CN115361390B - Method for joining a blockchain network, computer storage medium and electronic device - Google Patents
Method for joining a blockchain network, computer storage medium and electronic device Download PDFInfo
- Publication number
- CN115361390B CN115361390B CN202211289952.0A CN202211289952A CN115361390B CN 115361390 B CN115361390 B CN 115361390B CN 202211289952 A CN202211289952 A CN 202211289952A CN 115361390 B CN115361390 B CN 115361390B
- Authority
- CN
- China
- Prior art keywords
- node
- information
- target node
- application
- accessed
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000000034 method Methods 0.000 title claims abstract description 61
- 238000005304 joining Methods 0.000 title claims abstract description 17
- 238000003860 storage Methods 0.000 title claims abstract description 16
- 238000013475 authorization Methods 0.000 claims abstract description 42
- 230000004044 response Effects 0.000 claims description 43
- 238000004590 computer program Methods 0.000 claims description 31
- 238000009434 installation Methods 0.000 claims description 8
- 230000006870 function Effects 0.000 description 18
- 238000012550 audit Methods 0.000 description 11
- 238000010586 diagram Methods 0.000 description 10
- 230000009849 deactivation Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 8
- 238000011084 recovery Methods 0.000 description 7
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 238000012795 verification Methods 0.000 description 4
- 230000008859 change Effects 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000012935 Averaging Methods 0.000 description 1
- VYZAMTAEIAYCRO-UHFFFAOYSA-N Chromium Chemical compound [Cr] VYZAMTAEIAYCRO-UHFFFAOYSA-N 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000002093 peripheral effect Effects 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
A method, computer storage medium and electronic device for joining a block chain network relate to the technical field of block chains, the method is applied to access authorization service equipment and comprises the following steps: receiving an access request sent by a target node; acquiring node basic information, first to-be-accessed link information and a node application type of a target node from an access request; splicing the first information of the link to be accessed and the node application type to obtain a splicing result; determining node constraint information corresponding to the splicing result; determining the matching degree of the node basic information and the node constraint information; and under the condition that the access request is determined to pass the examination based on the matching degree, adding the target node into a first block chain network corresponding to the first information to be accessed, and enabling the role of the target node in the first block chain network to be matched with the node application type. The method and the device can efficiently and reliably add the new node in the block chain network.
Description
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method, a computer storage medium, and an electronic device for joining a blockchain network.
Background
The block chain (Blockchain) is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like, is essentially a decentralized database, and is a string of data blocks associated by using a cryptography method. In some cases, a new node needs to be added in the blockchain network, and how to implement the addition of the new node is a problem to be solved for those skilled in the art.
Disclosure of Invention
Embodiments of the present application provide a method, a computer storage medium, and an electronic device for joining a blockchain network, so as to solve the above technical problems.
According to a first aspect of embodiments herein, there is provided a method for joining a blockchain network,
applied to access an authorized service device, the method comprises the following steps:
receiving an access request sent by a target node;
acquiring node basic information, first to-be-accessed link information and a node application type of the target node from the access request;
splicing the first to-be-accessed link information and the node application type to obtain a splicing result;
determining node constraint information corresponding to the splicing result;
determining the matching degree of the node basic information and the node constraint information;
and under the condition that the access request is determined to pass the examination based on the matching degree, adding the target node into a first block chain network corresponding to the first information to be accessed, and enabling the role of the target node in the first block chain network to be matched with the node application type.
In an optional example, after receiving the access request sent by the target node, the method further includes:
distributing application identification for the access request;
and sending the application identifier to the target node.
In one optional example, the method further comprises:
recording the association relation between the application identification and the first to-be-accessed link information in a first area under the condition that the access request is approved;
receiving a first access link updating request sent by the target node, wherein the first access link updating request carries second information of a to-be-accessed link and the application identifier;
and responding to the first access chain updating request, updating the access chain information associated with the application identifier in the first area from the first information of the to-be-accessed chain to the second information of the to-be-accessed chain, and switching the target node from joining the first blockchain network to joining a second blockchain network corresponding to the second to-be-accessed chain.
In an optional example, after the sending the application identifier to the target node, the method further includes:
receiving an application detail request carrying the application identifier sent by the target node;
responding to the application detail request, and determining application detail information corresponding to the access request, wherein the application detail information comprises: at least one of license issuing information, auditing state and application state, the node basic information, the first to-be-accessed link information and the node application type;
and sending the application detail information to the target node.
In an optional example, after the sending the application identifier to the target node, the method further includes:
determining issuing information corresponding to the access request under the condition that the examination of the access request is passed, wherein the issuing information comprises: at least one item of issuing object information, installation package information and issuing basic information and the application identifier;
and sending the issuing information to the target node.
In one optional example, the method further comprises:
determining a node address of the target node based on the node basis information;
recording the association relation between the node address and the first to-be-accessed link information in a second area under the condition that the access request is approved;
receiving a second access link updating request sent by the target node, wherein the second access link updating request carries second information of a link to be accessed and the node address;
and responding to the second access link updating request, determining the latest recorded information of the to-be-accessed link in the second area, and switching the target node from the block chain network corresponding to the latest recorded information of the to-be-accessed link added in the second area to the second block chain network corresponding to the second information of the to-be-accessed link.
In an optional example, after the target node is added to a first blockchain network corresponding to the first information to be linked, and the target node is made to match the role in the first blockchain network with the node application type, the method further includes:
under the condition that a first preset condition is met, according to the node application type, canceling the corresponding authority of the target node in the first block chain network;
and under the condition of meeting a second preset condition, recovering the corresponding authority of the target node in the first block chain network according to the node application type.
In one alternative example of this, the user may,
before receiving the access request sent by the target node, the method further includes:
receiving a chain information acquisition request sent by the target node;
determining a plurality of pieces of chain information in response to the chain information acquisition request, wherein each piece of chain information comprises at least one of a chain name and a chain number;
sending the plurality of link information to the target node;
wherein the first to-be-accessed link information is selected from the plurality of link information;
and/or the presence of a gas in the gas,
before receiving the access request sent by the target node, the method further includes:
receiving an application type acquisition request sent by the target node;
responding to the application type acquisition request, and determining a plurality of application types;
sending the plurality of application types to the target node;
wherein the node application type is selected from the plurality of application types.
According to a second aspect of embodiments of the present application, there is provided a computer storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the method according to the first aspect as described above.
According to a third aspect of embodiments herein, there is provided an electronic device comprising memory for storing one or more programs, and one or more processors; the one or more programs, when executed by the one or more processors, implement the method of the first aspect as described above.
In the solution provided in the embodiment of the present application, after obtaining node basic information, first to-be-accessed link information, and a node application type of a target node from an access request sent by the target node, the first to-be-accessed link information and the node application type may be spliced, node constraint information corresponding to an obtained splicing result is determined, and a matching degree of the node basic information and the node constraint information is determined, so as to determine whether an audit on the access request passes by using the matching degree. For the condition that the access request passes the audit, the target node can be added into the first block chain network corresponding to the first to-be-accessed link information, and the role of the target node in the first block chain network is matched with the node application type, so that the target node is efficiently added into the first block chain network according to the requirement of a user, and the reliable access authentication is performed on the target node before the addition, therefore, the embodiment of the application can efficiently and reliably add a new node into the block chain network.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 shows one of the flow diagrams of a method for joining a blockchain network provided in an embodiment of the present application;
FIG. 2 is a block diagram of an access authorization service device in an embodiment of the present application;
fig. 3 shows a second flowchart of a method for joining a blockchain network provided in an embodiment of the present application;
fig. 4 shows a third flowchart of a method for joining a blockchain network provided in an embodiment of the present application;
fig. 5 shows a fourth flowchart of a method for joining a blockchain network provided in an embodiment of the present application;
fig. 6 shows a fifth flowchart of a method for joining a blockchain network provided in an embodiment of the present application;
fig. 7 shows a schematic structural diagram of an electronic device provided in an embodiment of the present application.
Detailed Description
The embodiment of the application provides a method for joining a block chain network, which can be applied to an access authorization service device, and the access authorization service device can also be called an access authorization service platform or an access authorization service system.
It should be noted that, in order to support the method for joining the blockchain network provided in the embodiment of the present application, the access authorization service device needs to have a suitable operating environment.
Optionally, the hardware environment of the access authorization service device may satisfy at least one of: (1) The Central Processing Unit (CPU) is not lower than 2 cores; (2) the memory is not less than 4 cores; (3) the capacity of the hard disk is more than 512G; and (4) the display card is an independent display card with the display memory of more than 256M.
Optionally, the software environment of the access authorization service device may satisfy at least one of: (1) The operating system is Windows 7 and above, or CentOS7.5 (which is an open source and enterprise-level computer operating system); (2) The browser is above Google Chrome 63.0, or the browser is above Microsoft IE 8.0; (3) MySQL (which is a relational database management system) version is MySQL5.7.25.
Referring to fig. 1, a flowchart of a method for joining a blockchain network according to an embodiment of the present application is shown. As shown in fig. 1, the method includes a step 110, a step 120, a step 130, a step 140, a step 150, and a step 160, which are described below.
It should be noted that the target node may be any node that requests to join a certain blockchain network, and the "target" in the target node does not constitute any limitation on the target node.
In step 110, a user (e.g., a platform user in fig. 2) may operate on the target node to cause the target node to initiate an access request to the access authorization service device.
Optionally, the access request may be a hypertext Transfer Protocol (HTTP) request, the request mode of the access request may be POST, the access request may also be referred to as a License application, and the access request may be in the following form:
https://{url}/license/apply
[
{
"applicantBid":"",
"chainCode":"",
"chainName":"",
"nodeName":"",
"nodeBid":"",
"nodeOrg":"",
"linkName":"",
"linkPhone":"",
"linkEmail":"",
"equipmentInfo":["",""],
"remark":"",
"link":"",
"type":""
}
]
the above access request includes a plurality of parameters, and the description of each parameter can be seen in the following table 1:
TABLE 1
And step 120, obtaining the node basic information, the first to-be-accessed link information and the node application type of the target node from the access request.
In step 120, the node base information, the first to-be-accessed link information, and the node application type of the target node may be directly extracted from the access request. Optionally, the node basic information may include a node address, a node name, a node operating unit name, a contact phone, a contact email, and the like in table 1; the first to-be-accessed link information may include a link id, a link name, and the like in table 1; the node application type may correspond to the application type in table 1.
And step 130, splicing the first to-be-accessed link information and the node application type to obtain a splicing result.
Alternatively, the first to-be-accessed link information and the node application type may be in the form of characters or character strings, and a new character string may be obtained by connecting the first to-be-accessed link information and the node application type by using preset characters (e.g., "+", "&", etc.), and the new character string may be used as a concatenation result of the first to-be-accessed link information and the node application type.
And 140, determining node constraint information corresponding to the splicing result of the first to-be-accessed link information and the node application type.
It should be noted that all blockchain networks that need access verification by the access authorization service device, including but not limited to government affairs chain, business chain, etc., and all application types may be counted in advance. Based on all block chain networks and all application types determined statistically, a plurality of combination modes can be formed, each combination mode includes chain information corresponding to one block chain network and one application type, and the chain information and/or the application types in different combination modes are different. For each combination mode, the chain information and the application type in the combination mode can be spliced to obtain a splicing result, and therefore a plurality of splicing results corresponding to a plurality of combination modes one to one can be obtained.
Assuming that the chain information in a certain combination mode is a, and type B is applied, it can be determined which constraint conditions need to be satisfied by any node when the node is to become a node of type B in the blockchain network corresponding to a, and the combination of these constraint conditions can be used as the constraint information corresponding to the combination mode. In a similar manner, a plurality of constraint information corresponding to a plurality of combination modes one to one can be obtained, and then a plurality of splicing results corresponding to the plurality of combination modes one to one in the above text are combined to obtain a one to one correspondence relationship between the plurality of splicing results and the plurality of constraint information. In step 140, based on the one-to-one correspondence relationship, constraint information corresponding to the splicing result of the first to-be-accessed link information and the node application type can be efficiently and quickly determined, and the constraint information can be used as node constraint information.
And 150, determining the matching degree of the node basic information and the node constraint information.
Optionally, the node basic information may include basic information of the target node in each of the plurality of dimensions, and the node constraint information may include a constraint condition of each of the plurality of dimensions. In step 150, for each of the multiple dimensions, a matching degree corresponding to the dimension may be obtained by determining whether the basic information corresponding to the dimension meets the constraint condition corresponding to the dimension, a plurality of matching degrees corresponding to the multiple dimensions one to one may be obtained in a similar manner, and a matching degree between the node basic information and the node constraint information may be obtained by averaging the obtained plurality of matching degrees, or calculating a weighted average or a summation value, etc.
And 160, adding the target node into the first block chain network corresponding to the first to-be-accessed link information under the condition that the access request is determined to pass the audit based on the matching degree of the node basic information and the node constraint information, and enabling the role of the target node in the first block chain network to be matched with the node application type.
In step 160, it may be determined whether the access request is approved based on the matching degree between the node basic information and the node constraint information. Optionally, when the matching degree is greater than the preset matching degree, it may be determined that the access request is approved, and when the matching degree is less than or equal to the preset matching degree, it may be determined that the access request is not approved. Of course, the basis for determining whether the access request is approved is not limited to the matching degree of the node basic information and the node constraint information, and may also include, for example, the integrity, accuracy, and the like of the information in the access request, so that the access request may be approved in an all-round and highlighted manner.
When the access request is approved, the access request can be granted, the target node is added into the first block chain network corresponding to the first to-be-accessed link information, and the role of the target node in the first block chain network is matched with the node application type, for example, when the node application type is 0 service node, the target node becomes a service node in the first block chain network, and when the node application type is 2 backbone node, the target node becomes a backbone node in the first block chain network.
And under the condition that the audit on the access request is not passed, the access request can be rejected, and at the moment, the target node cannot join the first block chain network.
In the embodiment of the application, after the node basic information, the first to-be-accessed link information and the node application type of the target node are obtained from the access request sent by the target node, the first to-be-accessed link information and the node application type are spliced, the node constraint information corresponding to the obtained splicing result is determined, and the matching degree of the node basic information and the node constraint information is determined, so that whether the audit on the access request is passed or not is determined by using the matching degree. For the condition that the access request passes the audit, the target node can be added into the first block chain network corresponding to the first to-be-accessed link information, and the role of the target node in the first block chain network is matched with the node application type, so that the target node is efficiently added into the first block chain network according to the requirement of a user, and the reliable access authentication is performed on the target node before the addition, therefore, the embodiment of the application can efficiently and reliably add a new node into the block chain network.
In an alternative example, as shown in fig. 3, prior to step 110, the method further comprises:
the first information of the chain to be accessed is selected from a plurality of chain information.
Here, the user may operate on the target node to make the target node initiate a link information acquisition request to the access authorization service device.
Optionally, the link information obtaining request may be an HTTP request, the request manner of the link information obtaining request may be GET, and the link information obtaining request may be in the following form: https:// { url }/license/chainList.
In response to the received chain information acquisition request, the access authorization service device may determine all block chain networks that need to be subjected to access verification by itself, and further determine respective chain information of the block chain networks, so as to obtain a plurality of chain information, where each chain information may include at least one of a chain name and a chain number, and the chain number may also be referred to as an AC code. Thereafter, the access authorization service device may return a response result of the chain information obtaining request (which is subsequently referred to as a first response result) to the target node, where the first response result may be in a JSON (JavaScript Object Notation) format, and a description of information included in the first response result may be referred to in table 2 below:
thus, according to the first response result from the access authorization service device, the target node may display a plurality of pieces of chain information, and the user may select, according to the actual requirement, required chain information from the plurality of pieces of chain information, so that the target node initiates an access request carrying the chain information (i.e., the chain information serves as the above first to-be-accessed chain information), and thus, according to the actual requirement of the user, the target node may be accessed to the corresponding block chain network.
In an alternative example, as shown in fig. 4, prior to step 110, the method further comprises:
wherein the node application type is selected from a plurality of application types.
Here, the user may operate on the target node to make the target node initiate an application type obtaining request to the access authorization service device.
Optionally, the application type obtaining request may be an HTTP request, the request manner of the application type obtaining request may be GET, and the application type obtaining request may be in the following form: https:// { url }/license/applyTypeList.
In response to the received application type obtaining request, the access authorization service device may determine all application types, and return a response result (hereinafter referred to as a second response result) of the application type obtaining request to the target node, where the second response result may be in a JSON format, and the second response result may include each application type determined by the access authorization service device, and may be in the following form:
{
"data": {
"typeList": [
{
"msg": a "service node",
"type": "0"
},
{
"msg": main chain super node ",
"type": "1"
},
{
"msg": backbone nodes ",
"type": "2"
},
{
"msg": out-block super node ",
"type": "3"
},
{
"msg": supervisory node ",
"type": "4"
},
{
"msg": child chain common node ",
"type": "5"
},
{
"msg" means "the child chain goes out of a block consensus node",
"type": "6"
}
]
},
"errorCode": 0,
message 'operation is successful'
}
Thus, according to the second response result from the access authorization service device, the target node may display a plurality of application types, and the user may select a required application type from the plurality of application types according to an actual requirement, so that the target node initiates an access request carrying the application type (that is, the application type is used as the node application type in the foregoing description), thereby enabling the target node to join the corresponding blockchain network in a corresponding role according to the actual requirement of the user.
On the basis of the embodiment shown in fig. 1, as shown in fig. 5, after step 110, the method further comprises:
Optionally, the application identifier may be an application number, and the application number may also be referred to as apply no; the application identifier may be in JSON format.
The application label has various applications, and the following description is given by way of example.
In one embodiment, the method further comprises:
under the condition that the access request is approved, recording the association relationship between the application identification and the first to-be-accessed link information in the first area;
receiving a first access link updating request sent by a target node, wherein the first access link updating request carries second information of a to-be-accessed link and an application identifier;
and responding to the first access chain updating request, updating the access chain information associated with the application identifier in the first area from the first to-be-accessed chain information to the second to-be-accessed chain information, and switching the target node from being added into the first block chain network to being added into the second block chain network corresponding to the second to-be-accessed chain.
Alternatively, the first area may be a storage area local to the access authorization service device, and the first area may belong to a power-down non-lost storage area.
In this embodiment, in the case that the audit on the access request passes, the association relationship between the application identifier and the first to-be-accessed link information may be stored in the first area, so as to characterize the association between the application identifier and the first to-be-accessed link information.
Optionally, the user may operate on the target node, so that the target node initiates a first access link update request carrying the second to-be-accessed link information and the application identifier to the access authorization service device.
In this embodiment, the access authorization service device may have a license update chain function, and based on the license update chain function, may respond to the first access chain update request, update the access chain information associated with the application identifier in the first area from the first to-be-accessed chain information to the second to-be-accessed chain information, and switch the target node from being added to the first blockchain network to being added to the second blockchain network corresponding to the second to-be-accessed chain, so that, according to the application identifier, change of the blockchain network to which the target node is accessed may be quickly achieved.
In another specific embodiment, after sending the application identifier to the target node, the method further includes:
receiving an application detail request carrying an application identifier sent by a target node;
responding to the application detail request, and determining application detail information corresponding to the access request, wherein the application detail information comprises: at least one of the license issuing information, the auditing state and the application state, as well as the node basic information, the first to-be-accessed link information and the node application type;
and sending the application detail information to the target node.
Optionally, the user may operate on the target node to make the target node initiate the request for application details to the access authorization service device.
Optionally, the request for application details may be initiated by calling a Serial Peripheral Interface (SPI), and may also be referred to as a license details request, the request for application details may be an HTTP request, the request manner of the request for application details may be a POST, and the request for application details may be in the following form:
https://{url}/license/detail
{
"applyNo":""
}
in response to the received application detail request, the access authorization service device may determine application detail information corresponding to the access request, and return a response result of the application detail request (which will be referred to as a third response result hereinafter) to the target node, where the third response result may include the application detail information, and the third response result may be in the following form:
{
"data": {
"applyTime": "1597729776000",
"contact": {
"email": "linkemail",
"name": "linkname",
"phone": "linkphone"
},
"device": [
"string1",
"string2"
],
"issue": {
"issuer": "abc",
"licenseDir": "licensedir",
"licenseId": [
{
"id": "1",
"validFrom": "2",
"validTo": "3"
}
],
"pkgDir": "pkgdir",
"remark": "test remark"
},
"node": {
"bid": "bid",
"chainCode": "code",
"chainName": "name",
"name": "nodename",
"org": "org",
"status": "2"
},
"type": "2",
"link": "1",
"status": "1"
},
"errCode": 0,
"msg" is successful "
}
The above third response result includes a plurality of parameters, and the description of each parameter can be found in the following table 3:
TABLE 3
It should be noted that the application detail information may include: at least one of the permission issue information, the audit state and the application state, as well as the node basic information, the first to-be-accessed link information and the node application type, wherein the permission issue information may include an issuer, a file download address, issue id information, an issue remark and the like in table 3, the audit state may correspond to the node audit state in table 3, and the application state may be three possibilities of pending issue, issued and initialization.
In this embodiment, the access authorization service device may have a license detail function, and based on the license detail function, the query of the current processing state, the processing progress, and the like of the access request may be implemented in response to the request for applying details.
In another embodiment, after sending the application identifier to the target node, the method further includes:
and under the condition that the examination of the access request is passed, determining issuing information corresponding to the access request, wherein the issuing information comprises: at least one of signing and issuing object information, installation package information and issuing basic information, and an application identifier;
and sending the issuing information to the target node.
Alternatively, the issuance information may be in the form of:
{
"applyNo":"",
"issuer":"",
"licenseDir":"",
"licenseDirName":"",
"licenseId":[
{"id":"","validFrom":"","validTo":""}
],
"pkgDir":"",
"remark":""
}
the above issuance information includes a plurality of parameters, and the description of each parameter can be found in the following table 4:
the issuance information may include: at least one of issuing object information, installation package information, issuing basis information, and an application identifier, the issuing object information may include an issuer in table 4, the installation package information may include an installation package directory in table 4, and the issuing basis information may include a license id, a validity period (start), a validity period (end), and the like in table 4.
In this embodiment, the access authorization service device may have a license issuing function, and according to the application identifier, the access authorization service device may send the issuing information based on the license issuing function when the access request is approved, so as to facilitate understanding of the permission of the access authorization service device for the target node.
Therefore, the application identifier can be organically applied to the use process of the license update chain function, the license detail function and the license issuing function of the access authorization service equipment in the embodiment of the application.
In one optional example, the method further comprises:
determining a node address of a target node based on the node basic information;
recording the association relation between the node address and the first to-be-accessed link information in the second area under the condition that the access request is approved;
receiving a second access link updating request sent by the target node, wherein the second access link updating request carries second information of a to-be-accessed link and a node address;
and responding to the second access chain updating request, determining the latest recorded information of the to-be-accessed chain in the second area, and switching the target node from the latest recorded information of the to-be-accessed chain added into the second area to a second block chain network corresponding to the second to-be-accessed chain.
Here, the node basic information may include a node address of the target node, so that the node address of the target node may be directly extracted from the node basic information.
Alternatively, the second area may be a storage area local to the access authorization service device, the second area may belong to a power-down non-lost storage area, and the second area may be different from the first area.
In the case that the audit on the access request is passed, the association relationship between the node address and the first information to be accessed to link may be stored in the second area to characterize the association between the node address and the first information to be accessed to link.
Optionally, the user may operate on the target node, so that the target node initiates a second access link update request carrying the second to-be-accessed link information and the node address to the access authorization service device.
The access authorization service equipment can have a license update chain function, and based on the license update chain function, can respond to a second access chain update request, determine the latest recorded information of the to-be-accessed chain in the second area, and switch the target node from the latest recorded information of the to-be-accessed chain added in the second area to a second block chain network corresponding to the second to-be-accessed chain, so that the change of the block chain network accessed by the target node can be quickly realized according to the node address.
In an alternative example, the access authorization service device may receive a third access chain update request sent by the target node, where the third access chain update request may be in the form of:
https://{url}/license/updateChainCode
{
"applyNo":"",
"nodeBid":"",
"oldChainCode":"",
"chainCode":"",
"chainName":"",
"status":""
}
the above third access link update request includes a plurality of parameters, and the description of each parameter is shown in the following table 5:
optionally, if the application number in the third access chain update request is not null, the blockchain network to which the target node is accessed may be preferentially changed according to the application number (corresponding to the application identifier in the foregoing), and if the application number in the third access chain update request is null, the blockchain network to which the target node is accessed may be changed according to the node address.
In an optional example, after the target node joins the first blockchain network, the target node may upload a license file, the request for uploading the license file may be an HTTP request, the request for uploading the license file may be in the form of a POST, and the request for uploading the license file may be in the form of:
{
"applyNo":"",
"nodeBid":"",
"chainCode":"",
"chainName":""
}
a description of the information in the request to upload the license file can be found in table 6 below:
after the license file is successfully uploaded, the target node may receive the following response result (which will be referred to as a fourth response result in the following paragraphs):
{
"errorCode": 0,
"message": operation is successful,
"data": {
"hash":
"QmYKPNL4NJgRTwSjzntt2RidaGaJkyRpUZgn8tZnGibez2"
}
}
the fourth response result may be in a JSON format, and the description of the information in the fourth response result may be referred to the following table 7:
in an alternative example, as shown in fig. 6, after step 160, the method further comprises:
and 184, under the condition that a second preset condition is met, recovering the corresponding authority of the target node in the first block chain network according to the node application type.
Optionally, the method may further comprise operating on the target node by the user to cause the target node to send the permission deactivation request to the access authorization service device.
Alternatively, the license deactivation request may be an HTTP request, the request manner of the license deactivation request may be POST, and the license deactivation request may be in the following form:
https://{url}/license/ban
{
"applyNo":"",
"nodeBid":"",
"ban":""
}
the above license deactivation request includes a plurality of parameters, and the description of each parameter can be found in table 8 below:
it should be noted that the value of ban in the permission deactivation request may be specifically 1.
In the case of receiving the request for permission to deactivate from the target node, the first preset condition may be considered to be satisfied, and at this time, the access authentication service device may cancel the node authority of the target node in the first blockchain network according to the node application type, for example, in the case that the node application type is any kind of consensus node, the authority of the target node to participate in consensus voting, transaction execution, block verification, and transaction in the first blockchain network may be cancelled. In addition, the access authentication service device may also return a response result of the permission deactivation request to the target node (which is subsequently referred to as a fifth response result), where the fifth response result may be in a JSON format, and the fifth response result may be in the following form:
{
"errorCode": 0,
"message": operation is successful,
"data": {
"applyNoList": ["e73c50ae16fcd27a6debbedcd23ccfd1"]
}
}
the description of applynoist in the fifth response result can be found in the following table 9:
thereafter, an operation may be performed by the user on the target node to cause the target node to send a permission recovery request to the access authorization service device.
Alternatively, the license recovery request may be a GTTP request, the request mode of the license recovery request may be a POST, and the form of the license recovery request may be similar to the license deactivation request, except that the value of ban in the license recovery request may be 2.
In the case of receiving the permission recovery request from the target node, it may be considered that the second preset condition is satisfied, and at this time, the access authentication service device may recover the node permission of the target node in the first blockchain network according to the node application type, for example, in the case where the node application type is any one of consensus nodes, it may recover the permission of the target node to participate in consensus voting, transaction execution, block verification, and transaction in the first blockchain network. In addition, the access authentication service device may further return a response result of the permission recovery request (which is subsequently referred to as a sixth response result) to the target node, where the sixth response result may be in a JSON format, and the fifth response result may be referred to as the sixth response result.
Obviously, in the embodiment of the application, the access authorization service device can provide a license start-stop function, and based on the license start-stop function, the corresponding permission of the target node in the first block chain network can be cancelled or restored according to actual requirements.
In an optional example, the access authorization service device may receive a license application list request from the target node, where the license application list request may be an HTTP request, the license application list request may be requested in a POST manner, and the license application list request may be in the following form:
https://{url}/license/list
{
"applyNo":"",
"chainCode":"",
"type":[""],
"status":"",
"nodeName":"",
"nodeBid":"",
"applicantBid":"",
"pageStart":"",
"pageSize":""
}
the license application list request above includes a plurality of parameters, and the description of each parameter can be found in the following table 10:
the access authorization service device may return a response result (hereinafter referred to as a seventh response result) requested by the license application list to the target node, where the seventh response result may be in a JSON format, and the seventh response result may be in the following form:
{
"data": {
"licenseList": [
{
"applyNo": "",
"nodeName": "",
"nodeBid": "",
"chainName": "",
"applyTime": "",
"org": "",
"type": "",
"status": "",
"signReady": ""
}
],
"page": {
"pageStart": 1,
"pageSize": 10,
"pageTotal": 10
}
},
"errCode": 0,
"msg" is successful "
}
The information in the seventh response result can be seen in table 11 below:
in an optional example, the access authorization service device may receive a license update request from the target node, where the license update request may be an HTTP request, the license update request may be requested in a POST manner, and the license update request may be in the following form:
https://{url}/license/update
{
"applyNo":"",
"link":"",
"linkName":"",
"linkPhone":"",
"linkEmail":"",
"equipmentInfo":["",""],
"remark":""
}
the license update request above includes a plurality of parameters, and the description of each parameter can be seen in the following table 12:
in an alternative example, the architecture diagram of the access authorization service device may refer to fig. 2. As shown in fig. 2, the access authorization service device may include a License application module, an update module, a License issuance module, and a License maintenance module; wherein,
the License application module is used for processing the application of the user (equivalent to the access request in the above), and the License update module is used for updating the logic of the License content approved by the user (equivalent to the response to the License update request in the above);
the License issuing module is used for issuing License to a requester after auditing License application (which is equivalent to the access request in the above text) in a comprehensive and highlighted manner, and simultaneously storing information of different sub-chains and information of different License types;
the License maintenance module is used for being responsible for the starting and stopping of License (corresponding to the License starting and stopping function in the above) and maintaining the uploaded License file.
Based on the same inventive concept, an embodiment of the present application provides a computer storage medium, where a computer program is stored on the computer storage medium, and when the computer program is executed by a processor, the computer program implements the following steps:
receiving an access request sent by a target node;
acquiring node basic information, first to-be-accessed link information and a node application type of a target node from an access request;
splicing the first information of the link to be accessed and the node application type to obtain a splicing result;
determining node constraint information corresponding to the splicing result;
determining the matching degree of the node basic information and the node constraint information;
and under the condition that the access request is determined to be approved based on the matching degree, adding the target node into a first block chain network corresponding to the first information to be accessed, and matching the role of the target node in the first block chain network with the node application type.
In an alternative example, the computer program when executed by the processor further performs the steps of:
after receiving an access request sent by a target node, distributing an application identifier for the access request;
and sending the application identifier to the target node.
In an alternative example, the computer program when executed by the processor further implements the steps of:
under the condition that the access request is approved, recording the association relationship between the application identification and the first to-be-accessed link information in the first area;
receiving a first access link updating request sent by a target node, wherein the first access link updating request carries second information of a to-be-accessed link and an application identifier;
and responding to the first access chain updating request, updating the access chain information associated with the application identifier in the first area from the first to-be-accessed chain information to the second to-be-accessed chain information, and switching the target node from being added into the first block chain network to being added into the second block chain network corresponding to the second to-be-accessed chain.
In an alternative example, the computer program when executed by the processor further implements the steps of:
after the application identifier is sent to the target node, an application detail request which is sent by the target node and carries the application identifier is received;
responding to the application detail request, and determining application detail information corresponding to the access request, wherein the application detail information comprises: at least one of the license issuing information, the auditing state and the application state, as well as the node basic information, the first to-be-accessed link information and the node application type;
and sending the application detail information to the target node.
In an alternative example, the computer program when executed by the processor further implements the steps of:
after the application identifier is sent to the target node, and under the condition that the access request is approved, issuing information corresponding to the access request is determined, wherein the issuing information comprises: at least one item of issuing object information, installation package information and issuing basic information and an application identifier;
and sending the issuing information to the target node.
In an alternative example, the computer program when executed by the processor further implements the steps of:
determining a node address of a target node based on the node basic information;
recording the association relation between the node address and the first to-be-accessed link information in the second area under the condition that the access request is approved;
receiving a second access link updating request sent by the target node, wherein the second access link updating request carries second information of a link to be accessed and a node address;
and responding to the second access chain updating request, determining the latest recorded information of the to-be-accessed chain in the second area, and switching the target node from the block chain network corresponding to the latest recorded information of the to-be-accessed chain added into the second area to the second block chain network corresponding to the second information of the to-be-accessed chain.
In an alternative example, the computer program when executed by the processor further implements the steps of:
after a target node is added into a first block chain network corresponding to first information of a to-be-accessed link and the role of the target node in the first block chain network is matched with the node application type, under the condition that a first preset condition is met, according to the node application type, canceling the corresponding authority of the target node in the first block chain network;
and under the condition of meeting a second preset condition, recovering the corresponding authority of the target node in the first block chain network according to the node application type.
In an alternative example, the computer program when executed by the processor further implements the steps of:
before receiving an access request sent by a target node, receiving a link information acquisition request sent by the target node;
determining a plurality of pieces of chain information in response to the chain information acquisition request, wherein each piece of chain information comprises at least one of a chain name and a chain number;
sending the plurality of link information to a target node;
the first information to be accessed is selected from a plurality of pieces of chain information.
In an alternative example, the computer program when executed by the processor further implements the steps of:
before receiving an access request sent by a target node, receiving an application type acquisition request sent by the target node;
responding to an application type acquisition request, and determining a plurality of application types;
sending the plurality of application types to a target node;
wherein the node application type is selected from a plurality of application types.
Based on the same inventive concept, the present embodiment provides an electronic device, referring to fig. 7, including a memory 701, a processor 702, a bus 703 and a computer program stored on the memory 701 and executable on the processor 702, where the processor 702 implements the following steps when executing the computer program:
receiving an access request sent by a target node;
acquiring node basic information, first to-be-accessed link information and a node application type of a target node from an access request;
splicing the first information of the link to be accessed and the node application type to obtain a splicing result;
determining node constraint information corresponding to the splicing result;
determining the matching degree of the node basic information and the node constraint information;
and under the condition that the access request is determined to be approved based on the matching degree, adding the target node into a first block chain network corresponding to the first information to be accessed, and matching the role of the target node in the first block chain network with the node application type.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
after receiving an access request sent by a target node, distributing an application identifier for the access request;
and sending the application identifier to the target node.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
under the condition that the access request is approved, recording the association relationship between the application identification and the first to-be-accessed link information in the first area;
receiving a first access link updating request sent by a target node, wherein the first access link updating request carries second information of a to-be-accessed link and an application identifier;
and responding to the first access chain updating request, updating the access chain information associated with the application identifier in the first area from the first to-be-accessed chain information to the second to-be-accessed chain information, and switching the target node from being added into the first block chain network to being added into the second block chain network corresponding to the second to-be-accessed chain.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
after the application identifier is sent to the target node, an application detail request which is sent by the target node and carries the application identifier is received;
responding to the application detail request, and determining application detail information corresponding to the access request, wherein the application detail information comprises: at least one of the license issuing information, the auditing state and the application state, as well as the node basic information, the first to-be-accessed link information and the node application type;
and sending the application detail information to the target node.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
after the application identifier is sent to the target node, and under the condition that the access request is approved, issuing information corresponding to the access request is determined, wherein the issuing information comprises: at least one item of issuing object information, installation package information and issuing basic information and an application identifier;
and sending the issuing information to the target node.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
determining a node address of a target node based on the node basic information;
recording the association relation between the node address and the first to-be-accessed link information in the second area under the condition that the access request is approved;
receiving a second access link updating request sent by the target node, wherein the second access link updating request carries second information of a link to be accessed and a node address;
and responding to the second access chain updating request, determining the latest recorded information of the to-be-accessed chain in the second area, and switching the target node from the block chain network corresponding to the latest recorded information of the to-be-accessed chain added into the second area to the second block chain network corresponding to the second information of the to-be-accessed chain.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
after a target node is added into a first block chain network corresponding to first information of a to-be-accessed link and the role of the target node in the first block chain network is matched with the node application type, under the condition that a first preset condition is met, according to the node application type, canceling the corresponding authority of the target node in the first block chain network;
and under the condition of meeting a second preset condition, recovering the corresponding authority of the target node in the first block chain network according to the node application type.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
receiving a link information acquisition request sent by a target node before receiving an access request sent by the target node;
determining a plurality of pieces of chain information in response to the chain information acquisition request, wherein each piece of chain information comprises at least one of a chain name and a chain number;
sending the plurality of link information to a target node;
the first information of the chain to be accessed is selected from a plurality of chain information.
In an alternative example, the processor 702, when executing the computer program, further performs the steps of:
before receiving an access request sent by a target node, receiving an application type acquisition request sent by the target node;
responding to an application type acquisition request, and determining a plurality of application types;
sending the plurality of application types to a target node;
wherein the node application type is selected from a plurality of application types.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and so forth) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all changes and modifications that fall within the scope of the present application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.
Claims (10)
1. A method for joining a blockchain network, the method being applied to an access authorization service device, the method comprising:
receiving an access request sent by a target node;
acquiring node basic information, first to-be-accessed link information and a node application type of the target node from the access request; wherein the node application type is one of the following seven items: the method comprises the following steps that a service node type, a main chain super node type, a backbone node type, a block-out super node type, a supervision node type, a sub-chain co-recognition node type and a sub-chain block-out co-recognition node type are adopted;
splicing the first information of the link to be accessed and the node application type to obtain a splicing result; the splicing result is obtained by connecting the first information of the link to be accessed and the node application type by using preset characters;
determining node constraint information corresponding to the splicing result;
determining the matching degree of the node basic information and the node constraint information;
and under the condition that the access request is determined to pass the examination based on the matching degree, adding the target node into a first block chain network corresponding to the first information to be accessed, and enabling the role of the target node in the first block chain network to be matched with the node application type.
2. The method of claim 1, wherein after receiving the access request sent by the target node, the method further comprises:
distributing application identification for the access request;
and sending the application identifier to the target node.
3. The method of claim 2, further comprising:
recording the association relation between the application identification and the first to-be-accessed link information in a first area under the condition that the access request is approved;
receiving a first access link updating request sent by the target node, wherein the first access link updating request carries second information of a to-be-accessed link and the application identifier;
and responding to the first access chain updating request, updating the access chain information associated with the application identifier in the first area from the first to-be-accessed chain information to the second to-be-accessed chain information, and switching the target node from being added into the first block chain network to being added into a second block chain network corresponding to the second to-be-accessed chain.
4. The method of claim 2, wherein after sending the application identifier to the target node, the method further comprises:
receiving an application detail request carrying the application identifier sent by the target node;
responding to the application detail request, and determining application detail information corresponding to the access request, wherein the application detail information comprises: at least one of license issuing information, auditing state and application state, the node basic information, the first to-be-accessed link information and the node application type;
and sending the application detail information to the target node.
5. The method of claim 2, wherein after sending the application identifier to the target node, the method further comprises:
determining issuing information corresponding to the access request under the condition that the examination of the access request is passed, wherein the issuing information comprises: at least one item of issuing object information, installation package information and issuing basic information and the application identifier;
and sending the issuing information to the target node.
6. The method of claim 1, further comprising:
determining a node address of the target node based on the node basis information;
recording the association relation between the node address and the first to-be-accessed link information in a second area under the condition that the access request is approved;
receiving a second access link updating request sent by the target node, wherein the second access link updating request carries second information of a link to be accessed and the node address;
and responding to the second access chain updating request, determining the latest recorded information of the to-be-accessed chain in the second area, and switching the target node from the block chain network corresponding to the latest recorded information of the to-be-accessed chain added in the second area to the second block chain network corresponding to the second information of the to-be-accessed chain.
7. The method according to claim 1, wherein the target node is added to a first blockchain network corresponding to the first information of the to-be-accessed link, and after the target node is made to match the role in the first blockchain network with the node application type, the method further comprises:
under the condition that a first preset condition is met, according to the node application type, canceling the corresponding authority of the target node in the first block chain network;
and under the condition of meeting a second preset condition, recovering the corresponding authority of the target node in the first block chain network according to the node application type.
8. The method of claim 1,
before receiving the access request sent by the target node, the method further includes:
receiving a chain information acquisition request sent by the target node;
determining a plurality of pieces of chain information in response to the chain information acquisition request, wherein each piece of chain information comprises at least one of a chain name and a chain number;
sending the plurality of link information to the target node;
wherein the first to-be-accessed link information is selected from the plurality of link information;
and/or the presence of a gas in the gas,
before receiving the access request sent by the target node, the method further includes:
receiving an application type acquisition request sent by the target node;
responding to the application type acquisition request, and determining a plurality of application types;
sending the plurality of application types to the target node;
wherein the node application type is selected from the plurality of application types.
9. A computer storage medium, characterized in that a computer program is stored thereon, which computer program, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 8.
10. An electronic device comprising one or more processors, and memory for storing one or more programs; the one or more programs, when executed by the one or more processors, implement the method of any of claims 1-8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211289952.0A CN115361390B (en) | 2022-10-21 | 2022-10-21 | Method for joining a blockchain network, computer storage medium and electronic device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211289952.0A CN115361390B (en) | 2022-10-21 | 2022-10-21 | Method for joining a blockchain network, computer storage medium and electronic device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN115361390A CN115361390A (en) | 2022-11-18 |
CN115361390B true CN115361390B (en) | 2023-01-20 |
Family
ID=84007873
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211289952.0A Active CN115361390B (en) | 2022-10-21 | 2022-10-21 | Method for joining a blockchain network, computer storage medium and electronic device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115361390B (en) |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106796688B (en) * | 2016-12-26 | 2020-12-18 | 深圳前海达闼云端智能科技有限公司 | Permission control method, device and system of block chain and node equipment |
WO2019104690A1 (en) * | 2017-11-30 | 2019-06-06 | 深圳前海达闼云端智能科技有限公司 | Mobile network access authentication method, device, storage medium and block chain node |
CN109150607A (en) * | 2018-08-22 | 2019-01-04 | 中链科技有限公司 | Classification management-control method and device for block chain network |
US11301845B2 (en) * | 2019-08-19 | 2022-04-12 | Anchor Labs, Inc. | Cryptoasset custodial system with proof-of-stake blockchain support |
CN111131286B (en) * | 2019-12-30 | 2022-06-17 | 百度在线网络技术(北京)有限公司 | Access control method, device, equipment and medium for block link points |
CN112632575A (en) * | 2020-12-22 | 2021-04-09 | 平安普惠企业管理有限公司 | Authority management method and device of business system, computer equipment and storage medium |
CN113949632B (en) * | 2021-12-21 | 2022-06-28 | 北京溪塔科技有限公司 | Dynamic node configuration method and device for block chain |
-
2022
- 2022-10-21 CN CN202211289952.0A patent/CN115361390B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN115361390A (en) | 2022-11-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108734028B (en) | Data management method based on block chain, block chain link point and storage medium | |
CN108197891B (en) | Electronic signing device and method based on block chain | |
US11327745B2 (en) | Preventing falsification in version management | |
US11270030B2 (en) | System and method for consensus management | |
CN110390525B (en) | Direct access method for block chain world state and block chain node | |
CN109492013B (en) | Data processing method, device and system applied to database cluster | |
CN108769264B (en) | Block chain domain division method | |
CN111382164B (en) | Service processing method based on block chain network | |
CN112613877B (en) | Intelligent contract triggering method and device applied to block chain network and related equipment | |
CN111698315B (en) | Data processing method and device for block and computer equipment | |
CN111192146B (en) | Correction method and device for block chain data | |
CN111415161A (en) | Block chain-based data verification method and device and computer-readable storage medium | |
CN112749968B (en) | Service data recording method and device based on block chain | |
CN107465728B (en) | Information processing method, central server and storage medium for identification code | |
CN110960856B (en) | Game data management system, management method and storage medium | |
US20140215220A1 (en) | Application distribution system and method | |
CN110866289A (en) | Data processing method and device based on block chain, server and storage medium | |
CN111177257A (en) | Data storage and access method, device and equipment of block chain | |
CN111488626A (en) | Data processing method, device, equipment and medium based on block chain | |
US20230205849A1 (en) | Digital and physical asset tracking and authentication via non-fungible tokens on a distributed ledger | |
CN115330400A (en) | Block chain tracing method, device, system, computing equipment and storage medium | |
CN111026569B (en) | Method for repairing specified block data in alliance chain | |
CN112040015A (en) | Consensus node list generation method and related device | |
CN115361390B (en) | Method for joining a blockchain network, computer storage medium and electronic device | |
CN110262892B (en) | Ticket issuing method and device based on distributed storage data chain and data chain node |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |