default funds in the second default fund pool to the first user side;
the first user side and the second user side are mutually agreed under a blockchain before the first user side divides the first asset into first exchange funds and first default funds according to the preset component proportion and locks the first default funds in a first default fund pool;
the consensus module is specifically configured to determine an initial limit time, a first limit time, a second limit time, a first limit duration and a second limit duration, determine a first lower limit and a first upper limit of an end time of the first time lock, determine a second lower limit and a second upper limit of an end time of the second time lock, and determine that the first user side and the second user side agree under a blockchain;
The second lower limit is a time when the second limit time passes through the first limit time period, and the second upper limit is a time when the second limit time passes through 1.5 times the first limit time period;
the first lower limit is a time when the second upper limit passes through the second limiting time period, and the first upper limit is a time when the second upper limit passes through 1.5 times the second limiting time period;
the apparatus further includes a termination module configured to:
responsive to the first client not locking the first default funds in a first pool of default funds prior to the initial limit time, the second client terminating the transaction by broadcasting;
responsive to the second client not locking the second default funds in a second pool of default funds prior to the initial limit time, the first client terminating the transaction by broadcasting;
in response to the first client not transmitting the hash value and the message digest under a blockchain to a second client before the first limit time, the second client terminating the transaction by broadcasting and the first client releasing and transmitting a first default funds in the first default funds pool to the second client; responding to the abnormal condition of the intelligent contract, so that the first user side does not send the hash value and the message digest to a second user side under a blockchain before the first limiting moment, broadcasting the abnormal condition and terminating the transaction based on the whole network of the intelligent contract, and the first user side does not need to send the first default fund to the second user side;
Responding to the second user end not locking the second exchange funds according to the hash value before the second limiting moment to obtain the locked second exchange funds, wherein the first user end terminates the transaction through broadcasting, and releases and sends second default funds in the second default funds pool to the first user end; responding to the abnormal condition of the intelligent contract, so that the second user side does not lock the second exchange funds according to the hash value before the second limiting moment to obtain locked second exchange funds, broadcasting the abnormal condition and terminating the transaction based on the whole network of the intelligent contract, and the second user side does not need to send second default funds to the first user side;
responsive to the end time of the first time lock being earlier than a first lower limit or later than a first upper limit, the second client terminating the transaction by broadcasting, and the first client releasing and sending a first default fund in the first default fund pool to the second client;
responding to the fact that the ending time of the second time lock is earlier than a second lower limit or later than a second upper limit, the first user end terminates the transaction through broadcasting, and the second user end releases and sends second default funds in the second default funds pool to the first user end;
After the second user side locks the second exchange funds according to the hash value to obtain locked second exchange funds, responding to the first user side not unlocking the locked second exchange funds within the first limit time, terminating the transaction by broadcasting by the second user side, and releasing and sending the first default funds in the first default funds pool to the second user side by the first user side;
after the first user side unlocks the locked second exchange funds to obtain the second exchange funds, the first user side terminates the transaction by broadcasting in response to the second user side not unlocking the locked first exchange funds within the second limit duration, and the second user side releases and sends the second default funds in the second default funds pool to the first user side.
8. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable by the processor, wherein the processor implements the method of any one of claims 1 to 6 when the computer program is executed.
CN202211107148.6A 2022-09-13 2022-09-13 Block chain crossing method and related equipment Active CN115204856B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211107148.6A CN115204856B (en) 2022-09-13 2022-09-13 Block chain crossing method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211107148.6A CN115204856B (en) 2022-09-13 2022-09-13 Block chain crossing method and related equipment

Publications (2)

Publication Number Publication Date
CN115204856A CN115204856A (en) 2022-10-18
CN115204856B true CN115204856B (en) 2023-05-09

Family

ID=83571844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211107148.6A Active CN115204856B (en) 2022-09-13 2022-09-13 Block chain crossing method and related equipment

Country Status (1)

Country Link
CN (1) CN115204856B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111798271A (en) * 2020-06-18 2020-10-20 昆明大棒客科技有限公司 Method, device, equipment and storage medium for implementing bonus pool
CN114363050A (en) * 2021-12-31 2022-04-15 北京交通大学 Decentralized cross-link protocol communication method based on notarization and Hash locking

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB201709760D0 (en) * 2017-06-19 2017-08-02 Nchain Holdings Ltd Computer-Implemented system and method
SG10202006451QA (en) * 2020-07-03 2021-02-25 Alipay Labs Singapore Pte Ltd Managing transactions in multiple blockchain networks
CN112053146A (en) * 2020-08-24 2020-12-08 杭州云象网络技术有限公司 Cross-chain reward and punishment method based on anonymous service and Hash locking
CN114240409A (en) * 2021-10-29 2022-03-25 上海对外经贸大学 Cross-chain asset interaction method based on improved Hash time lock

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111798271A (en) * 2020-06-18 2020-10-20 昆明大棒客科技有限公司 Method, device, equipment and storage medium for implementing bonus pool
CN114363050A (en) * 2021-12-31 2022-04-15 北京交通大学 Decentralized cross-link protocol communication method based on notarization and Hash locking

Also Published As

Publication number Publication date
CN115204856A (en) 2022-10-18

Similar Documents

Publication Publication Date Title
KR100315991B1 (en) Digitally signing agreements from remotely located nodes
CN112446785A (en) Cross-chain transaction method, system, device, equipment and storage medium
US8528104B2 (en) Security and ticketing system control and management
JP2012530311A5 (en)
US8688983B2 (en) Data transmission method using an acknowledgement code comprising hidden authentication bits
CN110570196A (en) Transaction data processing method and device, terminal equipment and storage medium
CN109041021B (en) File transmission method based on Bluetooth, terminal equipment and storage medium
CN111476573B (en) Account data processing method, device, equipment and storage medium
CN111985007A (en) Contract signing and executing method and device based on block chain
CN112055019A (en) Method for establishing communication channel and user terminal
KR101253683B1 (en) Digital Signing System and Method Using Chained Hash
CN106656993B (en) Dynamic verification code verification method and device
US8079078B2 (en) Encryption apparatus, program for use therewith, and method for use therewith
CN109033895A (en) A kind of light-weight authentication system based on improved DAPUF circuit
CN111523889B (en) Multiple signature implementation method, device, equipment and storage medium
KR100815072B1 (en) Electronic value exchange system and electronic value exchange method
CN116506134B (en) Digital certificate management method, device, equipment, system and readable storage medium
CN115204856B (en) Block chain crossing method and related equipment
CN109377366B (en) Block chain-based evidence-based processing method and device and storage medium
CN112541759A (en) Hidden transaction method and device based on UTXO model in block chain system and related products
CN105654295A (en) Transaction control method and client
CN113114638A (en) Access and verification method and system of alliance chain
CN108833448A (en) A kind of Windows login method for supporting mobile phone terminal safety certification
CN112333173B (en) Data transmission method, system, equipment and storage medium based on data provider
CN112544057B (en) Block chain node equipment, authentication method and device thereof and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant