WO2020061822A1 - Method and system for arbitrating authenticity of data in a blockchain - Google Patents

Method and system for arbitrating authenticity of data in a blockchain Download PDF

Info

Publication number
WO2020061822A1
WO2020061822A1 PCT/CN2018/107625 CN2018107625W WO2020061822A1 WO 2020061822 A1 WO2020061822 A1 WO 2020061822A1 CN 2018107625 W CN2018107625 W CN 2018107625W WO 2020061822 A1 WO2020061822 A1 WO 2020061822A1
Authority
WO
WIPO (PCT)
Prior art keywords
network node
arbitration
data
authenticity
event
Prior art date
Application number
PCT/CN2018/107625
Other languages
French (fr)
Inventor
Chuan Liang
Mengke YANG
Cunsheng LIU
Original Assignee
Beijing Didi Infinity Technology And Development Co., Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Didi Infinity Technology And Development Co., Ltd. filed Critical Beijing Didi Infinity Technology And Development Co., Ltd.
Priority to CN201880002222.3A priority Critical patent/CN111201751B/en
Priority to PCT/CN2018/107625 priority patent/WO2020061822A1/en
Publication of WO2020061822A1 publication Critical patent/WO2020061822A1/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/463Electronic voting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • the present disclosure relates to computer technologies, more particularly, to methods and systems for arbitrating data in a blockchain.
  • a blockchain may be used for storing and sharing information due to the nature of a shared ledger system.
  • the system can store information, for example, financial data associated with a transaction in the blockchain, and prevent the stored financial data from being tampered.
  • the financial data can include transaction time, transaction amount, collateral information, and the like.
  • the blockchain can prevent the stored information from being tampered, the blockchain may not determine whether the stored information is true. It may also be difficult to manually evaluate the stored information, as the blockchain can store massive information.
  • embodiments of the disclosure provide methods and systems for arbitrating authenticity of data in a blockchain.
  • Embodiments of the disclosure provide a computer-implemented method for arbitrating authenticity of data in a blockchain.
  • the method can include: receiving, by an arbitration network node, a request for arbitrating authenticity of the data, wherein the arbitration network node is one of a plurality of network nodes in a blockchain system; generating, by the arbitration network node, an arbitration event based on the request, wherein the arbitration event includes information relating to the authenticity of the data; prioritizing, by the arbitration network node, the arbitration event to be processed prior to a next transaction of the arbitration network node; and processing, by the arbitration network node, the arbitration event based on the information included in the arbitration event to generate an arbitration result of the network node, and providing the arbitration result to the blockchain system.
  • Embodiments of the disclosure further provide an arbitration network node for arbitrating authenticity of data in a blockchain.
  • the arbitration network node can include: a communication interface configured to receive a request for arbitrating authenticity of the data, wherein the arbitration network node is one of a plurality of network nodes in a blockchain system; a memory; and at least one processor coupled to the communication interface and the memory.
  • the at least one processor can be configured to: generate an arbitration event based on the request, wherein the arbitration event includes information relating to the authenticity of the data; prioritize the arbitration event to be processed prior to a next transaction of the arbitration network node; and process the arbitration event based on the information included in the arbitration event to generate an arbitration result of the arbitration network node, and provide the arbitration result to the blockchain system.
  • Embodiments of the disclosure also provide a non-transitory computer-readable medium that stores a set of instructions, when executed by at least one processor of an arbitration network node, cause the arbitration network node to perform a method for arbitrating authenticity of data in a blockchain.
  • the method can include: receiving a request for arbitrating authenticity of the data, wherein the arbitration network node is one of a plurality of network nodes in a blockchain system; generating an arbitration event based on the request, wherein the arbitration event includes information relating to the authenticity of the data; prioritizing the arbitration event to be processed prior to a next transaction of the arbitration network node; and processing the arbitration event based on the information included in the arbitration event to generate an arbitration result of the network node, and providing the arbitration result to the blockchain system.
  • FIG. 1 illustrates a schematic diagram of a blockchain system, according to an exemplary embodiment of the disclosure.
  • FIG. 2 illustrates a schematic diagram of a network node in a blockchain system, according to an embodiment of the disclosure.
  • FIG. 3 illustrates a schematic diagram of a plurality of network nodes using a smart contract, according to an exemplary embodiment of the disclosure.
  • FIG. 4 illustrates a flowchart of a method for arbitrating authenticity of data in a blockchain, according to an embodiment of the disclosure.
  • FIG. 1 illustrates a schematic diagram of a blockchain system 100, according to an exemplary embodiment of the disclosure.
  • a blockchain can be typically managed by a decentralized peer-to-peer network, including a plurality of network nodes.
  • blockchain system 100 may include a chain of blocks 120 and network nodes 102-110 connected with chain of blocks 120.
  • each of blocks 120 may be a data block
  • each of network nodes 102-110 may be a computer system including a processor and a memory.
  • Network nodes 102-110 can collectively manage chain of blocks 120.
  • Chain of blocks 120 can include a block 122, a block 124, a block 126, and the like.
  • Each block can include a cryptographic hash of the previous block, a timestamp, and stored data.
  • a hash is known in the art as a function that converts an input of, e.g., letters and numbers into an encrypted output of, e.g., a fixed length.
  • Chain of blocks 120 can be used as a distributed ledger to record data (e.g., transaction data) across network nodes 102-110.
  • each of network nodes 102-110 can have a copy of the ledger recording the data.
  • blockchain system 100 To record a new piece of data, blockchain system 100 generate one extra block to add to chain of blocks 120, which include cryptographic hash of a prior block in chain of blocks 120. Therefore, integrity of the recorded data is associated with the prior block, and recorded data cannot be tampered unless all prior blocks are altered.
  • blockchain system 100 may include a public blockchain, a private blockchain, or a consortium blockchain.
  • the public blockchain e.g., as used in Bitcoin, Ethereum, or the like
  • the private blockchain is controlled by a single administrator, and only sends invitations to selected network nodes as participants having limited access.
  • the consortium blockchain instead of being controlled by a single administrator, can be operated by a group of administrators, e.g., a group of financial institutions.
  • blockchain system 100 may run software corresponding to a smart contract, which can be fully or partially executed without human interaction. For example, multiple parties, using their respective computer systems, can program agreed terms into the smart contract, and when the terms are met, the smart contract can be automatically executed. It is appreciated that, as each network node (computer system) in the blockchain holds a copy of the blockchain, copies of the smart contract are also distributed across all network nodes.
  • contribution made to blockchain system 100 can be rewarded with a number of tokens, such as Bit Coins, Ether, and the like.
  • network node 102 can share desired information in blockchain system 100 and be rewarded with tokens. What information is desired may depend on nature of blockchain 100, and different blockchain systems may have different desired information.
  • the desired information may include financial transaction data, such as parties involved in a transaction, transaction amount, transaction time, and the like.
  • blockchain system 100 is a medical consortium blockchain
  • the desired information may be physician data, medical records, and the like.
  • an action of a network node may consume a token.
  • network node 102 may spend a token to make a transaction with another, create a smart contract, and the like.
  • FIG. 2 illustrates a schematic diagram of a network node, such as network node 102 (FIG. 1) , in a blockchain, according to an exemplary embodiment of the disclosure.
  • Network node 102 may include a communication interface 202, a memory 204, and a processor 206.
  • communication interface 202 may be in communication with chain of blocks 120 (FIG. 1) , and configured to receive, from chain of blocks 120, a request for arbitrating authenticity of data.
  • communication interface 202 may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection.
  • ISDN integrated services digital network
  • communication interface 202 can be a local area network (LAN) card to provide a data communication connection to a compatible LAN.
  • LAN local area network
  • Wireless links can also be implemented by communication interface 202.
  • communication interface 202 can send and receive electrical, electromagnetic or optical signals that carry digital data streams representing various types of information via a network.
  • the network can typically include a cellular communication network, a Wireless Local Area Network (WLAN) , a Wide Area Network (WAN) , or the like.
  • WLAN Wireless Local Area Network
  • WAN Wide Area Network
  • memory 204 may be configured to store a set of instructions. When the set of instructions is executed by processor 206, processor 206 can perform a method of arbitrating authenticity of data in a blockchain, described below.
  • Memory 204 may be implemented as any type of volatile or non-volatile memory devices, or a combination thereof, such as a static random access memory (SRAM) , an electrically erasable programmable read-only memory (EEPROM) , an erasable programmable read-only memory (EPROM) , a programmable read-only memory (PROM) , a read-only memory (ROM) , a magnetic memory, a flash memory, or a magnetic or optical disk.
  • SRAM static random access memory
  • EEPROM electrically erasable programmable read-only memory
  • EPROM erasable programmable read-only memory
  • PROM programmable read-only memory
  • ROM read-only memory
  • magnetic memory a magnetic memory
  • flash memory or a magnetic or optical disk.
  • network node 102 may perform a method of arbitrating authenticity of data submitted to the blockchain system by another network node, such as a first network node.
  • the data may include any data that can be exchanged with other network nodes.
  • the data may include financial data of a transaction, physical data of an anonymous user, device data associated with the condition of the device, and the like.
  • the financial data may be purchased by another network node, for example, to determine the credibility of parties involved in the transaction.
  • the physical data may be collected and used by a research institution.
  • the device data may be used to evaluate the value of the device.
  • each of the network nodes in the blockchain system may be assigned with a credibility value associated with a permission for transaction in the blockchain system. If the credibility value of a network node is lower than a transaction threshold, the blockchain system may prohibit the network node from making a transaction. In other words, the network node may not use the blockchain when its credibility value is lower than the transaction threshold.
  • a network node may be rewarded with a token after submitting data to the blockchain system.
  • the token may be a cryptocurrency and be used to purchase information stored in chain of blocks 120.
  • a network node may spend a token to create or join a smart contract.
  • the smart contract may be used to trigger a predetermined action when a preset condition is met, and the condition may be set along with the smart contract, as described below.
  • a request for arbitrating authenticity of data may be submitted by a second network node of the blockchain system.
  • submitting data may be rewarded with tokens, it is possible that a network node (e.g., the first network node) may submit fake data in exchange for the tokens.
  • any other network node can submit a request for arbitrating authenticity of the data submitted by the first network node.
  • processor 206 may further include multiple functional modules, such as an event generation unit 2062, a prioritizing unit 2064, and an arbitration unit 2066. These modules (and any corresponding sub-modules or sub-units) can be functional hardware units (e.g., portions of an integrated circuit) of processor 206 designed for use with other components or a part of a program (stored on a computer-readable medium) that, when executed by processor 206, performs one or more functions.
  • FIG. 2 shows units 2062-2066 all within processor 206, it is contemplated that these units may be distributed among multiple processors located near or remotely with each other.
  • event generation unit 2062 is configured to generate an arbitration event based on a request for arbitrating authenticity of data, e.g., submitted by the second network node.
  • the arbitration event can be generated for use by a smart contract.
  • software corresponding to the smart contract performs an action when a preset condition is met.
  • the action can include decreasing or increasing a credibility value of a network node associated with the smart contract.
  • the preset condition can be that whether the network node wins the arbitration.
  • the software corresponding to the smart contract may require arbitration network nodes to vote, and determine whether the first network node or the second network node wins.
  • event generation unit 2062 may further determine whether an arbitration network node has a credibility value that is higher than an arbitration threshold. For example, network nodes having credibility values higher than the arbitration threshold may be invited to be arbitration network nodes. In some embodiments, event generation unit 2062 may further select, among the network nodes having credibility values higher than the arbitration threshold, network nodes related to parties involved in the arbitration event.
  • the related network nodes may include any network node that has once interacted with the first or second network node. For example, if a network node has reviewed the data submitted by the first network node before, then the network node can be invited as an arbitration network node to arbitrate the event.
  • event generation unit 2062 may collect information relating to authenticity of the data as evidence, e.g., from the first or second network node.
  • the first network node may submit evidence to prove the integrity of the submitted data
  • the second network node may submit evidence to support an accusation against the submitted data and the first network node.
  • the software corresponding to the smart contract may require the second network node to submit evidence before the arbitration event can be generated.
  • FIG. 3 illustrates a schematic diagram of network nodes 102-110 (FIG. 1) using a smart contract 300, according to an exemplary embodiment of the disclosure.
  • software corresponding to smart contract 300 can run on each of network nodes 102-110 in the blockchain system.
  • a first network node 104 and a second network node 106 are the parties involved in an arbitration
  • network nodes 102, 108, and 110 are the arbitration network nodes.
  • first network node 104 and second network node 106 submit information relating to the authenticity of the data as evidence to software corresponding to smart contract 300.
  • arbitration network nodes 102, 108, and 110 may each generate an arbitration event and perform arbitration based on the submitted information.
  • prioritizing unit 2064 is configured to prioritize the arbitration event to be processed prior to a next transaction of network node 102 the arbitration network node. For example, the arbitration network node places in a task queue the arbitration event before the next transaction. In other words, the arbitration network node may be forced to process the arbitration event first. It is appreciated that, not all arbitration network nodes can perform transactions in a short time after the arbitration event is placed. For example, an arbitration network node may try to perform a transaction several days after the arbitration event is placed. Therefore, the time when the arbitration network nodes process the arbitration events and return the results may be different.
  • arbitration unit 2066 is configured to process the arbitration event based on the submitted information to generate an arbitration result of network node 102 (the arbitration network node) .
  • the arbitration result may include a vote for the first network node or the second network node.
  • the vote for the first network node may indicate that the arbitration network node determines the data submitted by the first network node is authentic.
  • the vote for the second network node may indicate that the arbitration network node determines the data submitted by the first network node is not authentic.
  • the software corresponding to the smart contract may collect the arbitration results of each arbitration network node in the blockchain system, and generate a final result based on the collected arbitration results. For example, the software corresponding to the smart contract may determine which one of the first and second network nodes wins a majority. Thus, the final result may indicate one of the first and second network nodes wins the arbitration finally.
  • the data associated with the arbitration event can be tagged with the final result of being authentic, so that a network node requesting the data can see the history of the arbitration.
  • the software corresponding to the smart contract may not be able to receive the votes of all arbitration network nodes at the same time. Therefore, it is appreciated that the software corresponding to the smart contract may retrieve votes that are made within a given period of time.
  • the winning rule can be different than a majority rule.
  • the software corresponding to the smart contract may require that the second network node wins only if the second network node wins two thirds of the votes. In this way, it can prevent network nodes in the blockchain system from generating too many arbitration events, which may waste resources of the blockchain system.
  • the credibility value of the network node losing the arbitration may be decreased. If the credibility value of the network node is lower than a transaction threshold, the permission for transaction within the blockchain may be revoked for the network node.
  • FIG. 4 illustrates a flowchart of a method 400 for arbitrating authenticity of data in a blockchain, according to an exemplary embodiment of the disclosure.
  • method 400 may be implemented by a network node, e.g., network node 102 (FIG. 1) , and may include steps S402-S408 as described below.
  • network node 102 can receive a request for arbitrating authenticity of data.
  • the data may be submitted by a first network node, e.g., network node 104 (FIG. 1) , and the request may be submitted by a second network node e.g., network node 106 (FIG. 1) .
  • network node 102 may generate an arbitration event based on the request.
  • the arbitration event may be generated based on a smart contract.
  • software corresponding to the smart contract performs an action when a preset condition is met.
  • the action may include decreasing or increasing a credibility value of a network node associated with the smart contract
  • the preset condition may be that whether the network node wins the arbitration.
  • the software corresponding to the smart contract may require arbitration network nodes to vote, and determine whether the first network node or the second network node wins.
  • the credibility value of the one winning the arbitration may be increased, the credibility value of the one losing the arbitration may be decreased.
  • whether the arbitration network node has a credibility value that is higher than an arbitration threshold may be further determined. For example, network nodes having credibility values higher than the arbitration threshold may be invited to be arbitration network nodes. In some embodiments, among the network nodes having credibility values higher than the arbitration threshold, network nodes related to the parties involved in the arbitration may be further selected.
  • the related network nodes may include any network node that has once interacted with the first or second network node.
  • the information relating to the authenticity of the data may be collected from the first and second network nodes.
  • network node 102 may prioritize the arbitration event to be processed prior to a next transaction of the network node. For example, network node 102 places in a task queue the arbitration event before the next transaction of the network node, such that the arbitration network node is required to process the arbitration event before the next transaction. In other words, the arbitration network node is forced to the process the arbitration event first.
  • network node 102 may process the arbitration event based on the submitted information to generate an arbitration result of the network node.
  • the arbitration result may include a vote for the first network node or the second network node.
  • the vote for the first network node may indicate that the arbitration network node determines the data submitted by the first network node is authentic.
  • the vote for the second network node may indicate that the arbitration network node determines the data submitted by the first network node is not authentic.
  • the software corresponding to the smart contract may collect the arbitration result of each arbitration network node in the blockchain system, and generate a final result based on the collected arbitration results.
  • the final result may indicate one of the first and second network nodes wins the arbitration.
  • the data associated with the arbitration can be tagged with the final result, so that any network node requesting the data can see the history of the arbitration.
  • the winning rule can be different than a majority rule.
  • the software corresponding to the smart contract may require that the second network node wins only if the second network node wins two thirds of the votes. In this way, it can prevent network nodes in the blockchain system from generating too many arbitration events, which may waste resources of the blockchain.
  • the credibility value of the network node losing the arbitration may be decreased. If the credibility value of the network node is lower than a transaction threshold, the permission for transaction within the blockchain can be revoked for the network node.
  • Embodiments of the disclosure can further provide a non-transitory computer-readable medium storing instructions which, when executed, cause one or more processors to perform the above described methods.
  • the computer-readable medium may include volatile or non-volatile, magnetic, semiconductor, tape, optical, removable, non-removable, or other types of computer-readable medium or computer-readable storage devices.
  • the computer-readable medium may be the storage device or the memory module having the computer instructions stored thereon, as disclosed.
  • the computer-readable medium may be a disc or a flash drive having the computer instructions stored thereon.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Embodiments of the disclosure provide methods and network nodes for arbitrating authenticity of data in a blockchain. The method can include: receiving, by an arbitration network node, a request for arbitrating authenticity of the data, wherein the arbitration network node is one of a plurality of network nodes in a blockchain system; generating, by the arbitration network node, an arbitration event based on the request, wherein the arbitration event includes information relating to the authenticity of the data; prioritizing, by the arbitration network node, the arbitration event to be processed prior to a next transaction of the arbitration network node; and processing, by the arbitration network node, the arbitration event based on the information included in the arbitration event to generate an arbitration result of the network node, and providing the arbitration result to the blockchain system.

Description

METHOD AND SYSTEM FOR ARBITRATING AUTHENTICITY OF DATA IN A BLOCKCHAIN TECHNICAL FIELD
The present disclosure relates to computer technologies, more particularly, to methods and systems for arbitrating data in a blockchain.
BACKGROUND
A blockchain may be used for storing and sharing information due to the nature of a shared ledger system. The system can store information, for example, financial data associated with a transaction in the blockchain, and prevent the stored financial data from being tampered. The financial data can include transaction time, transaction amount, collateral information, and the like.
While the blockchain can prevent the stored information from being tampered, the blockchain may not determine whether the stored information is true. It may also be difficult to manually evaluate the stored information, as the blockchain can store massive information.
To address the above problem, embodiments of the disclosure provide methods and systems for arbitrating authenticity of data in a blockchain.
SUMMARY
Embodiments of the disclosure provide a computer-implemented method for arbitrating authenticity of data in a blockchain. The method can include: receiving, by an arbitration network node, a request for arbitrating authenticity of the data, wherein the arbitration network node is one of a plurality of network nodes in a blockchain system; generating, by the arbitration network node, an arbitration event based on the request, wherein the arbitration event includes information relating to the authenticity of the data; prioritizing, by the arbitration network node, the arbitration event to be processed prior to a next transaction of the arbitration network node; and processing, by the arbitration network node, the arbitration event based on the information included in the arbitration event to generate an arbitration result of the network node, and providing the arbitration result to the blockchain system.
Embodiments of the disclosure further provide an arbitration network node for arbitrating authenticity of data in a blockchain. The arbitration network node can include: a communication interface configured to receive a request for arbitrating authenticity of the  data, wherein the arbitration network node is one of a plurality of network nodes in a blockchain system; a memory; and at least one processor coupled to the communication interface and the memory. The at least one processor can be configured to: generate an arbitration event based on the request, wherein the arbitration event includes information relating to the authenticity of the data; prioritize the arbitration event to be processed prior to a next transaction of the arbitration network node; and process the arbitration event based on the information included in the arbitration event to generate an arbitration result of the arbitration network node, and provide the arbitration result to the blockchain system.
Embodiments of the disclosure also provide a non-transitory computer-readable medium that stores a set of instructions, when executed by at least one processor of an arbitration network node, cause the arbitration network node to perform a method for arbitrating authenticity of data in a blockchain. The method can include: receiving a request for arbitrating authenticity of the data, wherein the arbitration network node is one of a plurality of network nodes in a blockchain system; generating an arbitration event based on the request, wherein the arbitration event includes information relating to the authenticity of the data; prioritizing the arbitration event to be processed prior to a next transaction of the arbitration network node; and processing the arbitration event based on the information included in the arbitration event to generate an arbitration result of the network node, and providing the arbitration result to the blockchain system.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
BRIEF DESCRIPTION OF THE DRAWINGS
FIG. 1 illustrates a schematic diagram of a blockchain system, according to an exemplary embodiment of the disclosure.
FIG. 2 illustrates a schematic diagram of a network node in a blockchain system, according to an embodiment of the disclosure.
FIG. 3 illustrates a schematic diagram of a plurality of network nodes using a smart contract, according to an exemplary embodiment of the disclosure.
FIG. 4 illustrates a flowchart of a method for arbitrating authenticity of data in a blockchain, according to an embodiment of the disclosure.
DETAILED DESCRIPTION
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
FIG. 1 illustrates a schematic diagram of a blockchain system 100, according to an exemplary embodiment of the disclosure. A blockchain can be typically managed by a decentralized peer-to-peer network, including a plurality of network nodes. As shown in FIG. 1, blockchain system 100 may include a chain of blocks 120 and network nodes 102-110 connected with chain of blocks 120. For example, each of blocks 120 may be a data block, and each of network nodes 102-110 may be a computer system including a processor and a memory. Network nodes 102-110 can collectively manage chain of blocks 120. Chain of blocks 120 can include a block 122, a block 124, a block 126, and the like. Each block can include a cryptographic hash of the previous block, a timestamp, and stored data. A hash is known in the art as a function that converts an input of, e.g., letters and numbers into an encrypted output of, e.g., a fixed length. Chain of blocks 120 can be used as a distributed ledger to record data (e.g., transaction data) across network nodes 102-110. In other words, each of network nodes 102-110 can have a copy of the ledger recording the data. To record a new piece of data, blockchain system 100 generate one extra block to add to chain of blocks 120, which include cryptographic hash of a prior block in chain of blocks 120. Therefore, integrity of the recorded data is associated with the prior block, and recorded data cannot be tampered unless all prior blocks are altered.
In exemplary embodiments, blockchain system 100 may include a public blockchain, a private blockchain, or a consortium blockchain. The public blockchain (e.g., as used in Bitcoin, Ethereum, or the like) allows any network node to join the blockchain. The private blockchain is controlled by a single administrator, and only sends invitations to selected network nodes as participants having limited access. The consortium blockchain, instead of being controlled by a single administrator, can be operated by a group of administrators, e.g., a group of financial institutions.
In exemplary embodiments, blockchain system 100 may run software corresponding to a smart contract, which can be fully or partially executed without human interaction. For example, multiple parties, using their respective computer systems, can program agreed terms into the smart contract, and when the terms are met, the smart contract can be automatically executed. It is appreciated that, as each network node (computer system)  in the blockchain holds a copy of the blockchain, copies of the smart contract are also distributed across all network nodes.
In exemplary embodiments, contribution made to blockchain system 100 can be rewarded with a number of tokens, such as Bit Coins, Ether, and the like. For example, network node 102 can share desired information in blockchain system 100 and be rewarded with tokens. What information is desired may depend on nature of blockchain 100, and different blockchain systems may have different desired information. For example, when blockchain system 100 is designed as a financial consortium blockchain, the desired information may include financial transaction data, such as parties involved in a transaction, transaction amount, transaction time, and the like. In another example, when blockchain system 100 is a medical consortium blockchain, the desired information may be physician data, medical records, and the like. On the other hand, an action of a network node may consume a token. For example, network node 102 may spend a token to make a transaction with another, create a smart contract, and the like.
FIG. 2 illustrates a schematic diagram of a network node, such as network node 102 (FIG. 1) , in a blockchain, according to an exemplary embodiment of the disclosure. Network node 102 may include a communication interface 202, a memory 204, and a processor 206.
Referring to FIG. 2, communication interface 202 may be in communication with chain of blocks 120 (FIG. 1) , and configured to receive, from chain of blocks 120, a request for arbitrating authenticity of data. For example, communication interface 202 may be an integrated services digital network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection. As another example, communication interface 202 can be a local area network (LAN) card to provide a data communication connection to a compatible LAN. Wireless links can also be implemented by communication interface 202. In such an implementation, communication interface 202 can send and receive electrical, electromagnetic or optical signals that carry digital data streams representing various types of information via a network. The network can typically include a cellular communication network, a Wireless Local Area Network (WLAN) , a Wide Area Network (WAN) , or the like.
In exemplary embodiments, memory 204 may be configured to store a set of instructions. When the set of instructions is executed by processor 206, processor 206 can perform a method of arbitrating authenticity of data in a blockchain, described below. Memory 204 may be implemented as any type of volatile or non-volatile memory devices, or a combination thereof, such as a static random access memory (SRAM) , an electrically erasable programmable read-only memory (EEPROM) , an erasable programmable read-only  memory (EPROM) , a programmable read-only memory (PROM) , a read-only memory (ROM) , a magnetic memory, a flash memory, or a magnetic or optical disk.
In exemplary embodiments, network node 102 may perform a method of arbitrating authenticity of data submitted to the blockchain system by another network node, such as a first network node. The data may include any data that can be exchanged with other network nodes. For example, the data may include financial data of a transaction, physical data of an anonymous user, device data associated with the condition of the device, and the like. In some embodiments, the financial data may be purchased by another network node, for example, to determine the credibility of parties involved in the transaction. In some embodiments, the physical data may be collected and used by a research institution. In some embodiments, the device data may be used to evaluate the value of the device.
In some embodiments, each of the network nodes in the blockchain system may be assigned with a credibility value associated with a permission for transaction in the blockchain system. If the credibility value of a network node is lower than a transaction threshold, the blockchain system may prohibit the network node from making a transaction. In other words, the network node may not use the blockchain when its credibility value is lower than the transaction threshold.
In exemplary embodiments, a network node may be rewarded with a token after submitting data to the blockchain system. The token may be a cryptocurrency and be used to purchase information stored in chain of blocks 120. In some embodiments, a network node may spend a token to create or join a smart contract. The smart contract may be used to trigger a predetermined action when a preset condition is met, and the condition may be set along with the smart contract, as described below.
In exemplary embodiments, a request for arbitrating authenticity of data may be submitted by a second network node of the blockchain system. As submitting data may be rewarded with tokens, it is possible that a network node (e.g., the first network node) may submit fake data in exchange for the tokens. In the exemplary embodiments, any other network node can submit a request for arbitrating authenticity of the data submitted by the first network node.
Still referring to FIG. 2, to perform the method of arbitrating authenticity of data, e.g., submitted by the first network node, processor 206 may further include multiple functional modules, such as an event generation unit 2062, a prioritizing unit 2064, and an arbitration unit 2066. These modules (and any corresponding sub-modules or sub-units) can be functional hardware units (e.g., portions of an integrated circuit) of processor 206 designed  for use with other components or a part of a program (stored on a computer-readable medium) that, when executed by processor 206, performs one or more functions. Although FIG. 2 shows units 2062-2066 all within processor 206, it is contemplated that these units may be distributed among multiple processors located near or remotely with each other.
In exemplary embodiments, event generation unit 2062 is configured to generate an arbitration event based on a request for arbitrating authenticity of data, e.g., submitted by the second network node. The arbitration event can be generated for use by a smart contract. As described above, software corresponding to the smart contract performs an action when a preset condition is met. In some embodiments, the action can include decreasing or increasing a credibility value of a network node associated with the smart contract. And the preset condition can be that whether the network node wins the arbitration. For example, the software corresponding to the smart contract may require arbitration network nodes to vote, and determine whether the first network node or the second network node wins. The credibility value of the network node winning the arbitration event may be increased, and the credibility value of the network node losing the arbitration may be decreased. In some embodiments, to ensure that each vote made by the arbitration network nodes is evaluated, event generation unit 2062 may further determine whether an arbitration network node has a credibility value that is higher than an arbitration threshold. For example, network nodes having credibility values higher than the arbitration threshold may be invited to be arbitration network nodes. In some embodiments, event generation unit 2062 may further select, among the network nodes having credibility values higher than the arbitration threshold, network nodes related to parties involved in the arbitration event. The related network nodes may include any network node that has once interacted with the first or second network node. For example, if a network node has reviewed the data submitted by the first network node before, then the network node can be invited as an arbitration network node to arbitrate the event.
In exemplary embodiments, event generation unit 2062 may collect information relating to authenticity of the data as evidence, e.g., from the first or second network node. For example, the first network node may submit evidence to prove the integrity of the submitted data, and the second network node may submit evidence to support an accusation against the submitted data and the first network node. It is appreciated, in some embodiments, the software corresponding to the smart contract may require the second network node to submit evidence before the arbitration event can be generated.
FIG. 3 illustrates a schematic diagram of network nodes 102-110 (FIG. 1) using a smart contract 300, according to an exemplary embodiment of the disclosure. For example,  software corresponding to smart contract 300 can run on each of network nodes 102-110 in the blockchain system. For illustrative purposes only, it is assumed that among network nodes 102-110, a first network node 104 and a second network node 106 are the parties involved in an arbitration, and  network nodes  102, 108, and 110 are the arbitration network nodes. In the exemplary embodiments, first network node 104 and second network node 106 submit information relating to the authenticity of the data as evidence to software corresponding to smart contract 300. And when the software corresponding to smart contract 300 updates on each of  arbitration network nodes  102, 108, and 110,  arbitration network nodes  102, 108, and 110 may each generate an arbitration event and perform arbitration based on the submitted information.
With reference back to FIG. 2, in exemplary embodiments, prioritizing unit 2064 is configured to prioritize the arbitration event to be processed prior to a next transaction of network node 102 the arbitration network node. For example, the arbitration network node places in a task queue the arbitration event before the next transaction. In other words, the arbitration network node may be forced to process the arbitration event first. It is appreciated that, not all arbitration network nodes can perform transactions in a short time after the arbitration event is placed. For example, an arbitration network node may try to perform a transaction several days after the arbitration event is placed. Therefore, the time when the arbitration network nodes process the arbitration events and return the results may be different.
In exemplary embodiments, arbitration unit 2066 is configured to process the arbitration event based on the submitted information to generate an arbitration result of network node 102 (the arbitration network node) . The arbitration result may include a vote for the first network node or the second network node. The vote for the first network node may indicate that the arbitration network node determines the data submitted by the first network node is authentic. The vote for the second network node may indicate that the arbitration network node determines the data submitted by the first network node is not authentic.
In some embodiments, the software corresponding to the smart contract may collect the arbitration results of each arbitration network node in the blockchain system, and generate a final result based on the collected arbitration results. For example, the software corresponding to the smart contract may determine which one of the first and second network nodes wins a majority. Thus, the final result may indicate one of the first and second network nodes wins the arbitration finally. The data associated with the arbitration event can be  tagged with the final result of being authentic, so that a network node requesting the data can see the history of the arbitration. As described above, the software corresponding to the smart contract may not be able to receive the votes of all arbitration network nodes at the same time. Therefore, it is appreciated that the software corresponding to the smart contract may retrieve votes that are made within a given period of time.
It is appreciated that, the winning rule can be different than a majority rule. For example, the software corresponding to the smart contract may require that the second network node wins only if the second network node wins two thirds of the votes. In this way, it can prevent network nodes in the blockchain system from generating too many arbitration events, which may waste resources of the blockchain system.
As discussed above, the credibility value of the network node losing the arbitration may be decreased. If the credibility value of the network node is lower than a transaction threshold, the permission for transaction within the blockchain may be revoked for the network node.
FIG. 4 illustrates a flowchart of a method 400 for arbitrating authenticity of data in a blockchain, according to an exemplary embodiment of the disclosure. For example, method 400 may be implemented by a network node, e.g., network node 102 (FIG. 1) , and may include steps S402-S408 as described below.
In step S402, network node 102 can receive a request for arbitrating authenticity of data. For example, the data may be submitted by a first network node, e.g., network node 104 (FIG. 1) , and the request may be submitted by a second network node e.g., network node 106 (FIG. 1) .
In step S404, network node 102 may generate an arbitration event based on the request. The arbitration event may be generated based on a smart contract. As described above, software corresponding to the smart contract performs an action when a preset condition is met. In some embodiments, the action may include decreasing or increasing a credibility value of a network node associated with the smart contract, and the preset condition may be that whether the network node wins the arbitration. For example, the software corresponding to the smart contract may require arbitration network nodes to vote, and determine whether the first network node or the second network node wins. The credibility value of the one winning the arbitration may be increased, the credibility value of the one losing the arbitration may be decreased. In some embodiments, to ensure that each vote made by the arbitration network node can be evaluated, whether the arbitration network node has a credibility value that is higher than an arbitration threshold may be further  determined. For example, network nodes having credibility values higher than the arbitration threshold may be invited to be arbitration network nodes. In some embodiments, among the network nodes having credibility values higher than the arbitration threshold, network nodes related to the parties involved in the arbitration may be further selected. The related network nodes may include any network node that has once interacted with the first or second network node. In addition, the information relating to the authenticity of the data may be collected from the first and second network nodes.
In step S406, network node 102 may prioritize the arbitration event to be processed prior to a next transaction of the network node. For example, network node 102 places in a task queue the arbitration event before the next transaction of the network node, such that the arbitration network node is required to process the arbitration event before the next transaction. In other words, the arbitration network node is forced to the process the arbitration event first.
In step S408, network node 102 may process the arbitration event based on the submitted information to generate an arbitration result of the network node. The arbitration result may include a vote for the first network node or the second network node. The vote for the first network node may indicate that the arbitration network node determines the data submitted by the first network node is authentic. The vote for the second network node may indicate that the arbitration network node determines the data submitted by the first network node is not authentic.
In some embodiments, the software corresponding to the smart contract may collect the arbitration result of each arbitration network node in the blockchain system, and generate a final result based on the collected arbitration results. The final result may indicate one of the first and second network nodes wins the arbitration. The data associated with the arbitration can be tagged with the final result, so that any network node requesting the data can see the history of the arbitration.
It is appreciated that, the winning rule can be different than a majority rule. For example, the software corresponding to the smart contract may require that the second network node wins only if the second network node wins two thirds of the votes. In this way, it can prevent network nodes in the blockchain system from generating too many arbitration events, which may waste resources of the blockchain.
As discussed above, the credibility value of the network node losing the arbitration may be decreased. If the credibility value of the network node is lower than a transaction  threshold, the permission for transaction within the blockchain can be revoked for the network node.
Embodiments of the disclosure can further provide a non-transitory computer-readable medium storing instructions which, when executed, cause one or more processors to perform the above described methods. The computer-readable medium may include volatile or non-volatile, magnetic, semiconductor, tape, optical, removable, non-removable, or other types of computer-readable medium or computer-readable storage devices. For example, the computer-readable medium may be the storage device or the memory module having the computer instructions stored thereon, as disclosed. In some embodiments, the computer-readable medium may be a disc or a flash drive having the computer instructions stored thereon.
It will be apparent to those skilled in the art that various modifications and variations can be made to the disclosed system and related methods. Other embodiments will be apparent to those skilled in the art from consideration of the specification and practice of the disclosed system and related methods.
It is intended that the specification and examples be considered as exemplary only, with a true scope being indicated by the following claims and their equivalents.

Claims (20)

  1. A computer-implemented method for arbitrating authenticity of data in a blockchain, comprising:
    receiving, by an arbitration network node, a request for arbitrating authenticity of the data, wherein the arbitration network node is one of a plurality of network nodes in a blockchain system;
    generating, by the arbitration network node, an arbitration event based on the request, wherein the arbitration event includes information relating to the authenticity of the data;
    prioritizing, by the arbitration network node, the arbitration event to be processed prior to a next transaction of the arbitration network node; and
    processing, by the arbitration network node, the arbitration event based on the information included in the arbitration event to generate an arbitration result of the network node, and providing the arbitration result to the blockchain system.
  2. The method of claim 1, further comprising:
    receiving the data that is submitted by a first network node of the plurality of network nodes; and
    receiving the request that is submitted by a second network node of the plurality of network nodes, the second network node being different from the first network node.
  3. The method of claim 2, wherein generating the arbitration event further comprises:
    determining that the arbitration network node has a credibility value higher than a first threshold; and
    receiving the information relating to the authenticity of the data from at least one of the first network node or the second network node.
  4. The method of claim 1, wherein prioritizing the arbitration event comprises;
    placing, in a task queue, the arbitration event prior to the next transaction of the arbitration network node.
  5. The method of claim 3, wherein generating the arbitration result comprises:
    determining a vote for the first network node or the second network node.
  6. The method of claim 5, further comprising:
    assigning a credibility value to each of the plurality of network nodes, the credibility value being associated with a permission for transaction in the blockchain system.
  7. The method of claim 6, wherein:
    when it is determined that the data is authentic, the credibility value of the first network node from which the data is submitted is increased, and when it is determined that the data is not authentic, the credibility value of the first network node is submitted is decreased.
  8. The method of claim 6, wherein the data submitted by the first network node is tagged with a final result of being authentic.
  9. The method of claim 1, wherein the blockchain is a consortium blockchain.
  10. The method of claim 7, wherein in response to the first network node having a credibility value lower than a second threshold, the permission for transaction in the blockchain system is revoked for the first network node.
  11. An arbitration network node for arbitrating authenticity of data in a blockchain, comprising:
    a communication interface configured to receive a request for arbitrating authenticity of the data, wherein the arbitration network node is one of a plurality of network nodes in a blockchain system;
    a memory; and
    at least one processor coupled to the communication interface and the memory, configured to:
    generate an arbitration event based on the request, wherein the arbitration event includes information relating to the authenticity of the data;
    prioritize the arbitration event to be processed prior to a next transaction of the arbitration network node; and
    process the arbitration event based on the information included in the arbitration event to generate an arbitration result of the arbitration network node, and provide the arbitration result to the blockchain system.
  12. The network node of claim 12, wherein the communication interface is further configured  to:
    receive the data that is submitted by a first network node of the plurality of network nodes; and
    receive the request that is submitted by a second network node of the plurality of network nodes, the second network node being different from the first network node.
  13. The network node of claim 12, wherein the processor is further configured to
    determine that the arbitration network node has a credibility value that is higher than a first threshold; and
    receive the information relating to the authenticity of the data from at least one of the first network node or the second network node.
  14. The network node of claim 11, wherein the at least one processor is further configured to:
    place, in a task queue, the arbitration event prior to the next transaction of the arbitration network node.
  15. The network node of claim 13, wherein the at least one processor is further configured to:
    determine a vote for the first network node or the second network node.
  16. The network node of claim 15, wherein the at least one processor is further configured to:
    assign a credibility value to each of the plurality of network nodes, the credibility value being associated with a permission for transaction in the blockchain system.
  17. The network node of claim 16, wherein when it is determined that the data is authentic, the credibility value of the first network node from which the data is submitted is increased, and when it is determined that the data is not authentic, the credibility value of the first network node is submitted is decreased.
  18. The network node of claim 16, wherein the data submitted by the first network node is tagged with a final result of being authentic.
  19. The network node of claim 17, wherein in response to the first network node having a credibility value lower than a second threshold, the permission for transaction in the blockchain system is revoked for the first network node.
  20. A non-transitory computer-readable medium that stores a set of instructions, when executed by at least one processor of an arbitration network node, cause the arbitration network node to perform a method for arbitrating authenticity of data in a blockchain, the method comprising:
    receiving a request for arbitrating authenticity of the data, wherein the arbitration network node is one of a plurality of network nodes in a blockchain system;
    generating an arbitration event based on the request, wherein the arbitration event includes information relating to the authenticity of the data;
    prioritizing the arbitration event to be processed prior to a next transaction of the arbitration network node; and
    processing the arbitration event based on the information included in the arbitration event to generate an arbitration result of the network node, and providing the arbitration result to the blockchain system.
PCT/CN2018/107625 2018-09-26 2018-09-26 Method and system for arbitrating authenticity of data in a blockchain WO2020061822A1 (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201880002222.3A CN111201751B (en) 2018-09-26 2018-09-26 Method and system for arbitrating data authenticity in blockchain
PCT/CN2018/107625 WO2020061822A1 (en) 2018-09-26 2018-09-26 Method and system for arbitrating authenticity of data in a blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/107625 WO2020061822A1 (en) 2018-09-26 2018-09-26 Method and system for arbitrating authenticity of data in a blockchain

Publications (1)

Publication Number Publication Date
WO2020061822A1 true WO2020061822A1 (en) 2020-04-02

Family

ID=69949858

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/107625 WO2020061822A1 (en) 2018-09-26 2018-09-26 Method and system for arbitrating authenticity of data in a blockchain

Country Status (2)

Country Link
CN (1) CN111201751B (en)
WO (1) WO2020061822A1 (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111681011A (en) * 2020-06-16 2020-09-18 中国工商银行股份有限公司 Data processing method, block chain system, computer system and medium
CN112202765A (en) * 2020-09-28 2021-01-08 北京八分量信息科技有限公司 Block chain common identification block method and device based on trusted computing and related products
US20230050048A1 (en) * 2021-08-13 2023-02-16 Bank Of America Corporation Isolating And Reinstating Nodes In A Distributed Ledger Using Proof Of Innocence

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107391526A (en) * 2017-03-28 2017-11-24 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain
CN107944285A (en) * 2017-11-30 2018-04-20 深圳市轱辘车联数据技术有限公司 The method of commerce and device of a kind of unique right to use of data message
CN108062672A (en) * 2017-12-07 2018-05-22 北京泛融科技有限公司 A kind of process dispatch method based on block chain intelligence contract
CN108171083A (en) * 2017-12-18 2018-06-15 深圳前海微众银行股份有限公司 Block chain trust data management method, system and computer readable storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10565570B2 (en) * 2016-09-27 2020-02-18 The Toronto-Dominion Bank Processing network architecture with companion database

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107391526A (en) * 2017-03-28 2017-11-24 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain
CN107944285A (en) * 2017-11-30 2018-04-20 深圳市轱辘车联数据技术有限公司 The method of commerce and device of a kind of unique right to use of data message
CN108062672A (en) * 2017-12-07 2018-05-22 北京泛融科技有限公司 A kind of process dispatch method based on block chain intelligence contract
CN108171083A (en) * 2017-12-18 2018-06-15 深圳前海微众银行股份有限公司 Block chain trust data management method, system and computer readable storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111681011A (en) * 2020-06-16 2020-09-18 中国工商银行股份有限公司 Data processing method, block chain system, computer system and medium
CN111681011B (en) * 2020-06-16 2023-04-28 中国工商银行股份有限公司 Data processing method, blockchain system, computer system and medium
CN112202765A (en) * 2020-09-28 2021-01-08 北京八分量信息科技有限公司 Block chain common identification block method and device based on trusted computing and related products
CN112202765B (en) * 2020-09-28 2023-03-28 北京八分量信息科技有限公司 Block chain common identification block method, block chain system, electronic device and storage medium
US20230050048A1 (en) * 2021-08-13 2023-02-16 Bank Of America Corporation Isolating And Reinstating Nodes In A Distributed Ledger Using Proof Of Innocence

Also Published As

Publication number Publication date
CN111201751B (en) 2021-03-09
CN111201751A (en) 2020-05-26

Similar Documents

Publication Publication Date Title
JP7407895B2 (en) Blockchain for general calculations
US11694196B2 (en) Method and system for directing an exchange associated with an anonymously held token on a blockchain
US11902439B2 (en) Computer-implemented system and method for fault-resistant multi-node communication
CN108596623B (en) Block chain consensus achieving method
US20210203481A1 (en) Systems and methods for storage, generation and verification of tokens used to control access to a resource
CN108712488B (en) Data processing method and device based on block chain and block chain system
TWI727281B (en) Block chain-based data processing method and device, and electronic equipment
CN109584082A (en) Settlement of insurance claim method, electronic device and storage medium based on block chain
WO2017109140A1 (en) Decentralized, tamper-resistant, asset-oriented database system and method of recording a transaction
WO2020061822A1 (en) Method and system for arbitrating authenticity of data in a blockchain
CN109190881A (en) A kind of data assets management method, system and equipment
CN108665363B (en) Block chain consensus achieving device
CN108831001B (en) Block chain-based node random selection method, system, node and electronic equipment
CN108648082B (en) Computer system for block chain consensus achievement
CN109242677A (en) Object select method and device, electronic equipment
CN110866289A (en) Data processing method and device based on block chain, server and storage medium
CN114039733A (en) Certificate storage service transfer method, device and equipment for alliance chain
CN112688775B (en) Management method and device of alliance chain intelligent contract, electronic equipment and medium
US12072848B1 (en) Systems and methods for managing personalized life information
CN112291321B (en) Service processing method, device and system
CN111310945B (en) Operation and maintenance management method and device and electronic equipment
CN114154996A (en) Cross-block-chain data transfer method and system, storage medium and terminal
CN112968772A (en) Cross-chain decoupling method and system for block chain data and application of cross-chain decoupling method and system
CN111202987A (en) Login control method and device for game application
CN118350819A (en) Client activity management method and system based on blockchain technology

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18934936

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18934936

Country of ref document: EP

Kind code of ref document: A1