CN109391619A - Lead to card exchange method and computer-readable medium across chain based on permission - Google Patents

Lead to card exchange method and computer-readable medium across chain based on permission Download PDF

Info

Publication number
CN109391619A
CN109391619A CN201811227211.3A CN201811227211A CN109391619A CN 109391619 A CN109391619 A CN 109391619A CN 201811227211 A CN201811227211 A CN 201811227211A CN 109391619 A CN109391619 A CN 109391619A
Authority
CN
China
Prior art keywords
chain
card
logical card
exchange
logical
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811227211.3A
Other languages
Chinese (zh)
Other versions
CN109391619B (en
Inventor
邓琦
任拴平
沈仕侃
邱敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Youyuan Network Technology Co., Ltd
Original Assignee
Zhaolai Network Technology (shanghai) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhaolai Network Technology (shanghai) Co Ltd filed Critical Zhaolai Network Technology (shanghai) Co Ltd
Priority to CN201811227211.3A priority Critical patent/CN109391619B/en
Publication of CN109391619A publication Critical patent/CN109391619A/en
Application granted granted Critical
Publication of CN109391619B publication Critical patent/CN109391619B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

The present invention provides a kind of to lead to card exchange method across chain based on permission, and comprise the following steps: the first chain updates the Status Flag of the first logical card;First chain proposes exchange application to the second chain;The logical card of second chain active lock second;First logical card is allowed the information package exchanged to be sent to the second chain by the first chain;Second chain verifies package information and generates the information of the first logical card on the second chain, generates the logical card of third;It is generated to the logical card of third and its state is set as across chain swap status, the information package of the second logical card is sent to the first chain by the second chain, and the first chain generates four-way card;It is normal that first chain and the second chain update four-way card and the state of the logical card of third respectively.The present invention does not have to across the logical card exchange of chain by third party, without by side chain or other way.In the case where guaranteeing authorization data privacy, perfection completes the logical card transfer of across chain data.

Description

Lead to card exchange method and computer-readable medium across chain based on permission
Technical field
It is the present invention relates to information technology field, in particular to a kind of that card exchange method and computer are led to across chain based on permission Readable medium.
Background technique
With the continuous development of block chain technology, block chain ecology early has disengaged from the mode of single-stranded information island, shape at present At an ecological environment of more economy multichains.Constantly there is new chain to be born, being exchanged between chain and chain urgently solves Matter of utmost importance certainly.
Currently, the way across chain exchange is broadly divided into three classes, but all there are various defects, be summarized as follows:
1, in notary's mode, trusted one or one group of group notary's mode (Notary Schemes): are used Certain event has occurred on chain X statement chain Y, or determines that the statement is correct.These groups both can automatically monitor and Response events can also carry out monitoring and response events when requested.Notary's mode license divide account field by Many concerns because it can both provide the main competitor flexibly to know together, without carry out expensive work prove or about The complicated proof of interests mechanism.But notary's mode disadvantage is it is also obvious that notary's mode needs the notarial confirmation in many places, Notary is third party, privileged institutions, it is easy to as that ring most weak in trust link in whole system.
2, side chain (Sidechains)/relaying (Relays): if the institute that a chain B can possess another chain A is active Can, then chain B is referred to as the side chain of chain A, and chain A is the main chain of chain B.Wherein main chain A is not aware that the presence of side chain B, and side chain B knows have The presence of main chain A.Assuming that block chain possesses block Header and Body, Merkle etc. is possessed in Header proves information, can be with The block chain head of chain A is written in the block of chain B, chain B uses the common recognition verification method as chain A, such as PoW validation difficulty And length, PBFT verifying ballot etc..After the block header sequence for waiting chain A, chain B can pass through the permit of Merkle branch Cease the data and operation to prove chain A.Chain A, B cannot directly verify the state to square, because will form circulation, but phase in this way Mutually only comprising light node be it is feasible, this block chain verifying logic can by chain agreement itself or application contract realize.Core Heart code needs to exist simultaneously after on two chains of/side chain mode in use, but needs the logical card or object on two chains simultaneously Can endless distribution, can just guarantee that verification process does not have mistake in this way, thus come reach assets transfer operation.
3, Hash locking (Hash-locking): the design of Hash locking mode is desirable to as few as possible between chain A and chain B Understanding each other, and as eliminate notary trust means.Hash locking originates from bit coin lightning network, lightning network sheet Body is a kind of means of the rapid payment of small amount, later it the key technology Hash time it is sealed be about applied to it is technical across chain Come.Although Hash locking realizes the exchange across chain assets, it is not carried out the transfer across chain assets, is less able to achieve this Across chain contract, so its application scenarios are relatively limited.
In conclusion across chain exchange there is no specific, unified exchange standard.Further, it is seen that above various across chain Method there is no across the chain exchange method for the logical card of collection attribute both for the logical card of no collection attribute.
Summary of the invention
According to embodiments of the present invention, provide it is a kind of based on permission across the logical card exchange method of chain, the basis of the logical card Permission includes common data and authorization data, the status indicator of the logical card data, comprising in normal, exchange, three kinds of shapes of disabling State is defaulted as normal condition, comprises the following steps:
The state of the logical card of first chain locking first, updates the Status Flag of the first logical card, the described first logical card be the first chain to The logical card of exchange;
First chain sends application information to the second chain, proposes exchange application;
After second chain receives exchange application, Requisition Validation is swapped, after exchange Requisition Validation passes through, the second chain active lock the Two-way card, and notify the described second logical card locked to the first chain, the described second logical card is the logical card to be exchanged of the second chain;
After the first chain receives the locking information of the second logical card, the state for updating the on the first chain first logical card is disabling shape State, and allow the information package exchanged to be sent to the second chain the first logical card;
Second chain is verified after the package information for receiving the first chain, and generates the first logical card on the second chain according to package information Information, generate the logical card of third;
It is generated to the logical card of third and its state is set as across chain swap status, the second chain sends the information package of the second logical card To the first chain, four-way card is generated after the package information of the logical card of the first chain verification second;
After the completion of the first chain and the second chain package information exchange, initiation is final mutually for this transaction for the first chain and the second chain After message authentication, the first chain and the second chain receive confirmation message, it is normal for updating the state of four-way card and the logical card of third respectively.
Further, the basic information identification number of the logical card will not change always, the information identity number of the logical card It is currently located on chain and numbers for logical card.
Further, the type in the application information that first chain is sent to the second chain including but not limited to the first logical card is believed Breath, timestamp, expired time, price.
Further, do not pass through if the second chain swaps Requisition Validation, notify the exchange application of the first chain to cancel, and accuse Know the unsanctioned reason of the first chain.
Further, the step of being packaged the information that logical card allows to exchange is comprising following sub-step:
To the permission of the logical card of chain query to be exchanged;
After inquiry passes through, the authorization message of logical card to be exchanged is extracted;
It is packaged the authorization message and public information of logical card to be exchanged;
Message after being packaged to exchange object chain push.
Further, if the permission of the logical card of inquiry does not pass through, chain to be exchanged sends disappearing for push failure to exchange object chain Breath.
Further, when the first chain or the second chain are when the logical card of exchange is broken a contract, the first chain or the second chain will be added into black List.
Further, before the transaction of the logical card of exchange is honoured an agreement completely, the first chain or the second chain can not carry out across chain exchange again Logical card.
Further, when the logical card of the third is exchanged back the first chain again, or, four-way card is exchanged back the second chain again When, original authorization message of the logical card of the third or four-way card can be given for change again.
A kind of computer storage medium, it is described computer-readable comprising the computer-readable program instructions being stored thereon Program instruction is for executing above-mentioned method.
The present invention realizes without the logical card of collection attribute, has the exchange of the logical card of collection attribute can between chain and chain by the agreement To realize seamless interfacing, without third party, collection attribute data when across chain with privacy can be effectively protected, Will not because of the loss or leakage for causing collection attribute across chain tra nsfer, also, after across chain exchange its logical card economic value with across It is equivalent before chain, it by the implementation of this agreement, can thoroughly break the information island between chain and chain, form really across chain life State.
It is to be understood that foregoing general description and following detailed description are both illustrative, and it is intended to In the further explanation of the claimed technology of offer.
Detailed description of the invention
Fig. 1 is the diagram flow chart across the logical card exchange method of chain based on permission according to embodiments of the present invention;
Fig. 2 is the diagram letter for allowing to exchange across the logical card of packing in the logical card exchange method of chain based on permission according to embodiments of the present invention The flow chart of breath.
Specific embodiment
Below with reference to attached drawing, detailed description of the present invention preferred embodiment is further elaborated the present invention.
Firstly, will describe leading to across chain based on permission according to an embodiment of the present invention to demonstrate,prove exchange method in conjunction with Fig. 1.
Fig. 1 is the diagram method flow diagram across the logical card exchange method of chain according to an embodiment of the present invention based on permission.It is logical The basic permission of card includes common data and authorization data, leads to the status indicator of card data, comprising in normal, exchange, disabling three Kind state, is defaulted as normal condition, further, when the logical card of the third is exchanged back the first chain again, or, four-way card is again When being exchanged back the second chain, original authorization message of the logical card of the third or four-way card can be given for change again.In the present embodiment In, leading to the basic information identification number demonstrate,proved will not change always, and the information identity number of logical card is to lead to demonstrate,prove to be currently located on chain to compile Number, therefore, by basic information identification number, system can find the logical card always, and birth is stateful to current institute certainly, when When logical card is exchanged back the chain once existed, the information of privately owned attribute can be resumed.
As shown in Figure 1, the embodiment of the present invention leads to card exchange method across chain based on permission, comprise the following steps:
The state of the logical card of first chain locking first, updates the Status Flag of the first logical card, the described first logical card be the first chain to The logical card of exchange.
First chain sends application information to the second chain, proposes exchange application;In the present embodiment, first chain is to second Including but not limited to type information, the timestamp, expired time, price of the first logical card in the application information that chain is sent.
After second chain receives exchange application, Requisition Validation is swapped, if notifying first if Requisition Validation does not pass through Chain exchange application is cancelled, and informs the unsanctioned reason of the first chain;After if exchange Requisition Validation passes through, the second chain active lock the Two-way card, and notify the described second logical card locked to the first chain, the described second logical card is the logical card to be exchanged of the second chain.
After the first chain receives the locking information of the second logical card, the state for updating the on the first chain first logical card is disabling State, and allow the information package exchanged to be sent to the second chain the first logical card;In the present embodiment, as shown in Fig. 2, being packaged The step of information that logical card allows to exchange, is comprising following sub-step: to the permission of the logical card of chain query to be exchanged;If the logical card of inquiry Permission does not pass through, then chain to be exchanged sends push failure news to exchange object chain, after inquiry passes through, extracts logical card to be exchanged Authorization message;It is packaged the authorization message and public information of logical card to be exchanged;Message after being packaged to exchange object chain push.
Second chain is verified after the package information for receiving the first chain, and is generated first on the second chain according to package information The information of logical card generates the logical card of third.
It is generated to the logical card of third and its state is set as across chain swap status, the information package that the second chain leads to card for second It is sent to the first chain, generates four-way card after the package information of the logical card of the first chain verification second;
After the completion of the first chain and the second chain package information exchange, initiation is final mutually for this transaction for the first chain and the second chain After message authentication, the first chain and the second chain receive confirmation message, update respectively four-way card and the logical card of third state be it is normal, It is completed across the logical card exchange of chain.
In the present embodiment, when the first chain or the second chain are when the logical card of exchange is broken a contract, the first chain or the second chain will be by Blacklist is added.Before the transaction of the logical card of exchange is honoured an agreement completely, the first chain or the second chain can not carry out the logical card of across chain exchange again.
By taking across the chain exchange of the logical card of ERC721 (please illustratively this is what logical card) on two public chains as an example, it is assumed that Have on the love of ERC721 type logical card XA, chain B on chain A have the logical card XB, present chain A and chain B of the moon of ERC721 type be intended into Row exchange, but it is not desired to respective across the chain leakage of privately owned attribute data.It can so be carried out by process as shown above across chain Exchange.
Chain A loads across chain exchange plug-in unit, is registered on chain B;
Chain B loads across chain exchange plug-in unit, is registered on chain A;
Chain A after chain B succeeds in registration in respective routing, can carry out the exchange across the logical card of chain;
The logical card of love on chain A initiates across chain exchange;
After the logical card of the moon on chain B receives exchange application, if agreeing to exchange, agreement exchange notice is sent, is handed over into across chain Change of current journey;
The logical card of heart on the logical card of the moon on chain B and chain A obtains authorization message respectively, after really weigh successfully, to common data with Authorization data, which be packaged, is pushed to other side, carries out generating the logical card of shadow on respective public chain after receiving information;
After the logical card (across logical card after chain) of shadow generates, the whole network broadcast is carried out, and notify other side;
After both sides are notified, updating the logical card of respective shadow is state of activation, and disables original logical card.So far, across chain friendship Change completion.
By above across the chain exchange process, the private data of the logical card of the moon and the logical card of love was both protected, had been in turn ensured When the logical card of the moon and the logical card of love are exchanged back a public chain, its authorization data can be retrieved.To guarantee block chain disclose, It is transparent, not modifiable attribute.
As described above, leading to card exchange method across chain based on permission according to an embodiment of the present invention, realize without collection category Property logical card, have the exchange of the logical card of collection attribute, seamless interfacing may be implemented by the agreement, between chain and chain, without the Tripartite, collection attribute data when across chain with privacy can be effectively protected, and will not cause collection because of across chain tra nsfer The loss or leakage of attribute, also, its logical card economic value passes through the reality of this agreement with across equivalent before chain after across chain exchange Row can thoroughly break the information island between chain and chain, form really across chain ecology.
In general, the various example embodiments of the disclosure can in hardware or special circuit, software, firmware, logic, or Implement in any combination thereof.Some aspects can be implemented within hardware, and other aspects can be can be by controller, micro process Implement in the firmware or software that device or other calculating equipment execute.When the various aspects of embodiment of the disclosure are illustrated or described as When block diagram, flow chart or other certain graphical representations of use, it will be understood that box described herein, device, system, techniques or methods Can be used as unrestricted example hardware, software, firmware, special circuit or logic, common hardware or controller or other It calculates and implements in equipment or its certain combination.
As an example, general processor, digital signal processor (DSP), specific integrated circuit (ASIC), scene can be used Programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components or use Various illustrative logics described in the disclosure are combined in any combination for executing function as described herein to realize or execute Block, module and circuit.General processor can be microprocessor, alternatively, processor is also possible to any common processor, control Device, microcontroller or state machine processed.Processor also can be implemented as calculating the combination of equipment, for example, DSP and microprocessor Combination, the combination or any other such structure of multi-microprocessor, one or more microprocessors and DSP core.
As an example, embodiment of the disclosure can be described in the context of machine-executable instruction, machine can be held Row instruction such as includes in the program module executed in the device on the true or virtual processor of target.In general, Program module includes routine, program, library, object, class, component, data structure etc., executes specific task or realizes specific Abstract data structure.In embodiments, the function of program module can merge between described program module or Segmentation.Machine-executable instruction for program module can execute in local or distributed apparatus.In distributed apparatus In, program module can be located locally in remote medium storage the two.
The computer program code of method used to implement the present disclosure can be write with one or more programming languages.These Computer program code can be supplied to the processing of general purpose computer, special purpose computer or other programmable data processing units Device so that program code when being executed by computer or other programmable data processing units, cause flow chart and/ Or function/operation specified in block diagram is carried out.Program code can completely on computers, part on computers, conduct Independent software package, part are on computers and part is held on a remote computer or server on the remote computer or completely Row.
In the context of the disclosure, computer storage medium can be include or storage be used for or about instruction execution Any tangible medium of the program of system, device or equipment.Computer storage medium can be machine-readable signal medium or machine Device readable storage medium storing program for executing.Computer storage medium can include but is not limited to electronics, magnetic, it is optical, electromagnetism, infrared Or semiconductor system, device or equipment or its any appropriate combination.The more detailed example of machine readable storage medium includes band There are electrical connection, the portable computer diskette, hard disk, random access memories (RAM), read-only storage of one or more conducting wire Device (ROM), Erasable Programmable Read Only Memory EPROM (EPROM or flash memory), light storage device, magnetic storage apparatus or its any conjunction Suitable combination.
In addition, this simultaneously should not be understood although the Dynamic Program Slicing method of the embodiment of the present invention is depicted with particular order To require this generic operation with the particular order that shows or complete with sequential order, or the operation of all diagrams is executed to obtain the phase Hope result.In some cases, multitask or parallel processing can be beneficial.Similarly, although it is discussed above contain it is certain Specific implementation detail, but this and should not be construed as limiting any invention or the scope of the claims, and should be interpreted that can be with For the description of the specific embodiment of specific invention.Certain spies described in the context of separated embodiment in this specification Sign can also be with combined implementation in a single embodiment.Conversely, the various features described in the context of single embodiment can also Discretely to implement in multiple embodiments or in any suitable sub-portfolio.
It should be noted that in the present specification, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.
Although with specific to the language description of structural features and or methods of action theme, but it is to be understood that institute The theme limited in attached claim is not limited to above-described special characteristic or movement.On the contrary, above-described specific spy Movement of seeking peace is disclosed as the exemplary forms for realizing claim.

Claims (10)

1. a kind of lead to card exchange method across chain based on permission, the basic permission of the logical card includes common data and authorization number According to, the status indicator of the logical card data, comprising in normal, exchange, three kinds of states of disabling, be defaulted as normal condition, feature It is, comprises the following steps:
The state of the logical card of first chain locking first, updates the Status Flag of the first logical card, the described first logical card be the first chain to The logical card of exchange;
First chain sends application information to the second chain, proposes exchange application;
After second chain receives exchange application, Requisition Validation is swapped, after exchange Requisition Validation passes through, the second chain active lock the Two-way card, and notify the described second logical card locked to the first chain, the described second logical card is the logical card to be exchanged of the second chain;
After the first chain receives the locking information of the second logical card, the state for updating the on the first chain first logical card is disabling shape State, and allow the information package exchanged to be sent to the second chain the first logical card;
Second chain is verified after the package information for receiving the first chain, and generates the first logical card on the second chain according to package information Information, generate the logical card of third;
It is generated to the logical card of third and its state is set as across chain swap status, the second chain sends the information package of the second logical card To the first chain, four-way card is generated after the package information of the logical card of the first chain verification second;
After the completion of the first chain and the second chain package information exchange, initiation is final mutually for this transaction for the first chain and the second chain After message authentication, the first chain and the second chain receive confirmation message, it is normal for updating the state of four-way card and the logical card of third respectively.
2. leading to card exchange method across chain based on permission as described in claim 1, which is characterized in that the basis letter of the logical card Breath identification number will not change always, and the information identity number of the logical card is to lead to demonstrate,prove to be currently located on chain to number.
3. as described in claim 1 based on permission across the logical card exchange method of chain, which is characterized in that first chain is to second Including but not limited to type information, the timestamp, expired time, price of the first logical card in the application information that chain is sent.
4. leading to card exchange method across chain based on permission as described in claim 1, which is characterized in that the second chain swaps Shen If PLSCONFM does not pass through, the exchange application of the first chain is notified to cancel, and inform the unsanctioned reason of the first chain.
5. leading to card exchange method across chain based on permission as described in claim 1, which is characterized in that being packaged logical card allows to exchange Information the step of include following sub-step:
To the permission of the logical card of chain query to be exchanged;
After inquiry passes through, the authorization message of logical card to be exchanged is extracted;
It is packaged the authorization message and public information of logical card to be exchanged;
Message after being packaged to exchange object chain push.
6. leading to card exchange method across chain based on permission as claimed in claim 5, which is characterized in that if the permission of the logical card of inquiry Do not pass through, then chain to be exchanged sends push failure news to exchange object chain.
7. leading to card exchange method across chain based on permission as described in claim 1, which is characterized in that when the first chain or the second chain When the logical card of exchange is broken a contract, the first chain or the second chain will be added into blacklist.
8. leading to card exchange method across chain based on permission as claimed in claim 7, which is characterized in that in the transaction of the logical card of exchange Before honouring an agreement completely, the first chain or the second chain can not carry out the logical card of across chain exchange again.
9. leading to card exchange method across chain based on permission as described in claim 1, which is characterized in that when the logical card weight of the third The first chain is newly exchanged back, or, four-way card is when exchange back the second chain again, the third is logical to be demonstrate,proved or that four-way is demonstrate,proved is original Authorization message can be given for change again.
10. a kind of computer storage medium, which is characterized in that described comprising the computer-readable program instructions being stored thereon Computer-readable program instructions are for executing method described in -9 according to claim 1.
CN201811227211.3A 2018-10-22 2018-10-22 Cross-link certificate exchange method based on authority and computer readable medium Active CN109391619B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811227211.3A CN109391619B (en) 2018-10-22 2018-10-22 Cross-link certificate exchange method based on authority and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811227211.3A CN109391619B (en) 2018-10-22 2018-10-22 Cross-link certificate exchange method based on authority and computer readable medium

Publications (2)

Publication Number Publication Date
CN109391619A true CN109391619A (en) 2019-02-26
CN109391619B CN109391619B (en) 2021-08-03

Family

ID=65427511

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811227211.3A Active CN109391619B (en) 2018-10-22 2018-10-22 Cross-link certificate exchange method based on authority and computer readable medium

Country Status (1)

Country Link
CN (1) CN109391619B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084594A (en) * 2019-04-01 2019-08-02 杜晓楠 A kind of block chain method of commerce and device by lightning network
CN111159293A (en) * 2019-12-25 2020-05-15 杭州加密矩阵科技有限公司 Cross-link information verification method based on light node technology
CN111476570A (en) * 2020-04-02 2020-07-31 致信互链(北京)科技有限公司 Method, device and equipment for migrating general certificates and storage medium
CN112287029A (en) * 2020-11-17 2021-01-29 北京物资学院 Block chain multi-chain cross-chain system and implementation mechanism thereof
CN112632164A (en) * 2020-12-21 2021-04-09 杭州云象网络技术有限公司 Universal cross-chain programming interface method for realizing trusted authority access
CN113763178A (en) * 2021-09-24 2021-12-07 成都质数斯达克科技有限公司 Multi-block chain cross-chain transaction method, device, equipment and readable storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
US20160358161A1 (en) * 2015-06-05 2016-12-08 Peertracks Inc. Systems and methods for an online music marketplace
WO2016202952A1 (en) * 2015-06-16 2016-12-22 The Provost, Fellows, Foundation Scholars, & The Other Members Of Board, Of The College Of The Holy & Undiv. Trinity Of Queen Elizabeth, Near Dublin Digital token exchange system
CN107464106A (en) * 2017-07-25 2017-12-12 北京果仁宝科技有限公司 The method and system merchandised between block chain main chain and side chain
CN107679857A (en) * 2017-10-10 2018-02-09 马晶瑶 Across the chain method of commerce and storage medium of block chain
CN107742210A (en) * 2017-10-13 2018-02-27 布比(北京)网络技术有限公司 Across the chain fund transfer system and method for a kind of different blocks interchain
CN108197944A (en) * 2017-11-22 2018-06-22 远光软件股份有限公司 Resource transaction method and device based on block chain technology
US20180198617A1 (en) * 2016-08-12 2018-07-12 Sylvio Herve Drouin System and method for digital token exchange and delivery
CN108364173A (en) * 2018-02-14 2018-08-03 北京三六五八网络科技有限公司 Digital asset processing method and processing device for electric business platform
CN108389047A (en) * 2018-02-12 2018-08-10 深圳沃链科技有限公司 The method and block chain network of fundamental chain and subchain transaction in block chain
WO2018189656A1 (en) * 2017-04-11 2018-10-18 nChain Holdings Limited Secure re-use of private key for dynamic group of nodes

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160358161A1 (en) * 2015-06-05 2016-12-08 Peertracks Inc. Systems and methods for an online music marketplace
WO2016202952A1 (en) * 2015-06-16 2016-12-22 The Provost, Fellows, Foundation Scholars, & The Other Members Of Board, Of The College Of The Holy & Undiv. Trinity Of Queen Elizabeth, Near Dublin Digital token exchange system
CN105719185A (en) * 2016-01-22 2016-06-29 杭州复杂美科技有限公司 Block chain data comparison and consensus method
US20180198617A1 (en) * 2016-08-12 2018-07-12 Sylvio Herve Drouin System and method for digital token exchange and delivery
WO2018189656A1 (en) * 2017-04-11 2018-10-18 nChain Holdings Limited Secure re-use of private key for dynamic group of nodes
CN107464106A (en) * 2017-07-25 2017-12-12 北京果仁宝科技有限公司 The method and system merchandised between block chain main chain and side chain
CN107679857A (en) * 2017-10-10 2018-02-09 马晶瑶 Across the chain method of commerce and storage medium of block chain
CN107742210A (en) * 2017-10-13 2018-02-27 布比(北京)网络技术有限公司 Across the chain fund transfer system and method for a kind of different blocks interchain
CN108197944A (en) * 2017-11-22 2018-06-22 远光软件股份有限公司 Resource transaction method and device based on block chain technology
CN108389047A (en) * 2018-02-12 2018-08-10 深圳沃链科技有限公司 The method and block chain network of fundamental chain and subchain transaction in block chain
CN108364173A (en) * 2018-02-14 2018-08-03 北京三六五八网络科技有限公司 Digital asset processing method and processing device for electric business platform

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084594A (en) * 2019-04-01 2019-08-02 杜晓楠 A kind of block chain method of commerce and device by lightning network
CN111159293A (en) * 2019-12-25 2020-05-15 杭州加密矩阵科技有限公司 Cross-link information verification method based on light node technology
CN111159293B (en) * 2019-12-25 2023-06-20 杭州加密矩阵科技有限公司 Cross-chain information verification method based on light node technology
CN111476570A (en) * 2020-04-02 2020-07-31 致信互链(北京)科技有限公司 Method, device and equipment for migrating general certificates and storage medium
CN111476570B (en) * 2020-04-02 2024-01-26 致信互链(北京)科技有限公司 Method, device, equipment and storage medium for migrating pass
CN112287029A (en) * 2020-11-17 2021-01-29 北京物资学院 Block chain multi-chain cross-chain system and implementation mechanism thereof
CN112287029B (en) * 2020-11-17 2023-05-16 北京物资学院 Block chain multi-chain cross-chain system and implementation mechanism thereof
CN112632164A (en) * 2020-12-21 2021-04-09 杭州云象网络技术有限公司 Universal cross-chain programming interface method for realizing trusted authority access
CN112632164B (en) * 2020-12-21 2022-09-13 杭州云象网络技术有限公司 Universal cross-chain programming interface method for realizing trusted authority access
CN113763178A (en) * 2021-09-24 2021-12-07 成都质数斯达克科技有限公司 Multi-block chain cross-chain transaction method, device, equipment and readable storage medium

Also Published As

Publication number Publication date
CN109391619B (en) 2021-08-03

Similar Documents

Publication Publication Date Title
CN109391619A (en) Lead to card exchange method and computer-readable medium across chain based on permission
Syed et al. A comparative analysis of blockchain architecture and its applications: Problems and recommendations
Marbouh et al. Blockchain for COVID-19: review, opportunities, and a trusted tracking system
CN110245506B (en) Intelligent contract management method and device based on block chain and electronic equipment
US20210166193A1 (en) Block chain-based claim settlement method and apparatus
Xu et al. Artificial intelligence for securing IoT services in edge computing: a survey
CN110392888A (en) For executing the method and system of intelligent contract in security context
CN111324446A (en) Multi-access edge computing node and method for deploying distributed accounting application
CN110245947B (en) Receipt storage method and node combining conditional restrictions of transaction and user types
CN103268460A (en) Integrity verification method of cloud storage data
JP2021533638A (en) Node group management device and computing device that make up the double signature transaction structure of the group key infrastructure on the blockchain network
WO2021023304A1 (en) Fork processing method and blockchain node
CN112804354B (en) Method and device for data transmission across chains, computer equipment and storage medium
WO2021204044A1 (en) Correction of blockchain data
CN110147684A (en) For realizing the method and apparatus of block chain data-privacy protection
CN110135993B (en) Method, equipment and storage medium for adapting UTXO model to intelligent contract account model
CN111770112B (en) Information sharing method, device and equipment
CN110754072A (en) Managing housing scores using intelligent contracts in a blockchain network
US20190044735A1 (en) Method for managing the validation of messages relating to a message chain individually via a decentralised validation network
CN110505311A (en) A kind of across the chain exchange method of isomorphism block chain and system
JP2022525551A (en) Preventing erroneous transmission of copies of data records to distributed ledger systems
CN109472151A (en) A kind of method and server of data access
US20210150058A1 (en) Control method, server, recording medium, and data structure
KR20210109767A (en) A method for providing asset backup services based on blockchain monitoring
CN115632774A (en) Threshold signature-based distributed type language prediction machine implementation method and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210301

Address after: 201199 5th and 6th floor, 380 Xinsong Road, Minhang District, Shanghai

Applicant after: Shanghai Youyuan Network Technology Co., Ltd

Address before: 201106 room 312, No.1 Lane 666, Shenhong Road, Minhang District, Shanghai

Applicant before: MEILAI NETWORK TECHNOLOGY (SHANGHAI) Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant