WO2021174930A1 - 一种业务处理系统、业务处理的方法、装置及设备 - Google Patents

一种业务处理系统、业务处理的方法、装置及设备 Download PDF

Info

Publication number
WO2021174930A1
WO2021174930A1 PCT/CN2020/132830 CN2020132830W WO2021174930A1 WO 2021174930 A1 WO2021174930 A1 WO 2021174930A1 CN 2020132830 W CN2020132830 W CN 2020132830W WO 2021174930 A1 WO2021174930 A1 WO 2021174930A1
Authority
WO
WIPO (PCT)
Prior art keywords
service
blockchain
business
identity information
digital identity
Prior art date
Application number
PCT/CN2020/132830
Other languages
English (en)
French (fr)
Inventor
李书博
林渝淇
孙善禄
王天雨
Original Assignee
支付宝(杭州)信息技术有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 支付宝(杭州)信息技术有限公司 filed Critical 支付宝(杭州)信息技术有限公司
Publication of WO2021174930A1 publication Critical patent/WO2021174930A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Definitions

  • This specification relates to the field of computer technology, in particular to a business processing system, business processing method, device and equipment.
  • the corresponding business processing methods can be different, and the processing mechanisms for different businesses can be implemented by corresponding servers.
  • the processing mechanism of a given business belongs to the same blockchain, the business can be completed.
  • the transfer processing mechanisms set by different institutions or organizations cannot be interconnected.
  • the transfer processing mechanisms set by different institutions or organizations can be different.
  • Use the transfer processing mechanism set by the A institution When a user who transfers money, he can only transfer money to another user who also uses the transfer processing mechanism set by institution A, and cannot transfer funds between different processing mechanisms, for example, through an application provided by a financial institution
  • the user who makes the transfer can only transfer the transferred amount to another user registered in the application through the above-mentioned application, but cannot transfer the transferred amount to a user who is not registered in the application. For this reason, it is necessary to provide a technical solution that can realize cross-chain interaction between different blockchains.
  • the purpose of the embodiments of this specification is to provide a business processing system, business processing method, device, and equipment, so as to provide a technical solution that can realize cross-chain interaction between different blockchains.
  • a business processing system provided by the embodiments of this specification, the business processing system includes an application layer subsystem, a service layer subsystem, a routing layer subsystem, and a resource layer Subsystem, wherein: the application layer subsystem obtains the service processing request of the service to be processed by the user, and forwards the service processing request to the service layer subsystem.
  • the service layer subsystem allocates a blockchain for processing the business processing request, and provides the business processing request to the blockchain so that the blockchain can perform the processing on the business processing request.
  • the message splitting process generates a resource call message and sends it to the routing layer subsystem.
  • the routing layer subsystem forwards the resource invocation message to the resource layer subsystem based on the resources scheduled to execute the service to be processed.
  • the resource layer subsystem obtains the first sub-digital identity information of the service initiator according to the digital identity information of the service initiator split from the service processing request, and obtains the first sub-digital identity information of the service initiator according to the split from the service processing request.
  • the separated digital identity information of the target party is obtained, the second sub-digital identity information of the target party is obtained, and based on the service to be processed and the first sub-digital identity information, it is determined that the service processing party executes the waiting Process the first blockchain related to the business, and determine the second blockchain related to the target party’s execution of the to-be-processed business based on the to-be-processed business and the second sub-digital identity information.
  • the first block chain and the second block chain have the authority to carry out cross-chain interaction, through the first block chain and the second block chain, based on the resource invocation message, The business to be processed is processed for cross-chain business.
  • An embodiment of this specification provides a service processing method, the method comprising: obtaining a service processing request of a service to be processed, and the service processing request is used to request to process the service to be processed between a service initiator and a target party.
  • the service processing request includes the digital identity information of the service initiator and the digital identity information of the target party. According to the digital identity information of the service initiator, obtain the first sub-digital identity information of the service initiator; and, according to the digital identity information of the target party, obtain the second sub-digital identity information of the target party.
  • the service processing request and the first sub-digital identity information determine the first blockchain related to the service processing party to perform the service to be processed; and, according to the service processing request and the second The sub-digital identity information determines the second blockchain related to the target party's execution of the service to be processed. If the first block chain and the second block chain have the authority to carry out cross-chain interaction, then the first block chain and the second block chain are used for the transaction to be processed. Conduct cross-chain business processing.
  • An embodiment of this specification provides a service processing device, the device includes: a service request module, which obtains a service processing request of a service to be processed, and the service processing request is used to request processing of all transactions between the service initiator and the target.
  • the service processing request includes the digital identity information of the service initiator and the digital identity information of the target party.
  • the digital identity obtaining module obtains the first sub-digital identity information of the service initiator according to the digital identity information of the service initiator; and, obtains the second sub-digital identity information of the target party according to the digital identity information of the target party. Sub-digital identity information.
  • the block chain determination module determines the first block chain related to the service processing party to execute the service to be processed; and, according to the service processing The request and the second sub-digital identity information determine the second blockchain related to the target party's execution of the service to be processed.
  • the cross-chain processing module if the first block chain and the second block chain have the authority to carry out cross-chain interaction, the first block chain and the second block chain are used to The to-be-processed business is processed for cross-chain business.
  • An embodiment of this specification provides a service processing device, the service processing device includes: a processor; and a memory arranged to store computer-executable instructions, which when executed, cause the processor to : Obtain the service processing request of the service to be processed, the service processing request is used to request the processing of the service to be processed between the service initiator and the target party, and the service processing request includes the digital identity information of the service initiator And the digital identity information of the target. According to the digital identity information of the service initiator, obtain the first sub-digital identity information of the service initiator; and, according to the digital identity information of the target party, obtain the second sub-digital identity information of the target party.
  • the service processing request and the first sub-digital identity information determine the first blockchain related to the service processing party to perform the service to be processed; and, according to the service processing request and the second The sub-digital identity information determines the second blockchain related to the target party's execution of the service to be processed. If the first block chain and the second block chain have the authority to carry out cross-chain interaction, then the first block chain and the second block chain are used for the transaction to be processed. Conduct cross-chain business processing.
  • Figure 1 is a schematic structural diagram of a business processing system in this specification
  • FIG. 2 is a schematic structural diagram of another business processing system in this specification.
  • Figure 3 is an embodiment of a service processing method in this specification
  • Figure 4 is another embodiment of a service processing method in this specification.
  • Figure 5 is another embodiment of a service processing method in this specification.
  • Figure 6 is an embodiment of a service processing device in this specification.
  • Fig. 7 is an embodiment of a service processing device in this specification.
  • the embodiments of this specification provide a business processing system, a business processing method, device, and equipment.
  • the embodiment of this specification provides a business processing system, which can respond to and process the business requested by the user (that is, the business to be processed), and the business processing system can be one or more different
  • the business provides corresponding services, such as payment business or shopping business, etc.
  • the business processing system can also implement cross-blockchain business processing for a business.
  • Different service processing mechanisms can be preset for different services, which can be specifically set according to actual conditions, which are not limited in the embodiment of this specification.
  • the business processing system can be divided into four subsystems based on the different functions and division of labor of the business processing system, that is, the business processing system can include application layer subsystems and services Layer subsystem, routing layer subsystem, and resource layer subsystem.
  • the hierarchical structure corresponding to the application layer subsystem can be at the highest level of the hierarchical structure corresponding to the business processing system
  • the application layer subsystem can provide a variety of different client application interfaces to provide users with a variety of different business services.
  • the hierarchical structure corresponding to the service layer subsystem can be used to allocate the blockchain for business processing to the business to be processed, etc.
  • the service layer subsystem can be connected to multiple blockchains of service providers, and multiple blockchains can be used for Handle the business processing request of the pending business.
  • the resources consumed by different blockchains to process business processing requests can be different. Therefore, the working status of different blockchains can be different. , In this way, a blockchain needs to be allocated to the received business processing request to process the business processing request.
  • the routing layer subsystem can have routing functions and can be based on devices such as routing devices or switches.
  • the routing layer subsystem can create logical links for the transmission of messages or data between nodes, and perform addressing based on digital identity information, etc., and can select the most appropriate transmission path for messages or data, etc.
  • the resource layer subsystem can be a key subsystem in the business processing system. Through the resource layer subsystem, the trigger execution and corresponding control of the business processing mechanism of the corresponding business can be realized, and the corresponding resources can be provided for the processing of the business to be processed. .
  • the application layer subsystem can be configured to obtain the service processing request of the user to be processed, that is, the application layer subsystem can communicate with the client
  • the interface between applications receives or obtains a service processing request generated by a user triggering a certain service (that is, a service to be processed) through the client application.
  • the application layer subsystem can also forward the acquired business processing request to the service layer subsystem for further processing.
  • the service layer subsystem After the service layer subsystem obtains the business processing request, it can allocate the blockchain for processing the business processing request from the multiple blockchains of the service provider, and provide the business processing request to the allocated blockchain , So that the blockchain performs message splitting processing on the business processing request, generates a resource call message and sends it to the routing layer subsystem.
  • the service layer subsystem after the service layer subsystem obtains the business processing request, it can split the content of the business processing request to obtain the corresponding split result. A corresponding resource invocation message can be generated based on the obtained split result, and the resource invocation message can be used to invoke resources required for service processing. Then, the service layer subsystem can send the above resource invocation message to the routing layer subsystem.
  • a trusted execution environment (such as TEE, etc.) can be set in advance.
  • the content of the business processing request can be split and processed based on splitting.
  • a resource call message is generated, and the resource call message is sent to the routing layer subsystem.
  • the routing layer subsystem can schedule the resources required to execute the service to be processed based on the resource invocation message provided by the service layer subsystem, and forward the resource invocation message to the resource layer subsystem based on the resources scheduled for the execution of the service to be processed. Continue processing.
  • the resource layer subsystem can obtain the digital identity information of the business initiator and the digital identity information of the target party of the business to be processed. Specifically, it can be obtained by splitting the above-mentioned business processing request, that is, splitting it from the business processing request.
  • the digital identity information of the business initiator and the digital identity information of the target can also perform cross-chain business processing for the business to be processed based on the digital identity information of the business initiator, the digital identity information of the target and the resource call message.
  • digital identity information can refer to information that identifiably portrays the business initiator or target party through digital information, that is, condensing the real identity information into a form of digital code, so as to provide information to the business initiator or target party.
  • Digital identity information can not only contain the user's birth information, individual description, biometrics and other identity coding information, but also involve multiple attributes of personal behavior information (such as transaction information or entertainment information, etc.). Digital identity information can be displayed in a variety of ways, such as DID (Decentralized Identity) and so on.
  • DID Decentralized Identity
  • the resource layer subsystem can obtain the first sub-digital identity information of the business initiator according to the digital identity information of the business initiator, where the digital identity information of the business initiator may be a certain kind of identity information based on the business initiator Definite information, for example, the digital identity information of the business initiator can be generated based on the identity document number of the business initiator, and the first sub-digital identity information can be one or more sub-identity information corresponding to the digital identity information of the business initiator, such as the first A sub-digital identity information can be generated based on the ID number of the service initiator and certain information of the service to be processed.
  • the resource layer subsystem can also obtain the target’s second sub-digital identity information based on the target’s digital identity information.
  • the target’s digital identity information and the target’s second sub-digital identity information can be obtained in a variety of ways.
  • the setting for example, can be set through the above-mentioned setting method of the digital identity information of the service initiator and the first sub-digital identity information of the service initiator.
  • Each blockchain user can set corresponding digital identity information (sub-digital identity information in this embodiment), and the sub-digital identity information can be used to determine the blockchain related to the execution of the business to be processed.
  • the resource layer subsystem can determine the first blockchain related to the service to be processed by the business processor based on the business to be processed and the first sub-digital identity information.
  • the resource layer subsystem can also determine the first blockchain related to the business to be processed and the second sub-digital identity information.
  • the sub-digital identity information determines the second blockchain related to the target party's execution of the business to be processed.
  • the embodiment of this specification provides a business processing system, including an application layer subsystem, a service layer subsystem, a routing layer subsystem, and a resource layer subsystem.
  • the application layer subsystem obtains a user's business processing request for the business to be processed, and forwards the business processing The request is sent to the service layer subsystem, and the service layer subsystem allocates the blockchain that processes the business processing request, so that the blockchain can split the information of the business processing request, generate resource call information and send it to the routing layer subsystem, the routing layer
  • the subsystem forwards the resource invocation information to the access layer subsystem based on the resources scheduled to execute the service to be processed.
  • the access layer subsystem can obtain the first sub-digital identity information of the service initiator based on the digital identity information of the service initiator, and then The first blockchain related to the business processing party's execution of the pending business can be determined. Similarly, the target's second sub-digital identity information can be obtained based on the target's digital identity information, and then the target can be determined to perform the pending business.
  • the related second blockchain then, in the case that the first blockchain and the second blockchain have the authority to conduct cross-chain interactions, the first blockchain and the second blockchain are used to treat The processing business performs cross-chain business processing, thereby realizing the cross-chain processing of the business to be processed and improving the business processing efficiency.
  • Figure 2 is a business processing system provided by an embodiment of this specification.
  • Figure 2 is only an alternative or achievable business processing system.
  • the business processing system includes all the functional units of the business processing system shown in Figure 1, and on the basis of it, it has been improved. The improvements are as follows:
  • the user terminal device may be a terminal device used by the user, such as a mobile phone or a tablet computer.
  • the client application may be pre-determined An application written in a programming language.
  • the scheduling location of the resources required by the business initiator to perform the pending service and the scheduling of the resources required by the target party to perform the pending service can be determined respectively Location, and forward the resource invocation information based on the above-mentioned scheduling location.
  • the routing layer subsystem can determine the blockchain corresponding to the business initiator according to the digital identity information of the business initiator, and can select the execution wait for the business initiator through the determined blockchain.
  • the scheduling position of the resources required to process the service similarly, the scheduling position of the resources required to execute the service to be processed can also be selected for the target in the above-mentioned manner.
  • the service processing request can be forwarded respectively based on the scheduling position of the resource required by the service initiator to execute the service to be processed and the scheduling position of the resource required by the service initiator to execute the service to be processed, so that each scheduling location can prepare corresponding resources.
  • the resource layer subsystem also provides the resources needed to execute the pending business.
  • resources can be configured in the resource layer subsystem, such as Fabric type resources, Mychain type resources, C3S type resources, or data type resources.
  • the hierarchical structure of the resource layer subsystem can be set at the bottom of the hierarchical structure of the business processing system.
  • permission checks can be performed on related information such as the business initiator and target.
  • a permission check module can be set in the business processing system.
  • the functions that can be realized by the permission check module can be realized by a pre-written application.
  • the permission check module can determine the validity of the digital identity information of the business initiator and the target party, that is, the permission check module can generate the business in a predetermined way. Then, based on the generated digital identity information, the digital identity information of the business initiator can be verified for validity. If the verification result is that the digital identity information of the business initiator is valid, the subsequent processing can be continued.
  • the subsequent processing can be stopped.
  • the permission check module can also verify the validity of the target’s digital identity information. If the verification result is that the target’s digital identity information is valid, the subsequent processing can be continued. If the verification result is the target’s digital identity information If it is invalid, the subsequent processing can be stopped.
  • the authority checking module can also determine whether the service processing request conforms to the predetermined message format rule according to the type to which the service processing request belongs.
  • the predetermined message format rule may be for a certain type of message, a predetermined format rule for this type of message.
  • the predetermined message format rule for a certain type of message may be: the message header consists of three The fields and the corresponding field values are composed. The three fields are A field, B field and C field.
  • the message format rule is not limited to the above-mentioned one method, but may also include a variety of optional processing methods, which can be specifically set according to actual conditions, which is not limited in the embodiment of this specification.
  • the type of the corresponding service processing request in order to successfully complete the subsequent business processing, it is not only necessary to verify the validity of the digital identity information of the business initiator and target, but also to verify the type of the business processing request. Specifically, it can be pre- According to different services, set the type of the corresponding service processing request, that is, for different services, the type of the corresponding service processing request may also be different. In addition, you can also set the message format rules for business processing requests for different types.
  • the permission checking module can analyze the business processing request to determine the type of the business processing request, and can obtain the message format rules corresponding to the business processing request based on the determined type, and then can perform the business processing request and the acquisition If the service processing request matches the predetermined message format rule, it indicates that the service processing request conforms to the predetermined message format rule; otherwise, the service processing request does not conform to the predetermined message format rule.
  • the permission check module can also perform permission checks on cross-chain interactions, that is, the permission check module can find the first blockchain from the pre-stored cross-chain interaction permission information Cross-chain interaction authority information for cross-chain interaction with the second blockchain.
  • the cross-chain interaction authority information may be pre-set information about the authority for cross-blockchain interaction between multiple blockchains, for example, a cross-chain pre-stored blockchain 1 and blockchain 2
  • the interaction authority information indicates that cross-chain interaction can be carried out between blockchain 1 and blockchain 2.
  • the blockchain that can perform cross-chain interaction can be determined according to the actual situation, and then the cross-chain interaction authority information can be preset for the blockchain that performs cross-chain interaction, and the set cross-chain interaction authority information can be set Store it.
  • the permission check module can find out whether there is cross-chain interaction permission information for cross-chain interaction between the first blockchain and the second blockchain from the pre-stored cross-chain interaction permission information. If the first block is found The cross-chain interaction authority information for the cross-chain interaction between the chain and the second blockchain can be followed by subsequent processing. If the cross-chain interaction between the first blockchain and the second blockchain is not found The interaction authority information indicates that cross-chain interaction cannot be carried out between the first block chain and the second block chain.
  • the above-mentioned permission check module exists as a whole, that is, the permission check module can be set in the service layer subsystem or the resource layer subsystem, and can be specifically set according to actual conditions, which is not limited in the embodiment of this specification. In practical applications, the structure of the permission check module is not limited to the above-mentioned way.
  • the permission check module can also be divided into two units according to the function and division of labor of the permission check module. That is, the permission check module can include a first permission check unit and a second permission check unit.
  • the second permission check unit wherein the first permission check unit can be set in the service subsystem or the resource layer subsystem, and the second permission check unit is set in the resource layer subsystem.
  • the first authority checking unit may be configured to determine the validity of the digital identity information of the service initiator and target, and determine whether the service processing request conforms to the predetermined message format rule according to the type of the service processing request.
  • the second permission checking unit may be configured to search for cross-chain interaction permission information for cross-chain interaction between the first blockchain and the second blockchain from the pre-stored cross-chain interaction permission information.
  • the business processing request may also include a verifiable statement, where the verifiable statement may be used to describe certain attributes of entities such as individuals, organizations, etc. A kind of normative information.
  • the verifiable statement can realize the trust based on evidence. It can prove to other entities that the information of certain attributes of the current entity is credible through the verifiable statement.
  • the first permission checking unit can also be configured to verify the validity of the verifiable statement, and after the verification is passed, allocate the blockchain for processing the executed business processing request, and provide the business processing request Give the corresponding blockchain.
  • the resource layer subsystem may also include a message processing module, the above-mentioned second permission checking unit may be connected to the message processing module, and the message processing module is configured to select from at least one first preselected block according to the type of the resource call message.
  • the chain obtain the first pre-selected blockchain that processes the above-mentioned types of messages, and obtain the first pre-selected blockchain that processes the above-mentioned types of messages as the first pre-selected blockchain related to the business processor performing the service to be processed And/or, according to the type of the resource call message, from at least one second preselected blockchain, obtain a second preselected blockchain for processing the above-mentioned types of messages, and obtain the second preselected for processing the above-mentioned types of messages
  • the block chain obtains the second pre-selected block chain related to the target party's execution of the pending business.
  • a module that implements the above-mentioned cross-chain business processing can be set in the resource layer subsystem.
  • the cross-blockchain interaction module can perform cross-chain business processing on the business to be processed through the first block chain and the second block chain.
  • the cross-blockchain interaction module may include one or more anchors and one or more repeaters.
  • the anchor can be configured with the client application corresponding to the first block chain, so that the anchor can establish a connection with the first block chain, and the repeater can be configured with the second block chain corresponding
  • the client application enables the repeater to establish a connection with the second blockchain.
  • the client application configured on the anchor and the repeater respectively, the configuration of the anchor and the repeater is lightweight, specifically, when any anchor is selected by the first blockchain, any anchor
  • the client application of the first blockchain is configured in to monitor the cross-chain request on the first blockchain, and the cross-chain request is determined based on the business to be processed.
  • any repeater is configured with a client application of the second blockchain.
  • a cross-chain request can be created on the first blockchain, and the request object of the cross-chain request is the second blockchain.
  • the anchor can monitor the cross-chain request created on the first blockchain, and based on the request object indicated by the cross-chain request as the second blockchain, And there is a connection relationship between the second blockchain and the relay, and the cross-chain request is transmitted to the relay, and the relay further transmits the cross-chain request to the second blockchain.
  • the repeater can retrieve the response data formed by the second blockchain in response to the above cross-chain request, and return the response data to the anchor, and the anchor The response data can be further returned to the first blockchain, thereby completing the cross-chain interaction between the first blockchain and the second blockchain.
  • the repeater In addition to the response data, the repeater also retrieves the corresponding on-chain certification from the second blockchain, and the repeater can verify the response data based on the on-chain certification, such as determining that the response data exists in the second area
  • the blockchain ledger of the block chain, etc., this manual does not limit this.
  • the repeater is equipped with trusted certification conversion technology, so that after verifying the response data based on the on-chain certification, if the verification result is passed, the repeater can generate a repeater certificate based on the trusted certification conversion technology. It is equivalent to converting the on-chain proof into a repeater proof.
  • the repeater returns the response data and the repeater certificate to the anchor, and the anchor further returns to the first blockchain; among them, the repeater can pre-publish the root of trust, and the first blockchain
  • the root of trust can be obtained and deployed in advance, so that after the first blockchain obtains the above-mentioned response data and the relay certificate, the response data and the relay certificate can be verified based on the root of trust to determine the relay
  • the response data provided has been verified and passed.
  • each repeater in this manual can be regarded as "a device” logically, so that each repeater obtains the cross-chain data returned by the callee's blockchain and the on-chain certification , Based on the verification results of the cross-chain data and the on-chain proof, the on-chain proof can be converted into a credible relay proof, and the number of the relay proof is only one.
  • Each repeater can actually run on a single electronic device, such as a physical server containing an independent host, PC, laptop, mobile phone, etc.; or, each repeater can run on a device composed of multiple electronic devices On clusters, such as virtual servers carried by host clusters; this manual does not limit this.
  • a direct connection is established between the anchor and the repeater in the cross-blockchain interaction module; and in other embodiments, a cross-blockchain interaction module that provides bridging function is also provided, which can be set by bridging
  • the bridge is connected to the anchor and the repeater respectively to realize the bridging function between the anchor and the repeater.
  • the cross-blockchain interaction module also includes at least one bridge; wherein any bridge is respectively connected to any anchor and any repeater, and is used to forward the cross-chain request provided by any anchor to Any repeater, and forward the response data and repeater certification provided by any repeater to any anchor.
  • the structure of the business processing system shown in Figures 1 and 2 is only an optional and achievable system structure.
  • the business processing system described in the embodiment of this specification is The structure is not only limited to the structure in the above drawings, but can also include other various achievable structures, which can be specifically set according to actual conditions or functions required by the business processing system.
  • the embodiments of this specification are not limited to this. Make a limit.
  • the embodiment of this specification provides a business processing system, including an application layer subsystem, a service layer subsystem, a routing layer subsystem, and a resource layer subsystem.
  • the application layer subsystem obtains a user's business processing request for the business to be processed, and forwards the business processing
  • the request is sent to the service layer subsystem, and the service layer subsystem allocates the blockchain for processing the business processing request, so that the blockchain can split the information of the business processing request, generate resource call information and send it to the routing layer subsystem, the routing layer sub-system
  • the system forwards the resource call information to the access layer subsystem based on the resources scheduled to execute the pending service.
  • the access layer subsystem can obtain the first sub-digital identity information of the service initiator based on the digital identity information of the service initiator.
  • the business performs cross-chain business processing, thereby realizing the cross-chain processing of the business to be processed and improving the business processing efficiency.
  • the embodiment of this specification provides a business processing method
  • the execution subject of the method may be the business processing system provided in the above-mentioned embodiment 1 or the embodiment 2, and the service processing system may be implemented based on a server, where ,
  • the server can be an independent server, or a server cluster composed of multiple servers.
  • the business processing system can implement cross-blockchain business processing for a certain business
  • the above-mentioned blockchain can be a blockchain used to provide a certain business (such as a business to conduct a transaction, etc.) services.
  • the method may specifically include step S302 to step S308.
  • step S302 a business processing request of the business to be processed is obtained, the business processing request is used to process the business to be processed between the business initiator and the target, and the business processing request includes the digital identity information of the business initiator and the target. Party’s digital identity information.
  • the business to be processed can be any business that needs to be processed, such as financial business such as payment business, transfer business, etc., or business such as sending of documents or information.
  • the service initiator may be the party that triggers or initiates the execution of the service to be processed, for example, it may be the user who initiates the transfer service.
  • the target party may be the party that executes the target for the service to be processed. For example, if the business initiator is the user who initiates the money transfer service, the target party may be the party to which the user transfers money.
  • the user A needs to transfer 50 yuan to user B, then the service initiator can be user A, and the target party can be user B.
  • the corresponding business processing mechanisms can be different, and the processing mechanisms for different businesses can be implemented by the corresponding servers provided with the business processing systems described above.
  • there can be different processing mechanisms for the same business and , Often only when the business processing mechanisms set by different institutions or organizations belong to the same blockchain, can the business be completed, and under normal circumstances, the business processing mechanisms set by different institutions or organizations cannot be interconnected.
  • the transfer processing mechanism set by different institutions or organizations may be different. When users use the transfer processing mechanism set by the A institution to transfer money, they can only transfer funds that are also set by the A institution. Another user of the processing mechanism of the financial institution transfers money, but the transfer between different processing mechanisms cannot be realized.
  • a user who transfers money through an application provided by a financial institution can only transfer the transferred amount to Another user registered in the application cannot transfer the transferred amount to a user who is not registered in the application. For this reason, it is necessary to provide a technical solution that can realize cross-chain interaction between different blockchains.
  • the embodiment of this specification provides an optional technical solution, which may specifically include the following content:
  • a client application applied to the blockchain system can be developed, and the customer
  • the terminal application can be provided with different business entrances, which can be implemented in a variety of ways, for example, through hyperlinks or redirects.
  • the client application installed in the terminal device can be started, and the client application can be selected from the processing entry provided by the client application.
  • the terminal device of the service initiator can obtain information related to the service to be processed, and can generate service processing requests based on the obtained information.
  • the terminal device of the service initiator can be selected based on the service initiator The processing entry for the business processing request.
  • the client application and the business processing system exchange data through a preset interface, and the terminal device can send the business processing request to the business processing system through the preset interface, and the application layer subsystem in the business processing system can obtain The business processes the request.
  • the business processing request can be used to process the pending business between the business initiator and the target party, and the business processing request includes the digital identity information of the business initiator and the digital identity information of the target.
  • digital identity information can be displayed in a variety of ways, such as DID (Decentralized Identity) and so on.
  • step S304 obtain the first sub-digital identity information of the service initiator according to the digital identity information of the service initiator; and obtain the second sub-digital identity information of the target party according to the digital identity information of the target party.
  • the digital identity information of the business initiator can be information determined based on a certain type of identity information of the business initiator.
  • the digital identity information of the business initiator can be generated based on the identity document number of the business initiator, and the first sub-digital identity
  • the information may be one or more sub-identity information corresponding to the digital identity information of the service initiator.
  • the first sub-digital identity information may be generated based on the ID number of the service initiator and certain information of the service to be processed.
  • the digital identity information of the target party can be information determined based on a certain kind of identity information of the target party.
  • the digital identity information of the target party can be generated based on the identity document number of the target party, and the second sub-digital identity information can be the target party’s digital identity information.
  • One or more sub-identity information corresponding to the digital identity information, for example, the second sub-digital identity information may be generated based on the ID number of the target party and certain information of the service to be processed.
  • a sub-digital identity information can be set for each user based on the type of business processing mechanism, so that when users use different business processing mechanisms, the corresponding sub-digital identity information can be used.
  • the user’s sub-identity information is different, and multiple sub-identity information is obviously not conducive to the user’s storage and memory. For this reason, unique digital identity information can be set for each user, and the Each sub-digital identity information of a user corresponds to the digital identity information of the user, that is, for a certain user, it may include one digital identity information and at least one sub-digital identity information.
  • the business processing system obtains the digital identity information of the business initiator and the target party. After the digital identity information, the first sub-digital identity information of the service initiator and the second sub-digital identity information of the target party can be obtained respectively through the corresponding relationship set above.
  • step S306 according to the above-mentioned service processing request and the first sub-digital identity information, determine the first blockchain related to the service processing party performing the service to be processed; and, according to the service processing request and the second sub-digital identity information, Determine the second blockchain related to the target's execution of the business to be processed.
  • the blockchain nodes that perform business processing through the same business processing mechanism can be in the same blockchain, and the blockchain nodes that perform business processing by different business processing mechanisms can be in different blockchains, such as
  • a blockchain node that performs business processing based on the business processing mechanism corresponding to the application provided by a financial institution can build a blockchain, and the business processing is based on some other business processing mechanism other than the above-mentioned application
  • Blockchain nodes can build another blockchain and so on.
  • the same information or rules can be used to generate sub-digital identity information.
  • the service processing system can obtain the first sub-digital identity information capable of processing the above-mentioned service processing request (or the service to be processed, etc.) from the first sub-digital identity information obtained above, and then can obtain the first sub-digital identity information based on the obtained first sub-digital identity information.
  • the first sub-digital identity information determines the block chain to which the first sub-digital identity information belongs, and the obtained block chain can be used as the business processor to execute the first block chain related to the business to be processed.
  • the business processing system can obtain the second sub-digital identity information capable of processing the aforementioned service to be processed (or the aforementioned service processing request, etc.) from the obtained second sub-digital identity information, and then can be based on the obtained first sub-digital identity information.
  • the second sub-digital identity information determines the block chain to which the second sub-digital identity information belongs, and the obtained block chain can be used as the second block chain related to the target party to execute the service to be processed.
  • step S308 if the first block chain and the second block chain have the authority to conduct cross-chain interaction, the cross-chain business processing of the business to be processed is performed through the first block chain and the second block chain.
  • the business processing system After the business processing system obtains the first blockchain related to the business processing party to execute the service to be processed and the second blockchain related to the target party to execute the service to be processed through the processing of the above step S306, it can obtain the permission table from the above record Find the relevant information between the first block chain and the second block chain that has the authority to conduct cross-chain interactions. If it is not found from the above-recorded permission table that the first block chain and the second block chain have the permission to carry out cross-chain interaction, it means that the first block chain and the second block chain cannot be cross-chained. Chain interaction, at this time, a notification message of a failure to execute the service to be processed can be generated and sent to the service initiator.
  • the first block chain and the second block chain can be used to process the business
  • the business processing system can provide business processing requests to the first blockchain, and the first blockchain can be based on the processing mechanism of the business to be processed and the corresponding resources in the first blockchain.
  • the processing request is processed, and then the processing result can be sent to the second blockchain.
  • the second blockchain can process the business based on the processing result sent by the first blockchain based on the corresponding resources in the second blockchain
  • the request is processed, and the corresponding processing result is obtained. Then, the processing result can be provided to the business initiator and the target party respectively.
  • the embodiment of this specification provides a business processing method.
  • the digital identity information of the business initiator and the digital identity information of the target can be carried in the corresponding business processing request, so that it can be based on
  • the digital identity information of the business initiator obtains the first sub-digital identity information of the business initiator, which can then determine the first blockchain related to the business processor executing the service to be processed.
  • it can be based on the digital identity information of the target party ,
  • To obtain the second sub-digital identity information of the target and then to determine the second blockchain related to the target's execution of the business to be processed, and then, there is a cross-chain link between the first blockchain and the second blockchain.
  • cross-chain business processing is performed on the business to be processed through the first blockchain and the second blockchain, thereby realizing the cross-chain processing of the business to be processed and improving the efficiency of business processing.
  • the embodiment of this specification provides a business processing method.
  • the execution subject of the method may be the business processing system provided in the above-mentioned Embodiment 1 or Embodiment 2.
  • the business processing system may be constructed based on a server, wherein ,
  • the server can be an independent server, or a server cluster composed of multiple servers.
  • the business processing system can implement cross-blockchain business processing for a certain business, and the above-mentioned blockchain can be a blockchain used to provide a certain business (such as a business to conduct a transaction, etc.) services.
  • the method may specifically include step S402 to step S420.
  • a service processing request of the service to be processed is obtained.
  • the service processing request is used to request to process the service to be processed between the service initiator and the target.
  • the service processing request includes the digital identity information of the service initiator and the target. Party’s digital identity information.
  • the business processing request can also include the type of the business processing request, such as transfer, scan code payment, or offline payment.
  • the category, etc. can be specifically set according to the actual situation, which is not limited in the embodiment of this specification.
  • step S404 the validity of the digital identity information of the service initiator and target is determined, and whether the service processing request conforms to the predetermined message format rule is determined according to the type of the service processing request.
  • the business processing system can extract the digital identity information of the business initiator and the target party from the business processing request, in order to ensure the digital identity information carried in the business processing request The validity of the digital identity information of the business initiator and the target party can be verified separately.
  • the specific verification methods can be various.
  • each digital identity information in the blockchain system can be constructed according to certain rules (such as It can be calculated by a certain algorithm based on the user’s ID number and business code, etc.).
  • the permission check module in the business processing system can obtain the relevant information of the business initiator based on the rule (such as the business initiation in the above example).
  • the ID number of the party and the business code of the business to be processed, etc.), and then the digital identity information of the business initiator can be constructed based on the acquired information, and the constructed digital identity information can be combined with the business initiator carried in the business processing request. If the two are the same, it indicates that the digital identity information of the business initiator is valid. If the two are different, it can be determined that the digital identity information of the business initiator is invalid. The validity of the digital identity information of the target party can be verified in the above-mentioned manner, so as to determine the validity of the digital identity information of the target party.
  • the verification of digital identity information can also be achieved in a variety of ways.
  • the following provides an optional verification method based on the content of the digital identity information, for example, the characters contained in the digital identity information Number, character value or value range of one or more positions in digital identity information, for example, digital identity information consists of 20 characters, among which the characters in the first and second positions are 26 English letters Any two of them, and are related to the geographic location of the corresponding user.
  • the third position-the twentieth position are composed of numbers, the third position is a fixed value (such as 1, etc.), and the value range of the fourth position is [1,5]+In this way, the above verification can be performed on the digital identity information of the business initiator to determine whether the digital identity information of the business initiator complies with the above set rules. If it does, the digital identity information of the business initiator can be determined The identity information is valid, otherwise, it can be determined that the digital identity information of the business initiator is invalid. The validity of the digital identity information of the target party can be verified in the above-mentioned manner, so as to determine the validity of the digital identity information of the target party.
  • step S406 if the digital identity information of the business initiator and the target party are valid, and the service processing request complies with the predetermined message format rules, the first sub-digital identity information of the business initiator is obtained according to the digital identity information of the business initiator , And, according to the digital identity information of the target, obtain the second sub-digital identity information of the target.
  • the validity of the digital identity information of the business initiator and the target party and whether the service processing request conforms to the predetermined message format type through the above verification methods are used to determine the validity of the digital identity information of the business initiator and the target party, and After the service processing request meets the predetermined message format rules, the corresponding sub-digital identity information can be obtained based on the digital identity information.
  • the user's digital identity information and the corresponding sub-digital identity information can be preset in the blockchain system Wait.
  • the digital identity information of the business initiator can be used to obtain the sub-digital identity information of one or more business initiators.
  • the digital identity information of the target can also be used to obtain the sub-digital identity information of one or more target parties.
  • the digital identity information of a certain user can be preset, and the corresponding sub-digital identity information can be set for the user according to different services. After it is determined that the digital identity information of the business initiator and the target party is valid, and the service processing request conforms to the predetermined message format rules, based on the digital identity information of the business initiator, the first child of the business initiator can be obtained from Table 1 above. Digital identity information and the target’s second sub-digital identity information. If the business initiator’s digital identity information is A123, the first sub-digital identity information can include AA1123865, AA2123886, and AA3123689. If the target’s digital identity information is B885, Then the second sub-digital identity information may include BB1885211, BB2885985, BB3885666, and BB4885877.
  • the corresponding blockchain can also be allocated to the business processing request through the allocated blockchain
  • the processing of the business processing request may specifically include the following content: allocating a blockchain for processing the above business processing request, and providing the business processing request to the blockchain, so that the business processing request on the blockchain Process the request to split the message and generate a resource call message.
  • the service layer subsystem in the business processing system can obtain multiple blockchains of the service provider after receiving the business processing request, and obtain the current working status of each blockchain to determine each block The current load situation of the chain.
  • the blockchain for processing the above-mentioned business processing request can be allocated. For example, a blockchain with a smaller load can be allocated for the business processing request.
  • the business processing request can be provided to the allocated blockchain, and the blockchain can perform message split processing on the business processing request, and can generate a resource call message from the split information.
  • the business processing request may also include a verifiable statement , The validity of the verifiable statement is verified; if the verification is passed, the blockchain for processing the business processing request is allocated, and the business processing request is provided to the blockchain.
  • the business processing request can also include a verifiable statement. Based on this, the validity of the verifiable statement can be verified.
  • the specific verification process can include multiple, for example, the fields of each field in the verifiable statement can be calculated
  • the hash value of the value, and the Merkel root of the hash value of each field value can be calculated through the Merkel tree mechanism, and the calculated Merkel root can be compared with the Merck root corresponding to the verifiable statement provided in advance. Ergen compares, if the two are different, it means that the verifiable claim is invalid, and if the two are the same, it means that the verifiable claim is valid.
  • the foregoing verification method is only an optional or achievable method, and various other methods may also be included in practical applications, which may be specifically set according to actual conditions, which are not limited in the embodiments of the present specification.
  • the digital identity information of the service initiator and the digital identity information of the target can also be separated from the service processing request. After obtaining the digital identity information of the service initiator and the digital identity information of the target through the above message splitting processing, the following related processing can also be performed. For details, please refer to the processing of step S406 and step S408.
  • step S408 the first pre-selected blockchain corresponding to each first sub-digital identity information is obtained, and at least one first pre-selected blockchain is obtained.
  • each sub-digital identity information can correspond to a blockchain, that is, users belonging to the same blockchain have similar sub-digital identity information. Therefore, the blockchain to which each first sub-digital identity information belongs can be determined. And the definite block chain can be used as the first pre-selected block chain, so that at least one first pre-selected block chain can be obtained.
  • step S410 from at least one first pre-selected blockchain, obtain the first pre-selected blockchain that matches the service to be processed, and determine the obtained first pre-selected blockchain that matches the service to be processed Execute the first blockchain related to the business to be processed for the business processor.
  • each first preselected blockchain can be analyzed, and the analysis can determine what each first preselected blockchain can handle The type of the business to be processed, the identifier of the business that can be processed, and other related information. Then, based on the above information, the first pre-selected blockchain that can process the business to be processed can be determined, and the determined first pre-selected blockchain can be As the first pre-selected blockchain that matches the business to be processed, the acquired first pre-selected blockchain that matches the business to be processed can be determined as the first block related to the business processor performing the business to be processed chain.
  • step S410 can be implemented in the above-mentioned manner, but also in many other ways.
  • the following provides an optional processing method, which can specifically include the following content: call according to the resource
  • the type of the message belongs to, from at least one first pre-selected blockchain, the first pre-selected blockchain that processes the above-mentioned types of messages is obtained, and the acquired first pre-selected blockchain that processes the above-mentioned types of messages is obtained as the same as the to-be-selected blockchain.
  • the first pre-selected blockchain that matches the processing business.
  • the resource invocation message can be analyzed to determine the type of the resource invocation message, and then the first pre-selected blockchain that can process the above-mentioned types of messages can be obtained from at least one first pre-selected blockchain,
  • the acquired first pre-selected blockchain that processes the above-mentioned types of messages may be acquired as the first pre-selected blockchain that matches the service to be processed. It should be noted that if there are multiple first pre-selected blockchains capable of processing the above-mentioned types of messages, one of the first pre-selected blockchains can be selected as the first pre-selected blockchain that matches the service to be processed.
  • step S412 the second pre-selected blockchain corresponding to each second sub-digital identity information is obtained, and at least one second pre-selected blockchain is obtained.
  • each sub-digital identity information can correspond to a blockchain, that is, users belonging to the same blockchain have similar sub-digital identity information. Therefore, it can be determined to which each second sub-digital identity information belongs Blockchain, and the definite block chain can be used as the second preselected block chain, so that at least one second preselected block chain can be obtained.
  • step S414 from at least one second pre-selected blockchain, a second pre-selected blockchain that matches the service to be processed is obtained, and the obtained second pre-selected blockchain that matches the service to be processed is determined Execute the second blockchain related to the business to be processed for the business processor.
  • each second preselected blockchain can be analyzed, and the analysis can determine what each second preselected blockchain can handle The type of the service to be processed, the identifier of the service that can be processed, the type of the service to be processed that can be responded to, and other related information. Then, based on the above information, it can be determined that the second resource that can respond to the above-mentioned resource invocation message or can process the service to be processed can be determined.
  • Pre-select the blockchain, and the determined second pre-selected blockchain can be used as the second pre-selected blockchain that matches the business to be processed, and the acquired second pre-selected blockchain that matches the business to be processed can be obtained Determine the second blockchain related to the business processor to execute the pending business.
  • step S414 above can be implemented in the above-mentioned manner, and can also be implemented in a variety of other ways.
  • the following provides an optional processing method, which may specifically include the following: call based on the resource
  • the type of the message belongs to, from at least one of the second pre-selected blockchains, the second pre-selected blockchain that processes the above-mentioned types of messages is acquired, and the acquired second pre-selected blockchain that processes the above-mentioned types of messages is acquired as The second pre-selected blockchain that matches the business to be processed.
  • the resource call message can be analyzed to determine the type of the resource call message, and then a second preselected block that can process or respond to the above-mentioned types of messages can be obtained from at least one second preselected blockchain Chain, the acquired second pre-selected blockchain for processing the above-mentioned types of messages can be acquired as the second pre-selected blockchain that matches the service to be processed. It should be noted that if there are multiple second pre-selected blockchains that can process the above-mentioned types of messages, one second pre-selected blockchain can be selected from them as the second pre-selected blockchain that matches the service to be processed.
  • step S416 from pre-stored cross-chain interaction authority information, search for cross-chain interaction authority information for cross-chain interaction between the first blockchain and the second blockchain.
  • step S410 and step S414 it can be found from the pre-stored cross-chain interaction authority information whether there is a first block chain and Cross-chain interaction authority information for cross-chain interaction between the second blockchain. If you find the cross-chain interaction authority information for cross-chain interaction between the first blockchain and the second blockchain, you can execute the following In the processing of step S418, if the cross-chain interaction authority information for the cross-chain interaction between the first blockchain and the second blockchain is not found, it indicates that the first blockchain and the second blockchain cannot be performed Cross-chain interaction.
  • step S4108 if cross-chain interaction authority information for cross-chain interaction between the first block chain and the second block chain is found, it is determined that the first block chain and the second block chain are capable of performing cross-chain interaction. Permission for chain interaction.
  • step S420 cross-chain business processing is performed on the business to be processed through the first block chain and the second block chain.
  • the processing of the above step S420 can be various.
  • the following provides an optional processing method, that is, based on the above distribution of the blockchain for processing the above business processing request, and the processing of the business processing request is provided to the blockchain for processing
  • the above step S420 may specifically include: invoking the corresponding resource according to the above resource invocation message; through the first block chain and the second block chain, based on the invoked resource, cross-chain business processing is performed on the business to be processed.
  • step S420 may be various, and an optional processing method is provided below, which specifically may include the processing of the following steps A2 to A8.
  • step A2 the cross-chain request on the first blockchain is obtained.
  • the cross-chain request can be determined based on the above pending business. Specifically, the digital identity information of the business initiator and the target's digital identity information separated from the business processing request can be obtained, as well as relevant information about the business to be processed , And can generate cross-chain requests based on the above information.
  • step A4 a request is initiated to the second blockchain based on the above-mentioned cross-chain request, and the response data returned by the second blockchain and the on-chain proof are received.
  • the response data may be data related to the business to be processed.
  • the on-chain proof can verify the response data, for example, it can be determined that the response data exists in the blockchain ledger of the second blockchain.
  • step A6 the above-mentioned response data is verified according to the above-mentioned on-chain proof, and corresponding proof information is generated according to the configured trusted proof conversion technology after the verification is passed.
  • the generated corresponding certification information may be the repeater certification mentioned in the above embodiment.
  • Trusted certification conversion technology can be such as TEE (Trusted Execution Environment, trusted execution link technology) technology, POA (Proof of Authority, authority certification consensus) technology, MPC (Secure Multi-Party Computation, secure multi-party computing) technology, zero-knowledge proof (Zero-Knowledge Proof) technology, etc. This manual does not limit it. Since the performance models and security boundaries implemented by different trusted certification conversion technologies are different, they can meet application requirements in different scenarios.
  • step A8 the above-mentioned response data and the above-mentioned certification information are returned to the first blockchain to perform cross-chain service processing on the service to be processed.
  • step S420 After the processing of the above step S420 is completed, the processing may be continued in the following manner, which may specifically include the following content: sending the preset root of trust to the first blockchain, so that the first blockchain responds to the above based on the root of trust Data and certification information are verified.
  • the embodiment of this specification provides a business processing method.
  • the digital identity information of the business initiator and the digital identity information of the target can be carried in the corresponding business processing request, so that it can be based on
  • the digital identity information of the business initiator obtains the first sub-digital identity information of the business initiator, which can then determine the first blockchain related to the business processor executing the service to be processed.
  • it can be based on the digital identity information of the target party ,
  • To obtain the second sub-digital identity information of the target and then to determine the second blockchain related to the target's execution of the business to be processed, and then, there is a cross-chain link between the first blockchain and the second blockchain.
  • cross-chain business processing is performed on the business to be processed through the first blockchain and the second blockchain, thereby realizing the cross-chain processing of the business to be processed and improving the efficiency of business processing.
  • the embodiment of this specification provides a business processing method.
  • the execution subject of the method may be the business processing system provided in the above-mentioned Embodiment 1 or Embodiment 2.
  • the business processing system may be constructed based on a server, wherein ,
  • the server can be an independent server, or a server cluster composed of multiple servers.
  • the business processing system can implement cross-blockchain business processing for a certain business, and the above-mentioned blockchain can be a blockchain used to provide a certain business (such as a business to conduct a transaction, etc.) services.
  • the method may specifically include step S502 to step S516.
  • a service processing request of the service to be processed is obtained.
  • the service processing request is used to request to process the service to be processed between the service initiator and the target.
  • the service processing request includes the digital identity information of the service initiator and the target. Party’s digital identity information.
  • the business processing request can also include the type of the business processing request, such as transfer, scan code payment, or offline payment.
  • the category, etc. can be specifically set according to the actual situation, which is not limited in the embodiment of this specification.
  • step S504 the validity of the digital identity information of the service initiator and target is determined, and whether the service processing request conforms to the predetermined message format rule is determined according to the type of the service processing request.
  • step S506 if the digital identity information of the business initiator and the target party are valid, and the service processing request complies with the predetermined message format rules, the first sub-digital identity information of the business initiator is obtained according to the digital identity information of the business initiator , And, according to the digital identity information of the target, obtain the second sub-digital identity information of the target.
  • the corresponding blockchain can also be allocated to the business processing request through the allocated blockchain
  • the processing of the business processing request may specifically include the following content: allocating a blockchain for processing the above business processing request, and providing the business processing request to the blockchain, so that the business processing request on the blockchain Process the request to split the message and generate a resource call message.
  • the business processing request may also include a verifiable statement , The validity of the verifiable statement is verified; if the verification is passed, the blockchain for processing the business processing request is allocated, and the business processing request is provided to the blockchain.
  • step S508 according to the above-mentioned service to be processed, the first sub-digital identity information, and the second sub-digital identity information, the type of pre-selected middleware required to execute the service to be processed between the service initiator and the target is determined.
  • the middleware type can be the type of middleware that needs to be used or experienced in the process of executing the service to be processed.
  • the middleware type can be set according to the actual situation. For example, it can include Mychain, Fabric, C3S, and Data.
  • the first sub-digital identity information and the second sub-digital identity information are obtained through the above steps.
  • the service to be processed is executed until reaching the second sub-digit of the target party.
  • the digital identity information obtains the middleware type required in the process of executing the service to be processed, and the obtained middleware type can be used as the pre-selected middleware type.
  • step S510 according to the determined pre-selected middleware type, the access authority corresponding to the first sub-digital identity information, and the access authority corresponding to the second sub-digital identity information, the first area related to the business processor performing the service to be processed is determined respectively.
  • the block chain and the target party execute the second block chain related to the business to be processed.
  • the access permission corresponding to the first sub-digital identity information may include the access permission of the business initiator corresponding to the first sub-digital identity information to the middleware corresponding to the pre-selected middleware type
  • the access permission corresponding to the second sub-digital identity information may include The access authority of the target party corresponding to the second sub-digital identity information to the middleware corresponding to the pre-selected middleware type.
  • it can be based on the determined pre-selected middleware type, the access authority of the business initiator corresponding to the first sub-digital identity information to the corresponding middleware of each type, and the target party corresponding to each type of the second sub-digital identity information.
  • Middleware access rights from which the business initiator corresponding to the first sub-digital identity information and the target party corresponding to the second sub-digital identity information are selected as middleware types that have access rights, and the business processing can be determined based on the selected middleware type
  • step S512 from pre-stored cross-chain interaction authority information, search for cross-chain interaction authority information for cross-chain interaction between the first blockchain and the second blockchain.
  • the cross-chain interaction authority information may be pre-set information about the authority for cross-blockchain interaction between multiple blockchains, for example, a cross-chain pre-stored blockchain 1 and blockchain 2
  • the interaction authority information indicates that cross-chain interaction can be carried out between blockchain 1 and blockchain 2.
  • step S51 if cross-chain interaction authority information for cross-chain interaction between the first block chain and the second block chain is found, it is determined that the first block chain and the second block chain are capable of performing cross-chain interaction. Permission for chain interaction.
  • step S5166 cross-chain business processing is performed on the business to be processed through the first block chain and the second block chain.
  • the processing of the above step S516 can be various.
  • the following provides an optional processing method, which may specifically include: invoking the corresponding resource according to the above resource invocation message; through the first blockchain and the second blockchain, based on the invocation Resources, cross-chain business processing for the business to be processed.
  • step S516 may be various, and an optional processing method is provided below, which specifically may include the processing of the following steps B2 to B8.
  • step B2 the cross-chain request on the first blockchain is obtained.
  • the cross-chain request can be determined based on the above pending service.
  • step A4 a request is initiated to the second blockchain based on the above-mentioned cross-chain request, and the response data returned by the second blockchain and the on-chain proof are received.
  • step A6 the above-mentioned response data is verified according to the above-mentioned on-chain proof, and corresponding proof information is generated according to the configured trusted proof conversion technology after the verification is passed.
  • step A8 the above-mentioned response data and the above-mentioned certification information are returned to the first blockchain to perform cross-chain service processing on the service to be processed.
  • step S516 After the processing of the above step S516 is completed, the processing can also be continued in the following manner, which may specifically include the following content: sending the preset root of trust to the first blockchain, so that the first blockchain responds to the foregoing response according to the root of trust Data and certification information are verified.
  • the embodiment of this specification provides a business processing method.
  • the digital identity information of the business initiator and the digital identity information of the target can be carried in the corresponding business processing request, so that it can be based on
  • the digital identity information of the business initiator obtains the first sub-digital identity information of the business initiator, which can then determine the first blockchain related to the business processor executing the service to be processed.
  • it can be based on the digital identity information of the target party ,
  • To obtain the second sub-digital identity information of the target and then to determine the second blockchain related to the target's execution of the business to be processed, and then, there is a cross-chain link between the first blockchain and the second blockchain.
  • cross-chain business processing is performed on the business to be processed through the first blockchain and the second blockchain, thereby realizing the cross-chain processing of the business to be processed and improving the efficiency of business processing.
  • the embodiment of this specification also provides a service processing apparatus, as shown in FIG. 6.
  • the service processing device includes: a service request module 601, a digital identity acquisition module 602, a blockchain determination module 603, and a cross-chain processing module 604, among which:
  • the service request module 601 obtains a service processing request of the service to be processed, the service processing request is used to request the processing of the service to be processed between the service initiator and the target party, and the service processing request includes the service initiator The digital identity information of and the digital identity information of the target party;
  • the digital identity obtaining module 602 obtains the first sub-digital identity information of the service initiator according to the digital identity information of the service initiator; and obtains the first sub-digital identity information of the target party according to the digital identity information of the target party. Two sub-digital identity information;
  • the block chain determination module 603 determines the first block chain related to the service processing party to execute the service to be processed; and, according to the service Processing the request and the second sub-digital identity information, and determining the second blockchain related to the target party's execution of the service to be processed;
  • the cross-chain processing module 604 if the first blockchain and the second blockchain have the authority to conduct cross-chain interactions, then through the first blockchain and the second blockchain, Cross-chain business processing is performed on the to-be-processed business.
  • the device further includes: a distribution module that distributes the blockchain for processing the business processing request, and provides the business processing request to the blockchain, so that the The blockchain performs message split processing on the service processing request, and generates a resource call message.
  • a distribution module that distributes the blockchain for processing the business processing request, and provides the business processing request to the blockchain, so that the The blockchain performs message split processing on the service processing request, and generates a resource call message.
  • the cross-chain processing module 604 includes: a resource acquisition unit that calls corresponding resources according to the resource invocation message; a cross-chain processing module that uses the first block chain and the second block chain based on the call The resource performs cross-chain business processing on the to-be-processed business.
  • the service processing request further includes a verifiable statement
  • the allocation module includes: a verification unit that verifies the validity of the verifiable statement; the allocation unit, if the verification is passed, allocates the pair
  • the business processing request is processed on the blockchain, and the business processing request is provided to the blockchain.
  • the blockchain determining module 603 includes: a first preselection unit, which obtains the first preselected blockchain corresponding to each of the first sub-digital identity information, and obtains at least one of the first preselected Block chain; a first block chain determination unit, from at least one of the first pre-selected blockchains, obtains a first pre-selected blockchain that matches the to-be-processed business, and compares the obtained with the to-be-processed The first pre-selected blockchain that matches the business is determined to be the first blockchain related to the business processor executing the to-be-processed business.
  • the blockchain determining module 603 includes: a second preselection unit, which obtains the second preselected blockchain corresponding to each of the second sub-digital identity information, and obtains at least one of the second preselected blocks Chain; the second block chain determination unit, from at least one of the second pre-selected blockchain, obtains a second pre-selected blockchain that matches the service to be processed, and compares the obtained with the service to be processed The matched second pre-selected blockchain is determined to be the second blockchain related to the execution of the service to be processed by the business processor.
  • the first preselection unit obtains the first preselected blockchain for processing the type of message from at least one of the first preselected blockchains according to the type to which the resource invocation message belongs , Acquiring the acquired first pre-selected blockchain for processing the type of message as the first pre-selected blockchain that matches the service to be processed; and/or, the second pre-selected unit, according to the resource Call the type to which the message belongs, obtain a second preselected blockchain for processing messages of the type from at least one of the second preselected blockchains, and acquire the second preselected blockchain for processing messages of the type Obtain a second pre-selected blockchain that matches the business to be processed.
  • the digital identity acquisition module 602 includes a verification unit that determines the validity of the digital identity information of the service initiator and the target party, and determines the validity of the digital identity information according to the type of the service processing request. Whether the service processing request meets the predetermined message format rules; the digital identity acquisition unit, if the digital identity information of the service initiator and the target party is valid, and the service processing request meets the predetermined message format rules, then according to the business The digital identity information of the initiator, the first sub-digital identity information of the service initiator, and the second sub-digital identity information of the target according to the digital identity information of the target.
  • the device further includes: a permission search module, which searches for cross-chain interaction between the first blockchain and the second blockchain from the pre-stored cross-chain interaction permission information Cross-chain interaction authority information; cross-chain authority determination module, if it finds cross-chain interaction authority information for cross-chain interaction between the first block chain and the second block chain, then determine the first zone The block chain and the second block chain have the authority to carry out cross-chain interaction.
  • the cross-chain processing module 604 includes: a cross-chain request unit that obtains a cross-chain request on the first blockchain, the cross-chain request is determined based on the service to be processed; information reception The unit, based on the cross-chain request, initiates a request to the second blockchain, and receives the response data and the on-chain certification returned by the second blockchain; the verification unit responds to the response according to the on-chain certification The data is verified, and after the verification is passed, the corresponding certification information is generated according to the configured trusted certification conversion technology; the cross-chain processing unit returns the response data and the certification information to the first blockchain to verify The to-be-processed business is processed for cross-chain business.
  • the device further includes: a root of trust sending module, which sends a preset root of trust to the first blockchain, so that the first blockchain can contact the first blockchain according to the root of trust.
  • the response data and the certification information are verified.
  • the block chain determining module 603 includes: a type determining unit, which determines the service according to the service to be processed, the first sub-digital identity information, and the second sub-digital identity information The type of pre-selected middleware required for the execution of the service to be processed between the initiator and the target; the blockchain determining unit, according to the determined type of pre-selected middleware, and the access corresponding to the first sub-digital identity information Authority and the access authority corresponding to the second sub-digital identity information, respectively determine the first blockchain related to the business processing party to execute the service to be processed and the target party to execute the service to be processed The second blockchain.
  • the embodiment of this specification provides a service processing device.
  • the digital identity information of the service initiator and the target party can be carried in the corresponding service processing request.
  • the digital identity information of the business initiator obtains the first sub-digital identity information of the business initiator, which can then determine the first blockchain related to the business processor executing the service to be processed.
  • it can be based on the digital identity information of the target party , To obtain the second sub-digital identity information of the target, and then to determine the second blockchain related to the target's execution of the business to be processed, and then, there is a cross-chain link between the first blockchain and the second blockchain.
  • cross-chain business processing is performed on the business to be processed through the first blockchain and the second blockchain, thereby realizing the cross-chain processing of the business to be processed and improving the efficiency of business processing.
  • the embodiment of this specification also provides a service processing device, as shown in FIG. 7.
  • the service processing device may be a device corresponding to the service processing system provided in the foregoing embodiment.
  • Service processing equipment may have relatively large differences due to different configurations or performances, and may include one or more processors 701 and a memory 702, and the memory 702 may store one or more storage applications or data. Among them, the memory 702 may be short-term storage or persistent storage.
  • the application program stored in the memory 702 may include one or more modules (not shown in the figure), and each module may include a series of computer-executable instructions in a service processing device.
  • the processor 701 may be configured to communicate with the memory 702, and execute a series of computer-executable instructions in the memory 702 on a service processing device.
  • the service processing equipment may also include one or more power supplies 703, one or more wired or wireless network interfaces 704, one or more input and output interfaces 705, and one or more keyboards 706.
  • the business processing equipment includes a memory and one or more programs.
  • One or more programs are stored in the memory, and the one or more programs may include one or more modules, and each Each module may include a series of computer-executable instructions in a device for processing services, and the one or more programs configured to be executed by one or more processors include computer-executable instructions for performing the following:
  • the service processing request is used to request the processing of the to-be-processed service between the service initiator and the target, and the service processing request includes the digital identity information of the service initiator and the target
  • the digital identity information of the business initiator obtain the first sub-digital identity information of the business initiator; and, according to the digital identity information of the target, obtain the second sub-digital identity information of the target Sub-digital identity information; according to the service processing request and the first sub-digital identity information, determine the first blockchain related to the service processing party to execute the service to be processed; and, according to the service processing request And the second sub-digital identity information to determine the
  • it further includes: allocating a blockchain for processing the business processing request, and providing the business processing request to the blockchain, so that the business processing request can be processed on the blockchain.
  • the processing request performs message split processing to generate a resource invocation message;
  • the cross-chain business processing of the pending business through the first blockchain and the second blockchain includes: according to the resource The call message calls the corresponding resource; through the first block chain and the second block chain, based on the called resource, cross-chain business processing is performed on the to-be-processed business.
  • the business processing request further includes a verifiable statement
  • the allocating the blockchain for processing the business processing request and providing the business processing request to the blockchain includes : Verify the validity of the verifiable statement; if the verification is passed, allocate a blockchain for processing the business processing request, and provide the business processing request to the blockchain.
  • the determining the first blockchain related to the service processing party to execute the service to be processed according to the service processing request and the first sub-digital identity information includes: acquiring each The first pre-selected blockchain corresponding to the first sub-digital identity information obtains at least one of the first pre-selected blockchains; from at least one of the first pre-selected blockchains, the corresponding to the business to be processed is obtained The matched first pre-selected blockchain, and the acquired first pre-selected blockchain that matches the service to be processed is determined as the first blockchain related to the execution of the service to be processed by the business processor; and /Or, said determining, according to the service processing request and the second sub-digital identity information, the second blockchain related to the execution of the service to be processed by the service processor includes: obtaining each of the first The second pre-selected blockchain corresponding to the two sub-digital identity information obtains at least one of the second pre-selected blockchains; from at least one of the second pre-selected blockchains, the first that matches the service to
  • the obtaining the first preselected blockchain that matches the service to be processed from at least one of the first preselected blockchains includes: according to the type of the resource invocation message, From at least one of the first pre-selected blockchains, obtain the first pre-selected blockchain that processes the type of message, and obtain the acquired first pre-selected blockchain that processes the type of message as the same as the to-be-selected blockchain.
  • Processing a first pre-selected blockchain that matches the business; and/or, obtaining a second pre-selected blockchain that matches the business processing request from at least one of the second pre-selected blockchains includes: According to the type of the resource call message, from at least one of the second pre-selected blockchains, obtain a second pre-selected blockchain that processes messages of the type, and obtain the second pre-selected blockchain that processes messages of the type.
  • the pre-selected blockchain is obtained as the second pre-selected blockchain that matches the business to be processed.
  • the first sub-digital identity information of the service initiator is obtained according to the digital identity information of the service initiator
  • the target party is obtained according to the digital identity information of the target party.
  • the second sub-digital identity information includes: determining the validity of the digital identity information of the service initiator and the target party, and determining whether the service processing request conforms to a predetermined message format according to the type of the service processing request Rules; if the digital identity information of the business initiator and the target party is valid, and the service processing request conforms to a predetermined message format rule, then according to the digital identity information of the business initiator, obtain the business initiator’s information
  • the first sub-digital identity information, and the second sub-digital identity information of the target party is obtained according to the digital identity information of the target party.
  • it further includes: searching for cross-chain interaction authority information for cross-chain interaction between the first blockchain and the second blockchain from the pre-stored cross-chain interaction authority information; if The cross-chain interaction authority information for cross-chain interaction between the first blockchain and the second blockchain is found, and then it is determined that there is a connection between the first blockchain and the second blockchain The authority to conduct cross-chain interactions.
  • the cross-chain service processing of the service to be processed through the first blockchain and the second blockchain includes: obtaining the cross-chain service on the first blockchain Chain request, the cross-chain request is determined based on the to-be-processed business; based on the cross-chain request, initiate a request to the second blockchain, and receive the response data and on-chain proof returned by the second blockchain Validate the response data according to the on-chain certification, and generate corresponding certification information according to the configured trusted certification conversion technology after the verification is passed; return the response data and the certification information to the first Block chain to perform cross-chain business processing on the business to be processed.
  • it further includes: sending a preset root of trust to the first blockchain, so that the first blockchain performs processing on the response data and the certification information according to the root of trust. verify.
  • the first blockchain related to the business processor performing the business to be processed is determined according to the business to be processed and the first sub-digital identity information, and according to the The service to be processed and the second sub-digital identity information, and determining the second blockchain related to the target party performing the service to be processed includes: according to the service to be processed and the first sub-digital identity information And the second sub-digital identity information, determine the pre-selected middleware type required by the service initiator and the target party to execute the to-be-processed service; according to the determined pre-selected middleware type and the first The access authority corresponding to a sub-digital identity information and the access authority corresponding to the second sub-digital identity information respectively determine the first blockchain and the target party related to the execution of the service to be processed by the business processor The second blockchain related to the business to be processed.
  • the embodiment of this specification provides a service processing device.
  • the digital identity information of the service initiator and the target party can be carried in the corresponding service processing request.
  • the digital identity information of the business initiator obtains the first sub-digital identity information of the business initiator, which can then determine the first blockchain related to the business processor executing the service to be processed.
  • it can be based on the digital identity information of the target party , To obtain the second sub-digital identity information of the target, and then to determine the second blockchain related to the target's execution of the business to be processed, and then, there is a cross-chain link between the first blockchain and the second blockchain.
  • cross-chain business processing is performed on the business to be processed through the first blockchain and the second blockchain, thereby realizing the cross-chain processing of the business to be processed and improving the efficiency of business processing.
  • the improvement of a technology can be clearly distinguished between hardware improvements (for example, improvements in circuit structures such as diodes, transistors, switches, etc.) or software improvements (improvements in method flow).
  • hardware improvements for example, improvements in circuit structures such as diodes, transistors, switches, etc.
  • software improvements improvements in method flow.
  • the improvement of many methods and processes of today can be regarded as a direct improvement of the hardware circuit structure.
  • Designers almost always get the corresponding hardware circuit structure by programming the improved method flow into the hardware circuit. Therefore, it cannot be said that the improvement of a method flow cannot be realized by the hardware entity module.
  • a programmable logic device Programmable Logic Device, PLD
  • PLD Programmable Logic Device
  • FPGA Field Programmable Gate Array
  • HDL Hardware Description Language
  • ABEL Advanced Boolean Expression Language
  • AHDL Altera Hardware Description Language
  • HDCal JHDL
  • Lava Lava
  • Lola MyHDL
  • PALASM RHDL
  • VHDL Very-High-Speed Integrated Circuit Hardware Description Language
  • Verilog Verilog
  • the controller can be implemented in any suitable manner.
  • the controller can take the form of, for example, a microprocessor or a processor and a computer-readable medium storing computer-readable program codes (such as software or firmware) executable by the (micro)processor. , Logic gates, switches, application specific integrated circuits (ASICs), programmable logic controllers and embedded microcontrollers. Examples of controllers include but are not limited to the following microcontrollers: ARC625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicon Labs C8051F320, the memory controller can also be implemented as part of the memory control logic.
  • controllers in addition to implementing the controller in a purely computer-readable program code manner, it is entirely possible to program the method steps to make the controller use logic gates, switches, application specific integrated circuits, programmable logic controllers, and embedded logic.
  • the same function can be realized in the form of a microcontroller or the like. Therefore, such a controller can be regarded as a hardware component, and the devices included in it for realizing various functions can also be regarded as a structure within the hardware component. Or even, the device for realizing various functions can be regarded as both a software module for realizing the method and a structure within a hardware component.
  • a typical implementation device is a computer.
  • the computer may be, for example, a personal computer, a laptop computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or Any combination of these devices.
  • embodiments of this specification can be provided as a method, a system, or a computer program product. Therefore, one or more embodiments of this specification may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, one or more embodiments of this specification may adopt computer programs implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes. The form of the product.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • These computer program instructions can also be stored in a computer-readable memory that can direct a computer or other programmable business processing equipment to work in a specific manner, so that the instructions stored in the computer-readable memory produce an article of manufacture including the instruction device.
  • the instruction device implements the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • These computer program instructions can also be loaded on a computer or other programmable service processing equipment, so that a series of operation steps are executed on the computer or other programmable equipment to produce computer-implemented processing, which can be executed on the computer or other programmable equipment.
  • the instructions provide steps for implementing the functions specified in one process or multiple processes in the flowchart and/or one block or multiple blocks in the block diagram.
  • the computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
  • processors CPUs
  • input/output interfaces network interfaces
  • memory volatile and non-volatile memory
  • the memory may include non-permanent memory in computer readable media, random access memory (RAM) and/or non-volatile memory, such as read-only memory (ROM) or flash memory (flash RAM). Memory is an example of computer readable media.
  • RAM random access memory
  • ROM read-only memory
  • flash RAM flash memory
  • Computer-readable media include permanent and non-permanent, removable and non-removable media, and information storage can be realized by any method or technology.
  • the information can be computer-readable instructions, data structures, program modules, or other data.
  • Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other types of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory technology, CD-ROM, digital versatile disc (DVD) or other optical storage, Magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices or any other non-transmission media can be used to store information that can be accessed by computing devices. According to the definition in this article, computer-readable media does not include transitory media, such as modulated data signals and carrier waves.
  • one or more embodiments of this specification can be provided as a method, a system or a computer program product. Therefore, one or more embodiments of this specification may adopt the form of a complete hardware embodiment, a complete software embodiment, or an embodiment combining software and hardware. Moreover, one or more embodiments of this specification may adopt computer programs implemented on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) containing computer-usable program codes. The form of the product.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.
  • One or more embodiments of this specification may be described in the general context of computer-executable instructions executed by a computer, such as program modules.
  • program modules include routines, programs, objects, components, data structures, etc. that perform specific tasks or implement specific abstract data types.
  • One or more embodiments of this specification can also be practiced in distributed computing environments. In these distributed computing environments, tasks are performed by remote processing devices connected through a communication network. In a distributed computing environment, program modules can be located in local and remote computer storage media including storage devices.

Abstract

本说明书实施例公开了一种业务处理系统、业务处理的方法、装置及设备,该方法包括:获取待处理业务的业务处理请求,该业务处理请求中包括业务发起方的数字身份信息和目标方的数字身份信息;根据业务发起方的数字身份信息,获取业务发起方的第一子数字身份信息;以及,根据目标方的数字身份信息,获取目标方的第二子数字身份信息;根据该业务处理请求和第一子数字身份信息,确定业务处理方执行待处理业务所相关的第一区块链;以及,根据该业务处理请求和第二子数字身份信息,确定目标方执行待处理业务所相关的第二区块链;如果第一区块链与第二区块链之间具备进行跨链交互的权限,则通过第一区块链和第二区块链,对待处理业务进行跨链业务处理。

Description

一种业务处理系统、业务处理的方法、装置及设备 技术领域
本说明书涉及计算机技术领域,尤其涉及一种业务处理系统、业务处理的方法、装置及设备。
背景技术
对于不同的业务,其相应的业务处理方式可以不同,不同业务的处理机制可以由相应的服务器实现,此外,相同的业务,可以存在不同的处理机制,而且,往往只有在不同的机构或组织设定的业务的处理机制属于同一区块链中时,可以完整该业务。
通常不同的机构或组织设定的业务的处理机制无法互联互通,例如,对于转账业务来说,不同的机构或组织设定的转账的处理机制可以不同,使用A机构设定的转账的处理机制进行转账的用户时,仅能够对同样使用A机构设定的转账的处理机制的另一个用户进行转账,而无法实现不同处理机制的之间的转账,具体如,通过某金融机构提供的应用程序进行转账的用户,只能通过上述应用程序将转账的金额转移至在该应用程序注册的另一个用户,而无法将转账的金额转移至未在该应用程序注册的用户。为此,需要提供一种能够实现不同区块链之间的跨链交互的技术方案。
发明内容
本说明书实施例的目的是提供一种业务处理系统、业务处理的方法、装置及设备,以提供一种能够实现不同区块链之间的跨链交互的技术方案。
为了实现上述技术方案,本说明书实施例是这样实现的:本说明书实施例提供的一种业务处理系统,所述业务处理系统包括应用层子系统、服务层子系统、路由层子系统和资源层子系统,其中:所述应用层子系统,获取用户对待处理业务的业务处理请求,并转发所述业务处理请求至所述服务层子系统。所述服务层子系统,分配对所述业务处理请求进行处理的区块链,并将所述业务处理请求提供给所述区块链,以使所述区块链对所述业务处理请求进行消息拆分处理,生成资源调用消息发送至所述路由层子系统。所述路由层子系统,基于执行所述待处理业务所需调度的资源,转发所述资源调用消息至所述资源层子系统。所述资源层子系统,根据从所述业务处理请求拆分出的业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息,以及,根据从所述业 务处理请求拆分出的目标方的数字身份信息,获取所述目标方的第二子数字身份信息,并根据所述待处理业务和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链,根据所述待处理业务和所述第二子数字身份信息,确定所述目标方执行所述待处理业务所相关的第二区块链,在所述第一区块链与所述第二区块链之间具备进行跨链交互的权限时,通过所述第一区块链和所述第二区块链,基于所述资源调用消息,对所述待处理业务进行跨链业务处理。
本说明书实施例提供的一种业务处理的方法,所述方法包括:获取待处理业务的业务处理请求,所述业务处理请求用于请求处理业务发起方与目标方之间的所述待处理业务,所述业务处理请求中包括所述业务发起方的数字身份信息和所述目标方的数字身份信息。根据所述业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息;以及,根据所述目标方的数字身份信息,获取所述目标方的第二子数字身份信息。根据所述业务处理请求和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链;以及,根据所述业务处理请求和所述第二子数字身份信息,确定所述目标方执行所述待处理业务所相关的第二区块链。如果所述第一区块链与所述第二区块链之间具备进行跨链交互的权限,则通过所述第一区块链和所述第二区块链,对所述待处理业务进行跨链业务处理。
本说明书实施例提供的一种业务处理的装置,所述装置包括:业务请求模块,获取待处理业务的业务处理请求,所述业务处理请求用于请求处理业务发起方与目标方之间的所述待处理业务,所述业务处理请求中包括所述业务发起方的数字身份信息和所述目标方的数字身份信息。数字身份获取模块,根据所述业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息;以及,根据所述目标方的数字身份信息,获取所述目标方的第二子数字身份信息。区块链确定模块,根据所述业务处理请求和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链;以及,根据所述业务处理请求和所述第二子数字身份信息,确定所述目标方执行所述待处理业务所相关的第二区块链。跨链处理模块,如果所述第一区块链与所述第二区块链之间具备进行跨链交互的权限,则通过所述第一区块链和所述第二区块链,对所述待处理业务进行跨链业务处理。
本说明书实施例提供的一种业务处理的设备,所述业务处理的设备包括:处理器;以及被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:获取待处理业务的业务处理请求,所述业务处理请求用于请求处理业务发起方与目 标方之间的所述待处理业务,所述业务处理请求中包括所述业务发起方的数字身份信息和所述目标方的数字身份信息。根据所述业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息;以及,根据所述目标方的数字身份信息,获取所述目标方的第二子数字身份信息。根据所述业务处理请求和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链;以及,根据所述业务处理请求和所述第二子数字身份信息,确定所述目标方执行所述待处理业务所相关的第二区块链。如果所述第一区块链与所述第二区块链之间具备进行跨链交互的权限,则通过所述第一区块链和所述第二区块链,对所述待处理业务进行跨链业务处理。
附图说明
为了更清楚地说明本说明书实施例中的技术方案,下面将对实施例描述中所需要使用的附图作简单地介绍,显而易见地,下面描述中的附图仅仅是本说明书中记载的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其他的附图。
图1为本说明书一种业务处理系统的结构示意图;
图2为本说明书另一种业务处理系统的结构示意图;
图3为本说明书一种业务处理的方法实施例;
图4为本说明书另一种业务处理的方法实施例;
图5为本说明书又一种业务处理的方法实施例;
图6为本说明书一种业务处理的装置实施例;
图7为本说明书一种业务处理的设备实施例。
具体实施方式
本说明书实施例提供一种业务处理系统、业务处理的方法、装置及设备。
为了使本技术领域的人员更好地理解本说明书中的技术方案,下面将结合本说明书实施例中的附图,对本说明书实施例中的技术方案进行清楚、完整地描述,显然,所描述的实施例仅仅是本说明书一部分实施例,而不是全部的实施例。基于本说明书中的实施例,本领域普通技术人员在没有作出创造性劳动前提下所获得的所有其他实施例,都应当属于本说明书保护的范围。
实施例一
如图1所示,本说明书实施例提供一种业务处理系统,该业务处理系统可以对用户请求的业务(即待处理业务)进行响应和处理,业务处理系统可以为一种或多种不同的业务提供相应的服务,如支付业务或购物业务等,此外,该业务处理系统还可以实现对某业务的跨区块链的业务处理。不同的业务可以预先设置不同的业务处理机制,具体可以根据实际情况设定,本说明书实施例对此不做限定。
如图1所示,为一种可选地或可实现的业务处理系统。针对业务处理系统,由于其包含多种不同的功能,因此,可以基于业务处理系统的功能不同和分工不同,将业务处理系统划分为4个子系统,即业务处理系统可以包括应用层子系统、服务层子系统、路由层子系统和资源层子系统。其中:应用层子系统对应的层级结构可以处于业务处理系统对应的层级架构的最高层,应用层子系统可以提供多种不同客户端应用的接口,以便为用户提供各种不同的业务服务。
服务层子系统对应的层级结构可以用于为待处理业务分配进行业务处理的区块链等,服务层子系统可以连接有服务提供机构的多个区块链,多个区块链可以用于处理待处理业务的业务处理请求。在实际应用中,同时处理对个不同的业务处理请求的区块链可以包括多个,不同区块链处理业务处理请求所需消耗的资源可以不同,因此,不同区块链的工作状态可以不同,这样就需要为接收到的业务处理请求分配一个区块链来处理该业务处理请求。
路由层子系统可以具备路由功能,可以基于如路由设备或交换机等设备构成。路由层子系统可以为消息或数据等在节点之间的传输创建逻辑链路,以及基于数字身份信息等进行寻址,并可以为消息或数据等选择最适当的传输路径等。
资源层子系统可以是业务处理系统中的关键子系统,通过资源层子系统,可以实现对相应业务的业务处理机制的触发执行和相应的控制,并可以为待处理业务的处理提供相应的资源。
上述是各个子系统的构成和可实现的不同功能,本说明书实施例中,应用层子系统可以被配置为获取用户对待处理业务的业务处理请求,也即是应用层子系统可以通过与客户端应用之间的接口,接收或获取用户通过该客户端应用触发某业务(即待处理业务)而生成的业务处理请求。此外,应用层子系统还可以将获取的业务处理请求转发至服务层子系统继续处理。
服务层子系统获取到业务处理请求后,可以从服务提供机构的多个区块链中,分配对该业务处理请求进行处理的区块链,并将该业务处理请求提供给分配的区块链,以 使该区块链对该业务处理请求进行消息拆分处理,生成资源调用消息发送至路由层子系统。
在实际应用中,服务层子系统获取到业务处理请求后,可以对该业务处理请求的内容进行拆分处理,得到相应的拆分结果。可以基于得到的拆分结果生成相应的资源调用消息,该资源调用消息可以用于调用业务处理所需的资源。然后,服务层子系统可以将上述资源调用消息发送至路由层子系统。
需要说明的是,为了保证信息处理的安全性,可以预先设置可信执行环境(如TEE等),在可信执行环境中,可以对该业务处理请求的内容进行拆分处理,并基于拆分的结果生成资源调用消息,将该资源调用消息发送至路由层子系统。
路由层子系统可以基于服务层子系统提供的资源调用消息,对执行待处理业务所需的资源进行调度,在基于执行待处理业务所需调度的资源,转发该资源调用消息至资源层子系统继续处理。
资源层子系统可以获取待处理业务的业务发起方的数字身份信息和目标方的数字身份信息,具体可以对上述业务处理请求进行拆分处理后而得到,即从该业务处理请求中拆分出业务发起方的数字身份信息和目标方的数字身份信息,并可以基于业务发起方的数字身份信息、目标方的数字身份信息和资源调用消息,对待处理业务进行跨链业务处理。其中,数字身份信息可以是指通过数字化信息将业务发起方或目标方可识别地进行刻画的信息,也即为将真实的身份信息浓缩为数字代码的形式表现,以便对业务发起方或目标方个人的实时行为信息进行绑定、查询和验证。数字身份信息中不仅可以包含用户的出生信息、个体描述、生物特征等身份编码信息,也涉及多种属性的个人行为信息(如交易信息或娱乐信息等)等。数字身份信息可以通过多种方式展现,如DID(Decentralized Identity,去中心化身份)等。
具体地,资源层子系统可以根据业务发起方的数字身份信息,获取业务发起方的第一子数字身份信息,其中,业务发起方的数字身份信息可以是基于业务发起方的某一种身份信息确定的信息,例如,业务发起方的数字身份信息可以基于业务发起方的身份证件号码生成,第一子数字身份信息可以是业务发起方的数字身份信息对应的一个或多个子身份信息,如第一子数字身份信息可以是基于业务发起方的身份证件号码和待处理业务的某信息生成等。同时,资源层子系统还可以根据目标方的数字身份信息,获取目标方的第二子数字身份信息,其中,目标方的数字身份信息和目标方的第二子数字身份信息可以通过多种方式设置,如可以通过如上述业务发起方的数字身份信息和业务发起方的第一子数字身份信息的设置方式进行设置等。
每个区块链的用户可以设置有相应的数字身份信息(本实施例中可以为子数字身份信息),可以通过子数字身份信息确定执行待处理的业务所相关的区块链,具体地,资源层子系统可以根据待处理业务和第一子数字身份信息,确定业务处理方执行待处理业务所相关的第一区块链,同样的,资源层子系统还可以根据待处理业务和第二子数字身份信息,确定目标方执行待处理业务所相关的第二区块链。在第一区块链与第二区块链之间具备进行跨链交互的权限时,通过第一区块链和第二区块链,基于上述资源调用消息,对待处理业务进行跨链业务处理。
本说明书实施例提供一种业务处理系统,包括应用层子系统、服务层子系统、路由层子系统和资源层子系统,应用层子系统获取用户对待处理业务的业务处理请求,并转发业务处理请求至服务层子系统,服务层子系统分配对业务处理请求进行处理的区块链,以便区块链对业务处理请求进行信息拆分处理,生成资源调用信息发送至路由层子系统,路由层子系统基于执行待处理业务所需调度的资源,转发资源调用信息至访问层子系统,访问层子系统可以基于业务发起方的数字身份信息,获取业务发起方的第一子数字身份信息,进而可以确定业务处理方执行待处理业务所相关的第一区块链,同样的,可以基于目标方的数字身份信息,获取目标方的第二子数字身份信息,进而可以确定目标方执行待处理业务所相关的第二区块链,然后,在第一区块链与第二区块链之间具备进行跨链交互的权限的情况下,通过第一区块链和第二区块链,对待处理业务进行跨链业务处理,从而实现了对待处理业务的跨链处理,提高了业务处理效率。
实施例二
图2为本说明书实施例提供的一种业务处理系统。图2仅是一种可选地或可实现的业务处理系统。该业务处理系统包含了图1所示的业务处理系统的全部功能单元,并在其基础上,对其进行了改进,改进内容如下:
对于上述应用层子系统,具体可以包括部署于用户终端设备的客户端应用,其中,用户终端设备可以是用户所使用的终端设备,具体如手机或平板电脑等,客户端应用可以是通过预定的编程语言编写的应用程序。客户端应用与应用层子系统之间设置有接口,通过该接口,客户端应用可以获取用户对待处理业务的业务处理请求,并将该业务处理请求发送给服务层子系统,其中,业务处理请求中可以包括业务发起方的数字身份信息和目标方的数字身份信息。
对于路由层子系统,可以根据业务发起方的数字身份信息和目标方的数字身份信息,分别确定业务发起方执行待处理业务所需资源的调度位置和目标方执行待处理业务所需资源的调度位置,并基于上述调度位置转发资源调用信息。
在实施中,对待处理业务进行业务处理的过程中,需要使用一定的资源进行上述业务处理,这样就需要分别确定业务发起方和目标方所需的资源,在获取上述资源之前,需要先确定所需获取的资源的调度位置,因此,路由层子系统可以根据业务发起方的数字身份信息,确定业务发起方所对应的区块链,可以通过确定的区块链,为业务发起方选择执行待处理业务所需资源的调度位置,同样的,还可以通过上述方式,为目标方选择执行待处理业务所需资源的调度位置。然后,可以基于业务发起方执行待处理业务所需资源的调度位置和业务发起方执行待处理业务所需资源的调度位置,分别转发该业务处理请求,以使得各个调度位置可以准备相应的资源。
另外,资源层子系统还提供执行待处理业务所需的资源。资源层子系统中可以配置有多种不同类型的资源,例如Fabric类型的资源、Mychain类型的资源、C3S类型的资源或数据类型的资源等。资源层子系统的层级结构可以设置于业务处理系统的层级架构的最底层。
此外,为了保证业务处理的安全性,保证区块链中的数据的安全性,可以对业务发起方和目标方等相关信息进行权限检查,具体地,可以在业务处理系统中设置权限检查模块,该权限检查模块所能够实现的功能可以通过预先编写的应用程序实现,该权限检查模块可以确定业务发起方和目标方的数字身份信息的有效性,即该权限检查模块可以通过预定的方式生成业务发起方的数字身份信息,然后,可以基于生成的数字身份信息对业务发起方的数字身份信息进行有效性核验,如果核验结果为业务发起方的数字身份信息有效,则可以继续执行后续处理,如果核验结果为业务发起方的数字身份信息无效,则可以停止后续处理。同样的,该权限检查模块也可以对目标方的数字身份信息进行有效性核验,如果核验结果为目标方的数字身份信息有效,则可以继续执行后续处理,如果核验结果为目标方的数字身份信息无效,则可以停止后续处理。
另外,该权限检查模块还可以根据上述业务处理请求所属的类型确定业务处理请求是否符合预定消息格式规则。
其中,预定消息格式规则可以是针对某一类消息,预先设定的该类消息所应具备的格式的规则,例如,某一类消息预定消息格式规则可以为:该消息的消息头由3个字段和相应的字段值构成,3个字段分别为A字段、B字段和C字段。在实际应用中,消息格式规则不仅仅限于上述一种方式,还可以包括多种可选的处理方式,具体可以根据实际情况设定,本说明书实施例对此不做限定。
在实施中,为了能够顺利完成后续的业务处理,不仅需要对业务发起方和目标方的数字身份信息的有效性进行验证,还可以对该业务处理请求所属的类型进行验证,具 体地,可以预先根据不同的业务,设定相应的业务处理请求所属的类型,即业务不同,相应的业务处理请求所属的类型也可以不同。此外,还可以为不同的类型,设定业务处理请求的消息格式规则。该权限检查模块可以对该业务处理请求进行分析,确定该业务处理请求所属的类型,并可以基于确定的类型,获取该业务处理请求对应的消息格式规则,然后,可以将该业务处理请求与获取的消息格式规则进行匹配,如果该业务处理请求与预定消息格式规则相匹配,则表明该业务处理请求符合预定消息格式规则,否则,该业务处理请求不符合预定消息格式规则。
此外,该权限检查模块除了可以进行上述权限的检查处理之外,还可以对跨链交互进行权限检查,即该权限检查模块可以从预先存储的跨链交互权限信息中,查找第一区块链与第二区块链之间进行跨链交互的跨链交互权限信息。
其中,跨链交互权限信息可以是预先设定的多个区块链之间能够进行跨区块链交互的权限的信息,具体如,预先存储有区块链1与区块链2的跨链交互权限信息,则表明区块链1与区块链2之间可以进行跨链交互。
在实施中,可以根据实际情况确定可以进行跨链交互的区块链,然后可以为进行跨链交互的区块链预先设定跨链交互权限信息,并可以将设定的跨链交互权限信息进行存储。该权限检查模块可以从预先存储的跨链交互权限信息中,查找第一区块链与第二区块链之间是否存在进行跨链交互的跨链交互权限信息,如果查找到第一区块链与第二区块链之间进行跨链交互的跨链交互权限信息,则可以执行后续处理,如果未查找到第一区块链与第二区块链之间进行跨链交互的跨链交互权限信息,则表明第一区块链与第二区块链之间无法进行跨链交互。
上述权限检查模块是作为一个整体存在的,即该权限检查模块可以设置于服务层子系统或资源层子系统中,具体可以根据实际情况设定,本说明书实施例对此不做限定。在实际应用中,权限检查模块的结构并不限于上述方式,还可以根据权限检查模块的功能和分工,将权限检查模块划分为两个单元,即权限检查模块可以包括第一权限检查单元和第二权限检查单元,其中,第一权限检查单元可以设置于服务子系统中或设置于资源层子系统中,第二权限检查单元设置于资源层子系统中。第一权限检查单元可以被配置为确定业务发起方和目标方的数字身份信息的有效性,并根据业务处理请求所属的类型确定该业务处理请求是否符合预定消息格式规则。第二权限检查单元可以被配置为从预先存储的跨链交互权限信息中,查找第一区块链与第二区块链之间进行跨链交互的跨链交互权限信息。
此外,在第一权限检查单元设置于服务层子系统的情况下,业务处理请求还可以 包括可验证声明,其中,可验证声明可以是用于描述个人、组织等实体所具有的某些属性的一种规范性的信息,可验证声明可以实现基于证据的信任,可以通过可验证声明,向其他实体证明当前实体的某些属性的信息是可信的。基于上述内容,第一权限检查单元还可以被配置为对可验证声明的有效性进行验证,并在验证通过后,分配对执行的业务处理请求进行处理的区块链,并将业务处理请求提供给对应的区块链。
此外,资源层子系统中还可以包括消息处理模块,上述第二权限检查单元可以与消息处理模块相连接,消息处理模块被配置为根据资源调用消息所属的类型,从至少一个第一预选区块链中,获取处理上述类型的消息的第一预选区块链,将获取的处理上述类型的消息的第一预选区块链获取为业务处理方执行待处理业务所相关的第一预选区块链;和/或,根据资源调用消息所属的类型,从至少一个第二预选区块链中,获取处理上述类型的消息的第二预选区块链,将获取的处理上述类型的消息的第二预选区块链获取为目标方执行待处理业务所相关的第二预选区块链。
另外,为了实现对待处理业务进行跨区块链的业务处理,可以在资源层子系统中设置实现上述跨链的业务处理的模块,即跨区块链的交互模块。该跨区块链的交互模块可以通过第一区块链和第二区块链,对待处理业务进行跨链业务处理。该跨区块链的交互模块可以包括一个或多个锚定器,以及一个或多个中继器。其中的锚定器中可以配置第一区块链对应的客户端应用,使得该锚定器可以与第一区块链之间建立连接,而中继器中可以配置第二区块链对应的客户端应用,使得中继器可以与第二区块链之间建立连接。
锚定器和中继器上分别配置的客户端应用,锚定器和中继器的配置轻量化,具体地,当任一锚定器被第一区块链选用时,任一锚定器中配置有第一区块链的客户端应用,以监听第一区块链上的跨链请求,该跨链请求基于待处理业务确定。当任一中继器被第二区块链选用时,任一中继器上配置有第二区块链的客户端应用。
当第一区块链需要向第二区块链调取跨链数据时,可以在第一区块链上创建跨链请求,且该跨链请求的请求对象为第二区块链。而通过已配置的第一区块链的客户端应用,锚定器能够监听第一区块链上创建的跨链请求,并基于该跨链请求所指示的请求对象为第二区块链,以及第二区块链与中继器之间存在连接关系,将跨链请求传输至中继器,并由中继器进一步将跨链请求传输至第二区块链。
通过已配置的第二区块链的客户端应用,中继器可以调取第二区块链针对上述跨链请求形成的响应数据,并将该响应数据返回至锚定器,而锚定器可以将该响应数据进一步返回至第一区块链,从而完成第一区块链与第二区块链之间的跨链交互。
除了响应数据之外,中继器还从第二区块链调取相应的链上证明,且中继器可以根据该链上证明对响应数据进行验证,比如确定该响应数据存在于第二区块链的区块链账本中等,本说明书并不对此进行限制。同时,中继器配置有可信证明转化技术,使得根据链上证明对响应数据实施验证操作后,如果验证结果为通过验证,该中继器可以基于可信证明转化技术生成中继器证明,相当于将链上证明转化为中继器证明。然后,中继器将响应数据与中继器证明返回至锚定器,并由锚定器进一步返回至第一区块链;其中,中继器可以预先发布信任根,而第一区块链可以预先获取并部署该信任根,使得该第一区块链在获得上述的响应数据和中继器证明后,可以基于该信任根对响应数据和中继器证明进行验证,以确定中继器针对所提供的响应数据实施过验证且验证通过。
需要指出的是:本说明书中的每一中继器在逻辑上可以视为“一个设备”,使得每一中继器在获取被调用方的区块链返回的跨链数据和链上证明后,可以基于对跨链数据和链上证明的验证结果,将链上证明转化为可信的中继器证明,且该中继器证明的数量仅为一份。每一中继器实际上可以运行于单台电子设备上,比如包含一独立主机的物理服务器、PC、笔记本电脑、手机等;或者,每一中继器可以运行于多台电子设备构成的设备集群上,比如主机集群承载的虚拟服务器等;本说明书并不对此进行限制。
跨区块链的交互模块中的锚定器和中继器之间直接建立连接;而在其他实施例中,还提供的一种提供桥接功能的跨区块链的交互模块,可以通过设置桥接器,使得该桥接器分别连接至锚定器和中继器,实现锚定器与中继器之间的桥接功能。
跨区块链的交互模块还包括至少一个桥接器;其中,任一桥接器分别连接至任一锚定器与任一中继器,用于将任一锚定器提供的跨链请求转发至任一中继器,并将任一中继器提供的响应数据和中继器证明转发至任一锚定器。
需要说明的是,上述图1和图2中所示的业务处理系统的结构仅是一种可选的、可实现的系统结构,在实际应用中,本说明书实施例所述的业务处理系统的结构并不仅仅只限定于上述附图中的结构,还可以包括其它多种可实现的结构,具体可以根据实际情况或业务处理系统所需具备的功能等设定,本说明书实施例对此不做限定。
本说明书实施例提供一种业务处理系统,包括应用层子系统、服务层子系统、路由层子系统和资源层子系统,应用层子系统获取用户对待处理业务的业务处理请求,并转发业务处理请求至服务层子系统,服务层子系统分配业务处理请求进行处理的区块链,以便区块链对业务处理请求进行信息拆分处理,生成资源调用信息发送至路由层子系统,路由层子系统基于执行待处理业务所需调度的资源,转发资源调用信息至访问层子系统,访问层子系统可以基于业务发起方的数字身份信息,获取业务发起方的第一子数字身份 信息,进而可以确定业务处理方执行待处理业务所相关的第一区块链,同样的,可以基于目标方的数字身份信息,获取目标方的第二子数字身份信息,进而可以确定目标方执行待处理业务所相关的第二区块链,然后,在第一区块链与第二区块链之间具备进行跨链交互的权限的情况下,通过第一区块链和第二区块链,对待处理业务进行跨链业务处理,从而实现了对待处理业务的跨链处理,提高了业务处理效率。
实施例三
如图3所示,本说明书实施例提供一种业务处理的方法,该方法的执行主体可以为上述实施例一或实施例二中提供的业务处理系统,该业务处理系统可以基于服务器实现,其中,该服务器可以是一个独立的服务器,还可以是由多个服务器构成的服务器集群等。该业务处理系统可以实现对某业务进行跨区块链的业务处理,上述提到的区块链可以是用于提供某项业务(如进行交易的业务等)服务的区块链等。该业务处理系统的具体结构,可以参见上述相关内容,在此不再赘述。该方法具体可以包括步骤S302~步骤S308。
在步骤S302中,获取待处理业务的业务处理请求,该业务处理请求用于处理业务发起方与目标方之间的该待处理业务,该业务处理请求中包括业务发起方的数字身份信息和目标方的数字身份信息。
其中,待处理业务可以是需要处理的任意业务,如支付业务、转账业务等金融类业务,还可以如文件或信息的发送等业务。业务发起方可以是触发或发起待处理业务执行的一方,例如,可以是发起转账业务的用户等。目标方可以是执行待处理业务所针对的目标的一方,例如,如果业务发起方为发起转账业务的用户,则目标方可以是该用户所转账的对象的一方,具体地,对于转账业务,用户A需要向用户B转账50元,则业务发起方可以为用户A,目标方可以为用户B。
在实施中,对于不同的业务,其相应的业务处理机制可以不同,不同业务的处理机制可以由设置有上述业务处理系统的相应服务器实现,此外,相同的业务,可以存在不同的处理机制,而且,往往只有在不同的机构或组织设定的业务的处理机制属于同一区块链时,才能够完成该业务,而通常情况下,不同的机构或组织设定的业务的处理机制无法互联互通,例如,对转账业务来说,不同的机构或组织设定的转账的处理机制可以不同,使用A机构设定的转账的处理机制进行转账的用户时,仅能够对同样使用A机构设定的转账的处理机制的另一个用户进行转账,而无法实现不同处理机制的之间的转账,具体如,通过某金融机构提供的应用程序进行转账的用户,只能通过上述应用程序将转账的金额转移至在该应用程序注册的另一个用户,而无法将转账的金额转移至未 在该应用程序注册的用户。为此,需要提供一种能够实现不同区块链之间的跨链交互的技术方案。本说明书实施例提供一种可选的技术方案,具体可以包括以下内容:对于某一项或多项业务所在的区块链系统,可以开发应用于该区块链系统的客户端应用,该客户端应用中可以设置有不同业务的办理入口,该办理入口可以通过多种方式实现,例如通过超链接的方式或重定向的方式等实现。当用户(即业务发起方)需要对某项业务(即待处理业务)进行处理时,可以启动终端设备中安装的该客户端应用,并可以从该客户端应用提供的办理入口中,选择需要办理的待处理业务的办理入口,同时,业务发起方的终端设备可以获取与待处理业务相关的信息,并可以基于获取的信息生成业务处理请求,业务发起方的终端设备可以基于业务发起方选择的办理入口获取该业务处理请求。客户端应用与业务处理系统之间通过预设的接口进行数据交互,则终端设备可以将该业务处理请求通过预设的接口发送给业务处理系统,业务处理系统中的应用层子系统可以获取到该业务处理请求。
需要说明的是,该业务处理请求可以用于处理业务发起方与目标方之间的该待处理业务,而且,该业务处理请求中包括业务发起方的数字身份信息和目标方的数字身份信息,其中,数字身份信息可以通过多种方式展现,如DID(Decentralized Identity,去中心化身份)等。
在步骤S304中,根据业务发起方的数字身份信息,获取业务发起方的第一子数字身份信息;以及,根据目标方的数字身份信息,获取目标方的第二子数字身份信息。
其中,业务发起方的数字身份信息可以是基于业务发起方的某一种身份信息确定的信息,例如,业务发起方的数字身份信息可以基于业务发起方的身份证件号码生成,第一子数字身份信息可以是业务发起方的数字身份信息对应的一个或多个子身份信息,如第一子数字身份信息可以是基于业务发起方的身份证件号码和待处理业务的某信息生成等。目标方的数字身份信息可以是基于目标方的某一种身份信息确定的信息,例如,目标方的数字身份信息可以基于目标方的身份证件号码生成,第二子数字身份信息可以是目标方的数字身份信息对应的一个或多个子身份信息,如第二子数字身份信息可以是基于目标方的身份证件号码和待处理业务的某信息生成等。
在实施中,可以基于业务处理机制的种类,分别为每个用户设置一个子数字身份信息,这样,用户使用不同的业务处理机制时,可以使用相应的子数字身份信息。此外,考虑到不同种类的业务处理机制,用户的子身份信息不同,而多个子身份信息显然不利于用户存储和记忆,为此,可以为每个用户设置唯一的数字身份信息,并且可以使得该用户的每个子数字身份信息分别与该用户的数字身份信息相对应,即对于某用户,可以 包括一个数字身份信息和至少一个子数字身份信息。
基于上述内容,由于不同的业务处理机制具有相应的子数字身份信息,而且,数字身份信息对应多个不同的子数字身份信息,因此,业务处理系统获取到业务发起方的数字身份信息和目标方的数字身份信息后,可以通过上述设定的对应关系,分别获取业务发起方的第一子数字身份信息,以及目标方的第二子数字身份信息。
在步骤S306中,根据上述业务处理请求和第一子数字身份信息,确定业务处理方执行待处理业务所相关的第一区块链;以及,根据该业务处理请求和第二子数字身份信息,确定目标方执行待处理业务所相关的第二区块链。
在实施中,通过相同的业务处理机制进行业务处理的区块链节点可以处于同一区块链中,不同的业务处理机制进行业务处理的区块链节点可以处于不同的区块链中,具体如,对于转账业务,基于某金融机构提供的应用程序对应的业务处理机制进行业务处理的区块链节点可以构建一个区块链,而基于非上述应用程序的其它某种业务处理机制进行业务处理的区块链节点可以构建另一个区块链等。每个区块链中,可以使用相同的信息或规则生成子数字身份信息。因此,针对业务发起方,业务处理系统可以从上述获取的第一子数字身份信息中,获取能够处理上述业务处理请求(或待处理业务等)的第一子数字身份信息,然后,可以基于获取的第一子数字身份信息确定第一子数字身份信息所属的区块链,并可以将得到的区块链作为业务处理方执行待处理业务所相关的第一区块链。
针对目标方,业务处理系统可以从上述获取的第二子数字身份信息中,获取能够处理上述待处理业务(或上述业务处理请求等)的第二子数字身份信息,然后,可以基于获取的第二子数字身份信息确定第二子数字身份信息所属的区块链,并可以将得到的区块链作为目标方执行待处理业务所相关的第二区块链。
在步骤S308中,如果第一区块链与第二区块链之间具备进行跨链交互的权限,则通过第一区块链和第二区块链,对待处理业务进行跨链业务处理。
在实施中,不同的区块链之间往往无法相互进行跨链交互,为此,可以预先设定哪些区块链之间能够进行跨链交互,可以为区块链之间的跨链交互设置相应的规则(如信息的跨链转换规则等)和处理机制等,并还可以为两个区块链设置相应的交互接口等。可以将能够跨链交互的区块链对应记录在预定的权限表中,并可以为能够跨链交互的区块链设置进行跨链交互的权限。
业务处理系统通过上述步骤S306的处理,得到业务处理方执行待处理业务所相关的第一区块链和目标方执行待处理业务所相关的第二区块链后,可以从上述记录的权限 表中查找第一区块链与第二区块链之间具备进行跨链交互的权限的相关信息。如果没有从上述记录的权限表中查找到第一区块链与第二区块链之间具备进行跨链交互的权限,则表明第一区块链与第二区块链之间无法进行跨链交互,此时,可以生成执行待处理业务失败的通知消息,并可以将其发送给业务发起方。如果能够从上述记录的权限表中查找到第一区块链与第二区块链之间具备进行跨链交互的权限,则可以通过第一区块链和第二区块链,对待处理业务进行跨链业务处理,即业务处理系统可以将业务处理请求提供给第一区块链,第一区块链可以基于待处理业务的处理机制,基于第一区块链中的相应资源对该业务处理请求进行处理,然后,可以将处理结果发送给第二区块链,第二区块链可以基于第一区块链发送的处理结果,基于第二区块链中的相应资源对该业务处理请求进行处理,得到相应的处理结果,然后,可以将处理结果分别提供给业务发起方和目标方。
本说明书实施例提供一种业务处理的方法,在对待处理业务进行处理的过程中,可以在相应的业务处理请求中携带业务发起方的数字身份信息和目标方的数字身份信息,这样,可以基于业务发起方的数字身份信息,获取业务发起方的第一子数字身份信息,进而可以确定业务处理方执行待处理业务所相关的第一区块链,同样的,可以基于目标方的数字身份信息,获取目标方的第二子数字身份信息,进而可以确定目标方执行待处理业务所相关的第二区块链,然后,在第一区块链与第二区块链之间具备进行跨链交互的权限的情况下,通过第一区块链和第二区块链,对待处理业务进行跨链业务处理,从而实现了对待处理业务的跨链处理,提高了业务处理效率。
实施例四
如图4所示,本说明书实施例提供一种业务处理的方法,该方法的执行主体可以为上述实施例一或实施例二中提供的业务处理系统,该业务处理系统可以基于服务器构建,其中,该服务器可以是一个独立的服务器,还可以是由多个服务器构成的服务器集群等。该业务处理系统可以实现对某业务进行跨区块链的业务处理,上述提到的区块链可以是用于提供某项业务(如进行交易的业务等)服务的区块链等。该业务处理系统的具体结构,可以参见上述相关内容,在此不再赘述。该方法具体可以包括步骤S402~步骤S420。
在步骤S402中,获取待处理业务的业务处理请求,该业务处理请求用于请求处理业务发起方与目标方之间的待处理业务,该业务处理请求中包括业务发起方的数字身份信息和目标方的数字身份信息。
在实际应用中,业务处理请求中除了可以包括业务发起方的数字身份信息和目标 方的数字身份信息外,还可以包括如业务处理请求所属的类型,例如转账类、扫码支付类或离线支付类等,具体可以根据实际情况设定,本说明书实施例对此不做限定。
在步骤S404中,确定业务发起方和目标方的数字身份信息的有效性,并根据该业务处理请求所属的类型确定该业务处理请求是否符合预定消息格式规则。
在实施中,业务处理系统在接收到业务处理请求后,可以从该业务处理请求中提取业务发起方的数字身份信息和目标方的数字身份信息,为了保证该业务处理请求中携带的数字身份信息的有效性,可以分别对业务发起方和目标方的数字身份信息进行验证,具体的验证方式可以多种多样,例如,区块链系统中的每个数字身份信息可以依据某种规则构建(如可以基于用户的身份证件号码和业务代码,通过某种算法计算得到等),这样,业务处理系统中的权限检查模块可以基于该规则,获取业务发起方的相关信息(如上述示例中的业务发起方的身份证件号码和待处理业务的业务代码等),然后,可以基于获取的信息构建业务发起方的数字身份信息,可以将构建的数字身份信息与上述业务处理请求中的携带的业务发起方的数字身份信息进行对比,如果两者相同,则表明业务发起方的数字身份信息有效,如果两者不同,则可以确定业务发起方的数字身份信息无效。可以通过上述方式对目标方的数字身份信息进行有效性验证,从而确定目标方的数字身份信息的有效性。
除了可以通过上述方式外,还可以通过多种方式实现对数字身份信息的验证,以下再提供一种可选的验证方式,基于数字身份信息的内容进行验证,例如,数字身份信息中包含的字符数量、数字身份信息中某一个或多个位置的字符取值或取值范围等,具体如,数字身份信息由20位字符构成,其中,第一位置和第二位置的字符为26个英文字母中的任意2个,且与相应的用户所处的地理位置相关,第三位置-第二十位置由数字构成,第三位置为固定值(如1等),第四位置的取值范围为[1,5]……,这样,可以对业务发起方的数字身份信息进行上述验证,确定业务发起方的数字身份信息是否符合上述设定的规则,如果符合,则可以确定业务发起方的数字身份信息有效,否则,可以确定业务发起方的数字身份信息无效。可以通过上述方式对目标方的数字身份信息进行有效性验证,从而确定目标方的数字身份信息的有效性。
为了能够顺利完成后续的业务处理,不仅需要对业务发起方和目标方的数字身份信息的有效性进行验证,还可以对该业务处理请求所属的类型进行验证,具体可以参见上述相关内容。
在步骤S406中,如果业务发起方和目标方的数字身份信息有效,且该业务处理请求符合预定消息格式规则,则根据业务发起方的数字身份信息,获取业务发起方的第一 子数字身份信息,以及,根据目标方的数字身份信息,获取目标方的第二子数字身份信息。
在实施中,通过上述验证方式分别对业务发起方和目标方的数字身份信息的有效性和该业务处理请求是否符合预定消息格式类型,在确定业务发起方和目标方的数字身份信息有效,且该业务处理请求符合预定消息格式规则后,可以基于数字身份信息获取相应的子数字身份信息,具体地,例如,区块链系统中可以预先设定用户的数字身份信息和相应的子数字身份信息等。可以通过业务发起方的数字身份信息,获取一个或多个业务发起方的子数字身份信息,另外,还可以通过目标方的数字身份信息,获取一个或多个目标方的子数字身份信息。
例如,如表1所示
表1
Figure PCTCN2020132830-appb-000001
可以预先设定某用户的数字身份信息,并可以根据不同的业务,为该用户设定相应的子数字身份信息。在确定业务发起方和目标方的数字身份信息有效,且该业务处理请求符合预定消息格式规则,则根据业务发起方的数字身份信息后,可以从上述表1中获取业务发起方的第一子数字身份信息和目标方的第二子数字身份信息,若业务发起方的数字身份信息为A123,则第一子数字身份信息可以包括AA1123865、AA2123886和AA3123689,若目标方的数字身份信息为B885,则第二子数字身份信息可以包括BB1885211、BB2885985、BB3885666和BB4885877。
在实际应用中,如果业务发起方和目标方的数字身份信息有效,且该业务处理请求符合预定消息格式规则,则还可以为该业务处理请求分配相应的区块链,通过分配的区块链对该业务处理请求进行处理,具体可以包括以下内容:分配对上述业务处理请求 进行处理的区块链,并将该业务处理请求提供给该区块链,以使在该区块链对该业务处理请求进行消息拆分处理,生成资源调用消息。
在实施中,业务处理系统中的服务层子系统在获取到业务处理请求后,可以获取服务提供机构的多个区块链,并获取每个区块链当前的工作状态以确定每个区块链当前的负载情况。根据每个区块链当前的负载情况,可以分配对上述业务处理请求进行处理的区块链,例如,可以为该业务处理请求分配一个负载较小的区块链等。然后,可以将该业务处理请求提供给分配的区块链,该区块链可以对业务处理请求进行消息拆分处理,可以通过拆分出的信息生成资源调用消息。
此外,在执行上述分配对上述业务处理请求进行处理的区块链,并将该业务处理请求提供给该区块链的处理中,还可以包括以下内容:业务处理请求中还可以包括可验证声明,则对可验证声明的有效性进行验证;如果验证通过,则分配对该业务处理请求进行处理的区块链,并将该业务处理请求提供给该区块链。
在实施中,业务处理请求中还可以包括可验证声明,基于此,可以对该可验证声明的有效性进行验证,具体验证过程可以包括多种,例如,可以计算可验证声明中各个字段的字段值的哈希值,并可以通过默克尔树机制计算上述各个字段值的哈希值的默克尔根,可以将计算得到的默克尔根与预先提供的该可验证声明对应的默克尔根进行比对,如果两者不同,则表明该可验证声明无效,如果两者相同,则表明该可验证声明有效。上述验证方式仅是一种可选的或可实现的方式,在实际应用中还可以包括多种其它方式,具体可以根据实际情况设定,本说明书实施例对此不做限定。通过上述验证方式,如果验证通过,则分配对该业务处理请求进行处理的区块链,并将该业务处理请求提供给该区块链。
需要说明的是,除了可以通过拆分出的信息生成资源调用消息外,还可以从业务处理请求中拆分出业务发起方的数字身份信息和目标方的数字身份信息等。通过上述消息拆分处理得到业务发起方的数字身份信息和目标方的数字身份信息后,还可以执行下述相关处理,具体可以参见步骤S406和步骤S408等处理。
在步骤S408中,获取每个第一子数字身份信息对应的第一预选区块链,得到至少一个第一预选区块链。
在实施中,每个子数字身份信息可以对应一个区块链,即属于同一区块链的用户,其子数字身份信息类似,因此,可以确定每个第一子数字身份信息所属的区块链,并可以将确定区块链作为第一预选区块链,从而可以得到至少一个第一预选区块链。
在步骤S410中,从至少一个第一预选区块链中,获取与该待处理业务相匹配的第 一预选区块链,将获取的与该待处理业务相匹配的第一预选区块链确定为业务处理方执行待处理业务所相关的第一区块链。
在实施中,通过上述步骤S408的处理,得到至少一个第一预选区块链后,可以对每个第一预选区块链进行分析,通过分析可以确定每个第一预选区块链能够处理的待处理业务所属的类型、能够处理的业务的标识等相关信息,然后,可以基于上述信息,确定能够处理上述待处理业务的第一预选区块链,并可以将确定的第一预选区块链作为与该待处理业务相匹配的第一预选区块链,可以将获取的与该待处理业务相匹配的第一预选区块链确定为业务处理方执行待处理业务所相关的第一区块链。
在实际应用中,上述步骤S410的处理除了可以通过上述方式实现外,还可以通过其它多种不同的方式实现,以下再提供一种可选的处理方式,具体可以包括以下内容:根据该资源调用消息所属的类型,从至少一个第一预选区块链中,获取处理上述类型的消息的第一预选区块链,将获取的处理上述类型的消息的第一预选区块链获取为与该待处理业务相匹配的第一预选区块链。
在实施中,可以对该资源调用消息进行分析,确定该资源调用消息所属的类型,然后,可以从至少一个第一预选区块链中获取能够处理上述类型的消息的第一预选区块链,可以将获取的处理上述类型的消息的第一预选区块链获取为与该待处理业务相匹配的第一预选区块链。需要说明的是,如果能够处理上述类型的消息的第一预选区块链为多个,则可以从中选择一个第一预选区块链作为与该待处理业务相匹配的第一预选区块链。
在步骤S412中,获取每个第二子数字身份信息对应的第二预选区块链,得到至少一个第二预选区块链。
在实施中,基于上述内容,每个子数字身份信息可以对应一个区块链,即属于同一区块链的用户,其子数字身份信息类似,因此,可以确定每个第二子数字身份信息所属的区块链,并可以将确定区块链作为第二预选区块链,从而可以得到至少一个第二预选区块链。
在步骤S414中,从至少一个第二预选区块链中,获取与该待处理业务相匹配的第二预选区块链,将获取的与该待处理业务相匹配的第二预选区块链确定为业务处理方执行待处理业务所相关的第二区块链。
在实施中,通过上述步骤S412的处理,得到至少一个第二预选区块链后,可以对每个第二预选区块链进行分析,通过分析可以确定每个第二预选区块链能够处理的待处理业务所属的类型、能够处理的业务的标识、能够响应的待处理业务所属的类型等相关 信息,然后,可以基于上述信息,确定能够响应上述资源调用消息或能够处理待处理业务的第二预选区块链,并可以将确定的第二预选区块链作为与该待处理业务相匹配的第二预选区块链,可以将获取的与该待处理业务相匹配的第二预选区块链确定为业务处理方执行待处理业务所相关的第二区块链。
在实际应用中,上述步骤S414的处理除了可以通过上述方式实现外,还可以通过其它多种不同的方式实现,以下再提供一种可选的处理方式,具体可以包括以下内容:根据该资源调用消息所属的类型,从至少一个所述第二预选区块链中,获取处理上述类型的消息的第二预选区块链,将获取的处理上述类型的消息的第二预选区块链获取为与该待处理业务相匹配的第二预选区块链。
在实施中,可以对该资源调用消息进行分析,确定该资源调用消息所属的类型,然后,可以从至少一个第二预选区块链中获取能够处理或响应上述类型的消息的第二预选区块链,可以将获取的处理上述类型的消息的第二预选区块链获取为与该待处理业务相匹配的第二预选区块链。需要说明的是,如果能够处理上述类型的消息的第二预选区块链为多个,则可以从中选择一个第二预选区块链作为与该待处理业务相匹配的第二预选区块链。
在步骤S416中,从预先存储的跨链交互权限信息中,查找第一区块链与第二区块链之间进行跨链交互的跨链交互权限信息。
在实施中,当通过上述步骤S410和步骤S414的处理,确定第一区块链和第二区块链后,可以从预先存储的跨链交互权限信息中,查找是否存在第一区块链与第二区块链之间进行跨链交互的跨链交互权限信息,如果查找到第一区块链与第二区块链之间进行跨链交互的跨链交互权限信息,则可以执行下述步骤S418的处理,如果未查找到第一区块链与第二区块链之间进行跨链交互的跨链交互权限信息,则表明第一区块链与第二区块链之间无法进行跨链交互。
在步骤S418中,如果查找到第一区块链与第二区块链之间进行跨链交互的跨链交互权限信息,则确定第一区块链与第二区块链之间具备进行跨链交互的权限。
在步骤S420中,通过第一区块链和第二区块链,对待处理业务进行跨链业务处理。
上述步骤S420的处理可以多种多样,以下提供一种可选的处理方式,即基于上述分配对上述业务处理请求进行处理的区块链,并将该业务处理请求提供给该区块链的处理,上述步骤S420具体可以包括:根据上述资源调用消息调用相应的资源;通过第一区块链和第二区块链,基于调用的资源,对待处理业务进行跨链业务处理。
上述步骤S420的处理可以多种多样,以下再提供一种可选的处理方式,具体可以 包括以下步骤A2~A8的处理。
在步骤A2中,获取第一区块链上的跨链请求。
其中,该跨链请求可以基于上述待处理业务确定,具体地,可以获取从业务处理请求中拆分出的业务发起方的数字身份信息和目标方的数字身份信息,以及待处理业务的相关信息,并可以基于上述信息生成跨链请求。
在步骤A4中,基于上述跨链请求向第二区块链发起请求,并接收第二区块链返回的响应数据和链上证明。
其中,响应数据可以是待处理业务相关的数据。链上证明可以对响应数据进行验证,例如可以确定该响应数据存在于第二区块链的区块链账本中等。
在步骤A6中,根据上述链上证明对上述响应数据进行验证,并在验证通过后根据已配置的可信证明转化技术生成相应的证明信息。
其中,生成的相应的证明信息可以是上述实施例中提到的中继器证明。可信证明转化技术可以如TEE(Trusted Execution Environment,可信执行环节技术)技术、POA(Proof of Authority,权威证明共识)技术、MPC(Secure Multi-Party Computation,安全多方计算)技术、零知识证明(Zero-Knowledge Proof)技术等,本说明书并不对此进行限制。由于不同的可信证明转化技术所实现的性能模型、安全边界等均不同,因而可以满足不同场景下的应用需求。
在步骤A8中,将上述响应数据和上述证明信息返回第一区块链,以对待处理业务进行跨链业务处理。
上述步骤S420的处理完成后,还可以通过以下方式继续处理,具体可以包括以下内容:将预设的信任根发送给第一区块链,以使第一区块链根据该信任根对上述响应数据和证明信息进行验证。
上述具体处理过程可以参见上述相关内容,在此不再赘述。
本说明书实施例提供一种业务处理的方法,在对待处理业务进行处理的过程中,可以在相应的业务处理请求中携带业务发起方的数字身份信息和目标方的数字身份信息,这样,可以基于业务发起方的数字身份信息,获取业务发起方的第一子数字身份信息,进而可以确定业务处理方执行待处理业务所相关的第一区块链,同样的,可以基于目标方的数字身份信息,获取目标方的第二子数字身份信息,进而可以确定目标方执行待处理业务所相关的第二区块链,然后,在第一区块链与第二区块链之间具备进行跨链交互的权限的情况下,通过第一区块链和第二区块链,对待处理业务进行跨链业务处理,从而实现了对待处理业务的跨链处理,提高了业务处理效率。
实施例五
如图5所示,本说明书实施例提供一种业务处理的方法,该方法的执行主体可以为上述实施例一或实施例二中提供的业务处理系统,该业务处理系统可以基于服务器构建,其中,该服务器可以是一个独立的服务器,还可以是由多个服务器构成的服务器集群等。该业务处理系统可以实现对某业务进行跨区块链的业务处理,上述提到的区块链可以是用于提供某项业务(如进行交易的业务等)服务的区块链等。该业务处理系统的具体结构,可以参见上述相关内容,在此不再赘述。该方法具体可以包括步骤S502~步骤S516。
在步骤S502中,获取待处理业务的业务处理请求,该业务处理请求用于请求处理业务发起方与目标方之间的待处理业务,该业务处理请求中包括业务发起方的数字身份信息和目标方的数字身份信息。
在实际应用中,业务处理请求中除了可以包括业务发起方的数字身份信息和目标方的数字身份信息外,还可以包括如业务处理请求所属的类型,例如转账类、扫码支付类或离线支付类等,具体可以根据实际情况设定,本说明书实施例对此不做限定。
在步骤S504中,确定业务发起方和目标方的数字身份信息的有效性,并根据该业务处理请求所属的类型确定该业务处理请求是否符合预定消息格式规则。
在步骤S506中,如果业务发起方和目标方的数字身份信息有效,且该业务处理请求符合预定消息格式规则,则根据业务发起方的数字身份信息,获取业务发起方的第一子数字身份信息,以及,根据目标方的数字身份信息,获取目标方的第二子数字身份信息。
在实际应用中,如果业务发起方和目标方的数字身份信息有效,且该业务处理请求符合预定消息格式规则,则还可以为该业务处理请求分配相应的区块链,通过分配的区块链对该业务处理请求进行处理,具体可以包括以下内容:分配对上述业务处理请求进行处理的区块链,并将该业务处理请求提供给该区块链,以使在该区块链对该业务处理请求进行消息拆分处理,生成资源调用消息。
此外,在执行上述分配对上述业务处理请求进行处理的区块链,并将该业务处理请求提供给该区块链的处理中,还可以包括以下内容:业务处理请求中还可以包括可验证声明,则对可验证声明的有效性进行验证;如果验证通过,则分配对该业务处理请求进行处理的区块链,并将该业务处理请求提供给该区块链。
在实际应用中,确定业务处理方执行待处理业务所相关的第一区块链和目标方执行待处理业务所相关的第二区块链的处理方式可以多种多样,本实施例中可以通过执行 待处理业务所需的中间件类型的方式实现,具体可以参见下述步骤S508和步骤S510的处理。
在步骤S508中,根据上述待处理业务、第一子数字身份信息和第二子数字身份信息,确定业务发起方与目标方之间执行待处理业务所需的预选中间件类型。
其中,中间件类型可以是执行待处理业务的过程中需要使用或经历的中间件所属的类型,中间件类型可以根据实际情况设定,具体如,可以包括Mychain、Fabric、C3S和Data等。
在实施中,通过上述步骤得到第一子数字身份信息和第二子数字身份信息,可以基于上述待处理业务,从第一子数字身份信息出发,执行待处理业务直到到达目标方的第二子数字身份信息,获取上述执行待处理业务的过程中所需的中间件类型,并可以将获取的中间件类型作为预选中间件类型。
在步骤S510中,根据确定的预选中间件类型、第一子数字身份信息对应的访问权限和第二子数字身份信息对应的访问权限,分别确定业务处理方执行待处理业务所相关的第一区块链和目标方执行待处理业务所相关的第二区块链。
其中,第一子数字身份信息对应的访问权限可以包括第一子数字身份信息对应的业务发起方对预选中间件类型对应的中间件的访问权限,第二子数字身份信息对应的访问权限可以包括第二子数字身份信息对应的目标方对预选中间件类型对应的中间件的访问权限。
在实施中,可以基于确定的预选中间件类型、第一子数字身份信息对应的业务发起方对各类型对应的中间件的访问权限和第二子数字身份信息对应的目标方对各类型对应的中间件的访问权限,从中选取第一子数字身份信息对应的业务发起方和第二子数字身份信息对应的目标方均具备访问权限的中间件类型,并可以基于选取的中间件类型确定业务处理方执行待处理业务所相关的第一区块链和目标方执行待处理业务所相关的第二区块链。
在步骤S512中,从预先存储的跨链交互权限信息中,查找第一区块链与第二区块链之间进行跨链交互的跨链交互权限信息。
其中,跨链交互权限信息可以是预先设定的多个区块链之间能够进行跨区块链交互的权限的信息,具体如,预先存储有区块链1与区块链2的跨链交互权限信息,则表明区块链1与区块链2之间可以进行跨链交互。
在步骤S514中,如果查找到第一区块链与第二区块链之间进行跨链交互的跨链交互权限信息,则确定第一区块链与第二区块链之间具备进行跨链交互的权限。
在步骤S516中,通过第一区块链和第二区块链,对待处理业务进行跨链业务处理。
上述步骤S516的处理可以多种多样,以下提供一种可选的处理方式,具体可以包括:根据上述资源调用消息调用相应的资源;通过第一区块链和第二区块链,基于调用的资源,对待处理业务进行跨链业务处理。
上述步骤S516的处理可以多种多样,以下再提供一种可选的处理方式,具体可以包括以下步骤B2~B8的处理。
在步骤B2中,获取第一区块链上的跨链请求。
其中,该跨链请求可以基于上述待处理业务确定。
在步骤A4中,基于上述跨链请求向第二区块链发起请求,并接收第二区块链返回的响应数据和链上证明。
在步骤A6中,根据上述链上证明对上述响应数据进行验证,并在验证通过后根据已配置的可信证明转化技术生成相应的证明信息。
在步骤A8中,将上述响应数据和上述证明信息返回第一区块链,以对待处理业务进行跨链业务处理。
上述步骤S516的处理完成后,还可以通过以下方式继续处理,具体可以包括以下内容:将预设的信任根发送给第一区块链,以使第一区块链根据该信任根对上述响应数据和证明信息进行验证。
上述具体处理过程可以参见上述相关内容,在此不再赘述。
本说明书实施例提供一种业务处理的方法,在对待处理业务进行处理的过程中,可以在相应的业务处理请求中携带业务发起方的数字身份信息和目标方的数字身份信息,这样,可以基于业务发起方的数字身份信息,获取业务发起方的第一子数字身份信息,进而可以确定业务处理方执行待处理业务所相关的第一区块链,同样的,可以基于目标方的数字身份信息,获取目标方的第二子数字身份信息,进而可以确定目标方执行待处理业务所相关的第二区块链,然后,在第一区块链与第二区块链之间具备进行跨链交互的权限的情况下,通过第一区块链和第二区块链,对待处理业务进行跨链业务处理,从而实现了对待处理业务的跨链处理,提高了业务处理效率。
实施例六
以上为本说明书实施例提供的业务处理的方法,基于同样的思路,本说明书实施例还提供一种业务处理的装置,如图6所示。
该业务处理的装置包括:业务请求模块601、数字身份获取模块602、区块链确定模块603和跨链处理模块604,其中:
业务请求模块601,获取待处理业务的业务处理请求,所述业务处理请求用于请求处理业务发起方与目标方之间的所述待处理业务,所述业务处理请求中包括所述业务发起方的数字身份信息和所述目标方的数字身份信息;
数字身份获取模块602,根据所述业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息;以及,根据所述目标方的数字身份信息,获取所述目标方的第二子数字身份信息;
区块链确定模块603,根据所述业务处理请求和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链;以及,根据所述业务处理请求和所述第二子数字身份信息,确定所述目标方执行所述待处理业务所相关的第二区块链;
跨链处理模块604,如果所述第一区块链与所述第二区块链之间具备进行跨链交互的权限,则通过所述第一区块链和所述第二区块链,对所述待处理业务进行跨链业务处理。
本说明书实施例中,所述装置还包括:分配模块,用分配对所述业务处理请求进行处理的区块链,并将所述业务处理请求提供给所述区块链,以使在所述区块链对所述业务处理请求进行消息拆分处理,生成资源调用消息。
所述跨链处理模块604,包括:资源获取单元,根据所述资源调用消息调用相应的资源;跨链处理模块,通过所述第一区块链和所述第二区块链,基于调用的所述资源,对所述待处理业务进行跨链业务处理。
本说明书实施例中,所述业务处理请求中还包括可验证声明,所述分配模块,包括:验证单元,对所述可验证声明的有效性进行验证;分配单元,如果验证通过,则分配对所述业务处理请求进行处理的区块链,并将所述业务处理请求提供给所述区块链。
本说明书实施例中,所述区块链确定模块603,包括:第一预选单元,获取每个所述第一子数字身份信息对应的第一预选区块链,得到至少一个所述第一预选区块链;第一区块链确定单元,从至少一个所述第一预选区块链中,获取与所述待处理业务相匹配的第一预选区块链,将获取的与所述待处理业务相匹配的第一预选区块链确定为所述业务处理方执行所述待处理业务所相关的第一区块链。
和/或,所述区块链确定模块603,包括:第二预选单元,获取每个所述第二子数字身份信息对应的第二预选区块链,得到至少一个所述第二预选区块链;第二区块链确定单元,从至少一个所述第二预选区块链中,获取与所述待处理业务相匹配的第二预选区块链,将获取的与所述待处理业务相匹配的第二预选区块链确定为所述业务处理方执行所述待处理业务所相关的第二区块链。
本说明书实施例中,所述第一预选单元,根据所述资源调用消息所属的类型,从至少一个所述第一预选区块链中,获取处理所述类型的消息的第一预选区块链,将获取的处理所述类型的消息的第一预选区块链获取为与所述待处理业务相匹配的第一预选区块链;和/或,所述第二预选单元,根据所述资源调用消息所属的类型,从至少一个所述第二预选区块链中,获取处理所述类型的消息的第二预选区块链,将获取的处理所述类型的消息的第二预选区块链获取为与所述待处理业务相匹配的第二预选区块链。
本说明书实施例中,所述数字身份获取模块602,包括:验证单元,确定所述业务发起方和所述目标方的数字身份信息的有效性,并根据所述业务处理请求所属的类型确定所述业务处理请求是否符合预定消息格式规则;数字身份获取单元,如果所述业务发起方和所述目标方的数字身份信息有效,且所述业务处理请求符合预定消息格式规则,则根据所述业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息,以及,根据所述目标方的数字身份信息,获取所述目标方的第二子数字身份信息。
本说明书实施例中,所述装置还包括:权限查找模块,从预先存储的跨链交互权限信息中,查找所述第一区块链与所述第二区块链之间进行跨链交互的跨链交互权限信息;跨链权限确定模块,如果查找到所述第一区块链与所述第二区块链之间进行跨链交互的跨链交互权限信息,则确定所述第一区块链与所述第二区块链之间具备进行跨链交互的权限。
本说明书实施例中,所述跨链处理模块604,包括:跨链请求单元,获取所述第一区块链上的跨链请求,所述跨链请求基于所述待处理业务确定;信息接收单元,基于所述跨链请求向所述第二区块链发起请求,并接收所述第二区块链返回的响应数据和链上证明;验证单元,根据所述链上证明对所述响应数据进行验证,并在验证通过后根据已配置的可信证明转化技术生成相应的证明信息;跨链处理单元,将所述响应数据和所述证明信息返回所述第一区块链,以对所述待处理业务进行跨链业务处理。
本说明书实施例中,所述装置还包括:信任根发送模块,将预设的信任根发送给所述第一区块链,以使所述第一区块链根据所述信任根对所述响应数据和所述证明信息进行验证。
本说明书实施例中,所述区块链确定模块603,包括:类型确定单元,根据所述待处理业务、所述第一子数字身份信息和所述第二子数字身份信息,确定所述业务发起方与所述目标方之间执行所述待处理业务所需的预选中间件类型;区块链确定单元,根据确定的所述预选中间件类型、所述第一子数字身份信息对应的访问权限和所述第二子数字身份信息对应的访问权限,分别确定所述业务处理方执行所述待处理业务所相关的第 一区块链和所述目标方执行所述待处理业务所相关的第二区块链。
本说明书实施例提供一种业务处理的装置,在对待处理业务进行处理的过程中,可以在相应的业务处理请求中携带业务发起方的数字身份信息和目标方的数字身份信息,这样,可以基于业务发起方的数字身份信息,获取业务发起方的第一子数字身份信息,进而可以确定业务处理方执行待处理业务所相关的第一区块链,同样的,可以基于目标方的数字身份信息,获取目标方的第二子数字身份信息,进而可以确定目标方执行待处理业务所相关的第二区块链,然后,在第一区块链与第二区块链之间具备进行跨链交互的权限的情况下,通过第一区块链和第二区块链,对待处理业务进行跨链业务处理,从而实现了对待处理业务的跨链处理,提高了业务处理效率。
实施例七
以上为本说明书实施例提供的业务处理的装置,基于同样的思路,本说明书实施例还提供一种业务处理的设备,如图7所示。
所述业务处理的设备可以为上述实施例提供的业务处理系统对应的设备。
业务处理的设备可因配置或性能不同而产生比较大的差异,可以包括一个或一个以上的处理器701和存储器702,存储器702中可以存储有一个或一个以上存储应用程序或数据。其中,存储器702可以是短暂存储或持久存储。存储在存储器702的应用程序可以包括一个或一个以上模块(图示未示出),每个模块可以包括对业务处理的设备中的一系列计算机可执行指令。更进一步地,处理器701可以设置为与存储器702通信,在业务处理的设备上执行存储器702中的一系列计算机可执行指令。业务处理的设备还可以包括一个或一个以上电源703、一个或一个以上有线或无线网络接口704、一个或一个以上输入输出接口705以及一个或一个以上键盘706。
具体在本实施例中,业务处理的设备包括有存储器,以及一个或一个以上的程序,其中一个或者一个以上程序存储于存储器中,且一个或者一个以上程序可以包括一个或一个以上模块,且每个模块可以包括对业务处理的设备中的一系列计算机可执行指令,且经配置以由一个或者一个以上处理器执行该一个或者一个以上程序包含用于进行以下计算机可执行指令:获取待处理业务的业务处理请求,所述业务处理请求用于请求处理业务发起方与目标方之间的所述待处理业务,所述业务处理请求中包括所述业务发起方的数字身份信息和所述目标方的数字身份信息;根据所述业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息;以及,根据所述目标方的数字身份信息,获取所述目标方的第二子数字身份信息;根据所述业务处理请求和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链;以及,根据所述 业务处理请求和所述第二子数字身份信息,确定所述目标方执行所述待处理业务所相关的第二区块链;如果所述第一区块链与所述第二区块链之间具备进行跨链交互的权限,则通过所述第一区块链和所述第二区块链,对所述待处理业务进行跨链业务处理。
本说明书实施例中,还包括:分配对所述业务处理请求进行处理的区块链,并将所述业务处理请求提供给所述区块链,以使在所述区块链对所述业务处理请求进行消息拆分处理,生成资源调用消息;所述通过所述第一区块链和所述第二区块链,对所述待处理业务进行跨链业务处理,包括:根据所述资源调用消息调用相应的资源;通过所述第一区块链和所述第二区块链,基于调用的所述资源,对所述待处理业务进行跨链业务处理。
本说明书实施例中,所述业务处理请求中还包括可验证声明,所述分配对所述业务处理请求进行处理的区块链,并将所述业务处理请求提供给所述区块链,包括:对所述可验证声明的有效性进行验证;如果验证通过,则分配对所述业务处理请求进行处理的区块链,并将所述业务处理请求提供给所述区块链。
本说明书实施例中,所述根据所述业务处理请求和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链,包括:获取每个所述第一子数字身份信息对应的第一预选区块链,得到至少一个所述第一预选区块链;从至少一个所述第一预选区块链中,获取与所述待处理业务相匹配的第一预选区块链,将获取的与所述待处理业务相匹配的第一预选区块链确定为所述业务处理方执行所述待处理业务所相关的第一区块链;和/或,所述根据所述业务处理请求和所述第二子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第二区块链,包括:获取每个所述第二子数字身份信息对应的第二预选区块链,得到至少一个所述第二预选区块链;从至少一个所述第二预选区块链中,获取与所述待处理业务相匹配的第二预选区块链,将获取的与所述待处理业务相匹配的第二预选区块链确定为所述业务处理方执行所述待处理业务所相关的第二区块链。
本说明书实施例中,所述从至少一个所述第一预选区块链中,获取与所述待处理业务相匹配的第一预选区块链,包括:根据所述资源调用消息所属的类型,从至少一个所述第一预选区块链中,获取处理所述类型的消息的第一预选区块链,将获取的处理所述类型的消息的第一预选区块链获取为与所述待处理业务相匹配的第一预选区块链;和/或,所述从至少一个所述第二预选区块链中,获取与所述业务处理请求相匹配的第二预选区块链,包括:根据所述资源调用消息所属的类型,从至少一个所述第二预选区块链中,获取处理所述类型的消息的第二预选区块链,将获取的处理所述类型的消息的第二 预选区块链获取为与所述待处理业务相匹配的第二预选区块链。
本说明书实施例中,所述根据所述业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息,以及,根据所述目标方的数字身份信息,获取所述目标方的第二子数字身份信息,包括:确定所述业务发起方和所述目标方的数字身份信息的有效性,并根据所述业务处理请求所属的类型确定所述业务处理请求是否符合预定消息格式规则;如果所述业务发起方和所述目标方的数字身份信息有效,且所述业务处理请求符合预定消息格式规则,则根据所述业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息,以及,根据所述目标方的数字身份信息,获取所述目标方的第二子数字身份信息。
本说明书实施例中,还包括:从预先存储的跨链交互权限信息中,查找所述第一区块链与所述第二区块链之间进行跨链交互的跨链交互权限信息;如果查找到所述第一区块链与所述第二区块链之间进行跨链交互的跨链交互权限信息,则确定所述第一区块链与所述第二区块链之间具备进行跨链交互的权限。
本说明书实施例中,所述通过所述第一区块链和所述第二区块链,对所述待处理业务进行跨链业务处理,包括:获取所述第一区块链上的跨链请求,所述跨链请求基于所述待处理业务确定;基于所述跨链请求向所述第二区块链发起请求,并接收所述第二区块链返回的响应数据和链上证明;根据所述链上证明对所述响应数据进行验证,并在验证通过后根据已配置的可信证明转化技术生成相应的证明信息;将所述响应数据和所述证明信息返回所述第一区块链,以对所述待处理业务进行跨链业务处理。
本说明书实施例中,还包括:将预设的信任根发送给所述第一区块链,以使所述第一区块链根据所述信任根对所述响应数据和所述证明信息进行验证。
本说明书实施例中,所述根据所述待处理业务和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链,以及,根据所述待处理业务和所述第二子数字身份信息,确定所述目标方执行所述待处理业务所相关的第二区块链,包括:根据所述待处理业务、所述第一子数字身份信息和所述第二子数字身份信息,确定所述业务发起方与所述目标方之间执行所述待处理业务所需的预选中间件类型;根据确定的所述预选中间件类型、所述第一子数字身份信息对应的访问权限和所述第二子数字身份信息对应的访问权限,分别确定所述业务处理方执行所述待处理业务所相关的第一区块链和所述目标方执行所述待处理业务所相关的第二区块链。
本说明书实施例提供一种业务处理的设备,在对待处理业务进行处理的过程中,可以在相应的业务处理请求中携带业务发起方的数字身份信息和目标方的数字身份信 息,这样,可以基于业务发起方的数字身份信息,获取业务发起方的第一子数字身份信息,进而可以确定业务处理方执行待处理业务所相关的第一区块链,同样的,可以基于目标方的数字身份信息,获取目标方的第二子数字身份信息,进而可以确定目标方执行待处理业务所相关的第二区块链,然后,在第一区块链与第二区块链之间具备进行跨链交互的权限的情况下,通过第一区块链和第二区块链,对待处理业务进行跨链业务处理,从而实现了对待处理业务的跨链处理,提高了业务处理效率。
上述对本说明书特定实施例进行了描述。其它实施例在所附权利要求书的范围内。在一些情况下,在权利要求书中记载的动作或步骤可以按照不同于实施例中的顺序来执行并且仍然可以实现期望的结果。另外,在附图中描绘的过程不一定要求示出的特定顺序或者连续顺序才能实现期望的结果。在某些实施方式中,多任务处理和并行处理也是可以的或者可能是有利的。
在20世纪90年代,对于一个技术的改进可以很明显地区分是硬件上的改进(例如,对二极管、晶体管、开关等电路结构的改进)还是软件上的改进(对于方法流程的改进)。然而,随着技术的发展,当今的很多方法流程的改进已经可以视为硬件电路结构的直接改进。设计人员几乎都通过将改进的方法流程编程到硬件电路中来得到相应的硬件电路结构。因此,不能说一个方法流程的改进就不能用硬件实体模块来实现。例如,可编程逻辑器件(Programmable Logic Device,PLD)(例如现场可编程门阵列(Field Programmable Gate Array,FPGA))就是这样一种集成电路,其逻辑功能由用户对器件编程来确定。由设计人员自行编程来把一个数字系统“集成”在一片PLD上,而不需要请芯片制造厂商来设计和制作专用的集成电路芯片。而且,如今,取代手工地制作集成电路芯片,这种编程也多半改用“逻辑编译器(logic compiler)”软件来实现,它与程序开发撰写时所用的软件编译器相类似,而要编译之前的原始代码也得用特定的编程语言来撰写,此称之为硬件描述语言(Hardware Description Language,HDL),而HDL也并非仅有一种,而是有许多种,如ABEL(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language)等,目前最普遍使用的是VHDL(Very-High-Speed Integrated Circuit Hardware Description Language)与Verilog。本领域技术人员也应该清楚,只需要将方法流程用上述几种硬件描述语言稍作逻辑编程并编程到集成电路中,就可以很容易得到实现该逻辑方法流程的硬件电路。
控制器可以按任何适当的方式实现,例如,控制器可以采取例如微处理器或处理 器以及存储可由该(微)处理器执行的计算机可读程序代码(例如软件或固件)的计算机可读介质、逻辑门、开关、专用集成电路(Application Specific Integrated Circuit,ASIC)、可编程逻辑控制器和嵌入微控制器的形式,控制器的例子包括但不限于以下微控制器:ARC 625D、Atmel AT91SAM、Microchip PIC18F26K20以及Silicone Labs C8051F320,存储器控制器还可以被实现为存储器的控制逻辑的一部分。本领域技术人员也知道,除了以纯计算机可读程序代码方式实现控制器以外,完全可以通过将方法步骤进行逻辑编程来使得控制器以逻辑门、开关、专用集成电路、可编程逻辑控制器和嵌入微控制器等的形式来实现相同功能。因此这种控制器可以被认为是一种硬件部件,而对其内包括的用于实现各种功能的装置也可以视为硬件部件内的结构。或者甚至,可以将用于实现各种功能的装置视为既可以是实现方法的软件模块又可以是硬件部件内的结构。
上述实施例阐明的系统、装置、模块或单元,具体可以由计算机芯片或实体实现,或者由具有某种功能的产品来实现。一种典型的实现设备为计算机。具体的,计算机例如可以为个人计算机、膝上型计算机、蜂窝电话、相机电话、智能电话、个人数字助理、媒体播放器、导航设备、电子邮件设备、游戏控制台、平板计算机、可穿戴设备或者这些设备中的任何设备的组合。
为了描述的方便,描述以上装置时以功能分为各种单元分别描述。当然,在实施本说明书一个或多个实施例时可以把各单元的功能在同一个或多个软件和/或硬件中实现。
本领域内的技术人员应明白,本说明书的实施例可提供为方法、系统、或计算机程序产品。因此,本说明书一个或多个实施例可采用完全硬件实施例、完全软件实施例、或结合软件和硬件方面的实施例的形式。而且,本说明书一个或多个实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本说明书的实施例是参照根据本说明书实施例的方法、设备(系统)、和计算机程序产品的流程图和/或方框图来描述的。应理解可由计算机程序指令实现流程图和/或方框图中的每一流程和/或方框、以及流程图和/或方框图中的流程和/或方框的结合。可提供这些计算机程序指令到通用计算机、专用计算机、嵌入式处理机或其他可编程业务处理的设备的处理器以产生一个机器,使得通过计算机或其他可编程业务处理的设备的处理器执行的指令产生用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的装置。
这些计算机程序指令也可存储在能引导计算机或其他可编程业务处理的设备以特 定方式工作的计算机可读存储器中,使得存储在该计算机可读存储器中的指令产生包括指令装置的制造品,该指令装置实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能。
这些计算机程序指令也可装载到计算机或其他可编程业务处理的设备上,使得在计算机或其他可编程设备上执行一系列操作步骤以产生计算机实现的处理,从而在计算机或其他可编程设备上执行的指令提供用于实现在流程图一个流程或多个流程和/或方框图一个方框或多个方框中指定的功能的步骤。
在一个典型的配置中,计算设备包括一个或多个处理器(CPU)、输入/输出接口、网络接口和内存。
内存可能包括计算机可读介质中的非永久性存储器,随机存取存储器(RAM)和/或非易失性内存等形式,如只读存储器(ROM)或闪存(flash RAM)。内存是计算机可读介质的示例。
计算机可读介质包括永久性和非永久性、可移动和非可移动媒体可以由任何方法或技术来实现信息存储。信息可以是计算机可读指令、数据结构、程序的模块或其他数据。计算机的存储介质的例子包括,但不限于相变内存(PRAM)、静态随机存取存储器(SRAM)、动态随机存取存储器(DRAM)、其他类型的随机存取存储器(RAM)、只读存储器(ROM)、电可擦除可编程只读存储器(EEPROM)、快闪记忆体或其他内存技术、只读光盘只读存储器(CD-ROM)、数字多功能光盘(DVD)或其他光学存储、磁盒式磁带,磁带磁磁盘存储或其他磁性存储设备或任何其他非传输介质,可用于存储可以被计算设备访问的信息。按照本文中的界定,计算机可读介质不包括暂存电脑可读媒体(transitory media),如调制的数据信号和载波。
还需要说明的是,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、商品或者设备不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、商品或者设备所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括所述要素的过程、方法、商品或者设备中还存在另外的相同要素。
本领域技术人员应明白,本说明书的实施例可提供为方法、系统或计算机程序产品。因此,本说明书一个或多个实施例可采用完全硬件实施例、完全软件实施例或结合软件和硬件方面的实施例的形式。而且,本说明书一个或多个实施例可采用在一个或多个其中包含有计算机可用程序代码的计算机可用存储介质(包括但不限于磁盘存储器、CD-ROM、光学存储器等)上实施的计算机程序产品的形式。
本说明书一个或多个实施例可以在由计算机执行的计算机可执行指令的一般上下文中描述,例如程序模块。一般地,程序模块包括执行特定任务或实现特定抽象数据类型的例程、程序、对象、组件、数据结构等等。也可以在分布式计算环境中实践本说明书一个或多个实施例,在这些分布式计算环境中,由通过通信网络而被连接的远程处理设备来执行任务。在分布式计算环境中,程序模块可以位于包括存储设备在内的本地和远程计算机存储介质中。
本说明书中的各个实施例均采用递进的方式描述,各个实施例之间相同相似的部分互相参见即可,每个实施例重点说明的都是与其他实施例的不同之处。尤其,对于系统实施例而言,由于其基本相似于方法实施例,所以描述的比较简单,相关之处参见方法实施例的部分说明即可。
以上所述仅为本说明书的实施例而已,并不用于限制本说明书。对于本领域技术人员来说,本说明书可以有各种更改和变化。凡在本说明书的精神和原理之内所作的任何修改、等同替换、改进等,均应包含在本说明书的权利要求范围之内。

Claims (23)

  1. 一种业务处理系统,所述业务处理系统包括应用层子系统、服务层子系统、路由层子系统和资源层子系统,其中:
    所述应用层子系统,获取用户对待处理业务的业务处理请求,并转发所述业务处理请求至所述服务层子系统;
    所述服务层子系统,分配对所述业务处理请求进行处理的区块链,并将所述业务处理请求提供给所述区块链,以使所述区块链对所述业务处理请求进行消息拆分处理,生成资源调用消息发送至所述路由层子系统;
    所述路由层子系统,基于执行所述待处理业务所需调度的资源,转发所述资源调用消息至所述资源层子系统;
    所述资源层子系统,根据从所述业务处理请求拆分出的业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息,以及,根据从所述业务处理请求拆分出的目标方的数字身份信息,获取所述目标方的第二子数字身份信息,并根据所述待处理业务和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链,根据所述待处理业务和所述第二子数字身份信息,确定所述目标方执行所述待处理业务所相关的第二区块链,在所述第一区块链与所述第二区块链之间具备进行跨链交互的权限时,通过所述第一区块链和所述第二区块链,基于所述资源调用消息,对所述待处理业务进行跨链业务处理。
  2. 根据权利要求1所述的业务处理系统,所述应用层子系统包括部署于用户终端设备的客户端应用,所述客户端应用获取用户对所述待处理业务的业务处理请求,并将所述业务处理请求发送给所述服务层子系统,所述业务处理请求中包括所述业务发起方的数字身份信息和所述目标方的数字身份信息。
  3. 根据权利要求2所述的业务处理系统,所述路由层子系统被配置为根据所述业务发起方的数字身份信息和所述目标方的数字身份信息,分别确定所述业务发起方执行所述待处理业务所需资源的调度位置和所述目标方执行所述待处理业务所需资源的调度位置,并基于所述调度位置转发所述资源调用消息。
  4. 根据权利要求1所述的业务处理系统,所述资源层子系统还配置为提供执行所述待处理业务所需的资源。
  5. 根据权利要求3所述的业务处理系统,所述业务处理系统还包括权限检查模块,所述权限检查模块被配置为确定所述业务发起方和所述目标方的数字身份信息的有效性,并根据所述业务处理请求所属的类型确定所述业务处理请求是否符合预定消息格式 规则,以及,从预先存储的跨链交互权限信息中,查找所述第一区块链与所述第二区块链之间进行跨链交互的跨链交互权限信息。
  6. 根据权利要求5所述的业务处理系统,所述权限检查模块包括第一权限检查单元和第二权限检查单元,所述第一权限检查单元设置于所述服务层子系统中或设置于所述资源层子系统中,所述第二权限检查单元设置于所述资源层子系统中,其中:
    所述第一权限检查单元被配置为确定所述业务发起方和所述目标方的数字身份信息的有效性,并根据所述业务处理请求所属的类型确定所述业务处理请求是否符合预定消息格式规则;
    所述第二权限检查单元被配置为从预先存储的跨链交互权限信息中,查找所述第一区块链与所述第二区块链之间进行跨链交互的跨链交互权限信息。
  7. 根据权利要求6所述的业务处理系统,所述业务处理请求中还包括可验证声明,所述第一权限检查单元设置于所述服务层子系统中,所述第一权限检查单元还被配置为对所述可验证声明的有效性进行验证,并在验证通过后,分配对所述业务处理请求进行处理的区块链,并将所述业务处理请求提供给所述区块链。
  8. 根据权利要求6所述的业务处理系统,所述资源层子系统还包括消息处理模块,所述第二权限检查单元与所述消息处理模块相连接,所述消息处理模块被配置为确定所述资源调用消息所属的类型;
    所述消息处理模块被配置为根据所述资源调用消息所属的类型,从至少一个所述第一预选区块链中,获取处理所述类型的消息的第一预选区块链,将获取的处理所述类型的消息的第一预选区块链获取为所述业务处理方执行所述待处理业务所相关的第一预选区块链;和/或,根据所述资源调用消息所属的类型,从至少一个所述第二预选区块链中,获取处理所述类型的消息的第二预选区块链,将获取的处理所述类型的消息的第二预选区块链获取为所述目标方执行所述待处理业务所相关的第二预选区块链。
  9. 根据权利要求2所述的业务处理系统,所述资源层子系统还包括跨区块链的交互模块,所述跨区块链的交互模块被配置为通过所述第一区块链和所述第二区块链,对所述待处理业务进行跨链业务处理,所述跨区块链的交互模块,包括:
    一个或多个锚定器;其中,当任一锚定器被所述第一区块链选用时,所述任一锚定器中配置有所述第一区块链的客户端应用,以监听所述第一区块链上的跨链请求,所述跨链请求基于所述待处理业务确定;
    一个或多个中继器;其中,当任一中继器被所述第二区块链选用时,所述任一中继器上配置有所述第二区块链的客户端应用,且所述任一中继器在所述跨链请求的请求对 象为所述第二区块链时,基于所述跨链请求向所述第二区块链发起请求,并接收所述第二区块链返回的响应数据和链上证明,使所述任一中继器根据所述链上证明对所述响应数据进行验证,以及所述任一中继器在验证通过后根据已配置的可信证明转化技术生成相应的中继器证明,以使所述响应数据和所述中继器证明经由所述任一锚定器返回所述第一区块链。
  10. 根据权利要求9所述的业务处理系统,所述跨区块链的交互模块还包括:
    至少一个桥接器;其中,任一桥接器分别连接至所述任一锚定器与所述任一中继器,用于将所述任一锚定器提供的跨链请求转发至所述任一中继器,并将所述任一中继器提供的所述响应数据和所述中继器证明转发至所述任一锚定器。
  11. 根据权利要求9所述的业务处理系统,所述任一中继器的信任根被预先发布,以使所述第一区块链根据所述信任根对所述响应数据和所述中继器证明进行验证。
  12. 一种业务处理的方法,所述方法包括:
    获取待处理业务的业务处理请求,所述业务处理请求用于请求处理业务发起方与目标方之间的所述待处理业务,所述业务处理请求中包括所述业务发起方的数字身份信息和所述目标方的数字身份信息;
    根据所述业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息;以及,根据所述目标方的数字身份信息,获取所述目标方的第二子数字身份信息;
    根据所述业务处理请求和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链;以及,根据所述业务处理请求和所述第二子数字身份信息,确定所述目标方执行所述待处理业务所相关的第二区块链;
    如果所述第一区块链与所述第二区块链之间具备进行跨链交互的权限,则通过所述第一区块链和所述第二区块链,对所述待处理业务进行跨链业务处理。
  13. 根据权利要求12所述的方法,所述方法还包括:
    分配对所述业务处理请求进行处理的区块链,并将所述业务处理请求提供给所述区块链,以使在所述区块链对所述业务处理请求进行消息拆分处理,生成资源调用消息;
    所述通过所述第一区块链和所述第二区块链,对所述待处理业务进行跨链业务处理,包括:
    根据所述资源调用消息调用相应的资源;
    通过所述第一区块链和所述第二区块链,基于调用的所述资源,对所述待处理业务进行跨链业务处理。
  14. 根据权利要求13所述的方法,所述业务处理请求中还包括可验证声明,所述 分配对所述业务处理请求进行处理的区块链,并将所述业务处理请求提供给所述区块链,包括:
    对所述可验证声明的有效性进行验证;
    如果验证通过,则分配对所述业务处理请求进行处理的区块链,并将所述业务处理请求提供给所述区块链。
  15. 根据权利要求14所述的方法,所述根据所述业务处理请求和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链,包括:
    获取每个所述第一子数字身份信息对应的第一预选区块链,得到至少一个所述第一预选区块链;
    从至少一个所述第一预选区块链中,获取与所述待处理业务相匹配的第一预选区块链,将获取的与所述待处理业务相匹配的第一预选区块链确定为所述业务处理方执行所述待处理业务所相关的第一区块链;和/或,
    所述根据所述业务处理请求和所述第二子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第二区块链,包括:
    获取每个所述第二子数字身份信息对应的第二预选区块链,得到至少一个所述第二预选区块链;
    从至少一个所述第二预选区块链中,获取与所述待处理业务相匹配的第二预选区块链,将获取的与所述待处理业务相匹配的第二预选区块链确定为所述业务处理方执行所述待处理业务所相关的第二区块链。
  16. 根据权利要求15所述的方法,所述从至少一个所述第一预选区块链中,获取与所述待处理业务相匹配的第一预选区块链,包括:
    根据所述资源调用消息所属的类型,从至少一个所述第一预选区块链中,获取处理所述类型的消息的第一预选区块链,将获取的处理所述类型的消息的第一预选区块链获取为与所述待处理业务相匹配的第一预选区块链;和/或,
    所述从至少一个所述第二预选区块链中,获取与所述业务处理请求相匹配的第二预选区块链,包括:
    根据所述资源调用消息所属的类型,从至少一个所述第二预选区块链中,获取处理所述类型的消息的第二预选区块链,将获取的处理所述类型的消息的第二预选区块链获取为与所述待处理业务相匹配的第二预选区块链。
  17. 根据权利要求16所述的方法,所述根据所述业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息,以及,根据所述目标方的数字身份信息,获 取所述目标方的第二子数字身份信息,包括:
    确定所述业务发起方和所述目标方的数字身份信息的有效性,并根据所述业务处理请求所属的类型确定所述业务处理请求是否符合预定消息格式规则;
    如果所述业务发起方和所述目标方的数字身份信息有效,且所述业务处理请求符合预定消息格式规则,则根据所述业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息,以及,根据所述目标方的数字身份信息,获取所述目标方的第二子数字身份信息。
  18. 根据权利要求12所述的方法,所述方法还包括:
    从预先存储的跨链交互权限信息中,查找所述第一区块链与所述第二区块链之间进行跨链交互的跨链交互权限信息;
    如果查找到所述第一区块链与所述第二区块链之间进行跨链交互的跨链交互权限信息,则确定所述第一区块链与所述第二区块链之间具备进行跨链交互的权限。
  19. 根据权利要求12所述的方法,所述通过所述第一区块链和所述第二区块链,对所述待处理业务进行跨链业务处理,包括:
    获取所述第一区块链上的跨链请求,所述跨链请求基于所述待处理业务确定;
    基于所述跨链请求向所述第二区块链发起请求,并接收所述第二区块链返回的响应数据和链上证明;
    根据所述链上证明对所述响应数据进行验证,并在验证通过后根据已配置的可信证明转化技术生成相应的证明信息;
    将所述响应数据和所述证明信息返回所述第一区块链,以对所述待处理业务进行跨链业务处理。
  20. 根据权利要求12所述的方法,所述方法还包括:
    将预设的信任根发送给所述第一区块链,以使所述第一区块链根据所述信任根对所述响应数据和所述证明信息进行验证。
  21. 根据权利要求12所述的方法,所述根据所述待处理业务和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链,以及,根据所述待处理业务和所述第二子数字身份信息,确定所述目标方执行所述待处理业务所相关的第二区块链,包括:
    根据所述待处理业务、所述第一子数字身份信息和所述第二子数字身份信息,确定所述业务发起方与所述目标方之间执行所述待处理业务所需的预选中间件类型;
    根据确定的所述预选中间件类型、所述第一子数字身份信息对应的访问权限和所述 第二子数字身份信息对应的访问权限,分别确定所述业务处理方执行所述待处理业务所相关的第一区块链和所述目标方执行所述待处理业务所相关的第二区块链。
  22. 一种业务处理的装置,所述装置包括:
    业务请求模块,获取待处理业务的业务处理请求,所述业务处理请求用于请求处理业务发起方与目标方之间的所述待处理业务,所述业务处理请求中包括所述业务发起方的数字身份信息和所述目标方的数字身份信息;
    数字身份获取模块,根据所述业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息;以及,根据所述目标方的数字身份信息,获取所述目标方的第二子数字身份信息;
    区块链确定模块,根据所述业务处理请求和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链;以及,根据所述业务处理请求和所述第二子数字身份信息,确定所述目标方执行所述待处理业务所相关的第二区块链;
    跨链处理模块,如果所述第一区块链与所述第二区块链之间具备进行跨链交互的权限,则通过所述第一区块链和所述第二区块链,对所述待处理业务进行跨链业务处理。
  23. 一种业务处理的设备,所述业务处理的设备包括:
    处理器;以及
    被安排成存储计算机可执行指令的存储器,所述可执行指令在被执行时使所述处理器:
    获取待处理业务的业务处理请求,所述业务处理请求用于请求处理业务发起方与目标方之间的所述待处理业务,所述业务处理请求中包括所述业务发起方的数字身份信息和所述目标方的数字身份信息;
    根据所述业务发起方的数字身份信息,获取所述业务发起方的第一子数字身份信息;以及,根据所述目标方的数字身份信息,获取所述目标方的第二子数字身份信息;
    根据所述业务处理请求和所述第一子数字身份信息,确定所述业务处理方执行所述待处理业务所相关的第一区块链;以及,根据所述业务处理请求和所述第二子数字身份信息,确定所述目标方执行所述待处理业务所相关的第二区块链;
    如果所述第一区块链与所述第二区块链之间具备进行跨链交互的权限,则通过所述第一区块链和所述第二区块链,对所述待处理业务进行跨链业务处理。
PCT/CN2020/132830 2020-03-05 2020-11-30 一种业务处理系统、业务处理的方法、装置及设备 WO2021174930A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010147246.7A CN111008840B (zh) 2020-03-05 2020-03-05 一种业务处理系统、业务处理的方法、装置及设备
CN202010147246.7 2020-03-05

Publications (1)

Publication Number Publication Date
WO2021174930A1 true WO2021174930A1 (zh) 2021-09-10

Family

ID=70121000

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/132830 WO2021174930A1 (zh) 2020-03-05 2020-11-30 一种业务处理系统、业务处理的方法、装置及设备

Country Status (2)

Country Link
CN (2) CN111724170B (zh)
WO (1) WO2021174930A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115988056A (zh) * 2023-01-05 2023-04-18 中国联合网络通信集团有限公司 一种跨区块链业务的控制方法

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111724170B (zh) * 2020-03-05 2022-10-11 支付宝(杭州)信息技术有限公司 一种业务处理系统、业务处理的方法、装置及设备
CN111008841B (zh) * 2020-03-05 2020-06-09 支付宝(杭州)信息技术有限公司 一种业务处理系统、业务处理的方法、装置及设备
CN111970380B (zh) * 2020-09-02 2022-06-07 广东贤能数字科技有限公司 基于区块链的业务处理方法和系统
CN112347491B (zh) * 2020-09-24 2023-06-27 上海对外经贸大学 一种用于双中台双链架构的内生性数据安全交互的方法
CN112463409A (zh) * 2020-12-04 2021-03-09 天津狮拓信息技术有限公司 数据交互方法、装置、电子设备及计算机可读存储介质
CN112235110B (zh) * 2020-12-14 2021-03-23 支付宝(杭州)信息技术有限公司 区块链的跨链业务处理方法、装置及电子设备
CN113129145B (zh) * 2021-03-12 2022-03-22 广州广电仲达数字科技有限公司 一种基于区块链的电子证据存证和验证方法及装置
CN114944937B (zh) * 2022-04-19 2024-04-09 网易(杭州)网络有限公司 分布式数字身份验证方法、系统、电子设备及存储介质

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180060496A1 (en) * 2016-08-23 2018-03-01 BBM Health LLC Blockchain-based mechanisms for secure health information resource exchange
CN108764925A (zh) * 2018-05-31 2018-11-06 李沁福 一种基于区块链技术的综合业务平台
CN108848119A (zh) * 2018-04-03 2018-11-20 阿里巴巴集团控股有限公司 跨区块链的交互方法及装置、系统、电子设备
CN109559227A (zh) * 2018-11-29 2019-04-02 咪咕文化科技有限公司 一种跨区块链网络的交易方法、装置及存储介质
CN110322382A (zh) * 2019-07-02 2019-10-11 软通智慧科技有限公司 一种基于paas云计算的智慧城市服务平台体系
CN111008840A (zh) * 2020-03-05 2020-04-14 支付宝(杭州)信息技术有限公司 一种业务处理系统、业务处理的方法、装置及设备
CN111008841A (zh) * 2020-03-05 2020-04-14 支付宝(杭州)信息技术有限公司 一种业务处理系统、业务处理的方法、装置及设备

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107332900A (zh) * 2017-06-27 2017-11-07 山东浪潮商用系统有限公司 一种支撑物联网融合业务的私有区块链管理平台
CN109214818B (zh) * 2017-06-30 2021-06-15 华为技术有限公司 一种跨链交易方法及装置
US11030217B2 (en) * 2018-05-01 2021-06-08 International Business Machines Corporation Blockchain implementing cross-chain transactions
US20200026834A1 (en) * 2018-07-23 2020-01-23 One Kosmos Inc. Blockchain identity safe and authentication system
CN109257342B (zh) * 2018-09-04 2020-05-26 阿里巴巴集团控股有限公司 区块链跨链的认证方法、系统、服务器及可读存储介质
CN109347955B (zh) * 2018-10-19 2021-03-02 北京奇艺世纪科技有限公司 一种区块链网络系统以及信息处理方法
CN110177101A (zh) * 2019-05-28 2019-08-27 四川城市职业学院 基于5g通信的信息处理方法和装置及相关设备
CN110266655B (zh) * 2019-05-30 2021-11-12 中国工商银行股份有限公司 一种基于区块链的跨链互联方法、设备以及系统

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180060496A1 (en) * 2016-08-23 2018-03-01 BBM Health LLC Blockchain-based mechanisms for secure health information resource exchange
CN108848119A (zh) * 2018-04-03 2018-11-20 阿里巴巴集团控股有限公司 跨区块链的交互方法及装置、系统、电子设备
CN108764925A (zh) * 2018-05-31 2018-11-06 李沁福 一种基于区块链技术的综合业务平台
CN109559227A (zh) * 2018-11-29 2019-04-02 咪咕文化科技有限公司 一种跨区块链网络的交易方法、装置及存储介质
CN110322382A (zh) * 2019-07-02 2019-10-11 软通智慧科技有限公司 一种基于paas云计算的智慧城市服务平台体系
CN111008840A (zh) * 2020-03-05 2020-04-14 支付宝(杭州)信息技术有限公司 一种业务处理系统、业务处理的方法、装置及设备
CN111008841A (zh) * 2020-03-05 2020-04-14 支付宝(杭州)信息技术有限公司 一种业务处理系统、业务处理的方法、装置及设备
CN111724169A (zh) * 2020-03-05 2020-09-29 支付宝(杭州)信息技术有限公司 一种业务处理系统、业务处理的方法、装置及设备
CN111724170A (zh) * 2020-03-05 2020-09-29 支付宝(杭州)信息技术有限公司 一种业务处理系统、业务处理的方法、装置及设备

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115988056A (zh) * 2023-01-05 2023-04-18 中国联合网络通信集团有限公司 一种跨区块链业务的控制方法

Also Published As

Publication number Publication date
CN111008840A (zh) 2020-04-14
CN111008840B (zh) 2020-07-31
CN111724170A (zh) 2020-09-29
CN111724170B (zh) 2022-10-11

Similar Documents

Publication Publication Date Title
WO2021174930A1 (zh) 一种业务处理系统、业务处理的方法、装置及设备
WO2021175057A1 (zh) 一种业务处理系统、业务处理的方法、装置及设备
CN110032883B (zh) 区块链中实现隐私保护的方法、系统和节点
WO2021017427A1 (zh) 基于区块链的身份验证方法、装置及设备
CN109614823B (zh) 一种数据的处理方法、装置及设备
TWI706654B (zh) 一種認證方法、基於區塊鏈的認證資料處理方法及裝置
KR102195351B1 (ko) 블록체인 시스템과 데이터 저장 방법 및 장치
TW202116040A (zh) 基於區塊鏈的可驗證聲明的創建方法、裝置、設備及系統
WO2021239104A1 (zh) 基于区块链的业务处理
WO2021227966A1 (zh) 绑定处理
CN110264198B (zh) 结合代码标注与交易类型的有条件的收据存储方法和节点
WO2020233609A1 (zh) 结合代码标注与用户类型的有条件的收据存储方法和节点
CN109214196B (zh) 一种数据交互方法、装置及设备
WO2020233637A1 (zh) 结合代码标注与用户类型的收据存储方法和节点
CN110245942B (zh) 结合用户类型和判断条件的收据存储方法和节点
CN110020856B (zh) 区块链中实现混合交易的方法、节点和存储介质
CN110245947B (zh) 结合交易与用户类型的条件限制的收据存储方法和节点
US11354447B2 (en) Data authorization information acquisition methods, apparatuses, and devices
CN111931154B (zh) 基于数字凭证的业务处理方法、装置及设备
CN110264197B (zh) 结合事件函数类型和判断条件的收据存储方法和节点
JP2017514218A (ja) サードパーティアプリケーションの実行
WO2020220744A1 (zh) 基于区块链的数据处理方法、装置和区块链节点
CN112948900A (zh) 应用于区块链系统的链下数据获取方法和装置
WO2021238996A1 (zh) 一种资源处理方法、装置及设备
TW201909012A (zh) 資訊驗證處理方法、裝置、系統、客戶端及伺服器

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20922532

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20922532

Country of ref document: EP

Kind code of ref document: A1