CN115361390A - Method for joining a blockchain network, computer storage medium and electronic device - Google Patents

Method for joining a blockchain network, computer storage medium and electronic device Download PDF

Info

Publication number
CN115361390A
CN115361390A CN202211289952.0A CN202211289952A CN115361390A CN 115361390 A CN115361390 A CN 115361390A CN 202211289952 A CN202211289952 A CN 202211289952A CN 115361390 A CN115361390 A CN 115361390A
Authority
CN
China
Prior art keywords
information
node
target node
application
accessed
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202211289952.0A
Other languages
Chinese (zh)
Other versions
CN115361390B (en
Inventor
张钰雯
刘阳
杨兆鑫
池程
朱斯语
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Academy of Information and Communications Technology CAICT
Original Assignee
China Academy of Information and Communications Technology CAICT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Academy of Information and Communications Technology CAICT filed Critical China Academy of Information and Communications Technology CAICT
Priority to CN202211289952.0A priority Critical patent/CN115361390B/en
Publication of CN115361390A publication Critical patent/CN115361390A/en
Application granted granted Critical
Publication of CN115361390B publication Critical patent/CN115361390B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

A method, computer storage medium and electronic device for joining a block chain network relate to the technical field of block chains, the method is applied to access authorization service equipment and comprises the following steps: receiving an access request sent by a target node; acquiring node basic information, first to-be-accessed link information and a node application type of a target node from an access request; splicing the first information of the link to be accessed and the node application type to obtain a splicing result; determining node constraint information corresponding to the splicing result; determining the matching degree of the node basic information and the node constraint information; and under the condition that the access request is determined to be approved based on the matching degree, adding the target node into a first block chain network corresponding to the first information to be accessed, and matching the role of the target node in the first block chain network with the node application type. The method and the device can efficiently and reliably add the new node in the block chain network.

Description

Method for joining a blockchain network, computer storage medium and electronic device
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method, a computer storage medium, and an electronic device for joining a blockchain network.
Background
The Blockchain (Blockchain) is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, is essentially a decentralized database, and is a string of data blocks related by using a cryptography method. In some cases, a new node needs to be added in the blockchain network, and how to implement the addition of the new node is a problem to be solved for those skilled in the art.
Disclosure of Invention
Embodiments of the present application provide a method, a computer storage medium, and an electronic device for joining a blockchain network, so as to solve the above technical problems.
According to a first aspect of embodiments herein, there is provided a method for joining a blockchain network,
applied to access an authorized service device, the method comprises the following steps:
receiving an access request sent by a target node;
acquiring node basic information, first to-be-accessed link information and a node application type of the target node from the access request;
splicing the first information of the link to be accessed and the node application type to obtain a splicing result;
determining node constraint information corresponding to the splicing result;
determining the matching degree of the node basic information and the node constraint information;
and under the condition that the access request is determined to pass the examination based on the matching degree, adding the target node into a first block chain network corresponding to the first information to be accessed, and enabling the role of the target node in the first block chain network to be matched with the node application type.
In an optional example, after receiving the access request sent by the target node, the method further includes:
distributing application identification for the access request;
and sending the application identifier to the target node.
In one optional example, the method further comprises:
recording the association relation between the application identification and the first to-be-accessed link information in a first area under the condition that the access request is approved;
receiving a first access link updating request sent by the target node, wherein the first access link updating request carries second information of a to-be-accessed link and the application identifier;
and responding to the first access chain updating request, updating the access chain information associated with the application identifier in the first area from the first information of the to-be-accessed chain to the second information of the to-be-accessed chain, and switching the target node from joining the first blockchain network to joining a second blockchain network corresponding to the second to-be-accessed chain.
In an optional example, after the sending the application identifier to the target node, the method further includes:
receiving an application detail request carrying the application identifier sent by the target node;
responding to the application detail request, and determining application detail information corresponding to the access request, wherein the application detail information comprises: at least one of permission issuing information, an auditing state and an application state, the node basic information, the first to-be-accessed link information and the node application type;
and sending the application detail information to the target node.
In an optional example, after the sending the application identifier to the target node, the method further includes:
determining issuing information corresponding to the access request under the condition that the access request is approved, wherein the issuing information comprises: at least one item of issuing object information, installation package information and issuing basic information and the application identifier;
and sending the issuing information to the target node.
In one optional example, the method further comprises:
determining a node address of the target node based on the node basis information;
recording the association relation between the node address and the first to-be-accessed link information in a second area under the condition that the access request is approved;
receiving a second access link updating request sent by the target node, wherein the second access link updating request carries second information of a link to be accessed and the node address;
and responding to the second access link updating request, determining the latest recorded information of the to-be-accessed link in the second area, and switching the target node from the block chain network corresponding to the latest recorded information of the to-be-accessed link added in the second area to the second block chain network corresponding to the second information of the to-be-accessed link.
In an optional example, after the target node is added to a first blockchain network corresponding to the first information to be linked, and the target node is made to match the role in the first blockchain network with the node application type, the method further includes:
under the condition that a first preset condition is met, according to the node application type, canceling the corresponding authority of the target node in the first block chain network;
and under the condition of meeting a second preset condition, recovering the corresponding authority of the target node in the first block chain network according to the node application type.
In one alternative example of this, the user may,
before receiving the access request sent by the target node, the method further includes:
receiving a chain information acquisition request sent by the target node;
determining a plurality of pieces of chain information in response to the chain information acquisition request, wherein each piece of chain information comprises at least one of a chain name and a chain number;
sending the plurality of link information to the target node;
wherein the first to-be-accessed link information is selected from the plurality of link information;
and/or the presence of a gas in the gas,
before receiving the access request sent by the target node, the method further includes:
receiving an application type acquisition request sent by the target node;
responding to the application type acquisition request, and determining a plurality of application types;
sending the plurality of application types to the target node;
wherein the node application type is selected from the plurality of application types.
According to a second aspect of embodiments herein, there is provided a computer storage medium having a computer program stored thereon, which when executed by a processor, performs the steps of the method according to the first aspect as described above.
According to a third aspect of embodiments of the present application, there is provided an electronic device comprising one or more processors, and memory for storing one or more programs; the one or more programs, when executed by the one or more processors, implement the method of the first aspect as described above.
In the solution provided in the embodiment of the present application, after obtaining node basic information, first to-be-accessed link information, and a node application type of a target node from an access request sent by the target node, the first to-be-accessed link information and the node application type may be spliced, node constraint information corresponding to an obtained splicing result is determined, and a matching degree of the node basic information and the node constraint information is determined, so as to determine whether an audit on the access request passes by using the matching degree. For the condition that the access request passes the audit, the target node can be added into the first block chain network corresponding to the first to-be-accessed link information, and the role of the target node in the first block chain network is matched with the node application type, so that the target node is efficiently added into the first block chain network according to the requirement of a user, and the reliable access authentication is performed on the target node before the addition, therefore, the embodiment of the application can efficiently and reliably add a new node into the block chain network.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 shows one of the flow diagrams of a method for joining a blockchain network provided in an embodiment of the present application;
FIG. 2 is a block diagram of an access authorization service device in an embodiment of the present application;
fig. 3 shows a second flowchart of a method for joining a blockchain network provided in an embodiment of the present application;
fig. 4 shows a third flowchart of a method for joining a blockchain network provided in an embodiment of the present application;
fig. 5 shows a fourth flowchart of a method for joining a blockchain network provided in an embodiment of the present application;
fig. 6 shows a fifth flowchart of a method for joining a blockchain network provided in an embodiment of the present application;
fig. 7 shows a schematic structural diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
The embodiment of the application provides a method for joining a block chain network, which can be applied to an access authorization service device, wherein the access authorization service device can also be called an access authorization service platform or an access authorization service system.
It should be noted that, in order to support the method for joining the blockchain network provided in the embodiment of the present application, the access authorization service device needs to have a suitable operating environment.
Optionally, the hardware environment of the access authorization service device may satisfy at least one of the following: (1) The Central Processing Unit (CPU) is not lower than 2 cores; (2) the memory is not less than 4 cores; (3) the capacity of the hard disk is more than 512G; and (4) the display card is an independent display card with the display memory of more than 256M.
Optionally, the software environment of the access authorization service device may satisfy at least one of: (1) The operating system is Windows 7 and above, or CentOS7.5 (which is an open source and enterprise-level computer operating system); (2) The browser is above Google Chrome 63.0, or the browser is above Microsoft IE 8.0; (3) MySQL (which is a relational database management system) version is MySQL5.7.25.
Referring to fig. 1, a flowchart of a method for joining a blockchain network according to an embodiment of the present application is shown. As shown in fig. 1, the method includes step 110, step 120, step 130, step 140, step 150, and step 160, which are described below.
Step 110, receiving an access request sent by a target node.
It should be noted that the target node may be any node that requests to join a certain blockchain network, and the "target" in the target node does not constitute any limitation on the target node.
In step 110, an operation may be performed on the target node by a user (e.g., a platform user in fig. 2) to cause the target node to initiate an access request to the access authorization service device.
Optionally, the access request may be a hypertext Transfer Protocol (HTTP) request, the request mode of the access request may be POST, the access request may also be referred to as a License application, and the access request may be in the following form:
https://{url}/license/apply
[
{
"applicantBid":"",
"chainCode":"",
"chainName":"",
"nodeName":"",
"nodeBid":"",
"nodeOrg":"",
"linkName":"",
"linkPhone":"",
"linkEmail":"",
"equipmentInfo":["",""],
"remark":"",
"link":"",
"type":""
}
]
the above access request includes a plurality of parameters, and the description of each parameter can be seen in the following table 1:
Figure 713297DEST_PATH_IMAGE001
TABLE 1
And step 120, obtaining the node basic information, the first to-be-accessed link information and the node application type of the target node from the access request.
In step 120, the node base information, the first to-be-accessed link information, and the node application type of the target node may be directly extracted from the access request. Optionally, the node basic information may include a node address, a node name, a node operating unit name, a contact phone, a contact email, and the like in table 1; the first information of the to-be-accessed link may include the link id, the link name, etc. in table 1; the node application type may correspond to the application type in table 1.
And step 130, splicing the first information of the link to be accessed and the node application type to obtain a splicing result.
Alternatively, the first information to be accessed and the node application type may be in the form of characters or character strings, and a new character string may be obtained by connecting the first information to be accessed and the node application type by using preset characters (e.g., "+", "&", etc.), and the new character string may be used as a concatenation result of the first information to be accessed and the node application type.
And 140, determining node constraint information corresponding to the splicing result of the first to-be-accessed link information and the node application type.
It should be noted that all blockchain networks that need access verification by the access authorization service device, including but not limited to government affairs chain, business chain, etc., and all application types may be counted in advance. Based on all block chain networks and all application types determined by statistics, a plurality of combination modes can be formed, each combination mode comprises chain information corresponding to one block chain network and one application type, and the chain information and/or the application types in different combination modes are different. For each combination mode, the chain information and the application type in the combination mode can be spliced to obtain a splicing result, and therefore a plurality of splicing results corresponding to a plurality of combination modes one to one can be obtained.
Assuming that the chain information in a certain combination mode is a, and type B is applied, it can be determined which constraint conditions need to be satisfied by any node when the node is to become a node of type B in the blockchain network corresponding to a, and the combination of these constraint conditions can be used as the constraint information corresponding to the combination mode. In a similar manner, a plurality of constraint information corresponding to a plurality of combination modes one to one can be obtained, and then a plurality of splicing results corresponding to the plurality of combination modes one to one in the above text are combined to obtain a one to one correspondence relationship between the plurality of splicing results and the plurality of constraint information. In step 140, based on the one-to-one correspondence relationship, constraint information corresponding to the splicing result of the first to-be-accessed link information and the node application type can be efficiently and quickly determined, and the constraint information can be used as node constraint information.
And 150, determining the matching degree of the node basic information and the node constraint information.
Optionally, the node basic information may include basic information of the target node in each of the plurality of dimensions, and the node constraint information may include a constraint condition of each of the plurality of dimensions. In step 150, for each of the multiple dimensions, a matching degree corresponding to the dimension may be obtained by determining whether the basic information corresponding to the dimension meets a constraint condition corresponding to the dimension, a plurality of matching degrees corresponding to the multiple dimensions in a one-to-one manner may be obtained in a similar manner, and a matching degree between the node basic information and the node constraint information may be obtained by averaging or calculating a weighted average or a summation value of the obtained plurality of matching degrees.
And 160, adding the target node into the first block chain network corresponding to the first to-be-accessed link information under the condition that the access request is determined to pass the audit based on the matching degree of the node basic information and the node constraint information, and enabling the role of the target node in the first block chain network to be matched with the node application type.
In step 160, it may be determined whether the audit of the access request is passed based on the matching degree of the node basic information and the node constraint information. Optionally, in a case that the matching degree is greater than a preset matching degree, it may be determined that the access request is approved, and in a case that the matching degree is less than or equal to the preset matching degree, it may be determined that the access request is not approved. Of course, the basis for determining whether the access request is approved is not limited to the matching degree between the node basic information and the node constraint information, and may also include, for example, the integrity, accuracy, and the like of the information in the access request, so that the access request may be approved in an all-around and highlighted manner.
When the access request is approved, the access request can be granted, the target node is added into the first block chain network corresponding to the first to-be-accessed link information, and the role of the target node in the first block chain network is matched with the node application type, for example, when the node application type is 0 service node, the target node becomes a service node in the first block chain network, and when the node application type is 2 backbone node, the target node becomes a backbone node in the first block chain network.
And under the condition that the audit on the access request is not passed, the access request can be rejected, and at the moment, the target node cannot join the first block chain network.
In the embodiment of the application, after the node basic information, the first to-be-accessed link information and the node application type of the target node are obtained from the access request sent by the target node, the first to-be-accessed link information and the node application type are spliced, the node constraint information corresponding to the obtained splicing result is determined, and the matching degree of the node basic information and the node constraint information is determined, so that whether the audit on the access request is passed or not is determined by using the matching degree. For the condition that the access request passes the audit, the target node can be added into the first block chain network corresponding to the first to-be-accessed link information, and the role of the target node in the first block chain network is matched with the node application type, so that the target node is efficiently added into the first block chain network according to the requirement of a user, and the reliable access authentication is performed on the target node before the addition, therefore, the embodiment of the application can efficiently and reliably add a new node into the block chain network.
In an alternative example, as shown in fig. 3, prior to step 110, the method further comprises:
step 101, receiving a link information acquisition request sent by a target node;
step 102, responding to a chain information acquisition request, determining a plurality of chain information, wherein each chain information comprises at least one of a chain name and a chain number;
step 103, sending the plurality of link information to a target node;
the first information to be accessed is selected from a plurality of pieces of chain information.
Here, the user may operate on the target node to make the target node initiate a link information acquisition request to the access authorization service device.
Optionally, the link information obtaining request may be an HTTP request, the request manner of the link information obtaining request may be GET, and the link information obtaining request may be in the following form: https:// { url }/license/chainList.
In response to the received chain information acquisition request, the access authorization service device may determine all blockchain networks that need to be access-audited by itself, and further determine respective chain information of the blockchain networks, so as to obtain a plurality of chain information, where each chain information may include at least one of a chain name and a chain number, and the chain number may also be referred to as an AC code. Thereafter, the access authorization service device may return a response result of the chain information obtaining request (which is subsequently referred to as a first response result) to the target node, where the first response result may be in a JSON (JavaScript Object Notation) format, and a description of information included in the first response result may be referred to in table 2 below:
Figure 939879DEST_PATH_IMAGE002
thus, according to the first response result from the access authorization service device, the target node may display a plurality of pieces of chain information, and the user may select, according to the actual requirement, required chain information from the plurality of pieces of chain information, so that the target node initiates an access request carrying the chain information (i.e., the chain information serves as the above first to-be-accessed chain information), and thus, according to the actual requirement of the user, the target node may be accessed to the corresponding block chain network.
In an alternative example, as shown in fig. 4, prior to step 110, the method further comprises:
step 104, receiving an application type acquisition request sent by a target node;
step 105, responding to an application type acquisition request, and determining a plurality of application types;
step 106, sending the plurality of application types to a target node;
wherein the node application type is selected from a plurality of application types.
Here, the user may operate on the target node to make the target node initiate an application type obtaining request to the access authorization service device.
Optionally, the application type obtaining request may be an HTTP request, the request manner of the application type obtaining request may be GET, and the application type obtaining request may be in the following form: https:// { url }/license/applyTypeList.
In response to the received application type obtaining request, the access authorization service device may determine all application types, and return a response result (hereinafter referred to as a second response result) of the application type obtaining request to the target node, where the second response result may be in a JSON format, and the second response result may include each application type determined by the access authorization service device, and may be in the following form:
{
"data": {
"typeList": [
{
"msg": service node ",
"type": "0"
},
{
"msg": main chain super node ",
"type": "1"
},
{
"msg": backbone node ",
"type": "2"
},
{
"msg": out-of-block super node ",
"type": "3"
},
{
"msg": a supervisory node ",
"type": "4"
},
{
"msg": child chain common node ",
"type": "5"
},
{
"msg" means "the child chain goes out of a block consensus node",
"type": "6"
}
]
},
"errorCode": 0,
message 'operation is successful'
}
Thus, according to the second response result from the access authorization service device, the target node may display a plurality of application types, and the user may select a required application type from the plurality of application types according to an actual requirement, so that the target node initiates an access request carrying the application type (that is, the application type is used as the node application type in the foregoing description), thereby enabling the target node to join the corresponding blockchain network in a corresponding role according to the actual requirement of the user.
On the basis of the embodiment shown in fig. 1, as shown in fig. 5, after step 110, the method further comprises:
step 165, distributing application identification for the access request;
step 170, sending the application identifier to the target node.
Optionally, the application identifier may be an application number, and the application number may also be referred to as apply no; the application identifier may be in JSON format.
It should be noted that the application identifier has various applications, and the application identifier is described below by way of example.
In one embodiment, the method further comprises:
under the condition that the access request is approved, recording the association relationship between the application identification and the first to-be-accessed link information in the first area;
receiving a first access link updating request sent by a target node, wherein the first access link updating request carries second information of a to-be-accessed link and an application identifier;
and responding to the first access chain updating request, updating the access chain information associated with the application identifier in the first area from the first to-be-accessed chain information to the second to-be-accessed chain information, and switching the target node from being added into the first block chain network to being added into the second block chain network corresponding to the second to-be-accessed chain.
Alternatively, the first area may be a storage area local to the access authorization service device, and the first area may belong to a power-down non-lost storage area.
In this embodiment, in the case that the audit on the access request is passed, the association relationship between the application identifier and the first information of the to-be-accessed link may be stored in the first area to characterize the association between the application identifier and the first information of the to-be-accessed link.
Optionally, the user may operate on the target node, so that the target node initiates a first access link update request carrying the second to-be-accessed link information and the application identifier to the access authorization service device.
In this embodiment, the access authorization service device may have a license update chain function, and based on the license update chain function, may respond to the first access chain update request, update the access chain information associated with the application identifier in the first area from the first to-be-accessed chain information to the second to-be-accessed chain information, and switch the target node from being added to the first blockchain network to being added to the second blockchain network corresponding to the second to-be-accessed chain, so that, according to the application identifier, change of the blockchain network to which the target node is accessed may be quickly achieved.
In another specific embodiment, after sending the application identifier to the target node, the method further includes:
receiving an application detail request carrying an application identifier sent by a target node;
responding to the application detail request, and determining application detail information corresponding to the access request, wherein the application detail information comprises: at least one of the license issuing information, the auditing state and the application state, as well as the node basic information, the first to-be-accessed link information and the node application type;
and sending the application detail information to the target node.
Optionally, the user may operate on the target node to make the target node initiate the request for application details to the access authorization service device.
Alternatively, the request for details of application may be initiated by a call to a Serial Peripheral Interface (SPI), which may also be referred to as a license details request, the request for details of application may be an HTTP request, the request for details of application may be a POST, and the request for details of application may be in the form of:
https://{url}/license/detail
{
"applyNo":""
}
in response to the received application detail request, the access authorization service device may determine application detail information corresponding to the access request, and return a response result of the application detail request (which will be referred to as a third response result hereinafter) to the target node, where the third response result may include the application detail information, and the third response result may be in the following form:
{
"data": {
"applyTime": "1597729776000",
"contact": {
"email": "linkemail",
"name": "linkname",
"phone": "linkphone"
},
"device": [
"string1",
"string2"
],
"issue": {
"issuer": "abc",
"licenseDir": "licensedir",
"licenseId": [
{
"id": "1",
"validFrom": "2",
"validTo": "3"
}
],
"pkgDir": "pkgdir",
"remark": "test remark"
},
"node": {
"bid": "bid",
"chainCode": "code",
"chainName": "name",
"name": "nodename",
"org": "org",
"status": "2"
},
"type": "2",
"link": "1",
"status": "1"
},
"errCode": 0,
"msg" is successful "
}
The above third response result includes a plurality of parameters, and the description of each parameter can be found in the following table 3:
Figure 728974DEST_PATH_IMAGE003
TABLE 3
It should be noted that the application detail information may include: at least one of the permission issue information, the audit state and the application state, as well as the node basic information, the first to-be-accessed link information and the node application type, wherein the permission issue information may include an issuer, a file download address, issue id information, an issue remark and the like in table 3, the audit state may correspond to the node audit state in table 3, and the application state may be three possibilities of pending issue, issued and initialization.
In this embodiment, the access authorization service device may have a license detail function, and based on the license detail function, the query of the current processing state, the processing progress, and the like of the access request may be implemented in response to the request for applying details.
In another embodiment, after sending the application identifier to the target node, the method further includes:
and under the condition that the examination of the access request is passed, determining issuing information corresponding to the access request, wherein the issuing information comprises: at least one of signing and issuing object information, installation package information and issuing basic information, and an application identifier;
and sending the issuing information to the target node.
Alternatively, the issuance information may be in the form of:
{
"applyNo":"",
"issuer":"",
"licenseDir":"",
"licenseDirName":"",
"licenseId":[
{"id":"","validFrom":"","validTo":""}
],
"pkgDir":"",
"remark":""
}
the above issuance information includes a plurality of parameters, and the description of each parameter can be found in the following table 4:
Figure 800836DEST_PATH_IMAGE004
the issuance information may include: at least one of issuing object information, installation package information, issuing basis information, and an application identifier, the issuing object information may include an issuer in table 4, the installation package information may include an installation package directory in table 4, and the issuing basis information may include a license id, a validity period (start), a validity period (end), and the like in table 4.
In this embodiment, the access authorization service device may have a license issuing function, and according to the application identifier, the access authorization service device may send the issuing information based on the license issuing function when the access request is approved, so as to facilitate understanding of the permission of the access authorization service device for the target node.
Therefore, the application identifier can be organically applied to the use process of the license update chain function, the license detail function and the license issuing function of the access authorization service equipment in the embodiment of the application.
In one optional example, the method further comprises:
determining a node address of a target node based on the node basic information;
recording the association relation between the node address and the first to-be-accessed link information in the second area under the condition that the access request is approved;
receiving a second access link updating request sent by the target node, wherein the second access link updating request carries second information of a link to be accessed and a node address;
and responding to the second access chain updating request, determining the latest recorded information of the to-be-accessed chain in the second area, and switching the target node from the latest recorded information of the to-be-accessed chain added into the second area to a second block chain network corresponding to the second to-be-accessed chain.
Here, the node base information may include a node address of the target node, so that the node address of the target node may be directly extracted from the node base information.
Alternatively, the second area may be a storage area local to the access authorization service device, the second area may belong to a power-down non-lost storage area, and the second area may be different from the first area.
In the case that the access request is approved, the association relationship between the node address and the first information of the to-be-accessed link may be stored in the second area to characterize the association between the node address and the first information of the to-be-accessed link.
Optionally, the user may operate on the target node, so that the target node initiates a second access link update request carrying the second to-be-accessed link information and the node address to the access authorization service device.
The access authorization service equipment can have a license update chain function, and based on the license update chain function, can respond to a second access chain update request, determine the latest recorded information of the to-be-accessed chain in the second area, and switch the target node from the latest recorded information of the to-be-accessed chain added in the second area to a second block chain network corresponding to the second to-be-accessed chain, so that the change of the block chain network accessed by the target node can be quickly realized according to the node address.
In an optional example, the access authorization service device may receive a third access chain update request sent by the target node, where the third access chain update request may be in the form of:
https://{url}/license/updateChainCode
{
"applyNo":"",
"nodeBid":"",
"oldChainCode":"",
"chainCode":"",
"chainName":"",
"status":""
}
the above third access link update request includes a plurality of parameters, and the description of each parameter is shown in the following table 5:
Figure 991777DEST_PATH_IMAGE005
optionally, if the application number in the third access chain update request is not null, the blockchain network to which the target node is accessed may be preferentially changed according to the application number (corresponding to the application identifier in the foregoing), and if the application number in the third access chain update request is null, the blockchain network to which the target node is accessed may be changed according to the node address.
In an optional example, after the target node joins the first blockchain network, the target node may upload a license file, the request for uploading the license file may be an HTTP request, the request for uploading the license file may be in the form of a POST, and the request for uploading the license file may be in the form of:
{
"applyNo":"",
"nodeBid":"",
"chainCode":"",
"chainName":""
}
a description of the information in the request to upload the license file can be found in table 6 below:
Figure 858101DEST_PATH_IMAGE006
after the license file is successfully uploaded, the target node may receive the following response result (which will be referred to as a fourth response result in the following paragraphs):
{
"errorCode": 0,
"message": operation was successful,
"data": {
"hash":
"QmYKPNL4NJgRTwSjzntt2RidaGaJkyRpUZgn8tZnGibez2"
}
}
the fourth response result may be in JSON format, and the description of the information in the fourth response result may be referred to the following table 7:
Figure 649340DEST_PATH_IMAGE007
in an alternative example, as shown in fig. 6, after step 160, the method further comprises:
step 182, under the condition that the first preset condition is met, canceling the corresponding authority of the target node in the first block chain network according to the node application type;
and 184, under the condition that a second preset condition is met, recovering the corresponding authority of the target node in the first block chain network according to the node application type.
Optionally, the method may further comprise operating on the target node by the user to cause the target node to send the license deactivation request to the access authorization service device.
Alternatively, the license deactivation request may be an HTTP request, the request manner of the license deactivation request may be POST, and the license deactivation request may be in the following form:
https://{url}/license/ban
{
"applyNo":"",
"nodeBid":"",
"ban":""
}
the above license deactivation request includes a plurality of parameters, and the description of each parameter can be seen in the following table 8:
Figure 10045DEST_PATH_IMAGE008
it should be noted that the value of ban in the permission deactivation request may be specifically 1.
In the case of receiving the request for permission to deactivate from the target node, the first preset condition may be considered to be satisfied, and at this time, the access authentication service device may cancel the node authority of the target node in the first blockchain network according to the node application type, for example, in the case that the node application type is any kind of consensus node, the authority of the target node to participate in consensus voting, transaction execution, block verification, and transaction in the first blockchain network may be cancelled. In addition, the access authentication service device may also return a response result of the permission deactivation request to the target node (which is subsequently referred to as a fifth response result), where the fifth response result may be in a JSON format, and the fifth response result may be in the following form:
{
"errorCode": 0,
"message": operation was successful,
"data": {
"applyNoList": ["e73c50ae16fcd27a6debbedcd23ccfd1"]
}
}
the description of applynoist in the fifth response result can be found in the following table 9:
Figure 304760DEST_PATH_IMAGE009
thereafter, an operation may be performed by the user on the target node to cause the target node to send a permission recovery request to the access authorization service device.
Alternatively, the permission restoration request may be a GTTP request, the request mode of the permission restoration request may be POST, and the form of the permission restoration request may be similar to the permission deactivation request, except that the value of ban in the permission restoration request may be 2.
In the case of receiving the permission recovery request from the target node, it may be considered that the second preset condition is satisfied, and at this time, the access authentication service device may recover the node permission of the target node in the first blockchain network according to the node application type, for example, in the case where the node application type is any one of consensus nodes, it may recover the permission of the target node to participate in consensus voting, transaction execution, block verification, and transaction in the first blockchain network. In addition, the access authentication service device may further return a response result of the permission recovery request (which is subsequently referred to as a sixth response result) to the target node, where the sixth response result may be in a JSON format, and the fifth response result may be referred to as the sixth response result.
Therefore, in the embodiment of the application, the access authorization service device can provide a license start-stop function, and based on the license start-stop function, the corresponding authority of the target node in the first block chain network can be cancelled or recovered according to actual requirements.
In an optional example, the access authorization service device may receive a license application list request from the target node, where the license application list request may be an HTTP request, the license application list request may be requested in a POST manner, and the license application list request may be in the following form:
https://{url}/license/list
{
"applyNo":"",
"chainCode":"",
"type":[""],
"status":"",
"nodeName":"",
"nodeBid":"",
"applicantBid":"",
"pageStart":"",
"pageSize":""
}
the license application list request above includes a plurality of parameters, and the description of each parameter can be found in the following table 10:
Figure 873145DEST_PATH_IMAGE010
the access authorization service device may return a response result (hereinafter referred to as a seventh response result) of the license application list request to the target node, where the seventh response result may be in a JSON format, and the seventh response result may be in the following form:
{
"data": {
"licenseList": [
{
"applyNo": "",
"nodeName": "",
"nodeBid": "",
"chainName": "",
"applyTime": "",
"org": "",
"type": "",
"status": "",
"signReady": ""
}
],
"page": {
"pageStart": 1,
"pageSize": 10,
"pageTotal": 10
}
},
"errCode": 0,
"msg" is successful "
}
The information in the seventh response result can be seen in table 11 below:
Figure 403877DEST_PATH_IMAGE011
in an optional example, the access authorization service device may receive a license update request from the target node, where the license update request may be an HTTP request, the license update request may be requested by a POST, and the license update request may be in the following form:
https://{url}/license/update
{
"applyNo":"",
"link":"",
"linkName":"",
"linkPhone":"",
"linkEmail":"",
"equipmentInfo":["",""],
"remark":""
}
the license update request above includes a plurality of parameters, and the description of each parameter can be seen in the following table 12:
Figure 83120DEST_PATH_IMAGE012
in an alternative example, the architecture diagram of the access authorization service device may refer to fig. 2. As shown in fig. 2, the access authorization service device may include a License application module, an update module, a License issue module, and a License maintenance module; wherein the content of the first and second substances,
the License application module is used for processing the application of the user (equivalent to the access request in the above), and the License update module is used for updating the logic of the License content approved by the user (equivalent to the response to the License update request in the above);
the License issuing module is used for issuing License to a requester after auditing License application (which is equivalent to the access request in the above text) in a comprehensive and highlighted manner, and simultaneously storing information of different sub-chains and information of different License types;
the License maintenance module is used for being responsible for the starting and stopping of License (corresponding to the License starting and stopping function in the above) and maintaining the uploaded License file.
Based on the same inventive concept, an embodiment of the present application provides a computer storage medium, where a computer program is stored on the computer storage medium, and when the computer program is executed by a processor, the computer program implements the following steps:
receiving an access request sent by a target node;
acquiring node basic information, first to-be-accessed link information and node application types of a target node from an access request;
splicing the first information of the link to be accessed and the node application type to obtain a splicing result;
determining node constraint information corresponding to the splicing result;
determining the matching degree of the node basic information and the node constraint information;
and under the condition that the access request is determined to be approved based on the matching degree, adding the target node into a first block chain network corresponding to the first information to be accessed, and matching the role of the target node in the first block chain network with the node application type.
In an alternative example, the computer program when executed by the processor further implements the steps of:
after receiving an access request sent by a target node, distributing an application identifier for the access request;
and sending the application identifier to the target node.
In an alternative example, the computer program when executed by the processor further implements the steps of:
under the condition that the access request is approved, recording the association relationship between the application identification and the first to-be-accessed link information in the first area;
receiving a first access link updating request sent by a target node, wherein the first access link updating request carries second information of a to-be-accessed link and an application identifier;
and responding to the first access chain updating request, updating the access chain information associated with the application identifier in the first area from the first to-be-accessed chain information to the second to-be-accessed chain information, and switching the target node from being added into the first block chain network to being added into the second block chain network corresponding to the second to-be-accessed chain.
In an alternative example, the computer program when executed by the processor further implements the steps of:
after the application identifier is sent to the target node, an application detail request which is sent by the target node and carries the application identifier is received;
responding to the application detail request, and determining application detail information corresponding to the access request, wherein the application detail information comprises: at least one of the license issuing information, the auditing state and the application state, as well as the node basic information, the first to-be-accessed link information and the node application type;
and sending the application detail information to the target node.
In an alternative example, the computer program when executed by the processor further implements the steps of:
after the application identifier is sent to the target node, and under the condition that the access request is approved, issuing information corresponding to the access request is determined, wherein the issuing information comprises: at least one item of issuing object information, installation package information and issuing basic information and an application identifier;
and sending the issuing information to the target node.
In an alternative example, the computer program when executed by the processor further performs the steps of:
determining a node address of a target node based on the node basic information;
recording the association relation between the node address and the first to-be-accessed link information in the second area under the condition that the access request is approved;
receiving a second access link updating request sent by the target node, wherein the second access link updating request carries second information of a link to be accessed and a node address;
and responding to the second access chain updating request, determining the latest recorded information of the to-be-accessed chain in the second area, and switching the target node from the block chain network corresponding to the latest recorded information of the to-be-accessed chain added into the second area to the second block chain network corresponding to the second information of the to-be-accessed chain.
In an alternative example, the computer program when executed by the processor further implements the steps of:
after a target node is added into a first block chain network corresponding to first information of a to-be-accessed link, and the role of the target node in the first block chain network is matched with a node application type, under the condition that a first preset condition is met, according to the node application type, cancelling the corresponding authority of the target node in the first block chain network;
and under the condition of meeting a second preset condition, recovering the corresponding authority of the target node in the first block chain network according to the node application type.
In an alternative example, the computer program when executed by the processor further implements the steps of:
before receiving an access request sent by a target node, receiving a link information acquisition request sent by the target node;
determining a plurality of pieces of chain information in response to the chain information acquisition request, wherein each piece of chain information comprises at least one of a chain name and a chain number;
sending the plurality of link information to a target node;
the first information to be accessed is selected from a plurality of pieces of chain information.
In an alternative example, the computer program when executed by the processor further implements the steps of:
before receiving an access request sent by a target node, receiving an application type acquisition request sent by the target node;
responding to an application type acquisition request, and determining a plurality of application types;
sending the plurality of application types to a target node;
wherein the node application type is selected from a plurality of application types.
Based on the same inventive concept, the present embodiment provides an electronic device, referring to fig. 7, including a memory 701, a processor 702, a bus 703 and a computer program stored on the memory 701 and capable of running on the processor 702, where the processor 702 implements the following steps when executing the computer program:
receiving an access request sent by a target node;
acquiring node basic information, first to-be-accessed link information and a node application type of a target node from an access request;
splicing the first information of the link to be accessed and the node application type to obtain a splicing result;
determining node constraint information corresponding to the splicing result;
determining the matching degree of the node basic information and the node constraint information;
and under the condition that the access request is determined to be approved based on the matching degree, adding the target node into a first block chain network corresponding to the first information to be accessed, and matching the role of the target node in the first block chain network with the node application type.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
after receiving an access request sent by a target node, distributing an application identifier for the access request;
and sending the application identifier to the target node.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
under the condition that the access request is approved, recording the association relationship between the application identification and the first to-be-accessed link information in the first area;
receiving a first access link updating request sent by a target node, wherein the first access link updating request carries second information of a to-be-accessed link and an application identifier;
and responding to the first access chain updating request, updating the access chain information associated with the application identifier in the first area from the first to-be-accessed chain information to the second to-be-accessed chain information, and switching the target node from being added into the first block chain network to being added into the second block chain network corresponding to the second to-be-accessed chain.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
after the application identifier is sent to the target node, an application detail request which is sent by the target node and carries the application identifier is received;
responding to the application detail request, and determining application detail information corresponding to the access request, wherein the application detail information comprises: at least one of the license issuing information, the auditing state and the application state, as well as the node basic information, the first to-be-accessed link information and the node application type;
and sending the application detail information to the target node.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
after the application identifier is sent to the target node, and under the condition that the access request is approved, issuing information corresponding to the access request is determined, wherein the issuing information comprises: at least one item of issuing object information, installation package information and issuing basic information and an application identifier;
and sending the issuing information to the target node.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
determining a node address of a target node based on the node basic information;
recording the association relation between the node address and the first to-be-accessed link information in the second area under the condition that the access request is approved;
receiving a second access link updating request sent by the target node, wherein the second access link updating request carries second information of a link to be accessed and a node address;
and responding to the second access link updating request, determining the latest recorded information of the to-be-accessed link in the second area, and switching the target node from the block chain network corresponding to the latest recorded information of the to-be-accessed link added in the second area to the second block chain network corresponding to the second information of the to-be-accessed link.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
after a target node is added into a first block chain network corresponding to first information of a to-be-accessed link, and the role of the target node in the first block chain network is matched with a node application type, under the condition that a first preset condition is met, according to the node application type, cancelling the corresponding authority of the target node in the first block chain network;
and under the condition of meeting a second preset condition, recovering the corresponding authority of the target node in the first block chain network according to the node application type.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
before receiving an access request sent by a target node, receiving a link information acquisition request sent by the target node;
determining a plurality of pieces of chain information in response to the chain information acquisition request, wherein each piece of chain information comprises at least one of a chain name and a chain number;
sending the plurality of link information to a target node;
the first information to be accessed is selected from a plurality of pieces of chain information.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
before receiving an access request sent by a target node, receiving an application type acquisition request sent by the target node;
responding to an application type acquisition request, and determining a plurality of application types;
sending the plurality of application types to a target node;
wherein the node application type is selected from a plurality of application types.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all changes and modifications that fall within the scope of the present application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (10)

1. A method for joining a blockchain network, the method being applied to an access authorization service device, the method comprising:
receiving an access request sent by a target node;
acquiring node basic information, first to-be-accessed link information and a node application type of the target node from the access request;
splicing the first information of the link to be accessed and the node application type to obtain a splicing result;
determining node constraint information corresponding to the splicing result;
determining the matching degree of the node basic information and the node constraint information;
and under the condition that the access request is determined to pass the examination based on the matching degree, adding the target node into a first block chain network corresponding to the first information to be accessed, and enabling the role of the target node in the first block chain network to be matched with the node application type.
2. The method of claim 1, wherein after receiving the access request sent by the target node, the method further comprises:
distributing application identification for the access request;
and sending the application identifier to the target node.
3. The method of claim 2, further comprising:
recording the association relation between the application identification and the first to-be-accessed link information in a first area under the condition that the access request is approved;
receiving a first access link updating request sent by the target node, wherein the first access link updating request carries second information of a to-be-accessed link and the application identifier;
and responding to the first access chain updating request, updating the access chain information associated with the application identifier in the first area from the first information of the to-be-accessed chain to the second information of the to-be-accessed chain, and switching the target node from joining the first blockchain network to joining a second blockchain network corresponding to the second to-be-accessed chain.
4. The method of claim 2, wherein after sending the application identifier to the target node, the method further comprises:
receiving an application detail request carrying the application identifier sent by the target node;
responding to the application detail request, and determining application detail information corresponding to the access request, wherein the application detail information comprises: at least one of license issuing information, auditing state and application state, the node basic information, the first to-be-accessed link information and the node application type;
and sending the application detail information to the target node.
5. The method of claim 2, wherein after sending the application identifier to the target node, the method further comprises:
determining issuing information corresponding to the access request under the condition that the examination of the access request is passed, wherein the issuing information comprises: at least one item of issuing object information, installation package information and issuing basic information and the application identifier;
and sending the issuing information to the target node.
6. The method of claim 1, further comprising:
determining a node address of the target node based on the node basis information;
recording the association relation between the node address and the first to-be-accessed link information in a second area under the condition that the access request is approved;
receiving a second access link updating request sent by the target node, wherein the second access link updating request carries second information of a link to be accessed and the node address;
and responding to the second access chain updating request, determining the latest recorded information of the to-be-accessed chain in the second area, and switching the target node from the block chain network corresponding to the latest recorded information of the to-be-accessed chain added in the second area to the second block chain network corresponding to the second information of the to-be-accessed chain.
7. The method according to claim 1, wherein the target node is added to a first blockchain network corresponding to the first information to be accessed, and after the target node is made to match the role in the first blockchain network with the node application type, the method further comprises:
under the condition that a first preset condition is met, according to the node application type, canceling the corresponding authority of the target node in the first block chain network;
and under the condition of meeting a second preset condition, recovering the corresponding authority of the target node in the first block chain network according to the node application type.
8. The method of claim 1,
before receiving the access request sent by the target node, the method further includes:
receiving a link information acquisition request sent by the target node;
determining a plurality of pieces of chain information in response to the chain information acquisition request, wherein each piece of chain information comprises at least one of a chain name and a chain number;
sending the plurality of link information to the target node;
wherein the first to-be-accessed link information is selected from the plurality of link information;
and/or the presence of a gas in the gas,
before receiving the access request sent by the target node, the method further includes:
receiving an application type acquisition request sent by the target node;
responding to the application type acquisition request, and determining a plurality of application types;
sending the plurality of application types to the target node;
wherein the node application type is selected from the plurality of application types.
9. A computer storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 8.
10. An electronic device comprising one or more processors, and memory for storing one or more programs; the one or more programs, when executed by the one or more processors, implement the method of any of claims 1-8.
CN202211289952.0A 2022-10-21 2022-10-21 Method for joining a blockchain network, computer storage medium and electronic device Active CN115361390B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211289952.0A CN115361390B (en) 2022-10-21 2022-10-21 Method for joining a blockchain network, computer storage medium and electronic device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211289952.0A CN115361390B (en) 2022-10-21 2022-10-21 Method for joining a blockchain network, computer storage medium and electronic device

Publications (2)

Publication Number Publication Date
CN115361390A true CN115361390A (en) 2022-11-18
CN115361390B CN115361390B (en) 2023-01-20

Family

ID=84007873

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211289952.0A Active CN115361390B (en) 2022-10-21 2022-10-21 Method for joining a blockchain network, computer storage medium and electronic device

Country Status (1)

Country Link
CN (1) CN115361390B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106796688A (en) * 2016-12-26 2017-05-31 深圳前海达闼云端智能科技有限公司 Permission control method, device and system of block chain and node equipment
CN108702622A (en) * 2017-11-30 2018-10-23 深圳前海达闼云端智能科技有限公司 Mobile network's access authentication method, device, storage medium and block chain node
CN109150607A (en) * 2018-08-22 2019-01-04 中链科技有限公司 Classification management-control method and device for block chain network
CN111131286A (en) * 2019-12-30 2020-05-08 百度在线网络技术(北京)有限公司 Access control method, device, equipment and medium for block link points
CN112632575A (en) * 2020-12-22 2021-04-09 平安普惠企业管理有限公司 Authority management method and device of business system, computer equipment and storage medium
CN113949632A (en) * 2021-12-21 2022-01-18 北京溪塔科技有限公司 Dynamic node configuration method and device for block chain
US20220277302A1 (en) * 2019-08-19 2022-09-01 Anchor Labs, Inc. Cryptoasset custodial system with proof-of-stake blockchain support

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106796688A (en) * 2016-12-26 2017-05-31 深圳前海达闼云端智能科技有限公司 Permission control method, device and system of block chain and node equipment
CN108702622A (en) * 2017-11-30 2018-10-23 深圳前海达闼云端智能科技有限公司 Mobile network's access authentication method, device, storage medium and block chain node
CN109150607A (en) * 2018-08-22 2019-01-04 中链科技有限公司 Classification management-control method and device for block chain network
US20220277302A1 (en) * 2019-08-19 2022-09-01 Anchor Labs, Inc. Cryptoasset custodial system with proof-of-stake blockchain support
CN111131286A (en) * 2019-12-30 2020-05-08 百度在线网络技术(北京)有限公司 Access control method, device, equipment and medium for block link points
CN112632575A (en) * 2020-12-22 2021-04-09 平安普惠企业管理有限公司 Authority management method and device of business system, computer equipment and storage medium
CN113949632A (en) * 2021-12-21 2022-01-18 北京溪塔科技有限公司 Dynamic node configuration method and device for block chain

Also Published As

Publication number Publication date
CN115361390B (en) 2023-01-20

Similar Documents

Publication Publication Date Title
JP7222036B2 (en) Model training system and method and storage medium
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
US11327745B2 (en) Preventing falsification in version management
CN110390525B (en) Direct access method for block chain world state and block chain node
CN108694330B (en) Internet of things data management method, platform and equipment
CN110674140B (en) Block chain-based content processing method, device, equipment and storage medium
CN109992285B (en) Independent updating method and device for block chain code block and electronic equipment
CN111382164B (en) Service processing method based on block chain network
CN101375542A (en) Methods and apparatus for managing secured software for a wireless device
CN112613877B (en) Intelligent contract triggering method and device applied to block chain network and related equipment
CN113268336B (en) Service acquisition method, device, equipment and readable medium
CN107465728B (en) Information processing method, central server and storage medium for identification code
CN111415161A (en) Block chain-based data verification method and device and computer-readable storage medium
US20140215220A1 (en) Application distribution system and method
CN110960856B (en) Game data management system, management method and storage medium
CN111488372A (en) Data processing method, device and storage medium
CN110866289A (en) Data processing method and device based on block chain, server and storage medium
CN111488626A (en) Data processing method, device, equipment and medium based on block chain
US20230205849A1 (en) Digital and physical asset tracking and authentication via non-fungible tokens on a distributed ledger
CN111192146A (en) Correction method and device for block chain data
CN112040015B (en) Consensus node list generation method and related device
CN114266680A (en) Block chain-based electronic contract signing method, device and system
CN111026569B (en) Method for repairing specified block data in alliance chain
CN110262892B (en) Ticket issuing method and device based on distributed storage data chain and data chain node
CN115361390B (en) Method for joining a blockchain network, computer storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant