CN111311258A - Block chain based trusted transaction method, device, system, equipment and medium - Google Patents

Block chain based trusted transaction method, device, system, equipment and medium Download PDF

Info

Publication number
CN111311258A
CN111311258A CN202010063625.8A CN202010063625A CN111311258A CN 111311258 A CN111311258 A CN 111311258A CN 202010063625 A CN202010063625 A CN 202010063625A CN 111311258 A CN111311258 A CN 111311258A
Authority
CN
China
Prior art keywords
transaction
trusted
client
validity
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010063625.8A
Other languages
Chinese (zh)
Other versions
CN111311258B (en
Inventor
蒋海
朱建国
商松
赵正涌
旷凯
刘建章
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bubi Beijing Network Technology Co ltd
Original Assignee
Bubi Beijing Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bubi Beijing Network Technology Co ltd filed Critical Bubi Beijing Network Technology Co ltd
Priority to CN202010063625.8A priority Critical patent/CN111311258B/en
Publication of CN111311258A publication Critical patent/CN111311258A/en
Application granted granted Critical
Publication of CN111311258B publication Critical patent/CN111311258B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the application provides a trusted transaction method, a device, a system, equipment and a medium based on a block chain; the method comprises the following steps: the trusted transaction client receives the block and SPV information in the block chain network system from the full-node client, and checks the block validity, and simple payment proves the SPV validity and the service rule validity; the trusted transaction device and the all-node client have a binding relationship; when the block validity, the SPV validity and the business rule validity all meet the requirements, the transaction and the receipt are judged to be valid, and a new transaction is constructed according to the business rule; the trusted transaction client constructs a trusted transaction according to the new transaction and broadcasts the trusted transaction to the blockchain network system. By adopting the scheme in the application, the trusted transaction which is authorized, safe and in line with the business rule can be constructed.

Description

Block chain based trusted transaction method, device, system, equipment and medium
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method, an apparatus, a system, a device, and a medium for trusted transaction based on blockchain.
Background
In the prior art, a trusted transaction is constructed to satisfy the following points: one is the trust of the authorization; secondly, the safety trust of the private key; third, the trust in the business feature rules.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm, the transaction is important content on a blockchain ledger, and the transaction on the ledger has legality, namely is known by all nodes. However, transactions on the blockchain often only mean the validity of the signature, but the credibility of the transaction cannot be proved, such as whether the transaction is authorized, whether the private key is safe, and whether the business conforms to the rules.
SGX (Intel Software Guard Extensions) is an extension of the Intel system for enhancing the security of Software. The security operation of legal software is encapsulated in enclaves (enclaves) to protect the software from being attacked by malicious software, and the enclaves cannot be accessed by privileged or non-privileged software, that is, once the software and data are in the enclave, even if an operating system or a VMM (Hypervisor) is attacked, the code and the data in the container cannot be influenced. However, the SGX can only be used to protect the security of the key, and ensure that the signature process is not maliciously tampered; but cannot prove whether the transaction is authorized or not and whether the business conforms to the rules or not.
In the process of implementing the application, the inventor finds that in the prior art, the establishment of a transaction often only meets one point, and a credible transaction which can simultaneously realize authorization, safety and accordance with business rules cannot be really established.
Disclosure of Invention
The embodiment of the application provides a block chain-based trusted transaction method, a block chain-based trusted transaction device, a block chain-based trusted transaction system, a block chain-based trusted transaction device and a block chain-based trusted transaction medium, and is used for solving the problem that in the prior art, a trusted transaction which can simultaneously realize authorization, safety and accordance with business rules cannot be established.
According to a first aspect of embodiments of the present application, there is provided a method for trusted transaction based on a blockchain, the method including: the trusted transaction client receives the block and SPV information in the block chain network system from the full-node client, and checks the block validity, and simple payment proves the SPV validity and the service rule validity; the trusted transaction device and the all-node client have a binding relationship; when the block validity, the SPV validity and the business rule validity all meet the requirements, the transaction and the receipt are judged to be valid, and a new transaction is constructed according to the business rule; the trusted transaction client constructs a trusted transaction according to the new transaction and broadcasts the trusted transaction to the blockchain network system.
According to a second aspect of embodiments of the present application, there is provided a block chain-based trusted transaction apparatus, including: the receiving module is used for receiving the block and SPV information in the block chain network system from the full-node client; the trusted transaction device and the all-node client have a binding relationship; the checking module is used for checking the block legality, the simple payment certification SPV legality and the business rule legality; the first construction module is used for judging that the transaction and the receipt are valid when the block validity, the SPV validity and the service rule validity all meet the requirements, and constructing a new transaction according to the service rule; and the second construction module is used for constructing a trusted transaction according to the new transaction and broadcasting the trusted transaction to the blockchain network system.
According to a third aspect of embodiments of the present application, there is provided a block chain-based trusted transaction system, including: the all-node client is used for sending a request for applying the trusted transaction client to the CA authorization management system; the request comprises a credible contract address, a service identifier and a first signature message; after receiving the trusted transaction client program and the result message, verifying that the result message is legal according to the trusted contract address, the service identifier, the public key of the full-node client and the second signature message, storing the trusted transaction client program and operating to obtain the trusted transaction client; the CA authorization management system is used for generating a trusted transaction client program corresponding to the request after verifying that the request is legal according to the trusted contract address, the service identifier and the first signature message, and sending the trusted transaction client program and the result message back to the full-node client; the result message comprises a credible contract address, a service identifier, a public key of the full-node client, a hash value of a credible transaction client program and a second signature message; forming a binding relationship between the public key of the full-node client and the public key of the trusted transaction client, and writing the binding relationship into a trusted contract; the trusted transaction client is the trusted transaction device; the block chain network system comprises a block chain layer and a credible contract layer, wherein the block chain layer is used for checking the legality of a credible transaction signature transaction, and the credible contract layer is used for checking the legality of a CA signature in the credible transaction.
According to a fourth aspect of embodiments of the present application, there is provided an electronic apparatus including: a display, a memory, one or more processors; and one or more modules stored in the memory and configured to be executed by the one or more processors, the one or more modules including instructions for performing the steps of the above-described method.
According to a fifth aspect of embodiments of the present application, there is provided a computer-readable storage medium having a computer program stored thereon; the computer program is executed by a processor to implement the above-described method.
By adopting the block chain-based trusted transaction method, device, system, equipment and medium provided by the embodiment of the application, the trusted transaction client is newly added in the transaction system, and receives the block and SPV information in the block chain network system from the corresponding full-node client, and checks the block validity and simple payment to prove the SPV validity and the service rule validity; when the block validity, the SPV validity and the business rule validity all meet the requirements, the transaction and the receipt are judged to be valid, and a credible transaction is constructed according to the business rule; thereby realizing the credible transaction which is authorized, safe and accords with the business rule.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application and are incorporated in and constitute a part of this application, illustrate embodiment(s) of the application and together with the description serve to explain the application and not to limit the application. In the drawings:
fig. 1 shows a schematic structural diagram of a block chain-based trusted transaction system 100 according to an embodiment of the present application;
FIG. 2 illustrates a flow diagram of a block chain based trusted transaction method according to an embodiment of the present application;
FIG. 3 shows a schematic diagram of a transaction tree according to an embodiment of the present application;
fig. 4 shows a block diagram of a block chain based trusted transaction device according to an embodiment of the present application;
fig. 5 shows a schematic structural diagram of an electronic device according to an embodiment of the application.
Detailed Description
In order to make the technical solutions and advantages of the embodiments of the present application more apparent, the following further detailed description of the exemplary embodiments of the present application with reference to the accompanying drawings makes it clear that the described embodiments are only a part of the embodiments of the present application, and are not exhaustive of all embodiments. It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict.
Fig. 1 shows a schematic structural diagram of a block chain-based trusted transaction system 100 according to an embodiment of the present application.
As shown in fig. 1, a block chain-based trusted transaction system 100 according to an embodiment of the present application includes:
the all-node client 101 is used for sending a request for applying a trusted transaction client to the CA authorization management system 102; the request comprises a credible contract address, a service identifier and a first signature message; and after receiving the trusted transaction client program and the result message, verifying that the result message is legal according to the trusted contract address, the service identifier, the public key of the full-node client and the second signature message, and then storing the trusted transaction client program and operating to obtain the trusted transaction client.
A ca (verification authority) authorization management system 102, configured to verify that the request is legal according to the trusted contract address, the service identifier, and the first signature message, generate a trusted transaction client program corresponding to the request, and send the trusted transaction client program and the result message back to the full-node client; the result message comprises a credible contract address, a service identifier, a public key of the full-node client, a hash value of a credible transaction client program and a second signature message; and forming a binding relationship between the public key of the full-node client and the public key of the trusted transaction client, and writing the binding relationship into the trusted contract.
The trusted transaction client 103, which may be implemented as a trusted instruction set execution device, implements a block header verification function, an SPV (simple payment verification) verification function, a service adaptation function, a transaction signature function, a CA signature function, and the like in a trusted space. And the trusted transaction client continuously synchronizes the data of the block chain network in the trusted space and checks the data, and after the business module is adapted to the target rule, the transaction is constructed by using a CA certificate and a block chain private key and is sent to the block chain network system.
It should be understood that the full-node client and the trusted transaction client have a one-to-one binding relationship, but they are not necessarily located on the same physical node, and the application is not limited thereto.
It should be understood that the trusted transaction client and the business rule have a corresponding relationship, that is, for the same all-node client, for the business rule a, there may be a corresponding trusted transaction client 1, and for the business rule B, there may also be another corresponding trusted transaction client 2, which is not limited in this application.
The blockchain network system 104 is logically divided into two layers, namely a blockchain layer 1041; the second is a trusted contract layer 1042, where the regional chain layer is used to check the validity of the trusted transaction signature transaction, and the trusted contract layer is used to check the validity of the CA signature in the trusted transaction.
In specific implementation, the sending, by the full-node client, the request for applying for the trusted transaction client to the CA authorization management system may specifically include: the full-node client downloads the blocks in the blockchain network system and creates the public key of the full-node client
Figure BDA0002375287830000051
Private key
Figure BDA0002375287830000052
And address
Figure BDA0002375287830000053
The method comprises the following steps that a full-node client sends a request for applying a trusted transaction client to a CA authorization management system, wherein the request comprises the following steps: a trusted contract address, a service identifier and a first signature message; the service identifier is a target service identifier of the full-node client and is used for the CA authorization management system to inquire a corresponding service rule; the first signature message is a private key adopted by the full-node client to the trusted contract address and the service identification in the request
Figure BDA0002375287830000054
And (4) signing the obtained message.
In specific implementation, after verifying that the request is legal according to the trusted contract address, the service identifier and the first signature message, the CA authorization management system generates a trusted transaction client program corresponding to the request, which specifically includes: after receiving the request from the full-node client, the CA authorization management system detects whether the first signature message is legal and verifies whether a trusted contract address exists and whether a service identifier exists in a service library; when the first signature message is closedJudging that the request is legal when the legal and credible contract addresses exist and the service identification exists in the service library; CA authorization management system loads rule source code B corresponding to service identification in service libraryiAnd generating a trusted transaction client public key
Figure BDA0002375287830000061
Trusted transaction client private key
Figure BDA0002375287830000062
Trusted transaction client address
Figure BDA0002375287830000063
And CA certificate C of trusted transaction clienti(ii) a The CA authorization management system sends a rule source code BiTrusted transaction client public key
Figure BDA0002375287830000064
Trusted transaction client private key
Figure BDA0002375287830000065
Trusted transaction client address
Figure BDA0002375287830000066
And CA certificate C of trusted transaction clientiAnd compiling in a trusted space in a hard coding mode to generate a trusted transaction client program.
Fig. 2 shows a flowchart of a block chain based trusted transaction method according to an embodiment of the present application.
As shown in fig. 2, a block chain-based trusted transaction method according to an embodiment of the present application includes the following steps:
s201, the all-node client applies for a trusted transaction client to a CA authorization management system.
In specific implementation, the full-node client may send a request for applying for a trusted transaction client to the CA authorization management system; the request includes a trusted contract address, a service identification, and a first signed message.
When implemented, the full-node clientSending a request for applying for a trusted transaction client to a CA authorization management system, which may specifically include: the full-node client downloads the blocks in the blockchain network system and creates the public key of the full-node client
Figure BDA0002375287830000067
Private key
Figure BDA0002375287830000068
And address
Figure BDA0002375287830000069
The method comprises the following steps that a full-node client sends a request for applying a trusted transaction client to a CA authorization management system, wherein the request comprises the following steps: a trusted contract address, a service identifier and a first signature message; the service identifier is a target service identifier of the full-node client and is used for the CA authorization management system to inquire a corresponding service rule; the first signature message is a private key adopted by the full-node client to the trusted contract address and the service identification in the request
Figure BDA00023752878300000610
And (4) signing the obtained message.
Specifically, S201 may include the steps of:
s2011, all-node client RiDownloading the block information of the block chain network system, and creating a public key, a private key and an address of the block chain network system:
Figure BDA00023752878300000611
s2012, with EiRepresents RiSubmitting an application message, R, to a CA authorization management System SiThe submitted application message mainly comprises the following contents:
Figure BDA00023752878300000612
Figure BDA0002375287830000071
trusted contract address: refers to a trusted contract address that exists in a blockchain network, which must exist and be configured in a CA entitlement management system.
Service identification, i.e., service ID: the target business rule ID is configured in a CA authorization management system and is used for the authorization management system to issue a trusted transaction client for processing a specified business rule.
The first signature message: means that R is adoptediPrivate key of
Figure BDA0002375287830000072
And the message obtained by signing the message of the structure is used for verifying the validity of the message.
S202, the CA authorization management system authorizes the credible transaction client.
In specific implementation, the CA authorization management system may verify that the request is legal according to the trusted contract address, the service identifier, and the first signature message, generate a trusted transaction client program corresponding to the request, and send the trusted transaction client program and the result message back to the full-node client; the result message comprises a credible contract address, a service identifier, a public key of the full-node client, a hash value of a credible transaction client program and a second signature message. And the CA authorization management system forms a binding relationship between the public key of the full-node client and the public key of the trusted transaction client and writes the binding relationship into a trusted contract.
In specific implementation, after verifying that the request is legal according to the trusted contract address, the service identifier and the first signature message, the CA authorization management system generates a trusted transaction client program corresponding to the request, which may specifically include: after receiving the request from the full-node client, the CA authorization management system detects whether the first signature message is legal and verifies whether a trusted contract address exists and whether a service identifier exists in a service library; when the first signature message is legal, the credible contract address exists and the service identifier exists in the service library, judging that the request is legal; CA authorization management system loads rule source code B corresponding to service identification in service libraryiAnd generating a trusted transaction client public key
Figure BDA0002375287830000073
Trusted transaction client private key
Figure BDA0002375287830000074
Trusted transaction client address
Figure BDA0002375287830000075
And CA certificate C of trusted transaction clienti(ii) a The CA authorization management system sends a rule source code BiTrusted transaction client public key
Figure BDA0002375287830000076
Trusted transaction client private key
Figure BDA0002375287830000077
Trusted transaction client address
Figure BDA0002375287830000078
And CA certificate C of trusted transaction clientiAnd compiling in a trusted space in a hard coding mode to generate a trusted transaction client program.
Specifically, S202 may include the steps of:
s2021, CA authorization management system S receives RiSigned message EiThen, detecting the validity of the signature and the validity of the parameters, wherein the validity mainly comprises whether a credible contract address exists or not and whether a service ID exists in a service library of the user;
s2022, CA authorization management system S check message EiAfter legal, loading corresponding rule source code B in the service libraryiAnd generating a public key, a private key and an address of the credible transaction client:
Figure BDA0002375287830000081
generating CA certificate Ci
S2023, the CA authorization management system S starts an automatic compiling task, and Bi
Figure BDA0002375287830000082
CiCompile it in a trusted space of a trusted transaction client in a hard-coded manner, generating a trusted transaction client program, i.e. alternatively referred to as trusted instruction set hardware program or SGX trusted transaction program Gi
S2024, the CA authorization management system S generates a result message and a trusted transaction client program GiWhile returning to Ri. Wherein the result message contains the following:
credible_contract_address trusted contract address
business_id Service ID
pub_address Public key address of applicant
file_hash Hash of trusted transaction client
signature Signature information for current message
1. Trusted contract address: similar to the description of the trusted contract address in S2012, the repeated description is omitted.
2. Service ID: as with the description of the service ID in S2012, the repeated description is omitted.
3. Public key address of applicant: the public key address of the signature message in S2012, i.e. the all-node client applying for the trusted transaction clientOf public key, i.e. RiIs/are as follows
Figure BDA0002375287830000083
4. Hash of trusted instruction set hardware program: namely the trusted transaction client program G in S2023iThe hash value of the file is used for ensuring that the file is not tampered in the transmission process.
5. Signing the message: the certificate C of the CA entitlement management system S is used to ensure the authenticity of the message based on the signed message except for this field.
S2025, the CA authorization management system S forms a binding relation between the respective public keys of the full-node client and the corresponding credible transaction client
Figure BDA0002375287830000091
And writing the signature into the trusted intelligent contract for verifying the correctness of the CA signature of the trusted transaction.
And S203, the all-node client runs the program to obtain the trusted transaction client.
In specific implementation, after receiving the trusted transaction client program and the result message, the full-node client may verify that the result message is legal according to the trusted contract address, the service identifier, the public key of the full-node client, and the second signature message, and then store the trusted transaction client program and operate to obtain the trusted transaction client.
It should be understood that the above-mentioned S201 to S203 may be executed only when the all-node client executes the trusted transaction corresponding to a certain business rule for the first time, and when the all-node client subsequently executes the trusted transaction corresponding to the business rule again, S204 may be directly executed without repeatedly executing S201 to S203.
And S204, the trusted transaction client processes the block and signs the trusted transaction.
In specific implementation, the trusted transaction client receives block and SPV information in the block chain network system from the full-node client, and checks block validity and simple payment to prove the validity of the SPV and the validity of a service rule; the trusted transaction client and the full-node client have a binding relationship; when the block validity, the SPV validity and the business rule validity all meet the requirements, the transaction and the receipt are judged to be valid, and a new transaction is constructed according to the business rule; the trusted transaction client constructs a trusted transaction according to the new transaction and broadcasts the trusted transaction to the blockchain network system.
In specific implementation, the trusted transaction client checks block validity, SPV validity, and business rule validity, and specifically may include: the trusted transaction client side carries out block validity check according to the check rule of the block chain network, and encrypts and stores a valid block header by using a specific sealing key; the trusted transaction client performs SPV validity check according to the root hash values of the transaction tree and the account tree in the block header, judges that the transaction is valid when the calculated root hash value is consistent with the root hash value in the block header, and obtains each valid transaction and a receipt corresponding to the valid transaction; and the credible transaction client performs service rule validity check on each legal transaction and the corresponding receipt thereof, and judges that the validity of the transaction block, the validity of the SPV and the validity of the service rule all meet the requirements when the source address, the target address and the transaction parameters of the legal transaction and the service rule are consistent and the state of the receipt is true.
In specific implementation, the trusted transaction client constructs a trusted transaction according to the new transaction, and specifically may include: the new transaction comprises a target address, a source address, transaction parameters of the current transaction business rule and a signature field; wherein the target address is the trusted transaction client address; the source address is a trusted contract address; the trusted transaction client side obtains the transaction parameters of the new transaction, signs the transaction parameters by using a CA certificate, and attaches the signed transaction parameters to the transaction parameters to obtain another new transaction; and the trusted transaction client side takes another new transaction, signs the second new transaction by using the private key after setting the signature field to be empty, and fills the signature field to obtain the trusted transaction.
Specifically, S204 may include the steps of:
s2041, trusted transaction client GiAfter starting, receiving block and SPV information in the block chain network system, wherein the part of the function is performed by the full-node client RiBy means of APIDelivered to trusted transaction client Gi
S2042, trusted transaction client GiStarting a block checking module, checking block validity according to a checking rule of a block chain network, for example, checking according to a signature in a BFT algorithm, checking according to mining difficulty based on a POW, and encrypting and storing a legal block head in a disk by a sealing key instruction specific to trusted instruction set hardware;
s2043, for the block with legal block head, the credible transaction client GiStarting an SPV checking module, checking whether the SPV is legal according to the Mercker tree root hash of the block head transaction tree and the account number tree, and finally obtaining a transaction TiAnd receipt Ri(ii) a The principle is as follows:
taking the transaction tree shown in fig. 3 as an example, all the mercker transaction trees store information of all transactions as a default, but the information is too large, and the efficiency is too low for transmitting the whole structure for verifying Target Data information. The light Merck tree reduces the Data amount, only the Data of the Target Data needs to be recorded from the bottom, the related leaf _ hash value is recorded upwards to form the light Merck tree, and finally the Target Data is proved to be legal through the root hash value. And recording the root hash value in the block header, and judging that the transaction or receipt is legal if the calculated root hash value of the light Mercker tree is consistent with the root hash value recorded in the block header.
S2044, trusted transaction client GiInitiating a service adaptation module using transaction TiAnd receipt XiCheck compliance with business rules BiThe checking rule is as follows: and when the source address, the target address and the transaction parameters of the legal transaction and the business rule are consistent and the receipt state is true, judging that the result is valid. Specifically, the judgment code is as follows:
Figure BDA0002375287830000111
only if all rules check for a match in the trusted space, and if the receipt result is true, the transaction and receipt are considered valid and according to business rule BiConstruction of a New transaction Tj. The transaction core parameters include the following:
source_address source address
dest_address Target address
input Transaction parameters
signature Signature information
Source address: refers to a trusted transaction client GiAccount number address of
Figure BDA0002375287830000112
Target address: as well as the trusted contract address in S2012.
input: refers to the business rule B in the transactioniIncluding business rule attributes and CA certificate CiAnd signing the data.
signature: and signing the data.
S2045, trusted instruction set hardware transaction program GiStarting CA signature module, and taking new transaction T in S2044jAnd use the CA certificate CiSigning the input field and attaching the signed input field to the input data; forming another new transaction;
s2046, trusted transaction client GiStarting a transaction signature module, taking a new transaction in S2045, and setting the signature field to be nullUsing a private key
Figure BDA0002375287830000113
After the field is signed, the field is filled into the signature field to obtain a new transaction TkThe transaction is a credible transaction;
s2047, trusted transaction client GiTo be trustedkBroadcast to the blockchain network system.
S205, the blockchain network system verifies the trusted transaction.
In specific implementation, after the block chain network receives the trusted transaction, the validity of the transaction signature is verified; in the transaction executing process, a trusted contract layer is triggered to analyze transaction parameters in the trusted transaction, and business rule attributes and CA certificates are obtained; the credible contract layer checks the legality of the CA certificate and the legality of the transaction parameters; and when the two are legal, executing corresponding processing according to the service rule, and writing the result into the block chain network.
Specifically, S205 may include the steps of:
s2051, the blockchain network system receives the transaction TkPacked node verification
Figure BDA0002375287830000121
If the signature transaction accords with the block chain transaction rule, if the transaction signature is legal, the transaction nonce value is legal and the source address balance is sufficient, the transaction is packaged, and the signature verification of the first layer is legal;
s2052, node packaging transaction TkWill execute the transaction and trigger the trusted contract layer to parse TkThe input parameter in the transaction is internally provided with a business rule attribute and also comprises a CA signature result;
s2053, the intelligent contract checks whether the CA signature is legal or not, and compares the CA signature with the signature set in the step S2025
Figure BDA0002375287830000122
Verification
Figure BDA0002375287830000123
Whether they are consistent, ifIf the certificate signature is consistent with the signature, the certificate signature is legal, and the transaction is credible;
s2054, the credible contract checks the logic of the input parameter and according to the business logic rule BiAnd performing corresponding processing, and writing the result execution into the block chain network.
By adopting the block chain-based trusted transaction method provided by the embodiment of the application, the trusted transaction client is newly added in the transaction system, receives the block and SPV information in the block chain network system from the corresponding full-node client, and checks the block validity, and the simple payment proves the SPV validity and the service rule validity; when the block validity, the SPV validity and the business rule validity all meet the requirements, the transaction and the receipt are judged to be valid, and a credible transaction is constructed according to the business rule; thereby realizing the credible transaction which is authorized, safe and accords with the business rule.
In addition, based on technologies such as CA certificates, trusted transaction clients and validity verification algorithms of the blockchain, a dual signature architecture which accords with business rules is creatively constructed and used for constructing trusted transactions in the blockchain system.
Based on the same inventive concept, the embodiment of the present application further provides a block chain-based trusted transaction apparatus, and as the principle of the apparatus for solving the problem is similar to the method provided in the foregoing, the implementation of the apparatus may refer to the implementation of the method, and repeated details are not repeated.
Fig. 4 shows a block diagram of a trusted transaction device based on a blockchain according to an embodiment of the present application.
As shown in fig. 4, a block chain-based trusted transaction apparatus 400 according to an embodiment of the present application includes: a receiving module 401, configured to receive, from a full-node client, information of a tile and an SPV in a blockchain network system; the trusted transaction device and the all-node client have a binding relationship; a checking module 402, configured to check block validity, simple payment certification SPV validity, and business rule validity; a first construction module 403, configured to determine that the transaction and the receipt are valid when the block validity, the SPV validity, and the business rule validity all meet the requirements, and construct a new transaction according to the business rule; a second constructing module 404, configured to construct a trusted transaction according to the new transaction, and broadcast the trusted transaction to the blockchain network system.
In a specific implementation, the verification module may specifically be configured to: carrying out block validity check according to a check rule of a block chain network, and encrypting and storing a legal block header by a specific sealing key; performing SPV validity check according to the root hash values of the transaction tree and the account tree in the block head, judging that the transactions are valid when the calculated root hash value is consistent with the root hash value in the block head, and obtaining each valid transaction and a receipt corresponding to the valid transaction; and performing service rule validity check on each legal transaction and the corresponding receipt, and judging that the validity of the transaction block, the validity of the SPV and the validity of the service rule all meet the requirements when the source address, the target address and the input parameter of the legal transaction and the service rule are consistent and the state of the receipt is true.
In implementation, constructing a trusted transaction according to the new transaction may specifically include: the new transaction comprises a target address, a source address, an input parameter of a business rule of the transaction and a signature field; wherein the target address is the trusted transaction client address; the source address is a trusted contract address; the trusted transaction client side obtains an input parameter of a new transaction, signs the input parameter by using a CA certificate, and attaches the input parameter to obtain another new transaction; and the trusted transaction client side takes another new transaction, signs the second new transaction by using the private key after setting the signature field to be empty, and fills the signature field to obtain the trusted transaction.
By adopting the block chain-based trusted transaction device provided by the embodiment of the application, the trusted transaction client is newly added in the transaction system, receives the block and SPV information in the block chain network system from the corresponding full-node client, and checks the block validity, and the simple payment proves the SPV validity and the service rule validity; when the block validity, the SPV validity and the business rule validity all meet the requirements, the transaction and the receipt are judged to be valid, and a credible transaction is constructed according to the business rule; thereby realizing the credible transaction which is authorized, safe and accords with the business rule.
Based on the same inventive concept, the embodiment of the present application further provides an electronic device, and as the principle of the device for solving the problem is similar to the method provided by the embodiment of the present application, the implementation of the device may refer to the implementation of the method, and repeated details are not repeated.
Fig. 5 shows a schematic structural diagram of an electronic device according to an embodiment of the application.
As shown in fig. 5, an electronic device 500 according to an embodiment of the present application includes: a display 501, a memory 502, one or more processors 503; and one or more modules stored in the memory and configured to be executed by the one or more processors, the one or more modules including instructions for performing the steps of the block chain based trusted transaction method of the embodiments of the present application.
By adopting the electronic equipment provided by the embodiment of the application, the trusted transaction client is newly added in the transaction system, the trusted transaction client receives the block and the SPV information in the block chain network system from the corresponding full-node client, and the block legality and the simple payment prove SPV legality and business rule legality are verified; when the block validity, the SPV validity and the business rule validity all meet the requirements, the transaction and the receipt are judged to be valid, and a credible transaction is constructed according to the business rule; thereby realizing the credible transaction which is authorized, safe and accords with the business rule.
Based on the same inventive concept, embodiments of the present application further provide a computer-readable storage medium, and since the principle of solving the problem of the computer-readable storage medium is similar to the method provided in the embodiments of the present application, the implementation of the computer-readable storage medium may refer to the implementation of the method, and repeated details are not repeated.
A computer-readable storage medium according to an embodiment of the present application, having a computer program stored thereon; the computer program is executed by a processor to implement the above-described method.
By adopting the computer-readable storage medium provided by the embodiment of the application, the trusted transaction client is newly added in the transaction system, receives the block and the SPV information in the block chain network system from the corresponding full-node client, and checks the block validity and the simple payment to prove the SPV validity and the service rule validity; when the block validity, the SPV validity and the business rule validity all meet the requirements, the transaction and the receipt are judged to be valid, and a credible transaction is constructed according to the business rule; thereby realizing the credible transaction which is authorized, safe and accords with the business rule.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While the preferred embodiments of the present application have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all alterations and modifications as fall within the scope of the application.
It will be apparent to those skilled in the art that various changes and modifications may be made in the present application without departing from the spirit and scope of the application. Thus, if such modifications and variations of the present application fall within the scope of the claims of the present application and their equivalents, the present application is intended to include such modifications and variations as well.

Claims (15)

1. A method of trusted transaction based on blockchains, the method comprising:
the trusted transaction client receives information of the blocks and the simple payment certificates (SPV) in the block chain network system from the full-node client, and verifies the block validity, the SPV validity and the service rule validity; wherein the trusted transaction client has a binding relationship with the full-node client;
when the block validity, the SPV validity and the business rule validity all meet the requirements, the transaction and the receipt are judged to be valid, and a new transaction is constructed according to the business rule;
and the trusted transaction client constructs a trusted transaction according to the new transaction and broadcasts the trusted transaction to the blockchain network system.
2. The method of claim 1, further comprising, before the trusted transaction client receives tile and SPV information in the blockchain network system from the full-node client:
the method comprises the steps that a full-node client sends a request for applying a trusted transaction client to a CA authorization management system; the request comprises a credible contract address, a service identifier and a first signature message;
after verifying that the request is legal according to the trusted contract address, the service identifier and the first signature message, the CA authorization management system generates a trusted transaction client program corresponding to the request and sends the trusted transaction client program and a result message back to the full-node client; the result message comprises the trusted contract address, the service identifier, the public key of the full-node client, the hash value of the trusted transaction client program and a second signature message;
the CA authorization management system forms a binding relationship between the public key of the full-node client and the public key of the trusted transaction client and writes the binding relationship into a trusted contract;
and after receiving the trusted transaction client program and the result message, the all-node client verifies that the result message is legal according to the trusted contract address, the service identifier, the public key of the all-node client and the second signature message, and then stores the trusted transaction client program and operates to obtain the trusted transaction client.
3. The method according to claim 2, wherein the sending, by the full-node client, the request for applying for the trusted transaction client to the CA authorization management system specifically includes:
downloading blocks in a block chain network system by a full-node client and establishing a public key of the full-node client
Figure FDA0002375287820000021
Private key
Figure FDA0002375287820000022
And address
Figure FDA0002375287820000023
The method comprises the following steps that a full-node client sends a request for applying a trusted transaction client to a CA authorization management system, wherein the request comprises: a trusted contract address, a service identifier and a first signature message; the service identifier is a target service identifier of the full-node client and is used for the CA authorization management system to inquire corresponding service rules; the first signature message is the credible contract address and the service identification which are adopted by the full-node client to the request by adopting a private key
Figure FDA0002375287820000024
And (4) signing the obtained message.
4. The method according to claim 3, wherein the generating, by the CA authorization management system, the trusted transaction client program corresponding to the request after verifying that the request is legitimate according to the trusted contract address, the service identifier, and the first signature message specifically includes:
after receiving the request from the full-node client, the CA authorization management system detects whether the first signature message is legal, and verifies whether the trusted contract address exists and the service identifier exists in a service library;
when the first signature message is legal, the credible contract address exists and the service identifier exists in a service library, judging that the request is legal;
the CA authorization management system loads a rule source code B corresponding to the service identification in the service libraryiAnd generating the trusted transaction client public key
Figure FDA0002375287820000025
Trusted transaction client private key
Figure FDA0002375287820000026
Trusted transaction client address
Figure FDA0002375287820000027
And CA certificate C of trusted transaction clienti
The CA authorization management system sends a rule source code BiTrusted transaction client public key
Figure FDA0002375287820000028
Trusted transaction client private key
Figure FDA0002375287820000029
Trusted transaction client address
Figure FDA00023752878200000210
And CA certificate C of trusted transaction clientiAnd compiling in a trusted space in a hard coding mode to generate a trusted transaction client program.
5. The method of claim 4, wherein the trusted transaction client checks block validity, SPV validity, and business rule validity, and specifically comprises:
the trusted transaction client side carries out block validity check according to the check rule of the block chain network, and encrypts and stores a valid block header by using a specific sealing key;
the trusted transaction client performs SPV validity check according to the root hash values of the transaction tree and the account tree in the block header, judges that the transaction is valid when the calculated root hash value is consistent with the root hash value in the block header, and obtains each valid transaction and a receipt corresponding to the valid transaction;
and the credible transaction client performs service rule validity check on each legal transaction and the corresponding receipt thereof, and judges that the validity of the transaction block, the validity of the SPV and the validity of the service rule all meet the requirements when the source address, the target address and the transaction parameters of the legal transaction and the service rule are consistent and the state of the receipt is true.
6. The method according to claim 1, wherein the trusted transaction client constructs a trusted transaction from the new transaction, in particular comprising:
the new transaction comprises a target address, a source address, transaction parameters of the current transaction business rule and a signature field; wherein the target address is the trusted transaction client address; the source address is a trusted contract address; the transaction parameters comprise business rule attributes and CA certificates;
the trusted transaction client side obtains the transaction parameters of the new transaction, signs the transaction parameters by using the CA certificate, and attaches the signed transaction parameters to the transaction parameters to obtain another new transaction;
and the trusted transaction client side takes the other new transaction, sets the signature field to be empty, signs the second new transaction by using a private key, and fills the signature field to obtain the trusted transaction.
7. The method of claim 1, after the trusted transaction client broadcasts the trusted transaction to the blockchain network, further comprising:
after receiving the trusted transaction, the blockchain network verifies the validity of the transaction signature; in the transaction executing process, triggering a trusted contract layer to analyze transaction parameters in the trusted transaction, and acquiring the business rule attribute and the CA certificate;
the credible contract layer checks the legality of the CA certificate and the legality of the transaction parameters; and when the two are legal, executing corresponding processing according to the service rule, and writing the result into the block chain network.
8. A blockchain based trusted transaction apparatus, the apparatus comprising:
the receiving module is used for receiving the block and SPV information in the block chain network system from the full-node client; wherein the trusted transaction device has a binding relationship with the full-node client;
the checking module is used for checking the block legality, the simple payment certification SPV legality and the business rule legality;
the first construction module is used for judging that the transaction and the receipt are valid when the block validity, the SPV validity and the service rule validity all meet the requirements, and constructing a new transaction according to the service rule;
and the second construction module is used for constructing a trusted transaction according to the new transaction and broadcasting the trusted transaction to the blockchain network system.
9. The apparatus of claim 8, wherein the verification module is specifically configured to:
carrying out block validity check according to a check rule of a block chain network, and encrypting and storing a legal block header by a specific sealing key;
performing SPV validity check according to the root hash values of the transaction tree and the account tree in the block head, judging that the transactions are valid when the calculated root hash value is consistent with the root hash value in the block head, and obtaining each valid transaction and a receipt corresponding to the valid transaction;
and performing service rule validity check on each legal transaction and the corresponding receipt thereof, and judging that the validity of the transaction block, the validity of the SPV and the validity of the service rule all meet the requirements when the source address, the target address and the transaction parameters of the legal transaction and the service rule are consistent and the state of the receipt is true.
10. The apparatus according to claim 8, wherein constructing a trusted transaction based on the new transaction comprises:
the new transaction comprises a target address, a source address, transaction parameters of the current transaction business rule and a signature field; wherein the target address is the trusted transaction client address; the source address is a trusted contract address;
the trusted transaction client side obtains the transaction parameters of the new transaction, signs the transaction parameters by using the CA certificate, and attaches the signed transaction parameters to the transaction parameters to obtain another new transaction;
and the trusted transaction client side takes the other new transaction, sets the signature field to be empty, signs the second new transaction by using a private key, and fills the signature field to obtain the trusted transaction.
11. A blockchain-based trusted transaction system, comprising:
the all-node client is used for sending a request for applying the trusted transaction client to the CA authorization management system; the request comprises a credible contract address, a service identifier and a first signature message; after receiving the trusted transaction client program and the result message, verifying that the result message is legal according to the trusted contract address, the service identifier, the public key of the full-node client and the second signature message, storing the trusted transaction client program and operating to obtain the trusted transaction client;
the CA authorization management system is used for generating a trusted transaction client program corresponding to the request after verifying that the request is legal according to the trusted contract address, the service identifier and the first signature message, and sending the trusted transaction client program and the result message back to the full-node client; the result message comprises the trusted contract address, the service identifier, the public key of the full-node client, the hash value of the trusted transaction client program and a second signature message; forming a binding relationship between the public key of the full-node client and the public key of the trusted transaction client, and writing the binding relationship into a trusted contract;
a trusted transaction client being a trusted transaction arrangement as claimed in any one of claims 8-10;
the block chain network system comprises a block chain layer and a credible contract layer, the block chain layer is used for checking the validity of the credible transaction signature transaction, and the credible contract layer is used for checking the validity of the CA signature in the credible transaction.
12. The system of claim 11, wherein the full-node client sends a request for applying for a trusted transaction client to the CA authorization management system, and specifically comprises:
downloading blocks in a block chain network system by a full-node client and establishing a public key of the full-node client
Figure FDA0002375287820000051
Private key
Figure FDA0002375287820000052
And address
Figure FDA0002375287820000053
The method comprises the following steps that a full-node client sends a request for applying a trusted transaction client to a CA authorization management system, wherein the request comprises: a trusted contract address, a service identifier and a first signature message; the service identifier is a target service identifier of the full-node client and is used for the CA authorization management system to inquire corresponding service rules; the first signature message is the credible contract address and the service identification which are adopted by the full-node client to the request by adopting a private key
Figure FDA0002375287820000054
And (4) signing the obtained message.
13. The system according to claim 12, wherein the CA authorization management system generates a trusted transaction client program corresponding to the request after verifying that the request is legitimate according to the trusted contract address, the service identifier, and the first signature message, and specifically includes:
after receiving the request from the full-node client, the CA authorization management system detects whether the first signature message is legal, and verifies whether the trusted contract address exists and the service identifier exists in a service library;
when the first signature message is legal, the credible contract address exists and the service identifier exists in a service library, judging that the request is legal;
the CA authorization management system loads a rule source code B corresponding to the service identification in the service libraryiAnd generating the trusted transaction client public key
Figure FDA0002375287820000061
Trusted transaction client private key
Figure FDA0002375287820000062
Trusted transaction client address
Figure FDA0002375287820000063
And CA certificate C of trusted transaction clienti
The CA authorization management system sends a rule source code BiTrusted transaction client public key
Figure FDA0002375287820000064
Trusted transaction client private key
Figure FDA0002375287820000065
Trusted transaction client address
Figure FDA0002375287820000066
And CA certificate C of trusted transaction clientiAnd compiling in a trusted space in a hard coding mode to generate a trusted transaction client program.
14. An electronic device, characterized in that the electronic device comprises: a display, a memory, one or more processors; and one or more modules stored in the memory and configured to be executed by the one or more processors, the one or more modules comprising instructions for performing the steps of the method of any of claims 1-7.
15. A computer-readable storage medium, having stored thereon a computer program; the computer program is executed by a processor to implement the method of any one of claims 1-7.
CN202010063625.8A 2020-01-20 2020-01-20 Block chain-based trusted transaction method, device, system, equipment and medium Active CN111311258B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010063625.8A CN111311258B (en) 2020-01-20 2020-01-20 Block chain-based trusted transaction method, device, system, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010063625.8A CN111311258B (en) 2020-01-20 2020-01-20 Block chain-based trusted transaction method, device, system, equipment and medium

Publications (2)

Publication Number Publication Date
CN111311258A true CN111311258A (en) 2020-06-19
CN111311258B CN111311258B (en) 2023-07-21

Family

ID=71146862

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010063625.8A Active CN111311258B (en) 2020-01-20 2020-01-20 Block chain-based trusted transaction method, device, system, equipment and medium

Country Status (1)

Country Link
CN (1) CN111311258B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333160A (en) * 2020-10-23 2021-02-05 浪潮(北京)电子信息产业有限公司 Block chain transaction information processing method and system, electronic device and storage medium
CN113269644A (en) * 2021-05-28 2021-08-17 长沙链奇科技有限公司 Transaction processing method and device based on block chain
CN114817229A (en) * 2022-06-21 2022-07-29 布比(北京)网络技术有限公司 Block chain based score clearing data processing method and block chain system
CN116112293A (en) * 2023-04-12 2023-05-12 中国信息通信研究院 Block chain-based data trusted transaction method and device, equipment and medium

Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001358705A (en) * 2000-06-15 2001-12-26 Sony Corp Information processing system and method using cryptographic key block and program providing medium
CN105488431A (en) * 2015-11-30 2016-04-13 布比(北京)网络技术有限公司 Authority management method and device for block chain system
CN106385319A (en) * 2016-09-29 2017-02-08 江苏通付盾科技有限公司 Verification method for information in block chain network and verification system thereof
CN106656974A (en) * 2016-10-17 2017-05-10 江苏通付盾科技有限公司 Block chain grouping consensus method and system
CN106875254A (en) * 2017-01-20 2017-06-20 暨南大学 A kind of Android malicious application control methods based on block chain technology
CN107317672A (en) * 2017-05-10 2017-11-03 广东网金控股股份有限公司 A kind of light weight terminating machine block catenary system
US20180075695A1 (en) * 2016-09-15 2018-03-15 Erik Mowery Simpson Implementations of various methods to create economic incentives to directly link users of a social network or social network reality game to actual projects and people within a charity or developing world area
CN108122165A (en) * 2017-12-15 2018-06-05 北京中电普华信息技术有限公司 A kind of block chain common recognition method and system
CN108229962A (en) * 2018-01-04 2018-06-29 众安信息技术服务有限公司 Right management method and system based on block chain
WO2018119930A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Transaction verification processing method, apparatus and node device
CN108540553A (en) * 2018-04-08 2018-09-14 中国联合网络通信集团有限公司 Internet of Things data management method, platform and equipment
CN108648081A (en) * 2018-05-07 2018-10-12 北京柏链基石科技有限公司 A kind of transaction processing method, device and electronic equipment based on block chain
US20180300693A1 (en) * 2017-04-17 2018-10-18 International Business Machines Corporation Providing out-of-band verification for blockchain transactions
CN108769173A (en) * 2018-05-21 2018-11-06 阿里体育有限公司 The block chain implementation method and equipment of the intelligent contract of operation
CN108805569A (en) * 2018-05-29 2018-11-13 阿里巴巴集团控股有限公司 Transaction processing method and device, electronic equipment based on block chain
CN108881459A (en) * 2018-07-02 2018-11-23 甘肃山呼信息技术有限公司 A kind of public block catenary system of Highly Scalable towards practical application
US20180349572A1 (en) * 2016-08-01 2018-12-06 Huawei Technologies Co., Ltd. Copyright authorization management method and system
CN109102296A (en) * 2018-08-31 2018-12-28 北京八分量信息科技有限公司 A kind of node common recognition method and system
CN109242663A (en) * 2018-09-05 2019-01-18 金蝶软件(中国)有限公司 A kind of bookkeeping methods and system based on block chain technology
CN110288480A (en) * 2019-06-28 2019-09-27 深圳前海微众银行股份有限公司 A kind of Private transaction method and device of block chain
CN110417790A (en) * 2019-08-02 2019-11-05 中国工商银行股份有限公司 Block chain system of real name queuing system and method
WO2019211494A1 (en) * 2018-05-04 2019-11-07 Hubii As Controlling transactions on a network
CN110472979A (en) * 2019-07-16 2019-11-19 中央财经大学 The verification method of transaction Subjective and Objective based on block chain
CN110471931A (en) * 2019-08-13 2019-11-19 山大地纬软件股份有限公司 A kind of digital asset trade identity maintaining method based on transaction in assets chain
CN110543488A (en) * 2019-09-11 2019-12-06 深圳市网心科技有限公司 Verification node updating method, device and equipment

Patent Citations (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2001358705A (en) * 2000-06-15 2001-12-26 Sony Corp Information processing system and method using cryptographic key block and program providing medium
CN105488431A (en) * 2015-11-30 2016-04-13 布比(北京)网络技术有限公司 Authority management method and device for block chain system
US20180349572A1 (en) * 2016-08-01 2018-12-06 Huawei Technologies Co., Ltd. Copyright authorization management method and system
US20180075695A1 (en) * 2016-09-15 2018-03-15 Erik Mowery Simpson Implementations of various methods to create economic incentives to directly link users of a social network or social network reality game to actual projects and people within a charity or developing world area
CN106385319A (en) * 2016-09-29 2017-02-08 江苏通付盾科技有限公司 Verification method for information in block chain network and verification system thereof
CN106656974A (en) * 2016-10-17 2017-05-10 江苏通付盾科技有限公司 Block chain grouping consensus method and system
WO2018119930A1 (en) * 2016-12-29 2018-07-05 深圳前海达闼云端智能科技有限公司 Transaction verification processing method, apparatus and node device
CN106875254A (en) * 2017-01-20 2017-06-20 暨南大学 A kind of Android malicious application control methods based on block chain technology
US20180300693A1 (en) * 2017-04-17 2018-10-18 International Business Machines Corporation Providing out-of-band verification for blockchain transactions
CN107317672A (en) * 2017-05-10 2017-11-03 广东网金控股股份有限公司 A kind of light weight terminating machine block catenary system
CN108122165A (en) * 2017-12-15 2018-06-05 北京中电普华信息技术有限公司 A kind of block chain common recognition method and system
CN108229962A (en) * 2018-01-04 2018-06-29 众安信息技术服务有限公司 Right management method and system based on block chain
CN108540553A (en) * 2018-04-08 2018-09-14 中国联合网络通信集团有限公司 Internet of Things data management method, platform and equipment
WO2019211494A1 (en) * 2018-05-04 2019-11-07 Hubii As Controlling transactions on a network
CN108648081A (en) * 2018-05-07 2018-10-12 北京柏链基石科技有限公司 A kind of transaction processing method, device and electronic equipment based on block chain
CN108769173A (en) * 2018-05-21 2018-11-06 阿里体育有限公司 The block chain implementation method and equipment of the intelligent contract of operation
CN108805569A (en) * 2018-05-29 2018-11-13 阿里巴巴集团控股有限公司 Transaction processing method and device, electronic equipment based on block chain
CN108881459A (en) * 2018-07-02 2018-11-23 甘肃山呼信息技术有限公司 A kind of public block catenary system of Highly Scalable towards practical application
CN109102296A (en) * 2018-08-31 2018-12-28 北京八分量信息科技有限公司 A kind of node common recognition method and system
CN109242663A (en) * 2018-09-05 2019-01-18 金蝶软件(中国)有限公司 A kind of bookkeeping methods and system based on block chain technology
CN110288480A (en) * 2019-06-28 2019-09-27 深圳前海微众银行股份有限公司 A kind of Private transaction method and device of block chain
CN110472979A (en) * 2019-07-16 2019-11-19 中央财经大学 The verification method of transaction Subjective and Objective based on block chain
CN110417790A (en) * 2019-08-02 2019-11-05 中国工商银行股份有限公司 Block chain system of real name queuing system and method
CN110471931A (en) * 2019-08-13 2019-11-19 山大地纬软件股份有限公司 A kind of digital asset trade identity maintaining method based on transaction in assets chain
CN110543488A (en) * 2019-09-11 2019-12-06 深圳市网心科技有限公司 Verification node updating method, device and equipment

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
亚伦?赖特等: "分散式区块链技术与加密安全法的兴起", 《民商法论丛》, no. 02 *
刘楠等: "大数据交换信息链", 《电信科学》, no. 10 *
姚博: "比特币、区块链与ICO:现实和未来", 《当代经济管理》, no. 09 *
蔡金棋等: "能源互联网中基于区块链的能源交易", 《电力建设》, no. 09 *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333160A (en) * 2020-10-23 2021-02-05 浪潮(北京)电子信息产业有限公司 Block chain transaction information processing method and system, electronic device and storage medium
CN113269644A (en) * 2021-05-28 2021-08-17 长沙链奇科技有限公司 Transaction processing method and device based on block chain
CN113269644B (en) * 2021-05-28 2023-06-02 长沙链奇科技有限公司 Transaction processing method and device based on blockchain
CN114817229A (en) * 2022-06-21 2022-07-29 布比(北京)网络技术有限公司 Block chain based score clearing data processing method and block chain system
CN114817229B (en) * 2022-06-21 2022-09-20 布比(北京)网络技术有限公司 Block chain based score clearing data processing method and block chain system
CN116112293A (en) * 2023-04-12 2023-05-12 中国信息通信研究院 Block chain-based data trusted transaction method and device, equipment and medium
CN116112293B (en) * 2023-04-12 2023-06-23 中国信息通信研究院 Block chain-based data trusted transaction method and device, equipment and medium

Also Published As

Publication number Publication date
CN111311258B (en) 2023-07-21

Similar Documents

Publication Publication Date Title
CN111090876B (en) Contract calling method and device
CN111090875B (en) Contract deployment method and device
US10395012B2 (en) Media client device authentication using hardware root of trust
CN111311258B (en) Block chain-based trusted transaction method, device, system, equipment and medium
US8171306B2 (en) Universal secure token for obfuscation and tamper resistance
US7877604B2 (en) Proof of execution using random function
US10880100B2 (en) Apparatus and method for certificate enrollment
KR100702499B1 (en) System and method for guaranteeing software integrity
CN111523110A (en) Permission query configuration method and device based on chain codes
US10686612B2 (en) Cryptographic data
CN111369338B (en) Data processing method and device based on block chain
CN110601855B (en) Root certificate management method and device, electronic equipment and storage medium
CN110708162A (en) Resource acquisition method and device, computer readable medium and electronic equipment
CN117155549A (en) Key distribution method, key distribution device, computer equipment and storage medium
CN115883154A (en) Access certificate issuing method, block chain-based data access method and device
CN112884585B (en) Method for executing transaction in block chain and block chain system
US20180218363A1 (en) Payment instrument management with key tokenization
CN116707983A (en) Authorization authentication method and device, access authentication method and device, equipment and medium
US20180218357A1 (en) Export high value material based on ring 1 evidence of ownership
CN114372245A (en) Block chain-based Internet of things terminal authentication method, system, device and medium
CN114205086A (en) Block chain-based digital certificate processing method and device
CN113592638A (en) Transaction request processing method and device and alliance chain
KR101054075B1 (en) Method and device to restrict use of protection key
CN114629661B (en) Encryption information processing method and device
CN115694790B (en) Digital asset evidence-storing method, device, equipment and medium based on quantum security

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant