CN112581128B - Heterogeneous license chain value exchange method with presence evidence - Google Patents

Heterogeneous license chain value exchange method with presence evidence Download PDF

Info

Publication number
CN112581128B
CN112581128B CN202011458000.8A CN202011458000A CN112581128B CN 112581128 B CN112581128 B CN 112581128B CN 202011458000 A CN202011458000 A CN 202011458000A CN 112581128 B CN112581128 B CN 112581128B
Authority
CN
China
Prior art keywords
chain
transaction
cross
verification
license
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202011458000.8A
Other languages
Chinese (zh)
Other versions
CN112581128A (en
Inventor
臧铖
陈嘉俊
郭东升
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Zheshang Bank Co Ltd
Original Assignee
China Zheshang Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Zheshang Bank Co Ltd filed Critical China Zheshang Bank Co Ltd
Priority to CN202011458000.8A priority Critical patent/CN112581128B/en
Publication of CN112581128A publication Critical patent/CN112581128A/en
Application granted granted Critical
Publication of CN112581128B publication Critical patent/CN112581128B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a heterogeneous license chain value exchange method with presence evidence, which can carry out presence evidence on inter-chain transactions, unify communication protocols among heterogeneous license chains, and meet the requirements of reality, reliability, value peering, transaction consistency and the like of inter-chain information interaction. The method of the invention can be extended in parallel between the license chains, has good expansibility, enables the value exchange between heterogeneous license chains, is extended from a single scene or connected or extended to a multi-service scene, is extended from a single service body or connected to a multi-service body, and can greatly extend the application scene. The invention ensures the transaction consistency of value exchange among heterogeneous permission chains through a time lock, a presence evidence and a transaction rollback mechanism. The invention realizes the decentralization cross-chain scheme through registration management, has substantial difference compared with a relay chain or notary mode, and meets the requirement of block chain decentralization management.

Description

Heterogeneous license chain value exchange method with presence evidence
Technical Field
The invention relates to the technical field of blockchains, in particular to a heterogeneous license chain value exchange method with presence evidence.
Background
A licensed chain refers to every node participating in a blockchain system that is licensed and not accessible to unlicensed nodes. The maximum value of the blockchain is to realize the transfer of information value, and as heterogeneous license chains, participants are authorized organizations, and the communication between chains of different architectures faces the problems of non-uniform interfaces, inconsistent consensus and the like, so that the chains cannot mutually communicate to realize value exchange.
In particular heterogeneous license chains, there are two main difficulties:
because of the isomerism, the adopted consensus mechanism, storage mechanism and block format are all different, a unified communication protocol needs to be defined in the information interaction process; the existence of the message needs to be proved when the transaction information is verified, that is, the A chain is communicated with the B chain, and the B chain can confirm that the content of the message sent by the A chain is truly existing.
Because the network access method is a permission chain, the network access method has higher requirements on node access and data authority, and the data isolation between chains cannot be damaged in the communication process.
Disclosure of Invention
Based on the technical problems, the invention designs and realizes the value exchange method between heterogeneous license chains with existence certification, the method can perform existence certification on the inter-chain transaction, unify the communication protocol between heterogeneous license chains, and realize the requirements of reality, reliability, value peering, transaction consistency and the like of the inter-chain information interaction.
The invention aims at realizing the following technical scheme: a heterogeneous license chain value exchange method with presence evidence includes that two parties of value exchange are heterogeneous license chains, each license chain is provided with at least one cross-chain communication proxy node, each proxy node can be connected with any node in the license chain, the proxy nodes are responsible for registration, message signature, transaction routing, verification signature, verification of transaction existence and transaction consistency between the license chains, communication interaction is carried out between the heterogeneous license chains through a cross-chain network communication module, and a cross-chain standard interaction protocol CSCP and a standard interface for block chain cross-chain network communication are designed in the cross-chain network communication module;
implementing a transaction presence proof for inter-chain transactions by merck proof, comprising:
step 1, acquiring a merck tree of a block hash: if the license chain block is stored by adopting the merck tree structure, directly acquiring the merck tree of the current transaction as the existence evidence of the transaction; if the license chain block is not stored in the merck tree structure, generating the merck tree evidence of the block, specifically: calculating the hash value of the block, taking the hash value as a binary tree leaf child node, taking the parent node of the tree leaf node as the hash value of the hash values of the two tree leaf nodes, and calculating the hash value of the root node by analogy;
step 2: the generated or obtained merck tree is used as a communication message to be packaged, so that the merck tree accords with the CSCP;
step 3: verifying presence certificates, which are executed in a built-in intelligent contract, specifically: acquiring a hash value of the transaction; acquiring a verification path of the transaction in the merck tree, and calculating a root hash of the merck tree; the calculated root hash is compared with the merck tree root of the presence evidence in CSCP messages, and if the same, the transaction is proved to be truly present, otherwise, the transaction is not present.
Furthermore, the method adopts a decentralised management mechanism comprising certificate issuing authorization, registration management, cross-chain standard interaction protocol and standard interface, and is implemented on a cross-chain communication proxy node.
Further, a certificate management module is arranged on the cross-link communication proxy node, the certificate management module generates a public and private key pair and a cross-link root certificate of cross-link communication, then the public key is given to a destination link needing communication, and after the destination link is subjected to audit and authorization, the cross-link certificate is issued by using the root certificate of the destination link as a source link; after the authorization certificate of the destination chain is obtained, the source chain is registered, the registration content comprises identity information, authority information, signature strategies and verification rules, and cross-chain authority management and control, transaction routing and validity verification are realized through a registration management mechanism.
Further, the cross-chain standard interaction protocol CSCP converts blockchain messages of different architectures into a unified cross-chain bus message, which can meet the communication requirements between heterogeneous license chains, and the main fields of the protocol include: version, protocol version; sourceChainID, source chain address; destChainID, destination chain address; cross-link transaction content; timestamp, timestamp; signature, agent node signature; cert, cross-chain transaction node certificate; proof, presence verification information; originifo, raw transaction information is traded across chains; extra, user extension field; the CrossschainPayload is serialized into byte types through json, and corresponding structures are resolved through json when the corresponding structures are transferred to a destination chain according to a blockchain architecture of a cross-chain transaction; the standard interface is used for information interaction between license chains, and comprises the following steps: the system comprises a transaction conversion interface, a transaction sending interface, a transaction receiving interface, a transaction verification interface, a registration chain interface, an update chain interface and a cancellation chain interface, wherein the transaction conversion interface is used for adapting heterogeneous transaction messages to different frameworks through a CSCP (physical control processor) aiming at heterogeneous permission chains.
Further, the method guarantees the transaction consistency of value exchange among heterogeneous license chains through a time lock, a presence certificate and a transaction rollback mechanism, and the transaction is unlocked after verification of the presence certificate in a threshold time, otherwise, the rollback is performed automatically by intelligent contracts in the time lock, and the intelligent contracts are not interfered by human.
Further, to ensure transaction consistency for value exchanges between heterogeneous license chains, the following operations are performed at the proxy node of the source chain license chain and the proxy node of the destination chain license chain:
the proxy node of the source chain generates a cross-chain transaction proof and a cross-chain transaction abstract signature, locks the transaction alpha, and initiates a cross-chain transaction request to the proxy node of the destination chain;
after receiving the cross-chain transaction request, the proxy node of the destination chain verifies the locked transaction alpha, if the verification is passed, locks the transaction beta, generates a transaction beta locking evidence, and sends the transaction beta locking evidence to the proxy node of the source chain;
the agent node of the source chain receives and verifies the transaction beta locking evidence, and if the verification is passed, a cross-chain transaction request is initiated to the destination chain, wherein the cross-chain transaction request comprises the cross-chain transaction evidence and a cross-chain transaction abstract signature;
the agent node of the destination chain receives the cross-chain transaction request, verifies the cross-chain transaction evidence and the cross-chain transaction abstract signature, unlocks the transaction beta if verification is passed, submits the cross-chain transaction, and returns a certificate for submitting the cross-chain transaction to the agent node of the source chain;
the proxy node of the source chain receives and verifies the submitted cross-chain transaction certificate, and if the verification is passed, the transaction alpha is unlocked, so that the consistency operation of the transaction alpha and the transaction beta is realized;
in the verification process, verifying whether the transaction beta is unlocked or not in a threshold time by the agent node of the target chain, and executing the cross-chain transaction if the transaction beta is unlocked; otherwise, rolling back the cross-chain transaction to release the transaction beta; the agent node of the source chain verifies whether the transaction alpha is unlocked or not in a threshold time, and if the transaction alpha is unlocked, the cross-chain transaction is executed; otherwise, rolling back the cross-chain transaction, and releasing the transaction alpha;
through transaction locking and interaction, the fact that the transaction alpha and the transaction beta are unlocked simultaneously or not unlocked simultaneously is guaranteed, and the necessary condition of unlocking the transaction locking is that the verification of the certification of the transaction through the opposite end chain is verified.
Further, the information transfer is ensured not to be interfered by human beings through the built-in intelligent contract, the simultaneous success or the simultaneous failure of the transaction locked by the two communication parties is ensured, and the transaction consistency is ensured to be realized with the built-in intelligent contract as follows:
a user initiates a value exchange request to a source license chain agent node; the source license chain agent node processes the cross-chain value exchange request; after receiving the cross-chain value exchange request, the intelligent contract built in the source chain generates a cross-chain transaction existence certificate and signature; the source chain starts cross-chain transaction locking, and the transaction alpha is locked; the source chain sends the lock certificate to the destination chain;
the intelligent contract built in the destination chain verifies the locking evidence and starts transaction locking beta; the destination chain sends transaction beta-lock credentials to the source chain;
the source chain verifies the transaction beta locking evidence and sends the cross-chain transaction existence evidence and signature to the destination chain;
the destination chain verifies that the source chain cross-chain transaction has evidence and signature, and the transaction beta is unlocked after passing and the cross-chain transaction is submitted; the destination chain sends the presence certificate and signature of the cross-chain transaction to the source chain;
the source chain verifies that the cross-chain transaction sent by the destination chain has a certificate and signature, and after verification is passed, the transaction alpha is unlocked and the cross-chain transaction is submitted.
Judging whether the transaction locking is unlocked or not by the source chain and the destination chain within a threshold time, executing the transaction to exchange value if the transaction locking is unlocked, otherwise, rolling back the transaction and unlocking the transaction locking;
further, the heterogeneous license chain value exchange includes the steps of:
(1) Certificate issuance: the certificate management module issues a cross-link root certificate and a public and private key pair to a private chain cross-link proxy node according to requirements;
(2) Chain registration: the method comprises the steps that a source chain of a permission chain carries out cross-chain registration on a destination chain, the source chain mainly comprises identity information and verification rules of the source chain, after the registration is successful, a verification engine module of the destination chain can generate the verification rules of the chain, and the identity information and the chain information of the source chain are stored in a registry of the destination chain to be stored in a lasting mode;
(3) Identity and authentication rule management: the verification rule is used for verifying the existence and the validity of the cross-chain transaction, can verify the identity of the chain when the heterogeneous license chains communicate, and is matched with the verification rule of the corresponding chain to verify the existence and the validity of the transaction;
(4) Inspection: checking whether a source chain generating the cross-chain transaction is registered and has relevant access rights;
(5) Verification: matching verification rules in a registry of a destination chain through source chain identity information of the transaction, and then inputting verification information of the transaction, the verification rules and the cross-chain transaction into a verification engine for verification;
(6) The execution stage: the cross-chain transaction enters an execution stage after passing verification, mainly comprises transaction existence certification and transaction consistency assurance, and if the transaction locking is unlocked within a threshold time, the cross-chain transaction is executed, so that the transfer between heterogeneous permission chains is realized;
(7) And (5) returning a result: the final destination chain constructs the result into return information that is sent to the source chain.
Furthermore, the authority control of the data access between the license chains is mainly performed through the registration information, related authorities are designated during registration, including read-write authorities, information acquisition ranges and contract method calling authorities, and the control management of the data access authority of the license chains can be realized in the inspection stage.
Further, the message passing process between heterogeneous license chains is as follows:
the source chain of the permission chain sends a cross-chain message to the proxy node;
the proxy node of the source chain of the permission chain converts the source chain message type into a CSCP message, signs the CSCP message, and sends the CSCP message to the proxy node of the destination chain of the permission chain;
the proxy node of the destination chain of the permission chain receives the CSCP message, performs signature verification, identity verification, authority verification and presence verification on the CSCP message, converts the CSCP message into a transaction message in a destination chain format, and sends a cross-chain transaction to the destination chain of the permission chain;
and allowing the chain of the chain destination to process the cross-chain message and returning a processing result.
The beneficial effects of the invention are as follows: the method can carry out existence certification on the inter-chain transaction, unify the communication protocol among heterogeneous permission chains, and meet the requirements of reality, reliability, value peering, transaction consistency and the like of the inter-chain information interaction. The method of the invention can be extended in parallel between the license chains, has good expansibility, enables the value exchange between heterogeneous license chains, is extended from a single scene or connected or extended to a multi-service scene, is extended from a single service body or connected to a multi-service body, and can greatly extend the application scene. The invention ensures the transaction consistency of value exchange among heterogeneous permission chains through a time lock, a presence evidence and a transaction rollback mechanism. The invention realizes the decentralization cross-chain scheme through registration management, has substantial difference compared with a relay chain or notary mode, and meets the requirement of block chain decentralization management.
Drawings
FIG. 1 is a diagram of an overall architecture of heterogeneous license chain value exchange provided by an embodiment of the present invention;
FIG. 2 is a schematic diagram of a merck tree according to an embodiment of the present invention;
FIG. 3 is a flow chart of an implementation of a transaction consistency assurance and built-in smart contract provided by an embodiment of the present invention;
FIG. 4 is an overall flowchart of heterogeneous license chain value exchange provided by an embodiment of the present invention;
fig. 5 is a flowchart of heterogeneous license chain messaging according to an embodiment of the present invention.
Detailed Description
For a better understanding of the technical solutions of the present application, embodiments of the present application are described in detail below with reference to the accompanying drawings.
It should be understood that the described embodiments are merely some, but not all, of the embodiments of the present application. All other embodiments, based on the embodiments herein, which would be apparent to one of ordinary skill in the art without making any inventive effort, are intended to be within the scope of the present application.
The terminology used in the embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
The invention designs and realizes a value exchange method between heterogeneous license chains with existence certification, which can carry out the existence certification on the inter-chain transaction, unify the communication protocol between the heterogeneous license chains, and realize the requirements of reality, reliability, value peering, transaction consistency and the like of the inter-chain information interaction.
The invention provides a method for exchanging value between heterogeneous license chains with presence evidence, which can be extended in parallel between the license chains, has good expansibility, enables the value between the heterogeneous license chains to be exchanged, is extended or connected to a multi-service scene from a single scene or a single service body, and can greatly extend application scenes.
The invention realizes heterogeneous chain information transfer by a decentralization management mode, and the decentralization management mainly comprises certificate issuing authorization, registration management, standard cross-chain communication protocol and standard communication interface method.
The invention performs the existence verification by a cross-chain existence verification method, and the cross-chain existence verification method mainly comprises the steps of constructing the merck tree verification, packaging the communication message and verifying the existence.
The invention ensures the transaction consistency of value exchange among heterogeneous license chains through a time lock, a presence proof and a transaction rollback mechanism, and unlocks the transaction when the presence proof is verified within a threshold time, otherwise rolls back, and ensures the transaction consistency of heterogeneous license chain communication.
The general architecture of the present invention is shown in fig. 1. The two communication parties are heterogeneous license chains, each license chain is provided with at least one cross-chain communication agent node, each cross-chain can be connected with any node in the license chain, and the heterogeneous license chains are communicated and interacted through a cross-chain network communication module;
1. cross-chain communication proxy node cross-point
The cross-link message is transmitted to the cross-link node of the destination chain by a transmitting interface of the cross-link after the inside of the license chain is commonly recognized, and then is transmitted to the destination chain for relevant operation. The communication process adopts TLS encryption, so that the information transfer security can be ensured. Cross-sagent is mainly responsible for registration between license chains, message signing, transaction routing, signature verification, transaction existence verification, transaction consistency assurance, and the like.
2. Cross-link network communication module Crosshub
Cross-chain standard interaction protocol CSCP (crosschain standard communication protocol) is designed in Crosshub and is mainly used for block chain inter-chain network communication.
Heterogeneous license chain communication can meet the requirement of cross-chain call among heterogeneous chains through a CSCP bus protocol, and the protocol converts block chain messages of different architectures into unified cross-chain bus messages, so that the communication requirement among heterogeneous license chains can be met. The protocol main fields are as follows:
wherein the cross-chain transaction content CrossschainPayload is serialized into byte types through json, which can be determined according to the blockchain architecture of the cross-chain transaction, and the corresponding structure is parsed through json when being transferred to the destination chain.
The CSCP protocol defines a standard interface for information interaction between license chains. The main steps are as follows:
the transaction conversion interface TxToCSCP\CSCPToTx aims at a heterogeneous license chain and can adapt heterogeneous transaction messages to respective architectures through a bus standard protocol CSCP;
a transaction transmitting interface SendTx, which is used for transmitting information from a source chain to a destination chain;
the transaction receiving interface receiving TX is used for receiving a cross-chain transaction by the destination chain;
the transaction verification interface verifyicscp is used for verifying transaction information;
a registration link port RegistChain is used for identity registration;
updating a chain interface updatchain for updating chain identity information;
and the cancellation link port DeleteCHain is used for canceling the link identity information.
3. Decentralized management mechanism
The decentralized management mainly comprises certificate issuing authorization, registration management, standard cross-chain communication protocol and standard communication interface method, and the mechanisms are realized on a cross-chain agent node cross-linking agent.
And a certificate management module is arranged on the cross-link agent node cross-link agent, the certificate management module can generate a public and private key pair and a cross-link root certificate of cross-link communication, then the public key is given to a destination link needing communication, and after the destination link is subjected to audit and authorization, the cross-link certificate is issued by using the root certificate of the destination link as a source link. Thus, the cryptographic mode is adopted to ensure the identity verification in the process of cross-chain communication and the security.
After the authorization certificate of the destination chain is obtained, registration is carried out, and registration contents mainly comprise identity information, authority information, signature strategies and verification rules, and cross-chain authority management and control, transaction routing, validity verification and the like are realized through a registration management mechanism.
The cross-chain standard communication protocol CSCP (crosschain standard communication protocol) and the standard communication interface method realize information communication between heterogeneous license chains.
The invention realizes the decentralization cross-chain scheme through registration management, has substantial difference compared with a relay chain or notary mode, and meets the requirement of block chain decentralization management.
4. Cross-chain transaction existence verification method
1. Acquiring the Merck tree of the block hash, and constructing and generating the Merck tree without the Merck tree
(1) If the license chain block is stored in the merck tree structure, the merck of the current transaction is directly acquired
A tree as a presence proof for the transaction;
(2) because of the heterogeneous nature of the license chains, some blockchain platform block stores do not employ the merck tree structure,
at this time, the block needs to be traversed, and the merck tree of the block is generated by itself, and the specific generation method is as follows:
a) Calculating a hash value of the block and taking the hash value as a binary tree leaf child node;
b) The father node of the leaf node is the hash value of the hash values of the two leaf nodes;
c) And similarly calculates the root node hash value.
2. Packaging into standard cross-chain transaction message, conforming to CSCP
The generated or obtained merck tree is used as a communication message to be packaged, so that the merck tree accords with the CSCP protocol standard;
3. verifying presence certificates, executing in built-in smart contracts
The invention designs a built-in intelligent contract which is used for verifying existence certification and unlocking a locking transaction. The specific verification process comprises the following steps:
A. acquiring a hash value of the transaction;
B. acquiring a verification path of the transaction in the merck tree, and calculating a root hash of the merck tree;
C. comparing the calculated root hash with the merck tree root of the presence evidence in the CSCP message,
if the same, the transaction is proved to be truly present, otherwise, not present.
In the present invention, presence proof of a cross-chain transaction is implemented by merck proof. The structure of the merck tree is shown in fig. 2, where each non-leaf node is marked by its child node's hash value, and the root node of the tree is called the merck root. Fig. 2 shows the merck tree structure of a block X, and if it is verified whether the transaction tx_d is in the block, the entire block need not be acquired, but only the transactions tx_d, h_ab, h_c and merkle root need be provided. The specific process is as follows:
a. calculating a hash according to the transaction D to obtain H_D;
b. calculating hash according to the H_C and the H_D to obtain H_CD;
c. calculating hash according to the H_AB and the H_CD to obtain H_ABCD;
d. comparing H_ABCD with the merkle root, if the two are the same, proving that the transaction Tx_D exists in the block, otherwise, indicating that the transaction Tx_D does not exist.
The communication between the license chains needs presence proof, and the transaction information needs to be provided with verification information, wherein the verification information refers to initial hash values used in the verification process, namely H_AB, H_C, merkle root and transaction information Tx_D.
5. Transaction consistency assurance
Unlocking the transaction lock according to the presence evidence, automatically executing the intelligent contract in the time lock, avoiding human intervention and ensuring the transaction consistency.
The following operations are performed at the proxy node of the license chain a and the proxy node of the license chain B:
1. the agent node of the license chain A generates a cross-chain transaction proof and a cross-chain transaction digest signature, locks the transaction alpha, and initiates a cross-chain transaction request to the agent node of the license chain B;
2. after receiving the cross-chain transaction request, the proxy node of the license chain B verifies the locked transaction alpha, if the verification is passed, locks the transaction beta, generates a transaction beta locking evidence, and sends the transaction beta locking evidence to the proxy node of the license chain A;
3. the agent node of the license chain A receives and verifies the transaction beta-locking evidence, and if the transaction beta-locking evidence passes the verification, a cross-chain transaction request is initiated to the license chain B, wherein the cross-chain transaction request comprises the cross-chain transaction evidence and a cross-chain transaction digest signature;
4. the agent node of the permission chain B receives the cross-chain transaction request, verifies the cross-chain transaction evidence and the cross-chain transaction abstract signature, unlocks the transaction beta if verification is passed, submits the cross-chain transaction, and returns a submitted cross-chain transaction credential to the agent node of the permission chain A;
5. the proxy node of the permission chain A receives and verifies the submitted cross-chain transaction credentials, and if the verification is passed, the transaction alpha is unlocked, so that the consistency operation of the transaction alpha and the transaction beta is realized.
During the verification process:
the agent node of the permission chain B verifies whether the transaction beta is unlocked or not in a threshold time, and if the transaction beta is unlocked, the cross-chain transaction is executed; otherwise, rolling back the cross-chain transaction to release the transaction beta;
the agent node of the permission chain A verifies whether the transaction alpha is unlocked or not in a threshold time, and if the transaction alpha is unlocked, the cross-chain transaction is executed; otherwise, rolling back the cross-chain transaction, and releasing the transaction alpha;
through transaction locking and interaction, the fact that the transaction alpha and the transaction beta are unlocked simultaneously or not unlocked simultaneously is guaranteed, and the necessary condition of unlocking the transaction locking is that the verification of the certification of the transaction through the opposite end chain is verified. And a time locking mechanism is added, so that the transaction consistency of value exchange among heterogeneous license chains is ensured. Such information transfer may be a value asset on the chain while meeting read-write consistency requirements. Compared with Ha Xisuo, the invention realizes unlocking of the transaction through the transaction existence evidence of the chain, improves the efficiency and ensures the true existence of the transaction.
Through the built-in intelligent contract, the information transmission is ensured not to be interfered by human, the transaction locked by both communication parties is ensured to be successful or failed simultaneously, and the transaction consistency is ensured.
The main functions and flow of the transaction consistency assurance and built-in intelligent contract are shown in fig. 3, including:
1. a user initiates a value exchange request to a source chain agent node;
2. the source license chain agent node processes the cross-chain value exchange request;
3. after receiving the cross-chain value exchange request, the intelligent contract built in the source chain generates a cross-chain transaction existence certificate and signature;
4. the source chain starts a cross-chain transaction lock, locking transaction α (which may be a value asset);
5. the source chain sends the lock certificate to the destination chain;
6. the intelligent contract built in the destination chain verifies the locking evidence and starts transaction locking beta;
7. the destination chain sends transaction beta-lock credentials to the source chain;
8. the source chain verifies the transaction beta locking evidence and sends the cross-chain transaction existence evidence and signature to the destination chain;
9. the destination chain verifies that the source chain cross-chain transaction has evidence and signature, and the transaction beta is unlocked after passing and the cross-chain transaction is submitted;
10. the destination chain sends the presence certificate and signature of the cross-chain transaction to the source chain;
11. the source chain verifies that the cross-chain transaction sent by the destination chain has a certificate and a signature, and after verification is passed, the transaction alpha is unlocked and the cross-chain transaction is submitted;
12. judging whether the transaction locking is unlocked or not by the source chain and the destination chain within a threshold time, executing the transaction to exchange value if the transaction locking is unlocked, otherwise, rolling back the transaction and unlocking the transaction locking;
based on the design of the five parts, the key flow of the value exchange of the heterogeneous license chain is shown in fig. 4, and comprises the following steps:
(1) Certificate issuance
The certificate management module issues a cross-link root certificate and a public-private key pair to the private chain cross-link proxy node according to the requirement. The specific issuing rules are as follows: assuming that the chain A and the chain B are communicated with each other, the chain A root certificate adopts a chain B public key to issue a chain crossing certificate to the chain B; and issuing a cross-chain certificate to the A chain by the B chain root certificate by adopting the A chain public key, and deploying the certificate and public-private key pair on a cross-chain communication proxy node. The B chain can use the root certificate to verify the cross-chain certificate of the message sent by the a chain, and the a chain can use the root certificate to verify the cross-chain certificate of the message sent by the B chain; and meanwhile, the signature of the message digest is verified, so that the cross-chain authority management is achieved, and the communication safety is ensured.
The invention designs and realizes the certificate management module certManage, which is mainly used for generating and managing related CA certificates and digital certificates, and comprises the functions of certificate issue, public and private key generation, certificate check, certificate revocation and the like.
(2) Chain registration
The source chain of the permission chain carries out cross-chain registration to the target chain, and the source chain mainly comprises identity information, verification rules and the like of the source chain, after the registration is successful, a verification engine module of the target chain can generate verification rules for the chain, and then the legitimacy of the cross-chain transaction is verified according to the verification rules. Different validation rules may be generated for different structured license chains. And storing the identity information and the chain information of the source chain into a registry of the destination chain for persistent storage. The verification engine of the destination chain cross-sagent checks the information registered by the source chain.
The license chain needs to be authorized for license, so the control of data rights on the chain is important. The invention allows the authority control of the data access among the chains, mainly carries out the authority control management through the registration information, and designates the relevant authorities such as the read-write authorities, the information acquisition range, the contract method calling authorities and the like during the registration. The control management of the permission chain data access rights can be realized in the checking stage.
The cross-linking operation supports chain updating and cancellation operation, the overall flow is similar to the registration flow, and after the updating and cancellation information is checked and verified, the content of the registration table is updated.
(3) Identity and authentication rule management
The validation rules are used by the validation engine to validate the presence and validity of cross-chain transactions. Because the heterogeneous nature of each chain causes that the verification rule of each chain is different, the verification engine of the cross-point cannot provide a unified verification rule for each chain, when the source chain is required to register with the destination chain, the cross-point of the destination chain performs deployment and registration of the corresponding verification rule, and records the identity information of the registered chain into the registry. The identity of the chain can be verified when the license chain communicates, the existence and the validity of the transaction are verified by matching with the verification rule of the corresponding chain, and the related transaction is executed after the verification is passed.
(4) Inspection stage
The checking work of the cross-chain transaction includes: whether the source chain generating the cross-chain transaction is registered includes source chain identity information, verification rules, whether the source chain has relevant access rights, and the like.
(5) Verification stage
Checking that the cross-chain transaction passes through enters a verification stage, the verification stage is executed by a verification engine, verification rules are matched in a registry of a destination chain through source chain identity information of the transaction, and then verification information, the verification rules and the cross-chain transaction of the transaction are input into the verification engine, and verification is performed. After verification is passed, the transaction will enter the execution phase.
(6) Execution phase
The cross-chain transaction enters an execution stage after passing verification, and the execution stage mainly comprises the transaction existence certification, the transaction consistency assurance method and the interaction flow. And if the transaction lock is unlocked within the threshold time, executing the cross-chain transaction to realize the transfer between heterogeneous permission chains.
(7) Result return
The final destination chain constructs the result into return information that is sent to the source chain.
In one embodiment, the messaging flow is as shown in FIG. 5, comprising the steps of:
1. the license chain A sends a cross-chain message to the proxy node cross-linking agent;
2. the cross-linking agent of the license chain A converts the type of the A-chain message into a bus standard communication message CSCP;
3. the cross-match of license chain a signs CSCP messages;
4. the cross-point of the license chain A sends the CSCP message to the cross-point of the B chain;
5. the cross-match of the license chain B receives the CSCP message;
6. the cross-match of the license chain B performs signature verification on the CSCP message;
7. the cross-match of the license chain B performs identity verification on the CSCP message;
8. the cross-match of the license chain B performs authority verification on the CSCP message;
9. the cross-match of the license chain B performs existence verification on the CSCP message;
10. the cross-point of the permission chain B converts the CSCP message into a transaction message in a B chain format;
11. the cross-link transaction of the permission chain B is sent to the B chain by the cross-link agent;
12. permit chain B to process cross-chain messages;
13. the license chain B returns the processing result.
In one embodiment, a computer device is provided that includes a memory and a processor, where the memory stores computer readable instructions that, when executed by the processor, cause the processor to perform the steps in the heterogeneous license chain value exchange method with presence attestation in the embodiments described above.
In one embodiment, a storage medium storing computer readable instructions that, when executed by one or more processors, cause the one or more processors to perform the steps in the heterogeneous license chain value exchange method with presence attestation in the embodiments described above is presented. Wherein the storage medium may be a non-volatile storage medium.
Those of ordinary skill in the art will appreciate that all or part of the steps in the various methods of the above embodiments may be implemented by a program to instruct related hardware, the program may be stored in a computer readable storage medium, and the storage medium may include: read Only Memory (ROM), random access Memory (RAM, random Access Memory), magnetic or optical disk, and the like.
The foregoing description of the preferred embodiment(s) is (are) merely intended to illustrate the embodiment(s) of the present invention, and it is not intended to limit the embodiment(s) of the present invention to the particular embodiment(s) described.

Claims (6)

1. A heterogeneous license chain value exchange method with presence evidence is characterized in that two parties of value exchange are heterogeneous license chains, each license chain is provided with at least one cross-chain communication proxy node, each proxy node can be connected with any node in the license chain, the proxy nodes are responsible for registration, message signature, transaction routing, verification signature, verification of transaction existence and transaction consistency between the license chains, communication interaction is carried out between the heterogeneous license chains through a cross-chain network communication module, and a cross-chain standard interaction protocol CSCP and a standard interface for block chain cross-chain network communication are designed in the cross-chain network communication module;
implementing a transaction presence proof for inter-chain transactions by merck proof, comprising:
step 1, acquiring a merck tree of a block hash: if the license chain block is stored by adopting the merck tree structure, directly acquiring the merck tree of the current transaction as the existence evidence of the transaction; if the license chain block is not stored in the merck tree structure, generating the merck tree evidence of the block, specifically: calculating the hash value of the block, taking the hash value as a binary tree leaf child node, taking the parent node of the tree leaf node as the hash value of the hash values of the two tree leaf nodes, and calculating the hash value of the root node by analogy;
step 2: the generated or obtained merck tree is used as a communication message to be packaged, so that the merck tree accords with the CSCP;
step 3: verifying presence certificates, which are executed in a built-in intelligent contract, specifically: acquiring a hash value of the transaction; acquiring a verification path of the transaction in the merck tree, and calculating a root hash of the merck tree; comparing the calculated root hash with the merck tree root of the presence evidence in the CSCP message, if the root hash is the same, proving that the transaction is truly present, otherwise, the transaction is not present;
the method ensures the transaction consistency of value exchange among heterogeneous permission chains through a time lock, a presence proof and a transaction rollback mechanism, and verifies that the transaction is unlocked when the presence proof is passed in a threshold time, otherwise, rollback is automatically executed by intelligent contracts in the time lock, and the intelligent contracts are not interfered by human beings;
to ensure the transactional consistency of the value exchange between heterogeneous license chains, the following operations are performed at the proxy node of the source chain license chain and the proxy node of the destination chain license chain:
the proxy node of the source chain generates a cross-chain transaction proof and a cross-chain transaction abstract signature, locks the transaction alpha, and initiates a cross-chain transaction request to the proxy node of the destination chain;
after receiving the cross-chain transaction request, the proxy node of the destination chain verifies the locked transaction alpha, if the verification is passed, locks the transaction beta, generates a transaction beta locking evidence, and sends the transaction beta locking evidence to the proxy node of the source chain;
the agent node of the source chain receives and verifies the transaction beta locking evidence, and if the verification is passed, a cross-chain transaction request is initiated to the destination chain, wherein the cross-chain transaction request comprises the cross-chain transaction evidence and a cross-chain transaction abstract signature;
the agent node of the destination chain receives the cross-chain transaction request, verifies the cross-chain transaction evidence and the cross-chain transaction abstract signature, unlocks the transaction beta if verification is passed, submits the cross-chain transaction, and returns a certificate for submitting the cross-chain transaction to the agent node of the source chain;
the proxy node of the source chain receives and verifies the submitted cross-chain transaction certificate, and if the verification is passed, the transaction alpha is unlocked, so that the consistency operation of the transaction alpha and the transaction beta is realized;
in the verification process, verifying whether the transaction beta is unlocked or not in a threshold time by the agent node of the target chain, and executing the cross-chain transaction if the transaction beta is unlocked; otherwise, rolling back the cross-chain transaction to release the transaction beta; the agent node of the source chain verifies whether the transaction alpha is unlocked or not in a threshold time, and if the transaction alpha is unlocked, the cross-chain transaction is executed; otherwise, rolling back the cross-chain transaction, and releasing the transaction alpha;
through transaction locking and interaction, the fact that the transaction alpha and the transaction beta are unlocked simultaneously or not unlocked simultaneously is guaranteed, and the necessary condition of unlocking the transaction locking is that the certification of the opposite-end chain transaction is verified;
the information transfer is ensured not to be interfered by human beings through the built-in intelligent contract, the simultaneous success or the simultaneous failure of the transaction locked by the two communication parties is ensured, and the transaction consistency assurance and the built-in intelligent contract are realized as follows:
a user initiates a value exchange request to a source license chain agent node; the source license chain agent node processes the cross-chain value exchange request; after receiving the cross-chain value exchange request, the intelligent contract built in the source chain generates a cross-chain transaction existence certificate and signature; the source chain starts cross-chain transaction locking, and the transaction alpha is locked; the source chain sends the lock certificate to the destination chain;
the intelligent contract built in the destination chain verifies the locking evidence and starts transaction locking beta; the destination chain sends transaction beta-lock credentials to the source chain;
the source chain verifies the transaction beta locking evidence and sends the cross-chain transaction existence evidence and signature to the destination chain;
the destination chain verifies that the source chain cross-chain transaction has evidence and signature, and the transaction beta is unlocked after passing and the cross-chain transaction is submitted; the destination chain sends the presence certificate and signature of the cross-chain transaction to the source chain;
the source chain verifies that the cross-chain transaction sent by the destination chain has a certificate and a signature, and after verification is passed, the transaction alpha is unlocked and the cross-chain transaction is submitted;
judging whether the transaction locking is unlocked or not by the source chain and the destination chain within a threshold time, executing the transaction to exchange value if the transaction locking is unlocked, otherwise, rolling back the transaction and unlocking the transaction locking;
the message passing process between heterogeneous license chains is as follows:
the source chain of the permission chain sends a cross-chain message to the proxy node;
the proxy node of the source chain of the permission chain converts the source chain message type into a CSCP message, signs the CSCP message, and sends the CSCP message to the proxy node of the destination chain of the permission chain;
the proxy node of the destination chain of the permission chain receives the CSCP message, performs signature verification, identity verification, authority verification and presence verification on the CSCP message, converts the CSCP message into a transaction message in a destination chain format, and sends a cross-chain transaction to the destination chain of the permission chain;
and allowing the chain of the chain destination to process the cross-chain message and returning a processing result.
2. The heterogeneous license chain value exchange method with presence certificates according to claim 1, wherein the method is implemented on a cross-chain communication proxy node by adopting a decentralised management mechanism including certificate issuing authority, registration management, cross-chain standard interaction protocol and standard interface.
3. The heterogeneous license chain value exchange method with presence certificate according to claim 1, wherein a certificate management module is arranged on the cross-chain communication proxy node, the certificate management module generates a public and private key pair and a cross-chain root certificate of cross-chain communication, then the public key is given to a destination chain needing communication, and after the destination chain is subjected to audit and authorization, the cross-chain certificate is issued by using the root certificate of the destination chain as a source chain; after the authorization certificate of the destination chain is obtained, the source chain is registered, the registration content comprises identity information, authority information, signature strategies and verification rules, and cross-chain authority management and control, transaction routing and validity verification are realized through a registration management mechanism.
4. The heterogeneous license chain value exchange method with presence certificate according to claim 1, wherein a cross-chain standard interaction protocol CSCP converts blockchain messages of different architectures into a unified cross-chain bus message capable of meeting the communication requirements between heterogeneous license chains, and the protocol main fields include: version, protocol version; sourceChainID, source chain address; destChainID, destination chain address; cross-link transaction content; timestamp, timestamp; signature, agent node signature; cert, cross-chain transaction node certificate; proof, presence verification information; originifo, raw transaction information is traded across chains; extra, user extension field; the CrossschainPayload is serialized into byte types through json, and corresponding structures are resolved through json when the corresponding structures are transferred to a destination chain according to a blockchain architecture of a cross-chain transaction; the standard interface is used for information interaction between license chains, and comprises the following steps: the system comprises a transaction conversion interface, a transaction sending interface, a transaction receiving interface, a transaction verification interface, a registration chain interface, an update chain interface and a cancellation chain interface, wherein the transaction conversion interface is used for adapting heterogeneous transaction messages to different frameworks through a CSCP (physical control processor) aiming at heterogeneous permission chains.
5. The heterogeneous license chain value exchange method with presence certificates according to claim 1, wherein the heterogeneous license chain value exchange comprises the steps of:
(1) Certificate issuance: the certificate management module issues a cross-link root certificate and a public and private key pair to a private chain cross-link proxy node according to requirements;
(2) Chain registration: the method comprises the steps that a source chain of a permission chain carries out cross-chain registration on a destination chain, the source chain mainly comprises identity information and verification rules of the source chain, after the registration is successful, a verification engine module of the destination chain can generate the verification rules of the chain, and the identity information and the chain information of the source chain are stored in a registry of the destination chain to be stored in a lasting mode;
(3) Identity and authentication rule management: the verification rule is used for verifying the existence and the validity of the cross-chain transaction, can verify the identity of the chain when the heterogeneous license chains communicate, and is matched with the verification rule of the corresponding chain to verify the existence and the validity of the transaction;
(4) Inspection: checking whether a source chain generating the cross-chain transaction is registered and has relevant access rights;
(5) Verification: matching verification rules in a registry of a destination chain through source chain identity information of the transaction, and then inputting verification information of the transaction, the verification rules and the cross-chain transaction into a verification engine for verification;
(6) The execution stage: the cross-chain transaction enters an execution stage after passing verification, mainly comprises transaction existence certification and transaction consistency assurance, and if the transaction locking is unlocked within a threshold time, the cross-chain transaction is executed, so that the transfer between heterogeneous permission chains is realized;
(7) And (5) returning a result: the final destination chain constructs the result into return information that is sent to the source chain.
6. The heterogeneous license chain value exchange method with presence certificates according to claim 1, wherein the control of the rights of the data access between the license chains is mainly performed by the control management of the rights through registration information, the relevant rights are designated during the registration, including the read-write rights, the information acquisition range and the contract method calling rights, and the control management of the rights of the data access of the license chains is realized in the inspection stage.
CN202011458000.8A 2020-12-10 2020-12-10 Heterogeneous license chain value exchange method with presence evidence Active CN112581128B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011458000.8A CN112581128B (en) 2020-12-10 2020-12-10 Heterogeneous license chain value exchange method with presence evidence

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011458000.8A CN112581128B (en) 2020-12-10 2020-12-10 Heterogeneous license chain value exchange method with presence evidence

Publications (2)

Publication Number Publication Date
CN112581128A CN112581128A (en) 2021-03-30
CN112581128B true CN112581128B (en) 2024-04-05

Family

ID=75132143

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011458000.8A Active CN112581128B (en) 2020-12-10 2020-12-10 Heterogeneous license chain value exchange method with presence evidence

Country Status (1)

Country Link
CN (1) CN112581128B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114240439B (en) * 2022-02-28 2022-05-13 北京邮电大学 Cross-chain transaction rollback method and device based on threshold signature and double-hash chain mode
CN114331447B (en) * 2022-03-15 2022-05-31 北京溪塔科技有限公司 Cross-link message submitting method and device

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900585A (en) * 2018-06-15 2018-11-27 浙江华信区块链科技服务有限公司 Across chain transaction consistency implementation method
CN111416808A (en) * 2020-03-13 2020-07-14 财付通支付科技有限公司 Cross-block-chain data mutual storage method, device, equipment and storage medium
CN111598566A (en) * 2020-04-30 2020-08-28 厦门潭宏信息科技有限公司 Network payment system based on mixed cross-chain
CN111654465A (en) * 2020-04-17 2020-09-11 全球能源互联网研究院有限公司 Power service cross-domain credible authentication system and method based on block chain
CN111769957A (en) * 2020-09-02 2020-10-13 百度在线网络技术(北京)有限公司 Block chain cross-chain query method, device, equipment and storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108900585A (en) * 2018-06-15 2018-11-27 浙江华信区块链科技服务有限公司 Across chain transaction consistency implementation method
CN111416808A (en) * 2020-03-13 2020-07-14 财付通支付科技有限公司 Cross-block-chain data mutual storage method, device, equipment and storage medium
CN111654465A (en) * 2020-04-17 2020-09-11 全球能源互联网研究院有限公司 Power service cross-domain credible authentication system and method based on block chain
CN111598566A (en) * 2020-04-30 2020-08-28 厦门潭宏信息科技有限公司 Network payment system based on mixed cross-chain
CN111769957A (en) * 2020-09-02 2020-10-13 百度在线网络技术(北京)有限公司 Block chain cross-chain query method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN112581128A (en) 2021-03-30

Similar Documents

Publication Publication Date Title
CN112529706B (en) Decentralizing heterogeneous public chain asset exchange method
CN112615915B (en) Method for constructing alliance chain between private chains
CN112583917B (en) CSCP-based hybrid chain construction method
EP3540628B1 (en) Mechanism for efficient validation of finality proof in lightweight distributed ledger clients
CN110288480B (en) Private transaction method and device for blockchain
CN112507393B (en) Method for guaranteeing consistency of block chain cross-chain transaction
CN112581128B (en) Heterogeneous license chain value exchange method with presence evidence
CN114499898B (en) Block chain cross-chain secure access method and device
CN113360861B (en) Mortgage loan oriented decentralized identity method based on repeater cross-chain
CN113328997A (en) Alliance chain cross-chain system and method
EP3806385B1 (en) Cryptologic blockchain interoperability membership system
KR101890584B1 (en) Method for providing certificate service based on m of n multiple signatures and server using the same
CN113689216A (en) Cross-chain transaction processing method and device, equipment, storage medium and program product
KR101849920B1 (en) Method for providing certificate service based on m of n multiple signatures in use of merkle tree structure and server using the same
CN112615838B (en) Extensible block chain cross-chain communication method
KR20180041050A (en) Method for providing certificate service based on m of n multiple signatures in use of merkle tree structure and server using the same
CN112508703B (en) Isomorphic public-private chain value exchange method
CN112636920A (en) Isomorphic permission chain interconnection method based on authority control
CN115708119A (en) Cross-chain transaction system, method, device and storage medium
CN114978698A (en) Network access method, target terminal, certificate management network element and verification network element
CN114362961A (en) Block chain based account recovery method, device, equipment and storage medium
KR101890587B1 (en) Method for providing certificate service based on m of n multiple signatures in use of merkle tree structure and server using the same
EP3588844A1 (en) Method for monitoring digital certificates
CN117440032A (en) Cross-chain system based on relay chain
KR102462998B1 (en) Apparatus and method for cross authentication between multi-chain based on bft consensus algorithm

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant