CN113159741A - Cross-chain transaction method and model meeting mutual exchange between UTXO and intelligent contract - Google Patents

Cross-chain transaction method and model meeting mutual exchange between UTXO and intelligent contract Download PDF

Info

Publication number
CN113159741A
CN113159741A CN202011223068.8A CN202011223068A CN113159741A CN 113159741 A CN113159741 A CN 113159741A CN 202011223068 A CN202011223068 A CN 202011223068A CN 113159741 A CN113159741 A CN 113159741A
Authority
CN
China
Prior art keywords
transaction
chain
party
key
acquirer
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011223068.8A
Other languages
Chinese (zh)
Inventor
李贵宁
董伟召
范永鹏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Trans Union Yuanhuan Network Technology Co ltd
Original Assignee
Beijing Trans Union Yuanhuan Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Trans Union Yuanhuan Network Technology Co ltd filed Critical Beijing Trans Union Yuanhuan Network Technology Co ltd
Priority to CN202011223068.8A priority Critical patent/CN113159741A/en
Publication of CN113159741A publication Critical patent/CN113159741A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/22Payment schemes or models
    • G06Q20/223Payment schemes or models based on the use of peer-to-peer networks
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/407Cancellation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Technology Law (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention discloses a cross-chain transaction method and a cross-chain transaction model meeting the mutual exchange between UTXO and an intelligent contract, and belongs to the technical field of block chains. The cross-chain transaction model which satisfies the mutual exchange of the UTXO and the intelligent contract comprises the following steps: hanging a list Maker, eating a list Taker and status messages. The method and the device can realize that the transactions such as locking transaction, redeeming transaction, cash-out transaction and the like can be carried out on the basis of not introducing a third party between the maker and the marker, and further realize the problem of cross-link value exchange between block chain technologies under the condition of not introducing the third party. And the exchange between the UTXO model and the UTXO model, between the UTXO model and the intelligent contract model, and between the intelligent contract model and the intelligent contract model can be realized. And the atomicity of the transaction is effectively guaranteed, and as long as the marker uses a correct key to prompt, the marker can obtain the key which is shown by the marker.

Description

Cross-chain transaction method and model meeting mutual exchange between UTXO and intelligent contract
Technical Field
The invention relates to the technical field, in particular to a cross-chain transaction method and a cross-chain transaction model which meet the mutual exchange between UTXO and an intelligent contract.
Background
At present, a plurality of different chains are formed in the development process of the block chain technology, named bitcoin, ether house, EOS and the like are compared, but the block chain technology cannot acquire external data, so that the data among the different chains are isolated, the value of intercommunication cannot be generated, and how to perform cross-chain transaction among the different block chains is a hot problem in the industry.
However, the current solutions are mainly divided into three solutions: 1. a man-in-the-middle scheme; 2. a relay scheme; a hashlock protocol. However, the man-in-the-middle scheme introduces man-in-the-middle, actually replaces the problem to be solved in the cross-chain solution, and simultaneously introduces a new third-party man-in-the-middle, not to be the cross-chain between two chains; the relay scheme has low implementability due to the block chain characteristic limitation; the hashlock scheme is mainly explored on how to apply it in the UTXO model.
Therefore, none of the current solutions can solve the cross-chaining value exchange problem between blockchain technologies without introducing a third party.
Disclosure of Invention
The invention aims to: the utility model provides a cross-chain transaction method and a cross-chain transaction model which satisfy the mutual exchange of UTXO and intelligent contracts, and aims to improve the problems.
In a first aspect, the present application provides a method for performing a cross-chain transaction involving the interchange of a UTXO and a smart contract, 1. a method for performing a cross-chain transaction involving the interchange of a UTXO and a smart contract, the method comprising:
the hanging party sends the hash value to the eating party;
the acquirer sending a locked transaction order to the acquirer and specifying that if no one provides a key for redemption within a timeout period, the acquirer can redeem its own assets through a redemption transaction;
after the eating party sees that the locked transaction order of the suspended party is confirmed on the chain of the blockchain, a locked transaction for the suspended party is created on the chain of the suspended party, and if no person provides a key for withdrawal within overtime, the eating party can redeem own assets through the redemption transaction;
after the locker sees that the locking transaction of the eating party is confirmed on the chain, a cash withdrawal transaction is created by using a key to withdraw cash from the chain of the eating party;
the eating party sees the cash-out transaction of the hanging party confirmed on the chain, and creates a cash-out transaction to the hanging chain for cash-out by using the exposed key.
Optionally, the hitching party sends the hash value to the eating party, including:
the suspended list generates a random number as a key;
the acquirer calculates a hash value of the key.
Optionally, the determining, by the acquirer, the hash value of the key includes:
the suspended party determines the hash value of the key through a hash function, which specifically comprises the following steps: hash256(s) ═ h, where h is the hash value and hash256(s) is the hash function of key s.
Optionally, the method further includes:
sending a redemption transaction to the chain of the acquirer to redeem its assets if the acquirer sees that the locked transaction of the acquirer is not chain confirmed.
Optionally, the method further includes:
sending a redemption transaction to the chain of the eating party to redeem its asset if the eating party sees that the locking transaction of the hanging party is not chain confirmed.
In a second aspect, an embodiment of the present invention provides a cross-chain transaction model satisfying mutual exchange between a UTXO and a smart contract, including:
the hanging list is used for sending the hash value to the eating list;
the suspension party is also used for sending a locked transaction to the chain of suspension parties and appointing that if no person provides a key for cashing within the overtime time, the suspension party can redeem own assets through a redemption transaction;
the acquirer is used for creating a locked transaction for the acquirer on the chain of the acquirer after the locked transaction of the acquirer is confirmed on the chain, and appointing that the acquirer can redeem own assets through a redeeming transaction if no person provides key cash within overtime;
the hanging party is also used for creating a cash-out transaction to the chain of the eating party by using a key after the locking transaction of the eating party is confirmed on the chain;
the acquirer is also used for confirming the cash-out transaction of the acquirer on a chain when the acquirer is seen, and creating a cash-out transaction to be presented on the chain of the acquirer by using the exposed key.
Optionally, the hitching party sends the hash value to the eating party, including:
the suspended list generates a random number as a key;
the acquirer calculates a hash value of the key.
Optionally, the determining, by the acquirer, the hash value of the key includes:
the suspended party determines the hash value of the key through a hash function, which specifically comprises the following steps: hash256(s) ═ h, where h is the hash value and hash256(s) is the hash function of key s.
Optionally, the method further includes:
sending a redemption transaction to the chain of the acquirer to redeem its assets if the acquirer sees that the locked transaction of the acquirer is not chain confirmed.
Optionally, the method further includes:
sending a redemption transaction to the chain of the eating party to redeem its asset if the eating party sees that the locking transaction of the hanging party is not chain confirmed.
According to the cross-chain transaction method and the cross-chain transaction model meeting the mutual exchange between the UTXO and the intelligent contract, the H value is sent to the eater Taker through the hanged party Maker; the Maker sends a locked transaction to the Maker chain and specifies that if no one provides a key up within a timeout period, the Maker can redeem its own assets through a redemption transaction; after the Taker sees that the locked transaction of the Maker is confirmed on the chain, a locked transaction for the Maker is created on the Taker chain, and if no one provides a key for withdrawal within a timeout period, the Taker can redeem own assets through a redemption transaction; after the Maker sees that the locking transaction of the Taker is confirmed on the chain, a cash-up transaction is created by using a key to cash up the chain of the Taker; the Taker sees the cash-out transaction of the Maker confirmed on the chain, and creates a cash-out transaction to the Maker chain cash-out using the exposed key. Therefore, on the basis of not introducing a third party, the maker and the marker can carry out locking transaction, redemption transaction, cash-out transaction and other transactions, and further solve the problem of cross-link value exchange between block chain technologies under the condition of not introducing the third party.
Drawings
Fig. 1 is a schematic structural diagram of an electronic device according to an embodiment of the present disclosure;
fig. 2 is a flowchart of a cross-chain that satisfies the mutual exchange between a UTXO and a smart contract according to an embodiment of the present application;
fig. 3 is an interaction diagram of a cross-chain that satisfies mutual exchange between a UTXO and a smart contract according to an embodiment of the present application.
Detailed Description
To make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions of the present application will be clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are some, but not all embodiments of the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The present application is directed to an electronic device, such as the schematic structural diagram of an electronic device shown in fig. 1, wherein an electronic device 100 includes one or more processors 102, one or more memory devices 104, and an input device 106, which are interconnected via a bus system and/or other type of connection mechanism (not shown). It should be noted that the components and structure of the electronic device 100 shown in fig. 1 are only exemplary and not limiting, and the electronic device may have some of the components shown in fig. 1 and may also have other components and structures not shown in fig. 1, as desired.
The electronic device 100 may be a tab Maker or a tab Maker on a blockchain.
The processor 102 may be a Central Processing Unit (CPU) or other form of processing unit having data processing capabilities and/or instruction execution capabilities, and may control other components in the electronic device 100 to perform desired functions.
The storage 104 may include one or more computer program products that may include various forms of computer-readable storage media, such as volatile memory and/or non-volatile memory. The volatile memory may include, for example, Random Access Memory (RAM), cache memory (cache), and/or the like. The non-volatile memory may include, for example, Read Only Memory (ROM), hard disk, flash memory, etc. On which one or more computer program instructions may be stored that may be executed by processor 102 to implement the client functionality (implemented by the processor) of the embodiments of the application described below and/or other desired functionality. Various applications and various data, such as various data used and/or generated by the applications, may also be stored in the computer-readable storage medium.
The input device 106 may be a device used by a user to input instructions and may include one or more of a keyboard, a mouse, a microphone, a touch screen, and the like.
The embodiment of the invention provides a cross-link transaction method for meeting the mutual exchange between a UTXO (unified extensible XO) and an intelligent contract, which can be applied to the electronic equipment, and the method comprises the following steps:
the hanging party sends the hash value to the eating party;
the acquirer sending a locked transaction order to the acquirer and specifying that if no one provides a key for redemption within a timeout period, the acquirer can redeem its own assets through a redemption transaction;
after the eating party sees that the locked transaction order of the suspended party is confirmed on the chain of the blockchain, a locked transaction for the suspended party is created on the chain of the suspended party, and if no person provides a key for withdrawal within overtime, the eating party can redeem own assets through the redemption transaction;
after the locker sees that the locking transaction of the eating party is confirmed on the chain, a cash withdrawal transaction is created by using a key to withdraw cash from the chain of the eating party;
the eating party sees the cash-out transaction of the hanging party confirmed on the chain, and creates a cash-out transaction to the hanging chain for cash-out by using the exposed key.
It should be noted that, before the suspension member sends the hash value to the eating member, a negotiation of the transaction is established in advance between the Maker and the marker, for example, in stock transaction, the Maker and the marker both suspend orders on the blockchain, and when the transaction condition is reached, the suspension member can directly send the hash value to the eating member to start executing. For another example, in a second-hand selling place, a seller (Maker) must hang a selling order first, and when a buyer (Maker) wants to buy, an order is also sent to a platform (which can also be understood as sending a confirmation message), and when the two parties intend to trade, the Maker and the Maker will execute the cross-link trading method which satisfies the interchange between UTXO (unused trade output) and an intelligent contract.
Wherein the locked transaction is a conditional order.
It is noted here that the maker and the tager can only redeem the lock transaction (funds) initiated by themselves. For example, the maker issued a money to the maker on the block chain, and agreed that if the maker is not removed within a predetermined time, the maker can redeem the money. The maker issued a sum of money to the maker, and agreed that the maker can be redeemed if the maker is not removed within a set time. The predetermined time may be 1 hour, 3 hours, 4 hours, etc., the set time may be 1 hour, and the set time of the tager (predetermined time) may be shorter than the set time of the maker (set time), for example, the maker is set to be redeemable for 1 hour, the tager is set to be redeemable for 0.5 hour, the make is set to be redeemable for 4 hours, and the tager is set to be redeemable within 1 hour, 2 hours, or 3 hours. This may secure the funds (lock transaction) of both parties.
For example, the poker releases a money (possibly electronic money such as bitcoin, ether house, etc.) to the poker, and it is agreed that within 1 hour if the poker is not taken away, the poker can redeem the released money (the locked transaction includes the amount of money, the condition for taking the money). Once the maker takes away the money sent by the maker, the maker can expose the key (which can also be a hash value) for taking the money, and then the maker can know an extraction password (key) for extracting the transaction (money) sent by the maker after seeing that the maker takes away the money sent by the maker, so that the maker can extract the money sent by the maker.
In short, the Maker sends money to the marker, and then the marker also sends money to the Maker. (issued not necessarily, not issued directly to the other party's account, but directly to the blockchain). After both parties issue, if one of the parties performs a cash withdrawal operation on the locked transaction issued by the other party (the other party is withdrawn to issue to the other party), the withdrawal key for withdrawing the money issued by the other party to the other party is exposed, and the other party also knows how to withdraw the money issued by the other party (the processes are mutually restricted).
Therefore, the safety and the effectiveness of the transaction between the two parties are ensured, the transaction between the maker and the marker is directly carried out, the resources are saved, and the cross-chain safe transaction is realized.
Wherein, the list hanging party sends the hash value to the list eating party, including:
the suspended list generates a random number as a key;
the acquirer calculates a hash value of the key. The method for determining the hash value of the key by the suspended party specifically comprises the following steps:
the suspended party determines the hash value of the key through a hash function, which specifically comprises the following steps: hash256(s) ═ h, where h is the hash value and hash256(s) is the hash function of key s.
Optionally, the method further includes:
sending a redemption transaction to the chain of the acquirer to redeem its assets if the acquirer sees that the locked transaction of the acquirer is not chain confirmed.
Optionally, the method further includes: sending a redemption transaction to the chain of the eating party to redeem its asset if the eating party sees that the locking transaction of the hanging party is not chain confirmed.
In order to more clearly illustrate the technical solution of the present invention, the embodiments of the present invention are described with reference to the electronic device. Fig. 2 is a flowchart of a cross-link Transaction method that satisfies the interchange between an UTXO (unused Transaction output) and an intelligent contract according to an embodiment of the present invention. The specific process shown in fig. 2 will be described in detail below.
Step S201, the list hanging Maker sends an H value to the list eating Taker.
As an embodiment, step S201 includes: the list hanging party Maker generates a random number s as a key; and the suspended party Maker determines the H value of the key.
Wherein the key is used to pull the assets of the locked transaction uploaded by the Taker from the Taker chain.
Optionally, the hanging party Maker sends the H value to the eating party marker, including: the list hanging party Maker generates a random number s as a key; and the suspended party Maker determines the H value of the key.
Wherein the hash function is hash 256. Where H is hash 256(s).
In the implementation process, the hash256 function is built in, so that the implementation target block chain has stronger computing power to adapt to the block chain with the top 20 market value in the market at present.
It is understood that prior to step S201, a negotiation for a transaction is established in advance between the Maker and the tager. For example, the transaction may be a stock transaction, where both maker and marker have placed orders on a platform (it is understood that the blockchain has no platform, but can be understood as such), and when the conditions for the transaction are met, it is straightforward to start with step S201.
For another example, on salted fish, the seller must hang a sale order, and when a buyer (marker) wants to buy, it also wants to send an order to the platform (which can also be understood as sending a confirmation message), and then step S201 is started.
It is to be understood that the above examples are illustrative only and not limiting.
At step S202, the Maker sends a locked transaction to the Maker chain and specifies that the Maker can redeem its own assets through a redemption transaction if no one provides a key up within a timeout period.
The timeout period may be 1 hour or 2 hours. Here, the number of the carbon atoms is not particularly limited. For example, the maker pays the ticket a sum of money, and it is agreed that within 2 hours if the ticket is not removed, the maker can redeem the sum.
Generally, the setting of the timeout period may be set according to actual requirements, and is not limited specifically herein.
And step S203, after the Taker sees that the locked transaction of the Maker is confirmed on the chain, a locked transaction for the Maker is created on the Taker chain, and if no person provides key cash within overtime, the Taker can redeem own assets through a redemption transaction.
The timeout period may be 1 hour or 2 hours. Here, the number of the carbon atoms is not particularly limited. For example, the ticket issues a charge to the maker, which it is agreed that within 1 hour if the maker is not removed, the ticket can redeem.
Generally, the setting of the timeout period may be set according to actual requirements, and is not limited specifically herein.
It can be understood that, after the marker sees that the lock transaction of the marker is confirmed on the link, the marker receives the transaction confirmation information sent by the state information after the lock transaction of the marker is confirmed on the link.
The state information is only used for storing the state in the settlement process and informing the progress flow of both trading parties, does not store any asset related data, can be a public transparent service, and can also be directly interacted between the trading parties by means of a p2p mode.
For example, the Taker submits a locked transaction to a Taker chain first, the state information is confirmed by monitoring whether the locked transaction on the Taker chain is confirmed by the Maker, and if the locked transaction on the Taker chain is confirmed by the Maker, the state information returns transaction confirmation information to the Taker; if the state information monitors that the locked transaction on the Taker chain is not confirmed by the Maker, the transaction unconfirmed information is returned to the Taker, so that the Taker redeems the own assets through the redemption transaction within the overtime.
And step S204, after the Maker sees that the locking transaction of the Taker is confirmed on the chain, a cash-up transaction is created to the chain of the Taker for cash-up by using a key.
It can be understood that, after the Maker sees that the lock transaction of the marker is confirmed by the chain, the marker receives the transaction confirmation information sent by the state information after the lock transaction of the marker is confirmed by the marker chain.
For example, the Maker may submit a lock transaction to the Maker chain first, the state information is determined by monitoring whether the lock transaction on the Maker chain is determined by the Maker, if the lock transaction is determined by the Maker, the state information returns transaction determination information to the Maker, and at this time, the Maker may create a cash-up transaction to the Maker chain (i.e., the Maker chain) by using the key created in step S201; if the state information monitors that the locked transaction on the Maker chain is not confirmed by the Taker, the transaction unconfirmed information is returned to the Maker, so that the Maker redeems own assets through the redemption transaction within the overtime.
Step S205, the Taker sees that the cash-up transaction of the Maker is confirmed on the chain, and creates a cash-up transaction to the Maker chain by using the exposed key.
It can be understood that the fact that the marker of the marker is confirmed on the chain by the marker means that the marker receives the transaction confirmation information sent by the state information after the marker is successfully found on the marker chain, so that the marker can know that the marker is completed.
For example, after the marker sees that the marker takes away money sent by the marker, the marker also knows to extract the extraction password of the transaction (money) sent by the marker, and at this time, the marker can extract the money sent by the marker.
It is to be understood that the above examples are illustrative only and not limiting.
In a possible embodiment, the method further comprises: if the Maker sees that the Taker's locked transaction is not chain confirmed, a redemption transaction is sent to the Maker's chain to redeem its assets.
It can be understood that the fact that the Maker sees that the lock transaction of the Maker is not confirmed on the chain means that the Maker sends the transaction unconfirmed information through the received status information, so as to know whether the lock transaction of the Maker is confirmed on the chain.
In a possible embodiment, the method further comprises: if the Taker sees that the Maker's locked transaction is not chain confirmed, a redemption transaction is sent to the Taker's chain to redeem its assets.
It can be understood that the fact that the marker sees that the lock transaction of the marker is not confirmed on the chain means that the marker sends transaction unconfirmed information through the received status information, so as to know whether the lock transaction of the marker is confirmed on the chain.
As an application scenario, as shown in fig. 3, the execution process of the cross-chain transaction method satisfying the mutual exchange between the UTXO and the smart contract includes:
AE 1: the Maker generates a random number s as a key, calculates hash256(s) ═ h, and then sends the value of h to the Maker.
Specifically, the Maker generates a random number s as a key, calculates hash256(s) to h, and then sends the value of h to the state information, and the state information sends the value of h to the Maker.
Optionally, the state information sends the h value to the Taker, including: and the state information receives the h value, and the h value is pushed to the Taker through state pushing.
Optionally, before the state information sends the h value to the Taker, the method includes: the state information receives a settlement bill; the state information pushes the settlement bill to the Maker so that the Maker can generate a random number s as a key and calculate the hash256(s) ═ h.
AE 2: the Maker creates a locked transaction to the Maker in the Maker chain and specifies that the Maker can redeem its own assets through a redemption transaction if no one provides a key withdrawal within a time-out period.
Specifically, after receiving the H value, the marker establishes a marker lock based on the H value, and returns callback information to the state information, and after receiving the callback information returned by the marker, the state information pushes the callback information to the marker, so that after receiving the callback information pushed by the state information, the marker establishes a locked transaction to the marker chain.
AE 3: after the Taker sees the locked transaction of the Maker confirmed on the chain, a locked transaction is created on the Taker chain to the Maker, and the Taker is appointed to redeem its own assets through a redemption transaction if no one provides a key for a timeout period.
Specifically, the state information monitors a locked transaction submitted by a Maker, and when the locked transaction is monitored to be confirmed by a Taler, the Maker submits the locked transaction to a Taker chain; if the locked transaction submitted by the Maker is not confirmed by the Maker, transaction unconfirmed information is pushed to the Maker.
AE 4: after the Maker sees that the lock transaction of the Taker is confirmed on the chain, the key is used for creating a cash-up transaction to the cash-up of the Taker on the chain.
Specifically, after the Taker submits the locked transaction to the Taker chain, the state information monitors the locked transaction, and after the locked transaction submitted by the Taker is confirmed by the Maker, the Maker creates a prompt transaction to the chain by using a key and is monitored by the state information.
If the state information monitors that the locked transaction submitted by the Taker is not confirmed by the Maker, unconfirmed information is respectively sent to the Maker and the Taker, so that the Maker initiates a redemption transaction to redeem the asset of the Taker and the Taker initiates a redemption transaction to redeem the asset of the Taker.
AE 5: taker sees that the cash-out transaction of Maker is confirmed on the chain, and uses the exposed key to create a cash-out transaction to the Maker chain.
Specifically, the state information monitors the cash-out transaction submitted by the Maker, and after the fact that the cash-out transaction submitted by the Maker is confirmed by the Maker is monitored, the Maker creates a cash-out transaction to be cash-out on a Maker chain by using an exposed key. If the situation that the cash-out transaction submitted by the Maker is not confirmed by the marker is monitored; an unconfirmed message is sent to the Maker and the Taker, respectively, to cause the Maker to initiate a redemption transaction to redeem its assets and the Taker to initiate a redemption transaction to redeem its assets.
After the Taker submits the cash-up transaction to the chain, the state information monitors the cash-up transaction submitted by the Taker, and when the cash-up transaction submitted by the Taker is confirmed by the Maker, the atomic exchange is finished.
The realization process ensures the atomicity of the transaction, and as long as the marker uses the correct key to prompt, the marker can acquire the key which is shown by the marker, and the visibility skillfully utilizes the characteristic that the transaction of the block chain can not be tampered. Once an anomaly occurs, the present application ensures that both parties will redeem their respective assets after the lock time (i.e., the timeout set at the initiation of the lock transaction).
In the implementation process, the cross-chain transaction method meeting the mutual exchange between the UTXO and the intelligent contract provided by the embodiment sends the H value to the eater Taker through the hanged party Maker; the Maker sends a locked transaction to the Maker chain and specifies that if no one provides a key up within a timeout period, the Maker can redeem its own assets through a redemption transaction; after the Taker sees that the locked transaction of the Maker is confirmed on the chain, a locked transaction for the Maker is created on the Taker chain, and if no one provides a key for withdrawal within a timeout period, the Taker can redeem own assets through a redemption transaction; after the Maker sees that the locking transaction of the Taker is confirmed on the chain, a cash-up transaction is created by using a key to cash up the chain of the Taker; the Taker sees the cash-out transaction of the Maker confirmed on the chain, and creates a cash-out transaction to the Maker chain cash-out using the exposed key. Therefore, on the basis of not introducing a third party, the maker and the marker can carry out locking transaction, redemption transaction, cash-out transaction and other transactions, and further solve the problem of cross-link value exchange between block chain technologies under the condition of not introducing the third party.
Based on the same inventive concept, the application also provides a cross-chain transaction model meeting the mutual exchange between the UTXO and the intelligent contract, and the cross-chain transaction model meeting the mutual exchange between the UTXO and the intelligent contract comprises: hanging a single marker and eating a single Taker.
The system comprises a list hanging party, a list sending party and a list sending party, wherein the list hanging party is used for sending a hash value to the list eating party;
the suspension party is also used for sending a locked transaction to the chain of suspension parties and appointing that if no person provides a key for cashing within the overtime time, the suspension party can redeem own assets through a redemption transaction;
the acquirer is used for creating a locked transaction for the acquirer on the chain of the acquirer after the locked transaction of the acquirer is confirmed on the chain, and appointing that the acquirer can redeem own assets through a redeeming transaction if no person provides key cash within overtime;
the hanging party is also used for creating a cash-out transaction to the chain of the eating party by using a key after the locking transaction of the eating party is confirmed on the chain;
the acquirer is also used for confirming the cash-out transaction of the acquirer on a chain when the acquirer is seen, and creating a cash-out transaction to be presented on the chain of the acquirer by using the exposed key.
When it needs to be explained, the cross-chain transaction model meeting the mutual exchange between the UTXO and the intelligent contract provided by the present application may actually be understood as a software system, and the hitching party and the eating party in the cross-chain transaction model meeting the mutual exchange between the UTXO and the intelligent contract are two user service modules of the system, respectively.
In order to more clearly illustrate the technical solution of the present invention, a cross-chain transaction model satisfying the mutual exchange between UTXO and smart contract, which is provided by the present application, is illustrated in combination with the above-mentioned electronic device:
the list hanging Maker is used for sending an H value to the list eating Maker;
the Maker is also used for sending a locked transaction to a Maker chain and appointing that if no person provides a key for promotion within a time-out time, the Maker can redeem own assets through a redemption transaction;
the Taker is used for creating a locked transaction for the Maker on a Taker chain after the locked transaction of the Maker is seen to be confirmed on the chain, and appointing that if no person provides a key for promotion within overtime, the Taker can redeem own assets through a redemption transaction;
the Maker is also used for creating a cash-out transaction to the chain of the Taker by using a key after the lock transaction of the Taker is confirmed by the chain;
the Taker is also used for confirming on a chain that the cash-up transaction of the Maker is seen, and creating a cash-up transaction to the chain of the Maker by using the exposed key.
In a possible embodiment, the suspended party Maker is configured to send the H value to the eaten party Taker, and includes: the list hanging party Maker is used for generating a random number s as a key; and the list hanging party Maker is also used for determining the H value of the key.
In a possible embodiment, the suspended party Maker is further configured to determine an H value of the key, and includes: and the suspended party Maker is also used for determining the H value of the key through a hash function.
In a possible embodiment, the cross-chain transaction model satisfying the mutual exchange between the UTXO and the smart contract further includes: the Maker is also operative to send a redemption transaction to the Maker's chain to redeem its assets if the Maker sees that the Taker's lock transaction is not chain confirmed.
In a possible embodiment, the cross-chain transaction model satisfying the mutual exchange between the UTXO and the smart contract further includes: the Taker, if it sees that the Maker's locked transaction is not chain confirmed, is also used to send a redemption transaction to the Taker's chain to redeem its own assets.
It can be appreciated that the cross-chain transaction model, which satisfies the interchange of UTXO and smart contracts, abstracts transactions as locked transactions, redeem transactions, cash-out transactions without introducing third parties. The cross-chain transaction model meeting the mutual exchange of the UTXO and the intelligent contract supports the current mainstream block chain in the market, also conveniently supports a new block chain and supports pairwise exchange between the block chains.
It should be noted that, the implementation of the cross-chain transaction model satisfying the mutual exchange between the UTXO and the intelligent contract may refer to the description of the cross-chain transaction method satisfying the mutual exchange between the UTXO and the intelligent contract, and is not described herein again.
Note that the marker and Maker in this application are both parties of the cross-strand exchange. The Taker and the Maker can be the same chain or different chains, and the corresponding operation is the capacity required by the block chain to create the transaction. The cross-chain transaction model which meets the mutual exchange between the UTXO and the intelligent contract simultaneously supports the script creation of the UTXO and the transaction construction of the intelligent contract.
In the implementation process, a cross-chain transaction model which is composed of a suspended party Maker and an eaten party Taker and meets the mutual exchange between UTXO and an intelligent contract is set, so that on one hand, the lock transaction, the redemption transaction, the cash transaction and other transactions can be realized between the Maker and the Taker on the basis of not introducing a third party, and further, the problem of cross-chain value exchange between block chain technologies is solved under the condition of not introducing the third party; on the other hand, the cross-chain transaction model which meets the mutual exchange between the UTXO and the intelligent contract ensures the atomicity of the transaction, as long as the marker uses a correct key to prompt, the marker can acquire the key which is shown by the marker, and the visibility skillfully utilizes the characteristic that the transaction of the blockchain can not be tampered. Once an exception occurs, the cross-chain transaction model which satisfies the interchange of the UTXO and the intelligent contract can ensure that both the Maker and the Taker can redeem the respective assets after the locking time.
Based on the same inventive concept, the application also provides a cross-chain transaction model meeting the mutual exchange between the UTXO and the intelligent contract, and the cross-chain transaction model meeting the mutual exchange between the UTXO and the intelligent contract comprises: hanging a list Maker, eating a list Taker and status messages.
And the state information is used for pushing the settlement bill to the Maker after the settlement bill is received.
And the Maker is used for generating a random number s as a key after receiving the bill information, calculating a hash256(s) ═ h, and then sending the h value to the state information, so that the h value is pushed to the Maker through state propulsion after the state information receives the h value.
And the Taker is used for creating a Taker lock based on the H value after receiving the H value and returning callback information to the state information, and the state information pushes the callback information to the Maker after receiving the callback information returned by the Taker, so that the Maker creates a locked transaction to the Maker chain after receiving the callback information pushed by the state information.
The state information is also used for monitoring the locked transaction submitted by the Maker, and when the locked transaction is monitored to be confirmed by the Taler, the Maker submits the locked transaction to a Taker chain; if the locked transaction submitted by the Maker is not confirmed by the Maker, transaction unconfirmed information is pushed to the Maker.
After the Taker submits the locked transaction to the Taker chain, the state information is also used for monitoring the locked transaction, and when the locked transaction submitted by the Taker is confirmed by the Maker, the Maker can create a prompt transaction to the chain by using a key and can be monitored by the state information. If the state information monitors that the locked transaction submitted by the Taker is not confirmed by the Maker, unconfirmed information is respectively sent to the Maker and the Taker, so that the Maker initiates a redemption transaction to redeem the asset of the Taker and the Taker initiates a redemption transaction to redeem the asset of the Taker.
Optionally, the state information is also used for monitoring a cash-up transaction submitted by the Maker, and after the cash-up transaction submitted by the Maker is monitored to be confirmed by the Maker, the Maker can create a cash-up transaction to a Maker chain by using the exposed key. If the situation that the cash-out transaction submitted by the Maker is not confirmed by the marker is monitored; an unconfirmed message is sent to the Maker and the Taker, respectively, to cause the Maker to initiate a redemption transaction to redeem its assets and the Taker to initiate a redemption transaction to redeem its assets.
And after the Taker submits the cash-up transaction to the chain, the state information is also used for monitoring the cash-up transaction submitted by the Taker, and when the cash-up transaction submitted by the Taker is confirmed by the Maker, the atomic exchange is finished.
In the implementation process, a cross-chain transaction model which is composed of a suspended party Maker, an eaten party Taker and a state message and meets the mutual exchange of UTXO and an intelligent contract is set, so that on one hand, the lock transaction, the redemption transaction, the cash transaction and other transactions can be carried out between the Maker and the Taker on the basis of not introducing a third party, and further, the problem of cross-chain value exchange between block chain technologies is solved under the condition of not introducing the third party; on the other hand, the cross-chain transaction model which meets the mutual exchange between the UTXO and the intelligent contract ensures the atomicity of the transaction, as long as the marker uses a correct key to prompt, the marker can acquire the key which is shown by the marker, and the visibility skillfully utilizes the characteristic that the transaction of the blockchain can not be tampered. Once an exception occurs, the cross-chain transaction model which satisfies the interchange of the UTXO and the intelligent contract can ensure that both the Maker and the Taker can redeem the respective assets after the locking time.
It should be noted that the cross-link transaction method and model meeting the mutual exchange between the UTXO and the smart contract provided by the present application can support the money of top 20 on the market of the CoinMarketCap (encrypted money market website).
In summary, according to the cross-chain transaction method and the cross-chain transaction model meeting the mutual exchange between the UTXO and the intelligent contract, the H value is sent to the eater Taker through the pendant Maker; the Maker sends a locked transaction to the Maker chain and specifies that if no one provides a key up within a timeout period, the Maker can redeem its own assets through a redemption transaction; after the Taker sees that the locked transaction of the Maker is confirmed on the chain, a locked transaction for the Maker is created on the Taker chain, and if no one provides a key for withdrawal within a timeout period, the Taker can redeem own assets through a redemption transaction; after the Maker sees that the locking transaction of the Taker is confirmed on the chain, a cash-up transaction is created by using a key to cash up the chain of the Taker; the Taker sees the cash-out transaction of the Maker confirmed on the chain, and creates a cash-out transaction to the Maker chain cash-out using the exposed key. Therefore, on the basis of not introducing a third party, the maker and the marker can carry out locking transaction, redemption transaction, cash-out transaction and other transactions, and further solve the problem of cross-link value exchange between block chain technologies under the condition of not introducing the third party.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method can be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present invention may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present invention may be embodied in the form of a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes. It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application. It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.

Claims (10)

1. A method for satisfying a cross-chain transaction in which a UTXO and a smart contract are interchanged, the method comprising:
the hanging party sends the hash value to the eating party;
the acquirer sending a locked transaction order to the acquirer and specifying that if no one provides a key for redemption within a timeout period, the acquirer can redeem its own assets through a redemption transaction;
after the eating party sees that the locked transaction order of the suspended party is confirmed on the chain of the blockchain, a locked transaction for the suspended party is created on the chain of the suspended party, and if no person provides a key for withdrawal within overtime, the eating party can redeem own assets through the redemption transaction;
after the locker sees that the locking transaction of the eating party is confirmed on the chain, a cash withdrawal transaction is created by using a key to withdraw cash from the chain of the eating party;
the eating party sees the cash-out transaction of the hanging party confirmed on the chain, and creates a cash-out transaction to the hanging chain for cash-out by using the exposed key.
2. The method of claim 1, wherein the issuer sends the hash value to the acquirer, and the method comprises:
the suspended list generates a random number as a key;
the acquirer calculates a hash value of the key.
3. The method of claim 2, wherein the determining the hash value of the key by the acquirer comprises:
the suspended party determines the hash value of the key through a hash function, which specifically comprises the following steps: hash256(s) = h, where h is a hash value and hash256(s) is a hash function of key s.
4. The method of claim 1, wherein the method further comprises:
sending a redemption transaction to the chain of the acquirer to redeem its assets if the acquirer sees that the locked transaction of the acquirer is not chain confirmed.
5. The method of claim 1, wherein the method further comprises:
sending a redemption transaction to the chain of the eating party to redeem its asset if the eating party sees that the locking transaction of the hanging party is not chain confirmed.
6. A cross-chain transaction model that satisfies the interchange of UTXOs and smart contracts, comprising:
the hanging list is used for sending the hash value to the eating list;
the suspension party is also used for sending a locked transaction to the chain of suspension parties and appointing that if no person provides a key for cashing within the overtime time, the suspension party can redeem own assets through a redemption transaction;
the acquirer is used for creating a locked transaction for the acquirer on the chain of the acquirer after the locked transaction of the acquirer is confirmed on the chain, and appointing that the acquirer can redeem own assets through a redeeming transaction if no person provides key cash within overtime;
the hanging party is also used for creating a cash-out transaction to the chain of the eating party by using a key after the locking transaction of the eating party is confirmed on the chain;
the acquirer is also used for confirming the cash-out transaction of the acquirer on a chain when the acquirer is seen, and creating a cash-out transaction to be presented on the chain of the acquirer by using the exposed key.
7. The cross-chain transaction model satisfying the interchange of UTXO and smart contracts according to claim 6, wherein the hitching party sends the hash value to the eating party comprising:
the suspended list generates a random number as a key;
the acquirer calculates a hash value of the key.
8. The cross-chain transaction model that satisfies the UTXO and smart contract interchange, as claimed in claim 7, wherein the determining the hash value of the key by the acquirer comprises:
the suspended party determines the hash value of the key through a hash function, which specifically comprises the following steps: hash256(s) = h, where h is a hash value and hash256(s) is a hash function of key s.
9. The cross-chain transaction model that satisfies the UTXO and smart contract interchange, as recited in claim 6, wherein the method further comprises:
sending a redemption transaction to the chain of the acquirer to redeem its assets if the acquirer sees that the locked transaction of the acquirer is not chain confirmed.
10. The cross-chain transaction model that satisfies the UTXO and smart contract interchange, as recited in claim 6, wherein the method further comprises:
sending a redemption transaction to the chain of the eating party to redeem its asset if the eating party sees that the locking transaction of the hanging party is not chain confirmed.
CN202011223068.8A 2020-11-05 2020-11-05 Cross-chain transaction method and model meeting mutual exchange between UTXO and intelligent contract Pending CN113159741A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011223068.8A CN113159741A (en) 2020-11-05 2020-11-05 Cross-chain transaction method and model meeting mutual exchange between UTXO and intelligent contract

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011223068.8A CN113159741A (en) 2020-11-05 2020-11-05 Cross-chain transaction method and model meeting mutual exchange between UTXO and intelligent contract

Publications (1)

Publication Number Publication Date
CN113159741A true CN113159741A (en) 2021-07-23

Family

ID=76882338

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011223068.8A Pending CN113159741A (en) 2020-11-05 2020-11-05 Cross-chain transaction method and model meeting mutual exchange between UTXO and intelligent contract

Country Status (1)

Country Link
CN (1) CN113159741A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109087080A (en) * 2018-07-13 2018-12-25 杭州复杂美科技有限公司 Across chain method of commerce, equipment and storage medium
CN109409877A (en) * 2018-10-09 2019-03-01 北京网录科技有限公司 A kind of across the chain value exchange method of block chain based on HTLC technology
CN111652618A (en) * 2020-07-14 2020-09-11 中国人民解放军国防科技大学 Decentralized unlinked cross-chain atomic transaction method

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109087080A (en) * 2018-07-13 2018-12-25 杭州复杂美科技有限公司 Across chain method of commerce, equipment and storage medium
CN109409877A (en) * 2018-10-09 2019-03-01 北京网录科技有限公司 A kind of across the chain value exchange method of block chain based on HTLC technology
CN111652618A (en) * 2020-07-14 2020-09-11 中国人民解放军国防科技大学 Decentralized unlinked cross-chain atomic transaction method

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
M. HERLIHY: "Atomic cross-chain swaps", 《SECURITY, BLOCKCHAIN AND REPLICATION》, 27 July 2018 (2018-07-27), pages 245 - 254 *
郭朝 等: "区块链跨链技术分析", 《物联网学报》, 30 June 2020 (2020-06-30), pages 35 - 48 *

Similar Documents

Publication Publication Date Title
JP7429281B2 (en) Methods and systems for directing exchanges associated with tokens held anonymously on a blockchain
TWI816647B (en) Systems and methods for implementing deterministic finite automata (dfas) via a blockchain
US20190286490A1 (en) Event-driven blockchain workflow processing
JP2022172321A (en) Method for secure peer-to-peer communication on block chain
WO2020125218A1 (en) Claim settlement method and apparatus employing blockchain technology
CN108764911B (en) Transaction method and system for internet points
EP3411840B1 (en) Computer-implemented system and method for determining the state of a machine executable contract implemented using a blockchain
CN107220895B (en) Virtual resource transfer value statistical method and device
WO2019223381A1 (en) Transaction dispute handling method and apparatus, and electronic device
CN109146488A (en) Assets match method, assets match system, equipment and storage medium
US20230135473A1 (en) Native building and minting of non-fungible tokens on a blockchain
CN115131034A (en) Block chain-based rights and interests digital collection verification method and equipment
US20230103398A1 (en) Security Deposits Using Tokenized Reputation Scores
JP7503497B2 (en) CONTROL METHOD, FUND MANAGEMENT SYSTEM, AND PROGRAM
US20230306390A1 (en) Systems and Methods for Creating and Utilizing Tokens Containing a Backing Component
CN113159741A (en) Cross-chain transaction method and model meeting mutual exchange between UTXO and intelligent contract
WO2020063180A1 (en) Transaction processing method and device, electronic device and computer-readable storage medium
CN116029825A (en) Block chain transaction method, device and system, electronic equipment and storage medium
JP2024083998A (en) Information processing device, method, program, and system manufacturing method
KR20200032928A (en) Method, apparatus and computer-readable medium of exchange based on fixed rate using virtual money
JP6896813B2 (en) Transaction execution method and system
Bădică et al. Using rules and r2ml for modeling negotiation mechanisms in e-commerce agent systems
KR20210144120A (en) Method and system for open banking service
CN110570298A (en) Block chain-based digital currency periodic storage method and device
CN111709735B (en) System and method for processing trusted transaction based on blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination