CN111201751B - Method and system for arbitrating data authenticity in blockchain - Google Patents

Method and system for arbitrating data authenticity in blockchain Download PDF

Info

Publication number
CN111201751B
CN111201751B CN201880002222.3A CN201880002222A CN111201751B CN 111201751 B CN111201751 B CN 111201751B CN 201880002222 A CN201880002222 A CN 201880002222A CN 111201751 B CN111201751 B CN 111201751B
Authority
CN
China
Prior art keywords
network node
arbitration
arbitrating
data
blockchain
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201880002222.3A
Other languages
Chinese (zh)
Other versions
CN111201751A (en
Inventor
梁川
杨孟珂
刘忖生
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Didi Infinity Technology and Development Co Ltd
Original Assignee
Beijing Didi Infinity Technology and Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Didi Infinity Technology and Development Co Ltd filed Critical Beijing Didi Infinity Technology and Development Co Ltd
Publication of CN111201751A publication Critical patent/CN111201751A/en
Application granted granted Critical
Publication of CN111201751B publication Critical patent/CN111201751B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/321Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority
    • H04L9/3213Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving a third party or a trusted authority using tickets or tokens, e.g. Kerberos
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/463Electronic voting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Embodiments of the present application provide a method and network node for arbitrating data authenticity in a blockchain. The method may include: receiving, by an arbitrating network node, a request to arbitrate data authenticity, wherein the arbitrating network node is one of a plurality of network nodes in a blockchain; generating, by the arbitrating network node, an arbitration event based on the request, wherein the arbitration event comprises information related to the authenticity of the data; prioritizing, by the arbitrating network node, arbitration events to be processed before a next transaction by the arbitrating network node; and processing, by the arbitrating network node, the arbitration event based on information contained in the arbitration event, generating an arbitration result for the arbitrating network node, and providing the arbitration result to the blockchain.

Description

Method and system for arbitrating data authenticity in blockchain
Technical Field
The present application relates generally to computer technology and, more particularly, to a method and system for arbitrating data in a blockchain.
Background
Due to the nature of the shared ledger system, blockchains can be used to store and share information. The system may store information, such as financial data associated with transactions in the blockchain. And the system can prevent stored financial data from being tampered. The financial data may include transaction time, transaction amount, collateral information, and the like.
Although the blockchain may prevent the storage information from being tampered with, the blockchain may not be able to determine whether the storage information is genuine. Manual evaluation of stored information may also be difficult because blockchains may store large amounts of information.
To address the above-mentioned problems, embodiments of the present application provide a method and system for arbitrating data authenticity in a blockchain.
Disclosure of Invention
Embodiments of the present application provide a computer-implemented method for arbitrating data authenticity in a blockchain. The method may include: receiving, by an arbitrating network node, a request to arbitrate data authenticity, wherein the arbitrating network node is one of a plurality of network nodes in a blockchain; generating, by the arbitrating network node, an arbitration event based on the request, wherein the arbitration event comprises information related to the authenticity of the data; prioritizing, by the arbitration network node, the arbitration events so that the arbitration events are processed prior to a next transaction by the arbitration network node; and processing, by the arbitrating network node, the arbitration event based on information contained in the arbitration event, generating an arbitration result for the arbitrating network node, and providing the arbitration result to the blockchain.
The embodiment of the invention also provides an arbitration network node which is used for arbitrating the authenticity of the data in the block chain. The arbitrating network node may comprise: a communication interface configured to receive a request for arbitrating authenticity of data, wherein the arbitrating network node is one of a plurality of network nodes in a blockchain; a memory; and at least one processor coupled to the communication interface and the memory. The at least one processor may be configured to: generating an arbitration event based on the request, wherein the arbitration event comprises information related to authenticity of the data; prioritizing arbitration events to be processed before a next transaction of the arbitrated network node; and processing the arbitration event based on information contained in the arbitration event, generating an arbitration result for the arbitration network node, and providing the arbitration result to a blockchain.
Embodiments of the present invention also provide a non-transitory computer-readable medium storing a set of instructions that, when executed by at least one processor of an arbitrating network node, cause the arbitrating network node to perform a method for arbitrating the authenticity of data in a blockchain. The method may include: receiving a request for arbitrating authenticity of data, wherein the arbitrating network node is one of a plurality of network nodes in a blockchain; generating an arbitration event based on the request, wherein the arbitration event comprises information related to authenticity of data; prioritizing to handle the arbitration event prior to arbitrating a next transaction of the network node; and processing the arbitration event based on information contained in the arbitration event, generating an arbitration result of the arbitration network node, and providing the arbitration result to a blockchain.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the invention, as claimed.
Drawings
Fig. 1 is a schematic diagram of a blockchain shown in accordance with an exemplary embodiment of the present application.
Fig. 2 is a schematic diagram of a network node in a blockchain shown in accordance with an exemplary embodiment of the present application.
Fig. 3 is a schematic diagram of a plurality of network nodes using intelligent contracts, shown in accordance with an exemplary embodiment of the present application.
Fig. 4 is a flow chart illustrating a method for arbitrating authenticity of data in a blockchain in accordance with an exemplary embodiment of the present application.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings to refer to the same or like parts.
Fig. 1 is a schematic diagram of a blockchain 100 shown in accordance with an exemplary embodiment of the present application. A blockchain may typically be managed by a decentralized peer-to-peer network, comprising a plurality of network nodes. As shown in fig. 1, blockchain 100 may include blockchain 120 and network node 102 connected to blockchain 120 and 110. For example, each of block chains 120 may be a data block, and each of network nodes 102 and 110 may be a computer system that includes a processor and a memory. Network nodes 102 and 110 may collectively manage block chain 120. Block chain 120 may include blocks 122, 124, 126, and so on. Each block may include a cryptographic hash of the previous block, a timestamp, and stored data. Hashing is a function known in the art to convert an input, such as letters and numbers, to an encrypted output, such as a fixed length. The block chain 120 may be used as a distributed ledger, recording data (e.g., transaction data) for the network nodes 102 and 110. In other words, each of network nodes 102 and 110 may have a copy of the ledger that records data. To record new data, blockchain 100 generates an additional block to add to blockchain 120 that includes a cryptographic hash of the previous block in blockchain 120. Therefore, the integrity of the recorded data is associated with the previous blocks, and the recorded data cannot be tampered with unless all of the previous blocks are changed.
In an exemplary embodiment, the blockchain 100 may include a public blockchain, a private blockchain, or a federated blockchain. A common blockchain (e.g., used in bitcoin, etherhouse, etc.) allows any network node to join the blockchain. The private blockchain is controlled by a single administrator and sends invitations to its selected network nodes only to participants with limited access rights. The federated blockchain may be operated by a group of administrators (e.g., a group of financial institutions) rather than being controlled by a single administrator.
In an exemplary embodiment, blockchain 100 may run software corresponding to intelligent contracts, which may be executed in whole or in part without human interaction. For example, multiple parties using respective computer systems may program agreed-upon terms into an intelligent contract, and the intelligent contract may execute automatically when the terms are satisfied. It will be appreciated that since each network node (computer system) in the blockchain owns a copy of the blockchain, a copy of the intelligent contract is also distributed across all network nodes.
In an exemplary embodiment, the contribution to the blockchain 100 may be awarded in a number of tokens, such as bitcoins, ethercoins, and the like. For example, the network nodes 102 may share desired information and receive token rewards in the blockchain 100. What information is desired depends on the nature of the blockchain 100, and different blockchains have different desired information. For example, when blockchain 100 is designed as a financial federation blockchain, the desired information may include financial transaction data, such as parties involved in the transaction, transaction amounts, transaction times, and the like. As another example, when blockchain 100 is a medical association blockchain, the desired information may be physician data, medical records, and the like. On the other hand, the action of the network node may be consuming the token. For example, the network node 102 may spend the token in a transaction with another node, create an intelligent contract, and the like.
Fig. 2 is a schematic diagram of a network node, such as network node 102 (fig. 1), in a blockchain shown in accordance with an exemplary embodiment of the present application. Network node 102 may include a communication interface 202, a memory 204, and a processor 206.
Referring to fig. 2, communication interface 202 may be in communication with block chain 120 (fig. 1) and configured to receive a request from block chain 120 to arbitrate authenticity of data. For example, communication interface 202 may be an Integrated Services Digital Network (ISDN) card, cable modem, satellite modem, or a modem to provide a data communication connection. As another example, communication interface 202 may be a Local Area Network (LAN) card to provide a data communication connection to a compatible LAN. The wireless link may also be implemented by the communication interface 202. In such implementations, communication interface 202 may send and receive electrical, electromagnetic or optical signals that carry digital data streams representing various types of information via a network. The network may generally include a cellular communication network, a Wireless Local Area Network (WLAN), a Wide Area Network (WAN), and the like.
In an exemplary embodiment, the memory 204 may be configured to store a set of instructions. When the processor 206 executes the instructions, the processor 206 may perform the following method for arbitrating the authenticity of data in a blockchain. The memory device 204 may be implemented as any type or combination of volatile or non-volatile memory devices, such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, or a magnetic or optical disk.
In an example embodiment, the network node 102 may perform a method of arbitrating the authenticity of data submitted to a blockchain by another network node (e.g., a first network node). The data may include any data that may be exchanged with other network nodes. For example, the data may include financial data for a transaction, physical data for an anonymous user, device data associated with a condition of a device, and so forth. In some embodiments, the financial data may be purchased by another network node, for example, to determine the trustworthiness of the parties involved in the transaction. In some embodiments, the physical data may be collected and used by a research institution. In some embodiments, the device data may be used to assess the value of the device.
In some embodiments, each network node in the blockchain may be configured with a trustworthiness value associated with a transaction permit in the blockchain. The blockchain may prohibit the network node from conducting a transaction if the trustworthiness value of the network node is below a transaction threshold. In other words, the network node may not use the blockchain when the trustworthiness value of the network node is below the transaction threshold.
In an exemplary embodiment, the network node may obtain a token reward after submitting data to the blockchain. The token may be a cryptocurrency and used to purchase information stored in blockchain 120. In some embodiments, the network node may spend the token to create or join the intelligent contract. The smart contract may be used to trigger a predetermined action when a preset condition is satisfied, and the condition may be set together with the smart contract, as described below.
In an exemplary embodiment, the request to arbitrate authenticity of the data may be submitted through a second network node of the blockchain. Since submitting data may be rewarded for tokens, a network node (e.g., a first network node) may submit spurious data in exchange for tokens. In the exemplary embodiment, any other network node may submit a request for authenticity arbitration of data submitted by the first network node.
Still referring to fig. 2, to perform a method of arbitrating the authenticity of data, e.g., data submitted by a first network node, processor 206 may also include a plurality of functional modules, such as an event generation unit 2062, a prioritization unit 2064, and an arbitration unit 2066. These modules (and any corresponding sub-modules or sub-units) may be functional hardware units (e.g., part of an integrated circuit) of the processor 206 designed for use with other components or parts of a program (stored on a computer-readable medium) that, when executed by the processor 206, performs one or more functions. Although FIG. 2 shows all of the units 2062-2066 within the processor 206, it is contemplated that the units may be distributed among multiple processors that are located near or remote from each other.
In an exemplary embodiment, the event generating unit 2062 is configured to arbitrate requests for authenticity of the data, e.g. submitted by the second network node, generating arbitration events. The arbitration event may be generated for use by an intelligent contract. As described above, the software corresponding to the smart contract performs an action when a preset condition is satisfied. In some embodiments, the action may include decreasing or increasing a trustworthiness value of a network node associated with the smart contract. The preset condition may be whether the network node wins arbitration. For example, software corresponding to a smart contract may need to arbitrate network nodes for voting and determine whether a first network node or a second network node wins. The trustworthiness value of the network node that wins in the arbitration event may be increased and the trustworthiness value of the network node that fails in the arbitration time may be decreased. In some embodiments, to ensure that each vote made by an arbitrating network node may be evaluated, event generation unit 2062 may also determine whether the arbitrating network node has a confidence value above an arbitration threshold. For example, a network node having a confidence value above an arbitration threshold may be invited as an arbitrated network node. In some embodiments, the event generating unit 2062 may further select, among the network nodes having a trustworthiness value above the arbitration threshold, a network node related to the parties involved in the arbitration event. The relevant network node may comprise any network node that ever interacted with the first or second network node. For example, if a network node has previously reviewed data submitted by a first network node, the network node may be invited to arbitrate the event as an arbitrating network node.
In an exemplary embodiment, the event generating unit 2062 may collect information relating to the authenticity of the data as evidence, for example, from the first or second network node. For example, a first network node may submit evidence to prove the integrity of the submitted data, and a second network node may submit evidence to support the direction of the submitted data and the first network node. It should be appreciated that in some embodiments, software corresponding to the intelligent contract may require the second network node to submit evidence before an arbitration event can be generated.
FIG. 3 is a schematic diagram of network node 102 and 110 (FIG. 1) using intelligent contracts 300 shown in accordance with an exemplary embodiment of the present application. For example, software corresponding to the intelligent contract 300 may be run on each network node 102 and 110 in the blockchain. For purposes of illustration only, it is assumed that in network node 102 and 110, first network node 104 and second network node 106 are parties involved in arbitration, and that network nodes 102,108, and 110 are arbitration network nodes. In an exemplary embodiment, first network node 104 and second network node 106 submit information regarding the authenticity of the data as evidence to software corresponding to smart contract 300. And as the software corresponding to the smart contract 300 is updated on each of the arbitrating network nodes 102,108, and 110, the arbitrating network nodes 102,108, and 110 may each generate an arbitration event and perform arbitration based on the submitted information.
Referring back to fig. 2, in an exemplary embodiment, the prioritization unit 2064 is configured to prioritize arbitration events to be processed before the next transaction for the arbitrated network node. For example, the arbitrating network node places an arbitration event in the task queue before the next transaction. In other words, the arbitrating network node may be forced to prioritize arbitration events. It will be appreciated that not all of the arbitrating network nodes may perform transactions within a short time after the arbitration event is issued. For example, an arbitrating network node may attempt to execute a transaction several days after an arbitration event occurs. Thus, the time for an arbitrating network node to process an arbitration event and return a result may vary.
In an exemplary embodiment, the arbitration unit 2066 is configured to process the arbitration event based on the submitted information to generate an arbitration result for the network node 102 (the arbitrated network node). The arbitration result may comprise a vote for the first network node or the second network node. The voting of the first network node may indicate that the arbitrating network node determined that the data submitted by the first network node is authentic. The voting of the second network node may indicate that the arbitrating network node determined that the data submitted by the first network node was not authentic.
In some embodiments, software corresponding to the smart contract may collect arbitration results for each arbitration network node in the blockchain and generate a final result based on the collected arbitration results. For example, software corresponding to the intelligent contract may determine which of the first and second network nodes wins the majority. Thus, the final result may indicate that one of the first and second network nodes eventually wins arbitration. Data associated with arbitration events can be tagged with the true end result so that the network node requesting the data can see the history of arbitration. As described above, the software corresponding to the smart contract may not be able to receive votes for all of the arbitrating network nodes simultaneously. Thus, it should be appreciated that software corresponding to a smart contract may retrieve votes that were cast in a given time period.
It should be understood that the winning rules may differ from the majority of rules. For example, software corresponding to a smart contract may require that the second network node win whenever the second network node wins two-thirds of the votes. In this way it can prevent network nodes in the blockchain from generating too many arbitration events, which may waste blockchain resources.
As described above, the trustworthiness value of a network node that fails in an arbitration event may be reduced. If the trustworthiness value of the network node is below the transaction threshold, the network node's transaction permission in the blockchain may be revoked.
Fig. 4 is a flow diagram illustrating a method 400 for arbitrating authenticity of data in a blockchain in accordance with an exemplary embodiment of the present application. For example, method 400 may be implemented by a network node, such as network node 102 (fig. 1), and may include steps S402-S408 as described below.
At step S402, the network node 102 may receive a request for arbitrating the authenticity of the data. For example, the data may be submitted by a first network node (e.g., network node 104 (fig. 1)) and the request may be submitted by a second network node (e.g., network node 106 (fig. 1)).
At step S404, the network node 102 may generate an arbitration event based on the request. The arbitration event may be generated based on a smart contract. As described above, the software corresponding to the smart contract performs an action when a preset condition is satisfied. In some embodiments, the action may include decreasing or increasing a trustworthiness value of a network node associated with the smart contract, and the predetermined condition may be whether the network node wins arbitration. For example, software corresponding to a smart contract may need to arbitrate network nodes for voting and determine whether a first network node or a second network node wins. The trustworthiness value of the network node that wins in the arbitration event may be increased and the trustworthiness value of the network node that fails in the arbitration time may be decreased. In some embodiments, to ensure that each vote made by an arbitrating network node may be evaluated, it may be determined whether the arbitrating network node has a confidence value above an arbitration threshold. For example, a network node having a confidence value above an arbitration threshold may be invited to act as an arbitrating network node. In some embodiments, among the network nodes having a confidence value above the arbitration threshold, network nodes associated with parties involved in the arbitration may be further selected. The relevant network node may comprise any network node that ever interacted with the first or second network node. In addition, information about the authenticity of the data may be collected from the first and second network nodes.
In step S406, the network node 102 may prioritize the arbitration event to be processed before the next transaction for the arbitrated network node. For example, the network node 102 may place an arbitration event in the task queue before the next transaction of the network node, such that the arbitrating network node needs to process the arbitration event before the next transaction. In other words, the arbitrating network node is forced to prioritize arbitration events.
At step S408, the network node 102 may process the arbitration event based on the submitted information, generating an arbitration result for arbitrating network nodes. The arbitration result may comprise a vote for the first network node or the second network node. The voting of the first network node may indicate that the arbitrating network node determines that the data submitted by the first network node is authentic. The voting of the second network node may indicate that the arbitrating network node determines that the data submitted by the first network node is not authentic.
In some embodiments, software corresponding to the smart contract may collect arbitration results for each arbitration network node in the blockchain and generate a final result based on the collected arbitration results. The end result may indicate that one of the first and second network nodes wins arbitration. Data associated with arbitration may be tagged with the end result so that any network node requesting the data may see the history of arbitration.
It should be understood that the winning rules may differ from the majority of rules. For example, software corresponding to a smart contract may require that the second network node win whenever the second network node wins two-thirds of the votes. In this way it can prevent network nodes in the blockchain from generating too many arbitration events, which may waste blockchain resources.
As described above, the trustworthiness value of the network node with failed arbitration may be reduced. If the trustworthiness value of the network node is below the transaction threshold, the network node's transaction permission in the blockchain may be revoked.
Embodiments of the present application may also provide a non-transitory computer-readable medium storing instructions that, when executed, cause one or more processors to perform the above-described method. The computer-readable medium includes volatile or nonvolatile, magnetic, semiconductor, tape, optical, removable, non-removable, or other types of computer-readable medium or computer-readable storage device. For example, the computer-readable medium of the present application may be a storage device or a storage module having stored thereon computer instructions. In some embodiments, the computer readable medium may be a disk or flash drive having computer instructions stored thereon.
It will be apparent that various modifications and variations can be made in the system and related methods of the present application by those of ordinary skill in the art. Other embodiments will be apparent to those skilled in the art from consideration of the specification and practice of the system and associated method of the present application.
It is intended that the specification and examples be considered as exemplary only, with a true scope being indicated by the following claims and their equivalents.

Claims (16)

1. A computer-implemented method for arbitrating authenticity of data in a blockchain, comprising:
receiving, by an arbitrating network node, data submitted by a first network node of a plurality of network nodes and a request submitted by a second network node of the plurality of network nodes for arbitrating data authenticity, the second network node being different from the first network node, wherein the arbitrating network node is a network node related to parties involved in an arbitration event and having a trustworthiness value above an arbitration threshold, the related network node being any network node that ever interacted with the first or second network node;
generating, by the arbitrating network node, an arbitration event based on the request, wherein the arbitration event comprises information related to the authenticity of the data;
prioritizing, by the arbitrating network node, arbitration events to be processed before a next transaction by the arbitrating network node;
processing, by the arbitrating network node, the arbitration event based on information contained in the arbitration event, generating an arbitration result for the arbitrating network node, and providing the arbitration result to the blockchain, wherein generating the arbitration result comprises determining a vote for the first network node or the second network node;
a final result is generated based on the collected arbitration results.
2. The method of claim 1, wherein generating the arbitration event further comprises:
determining that a trustworthiness value of the arbitrated network node is above a first threshold; and
receiving information relating to authenticity of the data from at least one of the first network node or the second network node.
3. The method of claim 1, wherein prioritizing the arbitration events comprises:
placing the arbitration event in a task queue prior to a next transaction of the arbitrating network node.
4. The method of claim 1, wherein the method further comprises:
configuring a trustworthiness value for each of the plurality of network nodes, the trustworthiness value being associated with a transaction permit in the blockchain.
5. The method of claim 4, wherein:
the trustworthiness value of the first network node submitting the data is increased when the data is determined to be trustworthy, and the trustworthiness value of the first network node submitting the data is decreased when the data is determined to be untrustworthy.
6. The method of claim 4, wherein data submitted by the first network node is marked as a true end result.
7. The method of claim 1, in which the blockchain is a joint blockchain.
8. The method of claim 5, wherein the first network node's permission to transact in the blockchain is revoked in response to the first network node's trustworthiness value being below a second threshold.
9. An arbitrating network node for arbitrating the authenticity of data in a blockchain, comprising:
a communication interface configured to receive data submitted by a first network node of a plurality of network nodes and a request submitted by a second network node of the plurality of network nodes for arbitrating data authenticity, the second network node being different from the first network node, wherein the arbitrating network node is a network node related to parties involved in an arbitration event and having a trustworthiness value above an arbitration threshold, the related network node being any network node that ever interacted with the first or second network node;
a memory; and
at least one processor, coupled to the communication interface and the memory, configured to:
generating an arbitration event based on the request, wherein the arbitration event comprises information related to the authenticity of the data;
prioritizing arbitration events to be processed before a next transaction of the arbitrating network node;
processing the arbitration event based on information contained in the arbitration event, generating an arbitration result for the arbitrated network node, and providing the arbitration result to the blockchain, wherein generating the arbitration result comprises determining a vote for the first network node or the second network node;
a final result is generated based on the collected arbitration results.
10. The network node of claim 9, wherein the processor is further configured to
Determining that a trustworthiness value of the arbitrated network node is above a first threshold; and
receiving the information relating to the authenticity of the data from at least one of the first network node or the second network node.
11. The network node of claim 9, wherein the at least one processor is further configured to:
placing the arbitration event in a task queue prior to a next transaction of the arbitrating network node.
12. The network node of claim 9, wherein the at least one processor is further configured to:
configuring a trustworthiness value for each of the plurality of network nodes, the trustworthiness value being associated with a transaction permit in the blockchain.
13. The network node of claim 12, wherein the trustworthiness value of the first network node that submits data increases when the data is determined to be trustworthy and decreases when the data is determined to be untrustworthy.
14. The network node of claim 12, wherein the data submitted by the first network node is marked as a true final result.
15. The network node of claim 13, wherein the first network node's permission to transact in the blockchain is revoked in response to the first network node's trustworthiness value being below a second threshold.
16. A non-transitory computer-readable medium storing a set of instructions that, when executed by at least one processor of an arbitrating network node, cause the arbitrating network node to perform a method for arbitrating the authenticity of data in a blockchain, the method comprising:
receiving data submitted by a first network node of a plurality of network nodes and a request submitted by a second network node of the plurality of network nodes for arbitrating data authenticity, the second network node being different from the first network node, wherein the arbitrating network node is a network node related to parties involved in an arbitration event and having a trustworthiness value above an arbitration threshold, the related network node being any network node that ever interacted with the first or second network node;
generating an arbitration event based on the request, wherein the arbitration event comprises information related to authenticity of the data;
prioritizing arbitration events to be processed before a next transaction of the arbitrating network node; and
processing the arbitration event based on information contained in the arbitration event, generating an arbitration result for the arbitrated network node, and providing the arbitration result to the blockchain, wherein generating the arbitration result comprises determining a vote for the first network node or the second network node;
a final result is generated based on the collected arbitration results.
CN201880002222.3A 2018-09-26 2018-09-26 Method and system for arbitrating data authenticity in blockchain Active CN111201751B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/CN2018/107625 WO2020061822A1 (en) 2018-09-26 2018-09-26 Method and system for arbitrating authenticity of data in a blockchain

Publications (2)

Publication Number Publication Date
CN111201751A CN111201751A (en) 2020-05-26
CN111201751B true CN111201751B (en) 2021-03-09

Family

ID=69949858

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201880002222.3A Active CN111201751B (en) 2018-09-26 2018-09-26 Method and system for arbitrating data authenticity in blockchain

Country Status (2)

Country Link
CN (1) CN111201751B (en)
WO (1) WO2020061822A1 (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111681011B (en) * 2020-06-16 2023-04-28 中国工商银行股份有限公司 Data processing method, blockchain system, computer system and medium
CN112202765B (en) * 2020-09-28 2023-03-28 北京八分量信息科技有限公司 Block chain common identification block method, block chain system, electronic device and storage medium
US20230050048A1 (en) * 2021-08-13 2023-02-16 Bank Of America Corporation Isolating And Reinstating Nodes In A Distributed Ledger Using Proof Of Innocence

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107391526A (en) * 2017-03-28 2017-11-24 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain
CN107944285A (en) * 2017-11-30 2018-04-20 深圳市轱辘车联数据技术有限公司 The method of commerce and device of a kind of unique right to use of data message
CN108062672A (en) * 2017-12-07 2018-05-22 北京泛融科技有限公司 A kind of process dispatch method based on block chain intelligence contract
CN108171083A (en) * 2017-12-18 2018-06-15 深圳前海微众银行股份有限公司 Block chain trust data management method, system and computer readable storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10565570B2 (en) * 2016-09-27 2020-02-18 The Toronto-Dominion Bank Processing network architecture with companion database

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107391526A (en) * 2017-03-28 2017-11-24 阿里巴巴集团控股有限公司 A kind of data processing method and equipment based on block chain
CN107944285A (en) * 2017-11-30 2018-04-20 深圳市轱辘车联数据技术有限公司 The method of commerce and device of a kind of unique right to use of data message
CN108062672A (en) * 2017-12-07 2018-05-22 北京泛融科技有限公司 A kind of process dispatch method based on block chain intelligence contract
CN108171083A (en) * 2017-12-18 2018-06-15 深圳前海微众银行股份有限公司 Block chain trust data management method, system and computer readable storage medium

Also Published As

Publication number Publication date
CN111201751A (en) 2020-05-26
WO2020061822A1 (en) 2020-04-02

Similar Documents

Publication Publication Date Title
US11652605B2 (en) Advanced non-fungible token blockchain architecture
US20200274863A1 (en) Resource transfer setup and verification
Baird et al. Hedera: A governing council & public hashgraph network
CN111177797B (en) Block chain-based data processing method and device and electronic equipment
CN108596623B (en) Block chain consensus achieving method
US20220156837A1 (en) Distributed ledger implementation for entity formation and monitoring system
JP2020534733A (en) Execution of smart contracts using distributed coordination
WO2017109140A1 (en) Decentralized, tamper-resistant, asset-oriented database system and method of recording a transaction
CN111201751B (en) Method and system for arbitrating data authenticity in blockchain
US20230299984A1 (en) Blockchain-based data processing method, apparatus and device, and storage medium
CN109190881A (en) A kind of data assets management method, system and equipment
CN108665363B (en) Block chain consensus achieving device
Francati et al. Audita: A blockchain-based auditing framework for off-chain storage
CN108648082B (en) Computer system for block chain consensus achievement
WO2021129004A1 (en) Blockchain data access control method and apparatus based on intelligent contract
CN110458708A (en) Asset allocation method and device competition-based in block chain network
CN110738783A (en) System, method, device, equipment and readable storage medium for updating voting data
CN112181599A (en) Model training method, device and storage medium
CN111260364A (en) Extensible quick payment method and system based on block chain
CN110999262A (en) Method and system for stimulating data exchange
US11782823B2 (en) Automatically capturing weather data during engineering tests
CN112734455B (en) Method, device and equipment for generating prize exchanging result and readable storage medium
KR20190105202A (en) Method for vehicle payment based on block chain in an iot environment
US20240129143A1 (en) Dividing data storage and service operations among plural blockchains
US20230267220A1 (en) Privacy preserving asset token exchange

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant