TW202032479A - Method for processing transaction via external node on blockchain and apparatus for performing the method - Google Patents
Method for processing transaction via external node on blockchain and apparatus for performing the method Download PDFInfo
- Publication number
- TW202032479A TW202032479A TW109101796A TW109101796A TW202032479A TW 202032479 A TW202032479 A TW 202032479A TW 109101796 A TW109101796 A TW 109101796A TW 109101796 A TW109101796 A TW 109101796A TW 202032479 A TW202032479 A TW 202032479A
- Authority
- TW
- Taiwan
- Prior art keywords
- node
- data
- external
- channel
- nodes
- Prior art date
Links
- 238000000034 method Methods 0.000 title claims abstract description 64
- 238000004891 communication Methods 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 12
- 238000000926 separation method Methods 0.000 description 6
- 230000006870 function Effects 0.000 description 3
- UEUIKXVPXLWUDU-UHFFFAOYSA-N 4-diazoniobenzenesulfonate Chemical compound [O-]S(=O)(=O)C1=CC=C([N+]#N)C=C1 UEUIKXVPXLWUDU-UHFFFAOYSA-N 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
- G06Q30/0607—Regulated
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Computer Security & Cryptography (AREA)
- Marketing (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
Description
本發明涉及透過區塊鏈外部節點處理交易之方法以及執行該方法的裝置。更加詳細地,涉及通過在外部節點設置規定許可權來可在區塊鏈網路上進行有限操作的方法及裝置。The invention relates to a method for processing transactions through external nodes of a blockchain and a device for executing the method. In more detail, it relates to a method and device that can perform limited operations on a blockchain network by setting prescribed permissions on external nodes.
區塊鏈可以是對在公共網路(public network)或私人網路絡(private network)中產生的交易資訊進行加密來在網路成員之間共用的數位分類帳(ledger)。Blockchain can be a digital ledger that encrypts transaction information generated in a public network or a private network to be shared among network members.
將交易分類帳的副本分發(distributed)給每個網路成員,從而每當發生新交易時,可在成員的同意下對相應交易進行認證步驟。A copy of the transaction ledger is distributed to each network member, so that whenever a new transaction occurs, the corresponding transaction can be authenticated with the member's consent.
基於區塊鏈的交易資訊無法任意更改,因而增加了交易的可靠性並易於跟蹤資訊。尤其在金融服務領域,正在努力應用區塊鏈技術來提高業務效率並建立新的服務基礎。Blockchain-based transaction information cannot be changed arbitrarily, thus increasing the reliability of transactions and making it easier to track information. Especially in the field of financial services, efforts are being made to apply blockchain technology to improve business efficiency and establish a new service foundation.
通過分散式分類帳系統進行透明交易,可以節約安全、監督、監管成本。區塊鏈不僅可以應用於金融領域,而且可以應用於物流、流通甚至政府公共行政服務。Transparent transactions through a distributed ledger system can save security, supervision, and supervision costs. Blockchain can be used not only in the financial field, but also in logistics, circulation and even government public administrative services.
諸如現有比特幣之類的公共區塊鏈網路(public blockchain network)中,參與節點可具有相同的許可權來在區塊鏈網路上進行操作,但在專用區塊鏈網路(private blockchain network)或許可式區塊鏈網路(permissioned blockchain network)的情況下,按節點設置差別許可權來可在區塊鏈內進行操作。In a public blockchain network such as the existing Bitcoin, participating nodes can have the same permission to operate on the blockchain network, but in a private blockchain network (private blockchain network) ) Or permissioned blockchain network (permissioned blockchain network), you can operate in the blockchain by setting different permissions per node.
因此,需要研究一種用於在區塊鏈網路上設置差別(或有限)許可權來進行操作的方法。Therefore, it is necessary to study a method for setting differential (or limited) permissions to operate on the blockchain network.
本發明的目的在於,解決上述所有問題。The purpose of the present invention is to solve all the above-mentioned problems.
並且,本發明的目的在於,通過在外部節點設置規定許可權來可在區塊鏈網路上進行有限操作。In addition, the purpose of the present invention is to allow limited operations on the blockchain network by setting prescribed permissions on external nodes.
並且,本發明的目的在於,可在區塊鏈網路上利用通道、通道編碼、資料分類等來分層限制對節點的存取權限。In addition, the purpose of the present invention is to use channels, channel coding, data classification, etc. to restrict access rights to nodes in a layered manner on a blockchain network.
對於後述的本發明的詳細說明參照以可實施本發明的特定實施例為例示來示出的附圖。以下將詳細說明這種實施例,以使本發明所屬技術領域的普通技術人員可以實施本發明。本發明的多種實施例雖然互不相同,但是相互沒有排他性。例如,在本說明書中記載的特定形狀、結構及特性可在不超出本發明的思想和範圍的情況下從一實施例變更為其他實施例。並且,各個實施例或個別結構要素的位置或配置也可以在不超出本發明的思想和範圍的情況下變更。因此,後述的詳細說明並不用於限定本發明,本發明的範圍應理解為包括與發明要求保護範圍中的請求項所申請的範圍及等同的所有範圍。圖中,相似的附圖標記在多個方面表示相同或相似的結構要素。For the detailed description of the present invention to be described later, reference is made to the drawings showing specific embodiments in which the present invention can be implemented as examples. This embodiment will be described in detail below, so that those of ordinary skill in the art to which the present invention belongs can implement the present invention. Although the various embodiments of the present invention are different from each other, they are not mutually exclusive. For example, the specific shapes, structures, and characteristics described in this specification can be changed from one embodiment to other embodiments without departing from the spirit and scope of the present invention. In addition, the position or arrangement of each embodiment or individual structural elements may also be changed without departing from the spirit and scope of the present invention. Therefore, the following detailed description is not intended to limit the present invention, and the scope of the present invention should be understood to include the scope of the claims in the protection scope of the invention and all equivalent scopes. In the figures, similar reference numerals denote the same or similar structural elements in many aspects.
以下,參照附圖,詳細說明本發明的多個優選實施例,以使本發明所屬技術領域的普通技術人員可以輕鬆實施本發明。Hereinafter, with reference to the accompanying drawings, a number of preferred embodiments of the present invention will be described in detail, so that those skilled in the art to which the present invention belongs can easily implement the present invention.
以下,本發明的實施例中公開按節點設置區塊鏈網路上的許可權來可使特定節點在區塊鏈網路上有限地訪問的方法。Hereinafter, the embodiment of the present invention discloses a method of setting permissions on the blockchain network by node to allow a specific node to have limited access on the blockchain network.
以下在本發明的實施例公開的數位資產支援證券可以是以支援(backed)資產(asset)的方式發行並且可在諸如區塊鏈之類的網路上進行交易的數位證券。以下,數位資產支援證券用術語DABS來表示,DABS可以被廣義地解釋為包含可以在諸如區塊鏈之類的網路上以規定價值進行交易的多種手段。The following digital asset-backed securities disclosed in the embodiments of the present invention may be digital securities that are issued in a backed manner and can be traded on a network such as a blockchain. In the following, digital asset-backed securities are represented by the term DABS. DABS can be broadly interpreted as including a variety of methods that can be traded at a prescribed value on networks such as blockchain.
圖1為示出本發明實施例透過區塊鏈外部節點處理交易之方法的概念圖。FIG. 1 is a conceptual diagram showing a method for processing transactions through external nodes of the blockchain according to an embodiment of the present invention.
圖1公開用於通過設置節點的許可權來差別設置資料交易許可權的方法。資料交易許可權能夠以包含對區塊鏈上的特定資料的訪問/處理(讀、寫等)許可權、對區塊鏈網路上的特定過程的請求許可權等的含義來使用。Figure 1 discloses a method for differentially setting data transaction permissions by setting node permissions. Data transaction permission can be used in the meaning including permission to access/process (read, write, etc.) specific data on the blockchain, request permission to a specific process on the blockchain network, etc.
本發明公開用於通過在外部節點的區塊鏈網路上設置資料交易許可權來將在區塊鏈網路上的資料交易許可權有限地提供給外部節點的區塊鏈網路結構。通過這種方法,還可向外部節點賦予用於在區塊鏈網路上進行操作的一些許可權。The present invention discloses a blockchain network structure for providing data transaction permission on the blockchain network to external nodes limitedly by setting data transaction permission on the blockchain network of the external node. In this way, external nodes can also be granted some permissions for operations on the blockchain network.
參照圖1,區塊鏈網路可以包含節點,節點可以是構成區塊鏈網路的伺服器單元。區塊鏈網路內的節點之間可通過通道來連接。多個節點可通過相同的通道或不同的通道來連接,只有屬於相同通道的節點之間才能夠進行通信,並且,一個節點可具有多個通道。Referring to Figure 1, a blockchain network may include nodes, and nodes may be server units constituting the blockchain network. The nodes in the blockchain network can be connected through channels. Multiple nodes can be connected through the same channel or different channels, only nodes belonging to the same channel can communicate with each other, and one node can have multiple channels.
例如,(節點1 110、節點2 120、節點3 130)可通過第一通道160進行通信,(節點3 130、節點4 140、節點5 150)可通過第二通道170進行通信。節點1 110、節點2 120、節點3 130之間可通過第一通道160進行通信,節點3 130、節點4 140、節點5 150之間可通過第二通道170進行通信。節點3 130可在第一通道160及第二通道170上具有資料交易許可權。節點1 110及節點2 120可在第一通道160上具有資料交易許可權。節點4 140及節點5 150可在第二通道170上具有資料交易許可權。每個通道可以生成單獨的區塊及區塊鏈。根據需要,可通過運行單獨的通道來生成單獨的區塊鏈。For example, (node 1 110, node 2 120, node 3 130) can communicate through the
在節點可以設置有鏈碼,基於設置在節點的鏈碼來確定可以由節點處理的交易。例如,在通過第一通道160連接的節點1 110、節點2 120中,在節點1 110設置有鏈碼A、鏈碼B,在節點2 120可以設置有鏈碼A。A chain code can be set at the node, and the transaction that can be processed by the node is determined based on the chain code set at the node. For example, in the node 1 110 and the node 2 120 connected through the
在此情況下,節點1 110可以處理與鏈碼A和鏈碼B有關的交易,節點2 120僅可以處理與鏈碼A有關的交易。鏈碼可通過不同的版本來更新,附屬於特定鏈碼的資料僅可在設置有相應鏈碼的節點共用。In this case, node 1 110 can process transactions related to chain code A and chain code B, and node 2 120 can only process transactions related to chain code A. The chain code can be updated through different versions, and the data attached to a specific chain code can only be shared among the nodes with the corresponding chain code.
並且,根據本發明的實施例,可通過劃分資料來按節點限制資料交易許可權。資料可分為公共資料(public data)和專用資料(private data)。在特定通道上設置特定鏈碼的節點可以具有對公共資料的資料交易許可權。在特定通道上設置特定鏈碼的節點中,只有被賦予對專用資料的單獨存取權限的節點才能夠具有對專用資料的資料交易許可權。In addition, according to the embodiment of the present invention, the data transaction permission can be restricted by node by dividing the data. Data can be divided into public data (public data) and private data (private data). A node that sets a specific chain code on a specific channel can have the permission to trade public materials. Among the nodes with a specific chain code set on a specific channel, only those nodes that have been given individual access rights to the special data can have the data transaction permission for the special data.
即,根據本發明的實施例,可以基於通道、通道編碼、資料分類來設置節點的資料交易許可權。具體地,可以按通道、通道編碼、資料分類的順序限制節點的資料交易許可權。That is, according to the embodiment of the present invention, the data transaction permission of the node can be set based on the channel, the channel code, and the data classification. Specifically, the data transaction permission rights of nodes can be restricted in the order of channel, channel code, and data classification.
為了具有針對通道內的資料交易許可權,必須是屬於通道的節點。並且,為了具有針對通道內的資料中的與鏈碼有關的資料交易許可權,必須是設置有特定鏈碼的節點。並且,為了具有針對與特定通道的特定鏈碼有關的資料中的被分為專用的資料交易許可權,必須是可以訪問專用資料的節點。In order to have permission for data transactions in the channel, it must be a node belonging to the channel. In addition, in order to have the permission to trade data related to the chain code in the data in the channel, it must be a node with a specific chain code. In addition, in order to have the permission for data transactions that are classified as dedicated data among the data related to the specific chain code of the specific channel, it must be a node that can access the dedicated data.
在通道單位的節點、通道內的鏈碼單位的節點、鏈碼單位內,能夠以特定的節點單位設置資料交易許可權。In the node of the channel unit, the node of the chain code unit in the channel, and the chain code unit, the data transaction permission can be set in a specific node unit.
當在特定通道中共用的資料發生交易時,可在具有對相應資料的資料交易許可權的通道內的所有節點上發生與因交易引起的資料變化有關的事件。When the data shared in a specific channel is transacted, events related to data changes caused by the transaction can occur on all nodes in the channel that have the data transaction permission for the corresponding data.
並且,當在特定通道內的特定鏈碼中共用的資料發生交易時,可在具有對相應資料的資料交易許可權的特定通道內的設置有特定鏈碼的節點上發生與因交易引起的資料變化有關的事件。In addition, when the data shared in the specific chain code in a specific channel is traded, the data caused by the transaction can be generated on the node with the specific chain code in the specific channel that has the data transaction permission for the corresponding data. Change related events.
同樣,當在特定通道內的特定鏈碼中共用的專用資料發生交易時,在具有對相應專用資料的資料交易許可權的特定通道內的設置有特定鏈碼的節點中,可在具有對專用資料的許可權的節點上發生與資料變化有關的事件。Similarly, when special data shared in a specific chain code in a specific channel is traded, the nodes with a specific chain code in the specific channel that have the data transaction permission for the corresponding special data can be An event related to the data change occurs on the node of the permission of the data.
以下,本發明的實施例公開通過設置這種分層限制資料連接(或共用)許可權的外部節點來處理交易的方法。Hereinafter, the embodiments of the present invention disclose a method of processing transactions by setting up such external nodes that restrict data connection (or sharing) permissions in a layered manner.
在本發明的實施例中,為了便於說明,基於與資產的交易有關的交易來進行說明,但與並非為資產交易的其他資訊有關的交易也包含在本發明的權利範圍之內。In the embodiments of the present invention, for ease of description, the description is based on transactions related to transactions of assets, but transactions related to other information that are not asset transactions are also included in the scope of rights of the present invention.
圖2為示出本發明實施例的處理因外部節點而發生的交易的方法的概念圖。FIG. 2 is a conceptual diagram showing a method of processing transactions that occur due to external nodes according to an embodiment of the present invention.
圖2公開基於設置交易許可權來處理因外部節點而發生的交易的方法。Figure 2 discloses a method of processing transactions that occur due to external nodes based on setting transaction permissions.
參照圖2,區塊鏈網路上的節點可分為內部節點200和外部節點210, 220。外部節點210、220和內部節點200可具有不同的資料交易許可權。內部節點200可以是在區塊鏈網路上具有第一資料交易許可權250的節點、外部節點210、220可以是在區塊鏈網路上具有第二資料交易許可權260的節點。Referring to FIG. 2, nodes on the blockchain network can be divided into
第一資料交易許可權250可以是比第二資料交易許可權260相對寬的(或上級)許可權,可通過第一資料交易許可權250訪問和/或處理的資料中的一部分可能無法通過第二資料交易許可權260訪問和/或處理。The first data transaction permission right 250 may be a relatively wider (or superior) permission right than the second data transaction permission right 260. Some of the data that can be accessed and/or processed through the first data transaction permission right 250 may not pass the second data transaction permission right. 2.
可以假設內部節點200、第一外部節點210及第二外部節點220位於區塊鏈網路上的情況。內部節點200可具有第一資料交易許可權250,第一外部節點210及第二外部節點220可具有第二資料交易許可權260。第一資料交易許可權250可以是比第二資料交易許可權260相對上級別的許可權。It can be assumed that the
例如,第二資料交易許可權260可以包含生成交易請求資料並與具有相同或上級別資料交易許可權的其他節點共用交易請求資料的資料交易許可權。第一資料交易許可權250不僅包含生成交易請求資料並與具有相同或上級別資料交易許可權的其他節點共用交易請求資料的資料交易許可權,而且可以包含處理交易請求資料,判斷有效性,並可變更資產資訊的資料交易許可權。For example, the second data transaction permission right 260 may include the data transaction permission right for generating transaction request data and sharing the transaction request data with other nodes having the same or higher level data transaction permission. The first
內部節點200、第一外部節點210或第二外部節點220可以根據第一資料交易許可權250產生用於生成並共用交易請求資料的交易。例如,當具有第一資料交易許可權250的第一外部節點210生成交易請求資料時,具有相同的第一資料交易許可權250的第二外部節點220及內部節點200也可共用由第一外部節點210生成的交易請求資料。The
內部節點200可以基於第一資料交易許可權250處理交易請求資料,判斷有效性,並變更資產資訊。內部節點200使用交易引擎來判斷交易請求資料的有效性,並且在有效交易請求的情況下,可以執行對個人資產的變更處理。The
作為具體例,第一外部節點210基於第二資料交易許可權260來生成用於購買在交易所交易的特定數位資產支援證券的交易請求資料,並且可與第二外部節點220及內部節點200共用上述資料。第一外部節點210可以是諸如外部信差服務節點、外部金融服務節點之類的單獨服務提供者的節點。As a specific example, the first
即,提供單獨服務的節點被賦予作為可以請求對數位資產支援證券的交易的許可權的第一資料交易許可權250,從而即使不直接通過交易所,也可在信差服務或單獨的金融服務中請求對數位資產支援證券的交易,數位資產支援證券交易服務還可在其他現有服務中提供。That is, the node that provides the separate service is given the first
由第一外部節點210生成的交易請求資料可以在第二外部節點220及內部節點200共用。內部節點200可以是交易所節點,交易所節點基於共用的交易請求資料來進行對數位資產支援證券的交易,並且可將數位資產支援證券交易的結果反映到資產明細中。The transaction request data generated by the first
即,向外部節點210、220賦予可產生交易請求資料的許可權,使用者還可在外部服務中請求對數位資產支援證券的交易,並處理所請求的數位資產支援證券交易。使用者也可通過信差服務進行數位資產支援證券的交易,而無需直接連接交易所節點。That is, the
為了便於說明,圖2中公開了與數位資產支援證券的交易有關的交易,但除了數位資產支援證券的交易之外,有關多種目的的其他交易,也通過在特定外部節點210、220設置有限的資料交易許可權,從而也可在外部節點210、220利用基於區塊鏈的服務。For ease of explanation, Figure 2 discloses transactions related to the transaction of digital asset-backed securities, but in addition to transactions of digital asset-backed securities, other transactions related to multiple purposes are also set up in specific
為了在這種外部節點210、220設置有限的資料交易許可權,可以使用多種方法。以下,本發明的實施例中作為用於在外部節點210、220設置有限的資料交易許可權的方法,具體公開l)資料分類方法、2)鏈碼設置方法、3)通道分類方法。In order to set limited data transaction permissions on such
圖3為示出本發明實施例的用於在外部節點設置有限的資料交易許可權的方法的概念圖。Fig. 3 is a conceptual diagram showing a method for setting a limited data transaction permission on an external node according to an embodiment of the present invention.
圖3示出基於資料分類在外部節點設置有限的資料交易許可權的方法。Figure 3 shows a method of setting limited data transaction permission on external nodes based on data classification.
參照圖3,當相同的通道、相同的鏈碼設置於內部節點300和外部節點320時,可以通過諸如第一資料(例如,公共資料)、第二資料(例如,專用資料)之類的資料分類來限制對相應資料的資料交易許可權。可以通過向資料賦予單獨的識別字或對資料進行單獨的加密來對資料進行分類。3, when the same channel and the same chain code are set on the
內部節點300可以被設置為具有對第一資料及第二資料的資料交易許可權,外部節點320可以被設置為具有對第一資料的資料交易許可權。在此情況下,內部節點300可通過生成與第一資料及第二資料有關的交易來處理第一資料及第二資料,外部節點320可以生成與第一資料有關的交易來處理第一資料。The
可以假設第一資料為交易請求資料,第二資料為資產管理資料的情況。在此情況下,外部節點320可以生成與交易請求資料有關的交易來與內部節點300共用,內部節點300處理交易請求資料,並且生成與用於管理資產的資產管理資料有關的交易來進行處理。It can be assumed that the first data is transaction request data and the second data is asset management data. In this case, the external node 320 may generate transactions related to the transaction request data to be shared with the
基於這種資料的分類,即使使用相同的通道、相同的鏈碼,也設置不同的資料交易許可權,從而在外部節點320也可利用由內部節點300提供的基於區塊鏈的服務中的一些服務。Based on this data classification, even if the same channel and the same chain code are used, different data transaction permissions are set, so that the external node 320 can also use some of the blockchain-based services provided by the
圖4為本發明實施例的用於在外部節點設置有限的資料交易許可權的方法的概念圖。Fig. 4 is a conceptual diagram of a method for setting a limited data transaction permission on an external node according to an embodiment of the present invention.
圖4公開通過設置鏈碼來在外部節點設置有限的資料交易許可權的方法。Figure 4 discloses a method of setting limited data transaction permissions on external nodes by setting chain codes.
參照圖4,在內部節點400可以設置有第一鏈碼,在外部節點420可以設置有第二鏈碼。4, the internal node 400 may be provided with a first chain code, and the external node 420 may be provided with a second chain code.
可以基於第一鏈碼來賦予針對交易請求交易及資產管理交易的資料交易許可權,可以基於第二鏈碼賦予針對交易請求交易的資料交易許可權。The data transaction permission for transaction request transactions and asset management transactions can be granted based on the first chain code, and the data transaction permission for transaction request transactions can be granted based on the second chain code.
因此,設置有第二鏈碼的外部節點420可以產生交易請求交易,設置有第一鏈碼的內部節點400可以驗證交易請求交易的有效性,並基於交易請求交易產生資產管理交易來改變資產。Therefore, the external node 420 with the second chain code can generate a transaction request transaction, and the internal node 400 with the first chain code can verify the validity of the transaction request transaction, and generate an asset management transaction based on the transaction request transaction to change assets.
基於設置這種鏈碼的節點的分類,通過相同通道連接的多個節點能夠以差別的資料交易許可權進行操作,外部節點420也可利用由內部節點400提供的基於區塊鏈的服務中的一些服務。Based on the classification of the nodes that set this chain code, multiple nodes connected through the same channel can operate with different data transaction permissions. The external node 420 can also use the blockchain-based services provided by the internal node 400 Some services.
圖5為示出本發明實施例的用於在外部節點設置有限的資料交易許可權的方法的概念圖。Fig. 5 is a conceptual diagram showing a method for setting a limited data transaction permission on an external node according to an embodiment of the present invention.
圖5公開基於通道分類在外部節點設置有限的資料交易許可權的方法。Figure 5 discloses a method for setting limited data transaction permissions on external nodes based on channel classification.
參照圖5,可通過劃分第一通道及第二通道來在內部節點500和外部節點520設置不同的資料交易許可權。Referring to FIG. 5, the
內部節點500可以被設置為可通過第一通道和第二通道進行通信,外部節點520可以被設置為僅可以通過第二通道進行通信。The
外部節點520可使用第二通道來共用交易請求資料,內部節點500可通過第二通道確認交易請求資料。內部節點500可以基於通過第二通道確認的交易請求資料來在第一通道上生成交易資產管理資料並進行處理。The
通過這種方法,也可通過外部節點520生成交易請求資料並向內部節點500傳遞,從而處理交易請求資料。In this way, the transaction request data can also be generated by the
圖6公開本發明實施例的分層設置外部節點的方法。Fig. 6 discloses a method for hierarchically setting external nodes according to an embodiment of the present invention.
圖6公開基於內部節點設置第一層外部節點、第二層外部節點、第三層外部節點的方法。Fig. 6 discloses a method of setting first-level external nodes, second-level external nodes, and third-level external nodes based on internal nodes.
參照圖6,內部節點、第一層外部節點及第二層外部節點可通過第一通道連接,第三層外部節點可通過第二通道連接。由此,第三層外部節點可與內部節點、第一層外部節點、第二層外部節點分離,第三層外部節點可在區塊鏈網路上執行有限的操作。Referring to FIG. 6, internal nodes, first-level external nodes, and second-level external nodes may be connected through a first channel, and third-level external nodes may be connected through a second channel. Thus, the third-tier external nodes can be separated from the internal nodes, the first-tier external nodes, and the second-tier external nodes, and the third-tier external nodes can perform limited operations on the blockchain network.
然後,可在內部節點、第一層外部節點、第二層外部節點中的內部節點、第一層外部節點設置有通道編碼A,可在第二層外部節點設置有通道編碼B。設置有通道編碼A的內部節點、第一層外部節點可以共用與通道編碼A有關的資料,但設置有通道編碼B的第二層外部節點可以共用與通道編碼B有關的資料。由此,第二層外部節點可與內部節點、第一層外部節點分離,第二層外部節點可在區塊鏈網路上執行有限的操作。Then, the channel code A can be set on the internal nodes, the first layer external nodes, the internal nodes of the second layer external nodes, and the first layer external nodes, and the channel code B can be set on the second layer external nodes. The internal nodes with channel code A and the first-level external nodes can share data related to channel code A, but the second-tier external nodes with channel code B can share data related to channel code B. Thus, the second-tier external nodes can be separated from the internal nodes and the first-tier external nodes, and the second-tier external nodes can perform limited operations on the blockchain network.
然後,可將專用資料設置為僅可使內部節點、第一層外部節點中的內部節點訪問。在此情況下,專用資料僅可以由內部節點訪問,第一層外部節點可能無法訪問。由此,內部節點與第一層外部節點可以分離,第一層外部節點可在區塊鏈網路上執行有限的操作。Then, the dedicated data can be set so that only the internal nodes in the internal nodes and the first-tier external nodes can be accessed. In this case, the dedicated data can only be accessed by internal nodes, and the external nodes on the first level may not be accessible. As a result, internal nodes can be separated from the first-level external nodes, and the first-level external nodes can perform limited operations on the blockchain network.
本發明實施例的按節點的許可權設置可由設置節點執行。設置節點可以包括:通信部,用於與外部節點進行通信;以及處理器,與通信部可操作地(operatively)連接。處理器可以執行按節點設置許可權的方法。The permission setting per node in the embodiment of the present invention can be performed by the setting node. The setting node may include: a communication part for communicating with an external node; and a processor operatively connected with the communication part. The processor can execute a method of setting permissions per node.
本發明實施例的透過區塊鏈外部節點處理交易之方法可包括:設置節點設置內部節點和外部節點的步驟;設置節點在內部節點設置第一資料交易許可權的步驟;以及設置節點在外部節點設置第二資料交易許可權的步驟,第一資料交易許可權設置於內部節點,並且可以是在區塊鏈網路上的操作許可權,第二資料交易許可權設置於外部節點,並且可以是在區塊鏈網路上的操作許可權。如上所述,第一資料交易許可權及上述第二資料交易許可權可以基於通道、通道編碼或資料分類來設置。The method for processing transactions through the external nodes of the blockchain in the embodiment of the present invention may include: the steps of setting the nodes to set internal nodes and external nodes; the steps of setting the nodes to set the first data transaction permission on the internal nodes; and the steps of setting the nodes to the external nodes In the step of setting the second data transaction permission, the first data transaction permission is set on the internal node, and can be the operation permission on the blockchain network, and the second data transaction permission is set on the external node, and can be Operation permission on the blockchain network. As described above, the first data transaction permission and the aforementioned second data transaction permission can be set based on channel, channel code, or data classification.
當基於通道來設置第一資料交易許可權及第二資料交易許可權時,內部節點基於第一通道來連接,外部節點基於第二通道來連接,第一通道和第二通道可單獨分離來生成單獨的區塊鏈。When the first data transaction permission and the second data transaction permission are set based on the channel, the internal nodes are connected based on the first channel, and the external nodes are connected based on the second channel. The first channel and the second channel can be generated separately Separate blockchain.
當基於鏈碼設置第一資料交易許可權及第二資料交易許可權時,內部節點設置第一鏈碼,外部節點設置第二鏈碼,內部節點處理與第一鏈碼有關的資料,外部節點處理與第二鏈碼有關的資料,第一鏈碼可包含上述第二鏈碼的功能。When the first data transaction permission and the second data transaction permission are set based on the chain code, the internal node sets the first chain code, and the external node sets the second chain code. The internal node processes the data related to the first chain code, and the external node Process data related to the second chain code. The first chain code can include the function of the second chain code.
圖7為示出本發明實施例的通過外部節點的資產交易方法的概念圖。Fig. 7 is a conceptual diagram showing an asset transaction method through an external node according to an embodiment of the present invention.
圖7公開一種假設外部節點為信差服務運營者,並通過外部節點執行對數位資產支援證券的交易的方法。Fig. 7 discloses a method for assuming that an external node is a messenger service operator and performing transactions on digital asset-backed securities through the external node.
參照圖7,為信差服務運營者設置單獨的外部節點,信差服務用戶可通過信使700執行交易。例如,提供可在信使700上交易數位資產支援證券的交易平臺,通過交易平臺,也可在信使700上執行對數位資產支援證券的交易訂單。Referring to FIG. 7, a separate external node is set up for messenger service operators, and messenger service users can execute transactions through messenger 700. For example, it provides a trading platform that can trade digital asset-backed securities on the messenger 700. Through the trading platform, it is also possible to execute trading orders for digital asset-backed securities on the messenger 700.
即,由設置節點設置可在用於信差服務運營者的外部節點生成交易訂單的資料交易許可權,因而無需連接交易所節點720就可生成交易訂單。如上所述,外部節點可以基於通道、通道編碼、資料分類來設置資料交易許可權。That is, the setting node sets the data transaction permission rights that can generate transaction orders on external nodes used for messenger service operators, and thus can generate transaction orders without connecting to the
可向交易所節點720傳遞在信使700上生成的交易訂單,並在交易所節點720處理,從而完成交易。當交易完成時,可通過信使700通知交易的完成。通過這種方法,也可在利用其他服務的過程中通過交易所節點對現有的僅通過連接交易所進行交易的數位資產支援證券進行交易。The transaction order generated on the messenger 700 can be delivered to the
根據本發明的實施例,可通過通道來賦予有限的功能,並且可通過獨立通道的連接以及虛擬通道的連接來限制通道。若將通過相同的通道綁定的多個節點在無其他節點干涉的情況下可以設置為單獨的分離通道,則可作為物理上分離的通道來設置有限功能。例如,若節點A、節點B、節點C作為通道內的節點,可在中間無單獨節點的情況下連接,則可以作為物理分離通道來設置為獨立通道。According to the embodiment of the present invention, limited functions can be given through channels, and channels can be restricted through the connection of independent channels and the connection of virtual channels. If multiple nodes bound through the same channel can be set as separate separate channels without interference from other nodes, they can be used as physically separated channels to set limited functions. For example, if node A, node B, and node C are used as nodes in the channel and can be connected without separate nodes in the middle, they can be set as independent channels as physically separated channels.
但是,當需要以相同通道設置時若通道內節點僅通過中間的通道外節點連接,則在通過通道傳遞的資料的安全性可能發生問題。例如,若節點A、節點B、節點C作為通道內節點只能通過作為中間的通道外節點的節點X連接,則無法設置物理分離通道。在此情況下,根據本發明的實施例,即使在中間包含通道外節點的情況下,也可使用用於設置為獨立通道的一些通道區間資料分離加密方法。However, when it is necessary to use the same channel to set up, if the nodes in the channel are only connected through the nodes outside the channel in the middle, problems may occur in the security of the data transmitted through the channel. For example, if node A, node B, and node C as nodes in the channel can only be connected via node X, which is an intermediate node outside the channel, the physical separation channel cannot be set. In this case, according to the embodiment of the present invention, even in the case where nodes outside the channel are included in the middle, some channel section data separation encryption methods for setting as independent channels can be used.
當需要通過中間的通道外節點傳輸資料時,可將需要通過中間的通道外節點傳輸資料的區間設置為資料分離加密區間,可在資料分離加密區間對資料進行分離加密。具體地,從通道內節點向通道外節點傳遞的資料可以被加密並以旁路類型向下一通道內節點傳遞。在此情況下,在初始加密之後,加密可基於之前傳輸的資料中所包含的加密密匙值來執行,因而可以設置為僅能夠使繼續變化且對之前傳輸的資料進行解碼的通道內節點進行解碼。資料分離加密區間可以設置有多個,分別適用於多個資料分離加密區間的加密密匙值可以互不相同。通過這種方法,即使在通道外節點位於中間的情況下,節點也可通過虛擬的獨立通道來連接。When the data needs to be transmitted through the nodes outside the middle channel, the interval for data transmission through the nodes outside the middle channel can be set as the data separation and encryption interval, and the data can be separated and encrypted in the data separation and encryption interval. Specifically, the data transferred from the node in the channel to the node outside the channel can be encrypted and transferred to the node in the next channel in the bypass type. In this case, after the initial encryption, the encryption can be performed based on the encryption key value contained in the previously transmitted data, so it can be set to enable only the nodes in the channel that continue to change and decode the previously transmitted data. decoding. Multiple data separation encryption intervals can be set, and the encryption key values applicable to multiple data separation encryption intervals can be different from each other. In this way, even when the nodes outside the channel are in the middle, the nodes can be connected through virtual independent channels.
以上描述的本發明的實施例能夠以可以由各種電腦元件執行的程式指令的形式實現並記錄在電腦可讀記錄介質中。該電腦可讀記錄介質可以單獨或組合地包括程式指令、資料檔案、資料結構等。記錄在上述電腦可讀記錄介質的程式指令可以為本發明專門設計和配置,或者可以是被電腦軟體領域的普通技術人員公知並使用的程式指令。電腦可讀記錄介質的示例包括諸如硬碟、軟碟和磁帶之類的磁性介質,諸如CD-ROM和DVD之類的光學記錄介質以及諸如軟式光碟(floptical disk)之類的磁光介質(magneto-optical medium)和諸如ROM、RAM、快閃記憶體之類的專門為了存儲和執行程式指令而配置的硬體裝置。程式指令的示例不僅包括由編譯器生成的機器代碼,而且包括可以由電腦使用解譯器等執行的高階語言代碼。可以通過一個或多個軟體模組來改變硬體裝置以執行根據本發明的處理,反之亦然。The above-described embodiments of the present invention can be implemented in the form of program instructions that can be executed by various computer components and recorded in a computer-readable recording medium. The computer-readable recording medium may include program instructions, data files, data structures, etc., alone or in combination. The program instructions recorded in the computer-readable recording medium may be specially designed and configured for the present invention, or may be program instructions known and used by those of ordinary skill in the computer software field. Examples of computer-readable recording media include magnetic media such as hard disks, floppy disks, and magnetic tapes, optical recording media such as CD-ROMs and DVDs, and magneto-optical media such as floptical disks. -optical medium) and hardware devices specially configured for storing and executing program instructions such as ROM, RAM, and flash memory. Examples of program instructions include not only machine codes generated by a compiler, but also high-level language codes that can be executed by a computer using an interpreter or the like. The hardware device can be changed by one or more software modules to perform the processing according to the present invention, and vice versa.
儘管在上述中通過諸如具體的結構要求之類的特定事項和受限的實施例以及附圖來描述了本發明,但這僅是為了有助於更全面地理解本發明而提供,並且本發明不限於上述實施例。只要是本發明所屬技術領域的普通技術人員就可根據這種記載進行各種修改和變更。Although the present invention has been described in the above through specific matters such as specific structural requirements, limited embodiments, and drawings, this is only provided to help a more comprehensive understanding of the present invention, and the present invention It is not limited to the above embodiment. A person of ordinary skill in the technical field of the present invention can make various modifications and changes based on this description.
因此,本發明的思想不應局限於上述所描述的實施例,除了後述的發明要求保護範圍之外,與發明要求保護範圍等同或由此等效改變的所有範圍也應屬於本發明的思想範疇之內。Therefore, the idea of the present invention should not be limited to the above-described embodiments. In addition to the scope of protection of the invention described below, all ranges equivalent to or equivalently changed from the scope of the invention shall also belong to the scope of the invention. within.
110:節點1 120:節點2 130:節點3 140:節點4 150:節點5 160:第一通道 170:第二通道 200:內部節點 210:外部節點 220:外部節點 250:第一資料交易許可權 260:第二資料交易許可權 300:內部節點 320:外部節點 400:內部節點 420:外部節點 500:內部節點 520:外部節點 600:內部節點 610:第一層外部節點 620:第二層內部節點 630:第三層外部節點 700:信使 720:交易所節點110: node 1 120: Node 2 130: Node 3 140: Node 4 150: Node 5 160: first channel 170: second channel 200: internal node 210: external node 220: external node 250: First data transaction permission 260: Second data transaction permission 300: internal node 320: external node 400: internal node 420: external node 500: internal node 520: external node 600: internal node 610: first-tier external nodes 620: second-tier internal nodes 630: third-tier external nodes 700: messenger 720: Exchange node
圖1為示出本發明實施例的透過區塊鏈外部節點處理交易之方法的概念圖。 圖2為示出本發明實施例的處理因外部節點而發生的交易的方法的概念圖。 圖3為示出本發明實施例的用於在外部節點設置有限的資料交易許可權的方法的概念圖。 圖4為本發明實施例的用於在外部節點設置有限的資料交易許可權的方法的概念圖。 圖5為示出本發明實施例的用於在外部節點設置有限的資料交易許可權的方法的概念圖。 圖6公開本發明實施例的分層設置外部節點的方法。 圖7為示出本發明實施例的通過外部節點的資產交易方法的概念圖。FIG. 1 is a conceptual diagram showing a method for processing transactions through external nodes of a blockchain according to an embodiment of the present invention. FIG. 2 is a conceptual diagram showing a method of processing transactions that occur due to external nodes according to an embodiment of the present invention. Fig. 3 is a conceptual diagram showing a method for setting a limited data transaction permission on an external node according to an embodiment of the present invention. Fig. 4 is a conceptual diagram of a method for setting a limited data transaction permission on an external node according to an embodiment of the present invention. Fig. 5 is a conceptual diagram showing a method for setting a limited data transaction permission on an external node according to an embodiment of the present invention. Fig. 6 discloses a method for hierarchically setting external nodes according to an embodiment of the present invention. Fig. 7 is a conceptual diagram showing an asset transaction method through an external node according to an embodiment of the present invention.
110:節點1 110: node 1
120:節點2 120: Node 2
130:節點3 130: Node 3
140:節點4 140: Node 4
150:節點5 150: Node 5
160:第一通道 160: first channel
170:第二通道 170: second channel
Claims (8)
Applications Claiming Priority (4)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
KR20190009541 | 2019-01-25 | ||
KR10-2019-0009541 | 2019-01-25 | ||
KR10-2019-0036276 | 2019-03-28 | ||
KR1020190036276A KR102121147B1 (en) | 2019-01-25 | 2019-03-28 | Method for processing transaction via external node on blockchain and apparatus for performing the method |
Publications (2)
Publication Number | Publication Date |
---|---|
TW202032479A true TW202032479A (en) | 2020-09-01 |
TWI724758B TWI724758B (en) | 2021-04-11 |
Family
ID=71088220
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
TW109101796A TWI724758B (en) | 2019-01-25 | 2020-01-17 | Method for processing transaction via external node on blockchain and apparatus for performing the method |
Country Status (4)
Country | Link |
---|---|
KR (2) | KR102121147B1 (en) |
SG (1) | SG11202008083QA (en) |
TW (1) | TWI724758B (en) |
WO (1) | WO2020153580A1 (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR102241940B1 (en) * | 2020-11-30 | 2021-04-20 | 주식회사 한국정보보호경영연구소 | Apparatus and Method for Application Software extension based on Blockchain |
KR102389969B1 (en) * | 2021-11-12 | 2022-04-25 | 주식회사 블록오디세이 | Method for information management based on encryption QR(quick response) code and blockchain and apparatus for performing the method |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR101874081B1 (en) * | 2012-06-07 | 2018-07-03 | 에스케이테크엑스 주식회사 | Cloud Service Supporting Method And System based on a Enhanced Security |
BR112018016782A2 (en) * | 2016-02-23 | 2018-12-26 | Nchain Holdings Ltd | computer-implemented system and method configured to control a blockchain transfer |
WO2018090331A1 (en) * | 2016-11-18 | 2018-05-24 | 深圳前海达闼云端智能科技有限公司 | Blockchain network, article transaction method and apparatus, and node device |
JP2018136626A (en) * | 2017-02-20 | 2018-08-30 | Kddi株式会社 | Access control apparatus, access control method and access control program |
KR102382127B1 (en) * | 2017-04-05 | 2022-04-04 | 삼성에스디에스 주식회사 | System for processing data based on blockchain and Operating method thereof |
US11095432B2 (en) * | 2017-04-05 | 2021-08-17 | Samsung Sds Co., Ltd. | System for processing data based on blockchain and operating method thereof |
TWM561279U (en) * | 2018-02-12 | 2018-06-01 | 林俊良 | Blockchain system and node server for processing strategy model scripts of financial assets |
CN109242681B (en) * | 2018-08-21 | 2020-11-20 | 京东数字科技控股有限公司 | Asset data storage method, device, equipment and system |
-
2019
- 2019-03-28 KR KR1020190036276A patent/KR102121147B1/en active IP Right Grant
- 2019-10-31 WO PCT/KR2019/014531 patent/WO2020153580A1/en active Application Filing
- 2019-10-31 SG SG11202008083QA patent/SG11202008083QA/en unknown
-
2020
- 2020-01-17 TW TW109101796A patent/TWI724758B/en not_active IP Right Cessation
- 2020-05-21 KR KR1020200061025A patent/KR20200093475A/en not_active Application Discontinuation
Also Published As
Publication number | Publication date |
---|---|
KR20200093475A (en) | 2020-08-05 |
KR102121147B1 (en) | 2020-06-12 |
SG11202008083QA (en) | 2020-09-29 |
TWI724758B (en) | 2021-04-11 |
WO2020153580A1 (en) | 2020-07-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Benisi et al. | Blockchain-based decentralized storage networks: A survey | |
EP3491572B1 (en) | Method for controlling access to a shared resource | |
US11164165B1 (en) | Multi-asset blockchain network platform | |
CN110275891B (en) | Artificial intelligence software market | |
CN111143872A (en) | System and apparatus for data confidentiality in distributed ledgers | |
Hu et al. | Parking management: A blockchain-based privacy-preserving system | |
Khalid et al. | A comprehensive survey on blockchain-based decentralized storage networks | |
CN113255005A (en) | Block chain-based data asset transfer method, device and equipment | |
JP2023524659A (en) | Low-trust privileged access management | |
CN113779617B (en) | State channel-based federal learning task credible supervision and scheduling method and device | |
Xu et al. | PPM: a provenance-provided data sharing model for open banking via blockchain | |
Kwame et al. | V-chain: A blockchain-based car lease platform | |
TWI724758B (en) | Method for processing transaction via external node on blockchain and apparatus for performing the method | |
Shen et al. | SecDM: Securing data migration between cloud storage systems | |
CN113420320A (en) | Block chain authority management method and system under data sharing scene | |
CN115705571A (en) | Protecting privacy of auditable accounts | |
Jamal et al. | Enhanced bring your own device (BYOD) environment security based on blockchain technology | |
Košt'ál | Multi-chain architecture for blockchain networks | |
US20240080191A1 (en) | Collaborative computation across blockchain networks | |
Ghani et al. | Cloud storage architecture: research challenges and opportunities | |
CN114239043A (en) | Shared encryption storage system constructed based on block chain technology | |
JP2022088326A (en) | Method of selectively updating world state database in block chain network, system therefor, and computer program therefor | |
Rech et al. | A decentralized service-platform towards cross-domain entitlement handling | |
CN118521312A (en) | Computer-implemented system and method for out-of-chain exchange of distributed ledger-related transactions | |
Benaich et al. | Securing Big Data-Based Smart Applications Using Blockchain Technology |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
MM4A | Annulment or lapse of patent due to non-payment of fees |