TW202032479A - Method for processing transaction via external node on blockchain and apparatus for performing the method - Google Patents

Method for processing transaction via external node on blockchain and apparatus for performing the method Download PDF

Info

Publication number
TW202032479A
TW202032479A TW109101796A TW109101796A TW202032479A TW 202032479 A TW202032479 A TW 202032479A TW 109101796 A TW109101796 A TW 109101796A TW 109101796 A TW109101796 A TW 109101796A TW 202032479 A TW202032479 A TW 202032479A
Authority
TW
Taiwan
Prior art keywords
node
data
external
channel
nodes
Prior art date
Application number
TW109101796A
Other languages
Chinese (zh)
Other versions
TWI724758B (en
Inventor
比約恩 泰格潤
Original Assignee
南韓商卡沙韓國股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 南韓商卡沙韓國股份有限公司 filed Critical 南韓商卡沙韓國股份有限公司
Publication of TW202032479A publication Critical patent/TW202032479A/en
Application granted granted Critical
Publication of TWI724758B publication Critical patent/TWI724758B/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0607Regulated
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The present invention relates to a method for processing a transaction using an external node on a blockchain and an apparatus for performing the method. The method for processing a transaction using an external node on a blockchain comprises the steps of: setting, by a setting node, an internal node and the external node; setting, by the setting node, a first data transaction authority for the internal node; and setting, by the setting node, a second data transaction authority for the external node, wherein the first data transaction authority may be an operation authority on a blockchain network, set for the internal node, and the second data transaction authority may be an operation authority on the blockchain network, set for the external node.

Description

透過區塊鏈外部節點處理交易之方法及執行該方法之裝置Method for processing transaction through external node of blockchain and device for executing the method

本發明涉及透過區塊鏈外部節點處理交易之方法以及執行該方法的裝置。更加詳細地,涉及通過在外部節點設置規定許可權來可在區塊鏈網路上進行有限操作的方法及裝置。The invention relates to a method for processing transactions through external nodes of a blockchain and a device for executing the method. In more detail, it relates to a method and device that can perform limited operations on a blockchain network by setting prescribed permissions on external nodes.

區塊鏈可以是對在公共網路(public network)或私人網路絡(private network)中產生的交易資訊進行加密來在網路成員之間共用的數位分類帳(ledger)。Blockchain can be a digital ledger that encrypts transaction information generated in a public network or a private network to be shared among network members.

將交易分類帳的副本分發(distributed)給每個網路成員,從而每當發生新交易時,可在成員的同意下對相應交易進行認證步驟。A copy of the transaction ledger is distributed to each network member, so that whenever a new transaction occurs, the corresponding transaction can be authenticated with the member's consent.

基於區塊鏈的交易資訊無法任意更改,因而增加了交易的可靠性並易於跟蹤資訊。尤其在金融服務領域,正在努力應用區塊鏈技術來提高業務效率並建立新的服務基礎。Blockchain-based transaction information cannot be changed arbitrarily, thus increasing the reliability of transactions and making it easier to track information. Especially in the field of financial services, efforts are being made to apply blockchain technology to improve business efficiency and establish a new service foundation.

通過分散式分類帳系統進行透明交易,可以節約安全、監督、監管成本。區塊鏈不僅可以應用於金融領域,而且可以應用於物流、流通甚至政府公共行政服務。Transparent transactions through a distributed ledger system can save security, supervision, and supervision costs. Blockchain can be used not only in the financial field, but also in logistics, circulation and even government public administrative services.

諸如現有比特幣之類的公共區塊鏈網路(public blockchain network)中,參與節點可具有相同的許可權來在區塊鏈網路上進行操作,但在專用區塊鏈網路(private blockchain network)或許可式區塊鏈網路(permissioned blockchain network)的情況下,按節點設置差別許可權來可在區塊鏈內進行操作。In a public blockchain network such as the existing Bitcoin, participating nodes can have the same permission to operate on the blockchain network, but in a private blockchain network (private blockchain network) ) Or permissioned blockchain network (permissioned blockchain network), you can operate in the blockchain by setting different permissions per node.

因此,需要研究一種用於在區塊鏈網路上設置差別(或有限)許可權來進行操作的方法。Therefore, it is necessary to study a method for setting differential (or limited) permissions to operate on the blockchain network.

本發明的目的在於,解決上述所有問題。The purpose of the present invention is to solve all the above-mentioned problems.

並且,本發明的目的在於,通過在外部節點設置規定許可權來可在區塊鏈網路上進行有限操作。In addition, the purpose of the present invention is to allow limited operations on the blockchain network by setting prescribed permissions on external nodes.

並且,本發明的目的在於,可在區塊鏈網路上利用通道、通道編碼、資料分類等來分層限制對節點的存取權限。In addition, the purpose of the present invention is to use channels, channel coding, data classification, etc. to restrict access rights to nodes in a layered manner on a blockchain network.

對於後述的本發明的詳細說明參照以可實施本發明的特定實施例為例示來示出的附圖。以下將詳細說明這種實施例,以使本發明所屬技術領域的普通技術人員可以實施本發明。本發明的多種實施例雖然互不相同,但是相互沒有排他性。例如,在本說明書中記載的特定形狀、結構及特性可在不超出本發明的思想和範圍的情況下從一實施例變更為其他實施例。並且,各個實施例或個別結構要素的位置或配置也可以在不超出本發明的思想和範圍的情況下變更。因此,後述的詳細說明並不用於限定本發明,本發明的範圍應理解為包括與發明要求保護範圍中的請求項所申請的範圍及等同的所有範圍。圖中,相似的附圖標記在多個方面表示相同或相似的結構要素。For the detailed description of the present invention to be described later, reference is made to the drawings showing specific embodiments in which the present invention can be implemented as examples. This embodiment will be described in detail below, so that those of ordinary skill in the art to which the present invention belongs can implement the present invention. Although the various embodiments of the present invention are different from each other, they are not mutually exclusive. For example, the specific shapes, structures, and characteristics described in this specification can be changed from one embodiment to other embodiments without departing from the spirit and scope of the present invention. In addition, the position or arrangement of each embodiment or individual structural elements may also be changed without departing from the spirit and scope of the present invention. Therefore, the following detailed description is not intended to limit the present invention, and the scope of the present invention should be understood to include the scope of the claims in the protection scope of the invention and all equivalent scopes. In the figures, similar reference numerals denote the same or similar structural elements in many aspects.

以下,參照附圖,詳細說明本發明的多個優選實施例,以使本發明所屬技術領域的普通技術人員可以輕鬆實施本發明。Hereinafter, with reference to the accompanying drawings, a number of preferred embodiments of the present invention will be described in detail, so that those skilled in the art to which the present invention belongs can easily implement the present invention.

以下,本發明的實施例中公開按節點設置區塊鏈網路上的許可權來可使特定節點在區塊鏈網路上有限地訪問的方法。Hereinafter, the embodiment of the present invention discloses a method of setting permissions on the blockchain network by node to allow a specific node to have limited access on the blockchain network.

以下在本發明的實施例公開的數位資產支援證券可以是以支援(backed)資產(asset)的方式發行並且可在諸如區塊鏈之類的網路上進行交易的數位證券。以下,數位資產支援證券用術語DABS來表示,DABS可以被廣義地解釋為包含可以在諸如區塊鏈之類的網路上以規定價值進行交易的多種手段。The following digital asset-backed securities disclosed in the embodiments of the present invention may be digital securities that are issued in a backed manner and can be traded on a network such as a blockchain. In the following, digital asset-backed securities are represented by the term DABS. DABS can be broadly interpreted as including a variety of methods that can be traded at a prescribed value on networks such as blockchain.

圖1為示出本發明實施例透過區塊鏈外部節點處理交易之方法的概念圖。FIG. 1 is a conceptual diagram showing a method for processing transactions through external nodes of the blockchain according to an embodiment of the present invention.

圖1公開用於通過設置節點的許可權來差別設置資料交易許可權的方法。資料交易許可權能夠以包含對區塊鏈上的特定資料的訪問/處理(讀、寫等)許可權、對區塊鏈網路上的特定過程的請求許可權等的含義來使用。Figure 1 discloses a method for differentially setting data transaction permissions by setting node permissions. Data transaction permission can be used in the meaning including permission to access/process (read, write, etc.) specific data on the blockchain, request permission to a specific process on the blockchain network, etc.

本發明公開用於通過在外部節點的區塊鏈網路上設置資料交易許可權來將在區塊鏈網路上的資料交易許可權有限地提供給外部節點的區塊鏈網路結構。通過這種方法,還可向外部節點賦予用於在區塊鏈網路上進行操作的一些許可權。The present invention discloses a blockchain network structure for providing data transaction permission on the blockchain network to external nodes limitedly by setting data transaction permission on the blockchain network of the external node. In this way, external nodes can also be granted some permissions for operations on the blockchain network.

參照圖1,區塊鏈網路可以包含節點,節點可以是構成區塊鏈網路的伺服器單元。區塊鏈網路內的節點之間可通過通道來連接。多個節點可通過相同的通道或不同的通道來連接,只有屬於相同通道的節點之間才能夠進行通信,並且,一個節點可具有多個通道。Referring to Figure 1, a blockchain network may include nodes, and nodes may be server units constituting the blockchain network. The nodes in the blockchain network can be connected through channels. Multiple nodes can be connected through the same channel or different channels, only nodes belonging to the same channel can communicate with each other, and one node can have multiple channels.

例如,(節點1 110、節點2 120、節點3 130)可通過第一通道160進行通信,(節點3 130、節點4 140、節點5 150)可通過第二通道170進行通信。節點1 110、節點2 120、節點3 130之間可通過第一通道160進行通信,節點3 130、節點4 140、節點5 150之間可通過第二通道170進行通信。節點3 130可在第一通道160及第二通道170上具有資料交易許可權。節點1 110及節點2 120可在第一通道160上具有資料交易許可權。節點4 140及節點5 150可在第二通道170上具有資料交易許可權。每個通道可以生成單獨的區塊及區塊鏈。根據需要,可通過運行單獨的通道來生成單獨的區塊鏈。For example, (node 1 110, node 2 120, node 3 130) can communicate through the first channel 160, and (node 3 130, node 4 140, node 5 150) can communicate through the second channel 170. The node 1 110, the node 2 120, and the node 3 130 can communicate through the first channel 160, and the node 3 130, the node 4 140, and the node 5 150 can communicate through the second channel 170. The node 3 130 may have data transaction permission on the first channel 160 and the second channel 170. The node 1 110 and the node 2 120 may have data transaction permission on the first channel 160. The node 4 140 and the node 5 150 may have data transaction permission on the second channel 170. Each channel can generate a separate block and blockchain. According to needs, a separate blockchain can be generated by running a separate channel.

在節點可以設置有鏈碼,基於設置在節點的鏈碼來確定可以由節點處理的交易。例如,在通過第一通道160連接的節點1 110、節點2 120中,在節點1 110設置有鏈碼A、鏈碼B,在節點2 120可以設置有鏈碼A。A chain code can be set at the node, and the transaction that can be processed by the node is determined based on the chain code set at the node. For example, in the node 1 110 and the node 2 120 connected through the first channel 160, the node 1 110 is provided with a chain code A and a chain code B, and the node 2 120 may be provided with a chain code A.

在此情況下,節點1 110可以處理與鏈碼A和鏈碼B有關的交易,節點2 120僅可以處理與鏈碼A有關的交易。鏈碼可通過不同的版本來更新,附屬於特定鏈碼的資料僅可在設置有相應鏈碼的節點共用。In this case, node 1 110 can process transactions related to chain code A and chain code B, and node 2 120 can only process transactions related to chain code A. The chain code can be updated through different versions, and the data attached to a specific chain code can only be shared among the nodes with the corresponding chain code.

並且,根據本發明的實施例,可通過劃分資料來按節點限制資料交易許可權。資料可分為公共資料(public data)和專用資料(private data)。在特定通道上設置特定鏈碼的節點可以具有對公共資料的資料交易許可權。在特定通道上設置特定鏈碼的節點中,只有被賦予對專用資料的單獨存取權限的節點才能夠具有對專用資料的資料交易許可權。In addition, according to the embodiment of the present invention, the data transaction permission can be restricted by node by dividing the data. Data can be divided into public data (public data) and private data (private data). A node that sets a specific chain code on a specific channel can have the permission to trade public materials. Among the nodes with a specific chain code set on a specific channel, only those nodes that have been given individual access rights to the special data can have the data transaction permission for the special data.

即,根據本發明的實施例,可以基於通道、通道編碼、資料分類來設置節點的資料交易許可權。具體地,可以按通道、通道編碼、資料分類的順序限制節點的資料交易許可權。That is, according to the embodiment of the present invention, the data transaction permission of the node can be set based on the channel, the channel code, and the data classification. Specifically, the data transaction permission rights of nodes can be restricted in the order of channel, channel code, and data classification.

為了具有針對通道內的資料交易許可權,必須是屬於通道的節點。並且,為了具有針對通道內的資料中的與鏈碼有關的資料交易許可權,必須是設置有特定鏈碼的節點。並且,為了具有針對與特定通道的特定鏈碼有關的資料中的被分為專用的資料交易許可權,必須是可以訪問專用資料的節點。In order to have permission for data transactions in the channel, it must be a node belonging to the channel. In addition, in order to have the permission to trade data related to the chain code in the data in the channel, it must be a node with a specific chain code. In addition, in order to have the permission for data transactions that are classified as dedicated data among the data related to the specific chain code of the specific channel, it must be a node that can access the dedicated data.

在通道單位的節點、通道內的鏈碼單位的節點、鏈碼單位內,能夠以特定的節點單位設置資料交易許可權。In the node of the channel unit, the node of the chain code unit in the channel, and the chain code unit, the data transaction permission can be set in a specific node unit.

當在特定通道中共用的資料發生交易時,可在具有對相應資料的資料交易許可權的通道內的所有節點上發生與因交易引起的資料變化有關的事件。When the data shared in a specific channel is transacted, events related to data changes caused by the transaction can occur on all nodes in the channel that have the data transaction permission for the corresponding data.

並且,當在特定通道內的特定鏈碼中共用的資料發生交易時,可在具有對相應資料的資料交易許可權的特定通道內的設置有特定鏈碼的節點上發生與因交易引起的資料變化有關的事件。In addition, when the data shared in the specific chain code in a specific channel is traded, the data caused by the transaction can be generated on the node with the specific chain code in the specific channel that has the data transaction permission for the corresponding data. Change related events.

同樣,當在特定通道內的特定鏈碼中共用的專用資料發生交易時,在具有對相應專用資料的資料交易許可權的特定通道內的設置有特定鏈碼的節點中,可在具有對專用資料的許可權的節點上發生與資料變化有關的事件。Similarly, when special data shared in a specific chain code in a specific channel is traded, the nodes with a specific chain code in the specific channel that have the data transaction permission for the corresponding special data can be An event related to the data change occurs on the node of the permission of the data.

以下,本發明的實施例公開通過設置這種分層限制資料連接(或共用)許可權的外部節點來處理交易的方法。Hereinafter, the embodiments of the present invention disclose a method of processing transactions by setting up such external nodes that restrict data connection (or sharing) permissions in a layered manner.

在本發明的實施例中,為了便於說明,基於與資產的交易有關的交易來進行說明,但與並非為資產交易的其他資訊有關的交易也包含在本發明的權利範圍之內。In the embodiments of the present invention, for ease of description, the description is based on transactions related to transactions of assets, but transactions related to other information that are not asset transactions are also included in the scope of rights of the present invention.

圖2為示出本發明實施例的處理因外部節點而發生的交易的方法的概念圖。FIG. 2 is a conceptual diagram showing a method of processing transactions that occur due to external nodes according to an embodiment of the present invention.

圖2公開基於設置交易許可權來處理因外部節點而發生的交易的方法。Figure 2 discloses a method of processing transactions that occur due to external nodes based on setting transaction permissions.

參照圖2,區塊鏈網路上的節點可分為內部節點200和外部節點210, 220。外部節點210、220和內部節點200可具有不同的資料交易許可權。內部節點200可以是在區塊鏈網路上具有第一資料交易許可權250的節點、外部節點210、220可以是在區塊鏈網路上具有第二資料交易許可權260的節點。Referring to FIG. 2, nodes on the blockchain network can be divided into internal nodes 200 and external nodes 210, 220. The external nodes 210, 220 and the internal node 200 may have different data transaction permissions. The internal node 200 may be a node with the first data transaction permission 250 on the blockchain network, and the external nodes 210 and 220 may be the nodes with the second data transaction permission 260 on the blockchain network.

第一資料交易許可權250可以是比第二資料交易許可權260相對寬的(或上級)許可權,可通過第一資料交易許可權250訪問和/或處理的資料中的一部分可能無法通過第二資料交易許可權260訪問和/或處理。The first data transaction permission right 250 may be a relatively wider (or superior) permission right than the second data transaction permission right 260. Some of the data that can be accessed and/or processed through the first data transaction permission right 250 may not pass the second data transaction permission right. 2. Data transaction permission 260 to access and/or process.

可以假設內部節點200、第一外部節點210及第二外部節點220位於區塊鏈網路上的情況。內部節點200可具有第一資料交易許可權250,第一外部節點210及第二外部節點220可具有第二資料交易許可權260。第一資料交易許可權250可以是比第二資料交易許可權260相對上級別的許可權。It can be assumed that the internal node 200, the first external node 210, and the second external node 220 are located on the blockchain network. The internal node 200 may have a first data transaction permission right 250, and the first external node 210 and the second external node 220 may have a second data transaction permission right 260. The first data transaction permission right 250 may be a higher level of permission than the second data transaction permission right 260.

例如,第二資料交易許可權260可以包含生成交易請求資料並與具有相同或上級別資料交易許可權的其他節點共用交易請求資料的資料交易許可權。第一資料交易許可權250不僅包含生成交易請求資料並與具有相同或上級別資料交易許可權的其他節點共用交易請求資料的資料交易許可權,而且可以包含處理交易請求資料,判斷有效性,並可變更資產資訊的資料交易許可權。For example, the second data transaction permission right 260 may include the data transaction permission right for generating transaction request data and sharing the transaction request data with other nodes having the same or higher level data transaction permission. The first data transaction permission 250 not only includes the data transaction permission for generating transaction request data and sharing transaction request data with other nodes with the same or higher level of data transaction permission, but also can include processing transaction request data, judging validity, and The data transaction permission of asset information can be changed.

內部節點200、第一外部節點210或第二外部節點220可以根據第一資料交易許可權250產生用於生成並共用交易請求資料的交易。例如,當具有第一資料交易許可權250的第一外部節點210生成交易請求資料時,具有相同的第一資料交易許可權250的第二外部節點220及內部節點200也可共用由第一外部節點210生成的交易請求資料。The internal node 200, the first external node 210, or the second external node 220 can generate a transaction for generating and sharing transaction request data according to the first data transaction permission 250. For example, when the first external node 210 with the first data transaction permission 250 generates transaction request data, the second external node 220 and the internal node 200 with the same first data transaction permission 250 can also share the same Transaction request data generated by node 210.

內部節點200可以基於第一資料交易許可權250處理交易請求資料,判斷有效性,並變更資產資訊。內部節點200使用交易引擎來判斷交易請求資料的有效性,並且在有效交易請求的情況下,可以執行對個人資產的變更處理。The internal node 200 can process the transaction request data based on the first data transaction permission right 250, determine the validity, and change the asset information. The internal node 200 uses the transaction engine to determine the validity of the transaction request data, and in the case of a valid transaction request, it can execute the process of changing personal assets.

作為具體例,第一外部節點210基於第二資料交易許可權260來生成用於購買在交易所交易的特定數位資產支援證券的交易請求資料,並且可與第二外部節點220及內部節點200共用上述資料。第一外部節點210可以是諸如外部信差服務節點、外部金融服務節點之類的單獨服務提供者的節點。As a specific example, the first external node 210 generates transaction request data for purchasing specific digital asset support securities traded on the exchange based on the second data transaction permission 260, and can be shared with the second external node 220 and the internal node 200 The above information. The first external node 210 may be a node of a separate service provider such as an external messenger service node, an external financial service node, or the like.

即,提供單獨服務的節點被賦予作為可以請求對數位資產支援證券的交易的許可權的第一資料交易許可權250,從而即使不直接通過交易所,也可在信差服務或單獨的金融服務中請求對數位資產支援證券的交易,數位資產支援證券交易服務還可在其他現有服務中提供。That is, the node that provides the separate service is given the first data transaction permission 250 as the permission to request the transaction of digital asset-supported securities, so that even if it does not directly go through the exchange, it can be used in the messenger service or a separate financial service. Request for trading of digital asset-backed securities, and digital asset-backed securities trading services can also be provided in other existing services.

由第一外部節點210生成的交易請求資料可以在第二外部節點220及內部節點200共用。內部節點200可以是交易所節點,交易所節點基於共用的交易請求資料來進行對數位資產支援證券的交易,並且可將數位資產支援證券交易的結果反映到資產明細中。The transaction request data generated by the first external node 210 can be shared between the second external node 220 and the internal node 200. The internal node 200 may be an exchange node, and the exchange node performs transactions on digital asset-backed securities based on shared transaction request data, and may reflect the result of the digital asset-backed securities transaction in the asset list.

即,向外部節點210、220賦予可產生交易請求資料的許可權,使用者還可在外部服務中請求對數位資產支援證券的交易,並處理所請求的數位資產支援證券交易。使用者也可通過信差服務進行數位資產支援證券的交易,而無需直接連接交易所節點。That is, the external nodes 210 and 220 are given permission to generate transaction request data, and the user can also request transactions of digital asset-supported securities in the external service, and process the requested digital asset-supported securities transactions. Users can also use the messenger service to trade digital asset-backed securities without directly connecting to exchange nodes.

為了便於說明,圖2中公開了與數位資產支援證券的交易有關的交易,但除了數位資產支援證券的交易之外,有關多種目的的其他交易,也通過在特定外部節點210、220設置有限的資料交易許可權,從而也可在外部節點210、220利用基於區塊鏈的服務。For ease of explanation, Figure 2 discloses transactions related to the transaction of digital asset-backed securities, but in addition to transactions of digital asset-backed securities, other transactions related to multiple purposes are also set up in specific external nodes 210, 220 with limited Data transaction permission rights can also be used at external nodes 210 and 220 based on blockchain services.

為了在這種外部節點210、220設置有限的資料交易許可權,可以使用多種方法。以下,本發明的實施例中作為用於在外部節點210、220設置有限的資料交易許可權的方法,具體公開l)資料分類方法、2)鏈碼設置方法、3)通道分類方法。In order to set limited data transaction permissions on such external nodes 210 and 220, various methods can be used. Hereinafter, in the embodiment of the present invention, as a method for setting limited data transaction permissions on external nodes 210 and 220, 1) data classification method, 2) chain code setting method, and 3) channel classification method are specifically disclosed.

圖3為示出本發明實施例的用於在外部節點設置有限的資料交易許可權的方法的概念圖。Fig. 3 is a conceptual diagram showing a method for setting a limited data transaction permission on an external node according to an embodiment of the present invention.

圖3示出基於資料分類在外部節點設置有限的資料交易許可權的方法。Figure 3 shows a method of setting limited data transaction permission on external nodes based on data classification.

參照圖3,當相同的通道、相同的鏈碼設置於內部節點300和外部節點320時,可以通過諸如第一資料(例如,公共資料)、第二資料(例如,專用資料)之類的資料分類來限制對相應資料的資料交易許可權。可以通過向資料賦予單獨的識別字或對資料進行單獨的加密來對資料進行分類。3, when the same channel and the same chain code are set on the internal node 300 and the external node 320, data such as the first data (for example, public data) and the second data (for example, dedicated data) can be passed Classification to limit the data transaction permission of the corresponding data. The data can be classified by assigning a separate identifier or encrypting the data separately.

內部節點300可以被設置為具有對第一資料及第二資料的資料交易許可權,外部節點320可以被設置為具有對第一資料的資料交易許可權。在此情況下,內部節點300可通過生成與第一資料及第二資料有關的交易來處理第一資料及第二資料,外部節點320可以生成與第一資料有關的交易來處理第一資料。The internal node 300 can be set to have the data transaction permission for the first data and the second data, and the external node 320 can be set to have the data transaction permission for the first data. In this case, the internal node 300 can process the first data and the second data by generating a transaction related to the first data and the second data, and the external node 320 can generate a transaction related to the first data to process the first data.

可以假設第一資料為交易請求資料,第二資料為資產管理資料的情況。在此情況下,外部節點320可以生成與交易請求資料有關的交易來與內部節點300共用,內部節點300處理交易請求資料,並且生成與用於管理資產的資產管理資料有關的交易來進行處理。It can be assumed that the first data is transaction request data and the second data is asset management data. In this case, the external node 320 may generate transactions related to the transaction request data to be shared with the internal node 300, and the internal node 300 processes the transaction request data, and generates transactions related to the asset management data used to manage the assets for processing.

基於這種資料的分類,即使使用相同的通道、相同的鏈碼,也設置不同的資料交易許可權,從而在外部節點320也可利用由內部節點300提供的基於區塊鏈的服務中的一些服務。Based on this data classification, even if the same channel and the same chain code are used, different data transaction permissions are set, so that the external node 320 can also use some of the blockchain-based services provided by the internal node 300 service.

圖4為本發明實施例的用於在外部節點設置有限的資料交易許可權的方法的概念圖。Fig. 4 is a conceptual diagram of a method for setting a limited data transaction permission on an external node according to an embodiment of the present invention.

圖4公開通過設置鏈碼來在外部節點設置有限的資料交易許可權的方法。Figure 4 discloses a method of setting limited data transaction permissions on external nodes by setting chain codes.

參照圖4,在內部節點400可以設置有第一鏈碼,在外部節點420可以設置有第二鏈碼。4, the internal node 400 may be provided with a first chain code, and the external node 420 may be provided with a second chain code.

可以基於第一鏈碼來賦予針對交易請求交易及資產管理交易的資料交易許可權,可以基於第二鏈碼賦予針對交易請求交易的資料交易許可權。The data transaction permission for transaction request transactions and asset management transactions can be granted based on the first chain code, and the data transaction permission for transaction request transactions can be granted based on the second chain code.

因此,設置有第二鏈碼的外部節點420可以產生交易請求交易,設置有第一鏈碼的內部節點400可以驗證交易請求交易的有效性,並基於交易請求交易產生資產管理交易來改變資產。Therefore, the external node 420 with the second chain code can generate a transaction request transaction, and the internal node 400 with the first chain code can verify the validity of the transaction request transaction, and generate an asset management transaction based on the transaction request transaction to change assets.

基於設置這種鏈碼的節點的分類,通過相同通道連接的多個節點能夠以差別的資料交易許可權進行操作,外部節點420也可利用由內部節點400提供的基於區塊鏈的服務中的一些服務。Based on the classification of the nodes that set this chain code, multiple nodes connected through the same channel can operate with different data transaction permissions. The external node 420 can also use the blockchain-based services provided by the internal node 400 Some services.

圖5為示出本發明實施例的用於在外部節點設置有限的資料交易許可權的方法的概念圖。Fig. 5 is a conceptual diagram showing a method for setting a limited data transaction permission on an external node according to an embodiment of the present invention.

圖5公開基於通道分類在外部節點設置有限的資料交易許可權的方法。Figure 5 discloses a method for setting limited data transaction permissions on external nodes based on channel classification.

參照圖5,可通過劃分第一通道及第二通道來在內部節點500和外部節點520設置不同的資料交易許可權。Referring to FIG. 5, the internal node 500 and the external node 520 can set different data transaction permissions by dividing the first channel and the second channel.

內部節點500可以被設置為可通過第一通道和第二通道進行通信,外部節點520可以被設置為僅可以通過第二通道進行通信。The internal node 500 may be set to communicate through the first channel and the second channel, and the external node 520 may be set to communicate only through the second channel.

外部節點520可使用第二通道來共用交易請求資料,內部節點500可通過第二通道確認交易請求資料。內部節點500可以基於通過第二通道確認的交易請求資料來在第一通道上生成交易資產管理資料並進行處理。The external node 520 can use the second channel to share transaction request data, and the internal node 500 can confirm the transaction request data through the second channel. The internal node 500 can generate and process transaction asset management data on the first channel based on the transaction request data confirmed through the second channel.

通過這種方法,也可通過外部節點520生成交易請求資料並向內部節點500傳遞,從而處理交易請求資料。In this way, the transaction request data can also be generated by the external node 520 and transmitted to the internal node 500 to process the transaction request data.

圖6公開本發明實施例的分層設置外部節點的方法。Fig. 6 discloses a method for hierarchically setting external nodes according to an embodiment of the present invention.

圖6公開基於內部節點設置第一層外部節點、第二層外部節點、第三層外部節點的方法。Fig. 6 discloses a method of setting first-level external nodes, second-level external nodes, and third-level external nodes based on internal nodes.

參照圖6,內部節點、第一層外部節點及第二層外部節點可通過第一通道連接,第三層外部節點可通過第二通道連接。由此,第三層外部節點可與內部節點、第一層外部節點、第二層外部節點分離,第三層外部節點可在區塊鏈網路上執行有限的操作。Referring to FIG. 6, internal nodes, first-level external nodes, and second-level external nodes may be connected through a first channel, and third-level external nodes may be connected through a second channel. Thus, the third-tier external nodes can be separated from the internal nodes, the first-tier external nodes, and the second-tier external nodes, and the third-tier external nodes can perform limited operations on the blockchain network.

然後,可在內部節點、第一層外部節點、第二層外部節點中的內部節點、第一層外部節點設置有通道編碼A,可在第二層外部節點設置有通道編碼B。設置有通道編碼A的內部節點、第一層外部節點可以共用與通道編碼A有關的資料,但設置有通道編碼B的第二層外部節點可以共用與通道編碼B有關的資料。由此,第二層外部節點可與內部節點、第一層外部節點分離,第二層外部節點可在區塊鏈網路上執行有限的操作。Then, the channel code A can be set on the internal nodes, the first layer external nodes, the internal nodes of the second layer external nodes, and the first layer external nodes, and the channel code B can be set on the second layer external nodes. The internal nodes with channel code A and the first-level external nodes can share data related to channel code A, but the second-tier external nodes with channel code B can share data related to channel code B. Thus, the second-tier external nodes can be separated from the internal nodes and the first-tier external nodes, and the second-tier external nodes can perform limited operations on the blockchain network.

然後,可將專用資料設置為僅可使內部節點、第一層外部節點中的內部節點訪問。在此情況下,專用資料僅可以由內部節點訪問,第一層外部節點可能無法訪問。由此,內部節點與第一層外部節點可以分離,第一層外部節點可在區塊鏈網路上執行有限的操作。Then, the dedicated data can be set so that only the internal nodes in the internal nodes and the first-tier external nodes can be accessed. In this case, the dedicated data can only be accessed by internal nodes, and the external nodes on the first level may not be accessible. As a result, internal nodes can be separated from the first-level external nodes, and the first-level external nodes can perform limited operations on the blockchain network.

本發明實施例的按節點的許可權設置可由設置節點執行。設置節點可以包括:通信部,用於與外部節點進行通信;以及處理器,與通信部可操作地(operatively)連接。處理器可以執行按節點設置許可權的方法。The permission setting per node in the embodiment of the present invention can be performed by the setting node. The setting node may include: a communication part for communicating with an external node; and a processor operatively connected with the communication part. The processor can execute a method of setting permissions per node.

本發明實施例的透過區塊鏈外部節點處理交易之方法可包括:設置節點設置內部節點和外部節點的步驟;設置節點在內部節點設置第一資料交易許可權的步驟;以及設置節點在外部節點設置第二資料交易許可權的步驟,第一資料交易許可權設置於內部節點,並且可以是在區塊鏈網路上的操作許可權,第二資料交易許可權設置於外部節點,並且可以是在區塊鏈網路上的操作許可權。如上所述,第一資料交易許可權及上述第二資料交易許可權可以基於通道、通道編碼或資料分類來設置。The method for processing transactions through the external nodes of the blockchain in the embodiment of the present invention may include: the steps of setting the nodes to set internal nodes and external nodes; the steps of setting the nodes to set the first data transaction permission on the internal nodes; and the steps of setting the nodes to the external nodes In the step of setting the second data transaction permission, the first data transaction permission is set on the internal node, and can be the operation permission on the blockchain network, and the second data transaction permission is set on the external node, and can be Operation permission on the blockchain network. As described above, the first data transaction permission and the aforementioned second data transaction permission can be set based on channel, channel code, or data classification.

當基於通道來設置第一資料交易許可權及第二資料交易許可權時,內部節點基於第一通道來連接,外部節點基於第二通道來連接,第一通道和第二通道可單獨分離來生成單獨的區塊鏈。When the first data transaction permission and the second data transaction permission are set based on the channel, the internal nodes are connected based on the first channel, and the external nodes are connected based on the second channel. The first channel and the second channel can be generated separately Separate blockchain.

當基於鏈碼設置第一資料交易許可權及第二資料交易許可權時,內部節點設置第一鏈碼,外部節點設置第二鏈碼,內部節點處理與第一鏈碼有關的資料,外部節點處理與第二鏈碼有關的資料,第一鏈碼可包含上述第二鏈碼的功能。When the first data transaction permission and the second data transaction permission are set based on the chain code, the internal node sets the first chain code, and the external node sets the second chain code. The internal node processes the data related to the first chain code, and the external node Process data related to the second chain code. The first chain code can include the function of the second chain code.

圖7為示出本發明實施例的通過外部節點的資產交易方法的概念圖。Fig. 7 is a conceptual diagram showing an asset transaction method through an external node according to an embodiment of the present invention.

圖7公開一種假設外部節點為信差服務運營者,並通過外部節點執行對數位資產支援證券的交易的方法。Fig. 7 discloses a method for assuming that an external node is a messenger service operator and performing transactions on digital asset-backed securities through the external node.

參照圖7,為信差服務運營者設置單獨的外部節點,信差服務用戶可通過信使700執行交易。例如,提供可在信使700上交易數位資產支援證券的交易平臺,通過交易平臺,也可在信使700上執行對數位資產支援證券的交易訂單。Referring to FIG. 7, a separate external node is set up for messenger service operators, and messenger service users can execute transactions through messenger 700. For example, it provides a trading platform that can trade digital asset-backed securities on the messenger 700. Through the trading platform, it is also possible to execute trading orders for digital asset-backed securities on the messenger 700.

即,由設置節點設置可在用於信差服務運營者的外部節點生成交易訂單的資料交易許可權,因而無需連接交易所節點720就可生成交易訂單。如上所述,外部節點可以基於通道、通道編碼、資料分類來設置資料交易許可權。That is, the setting node sets the data transaction permission rights that can generate transaction orders on external nodes used for messenger service operators, and thus can generate transaction orders without connecting to the exchange node 720. As mentioned above, external nodes can set data transaction permissions based on channels, channel codes, and data classification.

可向交易所節點720傳遞在信使700上生成的交易訂單,並在交易所節點720處理,從而完成交易。當交易完成時,可通過信使700通知交易的完成。通過這種方法,也可在利用其他服務的過程中通過交易所節點對現有的僅通過連接交易所進行交易的數位資產支援證券進行交易。The transaction order generated on the messenger 700 can be delivered to the exchange node 720 and processed at the exchange node 720 to complete the transaction. When the transaction is completed, the messenger 700 may notify the completion of the transaction. In this way, it is also possible to trade existing digital asset-supported securities that are only traded through connected exchanges through exchange nodes while using other services.

根據本發明的實施例,可通過通道來賦予有限的功能,並且可通過獨立通道的連接以及虛擬通道的連接來限制通道。若將通過相同的通道綁定的多個節點在無其他節點干涉的情況下可以設置為單獨的分離通道,則可作為物理上分離的通道來設置有限功能。例如,若節點A、節點B、節點C作為通道內的節點,可在中間無單獨節點的情況下連接,則可以作為物理分離通道來設置為獨立通道。According to the embodiment of the present invention, limited functions can be given through channels, and channels can be restricted through the connection of independent channels and the connection of virtual channels. If multiple nodes bound through the same channel can be set as separate separate channels without interference from other nodes, they can be used as physically separated channels to set limited functions. For example, if node A, node B, and node C are used as nodes in the channel and can be connected without separate nodes in the middle, they can be set as independent channels as physically separated channels.

但是,當需要以相同通道設置時若通道內節點僅通過中間的通道外節點連接,則在通過通道傳遞的資料的安全性可能發生問題。例如,若節點A、節點B、節點C作為通道內節點只能通過作為中間的通道外節點的節點X連接,則無法設置物理分離通道。在此情況下,根據本發明的實施例,即使在中間包含通道外節點的情況下,也可使用用於設置為獨立通道的一些通道區間資料分離加密方法。However, when it is necessary to use the same channel to set up, if the nodes in the channel are only connected through the nodes outside the channel in the middle, problems may occur in the security of the data transmitted through the channel. For example, if node A, node B, and node C as nodes in the channel can only be connected via node X, which is an intermediate node outside the channel, the physical separation channel cannot be set. In this case, according to the embodiment of the present invention, even in the case where nodes outside the channel are included in the middle, some channel section data separation encryption methods for setting as independent channels can be used.

當需要通過中間的通道外節點傳輸資料時,可將需要通過中間的通道外節點傳輸資料的區間設置為資料分離加密區間,可在資料分離加密區間對資料進行分離加密。具體地,從通道內節點向通道外節點傳遞的資料可以被加密並以旁路類型向下一通道內節點傳遞。在此情況下,在初始加密之後,加密可基於之前傳輸的資料中所包含的加密密匙值來執行,因而可以設置為僅能夠使繼續變化且對之前傳輸的資料進行解碼的通道內節點進行解碼。資料分離加密區間可以設置有多個,分別適用於多個資料分離加密區間的加密密匙值可以互不相同。通過這種方法,即使在通道外節點位於中間的情況下,節點也可通過虛擬的獨立通道來連接。When the data needs to be transmitted through the nodes outside the middle channel, the interval for data transmission through the nodes outside the middle channel can be set as the data separation and encryption interval, and the data can be separated and encrypted in the data separation and encryption interval. Specifically, the data transferred from the node in the channel to the node outside the channel can be encrypted and transferred to the node in the next channel in the bypass type. In this case, after the initial encryption, the encryption can be performed based on the encryption key value contained in the previously transmitted data, so it can be set to enable only the nodes in the channel that continue to change and decode the previously transmitted data. decoding. Multiple data separation encryption intervals can be set, and the encryption key values applicable to multiple data separation encryption intervals can be different from each other. In this way, even when the nodes outside the channel are in the middle, the nodes can be connected through virtual independent channels.

以上描述的本發明的實施例能夠以可以由各種電腦元件執行的程式指令的形式實現並記錄在電腦可讀記錄介質中。該電腦可讀記錄介質可以單獨或組合地包括程式指令、資料檔案、資料結構等。記錄在上述電腦可讀記錄介質的程式指令可以為本發明專門設計和配置,或者可以是被電腦軟體領域的普通技術人員公知並使用的程式指令。電腦可讀記錄介質的示例包括諸如硬碟、軟碟和磁帶之類的磁性介質,諸如CD-ROM和DVD之類的光學記錄介質以及諸如軟式光碟(floptical disk)之類的磁光介質(magneto-optical medium)和諸如ROM、RAM、快閃記憶體之類的專門為了存儲和執行程式指令而配置的硬體裝置。程式指令的示例不僅包括由編譯器生成的機器代碼,而且包括可以由電腦使用解譯器等執行的高階語言代碼。可以通過一個或多個軟體模組來改變硬體裝置以執行根據本發明的處理,反之亦然。The above-described embodiments of the present invention can be implemented in the form of program instructions that can be executed by various computer components and recorded in a computer-readable recording medium. The computer-readable recording medium may include program instructions, data files, data structures, etc., alone or in combination. The program instructions recorded in the computer-readable recording medium may be specially designed and configured for the present invention, or may be program instructions known and used by those of ordinary skill in the computer software field. Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks, and magnetic tapes, optical recording media such as CD-ROMs and DVDs, and magneto-optical media such as floptical disks. -optical medium) and hardware devices specially configured for storing and executing program instructions such as ROM, RAM, and flash memory. Examples of program instructions include not only machine codes generated by a compiler, but also high-level language codes that can be executed by a computer using an interpreter or the like. The hardware device can be changed by one or more software modules to perform the processing according to the present invention, and vice versa.

儘管在上述中通過諸如具體的結構要求之類的特定事項和受限的實施例以及附圖來描述了本發明,但這僅是為了有助於更全面地理解本發明而提供,並且本發明不限於上述實施例。只要是本發明所屬技術領域的普通技術人員就可根據這種記載進行各種修改和變更。Although the present invention has been described in the above through specific matters such as specific structural requirements, limited embodiments, and drawings, this is only provided to help a more comprehensive understanding of the present invention, and the present invention It is not limited to the above embodiment. A person of ordinary skill in the technical field of the present invention can make various modifications and changes based on this description.

因此,本發明的思想不應局限於上述所描述的實施例,除了後述的發明要求保護範圍之外,與發明要求保護範圍等同或由此等效改變的所有範圍也應屬於本發明的思想範疇之內。Therefore, the idea of the present invention should not be limited to the above-described embodiments. In addition to the scope of protection of the invention described below, all ranges equivalent to or equivalently changed from the scope of the invention shall also belong to the scope of the invention. within.

110:節點1 120:節點2 130:節點3 140:節點4 150:節點5 160:第一通道 170:第二通道 200:內部節點 210:外部節點 220:外部節點 250:第一資料交易許可權 260:第二資料交易許可權 300:內部節點 320:外部節點 400:內部節點 420:外部節點 500:內部節點 520:外部節點 600:內部節點 610:第一層外部節點 620:第二層內部節點 630:第三層外部節點 700:信使 720:交易所節點110: node 1 120: Node 2 130: Node 3 140: Node 4 150: Node 5 160: first channel 170: second channel 200: internal node 210: external node 220: external node 250: First data transaction permission 260: Second data transaction permission 300: internal node 320: external node 400: internal node 420: external node 500: internal node 520: external node 600: internal node 610: first-tier external nodes 620: second-tier internal nodes 630: third-tier external nodes 700: messenger 720: Exchange node

圖1為示出本發明實施例的透過區塊鏈外部節點處理交易之方法的概念圖。 圖2為示出本發明實施例的處理因外部節點而發生的交易的方法的概念圖。 圖3為示出本發明實施例的用於在外部節點設置有限的資料交易許可權的方法的概念圖。 圖4為本發明實施例的用於在外部節點設置有限的資料交易許可權的方法的概念圖。 圖5為示出本發明實施例的用於在外部節點設置有限的資料交易許可權的方法的概念圖。 圖6公開本發明實施例的分層設置外部節點的方法。 圖7為示出本發明實施例的通過外部節點的資產交易方法的概念圖。FIG. 1 is a conceptual diagram showing a method for processing transactions through external nodes of a blockchain according to an embodiment of the present invention. FIG. 2 is a conceptual diagram showing a method of processing transactions that occur due to external nodes according to an embodiment of the present invention. Fig. 3 is a conceptual diagram showing a method for setting a limited data transaction permission on an external node according to an embodiment of the present invention. Fig. 4 is a conceptual diagram of a method for setting a limited data transaction permission on an external node according to an embodiment of the present invention. Fig. 5 is a conceptual diagram showing a method for setting a limited data transaction permission on an external node according to an embodiment of the present invention. Fig. 6 discloses a method for hierarchically setting external nodes according to an embodiment of the present invention. Fig. 7 is a conceptual diagram showing an asset transaction method through an external node according to an embodiment of the present invention.

110:節點1 110: node 1

120:節點2 120: Node 2

130:節點3 130: Node 3

140:節點4 140: Node 4

150:節點5 150: Node 5

160:第一通道 160: first channel

170:第二通道 170: second channel

Claims (8)

一種透過區塊鏈外部節點處理交易之方法,其特徵在於,包括: 設置節點設置內部節點和外部節點的步驟; 上述設置節點在上述內部節點設置第一資料交易許可權的步驟;以及 上述設置節點在上述外部節點設置第二資料交易許可權的步驟, 上述第一資料交易許可權設置於上述內部節點,並且是在區塊鏈網路上的操作許可權, 上述第二資料交易許可權設置於上述外部節點,並且是在上述區塊鏈網路上的操作許可權。A method for processing transactions through external nodes of the blockchain, which is characterized in that it includes: Steps to set up internal nodes and external nodes; The step of the setting node setting the first data transaction permission on the internal node; and The step for the setting node to set the permission of the second data transaction on the external node, The above-mentioned first data transaction permission is set at the above-mentioned internal node, and is the operation permission right on the blockchain network, The second data transaction permission is set at the external node, and is an operation permission on the blockchain network. 如請求項1所述之透過區塊鏈外部節點處理交易之方法,其特徵在於,上述第一資料交易許可權及上述第二資料交易許可權是基於通道、通道編碼或資料分類來設置的。The method for processing transactions through external nodes of the blockchain as described in claim 1, wherein the first data transaction permission and the second data transaction permission are set based on the channel, channel code, or data classification. 如請求項2所述之透過區塊鏈外部節點處理交易之方法,其特徵在於,當基於上述通道來設置上述第一資料交易許可權及上述第二資料交易許可權時,上述內部節點基於第一通道來連接,上述外部節點基於第二通道來連接,上述第一通道和上述第二通道單獨分離來生成單獨的區塊鏈。The method for processing transactions through a blockchain external node as described in claim 2, wherein when the first data transaction permission and the second data transaction permission are set based on the channel, the internal node is based on the first One channel is used to connect, the external nodes are connected based on the second channel, and the first channel and the second channel are separated separately to generate a separate blockchain. 如請求項3所述之透過區塊鏈外部節點處理交易之方法,其特徵在於,當基於上述鏈碼設置上述第一資料交易許可權及上述第二資料交易許可權時,上述內部節點設置第一鏈碼,上述外部節點設置第二鏈碼,上述內部節點處理與上述第一鏈碼有關的資料,上述外部節點處理與上述第二鏈碼有關的資料,上述第一鏈碼包含上述第二鏈碼的功能。The method for processing transactions through a blockchain external node as described in claim 3, characterized in that, when the first data transaction permission and the second data transaction permission are set based on the chain code, the internal node sets the A chain code, the external node sets a second chain code, the internal node processes data related to the first chain code, the external node processes data related to the second chain code, the first chain code includes the second chain code The function of the chain code. 一種在區塊鏈上通過外部節點處理交易的設置節點,其特徵在於,包括: 通信部,用於與外部節點進行通信;以及 處理器,與上述通信部可操作地連接, 上述處理器設置內部節點和外部節點, 在上述內部節點設置第一資料交易許可權, 在上述外部節點設置第二資料交易許可權, 上述第一資料交易許可權設置於上述內部節點,並且是在區塊鏈網路上的操作許可權, 上述第二資料交易許可權設置於上述外部節點,並且是在上述區塊鏈網路上的操作許可權。A setting node for processing transactions through external nodes on the blockchain, which is characterized in that it includes: The communication part is used to communicate with external nodes; and The processor is operatively connected to the aforementioned communication unit, The above processor sets internal nodes and external nodes, Set the first data transaction permission on the above internal nodes, Set up the second data transaction permission on the above external node, The above-mentioned first data transaction permission is set at the above-mentioned internal node, and is the operation permission right on the blockchain network, The second data transaction permission is set at the external node, and is an operation permission on the blockchain network. 如請求項5所述之在區塊鏈上通過外部節點處理交易的設置節點,其特徵在於,上述第一資料交易許可權及上述第二資料交易許可權分別是基於通道、通道編碼或資料分類來設置的。The setting node for processing transactions through external nodes on the blockchain as described in claim 5 is characterized in that the first data transaction permission and the second data transaction permission are based on channel, channel code, or data classification, respectively To set it up. 如請求項6所述之在區塊鏈上通過外部節點處理交易的設置節點,其特徵在於,當基於上述通道來設置上述第一資料交易許可權及上述第二資料交易許可權時,上述內部節點基於第一通道來連接,上述外部節點基於第二通道來連接,上述第一通道和上述第二通道單獨分離來生成單獨的區塊鏈。The setting node for processing transactions on the blockchain through an external node as described in claim 6, characterized in that when the first data transaction permission and the second data transaction permission are set based on the channel, the internal The nodes are connected based on the first channel, the external nodes are connected based on the second channel, and the first channel and the second channel are separately separated to generate a separate blockchain. 如請求項7所述之在區塊鏈上通過外部節點處理交易的設置節點,其特徵在於,當基於上述鏈碼設置上述第一資料交易許可權及上述第二資料交易許可權時,上述內部節點設置第一鏈碼,上述外部節點設置第二鏈碼,上述內部節點處理與上述第一鏈碼有關的資料,上述外部節點處理與上述第二鏈碼有關的資料,上述第一鏈碼包含上述第二鏈碼的功能。The setting node for processing transactions on the blockchain through external nodes as described in claim 7, characterized in that, when the first data transaction permission and the second data transaction permission are set based on the chain code, the internal The node sets a first chain code, the external node sets a second chain code, the internal node processes data related to the first chain code, and the external node processes data related to the second chain code. The first chain code includes The function of the above second chain code.
TW109101796A 2019-01-25 2020-01-17 Method for processing transaction via external node on blockchain and apparatus for performing the method TWI724758B (en)

Applications Claiming Priority (4)

Application Number Priority Date Filing Date Title
KR20190009541 2019-01-25
KR10-2019-0009541 2019-01-25
KR10-2019-0036276 2019-03-28
KR1020190036276A KR102121147B1 (en) 2019-01-25 2019-03-28 Method for processing transaction via external node on blockchain and apparatus for performing the method

Publications (2)

Publication Number Publication Date
TW202032479A true TW202032479A (en) 2020-09-01
TWI724758B TWI724758B (en) 2021-04-11

Family

ID=71088220

Family Applications (1)

Application Number Title Priority Date Filing Date
TW109101796A TWI724758B (en) 2019-01-25 2020-01-17 Method for processing transaction via external node on blockchain and apparatus for performing the method

Country Status (4)

Country Link
KR (2) KR102121147B1 (en)
SG (1) SG11202008083QA (en)
TW (1) TWI724758B (en)
WO (1) WO2020153580A1 (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102241940B1 (en) * 2020-11-30 2021-04-20 주식회사 한국정보보호경영연구소 Apparatus and Method for Application Software extension based on Blockchain
KR102389969B1 (en) * 2021-11-12 2022-04-25 주식회사 블록오디세이 Method for information management based on encryption QR(quick response) code and blockchain and apparatus for performing the method

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101874081B1 (en) * 2012-06-07 2018-07-03 에스케이테크엑스 주식회사 Cloud Service Supporting Method And System based on a Enhanced Security
BR112018016782A2 (en) * 2016-02-23 2018-12-26 Nchain Holdings Ltd computer-implemented system and method configured to control a blockchain transfer
WO2018090331A1 (en) * 2016-11-18 2018-05-24 深圳前海达闼云端智能科技有限公司 Blockchain network, article transaction method and apparatus, and node device
JP2018136626A (en) * 2017-02-20 2018-08-30 Kddi株式会社 Access control apparatus, access control method and access control program
KR102382127B1 (en) * 2017-04-05 2022-04-04 삼성에스디에스 주식회사 System for processing data based on blockchain and Operating method thereof
US11095432B2 (en) * 2017-04-05 2021-08-17 Samsung Sds Co., Ltd. System for processing data based on blockchain and operating method thereof
TWM561279U (en) * 2018-02-12 2018-06-01 林俊良 Blockchain system and node server for processing strategy model scripts of financial assets
CN109242681B (en) * 2018-08-21 2020-11-20 京东数字科技控股有限公司 Asset data storage method, device, equipment and system

Also Published As

Publication number Publication date
KR20200093475A (en) 2020-08-05
KR102121147B1 (en) 2020-06-12
SG11202008083QA (en) 2020-09-29
TWI724758B (en) 2021-04-11
WO2020153580A1 (en) 2020-07-30

Similar Documents

Publication Publication Date Title
Benisi et al. Blockchain-based decentralized storage networks: A survey
EP3491572B1 (en) Method for controlling access to a shared resource
US11164165B1 (en) Multi-asset blockchain network platform
CN110275891B (en) Artificial intelligence software market
CN111143872A (en) System and apparatus for data confidentiality in distributed ledgers
Hu et al. Parking management: A blockchain-based privacy-preserving system
Khalid et al. A comprehensive survey on blockchain-based decentralized storage networks
CN113255005A (en) Block chain-based data asset transfer method, device and equipment
JP2023524659A (en) Low-trust privileged access management
CN113779617B (en) State channel-based federal learning task credible supervision and scheduling method and device
Xu et al. PPM: a provenance-provided data sharing model for open banking via blockchain
Kwame et al. V-chain: A blockchain-based car lease platform
TWI724758B (en) Method for processing transaction via external node on blockchain and apparatus for performing the method
Shen et al. SecDM: Securing data migration between cloud storage systems
CN113420320A (en) Block chain authority management method and system under data sharing scene
CN115705571A (en) Protecting privacy of auditable accounts
Jamal et al. Enhanced bring your own device (BYOD) environment security based on blockchain technology
Košt'ál Multi-chain architecture for blockchain networks
US20240080191A1 (en) Collaborative computation across blockchain networks
Ghani et al. Cloud storage architecture: research challenges and opportunities
CN114239043A (en) Shared encryption storage system constructed based on block chain technology
JP2022088326A (en) Method of selectively updating world state database in block chain network, system therefor, and computer program therefor
Rech et al. A decentralized service-platform towards cross-domain entitlement handling
CN118521312A (en) Computer-implemented system and method for out-of-chain exchange of distributed ledger-related transactions
Benaich et al. Securing Big Data-Based Smart Applications Using Blockchain Technology

Legal Events

Date Code Title Description
MM4A Annulment or lapse of patent due to non-payment of fees