CN106385319B - Method and system for verifying information in block chain network - Google Patents

Method and system for verifying information in block chain network Download PDF

Info

Publication number
CN106385319B
CN106385319B CN201610861590.6A CN201610861590A CN106385319B CN 106385319 B CN106385319 B CN 106385319B CN 201610861590 A CN201610861590 A CN 201610861590A CN 106385319 B CN106385319 B CN 106385319B
Authority
CN
China
Prior art keywords
information
node
signature
block
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610861590.6A
Other languages
Chinese (zh)
Other versions
CN106385319A (en
Inventor
汪德嘉
郭宇
王少凡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
JIANGSU PAY EGIS TECHNOLOGY Co.,Ltd.
Jiangsu tongfudun blockchain Technology Co., Ltd
Original Assignee
Jiangsu Tongfudun Blockchain Technology Co Ltd
Jiangsu Pay Egis Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiangsu Tongfudun Blockchain Technology Co Ltd, Jiangsu Pay Egis Technology Co ltd filed Critical Jiangsu Tongfudun Blockchain Technology Co Ltd
Priority to CN201610861590.6A priority Critical patent/CN106385319B/en
Publication of CN106385319A publication Critical patent/CN106385319A/en
Application granted granted Critical
Publication of CN106385319B publication Critical patent/CN106385319B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a system for verifying information in a block chain network, wherein the method comprises the following steps: a first node in the block chain network monitors the information broadcast in the block chain network; the first node verifies the monitored information; if the verification information is legal information, the first node signs the information; the first node stores the signed information and forwards the signed information; the second node in the block chain network receives the signed information and verifies the information; if the verification is passed, the second node carries out secondary signature on the information; and the second node stores the information after the secondary signature and forwards the information after the secondary signature. By the aid of the scheme, workload of node verification information can be reduced, information forwarding speed is increased, and information can be forwarded more quickly.

Description

Method and system for verifying information in block chain network
Technical Field
The present invention relates to the field of software, and in particular, to a method and a system for verifying information in a blockchain network.
Background
All conventional payment systems rely on a central certificate authority to validate and process all transactions against the settlement services provided by the central authority. The blockchain has no central authority, and almost all complete nodes have a copy of the common ledger, which can be considered as a certified record.
The blockchain is not created by a central authority, and is completed by independent competition of all nodes in the blockchain network. All nodes in the blockchain network rely on information transmitted by unstable network connections between the nodes to finally obtain the same result and maintain the same public general ledger. Stated another way, the consensus is that thousands of independent nodes obey simple rules to spontaneously form products through asynchronous interactions. However, after receiving a new transaction or a new block, each node in the existing blockchain network needs to verify the transaction or the block according to the consensus mechanism of the blockchain, thereby achieving autonomous consensus of the whole network. Therefore, each node needs to repeat the same verification work according to the verification standard, and bears larger verification workload.
Disclosure of Invention
The invention aims to provide a method and a system for verifying information in a block chain network, aiming at the defects of the prior art, and the method and the system are used for solving the problems that the nodes repeat the same verification work, the workload is large and the like in the prior art.
According to an aspect of the present invention, there is provided a method for verifying information in a blockchain network, including:
a first node in the block chain network monitors the information broadcast in the block chain network;
the first node verifies the monitored information;
if the verification information is legal information, the first node signs the information;
the first node stores the signed information and forwards the signed information;
the second node in the block chain network receives the signed information and verifies the information;
if the verification is passed, the second node carries out secondary signature on the information;
and the second node stores the information after the secondary signature and forwards the information after the secondary signature.
According to another aspect of the present invention, there is also provided a system for verifying information in a blockchain network, comprising: a first node and a second node located in a blockchain network;
the first node is configured to: monitoring information broadcast in a blockchain network; verifying the monitored information; if the verification information is legal information, signing the information; storing the signed information, and forwarding the signed information;
the second node is configured to: receiving the signed information, and verifying the information; if the verification is passed, carrying out secondary signature on the information; and storing the information after the secondary signature, and forwarding the information after the secondary signature.
According to the method and the system for verifying the information in the block chain network, the first node in the block chain network monitors the information broadcast in the block chain network and verifies the monitored information. And after the information is verified to be legal, the first node signs the information. And storing the signed information and forwarding the signed information. And the second node positioned in the block chain network receives the signed information and verifies the information. And if the verification is passed, the second node carries out secondary signature on the information. And storing the information after the secondary signature, and forwarding the information after the secondary signature. The information is not required to be legally verified by all the nodes, the workload of verifying the information by partial nodes is reduced, the information forwarding speed is accelerated, and the information can be forwarded more quickly.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 illustrates a flow diagram of a method for verifying information in a blockchain network, according to one embodiment of the invention;
FIG. 2 is a flow diagram illustrating a method for verifying information in a blockchain network according to another embodiment of the invention;
fig. 3 is a functional block diagram of a system for verifying information in a blockchain network according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Fig. 1 shows a flow chart of a method for verifying information in a blockchain network according to an embodiment of the present invention, as shown in fig. 1, the method specifically includes the following steps:
step S101, a first node in the block chain network monitors the information broadcast in the block chain network.
The information broadcast in the blockchain network comprises transaction information and block information. One or more transaction messages are included in the tile message. The first node is located in the network of the block chain and can monitor the transaction information and the block information broadcast in the network of the block chain.
And S102, the first node verifies the monitored information and judges whether the verification information is legal or not.
The first node can verify the legality of the monitored information according to preset verification conditions, and the legality of different information is verified differently correspondingly.
If the transaction information is validated legally, at least the following preset validation conditions are included: whether the syntax and data structure in the transaction information is correct, the transaction information input and output lists cannot be empty, the byte SIZE of the transaction must be less than a preset length threshold, e.g., MAX _ BLOCK _ SIZE, each output value and total amount in the transaction information must be within a specified range, e.g., greater than 0, less than 2100, no hash in the transaction information is equal to 0, N is equal to-1 for the input, the minimum time limit (nLockTime) in the transaction information is less than or equal to a preset threshold, e.g., INT _ MAX, the byte SIZE of the transaction is greater than or equal to 100, the number of signatures in the transaction is less than the upper limit of the number of signature operations, the unlock script must push the number onto the stack, and the lock script must conform to whether a standard format is present, one matching transaction in the transaction pool or in the main branch BLOCK must be present, for each transaction input, if the referenced output is present in any transaction in the transaction pool, the transaction is rejected, and for each transaction input, a referenced output transaction is found in the main branch and the transaction pool; if an outgoing transaction lacks any of the inputs, the transaction will become an isolated transaction; if the transaction matching it has not already appeared in the pool, it will be added to the isolated transaction pool, for each transaction input, if the referenced output transaction is a bitcoin (coin) output, the input must at least obtain a confirmation that the unlocking time of the bitcoin is 100, e.g. COINBASE _ MATURITY, for each transaction input, the referenced output must be present and not be spent, the input values are obtained using the referenced output transaction, and it is checked whether each input value and the total value are within a specified range of values, e.g. greater than 0 and less than 2100, if the sum of the input values is less than the sum of the output values, the transaction will be aborted, if the transaction cost is too low to enter an empty block, the transaction will be rejected, the unlocking script for each transaction input must be verified against the corresponding output locking script, etc.
If the block is validated, the validation conditions at least include the following preset validation conditions: the data structure of the block is syntactically valid, the hash value of the block header is less than the target difficulty to confirm that sufficient workload declaration is contained, the block timestamp is two hours into the future earlier than the verification time, the block size is within the length limit, the first transaction of the block and only the first is a bitcoin (coin) transaction, the transactions within the block are verified using the checklist and their validity is ensured, and the transaction verification can refer to the validity verification of the above transactions.
The first node verifies the monitored information, and if the verification information is judged to be legal, the step S103 is continuously executed.
Step S103, if the verification information is legal information, the first node signs the information.
After the first node verifies that the information is legal, the first node signs the information by using the first node private key, namely the first node can sign the transaction information or sign the block information by using the first node private key.
The implementation process of the specific signature can be implemented in a manner of using hash in the private key encryption information as the signature, and is not specifically limited herein.
And step S104, the first node stores the signed information and forwards the signed information.
When the first node stores the signed information, different information storage modes are different. If the transaction information exists, the first node stores the transaction information into a memory pool of the first node, and then forwards the signed transaction information. As with the block information, the first node synchronizes the block information into the first node's blockchain and then forwards the signed block information.
And step S105, the second node in the block chain network receives the signed information, verifies the information and judges whether the verification is passed.
The second node, that is, other nodes in the blockchain network except the first node, are all second nodes, and the information received by the second node is signed information.
And after receiving the signed information, the second node verifies whether the signature of the information is the signature of the first node by using the public key of the first node. The specific verification process may be implemented by, for example, decrypting the signature by using the first node public key, and verifying whether the decrypted hash is consistent with the original text, which is not specifically limited herein.
If the signature of the verification information is the signature of the first node, that is, the information is verified to be legitimate by the first node, and the verification information is legitimate, the process continues to execute step S106.
And step S106, if the verification is passed, the second node signs the information for the second time.
The second node does not verify the validity of the information, but signs the information for the second time on the basis of the signature of the first node, or signs the information for the second time to replace the signature of the first node. And during secondary signature, the second node signs the transaction information or the block information by using a second node private key.
And step S107, the second node stores the information after the secondary signature and forwards the information after the secondary signature.
And after secondary signature, the second node stores the information subjected to secondary signature, and different information storage modes are different. If the transaction information exists, the second node stores the transaction information into a memory pool of the second node, and then forwards the transaction information after the secondary signature. If the block information exists, the second node synchronizes the block information to the block chain of the second node and forwards the block information after secondary signature.
According to the verification method of the information in the block chain network, which is provided by the invention, the first node in the block chain network monitors the information broadcast in the block chain network and verifies the monitored information. And after the information is verified to be legal, the first node signs the information. And storing the signed information and forwarding the signed information. And the second node positioned in the block chain network receives the signed information and verifies the information. And if the verification is passed, the second node carries out secondary signature on the information. And storing the information after the secondary signature, and forwarding the information after the secondary signature. The information is not required to be legally verified by all the nodes, the workload of verifying the information by partial nodes is reduced, the information forwarding speed is accelerated, and the information can be forwarded more quickly.
Fig. 2 is a flowchart illustrating a method for verifying information in a blockchain network according to another embodiment of the present invention, where as shown in fig. 2, the method specifically includes the following steps:
step S201, a first node in the blockchain network monitors information broadcast in the blockchain network.
Step S202, the first node verifies the monitored information and judges whether the verification information is legal or not.
The above steps can refer to steps S101 and S102 in the embodiment of the method in fig. 1, and are not described herein again.
It should be noted that, in step S202, the first node verifies the monitored information, and if the verification information is determined to be legitimate, step S203 is continuously executed, and if the verification information is determined to be illegitimate, step S208 is executed.
In step S203, if the verification information is legal, the first node generates a signature message for the information.
And after verifying that the information is legal, the first node generates a signature message for the information. If the information is transaction information, the signature message comprises the hash of the transaction information content and the signature of the node on the transaction information content. If the information is the block information, the signature message comprises the hash of the block information content and the signature of the node on the block information content. The signature of the transaction information content or the signature of the block information content is the signature of the transaction information content or the signature of the block information content by the first node by using the first node private key.
And step S204, the first node stores the information and respectively forwards the information and the signature message.
When the first node stores the information, different information storage modes are different. If the transaction information exists, the first node stores the transaction information into a memory pool of the first node, and then forwards the signed transaction information. For example, the first node synchronizes the block information to the block chain of the first node, and then forwards the signed block information.
Step S205, the second node in the blockchain network receives the information and the signature message, verifies the information and the signature message, and determines whether the verification passes.
The second node, that is, other nodes in the blockchain network except the first node, are the second node.
And after the second node receives the information and the signature message, if the information is the transaction information, the hash of the transaction content is obtained from the signature message of the information, and the corresponding transaction information content is obtained. When the transaction information is verified, the validity of the transaction information content can be verified, the signature of the transaction information content can also be verified, and whether the signature of the transaction information content is the signature of the first node is verified by using the first node public key. And if the information is the block information, acquiring the hash of the block information content from the signature message of the information to obtain the corresponding block information content. When the block information is verified, the validity of the block information content can be verified, and the signature of the block information content can also be verified. And verifying whether the signature of the block information content is the signature of the first node by using the public key of the first node.
If the verification is passed, that is, the information has been legally verified by the first node, and the verification information is legal, the step S206 is continuously executed, otherwise, the step S208 is executed.
And step S206, if the verification is passed, the second node signs the information for the second time.
And step S207, the second node stores the information after the secondary signature and forwards the information after the secondary signature.
The above steps can refer to steps S106 and S107 in the embodiment of the method in fig. 1, and are not described herein again.
In step S208, the information is discarded.
And directly discarding the information about whether the first node verifies the information is legal and failed and the information about whether the second node verifies the signature of the non-first node, namely the information is illegal or the signature is possibly a forged signature.
According to the method for verifying the information in the block chain network, provided by the invention, if the monitored information is verified to be legal information by the first node, a signature message is generated for the information. And storing the signed information and forwarding the signed information. Otherwise, the information is discarded directly. And if the signed information passes the verification of the second node, performing secondary signature on the information. And storing the information after the secondary signature, and forwarding the information after the secondary signature. Otherwise, the information is discarded directly. The workload of partial node verification information is reduced, the information forwarding speed is increased, and the information can be forwarded more quickly. Meanwhile, the information which fails to pass the verification, namely the illegal information or the information of the forged signature is directly discarded, so that the workload of information verification is reduced.
Fig. 3 is a functional structure diagram of a system for verifying information in a blockchain network according to an embodiment of the present invention, and as shown in fig. 3, the system includes the following nodes:
the first node 310 is configured to listen to information broadcast in the blockchain network; verifying the monitored information; if the verification information is legal information, signing the information; and storing the signed information and forwarding the signed information.
The information broadcast in the blockchain network comprises transaction information and block information. One or more transaction messages are included in the tile message. The first node 310 is located in a network of a block chain, and can monitor transaction information and block information broadcast in the network of the block chain. The first node 310 performs validity verification on the monitored information according to a preset verification condition, where the validity verification is different for different information. The preset verification condition may refer to the step S102 in the method embodiment, and is not described herein again. The first node 310 verifies the monitored information according to the information type, and if the verified information is legal information, the first node 310 signs the information by using the first node private key, that is, the first node 310 may sign the transaction information or sign the block information by using the first node private key. The first node 310 stores the signed information, and different information storage methods are different. If the transaction information is received, the first node 310 stores the transaction information in the first node memory pool, and then forwards the signed transaction information. As block information, the first node 310 synchronizes the block information into the first node block chain and then forwards the signed block information.
The second node 320 is configured to receive the signed information and verify the information; if the verification is passed, carrying out secondary signature on the information; and storing the information after the secondary signature, and forwarding the information after the secondary signature.
Here, the second node 320, i.e. other nodes in the blockchain network except the first node 310, are all the second nodes 320, and the information received by the second node 320 is signed information.
After receiving the signed information, the second node 320 verifies whether the signature of the information is the signature of the first node by using the public key of the first node. The specific verification process may be implemented, for example, by decrypting the signature with the first node public key, and verifying whether the decrypted hash is consistent with the original text, which is not specifically limited herein. If the signature of the information verified by the second node 320 is the signature of the first node, that is, the information is verified to be legitimate by the first node 310, and the verified information is legitimate, the second node 320 does not verify the legitimacy of the information any more, but performs a secondary signature on the information on the basis of the signature of the first node 310, or performs a secondary signature on the information to replace the signature of the first node. During the second signature, the second node 320 uses the second node private key to sign the transaction information or the block information. After the second signature, the second node 320 stores the information after the second signature, and different information storage modes are different. If the transaction information is received, the second node 320 stores the transaction information in the memory pool of the second node, and then forwards the transaction information after the secondary signature. For example, the second node 320 synchronizes the block information to the second node block chain and forwards the block information after the secondary signature.
Further, the first node 310 verifies the monitored information, and if the verified information is judged to be illegal, the information is directly discarded, so that the information is not broadcasted in the blockchain network. The first node 310 signing the information may also include generating a signature message for the information. If the information is transaction information, the signature message comprises the hash of the transaction information content and the signature of the node on the transaction information content. If the information is the block information, the signature message comprises the hash of the block information content and the signature of the node on the block information content. The signature of the transaction information content or the signature of the block information content is the signature of the transaction information content or the signature of the block information content by the first node 310 by using the first node private key.
Accordingly, if the first node 310 generates a signature message for the information, the verification of the information by the second node 320 further comprises: if the information is transaction information, the second node 320 obtains the hash of the transaction content from the signature message of the information to obtain the corresponding transaction information content. When verifying the transaction information, the second node 320 may verify the validity of the transaction information content, and may also verify the signature of the transaction information content, and verify whether the signature of the transaction information content is the signature of the first node by using the public key of the first node. If the information is the block information, the second node 320 obtains the hash of the block information content from the signature message of the information to obtain the corresponding block information content. When verifying the block information, the second node 320 may verify the validity of the content of the block information, and may also verify the signature of the content of the block information. And verifying whether the signature of the block information content is the signature of the first node by using the public key of the first node. If the second node 320 fails the verification, the second node 320 directly discards the information and does not have it broadcast in the blockchain network again.
According to the verification system for the information in the block chain network, which is provided by the invention, the first node in the block chain network is used for monitoring the information broadcast in the block chain network and verifying the monitored information. And after the information is verified to be legal, the first node signs the information. And storing the signed information and forwarding the signed information. And the second node positioned in the block chain network receives the signed information and verifies the information. And if the verification is passed, the second node carries out secondary signature on the information. And storing the information after the secondary signature, and forwarding the information after the secondary signature. The information is not required to be legally verified by all the nodes, the workload of verifying the information by partial nodes is reduced, the information forwarding speed is accelerated, and the information can be forwarded more quickly. Meanwhile, the information which fails to pass the verification, namely the illegal information or the information of the pseudo-signature is directly discarded, so that the workload of information verification is reduced.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual system, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and placed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functionality of some or all of the components in accordance with embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.

Claims (16)

1. A method for verifying information in a blockchain network, comprising:
a first node in the block chain network monitors the information broadcast in the block chain network;
the first node verifies the monitored information;
if the information is verified to be legal, the first node signs the information;
the first node stores the signed information and forwards the signed information;
the second node in the block chain network receives the signed information and verifies the information;
if the verification is passed, the second node carries out secondary signature on the information;
the second node stores the information after the secondary signature and forwards the information after the secondary signature;
the second node in the blockchain network receives the signed information, and verifying the information further comprises:
and verifying whether the signature of the information is the signature of the first node or not by using the public key of the first node, and if the signature of the verification information is the signature of the first node, the verification is passed.
2. The method of claim 1, wherein the information is transaction information or block information.
3. The method of claim 1 or 2, wherein the first node verifying the intercepted information further comprises:
and according to a preset condition, the first node carries out validity verification on the monitored information.
4. The method of claim 1 or 2, wherein the first node signing the message if the message is verified to be legitimate further comprises:
the first node generates a signature message for the information.
5. The method of claim 4, wherein the signature message comprises a hash of the transaction information content and a signature of the transaction information content by the first node; or the signature message comprises a hash of the tile information content and the signature of the first node on the tile information content.
6. The method of claim 5, wherein the second node in the blockchain network receives the signed information, and wherein verifying the information further comprises:
the second node acquires the hash of the transaction information content from the signature message of the information to obtain the transaction information content; verifying the legality of the transaction information content and the signature of the transaction information content;
or the second node acquires the hash of the block information content from the signature message of the information to obtain the block information content; and verifying the legality of the block information content and the signature of the block information content.
7. The method of claim 1 or 2, wherein the first node stores the signed information, and wherein forwarding the signed information further comprises:
the first node stores the transaction information into a memory pool of the first node and forwards the signed transaction information;
or the first node synchronizes the block information to the block chain of the first node and forwards the signed block information.
8. The method according to claim 1 or 2, wherein the second node saves the twice signed information, and forwarding the twice signed information further comprises:
the second node stores the transaction information into a memory pool of the second node and forwards the transaction information after the secondary signature;
or the second node synchronizes the block information to the block chain of the second node and forwards the block information after the secondary signature.
9. A system for validating information in a blockchain network, comprising: a first node and a second node located in a blockchain network;
the first node is configured to: monitoring information broadcast in a blockchain network; verifying the monitored information; if the information is verified to be legal, signing the information; storing the signed information, and forwarding the signed information;
the second node is configured to: receiving the signed information, and verifying the information; if the verification is passed, carrying out secondary signature on the information; storing the information after the secondary signature, and forwarding the information after the secondary signature;
the second node is further configured to: and verifying whether the signature of the information is the signature of the first node or not by using the public key of the first node, and if the signature of the verification information is the signature of the first node, the verification is passed.
10. The system of claim 9, wherein the information is transaction information or block information.
11. The system of claim 9 or 10, wherein the first node is further configured to:
and carrying out validity verification on the monitored information according to preset conditions.
12. The system of claim 9 or 10, wherein the first node is further configured to: generating a signature message for the information.
13. The system of claim 12, wherein the signature message comprises a hash of the transaction information content and a signature of the transaction information content by the first node; or the signature message comprises a hash of the tile information content and the signature of the first node on the tile information content.
14. The system of claim 13, wherein the second node is further configured to:
obtaining the hash of the transaction information content from the signature message of the information to obtain the transaction information content; verifying the legality of the transaction information content and the signature of the transaction information content;
or hash of the block information content is obtained from the signature message of the information to obtain the block information content; and verifying the legality of the block information content and the signature of the block information content.
15. The system of claim 9 or 10, wherein the first node is further configured to:
storing the transaction information into a memory pool of the first node, and forwarding the signed transaction information;
or synchronizing the block information to the block chain of the first node, and forwarding the signed block information.
16. The system of claim 9 or 10, wherein the second node is further configured to:
storing the transaction information into a memory pool of the second node, and forwarding the transaction information after the secondary signature;
or synchronizing the block information to the block chain of the second node, and forwarding the block information after secondary signature.
CN201610861590.6A 2016-09-29 2016-09-29 Method and system for verifying information in block chain network Active CN106385319B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610861590.6A CN106385319B (en) 2016-09-29 2016-09-29 Method and system for verifying information in block chain network

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610861590.6A CN106385319B (en) 2016-09-29 2016-09-29 Method and system for verifying information in block chain network

Publications (2)

Publication Number Publication Date
CN106385319A CN106385319A (en) 2017-02-08
CN106385319B true CN106385319B (en) 2020-11-27

Family

ID=57936991

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610861590.6A Active CN106385319B (en) 2016-09-29 2016-09-29 Method and system for verifying information in block chain network

Country Status (1)

Country Link
CN (1) CN106385319B (en)

Families Citing this family (52)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107391320B (en) * 2017-03-10 2020-07-10 创新先进技术有限公司 Consensus method and device
CN113766035B (en) * 2017-03-28 2023-05-23 创新先进技术有限公司 Service acceptance and consensus method and device
GB201706132D0 (en) * 2017-04-18 2017-05-31 Nchain Holdings Ltd Computer-implemented system and method
CN107169765B (en) * 2017-05-11 2020-07-31 电子科技大学 Method for dynamically adjusting block chain consensus based on business trust
CN107220130B (en) * 2017-05-12 2021-12-07 北京众享比特科技有限公司 Method, device and system for realizing information consensus at nodes of block chain
CN107277108B (en) * 2017-05-18 2020-09-08 北京众享比特科技有限公司 Method, device and system for processing messages at nodes of block chain
CN107395665B (en) * 2017-05-22 2020-04-24 创新先进技术有限公司 Block chain service acceptance and service consensus method and device
WO2018215951A1 (en) * 2017-05-26 2018-11-29 nChain Holdings Limited Script based blockchain interaction
CN107294738B (en) * 2017-06-12 2019-08-27 中国联合网络通信集团有限公司 The treating method and apparatus of communication charge
CN107171810B (en) * 2017-06-27 2020-03-13 中国联合网络通信集团有限公司 Verification method and device of block chain
CN107493273B (en) * 2017-08-02 2020-10-16 深圳市易成自动驾驶技术有限公司 Identity authentication method, system and computer readable storage medium
CN107480978B (en) * 2017-08-04 2021-12-10 苏州缓流科技有限公司 Payment method based on block chain technology
CN107491948B (en) * 2017-08-04 2021-12-10 苏州缓流科技有限公司 Transfer payment method based on block chain technology
CN107423981B (en) * 2017-08-04 2021-12-10 苏州缓流科技有限公司 Mobile terminal browser payment method based on block chain technology
CN107451812B (en) * 2017-08-04 2021-12-10 苏州缓流科技有限公司 APP payment method on mobile terminal based on block chain technology
CN107392769B (en) * 2017-08-04 2021-12-10 苏州缓流科技有限公司 Block chain technology-based collection and payment method
CN107423973B (en) * 2017-08-04 2021-12-10 苏州缓流科技有限公司 Payment method for passive code scanning on user mobile terminal based on block chain technology
CN107396360B (en) * 2017-08-15 2020-04-07 中国联合网络通信集团有限公司 Block verification method and device
CN110998630A (en) * 2017-08-15 2020-04-10 区块链控股有限公司 Random number generation in block chains
CN107566124B (en) * 2017-08-24 2020-06-19 深圳市易成自动驾驶技术有限公司 Hash operation-based consensus establishing method, block chain system and storage medium
CN107657554B (en) * 2017-09-22 2020-10-02 朱志文 Copyright registration transaction and right confirmation method and system
WO2019070938A1 (en) * 2017-10-04 2019-04-11 Silvio Micali Declarative smart contracts
CN108063758A (en) * 2017-11-27 2018-05-22 众安信息技术服务有限公司 For the node in the signature verification method of block chain network and block chain network
CN108234134B (en) * 2017-12-28 2020-09-29 江苏通付盾科技有限公司 Block synchronization method and system
CN108389042B (en) * 2018-02-11 2021-06-11 深圳市图灵奇点智能科技有限公司 Method and device for realizing auxiliary fee settlement by intelligent mobile phone
CN108305058B (en) * 2018-02-11 2021-03-02 深圳市图灵奇点智能科技有限公司 Auxiliary expense settlement method and device based on Internet of things and terminal node
CN108492383B (en) * 2018-02-11 2020-11-27 深圳市图灵奇点智能科技有限公司 Method and device for realizing auxiliary settlement of parking fee by vehicle-mounted system and vehicle
CN108696502B (en) * 2018-03-27 2020-10-20 深圳市网心科技有限公司 Block chain node authority control method, block chain system and storage medium
US11239999B1 (en) * 2018-04-25 2022-02-01 Tyson York Winarski Blockchain network communications system
CN108615153A (en) * 2018-04-28 2018-10-02 百度在线网络技术(北京)有限公司 Processing method, device, system, equipment and the storage medium of block chain data
CN108881156A (en) * 2018-05-02 2018-11-23 深圳圣马歌科技有限公司 Inventory records method, system and computer program product based on block chain
CN108922007A (en) * 2018-05-02 2018-11-30 深圳圣马歌科技有限公司 Electronic voting method, system and computer program product based on block chain
CN110472970B (en) * 2018-05-09 2022-05-10 本无链科技(深圳)有限公司 Block chain-based block pre-generation method and system
CN111899005A (en) * 2018-05-29 2020-11-06 创新先进技术有限公司 Transaction processing method and device based on block chain and electronic equipment
CN108846748A (en) * 2018-05-31 2018-11-20 杭州秘猿科技有限公司 A kind of independent process executes the method and device of contract
CN110610361A (en) * 2018-06-14 2019-12-24 普天信息技术有限公司 Enterprise data signature method and device based on block chain
CN108965257B (en) * 2018-06-20 2020-12-18 北京欧链科技有限公司 Error correction method for block chain system and block chain link points
CN110619520B (en) * 2018-06-20 2023-05-02 深圳市红砖坊技术有限公司 Block chain system and routing method applied to routing nodes of block chain system
CN109213901B (en) * 2018-09-18 2020-12-01 百度在线网络技术(北京)有限公司 Data synchronization method, device, equipment and medium of block chain
CN111210345B (en) * 2018-11-21 2023-02-17 深圳市文鼎创数据科技有限公司 Signature method and device based on block chain network transaction and terminal equipment
DE102018130297A1 (en) * 2018-11-29 2020-06-04 Infineon Technologies Ag Proof of work concept for a vehicle
CN109711192B (en) * 2018-12-24 2021-10-01 众安信息技术服务有限公司 Method and system for inter-node transaction of block chain system
KR20200083937A (en) 2018-12-28 2020-07-09 알리바바 그룹 홀딩 리미티드 Speeding up blockchain transactions using global acceleration nodes
JP6899911B2 (en) 2018-12-28 2021-07-07 アドバンスド ニュー テクノロジーズ カンパニー リミテッド Accelerate transaction delivery within a blockchain network using acceleration nodes
EP3566393B1 (en) 2018-12-28 2021-09-01 Advanced New Technologies Co., Ltd. Accelerating transaction deliveries in blockchain networks using transaction resending
CN109767220B (en) * 2019-01-15 2021-02-19 中国联合网络通信集团有限公司 Block chain based transaction method and block chain based transaction system
CN109819069A (en) * 2019-03-19 2019-05-28 全链通有限公司 The appraisal procedure and system of inquiry of the domain name service quality
CN110519062B (en) * 2019-09-19 2021-10-29 腾讯科技(深圳)有限公司 Identity authentication method, authentication system and storage medium based on block chain
CN111311258B (en) * 2020-01-20 2023-07-21 布比(北京)网络技术有限公司 Block chain-based trusted transaction method, device, system, equipment and medium
CN112560113B (en) * 2020-12-24 2024-06-07 珠海格力电器股份有限公司 Node signature management method, system, electronic equipment and storage medium
CN113127894B (en) * 2021-03-03 2022-09-30 合肥工业大学 Public opinion propagation model-based cryptocurrency network data propagation method and system
CN112988896B (en) * 2021-03-29 2023-02-28 湖北央中巨石信息技术有限公司 Synchronous consensus method, system, device and medium based on block chain

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959307A (en) * 2016-06-30 2016-09-21 中国科学院计算技术研究所 Existence certification and authentication service method and system based on block chain technology
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102196423B (en) * 2010-03-04 2016-07-06 腾讯科技(深圳)有限公司 A kind of safety data transferring method and system
US9858569B2 (en) * 2014-03-21 2018-01-02 Ramanan Navaratnam Systems and methods in support of authentication of an item
US20160098723A1 (en) * 2014-10-01 2016-04-07 The Filing Cabinet, LLC System and method for block-chain verification of goods

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105975868A (en) * 2016-04-29 2016-09-28 杭州云象网络技术有限公司 Block chain-based evidence preservation method and apparatus
CN105959307A (en) * 2016-06-30 2016-09-21 中国科学院计算技术研究所 Existence certification and authentication service method and system based on block chain technology

Also Published As

Publication number Publication date
CN106385319A (en) 2017-02-08

Similar Documents

Publication Publication Date Title
CN106385319B (en) Method and system for verifying information in block chain network
CN109831425B (en) Block chain consensus method, device, equipment and computer readable storage medium
CN107395557B (en) Service request processing method and device
CN108337239B (en) Event attestation of electronic devices
CN110311958B (en) Block chain network system
CN109493221B (en) Method, device, network and storage medium for keeping transaction records secret in block chain
CN108234470B (en) Block packing method and system in block chain network, electronic equipment and storage medium
JP7398000B2 (en) Blockchain-based data detection method and device, computer device and program
US6513116B1 (en) Security information acquisition
US8874921B2 (en) System and method for generating keyless digital multi-signatures
CN108320155B (en) Method for realizing block chain consensus mechanism
CN108696356B (en) Block chain-based digital certificate deleting method, device and system
CN111523899B (en) Consensus method of alliance chain, data verification method, device and system
US6643773B1 (en) Apparatus and method for authenticating messages in a multicast
CN109981680B (en) Access control implementation method and device, computer equipment and storage medium
CN110096894B (en) Data anonymous sharing system and method based on block chain
CN112749968B (en) Service data recording method and device based on block chain
US20230318848A1 (en) Systems and methods for trusted chain code system
CN110611647A (en) Node joining method and device on block chain system
CN111241586B (en) Anonymous processing method and system for block link address, terminal and storage medium
US20220294637A1 (en) System and Method of Establishing a Trusted Relationship in a Distributed System
CN112036878A (en) Data processing method and device
US20210111900A1 (en) Verification information attaching device, verification device, information management system, method, and program
CN116132071B (en) Identity authentication method and device for identification analysis node based on blockchain
CN112994891B (en) Transaction request consensus method and system based on threshold signature

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20201022

Address after: 4f, building C2, Suzhou 2.5 Industrial Park, 88 Dongchang Road, Suzhou Industrial Park, Jiangsu Province, 215000

Applicant after: JIANGSU PAY EGIS TECHNOLOGY Co.,Ltd.

Applicant after: Jiangsu tongfudun blockchain Technology Co., Ltd

Address before: A street in Suzhou City, Jiangsu Province Industrial Park No. 388 innovation park off No. 6 Building 5 floor

Applicant before: JIANGSU PAY EGIS TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant