WO2020082897A1 - 一种基于智能合约的权限可控的智能合约升级方法 - Google Patents

一种基于智能合约的权限可控的智能合约升级方法 Download PDF

Info

Publication number
WO2020082897A1
WO2020082897A1 PCT/CN2019/103502 CN2019103502W WO2020082897A1 WO 2020082897 A1 WO2020082897 A1 WO 2020082897A1 CN 2019103502 W CN2019103502 W CN 2019103502W WO 2020082897 A1 WO2020082897 A1 WO 2020082897A1
Authority
WO
WIPO (PCT)
Prior art keywords
contract
upgrade
smart
proposal
smart contract
Prior art date
Application number
PCT/CN2019/103502
Other languages
English (en)
French (fr)
Inventor
李启雷
李伟
梁秀波
邱炜伟
尹可挺
戎佳磊
吴志强
Original Assignee
杭州趣链科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 杭州趣链科技有限公司 filed Critical 杭州趣链科技有限公司
Priority to US16/762,154 priority Critical patent/US11301233B2/en
Priority to EP19874756.0A priority patent/EP3712765A4/en
Publication of WO2020082897A1 publication Critical patent/WO2020082897A1/zh
Priority to US17/685,507 priority patent/US11677572B2/en

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • G06F8/65Updates
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2379Updates performed during online database operations; commit processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/51Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems at application loading time, e.g. accepting, rejecting, starting or inhibiting executable software based on integrity or source reliability
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/405Establishing or using transaction specific rules
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2230/00Voting or election arrangements

Definitions

  • the present invention relates to smart contract technology, in particular to a smart contract upgrade method based on smart contract controllable permissions.
  • Smart contract is a concept proposed by Nick Saab in the 1990s, almost the same age as the Internet. Due to the lack of a credible execution environment, smart contracts have not been applied to the actual industry. Since the birth of Bitcoin, people have realized that the underlying technology blockchain of Bitcoin can naturally provide a credible execution environment for smart contracts. Smart contracts are assembly languages that are programmed on the blockchain. Usually people don't write bytecode themselves, but they compile it from a higher level language.
  • the purpose of the present invention is to provide a smart contract upgrade method with controllable permissions based on smart contracts in view of the deficiencies of the prior art, provide permission control for smart contract upgrades, and enhance security.
  • the specific technical solutions are as follows:
  • a smart contract upgrade method with controllable permissions based on smart contracts includes a blockchain node and a client.
  • the method is characterized in that the method specifically includes the following steps:
  • S2 Deploy the smart contract to be upgraded that contains the information of the contract participants and the minimum number of consents required to pass the relevant proposals of the contract on the blockchain node;
  • Any blockchain node receives a contract upgrade proposal from the user to the contract upgrade smart contract that carries the smart contract address to be upgraded and the new contract binary information.
  • the contract upgrade smart contract checks whether the smart contract address to be upgraded is legal and the initiator of the proposal Whether it belongs to the contract participant, confirm whether it is legal, if not, reject the upgrade, if legal, the contract upgrade smart contract generates a contract upgrade proposal event, and forward the event to all user clients participating in the contract;
  • S5 Contract upgrade The smart contract collects the number of consents. When the minimum required number of consents is exceeded, the proposal is passed, and all blockchain nodes will be notified by passing events; if enough consent has not been collected after the timeout, the proposal will be abandoned and the upgrade will not be performed;
  • the contract upgrade smart contract can simultaneously process upgrade proposals of multiple contracts by adding a mapping method, and only one upgrade proposal of a contract can be processed at a time.
  • the information of the contract participants of the smart contract to be upgraded and the information on the minimum number of consents required to pass the relevant proposal of the contract can also be updated by way of proposal voting to adapt to the increase or decrease of contract users.
  • the information of the contract participants of all the smart contracts to be upgraded and the information of the minimum number of consents required to pass relevant proposals of this contract need to be redundantly backed up on all blockchains Node.
  • the smart contract upgrade method based on the controllable permission of the smart contract of the present invention performs the permission control of the contract upgrade, and the contract upgrade can be performed only after obtaining the consent of a predetermined number of contract participants, avoiding the single point of failure and the possibility of evil, and improving the safety.
  • FIG. 1 is a detailed flowchart of a smart contract upgrade method with controllable rights based on a smart contract of the present invention.
  • the blockchain includes a blockchain node and a client.
  • the method is characterized in that the method specifically includes the following steps:
  • S2 Deploy the smart contract to be upgraded that contains the information of the contract participants and the minimum number of consents required to pass the relevant proposals of the contract on the blockchain node;
  • Any blockchain node receives a contract upgrade proposal from the user to the contract upgrade smart contract that carries the smart contract address to be upgraded and the new contract binary information.
  • the contract upgrade smart contract checks whether the smart contract address to be upgraded is legal and the initiator of the proposal Whether it belongs to the contract participant, confirm whether it is legal, if not, reject the upgrade, if legal, the contract upgrade smart contract generates a contract upgrade proposal event, and forward the event to all user clients participating in the contract;
  • S5 Contract upgrade The smart contract collects the number of consents. When the minimum required number of consents is exceeded, this proposal is passed, and a pass event is generated to notify all blockchain nodes; if enough consent has not been collected after the timeout, the proposal is abandoned and the upgrade is not performed.
  • the contract upgrade smart contract processes upgrade proposals of multiple contracts at the same time by adding a mapping method. Only one upgrade proposal of a contract can be processed at a time to adapt to the situation of multiple contracts in the system.
  • the contract upgrade smart contract checks whether the initiator of the smart contract proposal to be upgraded is a participant of the contract, by using the built-in contract, according to the given address of the contract to be upgraded Query the information of the corresponding contract participants.
  • the information of the contract participants of the smart contract to be upgraded and the information of the minimum number of consents required to pass the relevant proposal of the contract can also be updated by way of proposal voting to adapt to the increase or decrease of contract users.
  • the information of the contract participants of all the smart contracts to be upgraded and the information of the minimum number of consents required to pass relevant proposals of this contract need to be redundantly backed up on all blockchain Node.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Human Resources & Organizations (AREA)
  • Tourism & Hospitality (AREA)
  • Accounting & Taxation (AREA)
  • Marketing (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Finance (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Quality & Reliability (AREA)
  • Operations Research (AREA)
  • Primary Health Care (AREA)
  • Technology Law (AREA)
  • Development Economics (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Bioethics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

本发明公开一种基于智能合约的权限可控的智能合约升级方法,此方法首先部署合约升级智能合约,再部署包含合约参与者信息和通过此合约相关提案所需的最少同意数量信息的待升级智能合约;然后任意区块链节点接收用户向合约升级智能合约提出的携带待升级的智能合约地址、新合约二进制信息的合约升级提案,经合约升级智能合约判定通过后,生成提出事件,并转发给所有参与该合约的用户客户端,客户端收到后接收用户的投票并反馈至合约升级智能合约;如果同意数量超过预设,此提案被通过并应用,进行合约二进制的替换,完成合约升级。本发明解决了传统合约升级方式的中心化问题,解决了单点故障问题,提升了合约升级的安全性。

Description

一种基于智能合约的权限可控的智能合约升级方法 技术领域
本发明涉及智能合约技术,尤其涉及一种基于智能合约的权限可控的智能合约升级方法.
背景技术
智能合约是1990年代由尼克萨博提出的理念,几乎与互联网同龄。由于缺少可信的执行环境,智能合约并没有被应用到实际产业中,自比特币诞生后,人们认识到比特币的底层技术区块链天生可以为智能合约提供可信的执行环境。智能合约是编程在区块链上的汇编语言。通常人们不会自己编写字节码,但是会从更高级的语言来编译它。
而传统区块链智能合约升级采用的是部署者发起升级请求,合约就直接能够升级。在联盟链系统中,这样的设计有以下问题:存在单点故障问题,如果部署者丢失其私钥,此份合约便再不能升级;存在作恶问题,一份智能合约可能有多个参与方,但是这种设计中,部署者可以在没有征得其余参与方的同意的情况下,单方面进行合约的升级。
发明内容
本发明的目的是针对现有技术的不足,提供一种基于智能合约的权限可控的智能合约升级方法,提供了智能合约升级的权限控制,增强了安全性。具体技术方案如下:
一种基于智能合约的权限可控的智能合约升级方法,所述的区块链包括区块链节点和客户端,其特征在于,该方法具体包括如下步骤:
S1:将合约升级智能合约部署在区块链节点上;
S2:将包含合约参与者信息和通过此合约相关提案所需的最少同意数量信息的待升级的智能合约部署在区块链节点上;
S3:任意区块链节点接收用户向合约升级智能合约提出的携带待升级的智能合约地址、新合约二进制信息的合约升级提案,合约升级智能合约检查待升级的智能合约地址是否合法、提案发起者是否属于合约的参与者,确认其是否合法,如果不合法,拒绝此次升级,如果合法,合约升级智能合约生成合约升级提案提出事件,并转发该事件至所有参与该合约的用户客户端;
S4:用户客户端收集到所述的合约升级提案提出事件后,接收用户根据相应信息判定后的投票信息,并将该投票信息反馈至合约升级智能合约;
S5:合约升级智能合约进行同意数量的收集,当超过所需最少同意数量,此提案通过, 生成通过事件通知所有区块链节点;如果超时还未收集足够同意,放弃此提案,不进行升级;
S6:所有区块链节点进行合约二进制替换,完成智能合约升级。
进一步地,所述的合约升级智能合约通过增加映射的方式同时处理多个合约的升级提案,同一时间一个合约的升级提案只能处理一个。
进一步地,所述的S3中,所述的合约升级智能合约在检查待升级的智能合约提案发起者是否属于合约的参与者时,通过使用内置合约的方式,根据给定的待升级合约的地址查询相应的合约参与者信息。
进一步地,所述的待升级的智能合约的合约参与者信息和通过此合约相关提案所需的最少同意数量信息也可以通过提案投票的方式进行更新,以适应合约用户增加或减少的情况。
进一步地,所述的S2的待升级的智能合约部署过程中,所有待升级的智能合约的合约参与者信息和通过此合约相关提案所需的最少同意数量信息需要冗余备份于所有区块链节点中。
本发明的有益效果如下:
本发明的基于智能合约的权限可控的智能合约升级方法进行了合约升级的权限控制,需要征得预定数量合约参与方的同意后才能进行合约升级,避免了单点故障和作恶可能,提高了安全性。
附图说明
图1为本发明的基于智能合约的权限可控的智能合约升级方法的详细流程图。
具体实施方式
下面根据附图和优选实施例详细描述本发明,本发明的目的和效果将变得更加明白,以下结合附图和实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
如图1所示,本发明的基于智能合约的权限可控的智能合约升级方法,所述的区块链包括区块链节点和客户端,其特征在于,该方法具体包括如下步骤:
S1:将合约升级智能合约部署在区块链节点上;
S2:将包含合约参与者信息和通过此合约相关提案所需的最少同意数量信息的待升级的智能合约部署在区块链节点上;
S3:任意区块链节点接收用户向合约升级智能合约提出的携带待升级的智能合约地址、新合约二进制信息的合约升级提案,合约升级智能合约检查待升级的智能合约地址是否合 法、提案发起者是否属于合约的参与者,确认其是否合法,如果不合法,拒绝此次升级,如果合法,合约升级智能合约生成合约升级提案提出事件,并转发该事件至所有参与该合约的用户客户端;
S4:用户客户端收集到所述的合约升级提案提出事件后,接收用户根据相应信息判定后的投票信息,并将该投票信息反馈至合约升级智能合约;
S5:合约升级智能合约进行同意数量的收集,当超过所需最少同意数量,此提案通过,生成通过事件通知所有区块链节点;如果超时还未收集足够同意,放弃此提案,不进行升级。
S6:所有区块链节点进行合约二进制替换,完成智能合约升级。
优选地,所述的合约升级智能合约通过增加映射的方式同时处理多个合约的升级提案,同一时间一个合约的升级提案只能处理一个,以适应系统多合约的情况。
优选地,所述的S3中,所述的合约升级智能合约在检查待升级的智能合约提案发起者是否属于合约的参与者时,通过使用内置合约的方式,根据给定的待升级合约的地址查询相应的合约参与者信息。
优选地,所述的待升级的智能合约的合约参与者信息和通过此合约相关提案所需的最少同意数量信息也可以通过提案投票的方式进行更新,以适应合约用户增加或减少的情况。
优选地,所述的S2的待升级的智能合约部署过程中,所有待升级的智能合约的合约参与者信息和通过此合约相关提案所需的最少同意数量信息需要冗余备份于所有区块链节点中。
本领域普通技术人员可以理解,以上所述仅为发明的优选实例而已,并不用于限制发明,尽管参照前述实例对发明进行了详细的说明,对于本领域的技术人员来说,其依然可以对前述各实例记载的技术方案进行修改,或者对其中部分技术特征进行等同替换。凡在发明的精神和原则之内,所做的修改、等同替换等均应包含在发明的保护范围之内。

Claims (5)

  1. 一种基于智能合约的权限可控的智能合约升级方法,所述的区块链包括区块链节点和客户端,其特征在于,该方法具体包括如下步骤:
    S1:将合约升级智能合约部署在区块链节点上;
    S2:将包含合约参与者信息和通过此合约相关提案所需的最少同意数量信息的待升级的智能合约部署在区块链节点上;
    S3:任意区块链节点接收用户向合约升级智能合约提出的携带待升级的智能合约地址、新合约二进制信息的合约升级提案,合约升级智能合约检查待升级的智能合约地址是否合法、提案发起者是否属于合约的参与者,确认其是否合法,如果不合法,拒绝此次升级,如果合法,合约升级智能合约生成合约升级提案提出事件,并转发该事件至所有参与该合约的用户客户端。
    S4:用户客户端收集到所述的合约升级提案提出事件后,接收用户根据相应信息判定后的投票信息,并将该投票信息反馈至合约升级智能合约;
    S5:合约升级智能合约进行同意数量的收集,当超过所需最少同意数量,此提案通过,生成通过事件通知所有区块链节点;如果超时还未收集足够同意,放弃此提案,不进行升级;
    S6:所有区块链节点进行合约二进制替换,完成智能合约升级。
  2. 根据权利要求1所述的基于智能合约的权限可控的智能合约升级方法,所述的合约升级智能合约通过增加映射的方式同时处理多个合约的升级提案,同一时间一个合约的升级提案只能处理一个。
  3. 根据权利要求1所述的基于智能合约的权限可控的智能合约升级方法,所述的S3中,所述的合约升级智能合约在检查待升级的智能合约提案发起者是否属于合约的参与者时,通过使用内置合约的方式,根据给定的待升级合约的地址查询相应的合约参与者信息。
  4. 根据权利要求1所述的基于智能合约的权限可控的智能合约升级方法,所述的待升级的智能合约的合约参与者信息和通过此合约相关提案所需的最少同意数量信息也可以通过提案投票的方式进行更新,以适应合约用户增加或减少的情况。
  5. 根据权利要求1所述的基于智能合约的权限可控的智能合约升级方法,所述的S2的待升级的智能合约部署过程中,所有待升级的智能合约的合约参与者信息和通过此合约相关提案所需的最少同意数量信息需要冗余备份于所有区块链节点中。
PCT/CN2019/103502 2018-10-24 2019-08-30 一种基于智能合约的权限可控的智能合约升级方法 WO2020082897A1 (zh)

Priority Applications (3)

Application Number Priority Date Filing Date Title
US16/762,154 US11301233B2 (en) 2018-10-24 2019-08-30 Permission-controlled smart contract upgrade method based on smart contract
EP19874756.0A EP3712765A4 (en) 2018-10-24 2019-08-30 SMART CONTRACT UPDATE WITH ADJUSTABLE PRIVILEGE BASED ON A SMART CONTRACT
US17/685,507 US11677572B2 (en) 2018-10-24 2022-03-03 Permission-controlled smart contract upgrade method and system based on smart contract, blockchain node, and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201811242629.1 2018-10-24
CN201811242629.1A CN109358881B (zh) 2018-10-24 2018-10-24 一种基于智能合约的权限可控的智能合约升级方法

Related Child Applications (2)

Application Number Title Priority Date Filing Date
US16/762,154 A-371-Of-International US11301233B2 (en) 2018-10-24 2019-08-30 Permission-controlled smart contract upgrade method based on smart contract
US17/685,507 Continuation-In-Part US11677572B2 (en) 2018-10-24 2022-03-03 Permission-controlled smart contract upgrade method and system based on smart contract, blockchain node, and storage medium

Publications (1)

Publication Number Publication Date
WO2020082897A1 true WO2020082897A1 (zh) 2020-04-30

Family

ID=65346438

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/103502 WO2020082897A1 (zh) 2018-10-24 2019-08-30 一种基于智能合约的权限可控的智能合约升级方法

Country Status (4)

Country Link
US (1) US11301233B2 (zh)
EP (1) EP3712765A4 (zh)
CN (1) CN109358881B (zh)
WO (1) WO2020082897A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112636984A (zh) * 2020-12-28 2021-04-09 杭州趣链科技有限公司 联盟链配置更新方法、设备及计算机介质

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109358881B (zh) 2018-10-24 2020-06-16 杭州趣链科技有限公司 一种基于智能合约的权限可控的智能合约升级方法
CN110138592A (zh) * 2019-04-09 2019-08-16 苏宁易购集团股份有限公司 一种智能合约的管理方法及系统
CN110543783A (zh) * 2019-08-19 2019-12-06 湖南正宇软件技术开发有限公司 一种投票系统及其实现方法、设备及存储介质
CN110580411B (zh) * 2019-11-08 2020-03-06 支付宝(杭州)信息技术有限公司 基于智能合约的权限查询配置方法及装置
CN110855777B (zh) * 2019-11-12 2022-09-13 腾讯科技(深圳)有限公司 一种基于区块链的节点管理方法及装置
CN111062060B (zh) * 2019-11-28 2022-04-26 杭州趣链科技有限公司 一种基于智能合约的投票提案生命周期管理方法
CN111291365A (zh) * 2020-02-28 2020-06-16 上海哈世科技有限公司 联盟链系统的智能合约管理方法、装置、设备及存储介质
CN112085604A (zh) * 2020-09-10 2020-12-15 北京金山云网络技术有限公司 一种升级智能合约的方法及装置
CN112053243B (zh) * 2020-09-29 2024-01-26 中国银行股份有限公司 一种区块链中智能合约升级的方法及装置
CN113438109B (zh) * 2021-06-23 2022-06-07 预言机(重庆)科技有限公司 一种基于网络节点的区块链协议升级方法及系统

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5751909A (en) * 1994-03-17 1998-05-12 Sybase, Inc. Database system with methods for controlling object interaction by establishing database contracts between objects
CN107103473A (zh) * 2017-04-27 2017-08-29 电子科技大学 一种基于区块链的智能合约实现方法
CN107464148A (zh) * 2017-08-23 2017-12-12 众安信息技术服务有限公司 一种基于联盟链的智能合约升级方法和系统
CN107844704A (zh) * 2017-11-01 2018-03-27 济南浪潮高新科技投资发展有限公司 一种基于区块链可信智能合约加固方法
CN108170449A (zh) * 2017-12-27 2018-06-15 邵美 一种区块链系统中核心协议的升级方法
CN109358881A (zh) * 2018-10-24 2019-02-19 杭州趣链科技有限公司 一种基于智能合约的权限可控的智能合约升级方法

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10346406B2 (en) * 2016-03-28 2019-07-09 International Business Machines Corporation Decentralized autonomous edge compute coordinated by smart contract on a blockchain
US11395092B2 (en) * 2016-07-18 2022-07-19 Here Global B.V. Device location verification for updated map data
US20180123779A1 (en) * 2016-11-01 2018-05-03 Jiangang Zhang Flexible Blockchain Smart-Contract Deployment
US11397708B2 (en) * 2017-02-17 2022-07-26 Nokia Technologies Oy Voting-consensus distributed ledger
US10871948B1 (en) * 2017-03-30 2020-12-22 Wells Fargo Bank, N.A. Smart contract blockchain abstraction API
CN108196872A (zh) * 2017-12-27 2018-06-22 邵美 一种区块链系统中智能合约的升级方法

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5751909A (en) * 1994-03-17 1998-05-12 Sybase, Inc. Database system with methods for controlling object interaction by establishing database contracts between objects
CN107103473A (zh) * 2017-04-27 2017-08-29 电子科技大学 一种基于区块链的智能合约实现方法
CN107464148A (zh) * 2017-08-23 2017-12-12 众安信息技术服务有限公司 一种基于联盟链的智能合约升级方法和系统
CN107844704A (zh) * 2017-11-01 2018-03-27 济南浪潮高新科技投资发展有限公司 一种基于区块链可信智能合约加固方法
CN108170449A (zh) * 2017-12-27 2018-06-15 邵美 一种区块链系统中核心协议的升级方法
CN109358881A (zh) * 2018-10-24 2019-02-19 杭州趣链科技有限公司 一种基于智能合约的权限可控的智能合约升级方法

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112636984A (zh) * 2020-12-28 2021-04-09 杭州趣链科技有限公司 联盟链配置更新方法、设备及计算机介质

Also Published As

Publication number Publication date
CN109358881A (zh) 2019-02-19
EP3712765A4 (en) 2021-10-20
US11301233B2 (en) 2022-04-12
US20200394032A1 (en) 2020-12-17
CN109358881B (zh) 2020-06-16
EP3712765A1 (en) 2020-09-23

Similar Documents

Publication Publication Date Title
WO2020082897A1 (zh) 一种基于智能合约的权限可控的智能合约升级方法
US11257073B2 (en) Systems, methods, and apparatuses for implementing machine learning models for smart contracts using distributed ledger technologies in a cloud based computing environment
US20190334912A1 (en) System for using a distributed ledger to manage user entitlements to computing resources
CN110300984B (zh) 改变在区块链中记录的智能合约
US11128467B2 (en) Systems and methods for digital identity management and permission controls within distributed network nodes
JP5579856B2 (ja) コンピューティング・システムに対するより高い特権をユーザ識別子に一時的に提供する方法
CN102567454B (zh) 实现云计算环境中数据的粒度自主访问控制的方法和系统
CA2861222C (en) Application licensing using sync providers
US10970411B2 (en) Database preference sharing and management
US20180357444A1 (en) System, method, and device for unified access control on federated database
DE112007001321T5 (de) Ausführung eines Sichere-Umgebungs-Initialisierungsbefehls in einem Punkt-zu-Punkt-Verbindungssystem
CN104063756A (zh) 远程用电信息控制系统
JP2012510679A (ja) サンドボックス化したプラグインの実行
WO2011152468A1 (ja) アクセス制御装置及び記憶媒体
CN103763369A (zh) 一种基于san存储系统的多重权限分配方法
US20140223508A1 (en) Dynamically Constructed Capability for Enforcing Object Access Order
CN104504343A (zh) 一种基于资源粒度的权限控制方法
CN107566375A (zh) 访问控制方法和装置
EP2224369B1 (en) Method, SOA registry and SOA repository for granting a user secure access to resources of a process
CN105335664A (zh) 基于b/s模式的权限管理系统
CN102238037B (zh) 协作式目标策略细化方法
US20200052883A1 (en) Generating a representative article
Xue et al. Applying smart contracts in online dispute resolutions on a large scale and its regulatory implications
US20080028412A1 (en) Method for the administration of resources
US11677572B2 (en) Permission-controlled smart contract upgrade method and system based on smart contract, blockchain node, and storage medium

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19874756

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE