JP2020503585A - 論理マップを通じたスマートコントラクトデータベースの走査 - Google Patents
論理マップを通じたスマートコントラクトデータベースの走査 Download PDFInfo
- Publication number
- JP2020503585A JP2020503585A JP2019521792A JP2019521792A JP2020503585A JP 2020503585 A JP2020503585 A JP 2020503585A JP 2019521792 A JP2019521792 A JP 2019521792A JP 2019521792 A JP2019521792 A JP 2019521792A JP 2020503585 A JP2020503585 A JP 2020503585A
- Authority
- JP
- Japan
- Prior art keywords
- key
- kvps
- index
- kvp
- computer
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
- G06F16/9027—Trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/901—Indexing; Data structures therefor; Storage structures
- G06F16/9017—Indexing; Data structures therefor; Storage structures using directory or table look-up
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0618—Block ciphers, i.e. encrypting groups of characters of a plain text message using fixed encryption transformation
- H04L9/0637—Modes of operation, e.g. cipher block chaining [CBC], electronic codebook [ECB] or Galois/counter mode [GCM]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/08—Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
- H04L9/0816—Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
- H04L9/0819—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
- H04L9/083—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
- H04L9/0833—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key
- H04L9/0836—Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP] involving conference or group key using tree structure or hierarchical structure
Landscapes
- Engineering & Computer Science (AREA)
- Databases & Information Systems (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Storage Device Security (AREA)
- Tires In General (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
Description
def imap_set(self, key, value):
if self[imap_key_index + key] not null :
key_index = self[imap_key_index + key]
self[imap_key_value + key] = value
if self[imap_index_deleted_flag + key_index] == True:
self[imap_index_deleted_flag + key_index] = False
self.imap_size += 1
else:
key_index = self.imap_length
self.imap_length = self.imap_length + 1
self[imap_key_index + key] = key_index
self[imap_index_key + key_index] = key
self[imap_key_value + key] = value
self[imap_index_deleted_flag + key_index] = False
self.imap_size += 1
def imap_get_key_by_index(self, index):
key = self[imap_index_key + index]
return key
def imap_get_key_by_index(self, index):
key = self[imap_index_key + index]
return key
def imap_next_index(self, index):
index += 1
while index < self.imap_length:
if self[imap_index_deleted_flag + index] == False:
return index
else:
index += 1
return -1
def imap_contains(self, key):
if key in self.imap_key_index:
key_index = self[imap_key_index + key]
if self[imap_index_deleted_flag + key_index] == False:
return True
return False
def imap_remove(self, key):
if key in self.imap_key_index:
self[imap_key_value + key] = None
key_index = self[imap_key_index + key]
self[imap_index_deleted_flag + key_index] = True
self.imap_length -= 1
106 コンピューティングシステム
108 コンピューティングシステム
110 ネットワーク
202 エンティティレイヤ
204 ホストされたサービスレイヤ
206 パブリックブロックチェーンレイヤ
208 トランザクション管理システム
210 ブロックチェーンインターフェース
212 ブロックチェーンネットワーク
214 ノード
216 ブロックチェーン
402 表
404 表
406 表
408 表
Claims (9)
- スマートコントラクトデータベースを走査するコンピュータで実行される方法であって、
スマートコントラクトデータベースによって使用されるMerkle Patricia Tree(MPT)の第1の1つまたは複数のkey-value pair(KVP)のうちの1つに対応するインデックスの第1の番号を決定するステップと、
前記インデックスの前記第1の番号に基づいて、前記MPTを走査するためのマップの第2の1つまたは複数のKVPのうちの第1のKVPの第1の鍵を決定するステップと、
前記第1のKVPの前記第1の鍵に対応する第1の値を決定するステップと、
前記第2の1つまたは複数のKVPのうちの第2のKVPの第2の鍵を決定するステップと、
前記第2のKVPの前記第2の鍵に対応する第2の値を取り出すステップとを備える、
コンピュータで実行される方法。 - 前記インデックスの第2の番号に基づいて、前記第2の1つまたは複数のKVPのうちの第3のKVPの第3の鍵を決定するステップと、
前記第3のKVPの前記第3の鍵に対応する第3の値を決定するステップと、
第4の1つまたは複数のKVPのうちの第4のKVPの第4の鍵を決定するステップと、
前記第4のKVPの前記第4の鍵に対応する第4の値を取り出すステップとをさらに備える、
請求項1に記載のコンピュータで実行される方法。 - 前記インデックスの前記第2の番号が削除されないと決定するステップをさらに備える、
請求項2に記載のコンピュータで実行される方法。 - 前記第1の1つまたは複数のKVPの中のKVPの数が、前記第2の1つまたは複数のKVPの中のKVPの数以下である、
請求項1に記載のコンピュータで実行される方法。 - 前記第1の1つまたは複数のKVPの鍵および前記第2の1つまたは複数のKVPの鍵が、ハッシュ値として記録される、
請求項1に記載のコンピュータで実行される方法。 - 前記第2の1つまたは複数のKVPが、前記第1の1つまたは複数のKVPに含まれる1つまたは複数の値と同じ1つまたは複数の値と、前記第1の1つまたは複数のKVPに含まれる1つまたは複数の鍵と同じ1つまたは複数の値とを含む、
請求項1に記載のコンピュータで実行される方法。 - 前記第2の1つまたは複数のKVPが、前記インデックスに含まれる番号を示す1つまたは複数の値と、前記第1の1つまたは複数のKVPのうちの1つまたは複数が削除されるかどうかを示す1つまたは複数の値と、前記第1の1つまたは複数のKVPの中のKVPの量とを含む、
請求項1に記載のコンピュータで実行される方法。 - 1つまたは複数のプロセッサに結合され、かつ前記1つまたは複数のプロセッサによって実行されると、請求項1から7のいずれか一項に記載の方法に従った動作を前記1つまたは複数のプロセッサに実行させる命令が記録された、
非一時的コンピュータ可読記録媒体。 - コンピューティングデバイスと、
前記コンピューティングデバイスに結合され、かつ前記コンピューティングデバイスによって実行されると、請求項1から7のいずれか一項に記載の方法に従った動作を前記コンピューティングデバイスに実行させる命令が記録された、コンピュータ可読記録デバイスとを備える、
システム。
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/CN2018/114410 WO2019072266A2 (en) | 2018-11-07 | 2018-11-07 | CROSSING AN INTELLIGENT CONTRACT DATA BASE THROUGH A LOGIC CARD |
Publications (2)
Publication Number | Publication Date |
---|---|
JP2020503585A true JP2020503585A (ja) | 2020-01-30 |
JP6869342B2 JP6869342B2 (ja) | 2021-05-12 |
Family
ID=66100053
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
JP2019521792A Active JP6869342B2 (ja) | 2018-11-07 | 2018-11-07 | 論理マップを通じたスマートコントラクトデータベースの走査 |
Country Status (14)
Country | Link |
---|---|
US (1) | US11403344B2 (ja) |
EP (1) | EP3542278A4 (ja) |
JP (1) | JP6869342B2 (ja) |
KR (1) | KR102238954B1 (ja) |
CN (1) | CN110291514A (ja) |
AU (1) | AU2018347188A1 (ja) |
BR (1) | BR112019008154A2 (ja) |
CA (1) | CA3041158A1 (ja) |
MX (1) | MX2019004676A (ja) |
PH (1) | PH12019500897A1 (ja) |
RU (1) | RU2019111895A (ja) |
SG (1) | SG11201903584YA (ja) |
TW (1) | TW202101279A (ja) |
WO (1) | WO2019072266A2 (ja) |
Families Citing this family (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP3665595B1 (en) * | 2019-05-14 | 2021-11-24 | Advanced New Technologies Co., Ltd. | Methods and devices for data traversal |
US11513815B1 (en) * | 2019-05-24 | 2022-11-29 | Hiro Systems Pbc | Defining data storage within smart contracts |
US11657391B1 (en) | 2019-05-24 | 2023-05-23 | Hiro Systems Pbc | System and method for invoking smart contracts |
US10699269B1 (en) | 2019-05-24 | 2020-06-30 | Blockstack Pbc | System and method for smart contract publishing |
WO2019179539A2 (en) | 2019-07-11 | 2019-09-26 | Alibaba Group Holding Limited | Shared blockchain data storage |
SG11202001975SA (en) * | 2019-07-11 | 2020-04-29 | Alibaba Group Holding Ltd | Shared blockchain data storage |
SG11202001989WA (en) | 2019-07-11 | 2020-04-29 | Alibaba Group Holding Ltd | Shared blockchain data storage |
SG11202002165RA (en) * | 2019-08-30 | 2020-04-29 | Alibaba Group Holding Ltd | Methods and devices for providing traversable key-value data storage on blockchain |
US10585882B1 (en) | 2019-09-23 | 2020-03-10 | Trace, LLC | Systems and methods for writing updates to and/or reading previously stored updates of assets implemented as smart contracts on a decentralized database |
WO2021184325A1 (en) * | 2020-03-19 | 2021-09-23 | Wang Chau Tyler Kot | Ethereum state data storage optimization method, ethereum system and storage medium |
CN111596954B (zh) * | 2020-05-12 | 2023-08-01 | 杭州溪塔科技有限公司 | 一种基于区块链的分布式版本控制方法及系统 |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2016177688A (ja) * | 2015-03-20 | 2016-10-06 | 株式会社東芝 | データ処理装置、データ処理方法およびコンピュータプログラム |
US20170255950A1 (en) * | 2016-03-04 | 2017-09-07 | Forecast Foundation Ou | Systems and methods for providing block chain state proofs for prediction market resolution |
Family Cites Families (14)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102084363B (zh) | 2008-07-03 | 2014-11-12 | 加利福尼亚大学董事会 | 一种用于在结构化数据上高效地支持交互式模糊搜索的方法 |
US20130124545A1 (en) | 2011-11-15 | 2013-05-16 | Business Objects Software Limited | System and method implementing a text analysis repository |
US9152642B2 (en) | 2012-12-21 | 2015-10-06 | Zetta, Inc. | Systems and methods for on-demand data storage |
WO2016053760A1 (en) * | 2014-09-30 | 2016-04-07 | Raistone, Inc. | Systems and methods for transferring digital assets using a de-centralized exchange |
CN107660293B (zh) * | 2015-04-20 | 2022-04-26 | 欧吉达克斯公司 | 物权电子凭证(edt)的分布式管理方法及其系统 |
AU2017222471B2 (en) * | 2016-02-23 | 2022-09-01 | nChain Holdings Limited | A method and system for securing computer software using a distributed hash table and a blockchain |
US10235374B2 (en) * | 2016-03-08 | 2019-03-19 | International Business Machines Corporation | Key-value store for managing user files based on pairs of key-value pairs |
US10046228B2 (en) * | 2016-05-02 | 2018-08-14 | Bao Tran | Smart device |
CN109983456B (zh) * | 2016-09-22 | 2023-08-15 | 维萨国际服务协会 | 存储器内密钥范围搜索方法和系统 |
US11128603B2 (en) | 2016-09-30 | 2021-09-21 | Nec Corporation | Method and system for providing a transaction forwarding service in blockchain implementations |
CN107103098A (zh) | 2017-05-12 | 2017-08-29 | 曾建伟 | 一种包含智能合约的区块链网式数据库及工作方法 |
CN107332847B (zh) * | 2017-07-05 | 2019-04-26 | 武汉凤链科技有限公司 | 一种基于区块链的访问控制方法和系统 |
CN108595538B (zh) * | 2018-04-04 | 2020-05-01 | 中国地质大学(武汉) | 一种基于区块链的键值数据组织方法及系统 |
CN108615156A (zh) * | 2018-05-09 | 2018-10-02 | 上海魅联信息技术有限公司 | 一种基于区块链的数据结构 |
-
2018
- 2018-11-07 CN CN201880004900.XA patent/CN110291514A/zh active Pending
- 2018-11-07 SG SG11201903584YA patent/SG11201903584YA/en unknown
- 2018-11-07 KR KR1020197011561A patent/KR102238954B1/ko active IP Right Grant
- 2018-11-07 JP JP2019521792A patent/JP6869342B2/ja active Active
- 2018-11-07 RU RU2019111895A patent/RU2019111895A/ru unknown
- 2018-11-07 AU AU2018347188A patent/AU2018347188A1/en not_active Abandoned
- 2018-11-07 MX MX2019004676A patent/MX2019004676A/es unknown
- 2018-11-07 EP EP18866631.7A patent/EP3542278A4/en not_active Withdrawn
- 2018-11-07 WO PCT/CN2018/114410 patent/WO2019072266A2/en unknown
- 2018-11-07 CA CA3041158A patent/CA3041158A1/en not_active Abandoned
- 2018-11-07 BR BR112019008154A patent/BR112019008154A2/pt not_active IP Right Cessation
-
2019
- 2019-04-22 US US16/390,802 patent/US11403344B2/en active Active
- 2019-04-24 PH PH12019500897A patent/PH12019500897A1/en unknown
- 2019-07-15 TW TW108124840A patent/TW202101279A/zh unknown
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP2016177688A (ja) * | 2015-03-20 | 2016-10-06 | 株式会社東芝 | データ処理装置、データ処理方法およびコンピュータプログラム |
US20170255950A1 (en) * | 2016-03-04 | 2017-09-07 | Forecast Foundation Ou | Systems and methods for providing block chain state proofs for prediction market resolution |
Also Published As
Publication number | Publication date |
---|---|
EP3542278A2 (en) | 2019-09-25 |
WO2019072266A3 (en) | 2019-08-29 |
EP3542278A4 (en) | 2019-12-18 |
KR20200054126A (ko) | 2020-05-19 |
KR102238954B1 (ko) | 2021-04-14 |
MX2019004676A (es) | 2019-08-21 |
CA3041158A1 (en) | 2019-04-18 |
RU2019111895A3 (ja) | 2020-10-19 |
TW202101279A (zh) | 2021-01-01 |
RU2019111895A (ru) | 2020-10-19 |
BR112019008154A2 (pt) | 2019-09-10 |
WO2019072266A2 (en) | 2019-04-18 |
US11403344B2 (en) | 2022-08-02 |
SG11201903584YA (en) | 2019-05-30 |
US20190251124A1 (en) | 2019-08-15 |
PH12019500897A1 (en) | 2019-12-02 |
JP6869342B2 (ja) | 2021-05-12 |
CN110291514A (zh) | 2019-09-27 |
AU2018347188A1 (en) | 2020-05-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6869342B2 (ja) | 論理マップを通じたスマートコントラクトデータベースの走査 | |
KR102396739B1 (ko) | 자산 관리 방법 및 장치, 및 전자 디바이스 | |
US11106655B2 (en) | Asset management system, method, apparatus, and electronic device | |
KR102215773B1 (ko) | 영-지식 증명을 갖는 계정 노트 모델에 기초한 블록체인 데이터 보호 | |
US11321308B2 (en) | Asset management method and apparatus, and electronic device | |
RU2747449C2 (ru) | Способ и устройство сверки транзакций в блокчейне и электронное устройство | |
KR102141771B1 (ko) | 멀티 블록체인 네트워크 데이터 처리 방법, 장치 및 서버 | |
KR102151894B1 (ko) | 계좌 모델 하에서 퍼블릭 및 프라이빗 트랜잭션을 지원하는 블록체인 시스템 | |
AU2018347191B2 (en) | Managing private transactions on blockchain networks based on workflow | |
US20200133938A1 (en) | Asset management method and apparatus, and electronic device | |
KR20200079289A (ko) | 블록체인 기반 트랜잭션 프로세싱 방법 및 장치 | |
JP2021512379A (ja) | ブロックチェーンベースのスマートコントラクト呼び出し方法および装置、および電子デバイス | |
WO2019083994A1 (en) | METHOD AND DEVICE FOR DATA AUDIT | |
CN117678196A (zh) | 隐私安全联合标识协议 |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
A621 | Written request for application examination |
Free format text: JAPANESE INTERMEDIATE CODE: A621 Effective date: 20190621 |
|
A977 | Report on retrieval |
Free format text: JAPANESE INTERMEDIATE CODE: A971007 Effective date: 20200717 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20200803 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20201030 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20201104 |
|
A131 | Notification of reasons for refusal |
Free format text: JAPANESE INTERMEDIATE CODE: A131 Effective date: 20201124 |
|
A521 | Request for written amendment filed |
Free format text: JAPANESE INTERMEDIATE CODE: A523 Effective date: 20210205 |
|
TRDD | Decision of grant or rejection written | ||
A01 | Written decision to grant a patent or to grant a registration (utility model) |
Free format text: JAPANESE INTERMEDIATE CODE: A01 Effective date: 20210329 |
|
A61 | First payment of annual fees (during grant procedure) |
Free format text: JAPANESE INTERMEDIATE CODE: A61 Effective date: 20210413 |
|
R150 | Certificate of patent or registration of utility model |
Ref document number: 6869342 Country of ref document: JP Free format text: JAPANESE INTERMEDIATE CODE: R150 |