WO2022216205A1 - Procédé et appareil de communication sécurisée utilisant deux protocoles de chaîne de blocs différents - Google Patents

Procédé et appareil de communication sécurisée utilisant deux protocoles de chaîne de blocs différents Download PDF

Info

Publication number
WO2022216205A1
WO2022216205A1 PCT/SE2022/050339 SE2022050339W WO2022216205A1 WO 2022216205 A1 WO2022216205 A1 WO 2022216205A1 SE 2022050339 W SE2022050339 W SE 2022050339W WO 2022216205 A1 WO2022216205 A1 WO 2022216205A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
blockchain
protocol
network nodes
blockchain protocol
Prior art date
Application number
PCT/SE2022/050339
Other languages
English (en)
Inventor
Fredrik Johansson
Original Assignee
Rz Capital Holding Ab
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Rz Capital Holding Ab filed Critical Rz Capital Holding Ab
Publication of WO2022216205A1 publication Critical patent/WO2022216205A1/fr

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • Embodiments herein relate to an apparatus and a method therein. In some aspects, 5 they relate to handling secure communication using one or more blockchains in a communications network.
  • SHA256 algorithm was proposed by Guilford J.D which is employed in the blockchain. The original exchange of any length recorded is computed 20 twice by SHA256 algorithm so that it can acquire the hash value and the hash value’s length is 256.
  • One of the many hashing applications is the Merkle tree and proof of work (POW).
  • the Merkle tree has a structure of a tree, where every leaf node has a hash value and a non-leaf node carries its child node’s hash value. It stores transaction information and generates digital signatures. It increases the scalability and improves efficiency of the 25 blockchain.
  • PoW is a cryptographic puzzle first presented by C.Dwork and M.Noar. The foundation for it was set to prevent spams and curb the denial of service attacks. Satoshi Nakamoto was amongst the first to adopt this system in the Bitcoin system. Further, a hybrid protocol was presented by Bentov et al, that relied on PoW and Proof of Stake (POS) protocols and combined both of their advantages, establishing an element more superior. Ateniese et al proposed an alternative to PoW that is Proof of Space, which specified the amount of memory relied on memory access as in PoW. Arthur Gervais et al introduced “a novel quantitative framework to analyze the security and performance implications of various consensus and network parameters of PoW blockchains” by Gervais et al., 2016.
  • Alex Biryukov et al introduced Equihash that “an asymmetric proof-of-work with tuneable parameters”, it is a “PoW based on the generalized birthday problem and enhanced Wagner’s algorithm for it” (Biryukov et al., 2017).
  • PoS means proof of ownership of the currency. PoS does not have mining so it does not utilize computing power, like PoW. It solves the energy problem in the current blockchain system such as Bitcoin and Ethereum.
  • Yuefei Gao et al proposed Proof of Stake sharding protocol to increase scalability. Fahad Saleh introduced the ‘first formal economic model’ of PoS and explained how the consensus works under it (Saleh, 2018).
  • DPOS Delegated Proof-of-Stake
  • DPOS is a relatively new consensus algorithm that is better than energy inefficient and poorly protected PoW and PoS. It ensures the representation of transactions within a blockchain.
  • DPOS is a fast, outstanding and advantageous consensus algorithm model.
  • To solve the consensus problem DPOS uses voting and elections, which is fairer and saves computing power. Every holder of the stake can vote, fulfilling a certain number of representatives and all have equal rights. To maintain the ‘long-term purity’ representatives can be changed by holders at any time. Its main advantage is that it saves computation energy and is more cost-effective than PoW and PoS.
  • DPOS removes the biases caused by PoS with equity and decentralizes the decision making on the network.
  • PBFT Practical Byzantine Fault Tolerance
  • Miguel Castro and Barbara Liskov first introduced it in their paper, solving the problem caused by faulty nodes’ low efficiency.
  • PBFT is based on message authentication codes that go through three-phase protocols and automatically cast the replicas if failure occurs. It depends on three-phase messages before to execute operations.
  • PBFT consensus is highly efficient and enables high-frequency exchanging. All the nodes in the network are identified and all the faulty nodes are restricted in the network. The requirements set for this consensus algorithm is challenging to apply it to public blockchain Also, the great amount of calculations required for this consensus protocol made it impossible to employ.
  • Scalability Resource is consumed by a blockchain system to carry out a certain operation on a blockchain. Under peak requests, a problem that arises is whether a system can behave consistently or if it will grow over time depending on an availability of resources on the network.
  • Blockchain became popular because one of its crucial features is a decentralized system. Users from around the globe are connected to various blockchains, giving them a right to equal representation. It is a matter of great responsibility that systems are fair in allowing regular computers to participate in a network to reach decentralization. A blockchain system may also under analyses to present itself fair in matters of the distribution of rewards. The present implementations of blockchains can only illustrate what they highlight when they are running on a system with high hardware specifications, which in return breaks the overall intent of fairness and true decentralization. As highlighted by Ethereum Parity client, it achieved throughput around 3,000 transactions per second which is only possible when it is running on a high- performance system.
  • Embodiments herein may be powered by a consensus engine that is not only powered by Al but e.g. is also autonomous, interoperable, secure and scalable. As there is a need for a completely new architecture which could serve as a foundation to build future blockchains efficiently, embodiments herein introduces a five-layered architecture each with its strengths and functionality, revolutionizing the blockchain industry uniquely.
  • An object of embodiments herein is to improve the performance and security of blockchain systems. According to an aspect of embodiments herein, the object is achieved by a method performed by an apparatus for handling secure communication using one or more blockchains in a communications network.
  • the apparatus receives a first transaction.
  • the first transaction comprises a crypto-currency transaction, a smart contract, or a data file for storage in a blockchain.
  • the first transaction is encoded according a first blockchain protocol. Based on the first transaction and the first protocol, the apparatus restructures the first transaction.
  • the restructured transaction is encoded according to a second blockchain protocol.
  • the apparatus validates the restructured transaction by means of a second blockchain according to the second blockchain protocol by communication with one or more second network nodes.
  • the apparatus broadcast the first transaction to a set of first network nodes for validating the first transaction according to the first blockchain protocol.
  • the object is achieved by an apparatus configured to handle secure communication using one or more blockchains in a communications network, the apparatus being configured to: receive a first transaction, wherein the first transaction comprises a crypto-currency transaction, a smart contract, or a data file for storage in a blockchain, the first transaction being encoded according to a first blockchain protocol, - based on the first transaction and the first protocol, restructure the first transaction, wherein the restructured transaction is encoded according to a second blockchain protocol, validate the restructured transaction by means of a second blockchain according to the second blockchain protocol by communication with one or more second network nodes, and broadcast the first transaction to a set of first network nodes for validating the first transaction according to the first blockchain protocol.
  • Validating the restructured transaction achieves a more secure first transaction, which improves interoperability by broadcasting the first transaction.
  • the subject matter makes it possible to validate blockchain transaction of a first block protocol in a second blockchain protocol. This ensures that it is possible to use the first and second blockchain protocols and first and second blockchains in an interoperable, secure and validated manner.
  • Figure 1a is a schematic block diagram illustrating embodiments herein.
  • Figure 1b is a schematic block diagram illustrating embodiments herein.
  • Figure 2 is a flowchart depicting an embodiment of a method herein.
  • Figure 3a-b are schematic block diagrams illustrating embodiments of an apparatus herein.
  • Embodiments herein provide an interoperable and secure blockchain system.
  • embodiments herein refers to a Libonomy system or merely Libonomy, which may be implemented by an apparatus 101, which apparatus 101 will further be illustrated in Figure 3.
  • a Libonomy Aphelion protocol as referred to in embodiments herein allows probabilistic blockchains such as e.g. Bitcoin (BTC), Ethereum (ETH) to be interlinked, e.g. used together by means of the embodiments herein, with a Libonomy network, e.g., first or second one or more network nodes. Users of a Libonomy blockchain (LBY) may directly send their assets, transactions or data, from a Libonomy blockchain to any non-Libonomy blockchain e.g. without any need of a central or third party interaction.
  • a Libonomy blockchain as used herein may also be referred to as an Aphelion blockchain using an Aphelion protocol.
  • the Libonomy system provides interoperability with an Aphelion powered blockchain.
  • the Libonomy system acts as a universal hub of multiple blockchains, e.g. such that one or more blockchain protocols may be used together in the embodiments herein.
  • Libonomy may in some embodiments provide a wallet system which may be completely unique in regard to its compatibility with other blockchains.
  • the Libonomy wallet system comes with the capability such that not only may a user store Libonomy-based crypto assets, but the wallet system may also allow for using the wallet to hold other crypto assets that the Aphelion protocol may be compatible with.
  • a community in order to send assets from one Aphelion blockchain to another Aphelion blockchain, a community may do that without the need of any central authority but instead everything happens on chain as illustrated in Figure 1a.
  • FIG. 1a illustrates an example scenario of an Aphelion protocol Interaction Module 10 which handles communication of blockchains using a Libonomy protocol
  • the blockchains may also referred to one or more Cluster Chains 20 which may respectively be associated with any one or more apparatuses performing actions relating to a blockchain transaction.
  • Cluster chains 20 may for brevity be referred to as clusters.
  • each cluster chain 20 may respectively transfer data, e.g. any of transaction data, transactions, and/or assets, to one or more network nodes in a network, e.g. where each node comprises a respective DAM 30.
  • a cluster may comprise a node pool comprising one or more network nodes.
  • Each cluster may utilize its own respective node pool with one or more other clusters, additionally or alternatively using other node pool(s), for improving scalability and interoperability.
  • a DAM 30 may in these embodiments be responsible for transaction translation according to requirements, e.g. any of network, blockchain, or system requirements. Data, e.g. any of transaction data, transactions, and/or assets, is/are transferred to one or more clusters, e.g. by means of broadcast, unicast or multicast. Each DAM 30 may also handle communication with one or more blockchain networks e.g., associated with any of the DAMs 30.
  • a DAM 30 may be a separate computing unit or may be part of a network node.
  • a cluster chain 20, also referred to as an Aphelion powered chain may be a specific blockchain, and interacts with an Aphelion protocol to perform transactions within their own chain or cross network transactions in order to transfer funds or other data from one chain, e.g., cluster chain 20 or blockchain, to another chain. In some embodiments, this may, e.g. by use of transactions in the cluster chains 20, validate transactions to be performed in one or more other blockchains. In this way the cluster chains 20 both makes it possible to use different blockchains concurrently or simultaneously within the same blockchain, it further makes transactions to these respective blockchains more secure as they may first be agreed upon using a consensus protocol provided by the Aphelion interaction module 10. In some embodiments, the Aphelion interaction module 10 may be a separate computing unit or part of any network node.
  • the Aphelion interaction module 10 handles all or part of all communication, e.g. by receiving all or part of all messages and/or transactions from all network nodes.
  • the Aphelion protocol may be an Artificial Intelligence (Al) powered consensus algorithm which may thus be powered with an ability to become compatible with any future upgrades in the blockchain.
  • the structure of a blockchain may already done in a manner in which each block e.g. may be dynamically sized i.e., when the network grows protocol increases the block size if needed.
  • multiple chains built on Libonomy e.g. cluster chains 20, may interact with each other directly or transfer any of data, transactions, and/or assets, among one another, e.g. to one or more network nodes in a blockchain system.
  • this may be possible using a DAM 30 which may be e.g. preconfigured to be injected with every blockchain built on Libonomy.
  • a DAM 30 acts to handle the interaction with protocol interaction channels which structures the data according to the needs and helps to translate the data according to the respective chains.
  • Aphelion interoperability may not only be limited to public blockchain, but Libonomy’s private chain’s may also take benefits from this approach as they can utilize the DAM 30 to add permissions to their own chain or create policies if necessary.
  • the Aphelion interoperability module 10 may additionally focus on transferring assets to non-Aphelion powered blockchains built on POW, POS, DPOS, BFT or other consensus protocols. This is e.g. illustrated in Figure 1b.
  • the Aphelion protocol may be able to process a system upgrade without any compatibility issues. Such approach may e.g. help the maintainers of the system to add other blockchain to be supported.
  • a user may create a wallet address for a supported chain for example e.g., ETH or LBY or BTC. In this manner the users may interact e.g. with Smart Contracts or carry out transactions to the ETH blockchain.
  • the Aphelion protocol includes a methodology of using relayers 50, Al decision agents, virtual voting and multi pooling mechanism. Using any or all of these, Libonomy may be able to interact with other blockchains without the need to create a centralized system.
  • Each respective relayer 50 may be a single computing unit or may be part of the apparatus 101.
  • All non-Aphelion transactions may first be passed through a relayer 50 which restructures data according to e.g. the respective chain system and announce network nodes to be used for transaction verification, e.g. from a power pool 60 of network nodes.
  • a verified transaction is then passed to the protocols relayer channel which may be directly interlinked with the respective blockchain.
  • the verified transaction may then be broadcasted and e.g. included in a blockchain.
  • the verifiers may include the non-Aphelion transaction within the Libonomy chain, e.g. Libonomy blockchain. In this way, there is a verified proof of a non-Aphelion blockchain transaction in the Aphelion blockchain.
  • the system may collect a transaction of the user which then may be passed to the relayer 50 which relayer 50 may then be responsible for restructuring the transaction according to the blockchain needs and may then translate it into a compatible blockchain using DAM 30.
  • the restructured transaction may then be passed on to the Aphelion protocol where nodes e.g. in the power pool 60, may start to validate the transaction and e.g. pass it onto the broadcasting relaying modules which e.g. will submit the transaction to a respective blockchain and wait for the transaction to be accepted, e.g. validated, and e.g. mined.
  • the relayer 50 will then pass the details of the network to a Libonomy pool, e.g. multiple network node, where nodes will also include this non-Aphelion verified transaction to the Libonomy main blockchain, e.g. such that Libonomy chain is completely transparent and where it is then e.g. possible to detect that no malicious activity has been carried out in this regard.
  • a Libonomy pool e.g. multiple network node, where nodes will also include this non-Aphelion verified transaction to the Libonomy main blockchain, e.g. such that Libonomy chain is completely transparent and where it is then e.g. possible to detect that no malicious activity has been carried out in this regard.
  • one or more relayers 50 are responsible for carrying out the traffic among different chains, e.g. using their own dedicated DAM modules 30, which may be responsible for translation of data from one chain to another, e.g. restructuring the data, and/or e.g. conversion of assets and giving cross chain support.
  • the apparatus 101 may be any one out of or comprise any one or more out of: a computing device, a network node, a blockchain system, a relayer 50, an interaction module, e.g. the Aphelion interaction module 10, DAM 30, and a distributed system, e.g. comprising a first one or more network nodes and/or a second one or more network nodes.
  • the Aphelion protocol may be a consensus protocol for e.g. validating blockchain transactions.
  • the Aphelion consensus protocol may be based on an Artificial Intelligence, e.g. by means of one or more neural networks, e.g. in each respective one or more first network nodes or one or more second network nodes.
  • the Al may process blockchain transactions by using a pre-trained neural network to determine validity and/or consensus of the blockchain transactions. This ensures validity and/or consensus of blockchain transactions without communication and/or traditional mining which thus reduces communication and computational resources.
  • Methods herein may be performed in a communications network. Methods herein may be performed by the apparatus 101. As an alternative, a Distributed Node (DN) and functionality, e.g. comprised in a cloud, may be used for performing or partly performing the methods herein. Additionally or alternatively, methods herein may further be performed by any of the one or more network nodes, e.g. collectively as a system. The one or more network nodes may be the first one or more network nodes and/or the second one or more network nodes.
  • DN Distributed Node
  • the one or more network nodes may be the first one or more network nodes and/or the second one or more network nodes.
  • Figure 2 shows example embodiments of a method performed by the apparatus 101.
  • the method comprises the following actions, which actions may be taken in any suitable order.
  • Action 201
  • the apparatus 101 receives a first transaction.
  • the first transaction comprises any one out of a crypto-currency transaction, a smart contract, and/or a data file for storage in a blockchain.
  • the first transaction is encoded according to a first blockchain protocol.
  • the transaction may e.g. be received from any suitable network node and/or from any one of the relayers 50.
  • the apparatus 101 restructures the first transaction.
  • the restructured transaction is encoded according to a second blockchain protocol. In this way, it may be possible to encapsulate a transaction within another blockchain system, and e.g. first verify the transaction in the second blockchain.
  • the apparatus 101 validates the restructured transaction by means of a second blockchain according to the second blockchain protocol by communication with one or more second network nodes, e.g. in the power pool 60.
  • the power pool 60 may be a pool of different network nodes ordered in different groups by their performance.
  • the apparatus 101 may send the transaction to one or more network nodes, e.g. in the power pool 60, these nodes may then verify the transaction and e.g. send back an indication of the transaction being verified back to apparatus 101.
  • the apparatus 101 broadcasts the first transaction to a set of first network nodes for validating the first transaction according to the first blockchain protocol. In this way the first transaction may proceed as if it is using the first blockchain protocol and is now secured e.g. by means of action 203.
  • the above actions provide an efficient way to secure the first blockchain transaction of the first blockchain protocol using a validation in the second blockchain and second blockchain protocol.
  • the apparatus 101 is configured to perform the above actions 201 -204.
  • the apparatus 101 may comprise an arrangement depicted in Figures 3a and 3b.
  • the apparatus 101 may comprise an input and output interface 300 configured to communicate with network nodes e.g. in blockchain systems.
  • the input and output interface 300 may comprise a wireless receiver (not shown) and a wireless transmitter (not shown).
  • the apparatus 101 is further be configured to, e.g. by means of a receiving unit 310 in the apparatus 101, receive a first transaction, wherein the first transaction comprises a crypto-currency transaction, a smart contract, or a data file for storage in a blockchain.
  • the first transaction is encoded according to a first blockchain protocol.
  • the apparatus 101 is further be configured to, e.g. by means of a restructuring unit 320 in the apparatus 101, based on the first transaction and the first blockchain protocol, restructure the first transaction.
  • the restructured transaction is encoded according to a second blockchain protocol.
  • the apparatus 101 is further be configured to, e.g. by means of a validating unit 340 in the apparatus 101 , validate the restructured transaction by means of a second blockchain according to the second blockchain protocol by communication with one or more second network nodes, e.g. in the power pool 60.
  • the apparatus 101 is further be configured to, e.g. by means of a broadcasting unit 330 in the apparatus 101, broadcast the first transaction, e.g. to a set of first network nodes for validating the first transaction according to the first blockchain protocol.
  • the embodiments herein may be implemented through a respective processor or one or more processors, such as the processor 360 of a processing circuitry in the apparatus 101 depicted in Figure 3a, together with respective computer program code for performing the functions and actions of the embodiments herein.
  • the program code mentioned above may also be provided as a computer program product, for instance in the form of a data carrier carrying computer program code for performing the embodiments herein when being loaded into the apparatus 101.
  • One such carrier may be in the form of a CD ROM disc. It is however feasible with other data carriers such as a memory stick.
  • the computer program code may furthermore be provided as pure program code on a server and downloaded to the apparatus 101.
  • the apparatus 101 may further comprise a memory 370 comprising one or more memory units.
  • the memory 370 comprises instructions executable by the processor in apparatus 101.
  • the memory 370 may be arranged to be used to store e.g. information, indications, transactions, cryptocurrencies, smart contracts, data, configurations, and applications to perform the methods herein when being executed in the apparatus 101.
  • a computer program 380 comprises instructions, which when executed by the respective at least one processor 360, cause the at least one processor of the apparatus 101 to perform the actions above.
  • a respective carrier 390 comprises the respective computer program 380, wherein the carrier 390 may be one of an electronic signal, an optical signal, an electromagnetic signal, a magnetic signal, an electric signal, a radio signal, a microwave signal, or a computer-readable storage medium.
  • the units in the apparatus 101 described above may refer to a combination of analog and digital circuits, and/or one or more processors configured with software and/or firmware, e.g. stored in the apparatus 101, that when executed by the respective one or more processors such as the processors described above.
  • processors may be included in a single Application-Specific Integrated Circuitry (ASIC), or several processors and various digital hardware may be distributed among several separate components, whether individually packaged or assembled into a system-on-a-chip (SoC).
  • ASIC Application-Specific Integrated Circuitry
  • SoC system-on-a-chip

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

L'invention concerne un procédé réalisé par un appareil pour gérer une communication sécurisée dans un réseau de communication. L'appareil reçoit (201) une première transaction, la première transaction étant codée selon un premier protocole de chaîne de blocs. Sur la base de la première transaction et du premier protocole de chaîne de blocs, l'appareil restructure (202) la première transaction, la transaction restructurée étant codée selon un second protocole de chaîne de blocs. L'appareil valide (203) la transaction restructurée au moyen d'une seconde chaîne de blocs selon le second protocole de chaîne de blocs au moyen d'une communication avec un ou plusieurs seconds nœuds de réseau. L'appareil diffuse (204) la première transaction à un ensemble de premiers nœuds de réseau pour valider la première transaction selon le premier protocole de chaîne de blocs.
PCT/SE2022/050339 2021-04-06 2022-04-05 Procédé et appareil de communication sécurisée utilisant deux protocoles de chaîne de blocs différents WO2022216205A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
SE2150427 2021-04-06
SE2150427-9 2021-04-06

Publications (1)

Publication Number Publication Date
WO2022216205A1 true WO2022216205A1 (fr) 2022-10-13

Family

ID=83546590

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/SE2022/050339 WO2022216205A1 (fr) 2021-04-06 2022-04-05 Procédé et appareil de communication sécurisée utilisant deux protocoles de chaîne de blocs différents

Country Status (1)

Country Link
WO (1) WO2022216205A1 (fr)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019087119A1 (fr) * 2017-11-02 2019-05-09 Tata Consultancy Services Limited Procédé et système assurant une interopérabilité entre écosystèmes avec chaînes de blocs
US20190287100A1 (en) * 2018-03-13 2019-09-19 WAY2BIT Co. Ltd. Method for managing token based on heterogeneous blockchain networks, and token management server using the same
WO2020006138A1 (fr) * 2018-06-29 2020-01-02 Arcblock, Inc. Adaptateur de chaîne de blocs, protocole et couche d'accès
NL2026796A (en) * 2020-10-30 2020-11-27 Jiangsu Aowei Holdings Co Ltd Parallel chain-based cross-chain transaction method, device, and blockchain system
US20210049567A1 (en) * 2019-08-16 2021-02-18 Visa International Service Association Universal payment channels

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2019087119A1 (fr) * 2017-11-02 2019-05-09 Tata Consultancy Services Limited Procédé et système assurant une interopérabilité entre écosystèmes avec chaînes de blocs
US20190287100A1 (en) * 2018-03-13 2019-09-19 WAY2BIT Co. Ltd. Method for managing token based on heterogeneous blockchain networks, and token management server using the same
WO2020006138A1 (fr) * 2018-06-29 2020-01-02 Arcblock, Inc. Adaptateur de chaîne de blocs, protocole et couche d'accès
US20210049567A1 (en) * 2019-08-16 2021-02-18 Visa International Service Association Universal payment channels
NL2026796A (en) * 2020-10-30 2020-11-27 Jiangsu Aowei Holdings Co Ltd Parallel chain-based cross-chain transaction method, device, and blockchain system

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JOHANSSON FREDRIK, HAVERINEN RICHARD, JOHANSSON THERESE, KHAN SARMAD, HAMZA GUL, KAKAR MUHAMMAD, OMAID: "Libonomy: Artificial Intelligence-based Next Generation Blockchain", WHITE PAPER V2.0, 26 October 2020 (2020-10-26), XP055978983, [retrieved on 20221108] *
SCHEID EDER J.; HEGNAUER TIMO; RODRIGUES BRUNO; STILLER BURKHARD: "Bifröst: a Modular Blockchain Interoperability API", 2019 IEEE 44TH CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN), IEEE, 14 October 2019 (2019-10-14), pages 332 - 339, XP033713700, DOI: 10.1109/LCN44214.2019.8990860 *

Similar Documents

Publication Publication Date Title
CN107895111B (zh) 物联网设备供应链信任体系管理方法、计算机程序、计算机
CN108009811B (zh) 一种面向云际计算环境价值交换的跨链通信方法
Yue et al. A survey of decentralizing applications via blockchain: The 5G and beyond perspective
Pedrosa et al. ChargeltUp: On blockchain-based technologies for autonomous vehicles
CN112348672B (zh) 跨链交易方法、装置、多区块链系统及计算设备
CN111598566A (zh) 基于混合跨链的网络支付系统
Khor et al. Public blockchains for resource-constrained IoT devices—A state-of-the-art survey
US11928222B2 (en) Distributed ledger network implementing a synchronous trust consensus model
CN109245894B (zh) 一种基于智能合约的分布式云存储系统
CN112231741B (zh) 基于区块链系统的数据处理方法、装置、介质及电子设备
Zafar et al. Integration of blockchain and Internet of Things: Challenges and solutions
CN112163950A (zh) 一种方便扩展、节点资源复用的区块链链网构建方法、系统及终端设备
CN110852485A (zh) 一种区块链支付通道网络的交易路径短路方法
CN112615838B (zh) 一种可扩展的区块链跨链通信方法
CN115705601A (zh) 数据处理方法、装置、计算机设备及存储介质
CN112995167A (zh) 基于Kafka机制的用电信息采集方法、区块链网络及用户端
WO2023231558A1 (fr) Procédé et appareil de consensus de chaîne de blocs, support, dispositif électronique et produit de programme
CN115244526A (zh) 用于去中心化事务通信协议的方法和系统
WO2022216205A1 (fr) Procédé et appareil de communication sécurisée utilisant deux protocoles de chaîne de blocs différents
CN112231415B (zh) 区块链网络的数据同步方法、系统、电子设备及可读介质
CN116186749A (zh) 基于区块链的业务处理方法、装置、电子设备和可读介质
Lei et al. BFastPay: A routing-free protocol for fast payment in bitcoin network
Chen et al. Thinkey: A scalable blockchain architecture
WO2022216204A1 (fr) Procédé et appareil pour gérer une communication sécurisée à l'aide de chaînes de blocs dans un réseau de communication
Coutinho et al. Enabling Blockchain Scalability and Interoperability with Mobile Computing through LayerOne. X

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22785071

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 02.02.2024)