CN116226827A - Data processing method, device, equipment and storage medium based on block chain network - Google Patents
Data processing method, device, equipment and storage medium based on block chain network Download PDFInfo
- Publication number
- CN116226827A CN116226827A CN202111481786.XA CN202111481786A CN116226827A CN 116226827 A CN116226827 A CN 116226827A CN 202111481786 A CN202111481786 A CN 202111481786A CN 116226827 A CN116226827 A CN 116226827A
- Authority
- CN
- China
- Prior art keywords
- transaction
- security authentication
- chain
- sub
- authentication
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/604—Tools and structures for managing or administering access control systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Automation & Control Theory (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The embodiment of the application discloses a data processing method, device, equipment and storage medium based on a blockchain network; wherein the blockchain is composed of a main chain and at least one sub-chain, the data processing flow may include: issuing a security authentication transaction in the main chain, wherein the security authentication transaction is used for indicating target data which needs to be subjected to security authentication in a target sub-chain, acquiring a security authentication execution transaction corresponding to the security authentication transaction, and carrying out transaction authentication on the security authentication execution transaction; and generating a security authentication result receipt transaction according to the transaction authentication result of the security authentication execution transaction, and uploading the security authentication result receipt transaction to the main chain, wherein the security authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the security authentication transaction. It can be seen that the main chain and the sub-chain can realize message transmission by issuing related transactions so as to achieve the aim of authenticating target data in the sub-chain.
Description
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a data processing method based on a blockchain network, a data processing apparatus based on a blockchain network, a computer device, and a computer readable storage medium.
Background
With the continuous development of computer technology, blockchains are widely applied to aspects such as resource transfer, transaction data storage and the like by virtue of traceability characteristics. In practical applications, in order to cope with the increase of the types of services and the transaction data corresponding to various services, the blockchain can reduce the pressure of the main chain by deriving the sub-chain (i.e. the blockchain can be composed of one main chain and at least one sub-chain); practice finds that, because the consensus process of the main chain and the sub-chain is independent, the security of the data in the sub-chain is difficult to be ensured, and how to authenticate the target data (such as transaction data) in the sub-chain becomes a problem to be solved urgently.
Disclosure of Invention
The embodiment of the application provides a data processing method, device, equipment and storage medium based on a blockchain network, which can authenticate target data in a sub-chain of the blockchain.
In one aspect, embodiments of the present application provide a data processing method based on a blockchain network in which a blockchain is maintained, the blockchain being composed of a main chain and at least one sub-chain; the data processing method based on the block chain network is executed by a target consensus node, wherein the target consensus node is any one of the consensus nodes maintaining the main chain; the method comprises the following steps:
Issuing a security authentication transaction in the main chain, wherein the security authentication transaction is used for indicating target data needing security authentication in a target sub-chain, and the target sub-chain refers to any sub-chain in at least one sub-chain;
the method comprises the steps of obtaining a security authentication executing transaction corresponding to a security authentication transaction, wherein the security authentication executing transaction is obtained after a target sub-chain carries out security authentication on target data;
performing transaction authentication on the security authentication execution transaction;
and generating a security authentication result receipt transaction according to the transaction authentication result of the security authentication execution transaction, and uploading the security authentication result receipt transaction to the main chain, wherein the security authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the security authentication transaction.
In one aspect, embodiments of the present application provide a data processing method based on a blockchain network in which a blockchain is maintained, the blockchain being composed of a main chain and at least one sub-chain; the data processing method based on the block chain network is executed by a target consensus node, wherein the target consensus node is any one of the consensus nodes for maintaining the target sub-chain; the target sub-chain refers to any one of at least one sub-chain; the method comprises the following steps:
Acquiring a security authentication transaction issued in a main chain, wherein the security authentication transaction is used for indicating target data needing security authentication in a target sub-chain;
invoking a security authentication contract to perform security authentication on the target data;
generating a security authentication executing transaction according to a security authentication result of the target data, and uploading the security authentication executing transaction to the target sub-chain;
the method comprises the steps of obtaining a safety authentication result receipt transaction issued in a main chain, wherein the safety authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the safety authentication transaction, and the safety authentication result receipt transaction is generated according to a transaction authentication result by the main chain;
if the security authentication result receipt transaction indicates that the cross-chain authentication corresponding to the security authentication transaction passes, generating a security authentication result main chain receipt transaction corresponding to the security authentication result receipt transaction, and uploading the security authentication result main chain receipt transaction to a target sub-chain; the security authentication result main chain receipt transaction is used for indicating that the cross-chain authentication corresponding to the security authentication execution transaction passes.
In one aspect, embodiments of the present application provide a data processing apparatus based on a blockchain network in which a blockchain is maintained, the blockchain being composed of a main chain and at least one sub-chain; the data processing method based on the block chain network is executed by a target consensus node, the data processing device is carried in the target consensus node, and the target consensus node is any consensus node in the consensus nodes of the maintenance main chain; the processing device comprises:
The processing unit is used for issuing a security authentication transaction in the main chain, wherein the security authentication transaction is used for indicating target data needing security authentication in a target sub-chain, and the target sub-chain refers to any sub-chain in at least one sub-chain;
the acquisition unit is used for acquiring a security authentication executing transaction corresponding to the security authentication transaction, wherein the security authentication executing transaction is obtained after the security authentication of target data by the target sub-chain;
the processing unit is also used for carrying out transaction authentication on the security authentication execution transaction; and the transaction authentication result is used for executing the transaction according to the security authentication, generating a security authentication result receipt transaction, uploading the security authentication result receipt transaction to the main chain, and indicating a cross-chain authentication result corresponding to the security authentication transaction by the security authentication result receipt transaction.
In one embodiment, an issuing contract is deployed in the backbone, the issuing contract being for issuing a cross-link contract, the processing unit being further for:
invoking the issuing contract to send a security authentication contract to the target sub-chain to cause the target sub-chain to deploy the security authentication contract.
In one embodiment, the security authentication execution transaction includes a security authentication result of the target data; the security authentication result of the target data is obtained by calling a security authentication contract by a consensus node maintaining the target sub-chain and performing security authentication on the target data.
In one embodiment, a security authentication execution transaction corresponding to a security authentication transaction is issued in a target sub-chain; a sub-chain relay service is deployed in the block chain network;
the acquiring unit is used for acquiring a security authentication execution transaction corresponding to the security authentication transaction, and is specifically used for:
acquiring a security authentication execution transaction corresponding to the security authentication transaction from the sub-chain relay service;
the security authentication in the sub-chain relay service performs transaction, and the sub-chain relay service monitors the blocks in the target sub-chain.
In one embodiment, the secure authentication transaction carries a secure authentication identifier; the acquiring unit is used for acquiring a security authentication execution transaction corresponding to the security authentication transaction, and is specifically used for:
and acquiring a target security authentication executing transaction from the target sub-chain, wherein a security authentication identifier carried by the target security authentication executing transaction is matched with a security authentication identifier carried by the security authentication transaction.
In one embodiment, the processing unit is configured to generate a secure authentication result receipt transaction according to a transaction authentication result of the secure authentication execution transaction, and is specifically configured to:
and packaging the transaction authentication result of the security authentication executing transaction and the security authentication identifier carried in the security authentication transaction to obtain a security authentication result receipt transaction.
In one aspect, embodiments of the present application provide a data processing apparatus based on a blockchain network in which a blockchain is maintained, the blockchain being composed of a main chain and at least one sub-chain; the data processing method based on the block chain network is executed by a target consensus node, the data processing device is carried in the target consensus node, and the target consensus node is any consensus node in the consensus nodes for maintaining the target sub-chains; the target sub-chain refers to any one of at least one sub-chain; the data processing apparatus includes:
the acquisition unit is used for acquiring the security authentication transaction issued in the main chain, wherein the security authentication transaction is used for indicating target data needing security authentication in the target sub-chain;
the processing unit is used for calling a security authentication contract to carry out security authentication on the target data; the security authentication executing transaction is generated according to the security authentication result of the target data, and is uploaded to the target sub-chain;
the acquisition unit is also used for acquiring a safety authentication result receipt transaction issued in the main chain, wherein the safety authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the safety authentication transaction, and the safety authentication result receipt transaction is generated according to the transaction authentication result by the main chain for carrying out transaction authentication on the safety authentication execution transaction;
The processing unit is further used for generating a safety authentication result main chain receipt transaction corresponding to the safety authentication result receipt transaction and uploading the safety authentication result main chain receipt transaction to the target sub-chain if the safety authentication result receipt transaction indicates that the cross-chain authentication corresponding to the safety authentication transaction passes; the security authentication result main chain receipt transaction is used for indicating that the cross-chain authentication corresponding to the security authentication execution transaction passes.
In one embodiment, the processing unit is further configured to:
acquiring a security authentication contract, wherein the security authentication contract is sent to a target sub-chain by calling an issuing contract by a consensus node of a maintenance main chain;
a security authentication contract is deployed in the target sub-chain.
In one embodiment, a backbone relay service is deployed in a blockchain network; the acquisition unit is used for acquiring the security authentication transaction issued in the main chain, and is specifically used for:
acquiring a security authentication transaction issued in a main chain from main chain relay service;
the acquisition unit is used for acquiring the security authentication result receipt transaction issued in the main chain, and is specifically used for:
acquiring a safety authentication result receipt transaction issued in a main chain from main chain relay service;
the main chain relay service monitors blocks in the main chain to obtain the security authentication transaction and the security authentication result receipt transaction.
In one embodiment, the secure authentication transaction carries a secure authentication identifier; the processing unit is used for generating a security authentication execution transaction according to the security authentication result of the target data, and is specifically used for:
and packaging the security authentication result of the target data and the security authentication identifier carried in the security authentication transaction to obtain the security authentication execution transaction.
Accordingly, the present application provides a computer device comprising:
a processor for loading and executing the computer program;
a computer readable storage medium having a computer program stored therein, which when executed by a processor, implements the blockchain network-based data processing method described above.
Accordingly, the present application provides a computer readable storage medium storing a computer program adapted to be loaded by a processor and to perform the above described blockchain network based data processing method.
Accordingly, the present application provides a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and the processor executes the computer instructions to cause the computer device to perform the data processing method based on the blockchain network.
In the embodiment of the present application, the blockchain is composed of a main chain and at least one sub-chain, and the data processing flow may include: issuing a security authentication transaction in the main chain, wherein the security authentication transaction is used for indicating target data which needs to be subjected to security authentication in a target sub-chain, acquiring a security authentication execution transaction corresponding to the security authentication transaction, and carrying out transaction authentication on the security authentication execution transaction; and generating a security authentication result receipt transaction according to the transaction authentication result of the security authentication execution transaction, and uploading the security authentication result receipt transaction to the main chain, wherein the security authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the security authentication transaction. Therefore, the main chain can authenticate the target data in the sub-chain by issuing the security authentication transaction and performing transaction authentication on the security authentication execution transaction corresponding to the security authentication transaction.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1a is a schematic diagram of a data sharing system according to an embodiment of the present disclosure;
FIG. 1b is a block chain architecture diagram according to one embodiment of the present disclosure;
fig. 1c is a schematic flow chart of a block generation method according to an embodiment of the present application;
fig. 1d is a schematic architecture diagram of a dual-layer network according to an embodiment of the present application;
fig. 1e is a schematic diagram of a scenario of an electronic invoice service based on a dual-layer network according to an embodiment of the present application;
FIG. 1f is a schematic diagram of a blockchain network hierarchy provided in an embodiment of the present application;
FIG. 1g is a schematic diagram of a data processing flow based on a blockchain network according to an embodiment of the present disclosure;
FIG. 2 is a flowchart of a data processing method based on a blockchain network according to an embodiment of the present disclosure;
FIG. 3 is a flowchart of another data processing method based on a blockchain network according to an embodiment of the present disclosure;
FIG. 4a is a schematic diagram of a security authentication contract deployment process according to an embodiment of the present application;
fig. 4b is a schematic diagram of transmitting block information through a relay service according to an embodiment of the present application;
FIG. 5 is a flowchart of another data processing method based on a blockchain network according to an embodiment of the present disclosure;
FIG. 6 is a schematic diagram of a block chain network based data processing apparatus according to an embodiment of the present application;
FIG. 7 is a schematic diagram of another block chain network based data processing apparatus according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
Embodiments of the present application relate to blockchain technology and related terms and concepts of blockchain technology are briefly described below:
blockchain (Blockchain) is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The method is characterized in that the method is a decentralised database, which is a series of data blocks generated by correlation of a cryptography method, and each data block contains information of a batch of network transactions and is used for checking the validity (anti-counterfeiting) of the information and generating a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
A blockchain network may be understood as a data sharing system 100, the data sharing system 100 may refer to a system for sharing data between nodes, and an exemplary architecture of the data sharing system 100 may be seen in fig. 1a; as shown in fig. 1a, a data sharing system 100 refers to a system for performing data sharing between nodes, where a plurality of nodes 101 may be included in the data sharing system, and the plurality of nodes 101 may be respective clients in the data sharing system. Each node 101 may receive input information while operating normally and maintain shared data within the data sharing system based on the received input information. In order to ensure the information intercommunication in the data sharing system, information connection can exist between each node in the data sharing system, and the nodes can transmit information through the information connection. For example, when any node in the data sharing system receives input information, other nodes in the data sharing system acquire the input information according to a consensus algorithm, and store the input information as data in the shared data, so that the data stored on all nodes in the data sharing system are consistent.
Each node in the data sharing system has a node identifier corresponding to the node identifier, and each node in the data sharing system can store the node identifiers of other nodes in the data sharing system, so that the generated block can be broadcast to other nodes in the data sharing system according to the node identifiers of the other nodes. Each node can maintain a node identification list shown in the following table, and the node names and the node identifications are correspondingly stored in the node identification list. Wherein the node identity may be an IP (Internet Protocol, protocol for interconnection between networks) address and any other information that can be used to identify the node; for example, the node identifier may also be a binary sequence code (e.g., 110001110), and table 1 is only illustrated by taking an IP address as an example:
TABLE 1
Node name | Node identification |
Node 1 | 117.114.151.174 |
Node 2 | 117.116.189.145 |
… | … |
Node X (X is a positive integer) | xx.xxx.xxx.xxx |
Each node in the data sharing system stores one and the same blockchain. The blockchain is composed of a plurality of blocks, see fig. 1b, the blockchain is composed of a plurality of blocks, the starting block comprises a block head and a block main body, the block head stores an input information characteristic value, a version number, a time stamp and a difficulty value, and the block main body stores input information; the next block of the starting block takes the starting block as a father block, the next block also comprises a block head and a block main body, the block head stores the input information characteristic value of the current block, the block head characteristic value of the father block, the version number, the timestamp and the difficulty value, and the like, so that the block data stored in each block in the block chain are associated with the block data stored in the father block, and the safety of the input information in the block is ensured.
When each block in the blockchain is generated, referring to fig. 1c, when the node where the blockchain is located receives input information, checking the input information, after the checking is completed, storing the input information into a memory pool, and updating a hash tree used for recording the input information; then, updating the update time stamp to the time of receiving the input information, trying different random numbers, and calculating the characteristic value for a plurality of times, so that the calculated characteristic value can meet the following formula:
SHA256(SHA256(version+prev_hash+merkle_root+ntime+nbits+x))<TARGET
wherein SHA256 is a eigenvalue algorithm used to calculate eigenvalues; version (version number) is version information of the related block protocol in the block chain; the prev_hash is the block header characteristic value of the parent block of the current block; the merkle_root is a characteristic value of input information; ntime is the update time of the update timestamp; the nbits is the current difficulty, is a fixed value in a period of time, and is determined again after exceeding a fixed period of time; x is a random number; TARGET is a eigenvalue threshold that can be determined from nbits.
Thus, when the random number meeting the formula is calculated, the information can be correspondingly stored to generate the block head and the block main body, and the current block is obtained. And then, broadcasting the newly generated block to other nodes in the data sharing system according to the node identification of other nodes in the data sharing system by the node in which the block chain is positioned, performing common check on the newly generated block by the other nodes, and adding the newly generated block into the stored block chain after the common check is finished. Wherein, the node can perform consensus verification on the newly generated block through a consensus algorithm, and the consensus algorithm can comprise but is not limited to:
1) Pow (Proof of Work):
workload certification refers to a measure set by a system (such as the aforementioned data sharing system) to achieve a certain goal. A simple understanding is a proof to confirm the workload. What is essentially who does much more, who has a better chance to get the bonus. The workload evidence is that a random number meeting a rule is calculated by a node in the blockchain network through AND operation, namely, the billing right is obtained, the data needing to be recorded in the round is sent out, and other nodes in the blockchain network are stored together after verification. This results in the workload proving to have the following advantages: completely decentralizing, and freely entering and exiting the node.
2) Pos (proof-of-status):
pos equity proof is an upgrade consensus mechanism for Pow workload proof; specifically, the longer the time of holding the electronic resource (the length of time of holding the electronic resource=the number of holding the electronic resource) ×the time of holding the electronic resource), the more the person has the opportunity to acquire the billing right of the block, wherein the electronic resource may be a resource stored in an electronic account in an electronic form and capable of being circulated through the internet; according to the proportion and time of the electronic resource occupied by each node; the difficulty of obtaining the workload evidence is reduced in an equal proportion, so that the speed of finding the random number is increased. Pos benefits have demonstrated that the time for consensus to reach is somewhat shortened, but still requires the calculation of random numbers.
3) DPos (Delegated Proof of Stake, delegated rights proving) share authorization proving mechanism:
the DPos share authorization proof mechanism is similar to a board vote, with a number of nodes thrown by the person holding the electronic resource, acting on their checksum accounting. To motivate more people and competing, the system generates a small amount of electronic resources as rewards. The DPos share authorization proof mechanism is to have each person holding a bit stock vote, thus producing a 101-bit representation, which we can understand as 101 supernodes or pools, where the rights of the 101 supernodes to each other are exactly equal. From some point of view, the DPos share authorization proof mechanism is somewhat like a meeting regime or a people representative meeting regime. If the selected representatives cannot fulfill their duties (when they are rolled up, no blocks can be generated), then the representatives are renamed and the network selects a new supernode to replace them. This enables the DPos share authorization proof mechanism to significantly reduce the number of participating checksum accounting nodes, which can reach a second level of consensus check, but the entire consensus mechanism is still dependent on electronic resources.
4) pbft (Practical Byzantine Fault Tolerance, bayer fault tolerance algorithm):
The pbft bayer fault tolerance algorithm is a message passing based consistency algorithm that agrees through three phases that may be repeated for failure. Specifically, assuming that the total number of nodes is 3f+1, f is a praise-court error node, first, when a node finds that a leader (such as a representative node, an accounting node or a super node) is bad, other replicas (nodes) are elected as a leader by an algorithm. Secondly, the leader broadcasts the value it selects to other replying nodes via a pre-prepare message, and the other replying nodes send the prepare message if accepted and not if not accepted. Second, once 2f nodes accept the prepare message, the nodes send a commit message. Finally, when 2f+1 nodes accept the commit message, a value representing the value is determined. The process enables the pbft Bayesian and busy-court fault-tolerant algorithm to commonly know that each node is composed of a business party or a supervision party of the business, and the safety and the stability are ensured by a business related party; and the consensus time delay is about 2-5 seconds, so that the requirement of commercial real-time processing is basically met, the consensus efficiency is improved, and the requirement of high-frequency transaction amount can be met.
5) Paxos (a distributed algorithm) algorithm:
the Paxos algorithm is a two-stage algorithm with three main roles, proposer, accept, learner. Proposer issues agreement, acceptance or rejection, and learner obtains the final value after consensus. The Paxos algorithm includes two phases, respectively: (1) the preparation stage: the proposer selects a proposal number n and sends a prepare request to a plurality of groups in the acceptance; after the receiver receives the request, if the number of the proposal is greater than all the requests which it has replied to, the receiver replies the last accepted proposal to the proposer and promises not to reply to the proposal smaller than n. (2) Approval stage: when one Proposer receives replies of a plurality of acceptors to the request, the approval stage is entered; it sends an accept request to the accept that replies to the prepare request, including the number n and value (if there is no value already accepted, it can decide value freely); the receiver receives the accept request without violating its own promise to other proposers.
The Paxos algorithm is suitable for a simple fault-tolerant model, namely, only invalid or fault nodes exist in the system, no malicious node exists, and if the number of the invalid nodes is x (x is a positive integer), the normal operation of the system can be maintained only by the number of the non-invalid nodes being x+1.
6) Raft (a distributed consensus algorithm) algorithm:
the Raft algorithm contains three roles, respectively: follower (follower), candidate (leader) and leader (leader). A node can only be one of these three states at a time, and these three roles can be switched over each other with time and changes in conditions. All nodes are in the initial state of a follow, the follow which does not receive a heartbeat packet after overtime changes into a candidiate and broadcasts a voting request, the node which obtains majority votes takes the avatar, the process of voting is who sends out the first, and each node only gives out one vote. The leader node periodically sends heartbeat packets to other nodes, and the failure of the leader node causes a new voting process.
In practice, when blockchains are applied in some scenarios, for example: bill service scenarios, government or business data storage scenarios, etc.; in these scenarios, not all nodes in the blockchain network have sufficient resources and necessity to become nodes that participate in blockchain consensus. For the safety of data, when related data of personal privacy or national security is involved in a blockchain hierarchy, a common blockchain deployment mode of data peer-to-peer is not applicable. In order to adapt to service requirements (such as an internal network, an external network, a service network, an office network separation and the like) and further improve the security and confidentiality of data, the embodiment of the application provides a double-layer network architecture for forming a 'witness sub-network-consensus sub-network' through a P2P (Peer to Peer) network, wherein the P2P network is a network of point-to-point connection, and each node of the point-to-point connection is called a Peer node. The P2P network is based on a specific network protocol, so that a central node is not required between peer nodes to maintain network state, and each node maintains node state of the whole network and connection state of the node with adjacent nodes through broadcasting interaction with the adjacent nodes.
Fig. 1d is a schematic diagram of a dual-layer network according to an embodiment of the present application; as shown in fig. 1d, the blockchain network includes a witness sub-network and a consensus sub-network, the service node is deployed in the witness sub-network in the public network, and the accounting node running the blockchain consensus protocol is deployed in the consensus sub-network; the witness and consensus subnetworks interact through a routing boundary. The service nodes in the witness sub-network mainly perform service execution, do not participate in accounting consensus, and acquire block header data and block data with visible partial authorization from the consensus sub-network in an identity authentication mode. The consensus sub-network is a core network in the blockchain network for accounting consensus of the blockchain network. Typically, the witness sub-network and the consensus sub-network are in different network environments, the witness sub-network being in a public network and the consensus sub-network being in a private network. Because the consensus sub-network is in a relatively safe private network, the mutual access of the consensus sub-network and the public network ensures the safety by a consensus mechanism, and no additional identity management or network control is needed. While the service node is in the public network, it may be accessed by other uncertain network terminals, so the behavior of the service node and other possible nodes in accessing the consensus sub-network needs to be tightly controlled.
Taking a blockchain network as an example, the blockchain network is a network for providing consensus service for electronic invoices, a schematic view of a scenario architecture of a dual-layer network according to an embodiment of the present application may be seen in fig. 1e. As shown in fig. 1e, the blockchain network includes: the service layer, the routing agent layer and the core consensus network layer form a whole complete block chain service system; wherein, (1) the business layer is in witness sub-network, the business layer includes at least one business node, the business node can be SPV node specifically, SPV node maintains normal unstructured P2P network, business node can process (local tax office) tax, bill (enterprise billing), payment (enterprise fund flow) etc. business. (2) The core consensus network layer is in a consensus sub-network, and the core consensus network layer includes various consensus clusters, such as consensus cluster 102, consensus clusters 103, … …, and the like, each of which maintains a block chain sub-chain within the present cluster, e.g., consensus cluster 104 maintains core chain 1 within the present cluster, and consensus cluster 105 maintains core chain 2 within the present cluster. (3) The routing agent layer comprises at least one agent node, and the agent node can provide routing service, authentication service, certificate caching service, point-to-point (P2P) service and the like; wherein the certificate caching service involves a certificate hierarchy (PKI, public Key Infrastructure) in which certificates are an identification of the public key owner, issued (CA) by an authority. Asymmetric encryption and digital signature of information can be achieved based on public key certificate systems. The service layer and the core consensus network layer carry out information interaction through the routing agent layer, namely the service layer submits service operation interaction to the core consensus network layer through the routing agent layer, so that the routing agent layer plays an isolating role for the service layer and the core consensus network layer.
Further, referring to fig. 1f, fig. 1f is a schematic diagram of a blockchain network hierarchy according to an embodiment of the present application. The blockchain network hierarchy in the embodiment of the present application may be the blockchain network 104 shown in fig. 1f, and the complete blockchain service system corresponding to the blockchain network 104 may be composed of the service network, the core consensus network, and the routing agent network shown in fig. 1 f.
The number of proxy nodes in the routing proxy network may be one or more, which is not limited herein. Taking the proxy node 105 as an example, the proxy node 105 may be configured to perform network isolation on the service network and the core consensus network. The proxy node 105, and the service node 106, the consensus node 107 may be in particular a terminal device or a server. The terminal device may include, but is not limited to: smart phones (such as Android phones, IOS phones, etc.), tablet computers, portable personal computers, mobile internet devices (MID for short), intelligent voice interaction devices, intelligent home appliances, vehicle terminals, etc., which are not limited in this embodiment of the present application. The server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDN (Content Delivery Network ), basic cloud computing services such as big data and an artificial intelligent platform, which is not limited in the embodiment of the present application. The proxy node 105 may perform network layering on a Peer-To-Peer (P2P for short) network To form a layered structure such as a "service network-core consensus network", so as To improve confidentiality and security of data on a blockchain.
One or more service nodes 106 may be included in the service network (i.e., witness network) shown in fig. 1f, where the service nodes 106 do not need to participate in accounting consensus, and are mainly used for executing the target service to obtain transaction data corresponding to the target service. The service node may be a full-volume node containing the complete blockchain database, or may be a lightweight node storing part of the data in the blockchain database, which will not be limited herein. To reduce the waste of storage space of the service node, the service node in the embodiment of the present application may be a lightweight node (Simplified Payment Verification, SPV for short), and the SPV node does not need to store complete transaction data, but obtains block header data and block data visible for partial authorization (e.g., transaction data associated with the SPV node itself) from the core consensus network shown in fig. 1f through the proxy node 105. One or more consensus nodes 107 may be included in the core consensus network shown in fig. 1f, the consensus nodes 107 being primarily used to consensus transaction data in the blockchain network. The consensus node 107 may have a blockchain consensus protocol running therein.
It is appreciated that the proxy node 105, the service node 106, and the consensus node 107 may be collectively referred to as blockchain nodes in the blockchain network 104 in embodiments of the present application. As can be seen from fig. 1f, the service network and the core consensus network may be two networks independent of each other, in general, the service node may be deployed in a public network, and the consensus node running the blockchain consensus protocol may be deployed in a private core consensus network, and the two networks may interact through a routing boundary.
As shown in fig. 1f, the blockchain in the core consensus network may include a main chain 108, and N sub-chains respectively corresponding to N services derived from the main chain 108; n is a positive integer. In one particular implementation, each time a new sub-chain is derived by the backbone 108 (via the smart contract for annotating the booklet chain), a chain identification is assigned to that sub-chain; that is, the chain identifier of each sub-chain needs to be registered and published in the main chain, and the main chain 108 in the core consensus network may include registration information of the sub-chain corresponding to each service, where the registration information of the sub-chain corresponding to each service includes at least one of the following: the chain identification of the sub-chain, the description information of the service corresponding to the sub-chain, the configuration information of the sub-chain, and the derivative condition of the sub-chain (which can be used to determine the generation block of the sub-chain on the main chain 108); for example, the generation block of the sub-chain 109 is A2, and the generation block of the sub-chain 110 is A3. Therefore, in the blockchain provided by the application, one sub-chain corresponds to one service, and one sub-chain corresponds to one chain identifier, so that different services can be effectively distinguished, and the specificity of data stored by a single sub-chain is maintained.
Further, each sub-chain links transaction data of the business corresponding to the sub-chain, and when verifying the block, the generated block (namely A1) of the main chain can be verified through the generated block of the sub-chain in the main chain besides verifying the block of the sub-chain; if the current consensus node is the consensus node which has synchronized the main chain, the verification of the sub-chain only needs to verify the generation block of the sub-chain in the main chain. In the consensus process, the consensus node can respectively perform consensus on the main chain or the sub-chain of the block chain through the chain identification, and the consensus can be performed synchronously for different sub-chains, so that the efficiency of the consensus can be improved.
It should be noted that, if the configuration information of the blockchain node system (e.g., the tax blockchain system) corresponding to the entire blockchain network changes, the embodiment of the present application may refer to the configuration information with the changed information as configuration change information. For example, the configuration change information may refer to regulatory rules for tax domain categories, computing regulatory changes, important block link point changes, chain certificate issuing node rotations, and the like. In one embodiment, there is a target consensus node in the core consensus network shown in fig. 1 f. The target consensus node has administrative rights, so the target consensus node may also be referred to as a consensus node with administrative rights in the core consensus network. The common node with the supervision authority in the core common network can generate a configuration change block based on the configuration change information, and further uplink the configuration change block to a main chain in the core common network and synchronize to all sub-chains; during this time, other consensus nodes in the core consensus network, except for the consensus node with the supervision authority, need to suspend operation. When the main chain and each sub-chain generate new blocks (configuration change blocks) based on the configuration change information, other consensus nodes in the core consensus network can resume operation. As shown in FIG. 1f, block A4 in the backbone 108 in the blockchain, block B5 in the subchain 109, and block C5 in the subchain 110 may all be referred to as configuration change blocks.
In one implementation, the core consensus network shown in fig. 1f may configure M chain identities for any one service node in the service network, where the M chain identities belong to the chain identities of the N sub-chains registered by the core consensus network. Wherein M is a positive integer less than or equal to N. The number of chain identifiers configured by the consensus node with the supervision authority in the core consensus network for each service node can be the same or different, and the number is not limited herein. For example, if the number of sub-chains derived from the main chain in the core consensus network is 3, and the 3 chain identifiers are respectively a chain identifier 1A corresponding to a service 1 (e.g., a ticket service), a chain identifier 2B corresponding to a service 2 (e.g., a credit sign service), and a chain identifier 3C corresponding to a service 3 (e.g., a business in and out deficiency service), when the consensus node in the core consensus network has a supervision authority, 2 chain identifiers (e.g., a chain identifier 1A and a chain identifier 3C) may be dynamically configured for the service node 106 in the service network. It can be seen that one service node can dynamically configure a plurality of chain identifiers to participate in executing services corresponding to a plurality of sub-chains; specifically, the service node may participate in services corresponding to multiple sub-chains of the blockchain through the same node identifier (such as an SPVID) and address, where the node identifier and address of the service node must be registered in advance in the main chain, and the blockdata of each sub-chain may be independently synchronized back to the service node and stored locally in the service node. The method can effectively ensure the portability and effective safety control of the service node. In other words, the services corresponding to the multiple sub-chains can be participated in executing by the same service node, so that the portability of the service node can be effectively ensured and the effective safety control can be maintained.
In the core consensus network, the target consensus node may also be used to receive service requests sent by service nodes in the service network. For example, the service request herein may include a transaction uplink request and a block synchronization request. The target consensus node may be a first consensus node having a first consensus authority. The first consensus authority herein is used to indicate that the first consensus node is able to participate in a consensus of a backbone and N sub-chains derived from the backbone in the core consensus network. Optionally, the target consensus node may also be a second consensus node having a second consensus authority. The second consensus authority is used to indicate that the second consensus node can participate in the consensus of the sub-chain corresponding to the target chain identifier, that is, the second consensus node may be an independent consensus node for participating in the sub-chain corresponding to the target chain identifier. Wherein the independent consensus node is a consensus node that maintains either the backbone of the blockchain alone, or any one of the subchains of the blockchain. It should be noted that, the consensus network composed of independent consensus nodes may be referred to as an independent consensus network, and the independent consensus nodes used for maintaining a certain sub-chain need to synchronize data (such as blocks) in the main chain of the block chain. Further, the proxy node 105 needs to record independent consensus node information (e.g. address), and if a request for sending transaction data or synchronous transaction data to the independent consensus network is received, the request is forwarded to the independent consensus node. Otherwise, according to the original basic configuration, the request is checked and then forwarded to the consensus node of the core network, and the consensus node is independently processed according to the chain identification of the sub-chain of the request.
Based on the above description of the blockchain network structure related to the embodiment of the present application, the following briefly describes a blockchain network-based data processing scheme proposed by the embodiment of the present application based on the above blockchain network structure, which can authenticate target data in a sub-chain of a blockchain. Fig. 1g is a schematic diagram of a data processing flow based on a blockchain network according to an embodiment of the present application. In a specific implementation, the blockchain includes a main chain and at least one sub-chain. As shown in fig. 1g, the general principle of a blockchain network-based data processing scheme is as follows:
1) The consensus node for maintaining the backbone issues a security authentication transaction in the backbone, the security authentication transaction being for indicating target data in a target sub-chain, the target sub-chain being any one of the at least one sub-chain, for which security authentication is required.
2) The consensus node for maintaining the target sub-chain obtains the secure authenticated transaction issued in the backbone. In one embodiment, a backbone relay service is deployed in the blockchain network, and the backbone relay service monitors the backbone to obtain a block carrying a security authentication transaction in the backbone, and a consensus node for maintaining the target sub-chain can obtain the security authentication transaction through the backbone relay service. After the security authentication transaction is acquired, the consensus node for maintaining the target sub-chain performs security authentication on the target data according to the instruction of the security authentication transaction (for example, searches whether sensitive words, illegal transaction data and the like exist in the transaction data in the target period); after the security authentication result of the target data is obtained, the consensus node for maintaining the target sub-chain generates a security authentication execution transaction according to the security authentication result of the target data, and uploads the security authentication execution transaction to the target sub-chain.
3) The consensus node for maintaining the backbone obtains the security authentication executing transaction issued in the target sub-chain. In one embodiment, a sub-chain relay service is deployed in the blockchain network, the sub-chain relay service acquires a block carrying a security authentication execution transaction in a target sub-chain through monitoring the sub-chain, and a consensus node for maintaining the main chain can acquire the security authentication execution transaction through the sub-chain relay service. After the security authentication executing transaction is obtained, the consensus node for maintaining the main chain performs transaction authentication on the security authentication executing transaction (such as verifying whether the security proof material carried in the security authentication executing transaction is valid or not); after the transaction authentication result of the security authentication executing transaction is obtained, a consensus node for maintaining the main chain generates a security authentication result receipt transaction according to the transaction authentication result of the security authentication executing transaction, and uploads the security authentication result receipt transaction to the main chain, wherein the security authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the security authentication transaction.
4) The consensus node for maintaining the target sub-chain acquires a safety authentication result receipt transaction issued in the main chain; the security authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the security authentication transaction, and as known from the step 3), the security authentication result receipt transaction is generated according to the transaction authentication result and is generated by performing transaction authentication on the security authentication execution transaction by the main chain. The specific embodiment of obtaining the secure authentication result receipt transaction issued in the main chain may refer to the embodiment of obtaining the secure authentication transaction issued in the main chain in step 2), and will not be described herein. After the safety certification result receipt transaction issued in the main chain is obtained, the consensus node for maintaining the target sub-chain generates a safety certification result main chain receipt transaction corresponding to the safety certification result receipt transaction, and the safety certification result main chain receipt transaction is uploaded to the target sub-chain. The secure authentication result backbone response piece transaction is used to indicate the cross-chain authentication result of the secure authentication execution transaction.
It should be noted that: in the target sub-chain, the security authentication executing transaction and the security authentication result main chain receipt transaction are respectively stored in two independent blocks, and the block carrying the security authentication result main chain receipt transaction is positioned behind the block carrying the security authentication executing transaction (namely, in the target sub-chain, the height of the block carrying the security authentication result main chain receipt transaction is higher than that of the block carrying the security authentication executing transaction) so as to ensure the ordering of the target sub-chain blocks. Specifically, subsequent transactions in the target sub-chain may be set to a pre-validation state (i.e., the transactions are uploaded to the target sub-chain, but the state is marked as pre-validation) after the target sub-chain uploads the block carrying the security authentication executing transaction. If the security authentication result receipt transaction indicates that the security authentication execution transaction passes the transaction authentication, the target sub-chain generates a security authentication result main chain receipt transaction and uploads the security authentication result main chain receipt transaction to the target sub-chain. At this time, in addition to the status of the transaction in the block carrying the security authentication result main receipt transaction being set to be valid, there is also a status of the pre-valid transaction between the block carrying the security authentication executing transaction to the block carrying the security authentication result main receipt transaction being set to be valid. That is, only after the block carrying the security authentication result backbone response piece transaction is uplink in the target sub-chain will the transaction between the block carrying the security authentication executing transaction to the block carrying the security authentication result backbone response piece transaction be set to be valid.
In the embodiment of the present application, the blockchain is composed of a main chain and at least one sub-chain, and the data processing flow may include: issuing a security authentication transaction in the main chain, wherein the security authentication transaction is used for indicating target data which needs to be subjected to security authentication in a target sub-chain, acquiring a security authentication execution transaction corresponding to the security authentication transaction, and carrying out transaction authentication on the security authentication execution transaction; and generating a security authentication result receipt transaction according to the transaction authentication result of the security authentication execution transaction, and uploading the security authentication result receipt transaction to the main chain, wherein the security authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the security authentication transaction. Therefore, the main chain can authenticate the target data in the sub-chain by issuing the security authentication transaction and performing transaction authentication on the security authentication execution transaction corresponding to the security authentication transaction.
Based on the above-mentioned data processing scheme based on the blockchain network, the embodiments of the present application provide a more detailed data processing method based on the blockchain network, and the data processing method provided by the embodiments of the present application will be described in detail below with reference to the accompanying drawings.
Fig. 2 is a flowchart of a data processing method based on a blockchain network according to an embodiment of the present application. A blockchain is maintained in the blockchain network, and consists of a main chain and at least one sub-chain; the data processing method may be performed by a target consensus node, which is any one of the consensus nodes maintaining the backbone. As shown in fig. 2, the data processing method may include, but is not limited to, steps S201-S204:
S201, issuing a security authentication transaction in a main chain.
The security authentication transaction is used for indicating target data which need to be subjected to security authentication in a target sub-chain; for example, when the main chain needs to perform sensitive word detection on the transaction data of the target sub-chain in the target period, the target consensus node issues a security authentication transaction 1 in the main chain, and the target data in the security authentication transaction 1 is the transaction data in the target period. Wherein the target sub-chain refers to any one of at least one sub-chain of the blockchain.
In one embodiment, the target consensus node issues the secure authentication transaction by uploading the secure authentication transaction into the backbone. Optionally, the target consensus node may also issue the secure authentication transaction by broadcasting the secure authentication transaction in a blockchain network.
S202, acquiring a security authentication executing transaction corresponding to the security authentication transaction.
The security authentication executing transaction corresponding to the security authentication transaction is generated after security authentication is carried out on the target data by maintaining a consensus node of the target sub-chain. The specific implementation mode of carrying out security authentication on the target data can be determined according to actual requirements, and the application is not limited to the specific implementation mode; for example, securely authenticating the target data may refer to: sensitive word filtering is carried out on transaction data of the target sub-chain in the past month; for another example, security authentication of target data may refer to: checking whether the target transaction (such as the transaction responsible for the human user a) in the target sub-chain meets the transaction rule (such as whether the transaction amount exceeds an amount threshold, etc.).
In practical application, the target consensus node may acquire the security authentication execution transaction corresponding to the security authentication transaction by receiving the broadcast, and sending an acquisition request to a sub-link relay service deployed in the blockchain network.
S203, performing transaction authentication on the security authentication execution transaction.
The target consensus node transacting authentication for the security authentication performing transaction may include, but is not limited to: and verifying the security authentication proving material provided in the security authentication executing transaction, and verifying the security authentication result of the target data in the security authentication executing transaction. The specific transaction authentication mode can be determined according to actual requirements, and the application is not limited to the specific transaction authentication mode; for example, if the target data is securely authenticated, this means: performing sensitive word filtering on transaction data of the target sub-chain in the past month, performing transaction authentication on the security authentication may refer to: it is verified whether the target sub-chain has sensitive words in the transaction data in the past month.
S204, according to the transaction authentication result of the security authentication execution transaction, generating a security authentication result receipt transaction, and uploading the security authentication result receipt transaction to the main chain.
The secure authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the secure authentication transaction. Specifically, if the transaction authentication result indicates that the security authentication execution transaction passes the transaction authentication, the security authentication result receipt transaction is used for indicating that the cross-chain authentication passes; correspondingly, if the transaction authentication result indicates that the security authentication execution transaction fails the transaction authentication, the security authentication result receipt transaction is used for indicating that the cross-chain authentication fails.
In the embodiment of the present application, the blockchain is composed of a main chain and at least one sub-chain, and the data processing flow may include: issuing a security authentication transaction in the main chain, wherein the security authentication transaction is used for indicating target data which needs to be subjected to security authentication in a target sub-chain, acquiring a security authentication execution transaction corresponding to the security authentication transaction, and carrying out transaction authentication on the security authentication execution transaction; and generating a security authentication result receipt transaction according to the transaction authentication result of the security authentication execution transaction, and uploading the security authentication result receipt transaction to the main chain, wherein the security authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the security authentication transaction. Therefore, the main chain can authenticate the target data in the sub-chain by issuing the security authentication transaction and performing transaction authentication on the security authentication execution transaction corresponding to the security authentication transaction.
Fig. 3 is a flowchart of another data processing method based on a blockchain network according to an embodiment of the present application. A blockchain is maintained in the blockchain network, and consists of a main chain and at least one sub-chain; the data processing method may be performed by a target consensus node, which is any one of the consensus nodes maintaining the backbone. As shown in fig. 3, the data processing method may include, but is not limited to, steps S301-S305:
s301, calling an issuing contract, and sending a security authentication contract to a target sub-chain.
In one embodiment, the main chain is deployed with an issued contract, i.e. the consensus node for maintaining the main chain is deployed with an issued contract; the issuing contract is used to issue a cross-link contract, i.e., send the cross-link contract to the sub-link, which may include, but is not limited to, a security authentication contract. The target consensus node may send a security authentication contract to the target sub-chain by invoking the issuing contract to cause the consensus node for maintaining the target sub-chain to deploy the security authentication contract.
Fig. 4a is a schematic diagram of a security authentication contract deployment procedure according to an embodiment of the present application. As shown in fig. 4a, the target consensus node sends a security authentication contract comprising authentication logic to the target sub-chain by invoking an issued contract; after receiving the security authentication contract containing authentication logic, the consensus node for maintaining the target sub-chain deploys the security authentication contract in the target sub-chain and returns a deployment result of the security authentication contract to the main chain; and after receiving the unripe result returned by the target sub-chain, the target consensus node determines a contract release result according to the deployment result. When the security authentication contract needs to be deployed on a plurality of sub-chains, the main chain determines that the security authentication contract is successfully issued after the sub-chains return successful deployment of the security authentication contract.
It is understood that reference herein to a cross-chain refers to from the backbone of a blockchain to a daughter chain, or from the daughter chain of a blockchain to the backbone, in essence, the daughter chain and the backbone still belonging to the same blockchain.
S302, issuing a security authentication transaction in the main chain.
The specific embodiment of step S302 can refer to the embodiment of step S201 in fig. 2, and will not be described herein.
In one embodiment, the secure authenticated transaction includes a secure authentication identifier that may be used to determine a secure authenticated execution transaction corresponding to the secure authenticated transaction, and a secure authentication outcome response piece transaction corresponding to the secure authenticated transaction.
It should be noted that the security authentication may be periodic, i.e., at intervals, the main chain will perform security authentication on the target data (e.g., transaction data) of the sub-chain in the period, so as to ensure that the data in the blockchain meets the relevant specification (e.g., does not carry sensitive vocabulary).
S303, acquiring a security authentication executing transaction corresponding to the security authentication transaction from the sub-chain relay service.
The security authentication executing transaction corresponding to the security authentication transaction comprises a security authentication result of the target data, wherein the security authentication result is obtained by calling a security authentication contract by a consensus node maintaining the target sub-chain and performing security authentication on the target data.
In one embodiment, a sub-link relay service is deployed in the blockchain network, and the sub-link relay service is used for monitoring the sub-links; in a specific implementation manner, each time a sub-chain is derived from the main chain, a sub-chain relay service corresponding to the sub-chain is deployed to monitor the sub-chain, that is, each sub-chain corresponds to a sub-chain relay service. Wherein monitoring the sub-chain comprises: tracking block header information of the sub-chain and state change of blocks in the sub-chain; that is, each time a new chunk is generated in the sub-chain, the sub-chain relay service obtains the relevant information (e.g., the chunk header) of the chunk and submits the relevant information to the main chain through the sub-chain relay contract, so that the main chain can sense the change of the sub-chain. The manner of submission includes: when a synchronous request of a main chain is received, block information of the sub chain is submitted to the main chain through a sub chain relay contract; or submitting the block information of the sub-chain to the main chain through the sub-chain relay contract according to a preset period.
Accordingly, each time the main chain derives a sub-chain, a main chain relay service corresponding to the sub-chain is deployed to monitor the main chain, that is, each sub-chain corresponds to a main chain relay service, and the sub-chain obtains block information in the main chain through the corresponding main chain relay service. Wherein, monitor the main chain and include: tracking block header information of the main chain and state change of blocks in the main chain; that is, every time a new chunk is generated in the main chain, the main chain relay service obtains the related information (such as the chunk header) of the chunk and submits the related information to the corresponding sub-chain through the main chain relay contract, so that the sub-chain can sense the change of the main chain. The manner of submission includes: when receiving a synchronous request of a sub-chain, submitting block information of a main chain to the sub-chain through a main chain relay contract; or submitting the block information of the main chain to the sub-chain through the main chain relay contract according to a preset period.
The specific implementation process of the target consensus node for acquiring the security authentication execution transaction corresponding to the security authentication transaction from the sub-chain relay service is as follows: the sub-chain relay service acquires a security authentication executing transaction corresponding to the security authentication transaction from the target sub-chain, wherein the security authentication executing transaction is generated after maintaining a consensus node of the target sub-chain to perform security authentication on target data indicated in the security authentication transaction; after the security authentication executing transaction corresponding to the security authentication transaction is acquired, the sub-link relay service caches the security authentication executing transaction; when the submitting condition is met, the sub-chain relay service sends block information of a target sub-chain to the target consensus node, wherein the block information carries security authentication executing transaction corresponding to the security authentication transaction; wherein meeting the commit condition may include, but is not limited to: the current moment coincides with the preset submitting time, the block information cached in the sub-chain relay service reaches a quantity threshold, and the sub-chain relay service receives a block information acquisition request sent by the target consensus node.
Fig. 4b is a schematic diagram of transmitting block information through a relay service according to an embodiment of the present application. As shown in fig. 4B, the blockchain includes a main chain a and a sub-chain B, and the main chain a can sense the change of the sub-chain B by tracking the block header of the sub-chain B through the sub-chain B relay service; specifically, after the sub-chain B relay service monitors that a new block is generated in the sub-chain B, relevant information of the block is obtained, and information such as a block header, merck tree information, a cross-chain flag bit and the like of the block is submitted to the main chain a through a sub-chain B relay contract. The cross-chain flag bit is used for indicating the object of the block participating in cross-chain; for example, "Cross" in A1: ALL "represents that block A1 participates in the cross-chain of ALL sub-chains; for another example, "Cross" in B4: a "represents that block B4 participates in the cross-chain of backbone a. Similarly, the sub-chain B can sense the change of the main chain A by tracking the block head of the main chain through the main chain relay service; specifically, after the main chain relay service monitors that a new block is generated in the main chain A, the main chain relay service acquires relevant information of the block, and submits information such as a block header, merck tree information, a cross-chain flag bit and the like of the block to the sub-chain B through a main chain relay contract.
In another embodiment, the security authentication executing transaction corresponding to the security authentication transaction is obtained by packaging the security authentication identifier and the security authentication result by the consensus node maintaining the target sub-chain. The manner of packaging may include, but is not limited to: signing (e.g. encrypting) the security authentication result through the security authentication identifier to obtain a security authentication execution transaction; or, carrying out joint operation on the security authentication result and the security authentication identifier to obtain a security authentication execution transaction; or, combining the security authentication result and the security authentication identifier to obtain the security authentication execution transaction. Wherein the secure authentication identification is obtained from a secure authentication transaction.
In a specific implementation manner, after the target consensus node issues the security authentication transaction, the target security authentication executing transaction is obtained from the sub-chain relay service through the security authentication identifier, and the security authentication identifier carried by the target security authentication executing transaction is matched with the security authentication identifier carried in the security authentication transaction, that is, the target security authentication executing transaction is the security authentication executing transaction corresponding to the security authentication transaction.
S304, performing transaction authentication on the security authentication execution transaction.
The specific embodiment of step S304 can refer to the embodiment of step S203 in fig. 2, and will not be described herein.
S305, according to the transaction authentication result of the security authentication execution transaction, generating a security authentication result receipt transaction, and uploading the security authentication result receipt transaction to the main chain.
In one embodiment, the security authentication result receipt transaction is obtained by packaging a transaction authentication result of the security authentication execution transaction and a security authentication identifier carried in the security authentication transaction by the target consensus node. The manner of packaging may include, but is not limited to: signing the transaction authentication result through the security authentication identifier to obtain a security authentication result receipt transaction; or, carrying out joint operation on the transaction authentication result and the security authentication identifier to obtain a receipt transaction of the security authentication result; or combining the transaction authentication result and the security authentication identifier to obtain a security authentication result receipt transaction.
After generating a security authentication result receipt transaction, uploading the security authentication result receipt transaction to a consensus network of a main chain by a target consensus node for consensus; after the security authentication results receipt transaction consensus passes, it is packaged in a target chunk and the target chunk is added to the backbone.
In the embodiment of the present application, the blockchain is composed of a main chain and at least one sub-chain, and the data processing flow may include: issuing a security authentication transaction in the main chain, wherein the security authentication transaction is used for indicating target data which needs to be subjected to security authentication in a target sub-chain, acquiring a security authentication execution transaction corresponding to the security authentication transaction, and carrying out transaction authentication on the security authentication execution transaction; and generating a security authentication result receipt transaction according to the transaction authentication result of the security authentication execution transaction, and uploading the security authentication result receipt transaction to the main chain, wherein the security authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the security authentication transaction. Therefore, the main chain can authenticate the target data in the sub-chain by issuing the security authentication transaction and performing transaction authentication on the security authentication execution transaction corresponding to the security authentication transaction. The data processing method based on the blockchain network can be applied to a main chain derived subchain scheme (such as a tax system), the main chain carries out periodic cross-chain safety authentication on the subchains, and the independent business of the subchains can be checked and authenticated by the main chain periodically in the form of the blockchain cross-chain scheme; under the scene that the auditing control requirement on sensitive data (such as government agency data) is high, the safety control on the sub-chain can be better realized.
Fig. 5 is a flowchart of another data processing method based on a blockchain network according to an embodiment of the present application. A blockchain is maintained in the blockchain network, and consists of a main chain and at least one sub-chain; the data processing method can be executed by a target consensus node, wherein the target consensus node is any one of the consensus nodes maintaining a target sub-chain; the target daughter strand is any one of the at least one daughter strand.
As shown in fig. 5, the data processing method may include, but is not limited to, steps S501-S506:
s501, acquiring a security authentication contract and deploying the security authentication contract in a target sub-chain.
The security authentication contract is sent to the target consensus node by the consensus node of the maintenance main chain calling the issuing contract; the security authentication contract is used for indicating security authentication rules of data to be authenticated, and the specific security authentication rules can be flexibly set according to actual requirements, which is not limited in the application; for example, the security authentication contract may include sensitive word screening rules, transaction amount definition rules, and the like.
In one embodiment, deploying the security authentication contract in the target sub-chain refers to storing the security authentication contract in a consensus node maintaining the target sub-chain.
S502, acquiring a security authentication transaction issued in a main chain.
The security authentication transaction is used for indicating target data which need to be subjected to security authentication in a target sub-chain; for example, when the main chain needs to perform sensitive word detection on the transaction data of the target sub-chain in the target period, the target consensus node issues a security authentication transaction 1 in the main chain, and the target data in the security authentication transaction 1 is the transaction data in the target period.
In one embodiment, a backbone relay service is deployed in the blockchain network, the backbone relay service being used to monitor the backbone. Wherein, monitor the main chain and include: tracking block header information of the main chain and state change of blocks in the main chain; that is, every time a new chunk is generated in the backbone, the backbone relay service obtains the relevant information (e.g., the chunk header) of the chunk and submits it to the target sub-chain via the backbone relay contract, so that the target sub-chain can perceive the change of the backbone. The manner of submission includes: when a synchronous request of a target sub-chain is received, block information of a main chain is submitted to the target sub-chain through a main chain relay contract; or submitting the block information of the main chain to the target sub-chain through the main chain relay contract according to a preset period.
Further, after the main chain relay service obtains the security authentication transaction from the main chain, the main chain relay service caches the security authentication transaction; when the submitting condition is met, the main chain relay service sends block information of the main chain to the target consensus node, wherein the block information carries security authentication transaction; wherein meeting the commit condition may include, but is not limited to: the current moment coincides with the preset submitting time, the block information cached in the main chain relay service reaches the quantity threshold, and the main chain relay service receives a block information acquisition request sent by the target consensus node.
S503, invoking a security authentication contract to perform security authentication on the target data.
The target consensus node invokes a security authentication contract to secure the target data, which may include, but is not limited to: providing a security proving material of the target data, filtering sensitive words of the target data, checking identity information of a responsible person of the target data, and the like. The specific security authentication mode can be flexibly set according to actual requirements, and the application is not limited to the specific security authentication mode.
S504, generating a security authentication execution transaction according to the security authentication result of the target data, and uploading the security authentication execution transaction to the target sub-chain.
The security authentication result is obtained by calling a security authentication contract by the target consensus node and performing security authentication on the target data.
In one embodiment, the secure authenticated transaction carries a secure authentication identification. The specific implementation mode of the target consensus node for generating the security authentication execution transaction according to the security authentication result of the target data is as follows: and the target consensus node packages the security authentication identifier and the security authentication result to obtain a security authentication execution transaction. The manner of packaging may include, but is not limited to: signing the security authentication result through the security authentication identifier to obtain a security authentication execution transaction; or, carrying out joint operation on the security authentication result and the security authentication identifier to obtain a security authentication execution transaction; or, combining the security authentication result and the security authentication identifier to obtain the security authentication execution transaction.
Further, after the security authentication executing transaction is obtained, the target consensus node uploads the security authentication executing transaction to a consensus network of a target sub-chain for consensus; after the security authentication performs transaction consensus, it is packed in a target block and the target block is added to the backbone.
S505, acquiring a safety authentication result receipt transaction issued in the main chain.
The security authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the security authentication transaction, and the security authentication result receipt transaction is generated according to the transaction authentication result by performing transaction authentication on the security authentication execution transaction by a main chain. The specific embodiment of obtaining the secure authentication result receipt transaction issued in the main chain may refer to the embodiment of obtaining the secure authentication transaction issued in the main chain in step S502, which is not described herein.
Further, if the receipt transaction of the security authentication result indicates that the cross-chain authentication corresponding to the security authentication transaction passes, continuing to execute step S506; correspondingly, if the receipt transaction of the security authentication result indicates that the cross-chain authentication corresponding to the security authentication transaction does not pass, a maintenance prompt is output to maintenance personnel of the target consensus node so as to prompt the maintenance personnel to maintain the target data in the target sub-chain.
S506, generating a safety authentication result main chain receipt transaction corresponding to the safety authentication result receipt transaction, and uploading the safety authentication result main chain receipt transaction to the target sub-chain.
The security authentication result main chain receipt transaction is used for indicating that the cross-chain authentication corresponding to the security authentication execution transaction passes (namely, the target data in the target sub-chain passes the cross-chain security authentication). The specific embodiment of uploading the security authentication result main chain receipt transaction to the target sub-chain may refer to the embodiment of uploading the security authentication execution transaction to the target sub-chain in step S504, which is not described herein.
The data processing method based on the blockchain network provided in the present application is described below by way of a complete example:
(1) Security authentication contract release: the main chain is deployed with a 'security authentication contract issuing contract', and the main chain issues the security authentication contract to the sub-chain B by calling the 'security authentication contract issuing contract'. The invoking process of the security authentication contract issuing contract comprises the steps of sending the security authentication contract containing authentication logic to the sub-chain B, synchronously returning the deployment result of the security authentication contract to the main chain, and judging that the execution is successful until the security authentication contract on the sub-chain B is successfully deployed.
(2) When the security authentication period is reached, the main chain firstly issues a security authentication transaction, the security authentication transaction comprises a security authentication ID, the sub-chain B synchronizes to the security authentication transaction through main chain relay service, and according to the indication of the security authentication transaction, a security authentication contract is called to carry out security authentication on target data; for example, sensitive word filtering of transaction data contents in the past month, auditing of special transaction law, and the like, security authentication proving material providing target data, and the like, the security authentication result and the security authentication ID are packaged to obtain a security authentication execution transaction, and the security authentication execution transaction is marked as a waiting authentication state (i.e., the security authentication execution transaction waits for main chain confirmation).
(3) The main chain obtains the security authentication executing transaction in the sub-chain B according to the sub-chain relay service (namely, the sub-chain B carries out security authentication on the target data, and the main chain confirms the security authentication result), carries out transaction authentication on the security authentication executing transaction, and packages the transaction authentication result and r to obtain a security authentication result receipt transaction.
(4) The sub-chain B synchronizes to the safety certification result receipt transaction according to the main chain relay service, if the safety certification result receipt transaction indicates that the safety certification executing transaction passes the transaction certification, the safety certification result main chain receipt transaction is generated, the safety certification result main chain receipt transaction is uploaded to the sub-chain B, and the safety certification result main chain receipt transaction is used for indicating that the safety certification executing transaction passes the transaction certification of the main chain.
It should be noted that: in the sub-chain B, the security authentication executing transaction and the security authentication result main chain receipt transaction are both put into independent blocks, and the block carrying the security authentication result main chain receipt transaction is positioned behind the block carrying the security authentication executing transaction so as to ensure the order. After uploading the block carrying the security authentication execution transaction, the transactions in the sub-chain B are set to a pre-validation state, i.e. the transactions are uplink but the state is pre-validated. If the transaction authentication of the security authentication executing transaction in the main chain is successful, in addition to the block carrying the security authentication result main chain receipt transaction, the state of the pre-validated transaction between the block carrying the security authentication executing transaction and the block carrying the security authentication result main chain receipt transaction is set to be validated, that is, only after the block carrying the security authentication result main chain receipt transaction is uplink in the sub-chain B, the transaction between the block carrying the security authentication executing transaction and the block carrying the security authentication result main chain receipt transaction is validated.
Correspondingly, if the transaction authentication of the security authentication executing transaction in the main chain is unsuccessful, the main chain returns failure or overtime processing to the sub-chain B, the pre-effective transaction after the block carrying the security authentication executing transaction is automatically invalid, the transaction returns to the transaction pool, and the subsequent sub-chain B is waited to pass the security authentication and is packaged. Specifically: if the reason that the transaction authentication of the security authentication execution transaction in the main chain is unsuccessful is that the main chain processing is overtime, the transaction authentication of the security authentication execution transaction should be retried; if the transaction authentication of the security authentication executing transaction in the main chain is unsuccessful, if the security authentication executing transaction is wrong, a maintenance prompt should be output to a maintainer of the sub-chain B to prompt the maintainer to carry out security maintenance on the target data in the sub-chain B, and then the main chain is informed again, and the security authentication is initiated.
Further, when other sub-links of the blockchain are connected to the sub-link B or a consensus node for maintaining the sub-link B is newly added, the security authentication condition of the main chain for the sub-link B is determined according to the latest security authentication result main chain receipt transaction in the sub-link B, and if the latest security authentication result main chain receipt transaction is outdated (i.e. not within the validity period), the sub-link B is judged to have a security inspection problem, and the data interaction with the sub-link B can be suspended.
It can be understood that, in addition to the secure authentication of the sub-chain, the data processing method based on the blockchain provided by the application can also perform related authentication such as identity authentication and authority authentication on the sub-chain, and specific embodiments refer to the above embodiments for performing secure authentication on the sub-chain and are not described herein.
In the embodiment of the present application, the blockchain is composed of a main chain and at least one sub-chain, and the data processing flow may include: acquiring a security authentication transaction issued in a main chain, wherein the security authentication transaction is used for indicating target data needing security authentication in a target sub-chain; invoking a security authentication contract to perform security authentication on the target data, generating a security authentication execution transaction according to a security authentication result of the target data, uploading the security authentication execution transaction to a target sub-chain, acquiring a security authentication result receipt transaction issued in a main chain, generating a security authentication result main chain receipt transaction corresponding to the security authentication result receipt transaction if the security authentication result receipt transaction indicates that the cross-chain authentication corresponding to the security authentication transaction passes, and uploading the security authentication result main chain receipt transaction to the target sub-chain. Therefore, the main chain can authenticate the target data in the sub-chain by issuing the security authentication transaction and performing transaction authentication on the security authentication execution transaction corresponding to the security authentication transaction. The data processing method based on the blockchain network can be applied to a main chain derived subchain scheme (such as a tax system), the main chain carries out periodic cross-chain safety authentication on the subchains, and the independent business of the subchains can be checked and authenticated by the main chain periodically in the form of the blockchain cross-chain scheme; under the scene that the auditing control requirement on sensitive data (such as government agency data) is high, the safety control on the sub-chain can be better realized.
The foregoing details of the method of embodiments of the present application are set forth in order to provide a better understanding of the foregoing aspects of embodiments of the present application, and accordingly, the following provides a device of embodiments of the present application.
Referring to fig. 6, fig. 6 is a schematic structural diagram of a data processing apparatus based on a blockchain network, where the apparatus may be installed on a computer device, the computer device may be a target consensus node in the blockchain network, a blockchain is maintained in the blockchain network, the blockchain is composed of a main chain and at least one sub-chain, and the target consensus node may be any one of the consensus nodes maintaining the main chain. The blockchain network-based data processing device shown in fig. 6 may be used to perform some or all of the functions of the method embodiments described above with respect to fig. 2 and 3. Referring to fig. 6, the detailed descriptions of the respective units are as follows:
a processing unit 601, configured to issue a security authentication transaction in a main chain, where the security authentication transaction is used to indicate target data that needs to be securely authenticated in a target sub-chain, and the target sub-chain refers to any one of at least one sub-chain;
an obtaining unit 602, configured to obtain a security authentication execution transaction corresponding to the security authentication transaction, where the security authentication execution transaction is obtained after performing security authentication on the target data by the target sub-chain;
The processing unit 601 is further configured to perform transaction authentication on the security authentication execution transaction;
and the transaction authentication result is used for executing the transaction according to the security authentication, generating a security authentication result receipt transaction, uploading the security authentication result receipt transaction to the main chain, and indicating a cross-chain authentication result corresponding to the security authentication transaction by the security authentication result receipt transaction.
In one embodiment, the main chain has an issued contract deployed therein, the issued contract being used to issue a cross-link contract, the processing unit 601 being further configured to:
invoking the issuing contract to send a security authentication contract to the target sub-chain to cause the target sub-chain to deploy the security authentication contract.
In one embodiment, the security authentication execution transaction includes a security authentication result of the target data; the security authentication result of the target data is obtained by calling a security authentication contract by a consensus node maintaining the target sub-chain and performing security authentication on the target data.
In one embodiment, a security authentication execution transaction corresponding to a security authentication transaction is issued in a target sub-chain; a sub-chain relay service is deployed in the block chain network;
the acquiring unit 602 is configured to acquire a security authentication execution transaction corresponding to the security authentication transaction, and specifically is configured to:
Acquiring a security authentication execution transaction corresponding to the security authentication transaction from the sub-chain relay service;
the security authentication in the sub-chain relay service performs transaction, and the sub-chain relay service monitors the blocks in the target sub-chain.
In one embodiment, the secure authentication transaction carries a secure authentication identifier; the acquiring unit 602 is configured to acquire a security authentication execution transaction corresponding to the security authentication transaction, and specifically is configured to:
and acquiring a target security authentication executing transaction from the target sub-chain, wherein a security authentication identifier carried by the target security authentication executing transaction is matched with a security authentication identifier carried by the security authentication transaction.
In one embodiment, the processing unit 601 is configured to generate a response piece transaction with a security authentication result according to a transaction authentication result of the security authentication execution transaction, specifically configured to:
and packaging the transaction authentication result of the security authentication executing transaction and the security authentication identifier carried in the security authentication transaction to obtain a security authentication result receipt transaction.
According to one embodiment of the present application, some of the steps involved in the blockchain network-based data processing methods shown in fig. 2 and 3 may be performed by various units in the blockchain network-based data processing device shown in fig. 6. For example, step S201, step S203, and step S204 shown in fig. 2 may be performed by the processing unit 601 shown in fig. 6, and step S202 may be performed by the acquisition unit 602 shown in fig. 6; step S301, step S302, step S304, and step S305 shown in fig. 3 may be performed by the processing unit 601 shown in fig. 6, and step S303 may be performed by the acquisition unit 602 shown in fig. 6. The various units in the blockchain network-based data processing device shown in fig. 6 may be combined into one or several other units separately or all, or some (some) of the units may be further split into a plurality of units with smaller functions to form the same operation, which may not affect the implementation of the technical effects of the embodiments of the present application. The above units are divided based on logic functions, and in practical applications, the functions of one unit may be implemented by a plurality of units, or the functions of a plurality of units may be implemented by one unit. In other embodiments of the present application, the blockchain network-based data processing device may also include other units, and in actual practice, these functions may also be implemented with the assistance of other units, and may be implemented by the cooperation of multiple units.
According to another embodiment of the present application, a blockchain network-based data processing device as shown in fig. 6 may be constructed by running a computer program (including program code) capable of executing the steps involved in the respective methods as shown in fig. 2 and 3 on a general-purpose computing device such as a computer including a Central Processing Unit (CPU), a random access storage medium (RAM), a read only storage medium (ROM), etc., processing elements and storage elements, and implementing the blockchain network-based data processing method of the embodiments of the present application. The computer program may be recorded on, for example, a computer-readable recording medium, and loaded into and run in the above-described computing device through the computer-readable recording medium.
In the embodiment of the present application, the blockchain is composed of a main chain and at least one sub-chain, and the data processing flow may include: issuing a security authentication transaction in the main chain, wherein the security authentication transaction is used for indicating target data which needs to be subjected to security authentication in a target sub-chain, acquiring a security authentication execution transaction corresponding to the security authentication transaction, and carrying out transaction authentication on the security authentication execution transaction; and generating a security authentication result receipt transaction according to the transaction authentication result of the security authentication execution transaction, and uploading the security authentication result receipt transaction to the main chain, wherein the security authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the security authentication transaction. Therefore, the main chain can authenticate the target data in the sub-chain by issuing the security authentication transaction and performing transaction authentication on the security authentication execution transaction corresponding to the security authentication transaction. The data processing method based on the blockchain network can be applied to a main chain derived subchain scheme (such as a tax system), the main chain carries out periodic cross-chain safety authentication on the subchains, and the independent business of the subchains can be checked and authenticated by the main chain periodically in the form of the blockchain cross-chain scheme; under the scene that the auditing control requirement on sensitive data (such as government agency data) is high, the safety control on the sub-chain can be better realized.
Referring to fig. 7, fig. 7 is a schematic structural diagram of another data processing apparatus based on a blockchain network, where the apparatus may be installed on a computer device, the computer device may be a target consensus node in the blockchain network, a blockchain is maintained in the blockchain network, the blockchain is composed of a main chain and at least one sub-chain, and the target consensus node may be any consensus node in the consensus nodes for maintaining the target sub-chain; the target sub-chain may be any one of the at least one sub-chain. The blockchain network-based data processing device shown in fig. 7 may be used to perform some or all of the functions described above in the method embodiment depicted in fig. 5. Referring to fig. 7, the detailed descriptions of the respective units are as follows:
an acquiring unit 701, configured to acquire a security authentication transaction issued in a main chain, where the security authentication transaction is used to indicate target data in a target sub-chain that needs to be subjected to security authentication;
a processing unit 702, configured to invoke a security authentication contract to perform security authentication on the target data; the security authentication executing transaction is generated according to the security authentication result of the target data, and is uploaded to the target sub-chain;
The acquiring unit 701 is further configured to acquire a security authentication result receipt transaction issued in the main chain, where the security authentication result receipt transaction is used to indicate a cross-chain authentication result corresponding to the security authentication transaction, and the security authentication result receipt transaction is generated according to a transaction authentication result and performed by the main chain on the security authentication execution transaction;
the processing unit 702 is further configured to generate a security authentication result main chain receipt transaction corresponding to the security authentication result receipt transaction if the security authentication result receipt transaction indicates that the cross-chain authentication corresponding to the security authentication transaction passes, and upload the security authentication result main chain receipt transaction to the target sub-chain; the security authentication result main chain receipt transaction is used for indicating that the cross-chain authentication corresponding to the security authentication execution transaction passes.
In one embodiment, the processing unit 702 is further configured to:
acquiring a security authentication contract, wherein the security authentication contract is sent to a target sub-chain by calling an issuing contract by a consensus node of a maintenance main chain;
a security authentication contract is deployed in the target sub-chain.
In one embodiment, a backbone relay service is deployed in a blockchain network; the acquiring unit 701 is configured to acquire a security authentication transaction issued in a main chain, specifically configured to:
Acquiring a security authentication transaction issued in a main chain from main chain relay service;
the acquiring unit 701 is configured to acquire a security authentication result receipt transaction issued in a main chain, and specifically is configured to:
acquiring a safety authentication result receipt transaction issued in a main chain from main chain relay service;
the main chain relay service monitors blocks in the main chain to obtain the security authentication transaction and the security authentication result receipt transaction.
In one embodiment, the secure authentication transaction carries a secure authentication identifier; the processing unit 702 is configured to generate a security authentication execution transaction according to a security authentication result of the target data, and specifically is configured to:
and packaging the security authentication result of the target data and the security authentication identifier carried in the security authentication transaction to obtain the security authentication execution transaction.
According to one embodiment of the present application, some of the steps involved in the blockchain network-based data processing method shown in fig. 5 may be performed by various units in the blockchain network-based data processing device shown in fig. 7. For example, step S501, step S502 and step S505 shown in fig. 5 may be performed by the acquisition unit 701 shown in fig. 7, step S503, and step S504 and step S506 may be performed by the processing unit 702 shown in fig. 7. The various units in the blockchain network-based data processing device shown in fig. 7 may be combined into one or several other units separately or all, or some (some) of the units may be further split into a plurality of units with smaller functions to form the same operation, which may not affect the implementation of the technical effects of the embodiments of the present application. The above units are divided based on logic functions, and in practical applications, the functions of one unit may be implemented by a plurality of units, or the functions of a plurality of units may be implemented by one unit. In other embodiments of the present application, the blockchain network-based data processing device may also include other units, and in actual practice, these functions may also be implemented with the assistance of other units, and may be implemented by the cooperation of multiple units.
According to another embodiment of the present application, a blockchain network-based data processing device as shown in fig. 7 may be constructed by running a computer program (including program code) capable of executing the steps involved in the respective methods as shown in fig. 5 on a general-purpose computing device such as a computer including a Central Processing Unit (CPU), a random access storage medium (RAM), a read only storage medium (ROM), etc., processing elements and storage elements, and implementing the blockchain network-based data processing method of the embodiments of the present application. The computer program may be recorded on, for example, a computer-readable recording medium, and loaded into and run in the above-described computing device through the computer-readable recording medium.
In the embodiment of the present application, the blockchain is composed of a main chain and at least one sub-chain, and the data processing flow may include: acquiring a security authentication transaction issued in a main chain, wherein the security authentication transaction is used for indicating target data needing security authentication in a target sub-chain; invoking a security authentication contract to perform security authentication on the target data, generating a security authentication execution transaction according to a security authentication result of the target data, uploading the security authentication execution transaction to a target sub-chain, acquiring a security authentication result receipt transaction issued in a main chain, generating a security authentication result main chain receipt transaction corresponding to the security authentication result receipt transaction if the security authentication result receipt transaction indicates that the cross-chain authentication corresponding to the security authentication transaction passes, and uploading the security authentication result main chain receipt transaction to the target sub-chain. Therefore, the main chain can authenticate the target data in the sub-chain by issuing the security authentication transaction and performing transaction authentication on the security authentication execution transaction corresponding to the security authentication transaction. The data processing method based on the blockchain network can be applied to a main chain derived subchain scheme (such as a tax system), the main chain carries out periodic cross-chain safety authentication on the subchains, and the independent business of the subchains can be checked and authenticated by the main chain periodically in the form of the blockchain cross-chain scheme; under the scene that the auditing control requirement on sensitive data (such as government agency data) is high, the safety control on the sub-chain can be better realized.
Referring to fig. 8, fig. 8 is a schematic structural diagram of a computer device according to an embodiment of the present application, and as shown in fig. 8, the computer device at least includes a processor 801, a communication interface 802, and a memory 803. Wherein the processor 801, the communication interface 802, and the memory 803 may be connected by a bus or other means. The processor 801 (or called central processing unit (Central Processing Unit, CPU)) is a computing core and a control core of the terminal, and may parse various instructions in the terminal and process various data of the terminal, for example: the CPU can be used for analyzing a startup and shutdown instruction sent by a user to the terminal and controlling the terminal to perform startup and shutdown operation; and the following steps: the CPU can transmit various kinds of interactive data between the internal structures of the terminal, and so on. Communication interface 802 may optionally include a standard wired interface, a wireless interface (e.g., WI-FI, mobile communication interface, etc.), and may be controlled by processor 801 to receive and transmit data; the communication interface 802 may also be used for transmission and interaction of data inside the terminal. The Memory 803 (Memory) is a Memory device in the terminal for storing programs and data. It will be appreciated that the memory 803 here may include both a built-in memory of the terminal and an extended memory supported by the terminal. The memory 803 provides a storage space that stores the operating system of the terminal, which may include, but is not limited to: android systems, iOS systems, windows Phone systems, etc., which are not limiting in this application.
The embodiment of the application also provides a computer readable storage medium (Memory), which is a Memory device in the terminal and is used for storing programs and data. It will be appreciated that the computer readable storage medium herein may include both a built-in storage medium in the terminal and an extended storage medium supported by the terminal. The computer readable storage medium provides a storage space that stores a processing system of the terminal. Also stored in this memory space are one or more instructions, which may be one or more computer programs (including program code), adapted to be loaded and executed by the processor 801. Note that the computer readable storage medium can be either a high-speed RAM memory or a non-volatile memory (non-volatile memory), such as at least one magnetic disk memory; alternatively, it may be at least one computer-readable storage medium located remotely from the aforementioned processor.
In one embodiment, a blockchain is maintained in a blockchain network, the blockchain consisting of a main chain and at least one sub-chain; the computer equipment is equipment corresponding to any one of the consensus nodes of the main chain; the processor 801 performs the following operations by executing executable program code in the memory 803:
Issuing a security authentication transaction in the main chain, wherein the security authentication transaction is used for indicating target data needing security authentication in a target sub-chain, and the target sub-chain refers to any sub-chain in at least one sub-chain;
the method comprises the steps of obtaining a security authentication executing transaction corresponding to a security authentication transaction, wherein the security authentication executing transaction is obtained after a target sub-chain carries out security authentication on target data;
performing transaction authentication on the security authentication execution transaction;
and generating a security authentication result receipt transaction according to the transaction authentication result of the security authentication execution transaction, and uploading the security authentication result receipt transaction to the main chain, wherein the security authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the security authentication transaction.
As an alternative embodiment, an issuing contract is deployed in the backbone, the issuing contract being used to issue a cross-link contract, the processor 801 further performs the following operations by running executable program code in the memory 803:
invoking the issuing contract to send a security authentication contract to the target sub-chain to cause the target sub-chain to deploy the security authentication contract.
As an alternative embodiment, the security authentication execution transaction includes a security authentication result of the target data; the security authentication result of the target data is obtained by calling a security authentication contract by a consensus node maintaining the target sub-chain and performing security authentication on the target data.
As an alternative embodiment, the security authentication execution transaction corresponding to the security authentication transaction is issued in the target sub-chain; a sub-chain relay service is deployed in the block chain network; the specific embodiment of the processor 801 obtaining the security authentication execution transaction corresponding to the security authentication transaction is:
acquiring a security authentication execution transaction corresponding to the security authentication transaction from the sub-chain relay service;
the security authentication in the sub-chain relay service performs transaction, and the sub-chain relay service monitors the blocks in the target sub-chain.
As an optional embodiment, the security authentication transaction carries a security authentication identifier; the specific embodiment of the processor 801 obtaining the security authentication execution transaction corresponding to the security authentication transaction is:
and acquiring a target security authentication executing transaction from the target sub-chain, wherein a security authentication identifier carried by the target security authentication executing transaction is matched with a security authentication identifier carried by the security authentication transaction.
As an alternative embodiment, the processor 801 generates a secure authentication result receipt transaction according to the transaction authentication result of the secure authentication execution transaction, which is specifically described as follows:
and packaging the transaction authentication result of the security authentication executing transaction and the security authentication identifier carried in the security authentication transaction to obtain a security authentication result receipt transaction.
In the embodiment of the present application, the blockchain is composed of a main chain and at least one sub-chain, and the data processing flow may include: issuing a security authentication transaction in the main chain, wherein the security authentication transaction is used for indicating target data which needs to be subjected to security authentication in a target sub-chain, acquiring a security authentication execution transaction corresponding to the security authentication transaction, and carrying out transaction authentication on the security authentication execution transaction; and generating a security authentication result receipt transaction according to the transaction authentication result of the security authentication execution transaction, and uploading the security authentication result receipt transaction to the main chain, wherein the security authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the security authentication transaction. Therefore, the main chain can authenticate the target data in the sub-chain by issuing the security authentication transaction and performing transaction authentication on the security authentication execution transaction corresponding to the security authentication transaction. The data processing method based on the blockchain network can be applied to a main chain derived subchain scheme (such as a tax system), the main chain carries out periodic cross-chain safety authentication on the subchains, and the independent business of the subchains can be checked and authenticated by the main chain periodically in the form of the blockchain cross-chain scheme; under the scene that the auditing control requirement on sensitive data (such as government agency data) is high, the safety control on the sub-chain can be better realized.
In another embodiment, a blockchain is maintained in a blockchain network, the blockchain consisting of a main chain and at least one sub-chain; the computer equipment is equipment corresponding to any one of the consensus nodes of the target sub-chain; the target sub-chain refers to any one of at least one sub-chain; the processor 901 performs the following operations by executing executable program code in the memory 903:
acquiring a security authentication transaction issued in a main chain, wherein the security authentication transaction is used for indicating target data needing security authentication in a target sub-chain;
invoking a security authentication contract to perform security authentication on the target data;
generating a security authentication executing transaction according to a security authentication result of the target data, and uploading the security authentication executing transaction to the target sub-chain;
the method comprises the steps of obtaining a safety authentication result receipt transaction issued in a main chain, wherein the safety authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the safety authentication transaction, and the safety authentication result receipt transaction is generated according to a transaction authentication result by the main chain;
if the security authentication result receipt transaction indicates that the cross-chain authentication corresponding to the security authentication transaction passes, generating a security authentication result main chain receipt transaction corresponding to the security authentication result receipt transaction, and uploading the security authentication result main chain receipt transaction to a target sub-chain; the security authentication result main chain receipt transaction is used for indicating that the cross-chain authentication corresponding to the security authentication execution transaction passes.
As an alternative embodiment, processor 901, by executing executable program code in memory 903, also performs the following operations:
acquiring a security authentication contract, wherein the security authentication contract is sent to a target sub-chain by calling an issuing contract by a consensus node of a maintenance main chain;
a security authentication contract is deployed in the target sub-chain.
As an alternative embodiment, a backbone relay service is deployed in the blockchain network; specific examples of the processor 901 obtaining a secure authenticated transaction issued in the backbone are:
acquiring a security authentication transaction issued in a main chain from main chain relay service;
the specific embodiment of the processor 901 obtaining the security authentication result receipt transaction issued in the main chain is:
acquiring a safety authentication result receipt transaction issued in a main chain from main chain relay service;
the main chain relay service monitors blocks in the main chain to obtain the security authentication transaction and the security authentication result receipt transaction.
As an optional embodiment, the security authentication transaction carries a security authentication identifier; the specific embodiment of the processor 901 generating the security authentication execution transaction according to the security authentication result of the target data is as follows:
And packaging the security authentication result of the target data and the security authentication identifier carried in the security authentication transaction to obtain the security authentication execution transaction.
In the embodiment of the present application, the blockchain is composed of a main chain and at least one sub-chain, and the data processing flow may include: acquiring a security authentication transaction issued in a main chain, wherein the security authentication transaction is used for indicating target data needing security authentication in a target sub-chain; invoking a security authentication contract to perform security authentication on the target data, generating a security authentication execution transaction according to a security authentication result of the target data, uploading the security authentication execution transaction to a target sub-chain, acquiring a security authentication result receipt transaction issued in a main chain, generating a security authentication result main chain receipt transaction corresponding to the security authentication result receipt transaction if the security authentication result receipt transaction indicates that the cross-chain authentication corresponding to the security authentication transaction passes, and uploading the security authentication result main chain receipt transaction to the target sub-chain. Therefore, the main chain can authenticate the target data in the sub-chain by issuing the security authentication transaction and performing transaction authentication on the security authentication execution transaction corresponding to the security authentication transaction. The data processing method based on the blockchain network can be applied to a main chain derived subchain scheme (such as a tax system), the main chain carries out periodic cross-chain safety authentication on the subchains, and the independent business of the subchains can be checked and authenticated by the main chain periodically in the form of the blockchain cross-chain scheme; in the scene of high auditing control requirements for sensitive data (such as government agency data), the safety control for the sub-chain can be well realized.
Embodiments of the present application also provide a computer readable storage medium having one or more instructions stored therein, the one or more instructions being adapted to be loaded by a processor and to perform the blockchain network-based data processing method of the method embodiments described above.
Embodiments of the present application also provide a computer program product comprising instructions which, when run on a computer, cause the computer to perform the blockchain network-based data processing method of the method embodiments described above.
Embodiments of the present application also provide a computer program product or computer program comprising computer instructions stored in a computer-readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and the processor executes the computer instructions to cause the computer device to perform the data processing method based on the blockchain network as described above.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The modules in the device of the embodiment of the application can be combined, divided and deleted according to actual needs.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of the above embodiments may be implemented by a program to instruct related hardware, the program may be stored in a computer readable storage medium, and the readable storage medium may include: flash disk, read-Only Memory (ROM), random-access Memory (Random Access Memory, RAM), magnetic or optical disk, and the like.
The foregoing disclosure is only a preferred embodiment of the present application, and it is not intended to limit the scope of the claims, and one of ordinary skill in the art will understand that all or part of the processes for implementing the embodiments described above may be performed with equivalent changes in the claims of the present application and still fall within the scope of the claims.
Claims (15)
1. A data processing method based on a blockchain network, wherein a blockchain is maintained in the blockchain network, and the blockchain consists of a main chain and at least one sub-chain; the method is performed by a target consensus node, the target consensus node being any one of the consensus nodes maintaining the backbone; the method comprises the following steps:
issuing a security authentication transaction in the main chain, wherein the security authentication transaction is used for indicating target data needing security authentication in a target sub-chain, and the target sub-chain refers to any sub-chain in the at least one sub-chain;
The security authentication executing transaction corresponding to the security authentication transaction is obtained, and the security authentication executing transaction is obtained after the target sub-chain carries out security authentication on the target data;
performing transaction authentication on the security authentication execution transaction;
and generating a safety authentication result receipt transaction according to the transaction authentication result of the safety authentication executing transaction, and uploading the safety authentication result receipt transaction to the main chain, wherein the safety authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the safety authentication transaction.
2. The method of claim 1, wherein an issuing contract is deployed in the backbone, the issuing contract for issuing a cross-link contract, the method further comprising:
and calling the issued contract, and sending a security authentication contract to the target sub-chain so that the target sub-chain deploys the security authentication contract.
3. The method of claim 2, wherein the secure authentication execution transaction includes a secure authentication result of the target data; and the security authentication result of the target data is obtained by calling the security authentication contract by a consensus node maintaining the target sub-chain and performing security authentication on the target data.
4. The method of claim 1, wherein a secure authentication execution transaction corresponding to the secure authentication transaction is issued in the target sub-chain; a sub-chain relay service is deployed in the block chain network; the obtaining the security authentication execution transaction corresponding to the security authentication transaction includes:
acquiring a security authentication execution transaction corresponding to the security authentication transaction from the sub-chain relay service;
the security authentication in the sub-chain relay service performs transaction, and the sub-chain relay service monitors the block in the target sub-chain.
5. The method of claim 1, wherein the secure authenticated transaction carries a secure authentication identifier; the obtaining the security authentication execution transaction corresponding to the security authentication transaction includes:
and acquiring a target security authentication executing transaction from the target sub-chain, wherein a security authentication identifier carried by the target security authentication executing transaction is matched with a security authentication identifier carried by the security authentication transaction.
6. The method of claim 5, wherein generating a secure authentication result receipt transaction based on the transaction authentication result of the secure authentication execution transaction comprises:
And packaging the transaction authentication result of the security authentication executing transaction and the security authentication identifier carried in the security authentication transaction to obtain a security authentication result receipt transaction.
7. A data processing method based on a blockchain network, wherein a blockchain is maintained in the blockchain network, and the blockchain consists of a main chain and at least one sub-chain; the method is performed by a target consensus node, which is any one of the consensus nodes maintaining a target sub-chain; the target sub-chain refers to any one of the at least one sub-chain; the method comprises the following steps:
acquiring a security authentication transaction issued in the main chain, wherein the security authentication transaction is used for indicating target data needing security authentication in the target sub-chain;
invoking a security authentication contract to perform security authentication on the target data;
generating a security authentication execution transaction according to the security authentication result of the target data, and uploading the security authentication execution transaction to the target sub-chain;
acquiring a safety authentication result receipt transaction issued in the main chain, wherein the safety authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the safety authentication transaction, and the safety authentication result receipt transaction is generated according to a transaction authentication result and is generated by the main chain for carrying out transaction authentication on the safety authentication execution transaction;
If the security authentication result receipt transaction indicates that the cross-chain authentication corresponding to the security authentication transaction passes, generating a security authentication result main chain receipt transaction corresponding to the security authentication result receipt transaction, and uploading the security authentication result main chain receipt transaction to the target sub-chain; and the main chain receipt transaction of the security authentication result is used for indicating that the cross-chain authentication corresponding to the security authentication execution transaction passes.
8. The method of claim 7, wherein the method further comprises:
acquiring a security authentication contract, wherein the security authentication contract is sent to the target sub-chain by calling an issuing contract by a consensus node maintaining the main chain;
deploying the security authentication contract in the target sub-chain.
9. The method of claim 7, wherein a backbone relay service is deployed in the blockchain network; the obtaining the security authentication transaction issued in the main chain comprises the following steps:
acquiring a security authentication transaction issued in the main chain from the main chain relay service;
the step of obtaining the receipt transaction of the security authentication result issued in the main chain comprises the following steps:
acquiring a safety authentication result receipt transaction issued in the main chain from the main chain relay service;
The main chain relay service monitors blocks in the main chain to obtain the safety authentication transaction and the safety authentication result receipt transaction.
10. The method of claim 7, wherein the secure authenticated transaction carries a secure authentication identifier; the generating a security authentication execution transaction according to the security authentication result of the target data comprises the following steps:
and packaging the security authentication result of the target data and the security authentication identifier carried in the security authentication transaction to obtain a security authentication execution transaction.
11. A data processing apparatus based on a blockchain network, wherein a blockchain is maintained in the blockchain network, the blockchain consisting of a main chain and at least one sub-chain; the data processing device is mounted on a target consensus node, and the target consensus node is any one of the consensus nodes maintaining the main chain; the data processing apparatus includes:
the processing unit is used for issuing a security authentication transaction in the main chain, wherein the security authentication transaction is used for indicating target data needing security authentication in a target sub-chain, and the target sub-chain refers to any sub-chain in the at least one sub-chain;
The acquisition unit is used for acquiring a security authentication executing transaction corresponding to the security authentication transaction, wherein the security authentication executing transaction is obtained after the target data is subjected to security authentication by the target sub-chain;
the processing unit is further used for carrying out transaction authentication on the security authentication execution transaction; and generating a security authentication result receipt transaction according to the transaction authentication result of the security authentication execution transaction, and uploading the security authentication result receipt transaction to the main chain, wherein the security authentication result receipt transaction is used for indicating a cross-chain authentication result corresponding to the security authentication transaction.
12. A data processing apparatus based on a blockchain network, wherein a blockchain is maintained in the blockchain network, the blockchain consisting of a main chain and at least one sub-chain; the data processing device is mounted on a target consensus node, and the target consensus node is any one of the consensus nodes for maintaining a target sub-chain; the target sub-chain refers to any one of the at least one sub-chain; the data processing apparatus includes:
the acquisition unit is used for acquiring the security authentication transaction issued in the main chain, wherein the security authentication transaction is used for indicating target data needing security authentication in the target sub-chain;
The processing unit is used for calling a security authentication contract to carry out security authentication on the target data; the security authentication method comprises the steps of generating a security authentication execution transaction according to a security authentication result of the target data, and uploading the security authentication execution transaction to the target sub-chain;
the acquisition unit is further configured to acquire a security authentication result receipt transaction issued in the main chain, where the security authentication result receipt transaction is used to indicate a cross-chain authentication result corresponding to the security authentication transaction, and the security authentication result receipt transaction is generated according to a transaction authentication result and performed by the main chain on the security authentication execution transaction;
the processing unit is further configured to generate a security authentication result main chain receipt transaction corresponding to the security authentication result receipt transaction if the security authentication result receipt transaction indicates that the cross-chain authentication corresponding to the security authentication transaction passes, and upload the security authentication result main chain receipt transaction to the target sub-chain; and the main chain receipt transaction of the security authentication result is used for indicating that the cross-chain authentication corresponding to the security authentication execution transaction passes.
13. A computer device, comprising: a memory device and a processor;
A memory in which a computer program is stored;
a processor for loading the computer program to implement the blockchain network-based data processing method of any of claims 1-6 or to implement the blockchain network-based data processing method of any of claims 7-10.
14. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program adapted to be loaded by a processor and to perform the blockchain network based data processing method of any of claims 1-6 or to perform the blockchain network based data processing method of any of claims 7-10.
15. A computer program product, characterized in that the computer program product comprises a computer program adapted to be loaded by a processor and to perform the blockchain network-based data processing method according to any of the claims 1-6 or to perform the blockchain network-based data processing method according to any of the claims 7-10.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111481786.XA CN116226827A (en) | 2021-12-06 | 2021-12-06 | Data processing method, device, equipment and storage medium based on block chain network |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202111481786.XA CN116226827A (en) | 2021-12-06 | 2021-12-06 | Data processing method, device, equipment and storage medium based on block chain network |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116226827A true CN116226827A (en) | 2023-06-06 |
Family
ID=86568512
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202111481786.XA Pending CN116226827A (en) | 2021-12-06 | 2021-12-06 | Data processing method, device, equipment and storage medium based on block chain network |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116226827A (en) |
-
2021
- 2021-12-06 CN CN202111481786.XA patent/CN116226827A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110535872B (en) | Method and apparatus for processing data requests in a blockchain network | |
CN113395363B (en) | Data processing method, device and equipment based on block chain and storage medium | |
CN109327528B (en) | Node management method and device based on block chain | |
CN111612613B (en) | Block chain network with centralized system | |
CN112527912B (en) | Data processing method and device based on block chain network and computer equipment | |
CN111737104B (en) | Block chain network service platform, test case sharing method thereof and storage medium | |
CN111597077B (en) | Data processing method, data processing device, computer equipment and storage medium | |
CN112231741B (en) | Data processing method, device, medium and electronic equipment based on block chain system | |
CN114240433A (en) | Data processing method and system based on block chain | |
CN116150260A (en) | Data processing method, device, medium and electronic equipment of block chain system | |
CN116827957B (en) | Information processing method, device, equipment and medium based on multi-block chain | |
US20230360046A1 (en) | Blockchain-based block processing method and apparatus, device, storage medium, and program product | |
US20230353394A1 (en) | Cross-blockchain transaction processing method and apparatus, computer device, computer storage medium, and computer program product | |
Al-Mamun et al. | Dean: A lightweight and resource-efficient blockchain protocol for reliable edge computing | |
CN117061538A (en) | Consensus processing method and related device based on block chain network | |
CN116226827A (en) | Data processing method, device, equipment and storage medium based on block chain network | |
CN116233139A (en) | Data processing method, device, medium and electronic equipment of block chain system | |
CN116186786A (en) | Block chain-based service processing method and device, electronic equipment and readable medium | |
CN115455460A (en) | Data storage method, device, equipment and medium based on block chain | |
CN114157444A (en) | Block chain deployment system and deployment method based on container technology | |
CN116186749A (en) | Block chain-based service processing method and device, electronic equipment and readable medium | |
CN116186725A (en) | Data processing method, device, equipment and storage medium | |
CN116112496A (en) | Cross-chain interaction method based on blockchain network and related equipment | |
CN113452734B (en) | Block chain system based on narrow-band transmission | |
CN116112501A (en) | Business processing method, device, equipment and storage medium based on block chain network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
REG | Reference to a national code |
Ref country code: HK Ref legal event code: DE Ref document number: 40086909 Country of ref document: HK |
|
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |