CN113111370A - Block chain cross-chain communication method - Google Patents
Block chain cross-chain communication method Download PDFInfo
- Publication number
- CN113111370A CN113111370A CN202110478443.1A CN202110478443A CN113111370A CN 113111370 A CN113111370 A CN 113111370A CN 202110478443 A CN202110478443 A CN 202110478443A CN 113111370 A CN113111370 A CN 113111370A
- Authority
- CN
- China
- Prior art keywords
- chain
- block chain
- target
- data
- supervision
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 46
- 238000004891 communication Methods 0.000 title claims abstract description 25
- 230000008520 organization Effects 0.000 claims abstract description 42
- 238000012545 processing Methods 0.000 claims abstract description 36
- 238000012795 verification Methods 0.000 claims abstract description 34
- 238000005516 engineering process Methods 0.000 claims description 7
- 230000008569 process Effects 0.000 abstract description 13
- 238000004364 calculation method Methods 0.000 abstract description 5
- 230000002159 abnormal effect Effects 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 3
- 238000004590 computer program Methods 0.000 description 2
- 238000013524 data verification Methods 0.000 description 2
- 230000004888 barrier function Effects 0.000 description 1
- 238000004422 calculation algorithm Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 238000012423 maintenance Methods 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- QSHDDOUJBYECFT-UHFFFAOYSA-N mercury Chemical compound [Hg] QSHDDOUJBYECFT-UHFFFAOYSA-N 0.000 description 1
- 229910052753 mercury Inorganic materials 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6227—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Health & Medical Sciences (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Databases & Information Systems (AREA)
- Storage Device Security (AREA)
Abstract
The invention provides a block chain cross-chain communication method, wherein a source block chain sends a cross-chain processing request to a verifier, the verifier sends a target query request to an organization node in a target block chain according to the cross-chain processing request, the organization node receives the target data query request, the target data query request is retrieved to obtain target data, the verifier verifies the signature of the obtained organization node, the target data is sent to the source block chain after the signature passes, a data supervision request is generated by a supervision chain and is sent to the source block chain and the target block chain, the source block chain and the target block chain verify the request, and after the verification passes, supervision data are sent to the supervision chain and are stored in a data supervision account book. The block chain cross-chain communication method provided by the invention can realize block chain cross-chain communication, does not need to synchronously verify the block head, can reduce the consumption of storage and calculation resources, can prevent data leakage in the cross-chain process, and can realize the supervision of cross-chain data.
Description
Technical Field
The present invention relates to the field of blockchain technology, and in particular, to a blockchain inter-chain communication method.
Background
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. The block chain has the characteristics of decentralization, no tampering, trace remaining in the whole process, traceability, collective maintenance, openness and transparency and the like. The characteristics ensure the honesty and the transparency of the block chain and lay a foundation for creating trust for the block chain.
However, data on a chain of the block chain network is a data isolated island, and interconnection and intercommunication cannot be achieved between different block chains, which hinders further development of block chain application ecology. The chain crossing technology is used for solving interoperability between two or more block chains, enabling data to cross barriers between chains and enabling values to circulate between different block chains, but the existing chain crossing technology capable of being realized often has the problem of data leakage in the chain crossing process, and the standard of different chains and the service of different chains have differences, so that the problem of difficulty in supervision exists. Therefore, it is necessary to design a blockchain cross-chain communication method which can keep secret and realize supervision in the cross-chain process.
Disclosure of Invention
The invention aims to provide a block chain cross-chain communication method which can realize block chain cross-chain communication, does not need to synchronously verify a block head, can reduce the consumption of storage and calculation resources, can prevent data leakage in a cross-chain process and can realize the supervision of cross-chain data.
In order to achieve the purpose, the invention provides the following scheme:
a block chain cross-chain communication method comprises the following steps:
step 1: the method comprises the steps that a verifier generates a homomorphic key and sends a homomorphic public key to a source block chain and a target block chain, the source block chain generates a symmetric key, the symmetric key is encrypted through the homomorphic public key, the source block chain generates a cross-chain processing request, the cross-chain processing request and the encrypted symmetric key are sent to the verifier, and the verifier sends a target query request to an organization node in the target block chain according to the cross-chain processing request;
step 2: the organization node receives the target data query request, retrieves the target data query request to obtain target data, encrypts the target data through a homomorphic public key, and sends the target data and the organization node signature to a verifier;
and step 3: the verifying party verifies the acquired organization node signature, decrypts the encrypted symmetric key and the target data through the homomorphic private key after the verification is passed, encrypts the decrypted target data through the decrypted symmetric key, and sends the encrypted target data to the source block chain;
and 4, step 4: the public and private key pair of supervision account book and source area block chain and target area block chain is generated to the chain of supervision, and will public and private key pair is sent for source area block chain and target area block chain respectively, and source area block chain and target area block chain are to public and private key pair verifying, verify the back that passes, send supervision data to the chain of supervision to the storage is on the data supervision account book.
Optionally, in step 1, the verifier generates a homomorphic key, sends the homomorphic public key to the source block chain and the target block chain, the source block chain generates a symmetric key, encrypts the symmetric key through the homomorphic public key, the source block chain generates a cross-chain processing request, and sends the cross-chain processing request and the encrypted symmetric key to the verifier, which specifically includes:
the verification party generates a homomorphic secret key based on a homomorphic encryption technology, the homomorphic secret key comprises a homomorphic public key and a homomorphic private key, the homomorphic public key is sent to a source block chain and a target block chain, the source block chain generates a symmetric secret key based on a random function, the symmetric secret key is encrypted through the obtained homomorphic public key, the source block chain generates a cross-chain processing request, and the cross-chain processing request and the encrypted symmetric secret key are sent to the verification party.
Optionally, in step 1, the verifier sends a target query request to an organization node in the target block chain according to the cross-chain processing request, specifically:
the method comprises the steps that a source block chain sends a cross-chain processing request to a verifier, wherein the cross-chain request processing comprises a general verification type of the source block chain and a request structure of a target block chain, a request body of the target block chain is determined through the general verification type of the source block chain and the request structure of the target block chain, and a target data query request is sent to an organization node in the target block chain according to the determined request body of the target block chain.
Optionally, in step 3, the verifying party verifies the obtained organization node signature, specifically:
and verifying the acquired organization node signature through an account key of the organization node preset by the verifier.
Optionally, in step 4, the chain of custody generates a data supervision ledger, which specifically includes:
the supervision chain generates a data supervision ledger book with a set data format, and the data supervision ledger book is used for visually checking supervision data and calculating or reconciling related transactions.
Optionally, in step 4, the chain of supervision generates a public and private key pair of the source block chain and the target block chain, and sends the public and private key pair to the source block chain and the target block chain, where the source block chain and the target block chain verify the public and private key pair, specifically:
the supervision chain automatically generates a network address through an open source tool or a public and private key to generate a public and private key pair of the source block chain and the target block chain, and distributes the public and private key pair to the source block chain and the target block chain through a CA certificate, and the source block chain and the target block chain verify the authenticity of the public and private key pair through the CA certificate.
Optionally, in step 4, the supervision data is sent to the chain of custody and stored in the data supervision ledger, specifically:
after the verification is passed, the supervision chain acquires supervision data in the source region block chain and the target region block chain according to a data format set in the data supervision account book, and stores the supervision data and the public and private key pair in the data supervision account book.
The invention can be implemented by a computer terminal which should be able to store a computer program which is able to load and implement the method described above.
According to the specific embodiment provided by the invention, the invention discloses the following technical effects: the block chain cross-chain communication method provided by the invention can realize block chain cross-chain communication, reduce the consumption of storage and calculation resources, prevent data leakage in the cross-chain process and realize the supervision of cross-chain data; the source block chain sends a cross-chain processing request to a verifier, the verifier sends a target query request to an organization node in a target block chain according to the cross-chain processing request, the organization node retrieves through the target data query request to obtain target data, the target data and an organization node signature are sent to the verifier, the verifier verifies the obtained organization node signature, after the verification is passed, the target data are sent to the source block chain to complete cross-chain, a supervisory chain generates a data supervisory account book and a public and private key pair of the source block chain and the target block chain, the public and private key pair is respectively sent to the source block chain and the target block chain, the source block chain and the target block chain verify the public and private key pair, after the verification is passed, the supervisory data are sent to a supervisory chain and stored on the data supervisory account book and are supervised in real time, in the cross-chain process, the target block chain encrypts the target data through a homomorphic public key, the verifier decrypts the target data through the homomorphic private key and then encrypts the target data through the symmetric private key, so that the target data in the chain crossing process are guaranteed to be in an encrypted state, and the leakage of private data is prevented; compared with cross-link data verification through the Mercker verification, the block link network and the data do not need to adopt a Mercker tree organization structure, and the method has the characteristics of strong universality and wide application range; through the mode of establishing standard data supervision account book, realized the supervision to the chain data of striding, can directly perceivedly, effectual seeing out supervision data, the data supervision account book of standard simultaneously can calculate, reconcile etc. to on the data supervision account book of corresponding information mark in the abnormal data.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
Fig. 1 is a flowchart illustrating a block chain cross-chain communication method according to an embodiment of the invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The invention aims to provide a block chain cross-chain communication method which can realize block chain cross-chain communication, does not need to synchronously verify a block head, can reduce the consumption of storage and calculation resources, can prevent data leakage in a cross-chain process and can realize the supervision of cross-chain data.
In order to make the aforementioned objects, features and advantages of the present invention comprehensible, embodiments accompanied with figures are described in further detail below.
Fig. 1 is a schematic flow chart of a block chain cross-chain communication method according to an embodiment of the present invention, and as shown in fig. 1, the block chain cross-chain communication method according to the embodiment of the present invention includes the following steps:
step 1: the method comprises the steps that a verifier generates a homomorphic key and sends a homomorphic public key to a source block chain and a target block chain, the source block chain generates a symmetric key, the symmetric key is encrypted through the homomorphic public key, the source block chain generates a cross-chain processing request, the cross-chain processing request and the encrypted symmetric key are sent to the verifier, and the verifier sends a target query request to an organization node in the target block chain according to the cross-chain processing request;
step 2: the organization node receives the target data query request, retrieves the target data query request to obtain target data, encrypts the target data through a homomorphic public key, and sends the target data and the organization node signature to a verifier;
and step 3: the verifying party verifies the acquired organization node signature, decrypts the encrypted symmetric key and the target data through the homomorphic private key after the verification is passed, encrypts the decrypted target data through the decrypted symmetric key, and sends the encrypted target data to the source block chain;
and 4, step 4: the public and private key pair of supervision account book and source area block chain and target area block chain is generated to the chain of supervision, and will public and private key pair is sent for source area block chain and target area block chain respectively, and source area block chain and target area block chain are to public and private key pair verifying, verify the back that passes, send supervision data to the chain of supervision to the storage is on the data supervision account book.
The target data may be at least one of transaction data, intelligent contract status data, and event data.
In step 1, the verifier generates a homomorphic key, sends the homomorphic public key to a source block chain and a target block chain, the source block chain generates a symmetric key, encrypts the symmetric key through the homomorphic public key, the source block chain generates a cross-chain processing request, and sends the cross-chain processing request and the encrypted symmetric key to the verifier, which specifically comprises the following steps:
the verification party generates a homomorphic secret key based on a homomorphic encryption technology, the homomorphic secret key comprises a homomorphic public key and a homomorphic private key, the homomorphic public key is sent to a source block chain and a target block chain, the source block chain generates a symmetric secret key based on a random function, the symmetric secret key is encrypted through the obtained homomorphic public key, the source block chain generates a cross-chain processing request, and the cross-chain processing request and the encrypted symmetric secret key are sent to the verification party;
the source block chain and the target block chain are different and can be mutually switched and mutually verified, the verifier can be a relay node or a relay block chain and can also be a node in the source block chain or the target block chain and is used for interacting with the source block chain and the target block chain respectively, and in order to interact with the target block chain and the source block chain, the verifier is preconfigured with basic information of interaction between the target block chain and the source block chain, wherein the basic information comprises a block chain network name, an organization root certificate, a node address and the like.
In step 1, the verifier sends a target query request to an organization node in a target block chain according to a cross-chain processing request, specifically:
the method comprises the steps that a source block chain sends a cross-chain processing request to a verifier, wherein the cross-chain request processing comprises a general verification type of the source block chain and a request structure of a target block chain, the general verification type is used for representing the type of a cross-chain verification requirement and is not constrained by the structures of the source block chain and the target block chain, the general verification type can comprise a source block chain identifier, a target data identifier and a target block chain identifier, the request structure is determined by the data structure of the target block chain, a request body of the target block chain is determined by the general verification type of the source block chain and the request structure of the target block chain, the target block chain can identify the request body, and a target data query request is sent to an organization node in the target block chain according to the determined request body of the target block chain;
in step 3, the verifying party verifies the acquired organization node signature, specifically:
the verification party presets an account key of the organization node, the obtained organization node signature is verified through the account key, a block head does not need to be stored and verified in the verification process, resource consumption can be reduced, a target block chain and target data do not need to depend on a Mercury tree, and the method is high in universality and wide in application range.
The verification party verifies the acquired organization node signature, after the verification is passed, the encrypted symmetric key and the encrypted target data are decrypted through the homomorphic private key, the decrypted target data are encrypted through the decrypted symmetric key, the encrypted target data are sent to the source block chain, the source block chain can decrypt the encrypted target data through the symmetric key, and in the whole cross-chain transmission process, the target data are all in an encrypted state and cannot be leaked, so that the data security is guaranteed.
In step 4, the chain of custody generates a data supervision ledger, specifically:
the supervision chain generates a data supervision account book with a set data format, the purpose of defining the data supervision account book with the set data format is to visually and effectively see out the supervised data, and meanwhile, the standard data supervision account book can calculate, check and the like related transactions, so that corresponding information in abnormal data is marked on the data supervision account book.
In step 4, the chain of supervision generates a public and private key pair of the source block chain and the target block chain, and sends the public and private key pair to the source block chain and the target block chain respectively, and the source block chain and the target block chain verify the public and private key pair, specifically:
the supervision chain automatically generates a public and private key pair of a source block chain and a target block chain by an open source tool or a public and private key, and distributes the public and private key pair to the source block chain and the target block chain through a CA certificate, the source block chain and the target block chain verify the authenticity of the public and private key pair through the CA certificate, and if the verification result is true, the supervision flow is continued. And if the verification result is false, interrupting the supervision flow.
Step 4 said, will supervise data transmission to chain of supervision to store on the data supervision account book, specifically do:
after the verification is passed, the supervision chain acquires supervision data in the source region block chain and the target region block chain according to a data format set in the data supervision account book, and stores the supervision data and the public and private key pair in the data supervision account book.
Supervision data in the calling data supervision ledger can be checked through public and private keys, supervision work is completed, and the supervision data are transaction data generally.
The invention can be implemented by a computer terminal which should be able to store a computer program which is able to load and implement the method described above.
The block chain cross-chain communication method provided by the invention can reduce the consumption of storage and calculation resources, can prevent data leakage in the cross-chain process, and can realize the supervision of cross-chain data; the source block chain sends a cross-chain processing request to a verifier, the verifier sends a target query request to an organization node in a target block chain according to the cross-chain processing request, the organization node retrieves through the target data query request to obtain target data, the target data and an organization node signature are sent to the verifier, the verifier verifies the obtained organization node signature, after the verification is passed, the target data are sent to the source block chain to complete cross-chain, a supervisory chain generates a data supervisory account book and a public and private key pair of the source block chain and the target block chain, the public and private key pair is respectively sent to the source block chain and the target block chain, the source block chain and the target block chain verify the public and private key pair, after the verification is passed, the supervisory data are sent to a supervisory chain and stored on the data supervisory account book and are supervised in real time, in the cross-chain process, the target block chain encrypts the target data through a homomorphic public key, the verifier decrypts the target data through the homomorphic private key and then encrypts the target data through the symmetric private key, so that the target data in the chain crossing process are guaranteed to be in an encrypted state, and the leakage of private data is prevented; compared with cross-link data verification through the Mercker verification, the block link network and the data do not need to adopt a Mercker tree organization structure, and the method has the characteristics of strong universality and wide application range; through the mode of establishing standard data supervision account book, realized the supervision to the chain data of striding, can directly perceivedly, effectual seeing out supervision data, the data supervision account book of standard simultaneously can calculate, reconcile etc. to on the data supervision account book of corresponding information mark in the abnormal data.
The principles and embodiments of the present invention have been described herein using specific examples, which are provided only to help understand the method and the core concept of the present invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, the specific embodiments and the application range may be changed. In view of the above, the present disclosure should not be construed as limiting the invention.
Claims (7)
1. A block chain cross-chain communication method is characterized by comprising the following steps:
step 1: the method comprises the steps that a verifier generates a homomorphic key and sends a homomorphic public key to a source block chain and a target block chain, the source block chain generates a symmetric key, the symmetric key is encrypted through the homomorphic public key, the source block chain generates a cross-chain processing request, the cross-chain processing request and the encrypted symmetric key are sent to the verifier, and the verifier sends a target query request to an organization node in the target block chain according to the cross-chain processing request;
step 2: the organization node receives the target data query request, retrieves the target data query request to obtain target data, encrypts the target data through a homomorphic public key, and sends the target data and the organization node signature to a verifier;
and step 3: the verifying party verifies the acquired organization node signature, decrypts the encrypted symmetric key and the target data through the homomorphic private key after the verification is passed, encrypts the decrypted target data through the decrypted symmetric key, and sends the encrypted target data to the source block chain;
and 4, step 4: the public and private key pair of supervision account book and source area block chain and target area block chain is generated to the chain of supervision, and will public and private key pair is sent for source area block chain and target area block chain respectively, and source area block chain and target area block chain are to public and private key pair verifying, verify the back that passes, send supervision data to the chain of supervision to the storage is on the data supervision account book.
2. The blockchain cross-chain communication method according to claim 1, wherein in step 1, the verifier generates a homomorphic key and sends a homomorphic public key to the source blockchain and the target blockchain, the source blockchain generates a symmetric key, encrypts the symmetric key through the homomorphic public key, the source blockchain generates a cross-chain processing request, and sends the cross-chain processing request and the encrypted symmetric key to the verifier, specifically:
the verification party generates a homomorphic secret key based on a homomorphic encryption technology, the homomorphic secret key comprises a homomorphic public key and a homomorphic private key, the homomorphic public key is sent to a source block chain and a target block chain, the source block chain generates a symmetric secret key based on a random function, the symmetric secret key is encrypted through the obtained homomorphic public key, the source block chain generates a cross-chain processing request, and the cross-chain processing request and the encrypted symmetric secret key are sent to the verification party.
3. The blockchain inter-chain communication method according to claim 1, wherein in step 1, the verifier sends a target query request to an organization node in the target blockchain according to the inter-chain processing request, specifically:
the method comprises the steps that a source block chain sends a cross-chain processing request to a verifier, wherein the cross-chain request processing comprises a general verification type of the source block chain and a request structure of a target block chain, a request body of the target block chain is determined through the general verification type of the source block chain and the request structure of the target block chain, and a target data query request is sent to an organization node in the target block chain according to the determined request body of the target block chain.
4. The blockchain inter-chain communication method according to claim 1, wherein in step 3, the verifier verifies the acquired organization node signature, specifically:
and verifying the acquired organization node signature through an account key of the organization node preset by the verifier.
5. The blockchain inter-chain communication method according to claim 1, wherein in step 4, the chain of custody generates a data custody ledger, specifically:
the supervision chain generates a data supervision ledger book with a set data format, and the data supervision ledger book is used for visually checking supervision data and calculating or reconciling related transactions.
6. The blockchain inter-chain communication method according to claim 5, wherein in step 4, the chain of custody generates a public-private key pair of the source blockchain and the destination blockchain, and sends the public-private key pair to the source blockchain and the destination blockchain, respectively, and the source blockchain and the destination blockchain verify the public-private key pair by:
the supervision chain automatically generates a network address through an open source tool or a public and private key to generate a public and private key pair of the source block chain and the target block chain, and distributes the public and private key pair to the source block chain and the target block chain through a CA certificate, and the source block chain and the target block chain verify the authenticity of the public and private key pair through the CA certificate.
7. The blockchain inter-chain communication method according to claim 6, wherein in step 4, the supervision data is sent to the chain of custody and stored in a data supervision ledger, specifically:
after the verification is passed, the supervision chain acquires supervision data in the source region block chain and the target region block chain according to a data format set in the data supervision account book, and stores the supervision data and the public and private key pair in the data supervision account book.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110478443.1A CN113111370A (en) | 2021-04-30 | 2021-04-30 | Block chain cross-chain communication method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110478443.1A CN113111370A (en) | 2021-04-30 | 2021-04-30 | Block chain cross-chain communication method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113111370A true CN113111370A (en) | 2021-07-13 |
Family
ID=76720666
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110478443.1A Pending CN113111370A (en) | 2021-04-30 | 2021-04-30 | Block chain cross-chain communication method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113111370A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115001801A (en) * | 2022-05-30 | 2022-09-02 | 北京沸铜科技有限公司 | Block chain-based digital content heterogeneous chain cross-chain authorization method |
CN115643074A (en) * | 2022-10-14 | 2023-01-24 | 中国科学技术大学 | Data circulation method and system based on alliance chain, storage medium and electronic equipment |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110807206A (en) * | 2019-10-07 | 2020-02-18 | 复旦大学 | College certificate storage management system based on block chain and attribute password |
CN111523891A (en) * | 2020-04-23 | 2020-08-11 | 腾讯科技(深圳)有限公司 | Block chain based information encryption method, device, equipment and storage medium |
CN111639361A (en) * | 2020-05-15 | 2020-09-08 | 中国科学院信息工程研究所 | Block chain key management method, multi-person common signature method and electronic device |
CN111769958A (en) * | 2020-09-02 | 2020-10-13 | 百度在线网络技术(北京)有限公司 | Block chain cross-chain processing method, device, equipment and storage medium |
CN111797164A (en) * | 2020-06-24 | 2020-10-20 | 北京荷月科技有限公司 | Cross-chain transaction supervision method and system based on block chain |
-
2021
- 2021-04-30 CN CN202110478443.1A patent/CN113111370A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110807206A (en) * | 2019-10-07 | 2020-02-18 | 复旦大学 | College certificate storage management system based on block chain and attribute password |
CN111523891A (en) * | 2020-04-23 | 2020-08-11 | 腾讯科技(深圳)有限公司 | Block chain based information encryption method, device, equipment and storage medium |
CN111639361A (en) * | 2020-05-15 | 2020-09-08 | 中国科学院信息工程研究所 | Block chain key management method, multi-person common signature method and electronic device |
CN111797164A (en) * | 2020-06-24 | 2020-10-20 | 北京荷月科技有限公司 | Cross-chain transaction supervision method and system based on block chain |
CN111769958A (en) * | 2020-09-02 | 2020-10-13 | 百度在线网络技术(北京)有限公司 | Block chain cross-chain processing method, device, equipment and storage medium |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115001801A (en) * | 2022-05-30 | 2022-09-02 | 北京沸铜科技有限公司 | Block chain-based digital content heterogeneous chain cross-chain authorization method |
CN115001801B (en) * | 2022-05-30 | 2023-05-30 | 北京沸铜科技有限公司 | Digital content heterogeneous chain cross-chain authorization method based on blockchain |
CN115643074A (en) * | 2022-10-14 | 2023-01-24 | 中国科学技术大学 | Data circulation method and system based on alliance chain, storage medium and electronic equipment |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112446785A (en) | Cross-chain transaction method, system, device, equipment and storage medium | |
TW201947446A (en) | Blockchain-based information supervision method and device | |
CN110933108A (en) | Data processing method and device based on block chain network, electronic equipment and storage medium | |
CN106230808A (en) | A kind of personal credit information system method based on block chain technology | |
CN112507363A (en) | Data supervision method, device and equipment based on block chain and storage medium | |
CN106296359A (en) | Credible electric power networks transaction platform based on block chain technology | |
CN106559211A (en) | Secret protection intelligence contract method in a kind of block chain | |
CN105610837B (en) | For identity authentication method and system between SCADA system main website and slave station | |
CN115345618B (en) | Block chain transaction verification method and system based on mixed quantum digital signature | |
CN112069550A (en) | Electronic contract deposit certificate system based on intelligent contract mode | |
CN109670828A (en) | A kind of application on-line signature method and system | |
CN108920976A (en) | A kind of contract signing method, apparatus and system | |
CN113111370A (en) | Block chain cross-chain communication method | |
CN107277000A (en) | A kind of electronic certificate method for managing security and system | |
CN111797164A (en) | Cross-chain transaction supervision method and system based on block chain | |
CN113822675A (en) | Block chain based message processing method, device, equipment and storage medium | |
CN112532656A (en) | Block chain-based data encryption and decryption method and device and related equipment | |
CN114760071B (en) | Zero-knowledge proof based cross-domain digital certificate management method, system and medium | |
TWI724667B (en) | System of identity management and authorization and method thereof | |
CN115953244A (en) | Transaction supervision method and device based on block chain, electronic equipment and storage medium | |
CN113868713B (en) | Data verification method and device, electronic equipment and storage medium | |
CN112035896A (en) | Electronic contract deposit certificate system based on transaction mode | |
CN112115432A (en) | Block chain based electronic seal credible use system and method | |
CN115664659A (en) | Method, device, equipment and medium for supervising blockchain transaction data | |
CN114363013A (en) | Supervision-friendly block chain content privacy protection system, message sending method and query method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20220922 Address after: Room 305, No. 188, Zhugushi Road, Wulian, Central City, Longgang Street, Longgang District, Shenzhen, Guangdong 518100 Applicant after: Jiaqiao (Shenzhen) Investment Co.,Ltd. Address before: D-1908, 19th floor, building 222, Wangjing Xiyuan, Chaoyang District, Beijing Applicant before: Yongqi (Beijing) Technology Co.,Ltd. |