CN109391619A - Lead to card exchange method and computer-readable medium across chain based on permission - Google Patents
Lead to card exchange method and computer-readable medium across chain based on permission Download PDFInfo
- Publication number
- CN109391619A CN109391619A CN201811227211.3A CN201811227211A CN109391619A CN 109391619 A CN109391619 A CN 109391619A CN 201811227211 A CN201811227211 A CN 201811227211A CN 109391619 A CN109391619 A CN 109391619A
- Authority
- CN
- China
- Prior art keywords
- chain
- card
- logical card
- exchange
- logical
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/12—Applying verification of the received information
- H04L63/123—Applying verification of the received information received data contents, e.g. message integrity
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Business, Economics & Management (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
The present invention provides a kind of to lead to card exchange method across chain based on permission, and comprise the following steps: the first chain updates the Status Flag of the first logical card;First chain proposes exchange application to the second chain;The logical card of second chain active lock second;First logical card is allowed the information package exchanged to be sent to the second chain by the first chain;Second chain verifies package information and generates the information of the first logical card on the second chain, generates the logical card of third;It is generated to the logical card of third and its state is set as across chain swap status, the information package of the second logical card is sent to the first chain by the second chain, and the first chain generates four-way card;It is normal that first chain and the second chain update four-way card and the state of the logical card of third respectively.The present invention does not have to across the logical card exchange of chain by third party, without by side chain or other way.In the case where guaranteeing authorization data privacy, perfection completes the logical card transfer of across chain data.
Description
Technical field
It is the present invention relates to information technology field, in particular to a kind of that card exchange method and computer are led to across chain based on permission
Readable medium.
Background technique
With the continuous development of block chain technology, block chain ecology early has disengaged from the mode of single-stranded information island, shape at present
At an ecological environment of more economy multichains.Constantly there is new chain to be born, being exchanged between chain and chain urgently solves
Matter of utmost importance certainly.
Currently, the way across chain exchange is broadly divided into three classes, but all there are various defects, be summarized as follows:
1, in notary's mode, trusted one or one group of group notary's mode (Notary Schemes): are used
Certain event has occurred on chain X statement chain Y, or determines that the statement is correct.These groups both can automatically monitor and
Response events can also carry out monitoring and response events when requested.Notary's mode license divide account field by
Many concerns because it can both provide the main competitor flexibly to know together, without carry out expensive work prove or about
The complicated proof of interests mechanism.But notary's mode disadvantage is it is also obvious that notary's mode needs the notarial confirmation in many places,
Notary is third party, privileged institutions, it is easy to as that ring most weak in trust link in whole system.
2, side chain (Sidechains)/relaying (Relays): if the institute that a chain B can possess another chain A is active
Can, then chain B is referred to as the side chain of chain A, and chain A is the main chain of chain B.Wherein main chain A is not aware that the presence of side chain B, and side chain B knows have
The presence of main chain A.Assuming that block chain possesses block Header and Body, Merkle etc. is possessed in Header proves information, can be with
The block chain head of chain A is written in the block of chain B, chain B uses the common recognition verification method as chain A, such as PoW validation difficulty
And length, PBFT verifying ballot etc..After the block header sequence for waiting chain A, chain B can pass through the permit of Merkle branch
Cease the data and operation to prove chain A.Chain A, B cannot directly verify the state to square, because will form circulation, but phase in this way
Mutually only comprising light node be it is feasible, this block chain verifying logic can by chain agreement itself or application contract realize.Core
Heart code needs to exist simultaneously after on two chains of/side chain mode in use, but needs the logical card or object on two chains simultaneously
Can endless distribution, can just guarantee that verification process does not have mistake in this way, thus come reach assets transfer operation.
3, Hash locking (Hash-locking): the design of Hash locking mode is desirable to as few as possible between chain A and chain B
Understanding each other, and as eliminate notary trust means.Hash locking originates from bit coin lightning network, lightning network sheet
Body is a kind of means of the rapid payment of small amount, later it the key technology Hash time it is sealed be about applied to it is technical across chain
Come.Although Hash locking realizes the exchange across chain assets, it is not carried out the transfer across chain assets, is less able to achieve this
Across chain contract, so its application scenarios are relatively limited.
In conclusion across chain exchange there is no specific, unified exchange standard.Further, it is seen that above various across chain
Method there is no across the chain exchange method for the logical card of collection attribute both for the logical card of no collection attribute.
Summary of the invention
According to embodiments of the present invention, provide it is a kind of based on permission across the logical card exchange method of chain, the basis of the logical card
Permission includes common data and authorization data, the status indicator of the logical card data, comprising in normal, exchange, three kinds of shapes of disabling
State is defaulted as normal condition, comprises the following steps:
The state of the logical card of first chain locking first, updates the Status Flag of the first logical card, the described first logical card be the first chain to
The logical card of exchange;
First chain sends application information to the second chain, proposes exchange application;
After second chain receives exchange application, Requisition Validation is swapped, after exchange Requisition Validation passes through, the second chain active lock the
Two-way card, and notify the described second logical card locked to the first chain, the described second logical card is the logical card to be exchanged of the second chain;
After the first chain receives the locking information of the second logical card, the state for updating the on the first chain first logical card is disabling shape
State, and allow the information package exchanged to be sent to the second chain the first logical card;
Second chain is verified after the package information for receiving the first chain, and generates the first logical card on the second chain according to package information
Information, generate the logical card of third;
It is generated to the logical card of third and its state is set as across chain swap status, the second chain sends the information package of the second logical card
To the first chain, four-way card is generated after the package information of the logical card of the first chain verification second;
After the completion of the first chain and the second chain package information exchange, initiation is final mutually for this transaction for the first chain and the second chain
After message authentication, the first chain and the second chain receive confirmation message, it is normal for updating the state of four-way card and the logical card of third respectively.
Further, the basic information identification number of the logical card will not change always, the information identity number of the logical card
It is currently located on chain and numbers for logical card.
Further, the type in the application information that first chain is sent to the second chain including but not limited to the first logical card is believed
Breath, timestamp, expired time, price.
Further, do not pass through if the second chain swaps Requisition Validation, notify the exchange application of the first chain to cancel, and accuse
Know the unsanctioned reason of the first chain.
Further, the step of being packaged the information that logical card allows to exchange is comprising following sub-step:
To the permission of the logical card of chain query to be exchanged;
After inquiry passes through, the authorization message of logical card to be exchanged is extracted;
It is packaged the authorization message and public information of logical card to be exchanged;
Message after being packaged to exchange object chain push.
Further, if the permission of the logical card of inquiry does not pass through, chain to be exchanged sends disappearing for push failure to exchange object chain
Breath.
Further, when the first chain or the second chain are when the logical card of exchange is broken a contract, the first chain or the second chain will be added into black
List.
Further, before the transaction of the logical card of exchange is honoured an agreement completely, the first chain or the second chain can not carry out across chain exchange again
Logical card.
Further, when the logical card of the third is exchanged back the first chain again, or, four-way card is exchanged back the second chain again
When, original authorization message of the logical card of the third or four-way card can be given for change again.
A kind of computer storage medium, it is described computer-readable comprising the computer-readable program instructions being stored thereon
Program instruction is for executing above-mentioned method.
The present invention realizes without the logical card of collection attribute, has the exchange of the logical card of collection attribute can between chain and chain by the agreement
To realize seamless interfacing, without third party, collection attribute data when across chain with privacy can be effectively protected,
Will not because of the loss or leakage for causing collection attribute across chain tra nsfer, also, after across chain exchange its logical card economic value with across
It is equivalent before chain, it by the implementation of this agreement, can thoroughly break the information island between chain and chain, form really across chain life
State.
It is to be understood that foregoing general description and following detailed description are both illustrative, and it is intended to
In the further explanation of the claimed technology of offer.
Detailed description of the invention
Fig. 1 is the diagram flow chart across the logical card exchange method of chain based on permission according to embodiments of the present invention;
Fig. 2 is the diagram letter for allowing to exchange across the logical card of packing in the logical card exchange method of chain based on permission according to embodiments of the present invention
The flow chart of breath.
Specific embodiment
Below with reference to attached drawing, detailed description of the present invention preferred embodiment is further elaborated the present invention.
Firstly, will describe leading to across chain based on permission according to an embodiment of the present invention to demonstrate,prove exchange method in conjunction with Fig. 1.
Fig. 1 is the diagram method flow diagram across the logical card exchange method of chain according to an embodiment of the present invention based on permission.It is logical
The basic permission of card includes common data and authorization data, leads to the status indicator of card data, comprising in normal, exchange, disabling three
Kind state, is defaulted as normal condition, further, when the logical card of the third is exchanged back the first chain again, or, four-way card is again
When being exchanged back the second chain, original authorization message of the logical card of the third or four-way card can be given for change again.In the present embodiment
In, leading to the basic information identification number demonstrate,proved will not change always, and the information identity number of logical card is to lead to demonstrate,prove to be currently located on chain to compile
Number, therefore, by basic information identification number, system can find the logical card always, and birth is stateful to current institute certainly, when
When logical card is exchanged back the chain once existed, the information of privately owned attribute can be resumed.
As shown in Figure 1, the embodiment of the present invention leads to card exchange method across chain based on permission, comprise the following steps:
The state of the logical card of first chain locking first, updates the Status Flag of the first logical card, the described first logical card be the first chain to
The logical card of exchange.
First chain sends application information to the second chain, proposes exchange application;In the present embodiment, first chain is to second
Including but not limited to type information, the timestamp, expired time, price of the first logical card in the application information that chain is sent.
After second chain receives exchange application, Requisition Validation is swapped, if notifying first if Requisition Validation does not pass through
Chain exchange application is cancelled, and informs the unsanctioned reason of the first chain;After if exchange Requisition Validation passes through, the second chain active lock the
Two-way card, and notify the described second logical card locked to the first chain, the described second logical card is the logical card to be exchanged of the second chain.
After the first chain receives the locking information of the second logical card, the state for updating the on the first chain first logical card is disabling
State, and allow the information package exchanged to be sent to the second chain the first logical card;In the present embodiment, as shown in Fig. 2, being packaged
The step of information that logical card allows to exchange, is comprising following sub-step: to the permission of the logical card of chain query to be exchanged;If the logical card of inquiry
Permission does not pass through, then chain to be exchanged sends push failure news to exchange object chain, after inquiry passes through, extracts logical card to be exchanged
Authorization message;It is packaged the authorization message and public information of logical card to be exchanged;Message after being packaged to exchange object chain push.
Second chain is verified after the package information for receiving the first chain, and is generated first on the second chain according to package information
The information of logical card generates the logical card of third.
It is generated to the logical card of third and its state is set as across chain swap status, the information package that the second chain leads to card for second
It is sent to the first chain, generates four-way card after the package information of the logical card of the first chain verification second;
After the completion of the first chain and the second chain package information exchange, initiation is final mutually for this transaction for the first chain and the second chain
After message authentication, the first chain and the second chain receive confirmation message, update respectively four-way card and the logical card of third state be it is normal,
It is completed across the logical card exchange of chain.
In the present embodiment, when the first chain or the second chain are when the logical card of exchange is broken a contract, the first chain or the second chain will be by
Blacklist is added.Before the transaction of the logical card of exchange is honoured an agreement completely, the first chain or the second chain can not carry out the logical card of across chain exchange again.
By taking across the chain exchange of the logical card of ERC721 (please illustratively this is what logical card) on two public chains as an example, it is assumed that
Have on the love of ERC721 type logical card XA, chain B on chain A have the logical card XB, present chain A and chain B of the moon of ERC721 type be intended into
Row exchange, but it is not desired to respective across the chain leakage of privately owned attribute data.It can so be carried out by process as shown above across chain
Exchange.
Chain A loads across chain exchange plug-in unit, is registered on chain B;
Chain B loads across chain exchange plug-in unit, is registered on chain A;
Chain A after chain B succeeds in registration in respective routing, can carry out the exchange across the logical card of chain;
The logical card of love on chain A initiates across chain exchange;
After the logical card of the moon on chain B receives exchange application, if agreeing to exchange, agreement exchange notice is sent, is handed over into across chain
Change of current journey;
The logical card of heart on the logical card of the moon on chain B and chain A obtains authorization message respectively, after really weigh successfully, to common data with
Authorization data, which be packaged, is pushed to other side, carries out generating the logical card of shadow on respective public chain after receiving information;
After the logical card (across logical card after chain) of shadow generates, the whole network broadcast is carried out, and notify other side;
After both sides are notified, updating the logical card of respective shadow is state of activation, and disables original logical card.So far, across chain friendship
Change completion.
By above across the chain exchange process, the private data of the logical card of the moon and the logical card of love was both protected, had been in turn ensured
When the logical card of the moon and the logical card of love are exchanged back a public chain, its authorization data can be retrieved.To guarantee block chain disclose,
It is transparent, not modifiable attribute.
As described above, leading to card exchange method across chain based on permission according to an embodiment of the present invention, realize without collection category
Property logical card, have the exchange of the logical card of collection attribute, seamless interfacing may be implemented by the agreement, between chain and chain, without the
Tripartite, collection attribute data when across chain with privacy can be effectively protected, and will not cause collection because of across chain tra nsfer
The loss or leakage of attribute, also, its logical card economic value passes through the reality of this agreement with across equivalent before chain after across chain exchange
Row can thoroughly break the information island between chain and chain, form really across chain ecology.
In general, the various example embodiments of the disclosure can in hardware or special circuit, software, firmware, logic, or
Implement in any combination thereof.Some aspects can be implemented within hardware, and other aspects can be can be by controller, micro process
Implement in the firmware or software that device or other calculating equipment execute.When the various aspects of embodiment of the disclosure are illustrated or described as
When block diagram, flow chart or other certain graphical representations of use, it will be understood that box described herein, device, system, techniques or methods
Can be used as unrestricted example hardware, software, firmware, special circuit or logic, common hardware or controller or other
It calculates and implements in equipment or its certain combination.
As an example, general processor, digital signal processor (DSP), specific integrated circuit (ASIC), scene can be used
Programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components or use
Various illustrative logics described in the disclosure are combined in any combination for executing function as described herein to realize or execute
Block, module and circuit.General processor can be microprocessor, alternatively, processor is also possible to any common processor, control
Device, microcontroller or state machine processed.Processor also can be implemented as calculating the combination of equipment, for example, DSP and microprocessor
Combination, the combination or any other such structure of multi-microprocessor, one or more microprocessors and DSP core.
As an example, embodiment of the disclosure can be described in the context of machine-executable instruction, machine can be held
Row instruction such as includes in the program module executed in the device on the true or virtual processor of target.In general,
Program module includes routine, program, library, object, class, component, data structure etc., executes specific task or realizes specific
Abstract data structure.In embodiments, the function of program module can merge between described program module or
Segmentation.Machine-executable instruction for program module can execute in local or distributed apparatus.In distributed apparatus
In, program module can be located locally in remote medium storage the two.
The computer program code of method used to implement the present disclosure can be write with one or more programming languages.These
Computer program code can be supplied to the processing of general purpose computer, special purpose computer or other programmable data processing units
Device so that program code when being executed by computer or other programmable data processing units, cause flow chart and/
Or function/operation specified in block diagram is carried out.Program code can completely on computers, part on computers, conduct
Independent software package, part are on computers and part is held on a remote computer or server on the remote computer or completely
Row.
In the context of the disclosure, computer storage medium can be include or storage be used for or about instruction execution
Any tangible medium of the program of system, device or equipment.Computer storage medium can be machine-readable signal medium or machine
Device readable storage medium storing program for executing.Computer storage medium can include but is not limited to electronics, magnetic, it is optical, electromagnetism, infrared
Or semiconductor system, device or equipment or its any appropriate combination.The more detailed example of machine readable storage medium includes band
There are electrical connection, the portable computer diskette, hard disk, random access memories (RAM), read-only storage of one or more conducting wire
Device (ROM), Erasable Programmable Read Only Memory EPROM (EPROM or flash memory), light storage device, magnetic storage apparatus or its any conjunction
Suitable combination.
In addition, this simultaneously should not be understood although the Dynamic Program Slicing method of the embodiment of the present invention is depicted with particular order
To require this generic operation with the particular order that shows or complete with sequential order, or the operation of all diagrams is executed to obtain the phase
Hope result.In some cases, multitask or parallel processing can be beneficial.Similarly, although it is discussed above contain it is certain
Specific implementation detail, but this and should not be construed as limiting any invention or the scope of the claims, and should be interpreted that can be with
For the description of the specific embodiment of specific invention.Certain spies described in the context of separated embodiment in this specification
Sign can also be with combined implementation in a single embodiment.Conversely, the various features described in the context of single embodiment can also
Discretely to implement in multiple embodiments or in any suitable sub-portfolio.
It should be noted that in the present specification, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
Although with specific to the language description of structural features and or methods of action theme, but it is to be understood that institute
The theme limited in attached claim is not limited to above-described special characteristic or movement.On the contrary, above-described specific spy
Movement of seeking peace is disclosed as the exemplary forms for realizing claim.
Claims (10)
1. a kind of lead to card exchange method across chain based on permission, the basic permission of the logical card includes common data and authorization number
According to, the status indicator of the logical card data, comprising in normal, exchange, three kinds of states of disabling, be defaulted as normal condition, feature
It is, comprises the following steps:
The state of the logical card of first chain locking first, updates the Status Flag of the first logical card, the described first logical card be the first chain to
The logical card of exchange;
First chain sends application information to the second chain, proposes exchange application;
After second chain receives exchange application, Requisition Validation is swapped, after exchange Requisition Validation passes through, the second chain active lock the
Two-way card, and notify the described second logical card locked to the first chain, the described second logical card is the logical card to be exchanged of the second chain;
After the first chain receives the locking information of the second logical card, the state for updating the on the first chain first logical card is disabling shape
State, and allow the information package exchanged to be sent to the second chain the first logical card;
Second chain is verified after the package information for receiving the first chain, and generates the first logical card on the second chain according to package information
Information, generate the logical card of third;
It is generated to the logical card of third and its state is set as across chain swap status, the second chain sends the information package of the second logical card
To the first chain, four-way card is generated after the package information of the logical card of the first chain verification second;
After the completion of the first chain and the second chain package information exchange, initiation is final mutually for this transaction for the first chain and the second chain
After message authentication, the first chain and the second chain receive confirmation message, it is normal for updating the state of four-way card and the logical card of third respectively.
2. leading to card exchange method across chain based on permission as described in claim 1, which is characterized in that the basis letter of the logical card
Breath identification number will not change always, and the information identity number of the logical card is to lead to demonstrate,prove to be currently located on chain to number.
3. as described in claim 1 based on permission across the logical card exchange method of chain, which is characterized in that first chain is to second
Including but not limited to type information, the timestamp, expired time, price of the first logical card in the application information that chain is sent.
4. leading to card exchange method across chain based on permission as described in claim 1, which is characterized in that the second chain swaps Shen
If PLSCONFM does not pass through, the exchange application of the first chain is notified to cancel, and inform the unsanctioned reason of the first chain.
5. leading to card exchange method across chain based on permission as described in claim 1, which is characterized in that being packaged logical card allows to exchange
Information the step of include following sub-step:
To the permission of the logical card of chain query to be exchanged;
After inquiry passes through, the authorization message of logical card to be exchanged is extracted;
It is packaged the authorization message and public information of logical card to be exchanged;
Message after being packaged to exchange object chain push.
6. leading to card exchange method across chain based on permission as claimed in claim 5, which is characterized in that if the permission of the logical card of inquiry
Do not pass through, then chain to be exchanged sends push failure news to exchange object chain.
7. leading to card exchange method across chain based on permission as described in claim 1, which is characterized in that when the first chain or the second chain
When the logical card of exchange is broken a contract, the first chain or the second chain will be added into blacklist.
8. leading to card exchange method across chain based on permission as claimed in claim 7, which is characterized in that in the transaction of the logical card of exchange
Before honouring an agreement completely, the first chain or the second chain can not carry out the logical card of across chain exchange again.
9. leading to card exchange method across chain based on permission as described in claim 1, which is characterized in that when the logical card weight of the third
The first chain is newly exchanged back, or, four-way card is when exchange back the second chain again, the third is logical to be demonstrate,proved or that four-way is demonstrate,proved is original
Authorization message can be given for change again.
10. a kind of computer storage medium, which is characterized in that described comprising the computer-readable program instructions being stored thereon
Computer-readable program instructions are for executing method described in -9 according to claim 1.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811227211.3A CN109391619B (en) | 2018-10-22 | 2018-10-22 | Cross-link certificate exchange method based on authority and computer readable medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811227211.3A CN109391619B (en) | 2018-10-22 | 2018-10-22 | Cross-link certificate exchange method based on authority and computer readable medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN109391619A true CN109391619A (en) | 2019-02-26 |
CN109391619B CN109391619B (en) | 2021-08-03 |
Family
ID=65427511
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811227211.3A Active CN109391619B (en) | 2018-10-22 | 2018-10-22 | Cross-link certificate exchange method based on authority and computer readable medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109391619B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110084594A (en) * | 2019-04-01 | 2019-08-02 | 杜晓楠 | A kind of block chain method of commerce and device by lightning network |
CN111159293A (en) * | 2019-12-25 | 2020-05-15 | 杭州加密矩阵科技有限公司 | Cross-link information verification method based on light node technology |
CN111476570A (en) * | 2020-04-02 | 2020-07-31 | 致信互链(北京)科技有限公司 | Method, device and equipment for migrating general certificates and storage medium |
CN112287029A (en) * | 2020-11-17 | 2021-01-29 | 北京物资学院 | Block chain multi-chain cross-chain system and implementation mechanism thereof |
CN112632164A (en) * | 2020-12-21 | 2021-04-09 | 杭州云象网络技术有限公司 | Universal cross-chain programming interface method for realizing trusted authority access |
CN113763178A (en) * | 2021-09-24 | 2021-12-07 | 成都质数斯达克科技有限公司 | Multi-block chain cross-chain transaction method, device, equipment and readable storage medium |
Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105719185A (en) * | 2016-01-22 | 2016-06-29 | 杭州复杂美科技有限公司 | Block chain data comparison and consensus method |
US20160358161A1 (en) * | 2015-06-05 | 2016-12-08 | Peertracks Inc. | Systems and methods for an online music marketplace |
WO2016202952A1 (en) * | 2015-06-16 | 2016-12-22 | The Provost, Fellows, Foundation Scholars, & The Other Members Of Board, Of The College Of The Holy & Undiv. Trinity Of Queen Elizabeth, Near Dublin | Digital token exchange system |
CN107464106A (en) * | 2017-07-25 | 2017-12-12 | 北京果仁宝科技有限公司 | The method and system merchandised between block chain main chain and side chain |
CN107679857A (en) * | 2017-10-10 | 2018-02-09 | 马晶瑶 | Across the chain method of commerce and storage medium of block chain |
CN107742210A (en) * | 2017-10-13 | 2018-02-27 | 布比(北京)网络技术有限公司 | Across the chain fund transfer system and method for a kind of different blocks interchain |
CN108197944A (en) * | 2017-11-22 | 2018-06-22 | 远光软件股份有限公司 | Resource transaction method and device based on block chain technology |
US20180198617A1 (en) * | 2016-08-12 | 2018-07-12 | Sylvio Herve Drouin | System and method for digital token exchange and delivery |
CN108364173A (en) * | 2018-02-14 | 2018-08-03 | 北京三六五八网络科技有限公司 | Digital asset processing method and processing device for electric business platform |
CN108389047A (en) * | 2018-02-12 | 2018-08-10 | 深圳沃链科技有限公司 | The method and block chain network of fundamental chain and subchain transaction in block chain |
WO2018189656A1 (en) * | 2017-04-11 | 2018-10-18 | nChain Holdings Limited | Secure re-use of private key for dynamic group of nodes |
-
2018
- 2018-10-22 CN CN201811227211.3A patent/CN109391619B/en active Active
Patent Citations (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160358161A1 (en) * | 2015-06-05 | 2016-12-08 | Peertracks Inc. | Systems and methods for an online music marketplace |
WO2016202952A1 (en) * | 2015-06-16 | 2016-12-22 | The Provost, Fellows, Foundation Scholars, & The Other Members Of Board, Of The College Of The Holy & Undiv. Trinity Of Queen Elizabeth, Near Dublin | Digital token exchange system |
CN105719185A (en) * | 2016-01-22 | 2016-06-29 | 杭州复杂美科技有限公司 | Block chain data comparison and consensus method |
US20180198617A1 (en) * | 2016-08-12 | 2018-07-12 | Sylvio Herve Drouin | System and method for digital token exchange and delivery |
WO2018189656A1 (en) * | 2017-04-11 | 2018-10-18 | nChain Holdings Limited | Secure re-use of private key for dynamic group of nodes |
CN107464106A (en) * | 2017-07-25 | 2017-12-12 | 北京果仁宝科技有限公司 | The method and system merchandised between block chain main chain and side chain |
CN107679857A (en) * | 2017-10-10 | 2018-02-09 | 马晶瑶 | Across the chain method of commerce and storage medium of block chain |
CN107742210A (en) * | 2017-10-13 | 2018-02-27 | 布比(北京)网络技术有限公司 | Across the chain fund transfer system and method for a kind of different blocks interchain |
CN108197944A (en) * | 2017-11-22 | 2018-06-22 | 远光软件股份有限公司 | Resource transaction method and device based on block chain technology |
CN108389047A (en) * | 2018-02-12 | 2018-08-10 | 深圳沃链科技有限公司 | The method and block chain network of fundamental chain and subchain transaction in block chain |
CN108364173A (en) * | 2018-02-14 | 2018-08-03 | 北京三六五八网络科技有限公司 | Digital asset processing method and processing device for electric business platform |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110084594A (en) * | 2019-04-01 | 2019-08-02 | 杜晓楠 | A kind of block chain method of commerce and device by lightning network |
CN111159293A (en) * | 2019-12-25 | 2020-05-15 | 杭州加密矩阵科技有限公司 | Cross-link information verification method based on light node technology |
CN111159293B (en) * | 2019-12-25 | 2023-06-20 | 杭州加密矩阵科技有限公司 | Cross-chain information verification method based on light node technology |
CN111476570A (en) * | 2020-04-02 | 2020-07-31 | 致信互链(北京)科技有限公司 | Method, device and equipment for migrating general certificates and storage medium |
CN111476570B (en) * | 2020-04-02 | 2024-01-26 | 致信互链(北京)科技有限公司 | Method, device, equipment and storage medium for migrating pass |
CN112287029A (en) * | 2020-11-17 | 2021-01-29 | 北京物资学院 | Block chain multi-chain cross-chain system and implementation mechanism thereof |
CN112287029B (en) * | 2020-11-17 | 2023-05-16 | 北京物资学院 | Block chain multi-chain cross-chain system and implementation mechanism thereof |
CN112632164A (en) * | 2020-12-21 | 2021-04-09 | 杭州云象网络技术有限公司 | Universal cross-chain programming interface method for realizing trusted authority access |
CN112632164B (en) * | 2020-12-21 | 2022-09-13 | 杭州云象网络技术有限公司 | Universal cross-chain programming interface method for realizing trusted authority access |
CN113763178A (en) * | 2021-09-24 | 2021-12-07 | 成都质数斯达克科技有限公司 | Multi-block chain cross-chain transaction method, device, equipment and readable storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN109391619B (en) | 2021-08-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109391619A (en) | Lead to card exchange method and computer-readable medium across chain based on permission | |
Syed et al. | A comparative analysis of blockchain architecture and its applications: Problems and recommendations | |
Marbouh et al. | Blockchain for COVID-19: review, opportunities, and a trusted tracking system | |
CN110245506B (en) | Intelligent contract management method and device based on block chain and electronic equipment | |
US20210166193A1 (en) | Block chain-based claim settlement method and apparatus | |
Xu et al. | Artificial intelligence for securing IoT services in edge computing: a survey | |
CN110392888A (en) | For executing the method and system of intelligent contract in security context | |
CN111324446A (en) | Multi-access edge computing node and method for deploying distributed accounting application | |
CN110245947B (en) | Receipt storage method and node combining conditional restrictions of transaction and user types | |
CN103268460A (en) | Integrity verification method of cloud storage data | |
JP2021533638A (en) | Node group management device and computing device that make up the double signature transaction structure of the group key infrastructure on the blockchain network | |
WO2021023304A1 (en) | Fork processing method and blockchain node | |
CN112804354B (en) | Method and device for data transmission across chains, computer equipment and storage medium | |
WO2021204044A1 (en) | Correction of blockchain data | |
CN110147684A (en) | For realizing the method and apparatus of block chain data-privacy protection | |
CN110135993B (en) | Method, equipment and storage medium for adapting UTXO model to intelligent contract account model | |
CN111770112B (en) | Information sharing method, device and equipment | |
CN110754072A (en) | Managing housing scores using intelligent contracts in a blockchain network | |
US20190044735A1 (en) | Method for managing the validation of messages relating to a message chain individually via a decentralised validation network | |
CN110505311A (en) | A kind of across the chain exchange method of isomorphism block chain and system | |
JP2022525551A (en) | Preventing erroneous transmission of copies of data records to distributed ledger systems | |
CN109472151A (en) | A kind of method and server of data access | |
US20210150058A1 (en) | Control method, server, recording medium, and data structure | |
KR20210109767A (en) | A method for providing asset backup services based on blockchain monitoring | |
CN115632774A (en) | Threshold signature-based distributed type language prediction machine implementation method and system |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210301 Address after: 201199 5th and 6th floor, 380 Xinsong Road, Minhang District, Shanghai Applicant after: Shanghai Youyuan Network Technology Co., Ltd Address before: 201106 room 312, No.1 Lane 666, Shenhong Road, Minhang District, Shanghai Applicant before: MEILAI NETWORK TECHNOLOGY (SHANGHAI) Co.,Ltd. |
|
TA01 | Transfer of patent application right | ||
GR01 | Patent grant | ||
GR01 | Patent grant |