WO2023134259A1 - Procédé et système de traitement de données point à point, dispositif informatique et support de stockage - Google Patents

Procédé et système de traitement de données point à point, dispositif informatique et support de stockage Download PDF

Info

Publication number
WO2023134259A1
WO2023134259A1 PCT/CN2022/127491 CN2022127491W WO2023134259A1 WO 2023134259 A1 WO2023134259 A1 WO 2023134259A1 CN 2022127491 W CN2022127491 W CN 2022127491W WO 2023134259 A1 WO2023134259 A1 WO 2023134259A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
ledger
sub
account
general ledger
Prior art date
Application number
PCT/CN2022/127491
Other languages
English (en)
Chinese (zh)
Inventor
祝维沙
Original Assignee
第五力科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 第五力科技有限公司 filed Critical 第五力科技有限公司
Priority to GBGB2305203.8A priority Critical patent/GB202305203D0/en
Priority to DE112022000118.6T priority patent/DE112022000118T5/de
Priority to US18/129,088 priority patent/US20230245118A1/en
Publication of WO2023134259A1 publication Critical patent/WO2023134259A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Definitions

  • the present invention relates to the technical field of data processing, in particular to a point-to-point data processing method, system, computing device and storage medium.
  • the current data processing methods of centralized payment such as credit card payment (debit card or credit card), Alipay payment, and WeChat payment have high transaction efficiency and high security, but low transparency and autonomy.
  • the data processing method in the form of P2P payment combined with blockchain has the characteristics of high security, high transparency and high autonomy, but the transaction efficiency is low and it is not conducive to personal privacy protection. Therefore, the current payment data processing method cannot take into account both the processing security of the payment data and the processing efficiency of the payment data.
  • the embodiment of the present application provides a point-to-point data processing method, including:
  • the legality of the transaction includes that the source of the transaction data is legal and the transaction data is correct;
  • the hash index table is used to record the correspondence between the hash value of the latest transaction record of the sub-account and the address of the sub-account;
  • the general ledger is provided with multiple sets of registers, each set of registers stores an asset, and the amount is equal to the sum of the amounts of the asset in the latest transaction records of all sub-ledgers in the general ledger.
  • the transaction operation includes an internal transaction operation between any two sub-ledgers, and an external transaction operation between any one sub-ledger and an external account; wherein, the interaction process between any one sub-ledger and the general ledger is encrypted. .
  • the transaction operation is an internal transaction operation:
  • the amount of the register of the general ledger remains unchanged, and prompts the general ledger to generate a new first sub-ledger transaction entry and a second sub-ledger transaction entry;
  • the transaction operation is an external transaction operation and the operation type is transfer-out:
  • the general ledger On the premise that the transaction is legal, prompt the general ledger to generate a new sub-ledger transaction entry, and when both parties to the transaction confirm the transaction, the amount of the asset type in the register will be deducted accordingly according to the new sub-ledger transaction entry, and then After checking that the amount of the asset type in the register of the general ledger is equal to the sum of the amounts of the asset type in the latest transaction records of all subledgers in the latest transaction entry of the general ledger, update the hash index table and complete the transaction.
  • the transaction operation is an external transaction operation and the operation type is transfer-in:
  • the general ledger after verifying the transaction legitimacy of the sub-ledger through the general ledger, it also includes:
  • Prompt the general ledger to obtain the execution program code of the current transaction, and send the execution program code to the audit node authorized by the sub-ledger to verify the hash value of the execution program code.
  • the subledger before the transaction operation of the subledger is triggered, it also includes:
  • Multiple temporary storage accounts defined in the general ledger by subledgers are used to store the types and amounts of assets used for transactions in the subledgers, so as to realize the operation of dividing one transaction into multiple transactions.
  • the embodiment of the present application provides a peer-to-peer data processing system, including:
  • a verification module configured to verify the transaction legitimacy of the sub-ledger through the general ledger when the transaction operation of the sub-ledger is triggered;
  • the payment module is used to update the amount of the sub-ledger and the corresponding amount of the general ledger under the premise that the transaction is legal;
  • a storage module configured to prompt the sub-ledger to save current transaction records, and prompt the general ledger to generate the latest transaction entry of the sub-ledger and update the hash index table;
  • the legality of the transaction includes that the source of the transaction data is legal and the transaction data is correct;
  • the hash index table is used to record the correspondence between the hash value of the latest transaction record of the sub-account and the address of the sub-account;
  • the general ledger is provided with multiple sets of registers, each set of registers stores an asset, and the amount is equal to the sum of the amounts of the asset in the latest transaction records of all sub-ledgers in the general ledger.
  • an embodiment of the present application provides a computing device, including a memory, a processor, and a computer program stored on the memory and operable on the processor, and the computer program is implemented when the processor executes the computer program.
  • the embodiment of the present application provides a storage medium, the storage medium stores computer-executable instructions, and the computer-executable instructions are used to cause a computer to execute the steps included in the above-mentioned peer-to-peer data processing method.
  • Each embodiment of the present application provides a point-to-point data processing method, system, computing device, and storage medium.
  • the general ledger is associated with all sub-ledgers through a hash index, and in the sub-ledger
  • the transaction operation is triggered, check the transaction legitimacy of the subledger through the general ledger, update the amount of the subledger and the amount of the general ledger under the premise that the transaction is legal, and prompt the general ledger and subledger to save the current transaction records, and prompt the general ledger to update the hash index surface.
  • the general ledger only stores the latest transaction entries of the sub-ledger and the corresponding hash index, and there is no transaction journal of the sub-ledger, and the transaction journal is stored in the sub-ledger for users to keep by themselves, thus realizing the unique distributed ledger structure of peer-to-peer payment , which not only has centralized transaction efficiency, but also has the characteristics of blockchain ledgers, which can improve the processing security of payment data and have good processing efficiency for payment data.
  • Fig. 1 is a schematic diagram of the entry structure of the sub-ledger in the general ledger in the embodiment of the present application;
  • Fig. 2 is a schematic diagram of the sub-ledger index structure in the general ledger in the embodiment of the present application;
  • Fig. 3 is the schematic diagram of general ledger structure in the embodiment of the present application.
  • FIG. 4 is a schematic flow diagram of a point-to-point data processing method in an embodiment of the present application.
  • Figure 5 is a schematic diagram of the flow of individuals transferring encrypted assets out in the embodiment of this application.
  • Figure 6 is a schematic diagram of the flow of individuals transferring encrypted assets in the embodiment of this application.
  • Figure 7 is a schematic diagram of the verification process for transferring encrypted assets in the embodiment of the present application.
  • FIG. 8 is a schematic flowchart of a point-to-point data processing method in an embodiment of the present application.
  • FIG. 9 is a schematic flowchart of a point-to-point data processing method in an embodiment of the present application.
  • FIG. 10 is a schematic flowchart of a point-to-point data processing method in an embodiment of the present application.
  • FIG. 11 is a schematic structural diagram of a peer-to-peer data processing system in an embodiment of the present application.
  • FIG. 12 is a schematic structural diagram of a peer-to-peer data processing system in an embodiment of the present application.
  • FIG. 13 is a schematic structural diagram of a computing device in an embodiment of the present application.
  • FIG. 14 is another schematic structural diagram of a computing device in an embodiment of the present application.
  • Peer-to-peer refers to the anonymity that the payer and the counterparty do not have to reveal their real identities during the payment data processing process. What is currently seen is a centralized system, and all data individuals cannot control.
  • the general ledger is composed of asset registers, latest transaction records of sub-ledgers, hash index table of sub-ledgers, register table and call record log, transaction journal, verification log records, etc. Different from the concept of the traditional financial ledger, it is similar to the blockchain ledger of encrypted assets.
  • the sub-account has the public key and private key functions of the blockchain account book.
  • the difference from the blockchain account book is that it has an account book and has a reconciliation relationship with the general ledger.
  • users can manage their own accounts.
  • the embodiment of the present invention uses the multi-signature and multi-backup account books of a cloud product (for example, family cloud, etc.), and the security level is set by the user himself, so that the security level of the bank can be exceeded, and the transfer control of the general ledger can be added to truly realize his own Manage the ledger yourself.
  • a cloud product for example, family cloud, etc.
  • the combination of openness and security can guarantee machine credit. Openness is to make people believe that security can ensure that data is not wrong.
  • the characteristics of blockchain security technology are: encrypted transmission, public key, private key authentication, through hash and signature algorithm to confirm that data has not been tampered with, access control, multi-signature, combined signature, hash confirmation, verifiable, multiple backups, are all realized in this system.
  • the embodiment of the present invention is combined with a cloud product to realize incentive and capital autonomy.
  • Using encryption technology to improve the centralized system makes it conform to the current specification of encrypted assets, in fact, it conforms to the specification of Web3.0. Judging from the blockchain and directed acyclic graph ledger technology commonly used in encrypted assets, it is impossible for any solution to exceed the transaction speed of a centralized system. Only by transforming the existing centralized system can it be possible to advance the Internet to Web3.0.
  • the assets that define the peer-to-peer payment system must be consensus assets, and the assets have a source.
  • the transaction speed of encrypted assets TPS means the same as that of centralized payment
  • the meaning is different. No matter how fast it is, when it comes to a two-person payment, there is an order of magnitude difference from centralized payment. Under the limitation of asset sources, this system can reach the transaction payment level measured by centralized payment TPS. Users can't feel the obvious speed difference between the two.
  • the mining cost of blockchain bookkeeping is very high, but bookkeeping does not require such a large cost.
  • the participants of the blockchain solve the point-to-point payment method, and they still use the blockchain method to solve the problem of the blockchain.
  • the embodiment of the present invention abandons the block chain and utilizes the index ledger method to also realize Web3.0.
  • the general ledger of the embodiment of the present invention supports users to perform real-time backup of the general ledger. From the perspective of encrypted assets, it supports the concept of openness and transparency, but does not support unrelated transaction parties to participate in calculations, because the embodiment of the present invention does not generate assets, so there is no need for parties unrelated to this transaction Participate in bookkeeping, and the accounting logic ensures the accuracy of the books. Because the transaction is an act of both parties, it is enough for both parties to agree. The external transfer is more complicated.
  • the private key in a host is the initiator of the transaction, that is, the transfer party specifies the multi-signature members, and the initiator of the transaction can specify the multi-signature and the number of people. For few assets, you can also choose the system to multi-sign the private key.
  • the embodiment of the present invention uses process credibility to realize the replacement of human beings by machines. According to this method, only the machine has the right to modify. But after the transaction results are formed, the machine cannot modify the journal.
  • Allowing users to keep their own accounts is called sub-accounts.
  • the user operates his own account, and the sub-account is the running account of the user's transactions.
  • the general ledger is public and theoretically does not need to be managed by humans, but by machines.
  • the distributed ledger consists of subledgers and general ledgers.
  • the personal account book is in the hands of the individual, and the personal transaction is carried out by the individual, and both parties to the transaction need to check the transaction. At this time, the system does not participate in the transaction.
  • the only affected part of the entire network is the general ledger and participants, at least three parties.
  • the general ledger allows multi-party operations, but it is difficult to guarantee that there is no waiting, and there must be a stack waiting design.
  • the general ledger includes the latest change account of the sub-ledger, that is, the latest record. This record is the same as the latest one of the sub-ledger.
  • the latest transaction index of the general ledger and the latest record of the subledger are the checking relationship.
  • the content stored in the subledger and general ledger is also different.
  • This kind of distributed computing and distributed storage is more in line with the computer industry's definition of distributed computing and distributed storage.
  • the system uses P2P to update the nodes that download the complete ledger synchronously. In order to avoid mistakes, only one cluster in the system is the original computing node, and the others are backup nodes.
  • the general ledger (account) design has the following functions in the embodiment of the present invention:
  • Figure 1 is a schematic diagram of the entry structure of the subledger in the general ledger in the embodiment of the present application
  • Figure 2 is a schematic diagram of the subledger index structure in the general ledger in the embodiment of the present application.
  • the general ledger has no sub-ledger transaction journal, which can be queried by anyone like an encrypted asset ledger.
  • anyone like an encrypted asset ledger can only query the latest transaction records of sub-ledgers. If they do not synchronize all transaction journals as a full node, they cannot find the historical transaction records of sub-ledgers. Even if all transaction records are synchronized, whether the sub-accounts are allowed to be checked depends entirely on the settings of the sub-accounts. Moreover, even if it is made public, outsiders cannot understand it, and users can only check their own transaction records.
  • the general ledger only stores the latest transaction entries and hash indexes, while the journals of transaction entries are stored in individual sub-ledgers, which are kept by the user, so as to realize the unique distributed ledger structure of peer-to-peer payment, which has both centralized transaction efficiency and
  • the characteristics of the blockchain ledger make the Web3.0 based on the blockchain idea practical.
  • the general ledger is divided into a data area and a program area.
  • the data and the program are stored separately, and the hash value of the key transfer program is saved.
  • the hash value of the program is verified to ensure that the program has not been tampered with.
  • Figure 3 is a schematic diagram of the general ledger structure in the embodiment of the present application:
  • the external address is the same as the general ledger address, and both input and output are required;
  • the general ledger can be checked, and the directory index and hash index cannot be checked for the sake of privacy.
  • the journal can be downloaded. However, whether each transaction record can be checked depends on the encryption settings of the parties, and only the parties can decrypt their transaction records.
  • the hash index has data such as sub-account address and KYC.
  • the system has designed an external interactive register set, referred to as external registers. After the external account data is imported into the system through the external register, it is quickly transferred to the personal sub-account, and the amount of the external register increases accordingly.
  • external registers For encrypted assets, the addresses of external and internal personal data are authenticated by public keys, and an API standard data structure is provided for different types of assets. Banks must follow this standard data structure when converting. From the current point of view, it uses the ERC20 format, just like the stable asset USDT.
  • the registers themselves are stored in the data area, separate from the general ledger account data.
  • Each register has its own data structure and has its own hash value. For clarity, an asset-address principle is used.
  • the data exchange between the system and external accounts can be completed. There is no human intervention here, and the data in the register is constant when no external transfer occurs.
  • the value of the external register of the same asset type is the sum of the numbers of all subledgers of the same asset type in the general ledger record.
  • the total amount of the external register of the general ledger is subtracted from the corresponding amount.
  • the operation is that the register receives the transfer record as a condition, and the external register program checks and enters the verification program.
  • the transfer record is saved in the asset outside the data area. register's log.
  • Verification is to ensure the credibility of the calculation process.
  • Third-party machine verification is introduced. The sender, receiver and machine will jointly confirm the transaction result by the transaction party and the machine. The verification result is temporarily stored in the general ledger index ledger and permanently stored in the subledger.
  • Verify that the external transfer account is correct ensure that the asset has a source, and adopt the concept of a block on the encrypted asset, which is only used in the calculation of each transaction record, calculate the hash value of each record, and store the current one in the general ledger Records and previous records include their hash values, and a record includes the hash value of the previous record and the hash value of the completed record.
  • the register when an encrypted asset is sent to the system, it is stored in the encrypted asset register, and the register also has two hash positions. Note that one position is empty, and only the register may have this vacant position. When the register receives data from the outside, set the register to the same data as the external encrypted asset address.
  • the hash value of this record can be calculated and stored in the second hash position of this record.
  • the client verifies the hash value, the first empty indicates external data, and the second hash value indicates whether the record is correct. If it is correct, accept it and calculate the hash value of its own record.
  • Table 1 Schematic diagram of the hash location of the verification process before transfer
  • Hash 1 Hash 2 data hash 1 Hash 2 data
  • Hash 2 Hash 3 data hash 2 Hash 3 data
  • Hash X Hash X+1 data hash 1 Hash 2 data,,, and the current.
  • Hash 3 Hash 4 data ,,, the the the the the transfer completed ⁇ the the the the the the the Next article: Hash 4 hash 5 data,,,,,
  • the first hash is the source of the data
  • the second is to ensure that the data is correct.
  • the machine makes a final check to confirm whether the transaction is correct, and if it is correct, delete the "previous item", thus ensuring that the data has its source. As long as the machine verifies that the hash of the payment and acceptance is correct, the data is guaranteed to be correct.
  • a sub-ledger has at most one record in the general ledger. Send and receive data stored in the ledger is for verification purposes.
  • the core of the blockchain connection is the "previous block".
  • the embodiment of the present invention uses the concept of "the previous article". If the blockchain can be recognized, then the data chain should also be recognized. The ledger is not afraid of being exposed, because the real ledger is in private hands. The above process can avoid "double spending" transactions.
  • the sub-ledger transaction books are stored in each sub-ledger, and the general ledger cannot be called out unless the permission of the sub-ledger owner is obtained. Its default setting is off.
  • the hash value of the sub-account program code itself is fixed, which serves as a verification function for the new copy. If the version number is the same, the program hash value is fixed. Code changes after a version upgrade. In order to ensure accuracy, the customer must upgrade the code to perform new calculations. The program and data are separated, and the purpose of verifying the program code is to ensure that there are no hacker plug-ins, and that the program code before and after running is correct.
  • Anonymity is a major feature of encrypted assets and belongs to privacy protection. Note the above description, the ledger does not know the counterparty of the transaction. Encrypted assets have Merkel Tree (Merkel Tree) to reduce storage consumption. Compared with encrypted asset ledgers, the general ledger of the present invention is more economical. Sub-ledgers can retain all his transactions and truly achieve ledger distribution. It is impossible for encrypted assets. Like encrypted assets, they also have limited anonymity, are associated with IP addresses, and are irresistible to public power.
  • user registers are designed in the system. A user can define any number of registers, and the system sets 10, mainly to avoid ledger expansion. The registers are designed for customers to disperse large ledger numbers before sending . You can also send small data.
  • Query function divided into general ledger query and sub-ledger query.
  • the general ledger is public, and the program code is also public, only the private key of the general ledger is not public.
  • the private key of the general ledger is divided into three levels, the highest level is the private key generated at the time of transfer. This is a contradiction between speed and security, and it is up to the user to judge the decision. If you transfer a large account book, why not go slower for safety?
  • General ledger query includes: A. External register query. The total number of any asset type in this system can be known by querying the external register. B. Query any account name and address. The user name corresponds to the address. C. The latest transaction records of any current sub-account. (Note: The premise is that the head of the sub-account agrees to the general ledger to query his own sub-account, or the head of the sub-account discloses his sub-account information. The decision is in the hands of the head of the sub-account.)D .
  • Statistical data query including the total transaction volume and transaction number by asset type, year, month, day transaction volume and transaction number, and charts, etc.
  • Sub-account query A. The account name of the specific sub-account and the corresponding relationship between internal accounts and external addresses of various assets. B. The contact information disclosed by the sub-account. C. Statistics query is similar to account book query. D. The disclosure authority of the sub-account is set in the sub-account in the setting function.
  • Storage function divided into general ledger storage and sub-ledger storage.
  • the general ledger is a cluster, which is the same as the underlying design of the centralized cluster. It adopts a three-host peer-to-peer design, with a total of 6 copies and real-time synchronization. There is no sub-ledger in the whole program. In essence, the general ledger is a calculator, and the running account is in the sub-ledger, which can be updated after use.
  • the general ledger function includes an optional backup function for subledgers, but the subledger owner must set it up and pay the fee.
  • there is a multi-signature multi-backup account book whose security level exceeds that of a cold account book, and the cost is also lower than backup through the general ledger system.
  • This function is designed in the cloud product of the embodiment of the present invention.
  • the cloud product has an advanced voice recognition function, and the account password and encrypted asset address are stored in the lockbox.
  • payment can be made by voice, or by voice or fingerprint. , or combined voice and fingerprint.
  • voice or fingerprint Generally, it is not difficult for one person to form three backups, but three other cloud product nodes can be used to form another three backups.
  • Automatically sync after payment is completed. After the synchronization is completed, it will be displayed on the master node selected by oneself. It is safest to control your own data in your own hands. This method also solves one of the biggest pain points of encryption - the loss problem.
  • the mobile phone notification has been done very well.
  • the notification is divided into SMS notification and email notification.
  • the sender it is a notification of successful transaction.
  • the system of the embodiment of the present invention is a distributed system conforming to the definition of the computer industry, and at the same time it is a point-to-point payment system with machine credit, which is the progress of all distributed payment systems in the world.
  • the payment speed of this system is basically the same as that of the centralized system.
  • This system is not limited to the payment of assets, but also an effective payment tool for electronic tickets.
  • an embodiment of the present invention provides a peer-to-peer based data processing method, system, computing device, and storage medium.
  • the general ledger and sub-ledgers are associated through a hash index, and in the sub-ledger
  • the general ledger checks the transaction legitimacy of the sub-ledger through the general ledger, update the amount of the sub-ledger and the amount of the general ledger under the premise that the transaction is legal, and prompt the sub-ledger to save the current transaction records, and prompt
  • the general ledger updates the index table. Based on this, the general ledger has no transaction data journal, and does not query the historical transaction records of the sub-ledgers.
  • web3.0 data sovereignty lies in the people, data is transparent and credible, everyone contributes resources, everyone shares benefits, and everyone participates in governance.
  • the general ledger corresponds to a computer system (such as a computer cluster), a sub-ledger corresponds to a computer system, and the computer systems communicate with each other through the network.
  • the computer system may be or be integrated into a terminal device, which may be a smart phone, a tablet computer, a notebook computer, or a desktop computer, but is not limited thereto.
  • terminal device used to execute the steps of the point-to-point data processing method described in the embodiment of the present invention should have an interactive function, such as supporting voice or touch screen or keyboard.
  • FIG. 4 is a schematic flowchart of a peer-to-peer data processing method provided by an embodiment of the present application.
  • the embodiment of this application provides a point-to-point data processing method:
  • the legality of the transaction includes that the source of the transaction data is legal and the transaction data is correct.
  • the hash index table is used to record the correspondence between the hash value of the latest transaction record of the sub-ledger and the address of the sub-ledger.
  • the general ledger is provided with multiple sets of registers, each set of registers stores an asset, and the amount is equal to the sum of the amounts of the asset in the latest transaction records of all sub-ledgers in the general ledger.
  • the index table is used to realize the index function of the general ledger.
  • one address (note: one asset refers to one asset type, such as encrypted assets, etc.), that is to say, the more asset types in the personal account book, the more corresponding addresses will be.
  • the hash index becomes part of the data structure of the ledger address table.
  • the hash index means to determine the ownership of this record in the general ledger.
  • the transaction operation includes an internal transaction operation between any two sub-ledgers, and an external transaction operation between any sub-ledger and an external account; wherein, the interaction process between any sub-ledger and the general ledger Encryption is performed.
  • the transaction operation is an internal transaction operation:
  • the amount of the register of the general ledger remains unchanged, and prompts the general ledger to generate a new first sub-ledger transaction entry and a second sub-ledger transaction entry;
  • the register amount of the general ledger remains unchanged, and the general ledger is prompted to generate a new first sub-ledger transaction entry and a second sub-ledger transaction entry, and the new first sub-ledger transaction entry
  • the transaction entry is sent to the first sub-account to obtain a transaction confirmation instruction
  • the transaction confirmation instruction is forwarded to the second sub-account to obtain a transaction confirmation instruction
  • the transaction entry stored in the general ledger is updated according to the transaction confirmation instruction of both parties and hash index table and complete the transaction.
  • the process is the same.
  • the sub-account is similar to a ledger sub-account.
  • the connection between the subledger and the general ledger needs to go through the network, so this process needs to be encrypted.
  • the transaction operation is an external transaction operation and the operation type is transfer-out:
  • the general ledger On the premise that the transaction is legal, prompt the general ledger to generate a new sub-ledger transaction entry, and when both parties to the transaction confirm the transaction, the amount of the asset type in the register will be deducted accordingly according to the new sub-ledger transaction entry, and then After checking that the amount of the asset type in the register of the general ledger is equal to the sum of the amounts of the asset type in the latest transaction records of all subledgers in the latest transaction entry of the general ledger, update the hash index table and complete the transaction.
  • the general ledger prompts the general ledger to generate a new sub-ledger transaction entry and send it to the sub-ledger to obtain a transaction confirmation instruction, and forwards the transaction confirmation instruction to the external account in the general ledger. account, and enter the verification program. After the verification is passed, the amount of the asset type in the register is correspondingly deducted according to the confirmation instruction. At the same time, the amount of the asset type in the register of the general ledger is equal to the latest transaction entry of the general ledger. After the sum of the amount of the asset type in the latest transaction records of all subledgers, update the index table and complete the transaction.
  • Figure 5 is a schematic diagram of the process of transferring encrypted assets out by individuals in the embodiment of this application: transfer to any encrypted asset blockchain address.
  • the external address of the encrypted asset of the general ledger is set by the system, and each asset has a set of general ledger registers corresponding to the address of the encrypted blockchain ledger through the external address of the general ledger.
  • the general ledger has the latest transaction record of the personal account (sub-ledger), indicating how many encrypted assets he has.
  • the individual signs the code name of the encrypted asset he wants to transfer out in the general ledger system, such as YBTC, and any encrypted asset blockchain address and the latest record of holding assets with a private key, and sends it to the general ledger.
  • the ledger can be decrypted with the public key.
  • the general ledger handles subledgers.
  • the general ledger checks the encrypted asset (YBTC) of the personal account with the records of the general ledger. If the verification result is correct, the general ledger generates a new YBTC and transfers it to any encrypted asset blockchain address and data, and encrypts it and sends it to the sub-ledger.
  • YBTC encrypted asset
  • the sub-ledger confirms the latest index record and confirms the transfer, encrypts it at the same time, and then returns the confirmation information to the general ledger.
  • the general ledger re-signs the content returned by the sub-ledger to start the multi-signature verification and transfer-out procedure.
  • the updated YBTC record of the sub-ledger is stored in the general ledger and transferred to the sub-ledger.
  • transfer-out record includes four parts: transfer-out amount, transfer-in encrypted asset address, transfer-out signature, and corresponding public key. This approach corresponds to the standard for encrypted assets.
  • the transaction operation is an external transaction operation and the operation type is transfer-in:
  • the general ledger prompt the general ledger to generate a new subledger index, not a complete transaction record. sending the index to the sub-account to obtain the transaction confirmation instruction, and forwarding the transaction confirmation instruction to the external account to obtain the confirmation instruction, correspondingly deducting the amount of the asset type in the register according to the transaction confirmation instruction, and After checking that the amount of the asset type in the register of the general ledger is equal to the sum of the amounts of the asset type in the latest transaction records of all sub-ledgers in the index table of the general ledger, update the index table according to the above steps 6-8 and complete the transaction .
  • the updated YBTC record of the sub-ledger is stored in the general ledger and transferred to the sub-ledger;
  • Fig. 6 is a schematic flow diagram of an individual's transfer of encrypted assets in the embodiment of this application.
  • the transfer of encrypted assets can only be initiated by the sub-account, and other transfers are invalid.
  • the encrypted assets in the picture will be converted into equivalent YBTC.
  • the real encrypted assets will stay in the encrypted asset ledger, so if it is not multi-signature, the security is not guaranteed.
  • the multi-signature of encrypted assets has never been tested by practice.
  • Fig. 7 is a schematic diagram of the verification process for transferring out encrypted assets in the embodiment of this application.
  • the encrypted assets mentioned in this system are all YBTC.
  • the encrypted asset blockchain account there is an external account of the general ledger, which is generated in the ledger of encrypted assets.
  • the two are exactly the same .
  • the sub-account sends the request to host 1, it enters the verification program after confirming that it is correct.
  • this cluster has 3 hosts, forming a peer-to-peer cluster structure. Usually, only host 1 works, and the first function of the other two hosts is hot backup, which can take over the work of host 1 at any time. Another important job is to perform multisig.
  • the embodiment of the present invention assumes that the private key of the host 2 is a combined private key, which is a combination of private keys preset by the transfer-out sub-account. If it does not sign, the system is always in a temporary storage state. The pick design is 3-3, none will work properly without one. Therefore, if the sub-account does not agree to the transfer, the account will not go through. If the hang-up exceeds 24 hours, the system will automatically cancel it.
  • FIG. 8 is a schematic flowchart of a peer-to-peer data processing method in an embodiment of the present application.
  • the general ledger after verifying the transaction legitimacy of the sub-ledger through the general ledger, it also includes:
  • the relevant calling program is not public, and the rest of the code is all public, and any third party is accepted as the audit node.
  • Subledgers can specify any audit node for auditing. Adding audits will slow down the transfer process. It is not recommended to join the audit node during the internal transfer process, because it is enough to have three-party approval of the machine and the input and output. There is no third party for external transfers, and it is necessary to introduce third-party audit and verification nodes.
  • the result of the input-output audit is whether the hash value of the executed program code is the same. Allows third parties to audit code execution results.
  • FIG. 9 is a schematic flowchart of a peer-to-peer data processing method in an embodiment of the present application.
  • the sub-ledger before the transaction operation of the sub-ledger is triggered, it also includes:
  • Figure 10 is a schematic flow chart of a point-to-point data processing method in the embodiment of the present application.
  • the transaction operation of the sub-account before the transaction operation of the sub-account is triggered, it also includes:
  • the user temporary register is designed.
  • a user can define any number of temporary registers, such as 10. This is mainly to avoid ledger expansion.
  • the temporary register is designed for customers to disperse large ledger numbers, and then send.
  • When sending small data if the data is transferred twice, the real big account will be hidden. If the account is public and anyone can check it, then the other party knows who sent the money and how much assets they have. However, if only one record of the general ledger has a hash value associated with the previous one, the other party will not be able to guess how many books your account has.
  • the latest data of the sub-ledger can be found.
  • the query level is set in the settings, which is the same as the definition of strangers and acquaintances on Facebook, divided into 4 or 5 levels, these four levels are: public, friends, specific friends and yourself. In fact, there is another level, where the general ledger queries all subledgers by itself, but you must be an audit node. For sub-accounts, the above four situations are allowed to check their latest records.
  • the external register is public, enter: "encrypted asset external register” in the search, and the total will come out.
  • sub-account queries such as: "Li Ming, encrypted assets"
  • the latest record of the sub-account is found through the index hash value associated with the sub-account address book.
  • the general ledger and sub-ledgers are associated through a hash index, so that the general ledger has no account, and the general ledger cannot find historical transaction records. All transaction records are in the hands of individuals, and the sub-accounts decide whether to send them to relevant people.
  • the structure of the general ledger and sub-ledgers is neither the blockchain structure nor the current bank account structure. It is much simpler than the centralized system, and it is not as slow as the distributed authentication of the blockchain.
  • the innovation point lies in the realization of the characteristics of no-central control, that is, the decentralization of control and the disclosure of ledgers, as well as privacy protection and self-preservation of assets.
  • the embodiment of the present invention can use the serial number in the journal account, which does not correspond to the hash value of the general ledger. Only the user himself can understand his account, and it is easy to check with his own account, while it is difficult for others to see, ensuring data privacy.
  • journal In the design mode of the journal in the embodiment of the present invention, the journal is not disclosed, which can protect privacy to the greatest extent.
  • All the transactions in the embodiment of the present invention are formed into a transaction log account, and the embodiment of the present invention makes an account page in 1 second for the full nodes willing to synchronize.
  • Each account page can calculate the hash value, use all the daily account page hash values, and then calculate a full-day account page hash value, and store it on the network chain to ensure that the account book has not been tampered with.
  • the fastest account book is 3 seconds per account page, 11 confirmations are valid, generally it takes about 30 seconds. Assuming that the network delay is not considered, this is the fastest transaction speed of the blockchain, and the measured transaction takes 1 to 2 minutes. If you count network congestion and packaging waiting, half an hour is also common.
  • the transaction of the transaction system of the embodiment of the present invention is completed immediately after confirmation by both parties, and the transaction is completed in less than one second, which can reach and approach the transaction speed TPS of the centralized system.
  • All centralized trading systems are structurally distributed in order to ensure security.
  • the present invention continues to use the centralized cluster method in the distributed structure, but achieves decentralization in control, thereby fundamentally solving all block chains and directed acyclic graph accounting schemes, and realizing centralized transaction speed.
  • the relevant structural details will be disclosed in the white paper of the peer-to-peer payment system in the embodiment of the present invention.
  • the embodiment of the present application provides a point-to-point data processing system, including:
  • a verification module 51 configured to check the transaction legitimacy of the sub-ledger through the general ledger when the transaction operation of the sub-ledger is triggered;
  • the payment module 52 is used to update the amount of the sub-ledger and the corresponding amount of the general ledger under the premise that the transaction is legal;
  • the storage module 53 is used to prompt the sub-ledger to save the current transaction records, and prompt the general ledger to generate the latest transaction entry of the sub-ledger and update the hash index table; wherein,
  • the legality of the transaction includes that the source of the transaction data is legal and the transaction data is correct;
  • the hash index table is used to record the correspondence between the hash value of the latest transaction record of the sub-account and the address of the sub-account;
  • the general ledger is provided with multiple sets of registers, each set of registers stores an asset, and the amount is equal to the sum of the amounts of the asset in the latest transaction records of all sub-ledgers in the general ledger.
  • the transaction operation includes an internal transaction operation between any two sub-ledgers, and an external transaction operation between any sub-ledger and an external account; wherein, the interaction process between any sub-ledger and the general ledger Encryption is performed.
  • the transaction operation is an internal transaction operation:
  • the amount of the register of the general ledger remains unchanged, and prompts the general ledger to generate a new first sub-ledger transaction entry and a second sub-ledger transaction entry;
  • the general ledger On the premise that the transaction is legal, prompt the general ledger to generate a new sub-ledger transaction entry, and when both parties to the transaction confirm the transaction, the amount of the asset type in the register will be deducted accordingly according to the new sub-ledger transaction entry, and then After checking that the amount of the asset type in the register of the general ledger is equal to the sum of the amounts of the asset type in the latest transaction records of all subledgers in the latest transaction entry of the general ledger, update the hash index table and complete the transaction.
  • the transaction operation is an external transaction operation and the operation type is transfer-in:
  • a peer-to-peer data processing system also includes:
  • the verification module 54 is configured to prompt the general ledger to obtain the execution program code of the current transaction, and send the execution program code to the audit node authorized by the sub-ledger to verify the hash value of the execution program code.
  • a peer-to-peer data processing system further includes:
  • the temporary storage module 50 is used to store the types and amounts of assets used for transactions in the sub-ledgers through multiple temporary storage accounts defined in the general ledger, so as to realize the operation of dividing one transaction into multiple transactions.
  • an embodiment of the present application further provides a computing device, where the computing device is a terminal device.
  • the computing device in the embodiment of the present application includes at least one processor 1001, and a memory 1002 connected to the at least one processor, and the specific connection medium between the processor 1001 and the memory 1002 is not limited in the embodiment of the present application
  • the processor 1001 and the memory 1002 may be connected through a bus, and the bus may be divided into an address bus, a data bus, a control bus, and the like.
  • the memory 1002 stores instructions executable by at least one processor 1001, and at least one processor 1001 executes the instructions stored in the memory 1002 to perform the steps included in the aforementioned peer-to-peer data processing method.
  • the processor 1001 can be a general-purpose processor, such as a central processing unit (CPU), a digital signal processor (Digital Signal Processor, DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a field programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic devices, discrete gate or transistor logic devices, and discrete hardware components can implement or execute the methods, steps, and logic block diagrams disclosed in the embodiments of the present application.
  • a general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the methods disclosed in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
  • the memory 1002 as a non-volatile computer-readable storage medium, can be used to store non-volatile software programs, non-volatile computer-executable programs and modules.
  • the memory may include at least one type of storage medium, such as flash memory, hard disk, multimedia card, card memory, random access memory (Random Access Memory, RAM), static random access memory (Static Random Access Memory, SRAM), Programmable Read Only Memory (PROM), Read Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Magnetic Memory, Disk, discs and more.
  • a memory is, but is not limited to, any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer.
  • the memory 1002 in the embodiment of the present application may also be a circuit or any other device capable of implementing a storage function, and is used for storing program instructions and/or data.
  • the processor 1001 is the control center of the computing device, which can use various interfaces and lines to connect various parts of the entire computing device, and by running or executing instructions stored in the memory 1002 and calling data stored in the memory 1002, the computing device Various functions and processing data of various functions, so as to monitor the computing equipment as a whole.
  • the processor 1001 may include one or more processing units, and the processor 1001 may integrate an application processor and a modem processor.
  • the tuner processor mainly handles wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 1001 .
  • the processor 1001 and the memory 1002 can be implemented on the same chip, and in some embodiments, they can also be implemented on independent chips.
  • the computing device in the embodiment of the present application may further include an input unit 1003, a display unit 1004, a radio frequency unit 1005, an audio circuit 1006, a speaker 1007, a microphone 1008, a WiFi module 1009, a Bluetooth module 1010, a power supply 1011, and an external interface 1012 , headphone jack 1013 and other components.
  • FIG. 9 is only an example of a computing device, and does not constitute a limitation to the computing device.
  • the computing device may include more or less components than those shown in the illustration, or combine certain components, or be different. parts.
  • the input unit 1003 can be used to receive input numbers or character information, and generate key signal input related to user settings and function control of the computing device.
  • the input unit 1003 may include a touch screen 1014 as well as other input devices 1015 .
  • the touch screen 1014 can collect the user's touch operation on or near it (for example, the user uses any suitable object such as fingers, joints, stylus to operate on the touch screen 1014 or near the touch screen 1014), that is, the touch screen 1014 can be used to detect touch pressure and Touch the input position and touch input area, and drive the corresponding connection device according to the preset program.
  • the touch screen 1014 can detect the user's touch operation on the touch screen 1014, convert the touch operation into a touch signal and send it to the processor 1001, or understand that the touch information of the touch operation can be sent to the processor 1001, and can receive and process The command sent by the device 1001 is executed.
  • the touch information may at least include at least one of pressure magnitude information and pressure duration information.
  • Touchscreen 1014 can provide an input and output interface between the computing device and a user.
  • the touch screen 1014 can be implemented in various types such as resistive, capacitive, infrared, and surface acoustic wave.
  • the input unit 1003 may also include other input devices 1015 .
  • other input devices 1015 may include, but are not limited to, one or more of physical keyboards, function keys (such as volume control keys, switch keys, etc.), trackballs, mice, joysticks, and the like.
  • the display unit 1004 may be used to display information input by or provided to the user and various menus of the computing device. Further, the touch screen 1014 may cover the display unit 1004, and when the touch screen 1014 detects a touch operation on or near it, it transmits to the processor 1001 to determine the pressure information of the touch operation.
  • the touch screen 1014 and the display unit 1004 can be integrated into one component to realize the input, output, and display functions of the computing device.
  • the embodiment of the present application takes the touch screen 1014 as an example to represent the function set of the touch screen 1014 and the display unit 1004 for schematic illustration.
  • the touch screen 1014 and the display unit 1004 can also be used as two independent components .
  • the display unit 1004 When the display unit 1004 and the touch panel are superimposed on each other in layers to form the touch screen 1014, the display unit 1004 can be used as an input device and an output device, and when used as an output device, it can be used to display images, such as realizing various video play.
  • the display unit 1004 may include a liquid crystal display (Liquid Crystal Display, LCD), a thin film transistor liquid crystal display (Thin Film Transistor Liquid Crystal Display, TFT-LCD), an organic light emitting diode (Organic Light Emitting Diode, OLED) display, an active matrix organic light emitting At least one of an Active Matrix Organic Light Emitting Diode (AMOLED) display, an In-Plane Switching (IPS) display, a flexible display, a 3D display, and the like. Some of these displays may be configured to be transparent to allow the user to view from the outside, which may be referred to as a transparent display.
  • the computing device may include two or more display units (or other display means)
  • a computing device may include an external display unit (not shown in FIG. 13 ) and an internal display unit (not shown in FIG. 13 ).
  • the radio frequency unit 1005 can be used for sending and receiving information or receiving and sending signals during a call.
  • a radio frequency circuit includes, but is not limited to, an antenna, at least one amplifier, a transceiver, a coupler, a low noise amplifier (Low Noise Amplifier, LNA), a duplexer, and the like.
  • the radio frequency unit 1005 can also communicate with network equipment and other equipment through wireless communication.
  • Audio circuitry 1006, speaker 1007, and microphone 1008 may provide an audio interface between the user and the computing device.
  • the audio circuit 1006 can transmit the electrical signal converted from the received audio data to the speaker 1007, and the speaker 1007 converts it into an audio signal for output.
  • the microphone 1008 converts the collected sound signal into an electrical signal, which is received by the audio circuit 1006 and converted into audio data, and then the audio data is processed by the output processor 1001, and then sent to another computing device through the radio frequency unit 1005 , or output the audio data to the memory 1002 for further processing, and the audio circuit may also include an earphone jack 1013 for providing a connection interface between the audio circuit and the earphone.
  • WiFi is a short-distance wireless transmission technology.
  • the computing device can help users send and receive emails, browse web pages, and access streaming media through the WiFi module 1009, which provides users with wireless broadband Internet access.
  • FIG. 13 shows a WiFi module 1009, it can be understood that it is not a necessary component of the computing device, and can be omitted according to needs without changing the essence of the invention.
  • Bluetooth is a short-range wireless communication technology. Using bluetooth technology can effectively simplify the communication between mobile communication devices such as handheld computers, notebook computers and mobile phones, and can also successfully simplify the communication between the above-mentioned devices and the Internet (Internet). Data transfers between devices and other devices have become faster and more efficient, opening the way for wireless communications. Bluetooth technology is an open solution that enables wireless transmission of voice and data. Although FIG. 13 shows the Bluetooth module 1010, it can be understood that it is not an essential component of the computing device, and can be completely omitted as required without changing the essence of the invention.
  • the computing device may also include a power source 1011 (such as a battery) for receiving external power or powering various components within the computing device.
  • a power source 1011 such as a battery
  • the power supply 1011 can be logically connected to the processor 1001 through a power management system, so as to implement functions such as management of charging, discharging, and power consumption management through the power management system.
  • the computing device can also include an external interface 1012.
  • the external interface 1012 can include a standard Micro USB interface, or a multi-pin connector, which can be used to connect the computing device to communicate with other devices, and can also be used to connect a charger for computing.
  • the device is charging.
  • the computing device in the embodiment of the present application may also include other possible functional modules such as a camera and a flashlight, which will not be repeated here.
  • an embodiment of the present application provides a computing device, where the computing device is a server.
  • the computing device in the embodiment of the present application includes at least one processor 1101, and a memory 1102 and a communication interface 1103 connected to the at least one processor 1101, and the processor 1101 and the memory 1102 are not limited in the embodiment of the present application
  • the connection between the processor 1101 and the memory 1102 through the bus 1100 is taken as an example.
  • the bus 1100 is represented by a thick line in FIG. 11, and the connection mode between other components is only for illustration Descriptions are not intended to be limiting.
  • the bus 1100 can be divided into an address bus, a data bus, a control bus, etc. For ease of representation, only one thick line is used to represent it in FIG. 14 , but it does not mean that there is only one bus or one type of bus.
  • the memory 1102 stores instructions executable by at least one processor 1101, and at least one processor 1101 executes the instructions stored in the memory 1102 to perform the steps included in the foregoing peer-to-peer data processing method.
  • the processor 1101 is the control center of the computing device, which can use various interfaces and lines to connect various parts of the entire computing device, and by running or executing instructions stored in the memory 1102 and calling data stored in the memory 1102, the computing device Various functions and processing data of various functions, so as to monitor the computing equipment as a whole.
  • the processor 1101 may include one or more processing units, and the processor 1101 may integrate an application processor and a modem processor, wherein the processor 1101 mainly processes the operating system, user interface and application programs, etc., and the modem
  • the tuner processor mainly handles wireless communication. It can be understood that the foregoing modem processor may not be integrated into the processor 1101 .
  • the processor 1101 and the memory 1102 can be implemented on the same chip, and in some embodiments, they can also be implemented on independent chips.
  • the processor 1101 may be a general-purpose processor, such as a central processing unit (CPU), a digital signal processor, an application-specific integrated circuit, a field programmable gate array or other programmable logic device, a discrete gate or transistor logic device, or a discrete hardware component. Realize or execute the various methods, steps and logic block diagrams disclosed in the embodiments of the present application.
  • a general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method applied for in connection with the embodiments of the present application may be directly implemented by a hardware processor, or implemented by a combination of hardware and software modules in the processor.
  • the memory 1102 can be used to store non-volatile software programs, non-volatile computer-executable programs and modules.
  • Memory 1102 can include at least one type of storage medium, for example, can include flash memory, hard disk, multimedia card, card memory, random access memory (Rand om Access Memory, RAM), static random access memory (Static Random Access Memory, SRAM) , Programmable Read Only Memory (PROM), Read Only Memory (ROM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Magnetic Memory, Diskettes, CDs, etc.
  • the memory 1102 is any other medium that can be used to carry or store desired program code in the form of instructions or data structures and can be accessed by a computer, but is not limited thereto.
  • the memory 1102 in the embodiment of the present application may also be a circuit or any other device capable of implementing a storage function, and is used for storing program instructions and/or data.
  • the communication interface 1103 is a transmission interface that can be used for communication, for example, data can be received or sent through the communication interface 1103 .
  • the computing device also includes a basic input/output system (I/O system) 1104 that facilitates the transfer of information between various devices within the computing device, and is used to store operating systems 1105, application programs 1106, and other program modules 1107 mass storage device 1108.
  • I/O system basic input/output system
  • the basic input/output system 1104 includes a display 1109 for displaying information and input devices 1110 such as a mouse and a keyboard for user input of information. Both the display 1109 and the input device 1110 are connected to the processor 1101 through the basic input/output system 1104 connected to the system bus 1100 .
  • the basic input/output system 1104 may also include an input output controller for receiving and processing input from various other devices such as a keyboard, mouse, or electronic stylus. Similarly, input-output controllers also provide output to a display screen, printer, or other type of output device.
  • the mass storage device is connected to the processor 1101 through a mass storage controller (not shown) connected to the system bus 1100 .
  • Mass storage device 1108 and its associated computer-readable media provide non-volatile storage for the server package. That is, mass storage devices 1108 may include computer-readable media (not shown), such as hard disks or CD-ROM drives.
  • the computing device package can also run on a remote computer connected to a network through a network, such as the Internet. That is, the computing device can be connected to the network 1111 through the communication interface 1103 connected to the system bus 1100, or can also use the communication interface 1103 to connect to other types of networks or remote computer systems (not shown).
  • an embodiment of the present application also provides a storage medium, which may be a computer-readable storage medium, and computer instructions are stored in the storage medium, and when the computer instructions are run on the computer, the computer executes such as
  • the aforementioned point-to-point data processing method includes the steps.
  • an embodiment of the present application further provides a chip system, where the chip system includes a processor and may further include a memory, configured to implement the steps included in the foregoing peer-to-peer data processing method.
  • the system-on-a-chip may consist of chips, or may include chips and other discrete devices.
  • various aspects of the method for processing social content may also be implemented in the form of a program product, which includes program code.
  • program product which includes program code.
  • the program code is used to The computer is made to execute the above-described steps included in the peer-to-peer data processing method according to various exemplary embodiments of the present application.
  • the embodiments of the present application may be provided as methods, devices, systems, or computer program products. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including but not limited to disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
  • computer-usable storage media including but not limited to disk storage, CD-ROM, optical storage, etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • General Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

La présente invention se rapporte au domaine technique du traitement de données, et concerne en particulier un procédé et un système de traitement de données point à point, un dispositif informatique et un support de stockage. Dans le procédé de traitement de données point à point, un grand livre général est associé à tous les grands livres auxiliaires au moyen d'indices de hachage ; lorsqu'une opération de transaction d'un grand livre auxiliaire est déclenchée, la légitimité d'une transaction du grand livre auxiliaire est contrôlée au moyen du grand livre général ; et lorsque la transaction est légitime, le montant pour le grand livre auxiliaire et le montant pour le grand livre général sont mis à jour, le grand livre général et le grand livre auxiliaire sont incités à stocker l'enregistrement de transaction courant, et le grand livre général est invité à mettre à jour une table d'indices de hachage. Sur cette base, le grand livre général stocke uniquement l'entrée de transaction la plus récente du grand livre auxiliaire et un indice de hachage correspondant, et ne stocke pas un grand livre de journal de transactions pour le grand livre auxiliaire, et le grand livre de journal de transactions est stocké dans le grand livre auxiliaire et conservé par un utilisateur lui-même, de manière à réaliser une structure de grand livre partagé unique pour un paiement point à point, à réaliser l'efficacité de traitement de données de paiement centralisées et les caractéristiques d'un grand livre de chaîne de blocs, et à pouvoir prendre en considération aussi bien la sécurité de traitement de données de paiement que l'efficacité de traitement des données de paiement.
PCT/CN2022/127491 2022-01-14 2022-10-25 Procédé et système de traitement de données point à point, dispositif informatique et support de stockage WO2023134259A1 (fr)

Priority Applications (3)

Application Number Priority Date Filing Date Title
GBGB2305203.8A GB202305203D0 (en) 2022-10-25 2022-10-25 Not published
DE112022000118.6T DE112022000118T5 (de) 2022-01-14 2022-10-25 Peer-to-peer-basiertes datenverarbeitungsverfahren und -system, rechengerät und speichermedium
US18/129,088 US20230245118A1 (en) 2022-01-14 2023-03-31 Point-to-point (p2p)-based data processing method and system, computing device, and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202210046337.0 2022-01-14
CN202210046337.0A CN114511321B (zh) 2022-01-14 2022-01-14 基于点对点的数据处理方法、系统、计算设备及存储介质

Related Child Applications (1)

Application Number Title Priority Date Filing Date
US18/129,088 Continuation-In-Part US20230245118A1 (en) 2022-01-14 2023-03-31 Point-to-point (p2p)-based data processing method and system, computing device, and storage medium

Publications (1)

Publication Number Publication Date
WO2023134259A1 true WO2023134259A1 (fr) 2023-07-20

Family

ID=81549626

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2022/127491 WO2023134259A1 (fr) 2022-01-14 2022-10-25 Procédé et système de traitement de données point à point, dispositif informatique et support de stockage

Country Status (2)

Country Link
CN (1) CN114511321B (fr)
WO (1) WO2023134259A1 (fr)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114511321B (zh) * 2022-01-14 2022-09-23 北京第五力科技有限公司 基于点对点的数据处理方法、系统、计算设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100013757A (ko) * 2008-08-01 2010-02-10 주식회사 비즈모델라인 이종의 계좌 연결을 통한 캐시 결제 방법 및 시스템과 이를위한 기록매체
US20170243212A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for implementing a distributed ledger across multiple network nodes
CN110009338A (zh) * 2018-12-25 2019-07-12 阿里巴巴集团控股有限公司 基于区块链的记账方法及装置、电子设备
CN111191292A (zh) * 2019-12-16 2020-05-22 平安壹钱包电子商务有限公司 记账方法、装置、系统及计算机可读存储介质
CN111630830A (zh) * 2020-04-15 2020-09-04 支付宝(杭州)信息技术有限公司 账户模型下的分布式区块链数据存储
CN114511321A (zh) * 2022-01-14 2022-05-17 北京第五力科技有限公司 基于点对点的数据处理方法、系统、计算设备及存储介质

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080006685A1 (en) * 2006-07-06 2008-01-10 Firethorn Holdings, Llc Methods and Systems For Real Time Account Balances in a Mobile Environment
CN109102287B (zh) * 2018-08-13 2021-09-07 中国联合网络通信集团有限公司 区块链记账方法、装置、设备及存储介质
CN110473106A (zh) * 2019-08-21 2019-11-19 腾讯科技(深圳)有限公司 一种交易处理的方法以及相关装置
CN111708825B (zh) * 2020-06-11 2021-08-24 腾讯科技(深圳)有限公司 基于区块链的数据处理方法、装置、设备及可读存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20100013757A (ko) * 2008-08-01 2010-02-10 주식회사 비즈모델라인 이종의 계좌 연결을 통한 캐시 결제 방법 및 시스템과 이를위한 기록매체
US20170243212A1 (en) * 2016-02-22 2017-08-24 Bank Of America Corporation System for implementing a distributed ledger across multiple network nodes
CN110009338A (zh) * 2018-12-25 2019-07-12 阿里巴巴集团控股有限公司 基于区块链的记账方法及装置、电子设备
CN111191292A (zh) * 2019-12-16 2020-05-22 平安壹钱包电子商务有限公司 记账方法、装置、系统及计算机可读存储介质
CN111630830A (zh) * 2020-04-15 2020-09-04 支付宝(杭州)信息技术有限公司 账户模型下的分布式区块链数据存储
CN114511321A (zh) * 2022-01-14 2022-05-17 北京第五力科技有限公司 基于点对点的数据处理方法、系统、计算设备及存储介质

Also Published As

Publication number Publication date
CN114511321A (zh) 2022-05-17
CN114511321B (zh) 2022-09-23

Similar Documents

Publication Publication Date Title
US11601439B2 (en) Verifiable outsourced ledgers
US11902450B2 (en) Blockchain generation method and system, and related device
EP3308522B1 (fr) Système, appareil et procédé de transfert de propriété d'un dispositif entre propriétaires multiples
KR101984254B1 (ko) 블록체인 네트워크를 구성하는 노드 장치 및 그 노드 장치의 동작 방법
JP2022520656A (ja) ブロックチェーンネットワークを介した移転を実施するためのコンピュータで実施されるシステムおよび方法
WO2019118447A1 (fr) Base de données décentralisée associant des clés publiques et des adresses de communication
CN111475841A (zh) 一种访问控制的方法、相关装置、设备、系统及存储介质
KR20200034565A (ko) 블록체인 네트워크를 구성하는 노드 장치 및 그 노드 장치의 동작 방법
US20240202710A1 (en) Method and system for payment for central bank digital currency
WO2023134259A1 (fr) Procédé et système de traitement de données point à point, dispositif informatique et support de stockage
WO2022087791A1 (fr) Procédé et appareil de commande de transactions d'actifs numériques, dispositif terminal et support de stockage
US20210004791A1 (en) Guaranteeing server and method for transaction on blockchain
US12002019B2 (en) Data structure, transmission device, receiving device, settlement device, method, and computer program
KR20200119671A (ko) 디지털 컨텐츠의 이용 권리 증서를 발행 수량 만큼 유통시키는 방법, 상기 방법을 수행하는 서버, 및 상기 방법을 실행하기 위하여 매체에 저장된 컴퓨터 프로그램
WO2020052383A1 (fr) Système et procédé de traitement d'empreinte numérique, et dispositif de marquage numérique
US20230245118A1 (en) Point-to-point (p2p)-based data processing method and system, computing device, and storage medium
KR102671054B1 (ko) 중앙은행 디지털 화폐를 위한 결제 방법 및 시스템
JP7262328B2 (ja) 資産のバックアップ処理方法およびプログラム
JP7308977B2 (ja) 同時取引を容易にするための方法、取引管理装置及びコンピュータ読み取り可能な媒体
KR102298497B1 (ko) 전력 관리 서버 및 컴퓨터 프로그램
EP3651406A2 (fr) Premier dispositif de communication, second dispositif de communication, procédé et programme informatique
KR102645894B1 (ko) 통신 단말 기반의 계약 처리 시스템 및 방법
US20230385923A1 (en) Multi-unit sealed-bid auctions on the ethereum virtual machine
US11948144B2 (en) Knowledge-based authentication for asset wallets
US20230334470A1 (en) Blockchain interoperability system for native asset creation

Legal Events

Date Code Title Description
WWE Wipo information: entry into national phase

Ref document number: 112022000118

Country of ref document: DE

121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 22919893

Country of ref document: EP

Kind code of ref document: A1