![]() business processing method and business processing apparatus
专利摘要:
The present application discloses a method and apparatus for business processing. In the method, a first block chain node can send to a consensus network a business request generated according to business information sent by a user, so that when a second block chain node in the consensus network checks a business result obtained by a third block chain node in the consensus network according to the business request as legal, the first node of the block chain performs a first designated operation by triggering a first smart contract in the business request. The first node in the block chain uses the smart contract that can be executed automatically, so that the first node in the block chain can automatically perform the first designated operation using the first smart contract when the business result obtained by the third node in the chain. Block request sent by the first node of the block chain passes the check performed by the second node of the block chain. In addition, the second block chain node can verify the business result obtained by the third block chain node. therefore, the entire process for business processing is provided with an impartial system, thereby improving the impartiality of business processing. 公开号:BR112019007128A2 申请号:R112019007128 申请日:2018-03-06 公开日:2019-10-01 发明作者:Li Ning 申请人:Alibaba Group Holding Ltd; IPC主号:
专利说明:
“METHOD FOR BUSINESS PROCESSING AND DEVICE FOR BUSINESS PROCESSING” Priority Claim [001] This application claims priority for Chinese Patent Application No. 201710133969.X filed on March 8, 2017, the entire contents of which are incorporated by reference . Field of Invention [002] The present application concerns the field of computer technologies and, in particular, a method and device for business processing. Background to the Invention [003] At the moment, users can rely on some business management organizations to handle some negotiations for them, and these business management organizations can provide professional business management services to users. Business management organizations complete relatively complex and tedious business processing procedures for users, while users only have to pay certain fees. Therefore, business management is made easier for users. [004] For example, when needing to process a business through a business control organization, a user can send a business request to the business control organization using a terminal maintained by it. The business control organization can obtain a corresponding business result according to the business request sent by the user and return the business result to the user. [005] However, in real applications, some business management organizations may experience some counterfeiting behavior Petition 870190055684, dated 06/17/2019, p. 9/88 2/66 in business management processes for users, and returning incorrect business results to users, thereby undermining the benefits of users. [006] When taking valuation assets as an example, when dealing with a valuation asset business through an asset valuation organization (ie a business control organization), a user can send asset data to be appraised and a valid personal certificate for the asset appraisal organization in a manner of a business application. After receiving the business request, the asset valuation organization can intentionally provide a false asset valuation report and return the asset valuation report to the user as a result of the deal. In that case, the user may not be able to subsequently transfer a property right, compensate for loss of insurance, liquidate assets and other behavior according to the asset valuation report, causing a loss to the user's property until certain point. [007] It can be seen from the illustration above that the process of conducting business management by a user through the business control organization lacks a guarantee of trust and, therefore, a certain loss can be caused during the processing of the business. How to build a reliable trust mechanism between a user and a business control organization to protect the user from losses during business processing is an urgent problem to be solved. Description of the Invention [008] The embodiments of the present application provide a method for business processing, to solve the state of the art problem that a user may suffer losses when processing a business through a business control organization. Petition 870190055684, dated 06/17/2019, p. 10/88 3/66 [009] The embodiments of this application provide a method for business processing, including: receive, by a first node in the block chain, business information sent by a user; generate a corresponding business request according to the business information, the business request including a first smart contract generated according to the business information; and send the business request to a consensus network, so that a third node in the block chain in the consensus network obtains a corresponding business result according to the business request and executes a first designated operation by triggering the first smart contract when it is determined that a second node in the block chain in the consensus network verifies the outcome of the deal as legal. [010] The embodiments of the present application provide a device for business processing, to solve the problem in the state of the art, according to which a user may suffer losses when processing a business through a business control organization. [011] The embodiments of this application provide a device for business processing, including: a receiving module configured to receive business information sent by a user; a generation module configured to generate a corresponding business request according to the business information, the business request including a first smart contract generated according to the business information; and a sending module configured to send the business request to a consensus network, so that a third node in the block chain in the consensus network obtains a corresponding business result Petition 870190055684, dated 06/17/2019, p. 11/88 4/66 according to the deal request and perform a first designated operation by triggering the first smart contract when it is determined that a second node in the block chain in the consensus network verifies the outcome of the deal as legal. [012] The embodiments of the present application provide a method for business processing, to solve the state of the art problem that a user may suffer losses when suing a company through a business control organization. [013] The embodiments of this application provide a method for processing business, including: acquire, through a second node in the block chain from a consensus network, business feedback information sent through a third node in the block chain; acquire a business result from the third node in the block chain according to the business feedback information, the business result being generated by the third node in the block chain according to a business request sent by a first node in the block chain of blocks to the consensus network; and when the outcome of the deal is verified as legal, allow the first node in the block chain to perform a first designated operation by triggering a first smart contract. [014] The embodiments of the present application provide a device for business processing, to solve the problem in the state of the art, according to which a user may suffer losses when processing a business through a business control organization. [015] The embodiments of this application provide a device for business processing, including: an information acquisition module configured to acquire, Petition 870190055684, dated 06/17/2019, p. 12/88 5/66 from a consensus network, business feedback information sent through a third node in the block chain; a result acquisition module configured to acquire a business result from the third block chain node according to the business feedback information, the business result being generated by the third block chain node according to a request business sent by a first node in the block chain to the consensus network; and a verification module configured to, when verifying the outcome of the deal as legal, allow the first node in the block chain to perform a first designated operation by triggering a first smart contract. [016] The embodiments of the present application provide a method for business processing, to solve the state of the art problem that a user may suffer losses when processing a business through a business control organization. [017] The embodiments of this application provide a method for processing business, including: acquire, through a third node in the block chain, a business request sent by a first node in the block chain using a consensus network, the business request including the first smart contract generated by the first node in the block chain accordingly with business information sent by a user; obtain a business result and business feedback information according to the business request; and send the business feedback information to the consensus network, so that a second node in the consensus chain acquires the business outcome from the third node in the block chain according to the business feedback information and when the outcome of the business for Petition 870190055684, dated 06/17/2019, p. 13/88 6/66 verified as legal, allows the first node in the block chain to perform a first designated operation by triggering the first smart contract. [018] The embodiments of the present application provide a device for business processing, to solve the state of the art problem, according to which a user may suffer losses when processing a business through a business control organization. [019] The embodiments of this application provide a device for business processing, including: a request acquisition module configured to acquire a business request sent by a first node in the block chain using a consensus network, the business request including a first smart contract generated by the first node in the block chain according to information from the business sent by a user; an information generation module configured to obtain a business result and business feedback information according to the business request; and an information submission module configured to send the business feedback information to the consensus network, so that a second node of the block chain in the consensus network acquires the business result from the device according to the information business feedback and when the business result is verified as legal, allows the first node in the block chain to perform a first designated operation by triggering the first smart contract. [020] The at least one technical solution used above in the embodiments of the present application can achieve the following beneficial effects: [021] In the embodiments of this request, a first node in the block chain uses a smart contract that can be executed Petition 870190055684, dated 06/17/2019, p. 14/88 7/66 automatically. Therefore, the first node in the block chain can perform a first designated operation by triggering the first smart contract, since a business result obtained through a third node in the block chain according to a business request sent by the first node in the block. block chain goes through the verification performed by a second block chain node. The designated operation during business processing can be completed fairly, without manual intervention. In addition, as the second node in the block chain can verify the business result obtained by the third node in the block chain, the entire business processing procedure is provided with an impartial system, thereby greatly improving the impartiality of processing and reducing the possibility of a user suffering losses during business processing. Brief Description of the Drawings [022] The accompanying drawings described herein are used to provide a better understanding of the present application and to construct a part of the present application. The embodiments of the present application and illustrations thereof are used to explain the present application, but are not intended to constitute any improper limitation in the present application. In the attached drawings: Figure 1 is a schematic diagram of a user performing business processing using a consensus network of block chains according to an embodiment of the present application; Figure 2 is a schematic diagram of a business processing procedure according to an embodiment of the present application; Figure 3 is a schematic diagram of a business processing device according to an embodiment of Petition 870190055684, dated 06/17/2019, p. 15/88 8/66 the present invention; Figure 4 is a schematic diagram of a second device for processing business according to an embodiment of the present application; and Figure 5 is a schematic diagram of a third device for business processing according to an embodiment of the present invention. Description of Accomplishments of the Invention [023] In order to ensure the effective impartiality of a process in which a user performs business processing through a business control organization, in this application, a trust mechanism can be established between the user and the business control organization using a consensus network of block chains. That is, through the characteristic of resistance to tampering of data stored in the block chains of the consensus network, a business request sent by the user and a business result obtained by the business control organization according to the business request have effective impartiality. In addition, to further improve impartiality during business processing, an audit department is introduced as a block chain node in this order to verify the business request sent by the user and the business outcome obtained by the controlling organization of business. After the verification is successful, a smart contract is triggered by means of a signal to automatically execute a designated operation, thus implementing a process of automatically completing business processing without manual intervention. The relationships between the user, the business control organization and the audit department are shown in Figure 1. [024] Figure 1 is a schematic diagram of a user who Petition 870190055684, dated 06/17/2019, p. 16/88 9/66 performs business processing using a consensus network of block chains according to an embodiment of the present application. [025] In Figure 1, the entire consensus network includes several nodes in the block chain. A terminal on which the user submits a business request, the business control organization and the audit department are all nodes in the block chain across the consensus network. The user can send a business request to the consensus network using the terminal that serves as a node in the first block chain. After the business request enters the consensus network, the business control organization, as a third node in the block chain, can accept the business request and obtain a corresponding business result. Subsequently, the audit department, as a second node in the block chain, can verify the business result obtained by the third node in the block chain. After it is determined that the business outcome has been verified, the audit department triggers, by signal, the first node in the block chain to perform a first operation designated using the smart contract, that is, the transfer of a certain amount money into a user account for the business tracking organization. In addition, the business outcome obtained by the business organization and the business request submitted by the user can still be stored in a block chain in the form of a summary of the information, and this creates a basis for subsequent authentication on whether the outcome of the business and the business request have been modified. [026] In the form of this order, the business request sent by the user to the consensus network includes a first smart contract. With the first smart contract, the first node in the block chain can automatically perform the first operation Petition 870190055684, dated 06/17/2019, p. 17/88 10/66 designated using the smart contract, subsequently, since the audit department, as the second node in the block chain, verifies the business result obtained by the third node in the block chain according to the business request as legal . [027] The business result information generated by the third node in the block chain, according to the business result, includes a second smart contract. With the second smart contract, the third node in the block chain can perform a second designated operation by automatically triggering the smart contract, subsequently, since the second node in the block chain verifies the business result obtained by the third node in the block chain as illegal. Here, "first" and "second" are used only to distinguish different smart contracts from each other and have no special meanings. [028] In order to enable those skilled in the art to better understand the technical solutions in the present application, the technical solutions in the embodiments of the present application will be described clearly and completely below in combination with the accompanying drawings in the embodiments of the present request. It is evident that the described embodiments are only some of the embodiments of the present application, rather than all the embodiments. Based on the embodiments of this application, all other embodiments derived by those skilled in the art, without any creative effort, should fall within the scope of protection of this application. [029] Figure 2 is a schematic diagram of a business processing procedure according to an embodiment of the present application, specifically including the following steps: S201: A first node in the block chain receives business information sent by a user. Petition 870190055684, dated 06/17/2019, p. 18/88 11/66 [030] In a real application, when the user needs to perform business processing through a business control organization, the user can send a business request to the business control organization through a terminal and the business order is generated by the terminal according to the user entering business information in the terminal. For example, during the valuation of assets, when the real estate valuation is to be carried out, the user can enter valid certificate information, real estate information and a required reward for this property valuation at the terminal. After receiving the information, the terminal can generate a corresponding property evaluation request according to the information. [031] Based on this, in the way of carrying out this order, the user can enter corresponding business information at the terminal during business processing. In addition to entering some information at a designated position on a terminal interface, the user can also send some information to the terminal. The terminal mentioned here is the first node in the block chain in the consensus network. [032] It should be noted that, in the embodiment of this application, in addition to being the terminal, the first node in the block chain may also be a designated customer terminal at the terminal. The first node in the block chain can also be a server. That is, the user uploads business information to a server using a terminal and the server can generate a corresponding business request according to the business information received. S202: A first smart contract that combines the business information and a business request is generated according to the business information. [033] After receiving the business information sent Petition 870190055684, dated 06/17/2019, p. 19/88 12/66 by the user, the first node in the block chain can generate, according to the business information, a first smart contract that corresponds to the business information. In the embodiment of this request, the function of the first smart contract is that: since a second node in the block chain verifies a business result generated through a third node in the block chain according to the request for business sent by the first node in the block chain, the first node in the block chain generally needs to perform a designated first operation by triggering the first smart contract. The first designated operation is, for example, transferring a portion of resources designated in a user account address to an account address of the third node in the block chain. Therefore, business information received by the first node in the block chain generally includes the user's account address, as well as a reward (ie, designated resources) paid to the business control organization (ie, the third node in the business). block chain) to control this business. Therefore, in the execution of this order, the first node in the block chain can generate the first smart contract according to the user's account address and the reward paid by the user to the business control organization that is included in the information of the user. business. Definitely, the first smart contract can also be generated based on other business information. [034] In the embodiment of this order, the first node in the block chain can compile the business information received using a predefined SOLC compiler to obtain the first smart contract. In addition, the first node in the block chain can also generate the first smart contract using other ways of compilation, which will not be exemplified one by one here. [035] After generating the first smart contract, the first Petition 870190055684, dated 06/17/2019, p. 20/88 13/66 block chain node can also generate a business request corresponding to the business information, according to the business information received and the first smart contract. The business request can also include the user's account address, in addition to the first smart contract. In addition, the business request may also include abstract information from the business information. Abstract information is included because the first node in the block chain needs to send the business request to the consensus network subsequently, and generally all nodes in the block chain in the consensus network can view the business request in the consensus network and if the business request directly includes the business information loaded by the user at the first node in the block chain, the user information may leak, causing inconvenience to the user. [036] For example, assuming the user requires real estate appraisal, it is usually necessary for the user to send their detailed real estate information to the first node in the block chain (if the first node in the block chain is a service platform, the service platform needs to be a qualified platform certified by a related department, ie the service platform will not leak information uploaded by the user). If the first node in the block chain does not process the real estate information sent by the user, but directly adds real estate information to the generated business request, once the business request enters the entire consensus network, the block chain nodes in the consensus network will inevitably see the user's real estate information, thereby causing the user's information to leak. [037] Therefore, to protect the business information sent by the user from being disclosed, in the form of the present order, the first node in the block chain will generate, according to the Petition 870190055684, dated 06/17/2019, p. 21/88 14/66 business information received, a summary of business information (definitely, data desensitization process can also be performed on business information), add the summary of information to the business request and send the business request to the network consensus. In this way, although all the nodes in the block chain in the consensus network can see the business request, they can only see the summary of the information in the business request and cannot obtain the actual business information, which actually corresponds to the summary of information, thereby protecting user information from leaking. [038] In addition, another purpose of the information summary is as follows: how the information summary is generated by the first node in the block chain using a predefined information summary algorithm and the business information received, the business information and the summary of information has a unique corresponding relationship. That is, once the content of the business information is changed, a summary of the information generated using the predefined information summary algorithm is definitely different from the previous information summary (that is, the information summary generated before the information content). change). In this way, the objective of effectively verifying whether the user or another person (or a node in the block chain) has actively modified the business information in the subsequent procedure can be achieved. [039] It should be noted that, in addition to being generated by the first node in the block chain according to the business information sent by the user, the first smart contract can still be compiled by the user. Correspondingly, the user can send the first compiled smart contract to the first block chain node, such that the first block chain node generates a business request including the first smart contract according to the business information sent by the Petition 870190055684, dated 06/17/2019, p. 22/88 15/66 user and the first smart contract. S203: The business request, including a first smart contract in a pending verification state, is sent to the consensus network. [040] After obtaining the business request, the first node in the block chain can send the business request to the consensus network. The first node in the block chain can send the business request to the consensus network in a transaction form. For example, a small transaction is initiated and the business request is made in the transaction and sent to the consensus network, so that when the third node in the block chain subsequently accepts that transaction, the third node in the block chain also accepts the business request. [041] Generally speaking, the smart contract needs a certain trigger condition to perform several actions. The trigger condition here can be implemented by changing the status of the smart contract. Therefore, in the embodiment of this order, the first smart contract has different states at different stages. Once the state is changed, the first smart contract is triggered to transform the next stage, that is, a different action is triggered to be performed. On that basis, when the first node in the block chain sends the business request to the consensus network, the status of the first smart contract in the business request can be changed from an initial state of non-state to a state pending verification, from so that the second node in the block chain verifies, in a subsequent procedure, the legality of the business request, including the first smart contract in the pending verification state. [042] Definitely, when the first node in the block chain Petition 870190055684, dated 06/17/2019, p. 23/88 16/66 generates the first smart contract according to the business information received, the first smart contract is in the pending verification state. In other words, when the first smart contract is generated, its initial state is the pending verification state. Subsequently, the first node in the block chain can send the business request, including the first smart contract in the pending verification state to the consensus network, so that the second node in the block chain in the consensus network verifies the legality of the business request. S204: The second node in the block chain acquires, from the first node in the block chain, according to the business request, business information corresponding to the business request. [043] In the embodiment of this request, the nodes in the block chain in the consensus network may have multiple business requests and the different business requests may be in stages for different business processing. For example, some business requests can be sent only from the first node in the block chain to the consensus network, and some business requests can be carried out to some extent. Marking the stages for business processing of business requests can be implemented using smart contract states included in business requests. Therefore, for some business requests that have just entered the consensus network, the second node in the block chain (ie, the audit department) in the consensus network needs to verify business requests, including first smart contracts in the pending state. verification and verify the legality of such business requests in the subsequent procedure. S205: It is verified whether the business information is legal and, if so, step S206 is performed; or if not, step S207 is performed. Petition 870190055684, dated 06/17/2019, p. 24/88 17/66 S206: The signature is executed on the deal request, so that the status of the first smart contract is changed from the pending verification state to a pending acceptance state and the first node in the block chain freezes a first defined amount of resources designated in a user account address in the business request using the first smart contract in the pending acceptance state. S207: No signature is made on the business request, so the first node in the block chain determines that the business request was not accepted. [044] When viewing the business request, including the first smart contract in the pending verification state of the consensus network, the second node in the block chain needs to verify the legality of the business request. The verification is performed because, in a real application, the business control organization can deceive the user, and the user can also deceive the business control organization. For example, when conducting property appraisal through the business organization, the user may provide false information about real estate that is inconsistent with reality for the business organization, so that the business organization obtains a property appraisal report (ie , a business result) inconsistent with reality according to the real estate information provided by the user. Using the real estate information, the user can then sue the business control organization for the real estate valuation report inconsistent with reality. This can negatively affect the business control organization. [045] Therefore, in order to avoid the above situation, in the form of the present request, before the third second node in the block chain accepts and processes the business request sent by the first second node in the block chain, the second node in the block chain. block chain (that is, the Petition 870190055684, dated 06/17/2019, p. 25/88 18/66 audit department) can first verify the business request to ensure the legality of the business request. [046] Specifically, when viewing the business request including the first smart contract in the pending state of verification in the consensus network, the second node in the block chain can acquire, from the first node in the block chain, business information sent by the user to the first node in the block chain, and verify the legality of the business information. If the business information is verified as legal, the second node in the block chain can sign the business request on the consensus network. After the business request is signed by the second node in the block chain, the first smart contract in the business request will change from the pending verification state to the pending acceptance state. In this way, the third node in the block chain can subsequently accept the business request, including the first smart contract in the pending acceptance state. In other words, because the second node in the block chain subscribes to the business request, it is guaranteed that, to some extent, the business request accepted by the third node in the block chain is a legal business request. [047] At the same time, once the second block chain node signs on the business request, the block chain nodes across the consensus network can establish consensus on the business request. Once the consensus is established, the business request will be registered in block chains in the consensus network, that is, block chains from the nodes in the block chain. The information recorded in the block chains is resistant to tampering, and therefore, after being registered in the block chains, the business request can be used in a subsequent procedure to verify that the business information sent by the user and the result obtained by the third node in the chain Petition 870190055684, dated 06/17/2019, p. 26/88 19/66 blocks (ie the business control organization) according to the business information have been modified (as the business request includes the summary of information generated by the first node in the block chain according to the information from the business business), thus guaranteeing impartiality of all business processing. [048] In addition, since the second node in the block chain determines the business information to be legal and signs on the business request, the first node in the block chain can freeze the first defined amount of resources designated in the account address of the user using the first smart contract in the pending acceptance state, for use in subsequent commercial settlement. [049] In addition to verifying that the business information acquired from the first node in the block chain is legal, the second node in the block chain must also verify that the business information corresponds exclusively to the summary of the information in the business request and that the first smart contract in the business request was reasonably made. Definitely, the second node in the block chain also needs to analyze, using a public key (or a private key) kept in itself, the user's account address included in the business request and determine the legality of the account address. Once the second block chain node verifies all of the above as legal, the signature is executed on the business request, so that the block chain nodes in the consensus network establish consensus on the business request and the status of the first smart contract in the business request is triggered to change from the pending verification state to a pending acceptance state. Whether the second node in the block chain uses a public key or a private key to analyze the user account address included in the business request depends on whether the first node in the block chain uses a Petition 870190055684, dated 06/17/2019, p. 27/88 20/66 private or public key when generating the business request. [050] When the second node in the block chain verifies the business request as illegal (for example, the user's account address is illegal, the business information is inconsistent with the summary of the information in the business request, the first contract is done for no reason and the information is illegal), no signature is made on the business request, so the first node in the block chain determines that the business request was not accepted and returns a message indicating failure to accept the request to the user. The way to determine, by the first node in the block chain, that the business request was not accepted can be: when the first node in the block chain monitors, using the first smart contract in the business request, that the second node in the chain of blocks does not yet sign the business request after the first defined duration, the message indicating that the business request was not accepted is automatically triggered using the first smart contract to be returned to the first node in the block chain. Therefore, the user learns, according to the message received by the first node in the block chain, that the business request sent using the first node in the block chain does not pass the audit performed by the second node in the block chain. Definitely, in the execution of this request, once the business request is verified as illegal, the second node of the block chain can send the message indicating that the business request has not passed directly to the first node of the block chain. in the audit. [051] It should be noted that, in the execution of this request, the second node in the block chain is the audit department that can audit the business request and the business result sent by the business control organization. Therefore, the second node in the supply chain Petition 870190055684, dated 06/17/2019, p. 28/88 21/66 blocks are allowed to acquire business information from the first node in the block chain. Considering that it is necessary to protect the user's business information from being acquired by an illegal organization and disclosed, in the form of the present order, when the second node of the block chain views the business request and needs to verify the legality of the request for business, a self-maintained security certificate (ie the second node in the block chain) can be sent to the first node in the block chain, and the first node in the block chain can verify the qualification of the second node in the block block chain using the security certificate. Once it has been determined that the second node in the block chain has the right to verify the legality of business information sent by the user, the second node in the block chain can be authorized to acquire, from the first node in the block chain, the business information sent by the user; otherwise, permission will not be granted to the second node in the block chain. S208: The third node in the block chain acquires the business request, including the first smart contract in the pending acceptance state. [052] After verifying, using the business request, the business information corresponding to the business request as legal, the second node in the block chain can sign the business request to make the first smart contract in the business request switch from pending verification status to pending acceptance status. The business request, including the first smart contract in the pending acceptance state, is a business request verified by the second node in the block chain (ie, the audit department) and therefore the business request is legal. As a result, the third node in the block chain (ie the business control organization) can accept Petition 870190055684, dated 06/17/2019, p. 29/88 22/66 subsequently the deal request, including the first smart contract in the pending acceptance state. As is known from step S203 above, the first node in the block chain can add the business request to a transaction and send the transaction to the consensus network. Therefore, the third node in the block chain can accept the transaction sent by the first node in the block chain, being equivalent to accepting the business request. [053] After the third node in the block chain receives the deal request, the first smart contract in the deal request will change from the pending acceptance state to an acceptance state. This is because there may be multiple third-party nodes in the block chain across the consensus network in an actual application, that is, there may be multiple business management organizations. Generally, after a business control organization accepts the business request, another business control organization should no longer accept the business request. If the business request is accepted repeatedly, several business results can finally occur, which not only causes problems for the user, but also causes business disputes for business management organizations. [054] To avoid the above situation, in the form of the present order, once a third node in the block chain accepts the business request, the first smart contract in the business request will change from the pending acceptance state to the state acceptance. This way, another third node in the block chain (that is, another business control organization) will not accept the business request again when it sees that the first smart contract in the business request is in the acceptance state, thereby preventing the request agreement is accepted repeatedly. Petition 870190055684, dated 06/17/2019, p. 30/88 23/66 [055] It should be noted that, in the embodiment of this request, when the first node in the block chain sends the business request to the consensus network, usually the nodes in the block chain (including the second node of the block chain and the third node of the block chain) the consensus network receives all business requests. In the embodiment of the present application, the status of the first smart contract needs to be synchronized between the nodes in the block chain. Therefore, when signing on the business request, the second node in the block chain can send a message indicating that the business request has passed verification to another node in the block chain in the consensus network. After the third block chain node in the consensus network receives the message, the first smart contract in the existing business request on the third block chain node can be automatically triggered to change its own state to the pending acceptance state. In this way, in the subsequent procedure, the third node in the block chain can process the business request, including the first smart contract in the pending acceptance state. [056] Furthermore, in the embodiment of this request, the first node in the block chain can first send the business request to the second node in the block chain in the consensus network. When it is determined that the business request has passed verification, the second node in the block chain can sign the business request, so that the status of the first smart contract in the business request changes to the pending acceptance state. The business request, including the first smart contract in the pending acceptance state, is then sent subsequently to the nodes in the block chain in the consensus network. At the same time, the second node in the block chain may return a message indicating that the request for Petition 870190055684, dated 06/17/2019, p. 31/88 24/66 business has passed verification, so that the first node in the block chain changes the state of the first smart contract of the business request stored in it to the pending acceptance state. Likewise, upon receiving the business request, including the first smart contract in the pending acceptance state, the third node in the block chain can receive and process the business request. [057] Definitely, in the form of the present order, the second node of the block chain can also synchronize the status of the first smart contract by coverage. That is, the first node in the block chain can first send the business request to the nodes in the block chain in the consensus network. At this point, at the nodes in the block chain (including the second node in the block chain and the third node in the block chain), the states of the first smart contracts in the business requests are both in the pending verification state. Upon receiving the business request, including the first smart contract in the pending verification state, the third node in the block chain will not process the business request. At the same time, upon receiving the business request, including the first smart contract in the pending verification state, other nodes in the block chain will not establish consensus on the business request. [058] After receiving the business request, the second node in the block chain will verify the business request. Once the business request is verified as legal, the status of the first smart contract on the second node of the block chain can be changed via signaling, that is, it has changed to the status of pending acceptance. The second block chain node can then send the business request including the first smart contract in the pending acceptance state to the block chain nodes in the consensus network. After receiving the request for Petition 870190055684, dated 06/17/2019, p. 32/88 25/66 business, including the first smart contract in the pending acceptance state, the nodes in the block chain can cover (or remove) the previously received business request, including the first smart contract in the pending verification state and establish consensus on the business request including the first smart contract in the pending verification state. At the same time, the third node in the block chain can process the business request to obtain a result from the corresponding business. S209: A business result corresponding to the business request is obtained according to the business request. [059] After acquiring the business request, the third node in the block chain (ie the business control organization) needs to obtain the result of the corresponding business according to the business request. The business request includes a summary of the information instead of the information itself, the third node in the block chain cannot obtain a reasonable business outcome according to the summary of the information. Therefore, the third node in the block chain needs to acquire the business information corresponding to the summary of information from the first node in the block chain, thus obtaining the result of the corresponding business according to the business information. [060] Based on this, in the form of the present request, after acquiring the business request, the third node in the block chain can send a message to accept the business request to the first node in the block chain. When the user views the message using the first node in the block chain and allows the third node in the block chain to accept the business request sent by the user, a message to allow acceptance can be returned to the third node in the block chain using the first node in the block chain and the first node in the block chain is enabled to grant access permission to Petition 870190055684, dated 06/17/2019, p. 33/88 26/66 the third node in the block chain. After receiving the message to allow acceptance returned by the first node in the block chain (that is, after being monitored that the first node in the block chain allows the third node in the block chain to accept the business request), the third block chain node acquires, from the first block chain node, the business information corresponding to the business request according to the access permission acquired from the block chain node and the business request. The first node in the block chain defines an access permission for the first node in the block chain, in order to prevent some illegal organizations from acquiring and leaking the user's business information, thus preventing losses for the user. [061] After acquiring the business information from the first block chain node, the third block chain node can obtain the business result corresponding to the business information according to the business information. The business outcome can be produced by a specialist in business control. The business control specialist can load the business result into the third node in the block chain, so that the business result is achieved. S210: The business feedback information that corresponds to the business result is generated according to the business result, the business feedback information, including a second smart contract obtained by the third node in the block chain, according to the request business [062] After the third node of the block chain obtains the result of the deal, the result of the deal needs to be audited by the second node of the block chain in the consensus network in the subsequent procedure. The third node in the block chain cannot directly send business information to the consensus network, as the result of the Petition 870190055684, dated 06/17/2019, p. 34/88 27/66 business obtained by the third node in the block chain may reflect the user's business information. If an illegal organization obtains the result of the business, an illegal operation can be performed on the user's property according to the result of the business, causing losses to the user. [063] Therefore, in the present order, after the third node of the block chain acquires the business result of the first node of the block chain, it is necessary to generate the business feedback information corresponding to the result of the business according to the result of the business obtained. The third node in the block chain can generate a result summary of the business result using a predefined information summary algorithm, add the result summary to the subsequently generated business feedback information and send the business feedback information to the network consensus. In addition to effectively preventing business information from being disclosed, the result summary can provide a powerful basis for subsequent verification of whether the third node in the block chain modifies the result of the business obtained (because the result summary is exclusively corresponding to the result of the business, if the content in the business result is changed, it is impossible to obtain a summary of results identical to the previous one, according to the result of the changed business, using the same information summary algorithm). [064] In addition, in the execution of this order, the third node of the block chain can also generate a second smart contract that corresponds to the business result according to the result of the obtained business and add the second smart contract to the information subsequently generated business feedback. This is because, in a real application, the business control organization can Petition 870190055684, dated 06/17/2019, p. 35/88 28/66 deceive the user, that is, obtain a false business result according to real business information provided by the user, causing losses to the user. The business control organization may refuse to admit cheating behavior on the user and, therefore, the user may not obtain the corresponding compensation. [065] Based on this, in the embodiment of this request, when the second node in the block chain (ie, the audit department) verifies business results information “to be verified” sent by the third node in the chain of blocks blocks, if it is found that the business feedback information does not include the second smart contract capable of automatically triggering the compensation to the user, since there is a cheating behavior on the user (even if the third node of the block chain performs a second operation designated using the second smart contract), the second node in the block chain does not accept business feedback information or determines that business feedback information is not accepted. Therefore, so that business feedback information sent subsequently to the second node in the block chain can pass the verification performed by the second node in the block chain, it is necessary that the third node in the block chain generates a second smart contract that corresponds to the business request according to the business request, add the second smart contract to the subsequently generated business feedback information and send the business feedback information to the consensus network. [066] In the embodiment of this request, upon receiving, from the first node in the block chain, the business information corresponding to the business request, the third node in the block chain compiles the business information using a SOLC compiler predefined to obtain the second smart contract. Definitely, the third node of the Petition 870190055684, dated 06/17/2019, p. 36/88 29/66 block chain can also compile the second smart contract in other forms of compilation, which will not be exemplified one by one here. [067] Definitely, in the form of this order, the business request includes the first smart contract, a reward paid by the user for this business control is specified in the first smart contract and the business request records a type of business from the business. Therefore, the third node in the block chain can directly compile the business request using the predefined SOLC compiler to obtain the second smart contract that corresponds to the business request. [068] In addition, the third node in the block chain can make several second smart contracts in advance, different second smart contracts corresponding to different types of deals and levels of deals. For example, for a business request with a high business level, a second smart contract corresponding to this type of business request may have a higher request value. Business requests from the same business level, but different types of business, will correspond to different different smart contracts. Therefore, the third node in the block chain can specifically make different second smart contracts according to different types of businesses and different levels of business, and the second smart contracts made are stored at the third node in the block chain. [069] Based on this, in the form of the present order, after obtaining the business request including the first smart contract in the pending acceptance state, the third node in the block chain can further determine a business level and type of the business request, in order to determine a second corresponding smart contract according to the given level of business and type of Petition 870190055684, dated 06/17/2019, p. 37/88 30/66 deal, as well as the first defined amount of designated resources specified in the first smart contract (for example, the user-specified business reward) and add the second smart contract to the generated business feedback information and send the feedback information from the business to the consensus network. [070] It should be noted that, in the subsequent procedure, an account address for the third node in the block chain is required when the user pays the reward for business control to the third node in the block chain (ie the controlling organization and when the third node in the block chain compensates the user. Therefore, in the execution of this order, in addition to including the second smart contract and the summary of results as described above, the business feedback information generated by the third node in the block chain also includes the account address of the third node of the block chain. In addition, in the present order, since the second node of the block chain determines the business result obtained by the third node of the block chain as legal, it is necessary to sign on the business feedback information sent by the third node the block chain, so that the second smart contract in the business feedback information is triggered to cause the first smart contract in the business request to perform an action of transferring the first defined amount of designated resources (for example, a certain amount of money) in the user's account to the account address of the third node in the block chain as a reward. Therefore, the second smart contract needs to be associated with the first smart contract in the business request, so that the second smart contract can cause the first smart contract to perform the above action subsequently. S211: Business feedback information is Petition 870190055684, dated 06/17/2019, p. 38/88 31/66 sent to the consensus network. [071] After obtaining the business feedback information, the third node in the block chain can send the business feedback information to the consensus network. When the business feedback information is sent to the consensus network, the second smart contract in the business feedback information will be changed from an initial non-state to a pending verification state. In this way, the second node of the block chain in the consensus network can obtain the business feedback information, including the second smart contract in the pending verification state subsequently, and verify the legality of the business feedback information when it is determined that the second smart contract in the business feedback information is in the pending verification state. [072] In addition, in the form of the present order, once the third node in the block chain sends the business feedback information to the consensus network, the second smart contract in the business feedback information will cause , by changing the state, the third node in the block chain freezes a second defined amount of designated resources (ie a certain amount of money for compensation) at the account address of the third node in the block chain using the second contract smart. Therefore, it is guaranteed that, in the subsequent procedure, once the business result obtained by the third node in the block chain, according to the business request, is verified as illegal, the third node in the block chain transfers that part of the frozen resources assigned to the user account triggering the second smart contract. [073] It should be noted that by sending the business feedback information, the third node in the block chain can add the Petition 870190055684, dated 06/17/2019, p. 39/88 32/66 business feedback information to a transaction and send the transaction to the consensus network. The transaction can directly designate the second node of the block chain in the consensus network as a transaction object for a transaction. S212: The second node in the block chain acquires, from the consensus network, the business feedback information sent by the third node in the block chain. [001] After receiving the business feedback information sent by the third node in the block chain and including the second smart contract in the pending verification state, the second node in the block chain can accept the business feedback information, ie , receive a transaction containing the business feedback information and further verify the legality of the business feedback information in the subsequent procedure. S213: A business result corresponding to the business feedback information is acquired from the third node in the block chain, according to the business feedback information. [074] After acquiring the business feedback information, the second node in the block chain needs to determine the business outcome corresponding to the business feedback information, according to the business feedback information. The business feedback information does not include an actual business result, but only includes a summary of results corresponding exclusively to the business result (definitely, business feedback information can also include the business result, but accurate data desensitization be performed for the business outcome when the third node in the block chain sends the business outcome, to protect the user's private information). Therefore, the second node in the block chain needs to acquire the Petition 870190055684, dated 06/17/2019, p. 40/88 33/66 business result corresponding to the business feedback information of the third node in the block chain, and then verify the legality of the business result in the subsequent procedure. [075] The second node in the block chain (ie the audit department) is a department that can verify the legality of the business result obtained by the third node in the block chain. Therefore, generally, the second node in the block chain is allowed to acquire the business result directly from the third node in the block chain. The third node in the block chain can also limit the permission of the second node in the block chain to more effectively protect the user's private information from leakage. Correspondingly, if the third node in the block chain limits the access permission of the second node in the block chain, when receiving and accepting business feedback information sent by the third node in the block chain to the consensus network, the second node in block chain can send a query message to accept business feedback information to the third node in the block chain, add a security certificate from it to the query message and send the query message to the third chain node blocks. After receiving the inquiry message, the third node in the block chain can verify the security certificate. [076] After verification, if the security certificate has a qualification to verify business feedback information and the second node in the block chain is released to verify business feedback information, a feedback message indicating approval of acceptance can be returned to the second node in the block chain, and an access permission allowing the acquisition of the business result from the third node in the block chain is granted to the second node in the block chain, so that the second node of the block chain acquire, from the third node of the Petition 870190055684, dated 06/17/2019, p. 41/88 34/66 block chain, the result of the business corresponding to the business feedback information of the access permission. S214: It is verified whether the result of the deal is legal and, if so, step S215 is performed; or if not, step S216 is performed. S215: The signature is made on the business result information, in such a way that the third node in the block chain allows the second smart contract to allow the first node in the block chain to perform an action of transferring the first defined amount of resources assigned from the user account address included in the business request to the account address of the third node in the block chain using the first smart contract. S216: No signature is made on the business result information, so the third node in the block chain transfers, using the second smart contract, the second defined amount of resources designated in the account address of the third node in the block chain to the user's account address. [077] When the second node in the block chain acquires, from the third node in the block chain, the business result corresponding to the business feedback information, the second node in the block chain can verify the legality of the business result . A specific form of verification can be: to verify the viability of the business result according to the business information, since the second node in the block chain acquired from the first node in the block chain the business information sent by the user to the first node the block chain, in order to confirm whether the business result truly reflects the real conditions recorded by the business information and makes an effective and objective assessment of the business information. If so, the outcome of the deal is determined as a result of the legal deal; or if not, it is considered that Petition 870190055684, dated 06/17/2019, p. 42/88 35/66 the result of the deal is cheating. [078] In addition, in the execution of this request, the second node in the block chain needs to analyze the business feedback information using a public key (or private key) maintained by itself to obtain the account address of the third party block chain node included in the business feedback information, to determine if the account address is legal and to verify that the second smart contract included in the business feedback information is applicable to the business information sent by the user at the first node in the chain of blocks and the first smart contract included in the business request, for example, determine whether a compensation amount involved in the second smart contract matches the type of business and the business level of the business information and the business reward specified in the first contract smart. If all of the above are verified as legal, the business feedback information sent by the third node in the block chain is determined to be legal; otherwise, business feedback information will be considered illegal. [079] When the third node in the block chain verifies the business feedback information as legal, the signature can be performed on the business feedback information to cause the second smart contract in the business feedback information to change state of pending verification for a successful verification status. Therefore, the third node in the block chain causes, using the second smart contract, the first smart contract associated with the second smart contract to transfer the first defined amount of designated resources (that is, the reward paid to the specified business control organization in the first smart contract) from the user's account address in the business request to the account address of the third node in the supply chain Petition 870190055684, dated 06/17/2019, p. 43/88 36/66 blocks. At the same time, once the second node in the block chain signs the business feedback information, the block chain nodes in the consensus network will establish consensus on the business feedback information. After the consensus on the business feedback information is established, the business feedback information is recorded in the block chains in the consensus network. In other words, the nodes in the block chain can write the business feedback information, on which consensus is established, in the respective block chains. The data information recorded in the block chains is resistant to tampering. Therefore, they can be effectively verified, using the resulting summary included in the business feedback information written in the block chains, if the user or the business management organization as the third node in the block chain subsequently modifies the result of the corresponding business, thus providing a powerful basis for verification if the business outcome is modified. [080] When the second node in the block chain verifies the business feedback information as illegal, no signature is made on the business feedback information. In this way, when it is monitored, using the second smart contract, that the second node in the block chain has not yet signed the business feedback information after the first defined duration, the third node in the block chain can automatically trigger using the second contract smart, the action of transferring the second defined amount of designated resources (ie, clearing money) from the account address of the third node in the block chain to the user account. [081] In addition, since the second node in the block chain does not subscribe to the business feedback information, the block chain nodes in the consensus network may not Petition 870190055684, dated 06/17/2019, p. 44/88 37/66 establish a consensus on business feedback information, that is, business feedback information is discarded in an equivalent manner. [082] It should be noted that the states of the second smart contract illustrated above at the nodes of the block chain in the consensus network need to be synchronized. The specific way of synchronization is similar to the way of state synchronization of the first smart contract, which is not described in detail. Since the second node in the block chain determines the business outcome obtained by the third node in the block chain according to the business information as legal and signs in the business feedback information, the status of the second smart contract of the Business feedback on the third node in the block chain will be changed, that is, changed to the status of successful verification. In this case, the block chain node can send a message indicating that the business outcome is verified as legal for the first block chain node using the second smart contract in the successful verification state. After receiving the message, the first node in the block chain can transfer, using the first smart contract, the first defined amount of resources designated in the user's account address to the account address of the third node in the block chain. In other words, the message sent by the third node in the block chain to the first node in the block chain can be considered as a condition to have the first node in the block chain transfer the designated resources using the first smart contract. [083] Definitely, when it is determined that the business result passes verification, the second node in the block chain can send a message indicating that the business result has passed verification for the first node in the block chain. When monitoring, using the first Petition 870190055684, dated 06/17/2019, p. 45/88 38/66 smart contract, that the second node in the block chain sends the message to him, the first smart contract can trigger transfer of the first defined amount of resources designated in the user's account address to the account address of the third node in the chain blocks using the first smart contract. [084] After it is determined that the result of the business passes the verification performed by the second node in the block chain, the third node in the block chain can notify the first node in the message block chain, indicating that the result of the business has passed for verification. Therefore, after receiving the message, the first node in the block chain can acquire the business result from the third node in the block chain. Definitely, the third node in the block chain can also actively obtain the business result that passes the verification carried out by the second node in the block chain for the first node in the block chain. [085] In addition, in the form of carrying out this request, after it has been determined that the business result has passed verification, the second node in the block chain can also send the message indicating that the business request has passed verification for the first block chain node, in such a way that the first block chain node acquires the business result from the second block chain node after receiving the message. Definitely, the second node in the block chain can also actively obtain the business request that has passed verification for the first node in the block chain. [086] It can be seen from the above method that the first node in the block chain and the third node in the block chain automatically pay a reward or compensation using a smart contract, and no manual intervention is required. In addition, the entire business management process is implemented under the Petition 870190055684, dated 06/17/2019, p. 46/88 39/66 supervision and verification of the second node in the block chain, thus ensuring the impartiality of the entire business management process. In addition, since the business request sent by the first node in the block chain to the consensus network and the business feedback information sent by the third node in the block chain to the consensus network are verified as legal by the second node of the block chain, the nodes of the block chain in the consensus network will further establish consensus on the business request and the business feedback information. After the consensus is established, the business request and the business feedback information are recorded in the block chains in the consensus network, thus providing a powerful basis for verifying whether the business information sent by the user and the result of the business obtained by the third node in the block chain are modified. [087] It should be noted that, in the form of this request, the verification of the legality of the business request and the business feedback information can be implemented by a second node of the block chain or multiple nodes of the second chain of blocks. These second nodes in the block chain can be interpreted as some credible departments or organizations. These second nodes in the block chain can form a consensus network of the regional consortium chain. Correspondingly, when viewing the business request sent by the first block chain node in the entire consensus network, the second block chain nodes in the regional consortium chain consensus network can acquire business information corresponding to the business node's business request. first block chain respectively, and verify the legality of the business information. Each second node in the block chain can then transmit a verification result obtained to other second nodes in the block chain, such that the nodes in the block chain Petition 870190055684, dated 06/17/2019, p. 47/88 40/66 establish a consensus on the verification result and obtain an overall final verification result. In addition, a second node in the block chain currently serving as a leader node determines, according to the result of the final verification, whether to sign the business request. [088] Likewise, after the third node in the block chain sends the business feedback information to the consensus network, the second node in the block chain serving as a leader node in the consensus network of the regional consortium chain can accept the business feedback information and instruct the second nodes in the block chain to acquire, from the third node in the block chain, the business results corresponding to the business feedback information. After the acquisition of the business results, the second nodes in the block chain can verify the legality of the business results, respectively, to obtain the respective verification results. The second nodes of the block chain can then transmit the respective verification results to each other, so that the second nodes of the block chain of the consensus network of the regional consortium chain establish a consensus on the results of the verification and obtain a final result of verification. In addition, the second node in the block chain currently serving as the leader node determines, according to the result of the final verification, whether to sign the business result information. [089] In the embodiment of this request, after viewing the business request sent by the first node in the block chain, the second node in the block chain may not verify the legality of the business request in the first place. Instead, the second node in the block chain verifies the legality of the business information corresponding to the business request, as well as the legality of the business request at the same time after the third node in the chain. Petition 870190055684, dated 06/17/2019, p. 48/88 41/66 blocks obtain the result of the corresponding business according to the business request. [090] In the embodiment of this order, the second node in the block chain can receive the business request including the first smart contract and the user account address of the first node in the block chain and can receive feedback information of the business, including the second smart contract and the account address of the third node in the block chain from the third node in the block chain. Therefore, when the second node in the block chain verifies the business outcome as legal, the first defined amount of resources designated in the user's account address can be transferred to the account address of the third node in the block chain using the first contract smart. Likewise, when the second node in the block chain verifies the business outcome as illegal, the second defined amount of resources designated in the account address of the third node in the block chain can be transferred to the user's account address using the second smart contract. [091] In the process of verifying the legality of the business request and the business feedback information, if the business information corresponding to the business request and the business result corresponding to the business feedback information are excessively complex, the second node the block chain may ask a lawyer or other audit department to intervene to implement the legality check described above. The intervening lawyer or other audit department needs to sign a corresponding statement of responsibility, and the second node in the block chain writes the statement of responsibility in the consensus network block chain initiating a transaction, for use when liability disputes subsequently occur. Petition 870190055684, dated 06/17/2019, p. 49/88 42/66 [092] In the embodiment of this order, the first designated operation performed by the first node in the block chain using the first smart contract may be transferring the first defined amount of resources designated in the user account address in the request for business to the account address of the third node in the block chain, and may be yet another designated transaction. For example, the first designated operation can be used to allow the first node in the block chain to automatically acquire the business result from the third node in the block chain or the second node in the block chain. In another example, the first designated operation can be used to allow the first node in the block chain to determine a resource transfer time limit to transfer the first defined amount of resources designated in the user's account address to the account address of the third node in the block chain, and after the resource transfer time limit expires, the first node in the block chain can transfer the first defined amount of resources designated in the user's account address to the third party's account address block chain node. Definitely, the first designated operation can also be in other forms, which will not be exemplified one by one here. [093] Likewise, the second designated operation described above is not merely limited to allowing the third node in the block chain to transfer the second defined amount of resources designated in the account of the third node in the block chain to the address of the user account . For example, the second designated operation can also be used to allow the third node in the block chain to change the state of the first smart contract in the business request (that is, the business request received and processed by the third node in the block chain ) to accept the pending status and send the business request to the consensus network, Petition 870190055684, dated 06/17/2019, p. 50/88 43/66 so that another node in the block chain capable of processing the business request can receive and process the business request. Definitely, the second designated operation can also be in other forms, which will not be exemplified one by one here. [094] It should also be noted that the business processing procedure described above is carried out in the case of asset valuation. For example, the first node in the block chain can be a terminal maintained by the user, the business information received by the first node in the block chain can be asset valuation information and valid personal certificate information from the user that is sent by the user . The business request generated by the first node in the block chain, according to the information sent by the user, can be an asset valuation request. The second node in the block chain can be an audit department that can perform auditing and supervision in the valuation of assets. The third node in the block chain can be an asset valuation organization that can control the asset valuation business for the user. The business result obtained by the third node in the block chain according to the business information acquired from the first node in the block chain can be an asset valuation report. The business feedback information sent to the second node in the block chain can be information from the asset valuation report. [095] The business processing method described above can be used for asset valuation and can be used for processing other companies. For example, in real life, an accounting firm typically deals with companies that apply for administrative business operating licenses on behalf of some companies or individuals. Generally, an individual or company can send a valid certificate and corporate data to the accounting firm. The Petition 870190055684, dated 06/17/2019, p. 51/88 44/66 Accounting will obtain related materials according to the data and send the materials to a related department (for example, the industrial and commercial office) for examination and approval. If the materials are determined to be consistent with the actual situation of the individual or company, the related department may grant a business operation license to the individual or company. In this process, the individual or company pays a reward to the trusted accounting firm, in such a way that the accounting firm performs related application for the business operating license on behalf of the individual or firm. [096] The business processing method provided in the form of this application is also applicable to the scenario in which an accounting firm applies for a business operating license on behalf of an individual or company. That is, the individual or company, as a customer, can send corporate data and a valid certificate to a first node in the block chain. The first node in the block chain can generate a corresponding first smart contract and a business request according to the materials received, and send the business request to a consensus network. After viewing the business request, a related department (for example, the industrial and commercial office) as a second node in the block chain can acquire, from the first node in the block chain, related data corresponding to the business request and check the legality of related data. Once the data is verified as legal, the signature can be performed on the business request, such that an accounting firm, such as a third node in the block chain, can accept the signed business request, acquire from the first node in the chain of blocks the related data sent by the individual or company and obtain corresponding related materials according to the related data acquired. Petition 870190055684, dated 06/17/2019, p. 52/88 45/66 [097] The accounting firm, as the third node in the block chain, can generate a corresponding second smart contract and a declaration request according to the related materials obtained, and send the declaration request to the network of consensus. In this way, after seeing the consensus network declaration request, the second node in the block chain can acquire the related materials from the third node in the block chain and check the related materials according to the related data acquired from the first node in the block. block chain. [098] When checking the related materials as legal, the second node of the block chain can sign on the declaration request sent by the third node of the block chain, so that the third node of the block chain makes, using the second smart contract, the first node in the block chain performs automatic transfer of a certain amount of money at an individual or company account address as a reward to an accounting company account address as the third node in the block chain using the first smart contract in the business request. At the same time, the department listed as the second node in the block chain can grant a business operation license to the individual or company. When verifying that the related materials are illegal, the second node in the block chain does not sign the declaration request. Thus, when monitoring, using the second smart contract in the declaration request, that the second node in the block chain does not sign the declaration request after the defined duration, the third node in the block chain automatically causes it to occur, using the second smart contract, the transfer of a certain amount of money, at the account address of the accounting firm as a compensation to the account address of the individual or firm. [099] The scenario in which the accounting firm applies Petition 870190055684, dated 06/17/2019, p. 53/88 46/66 for a business operation license for an individual or company is used above to better illustrate the range of application of the embodiment of this application. In addition, the business processing method provided in this application is also applicable to a scenario similar to the two scenarios above, and the specific scenarios involved are not exemplified one by one here. [0100] The business processing method provided in the embodiment of the present application described above and, based on the same idea, the embodiments of the present application further provide three types of devices for business processing, as shown in Figure 3 , in Figure 4 and Figure 5 [0101] Figure 3 is a schematic diagram of a business processing device according to an embodiment of the present application, including specifically: a receiver module (301) configured to receive business information sent by a user; a generation module (302) configured to generate a corresponding business request according to the business information, the business request including a first smart contract generated according to the business information; and a sending module (303) configured to send the business request to a consensus network, so that a third node in the block chain in the consensus network obtains a corresponding business result according to the business request and executes a designated first operation triggering the first smart contract after it is determined that a second node in the block chain in the consensus network has verified the outcome of the deal as legal. [0102] The generation module (302) is configured to compile the Petition 870190055684, dated 06/17/2019, p. 54/88 47/66 business information using a predefined SOLC compiler to obtain the first smart contract. [0103] The generation module (302) is configured to generate, according to the business information, the business request including the first smart contract and a user account address, the first designated operation being used to transfer a first defined amount of resources assigned in the user's account address to an account address of the third node in the block chain. [0104] The sending module (303) is configured to send the business request including a first smart contract in a pending verification state to the consensus network. [0105] The shipping module (303) is configured to, upon determining that the second node in the block chain has verified the business request as legal, freeze the first defined amount of resources designated in the user's account address using the first smart contract. [0106] The sending module (303) is configured to receive a query message, sent by the third node in the block chain, to process the business request; grant an access permission to the third node in the block chain when it is determined that the business request has been processed by the third node in the block chain, so that the third node in the block chain acquires business information from the device and obtain the business result according to the business information. [0107] The sending module (303) is configured to send the business request to the nodes in the block chain in the consensus network to establish a consensus. [0108] The sending module (303) is configured to record the Petition 870190055684, dated 06/17/2019, p. 55/88 48/66 business request in a block chain of the device when it is determined that consensus on the business request was established by the nodes of the block chain in the consensus network. [0109] The sending module (303) is configured to acquire the business result from the third node in the block chain or from the second node in the block chain when it is determined that the second node in the block chain has verified the business result as legal. [0110] It should be noted that, in a real application, the embodiment of the device can have several improvements, as needed, or select a specific implementation structure for a functional module, thus obtaining a better technical effect. [0111] For example, the sending module (303) can include a recording module (304). After the sending module (303) determines that the consensus on the business request is established by the nodes of the block chain in the consensus network, the recording module (304) can record the business request to the block chain of the device . In another example, the shipping module (303) can include an acquisition module (305). After the sending module (303) determines that the second node in the block chain verifies the business result as legal, the acquisition module (305) acquires the business result from the third node in the block chain or second node in the chain blocks. [0112] Figure 4 is a schematic diagram of a second device for business processing according to an embodiment of the present application, including specifically: an information acquisition module (401) configured to acquire, from a consensus network, business feedback information sent through a third node in the block chain; a results acquisition module (402) configured Petition 870190055684, dated 06/17/2019, p. 56/88 49/66 to obtain a business result from the third node in the block chain according to the business feedback information, the business result being generated by the third node in the block chain according to a business request sent by a first node in the block chain to the consensus network, and a verification module (403) configured to, when verifying the business result as legal, allow the first node in the block chain to perform a first designated operation by triggering the first contract smart. [0113] The verification module (403) is configured to sign on the business feedback information; the signature being used to allow a second smart contract included in the business feedback information to change its own state from a verification pending state to a verification success state, and the second smart contract being obtained by the third node in the block chain according to the business request. The second smart contract in the verification success state is used to enable the second smart contract to cause the first node in the block chain to perform the first designated operation using the first smart contract. [0114] The verification module (403) is configured to, when verifying the business result as legal, instruct the nodes in the block chain in the consensus network to establish consensus on the business feedback information and when it is determined that consensus on the business feedback information has been established, record the business feedback information in a chain of device blocks. [0115] The verification module (403) is configured to, when verifying the business result as illegal, refuse to sign the business feedback information. The refusal to sign is used to Petition 870190055684, dated 06/17/2019, p. 57/88 50/66 allow the third node in the block chain to perform a second designated operation, triggering the second smart contract. [0116] The information acquisition module (401) is configured to acquire a business request sent by the first node in the block chain to the consensus network, the business request including a first smart contract in a pending verification state; acquires, from the first node in the block chain, according to the business request, business information corresponding to the business request; checks if the business information is legal; and if so, sign the deal request to cause the first smart contract to change from the pending verification state to a pending acceptance state, the first smart contract in the pending acceptance state being used to allow the first node in the supply chain blocks freeze the first defined amount of resources designated in the user's account address using the first smart contract; or, if not, refuse to sign the business request, so the first node in the block chain determines that the business request was not accepted. [0117] The verification module (403) is configured to, when verifying the business information as legal, notify the nodes of the block chain in the consensus network to establish a consensus on the business request and record the business request in the device block chain when it is determined that consensus on the business request has been established. [0118] It should be noted that, in a real application, the embodiment of the device can have several improvements, as needed, or select a specific implementation structure for a functional module, thus obtaining a better technical effect. [0119] For example, the information acquisition module (401) Petition 870190055684, dated 06/17/2019, p. 58/88 51/66 may include a request verification module (404). After the information acquisition module (401) acquires the business request from the first node in the block chain, the business information corresponding to the business request can be acquired from the first node in the block chain. The information acquisition module (401) can then verify that the business information is legal using the order verification module (404). [0120] Figure 5 is a schematic diagram of a third device for business processing according to an embodiment of the present application, including specifically: a request acquisition module (501) configured to acquire a business request sent by a first node in the block chain through a consensus network, the business request including a first smart contract generated by the first node in the block chain according to business information sent by a user; an information generation module (502) configured to obtain a business result and business feedback information according to the business request; and an information sending module (503) configured to send the business feedback information to the consensus network, such that a second node in the block chain in the consensus network acquires the business result from the device according to the business feedback information and when the business outcome is verified as legal, it allows the first node in the block chain to perform a first designated operation by triggering the first smart contract. [0121] The request acquisition module (501) is configured to obtain the business request, including the first smart contract in a pending acceptance state. Petition 870190055684, dated 06/17/2019, p. 59/88 52/66 [0122] The first designated operation is used to allow the first node in the block chain to transfer a defined first amount of resources designated in a user account address included in the business request to a device account address. [0123] The information generation module (502) is configured to obtain a second smart contract and the business result according to the business request. [0124] The information generation module (502) is configured to generate, according to the business result, the business feedback information including the second smart contract, summary information of the business result, and the account address the device. [0125] The information generation module (502) is configured to determine a business level and business type of the business request; and determine the second smart contract according to the level of business, the type of business and the first smart contract. [0126] The information generation module (502) is configured to send, according to the business request, a query message to process the business request to the first node in the block chain; acquire an access permission from the first node in the block chain when a feedback message that is returned by the first node in the block chain and allow the device to process the business request received; acquire, from the first node in the block chain, business information corresponding to the business request in accordance with the business request and access permission; and obtain the business result and business feedback information according to the business information. [0127] The information generation module (502) is configured to compile business information using a SOLC compiler Petition 870190055684, dated 06/17/2019, p. 60/88 Preset 53/66 to obtain the second smart contract. [0128] The information submission module (502) is configured to send the business feedback information to the consensus network and freeze a second defined amount of resources designated in the device's account address by triggering the second smart contract. [0129] The information generation module (502) is configured to send the business feedback information to nodes in the block chain in the consensus network to establish consensus and record the business feedback information in a block chain of the device when it is determined that the consensus on the business feedback information has been established by the nodes of the block chain in the consensus network. [0130] The information submission module (502) is configured to perform a second designated operation triggering the second smart contract when it is determined that the second node in the block chain verifies that the business feedback information is illegal. [0131] The second designated operation is used to allow the device to transfer a second defined amount of resources designated in the device account address to the user account address included in the business request. [0132] It should be noted that, in a real application, the embodiment of the device can have several improvements, as necessary, or select a specific implementation structure for a functional module, thus obtaining a better technical effect. [0133] For example, the information sending module (502) can include a recording module (504). After the information submission module (502) determines that the consensus on the business feedback information was established by the nodes of the block chain in the network of Petition 870190055684, dated 06/17/2019, p. 61/88 54/66 consensus, the recording module (504) can record the business feedback information for the block chain of the device. [0134] In the embodiment of this request, a first node in the block chain can send a business request generated according to business information sent by a user to a consensus network, so that when a second node in the chain block in the consensus network verifies a business result obtained through a third node in the block chain in the consensus network according to the business request as legal, the first node in the block chain is allowed to perform a first operation designated using a smart first contract in the business request. The first node in the block chain uses the smart contract that can be executed automatically, so that the business result obtained by the third node in the block chain according to the business request sent by the first node in the block chain undergoes verification performed by the second node in the block chain, the first node in the block chain can perform the first designated operation by triggering the first smart contract, and the operation designated in the business processing procedure can be performed fairly, without manual intervention. In addition, the second node in the block chain can verify the business result obtained by the third node in the block chain, so that the entire business processing procedure is provided with an impartiality system, thus improving the impartiality of the processing of transactions. and reducing the likelihood of the user suffering losses during business processing. [0135] In the 1990s, an improvement in a technology can obviously be distinguished as an improvement in hardware (for example, an improvement in a circuit structure, such as a diode, a transistor and a switch) or an improvement in software (an improvement in a Petition 870190055684, dated 06/17/2019, p. 62/88 55/66 method procedure). However, with the development of technologies, improvements in many method procedures today can be seen as direct improvements in hardware circuit structures. Almost all designers program the method's improved procedures on hardware circuits to obtain corresponding hardware circuit structures. Therefore, it is inappropriate to assume that the improvement of a method procedure cannot be implemented using a hardware entity module. For example, a programmable logic device (PLD) (for example, a Field Programmable Gate Array (FPGA)) is an integrated circuit whose logic functions are determined by devices programmed by a user. Designers program themselves to “integrate” a digital system into a piece of PLD, without having to ask a chip maker to design and manufacture a dedicated integrated circuit chip. In addition, programming is currently mainly implemented using logic compiler software, rather than manually manufacturing an integrated circuit chip. Logical compiler software is similar to compiler software used to develop and write a program, and the original code before compilation also needs to be written using a specific programming language, which is referred to as HDL (Hardware Description Language). There are many types of HDLs, such as the Advanced Boolean Expression Language (ABEL), Altera Hardware Description Language (AHDL), Confluence, Cornell University Programming Language (CUPL), HDCal, Java Hardware Description Language (JHDL) ), Lava, Lola, MyHDL, PALASM and Ruby Hardware Description Language (RHDL), among which very high speed integrated circuit hardware description language (VHDL) and Verilog are most commonly used now. Those skilled in the art should also know that a hardware circuit to implement the Petition 870190055684, dated 06/17/2019, p. 63/88 56/66 logical method can be easily obtained by slightly programming the method procedure using the various hardware description languages above and programming it in an integrated circuit. [0136] A controller can be implemented in any suitable way. For example, the controller may be in the form of, for example, a microprocessor or processor and a computer-readable medium that stores computer-readable program code (for example, software or firmware) executable by the (micro) processor, a port logic, a switch, an ASIC (Application Specific Integrated Circuit), a programmable logic controller and a built-in microcontroller. Controller examples include, but are not limited to, the following microcontrollers: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320. A memory controller can also be implemented as part of a memory's control logic. Those skilled in the art also know that the controller can be implemented using pure computer-readable program code, and in addition, the method steps can be logically programmed to allow the controller to implement the same function in the form of a logic gate, a switch, an application-specific integrated circuit, a programmable logic controller and a built-in microcontroller. Therefore, this type of controller can be considered as a hardware component, and the devices included in it to implement various functions can also be considered as structures within the hardware component. Or, the devices used to implement various functions can even be considered as software modules to implement the method and structures within the hardware component. [0137] The system, device, module or unit illustrated in the above embodiments can be specifically implemented Petition 870190055684, dated 06/17/2019, p. 64/88 57/66 using a computer chip or an entity, or a product having a certain function. A typical deployment device is a computer. Specifically, the computer can be, for example, a personal computer, a portable computer, a mobile phone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an e- a game console, a tablet computer, a wearable device, or a combination of any of these devices. [0138] To facilitate description, when the device is described, it is divided into several units in terms of functions for the respective description. Definitely, when the present application is implemented, the functions of the units can be implemented in the same or in multiple pieces of software and / or hardware. [0139] Those skilled in the art should understand that the embodiments of the present invention can be provided as a method, system or computer program product. Therefore, the present invention can be implemented as a completely hardware embodiment, a completely software embodiment, or a combination of software and hardware. In addition, the present invention may be a computer program product implemented on one or more storage media usable on a computer (including, but not limited to, a magnetic disk memory, a CD-ROM, an optical memory and the like) including program code usable on a computer. [0140] The present invention is described with reference to flowcharts and / or block diagrams according to the method, device (system) and computer program product according to the embodiments of the present invention. It should be understood that an instruction Petition 870190055684, dated 06/17/2019, p. 65/88 58/66 computer program can be used to implement each process and / or blocks in flowcharts and / or block diagrams and combinations of processes and / or blocks in flowcharts and / or block diagrams. Computer program instructions can be provided to a general-purpose computer, a special-purpose computer, an embedded processor, or another programmable data processing device to generate a machine, such that the computer or a processor from another device for programmable data processing execute an instruction to generate a device configured to implement functions assigned in one or more processes in a flowchart and / or one or more blocks in a block diagram. [0141] Computer program instructions can also be stored in computer-readable storage that can guide a computer or other programmable data processing device to function in a specific way, such that the instruction stored in storage is readable by The computer generates a manufacture including an instructional device, and the instructional device implements functions designated by one or more processes in a flowchart and / or one or more blocks in a block diagram. [0142] Computer program instructions can also be loaded onto a computer or other programmable data processing device, so that a series of operating steps are performed on the computer or on another programmable device to generate computer-implemented processing and therefore, the instruction executed on the computer or other programmable device provides steps to implement functions assigned in one or more processes in a flowchart and / or one or more blocks in a block diagram. [0143] In a typical configuration, a computing device Petition 870190055684, dated 06/17/2019, p. 66/88 59/66 includes one or more processors (CPU), an input / output interface, a network interface and a memory. [0144] The memory may include a volatile memory, a random access memory (RAM) and / or a non-volatile or similar memory in a computer-readable medium, for example, a read-only memory (ROM) or a flash memory. Memory is an example of a computer-readable medium. [0145] The computer-readable medium includes non-volatile and volatile media, as well as mobile and non-mobile media, and can implement information storage by any method or technology. The information can be a computer-readable instruction, a data structure and a program module or other data. A computer storage medium includes, for example, but is not limited to, a phase change memory (PRAM), a static random access memory (SRAM), a dynamic random access memory (DRAM), other types of RAMs, a ROM, an electronically erasable programmable read-only memory (EEPROM), a flash memory or other memory technologies, a compact disk (CD-ROM) read memory, a digital versatile disk (DVD) or other devices optical storage device, a tape, magnetic tape / magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, and can be used to store information accessed by the computing device. According to the definition of this text, the computer-readable medium does not include transient means, such as a modulated data signal and a vehicle. [0146] It should also be noted that the term "includes", "comprises" or other variations thereof are intended to include non-exclusive inclusion, so that a process, method, merchandise or device including a Petition 870190055684, dated 06/17/2019, p. 67/88 60/66 series of elements not only includes the elements, but also includes other elements not clearly listed, or also includes elements inherent to the process, method, merchandise or device. In a case without further limitations, an element defined by “including one / an ...” does not exclude that the process, method, merchandise or device including the element has other identical elements. [0147] Those skilled in the art should understand that the embodiments of the present application can be provided as a method, system or computer program product. Accordingly, the present application can be implemented as a completely hardware embodiment, a completely software embodiment, or an embodiment that combines software and hardware. In addition, the present application may be in the form of a computer program product implemented on one or more storage media usable on a computer (including, but not limited to, a magnetic disk memory, a CD-ROM, an optical memory and the like) including program code usable on a computer. [0148] The present application can be described in a common context of a computer executable instruction executed by a computer, for example, a program module. Generally, the program module includes a routine, program, object, assembly, data structure and the like used to perform a specific task or implement a specific summary data type. The present application can also be implemented in distributed computing environments, and in distributed computer environments, a task is performed using devices for remote processing connected through a communications network. In the distributed computer environment, the program module can be located on the local computer's storage media and Petition 870190055684, dated 06/17/2019, p. 68/88 61/66 remote, including a storage device. [0149] The embodiments in the specification are progressively descriptions, identical or similar parts of the embodiments can be obtained with reference to each other, and each embodiment emphasizes a different part of other embodiments. In particular, the embodiment of the system is basically similar to the embodiment of the method, so it is simply described, and for related parties, reference can be made to the description of the parties in the embodiment of the method. [0150] The above description is only an embodiment of this request and is not intended to limit this request. For those skilled in the art, the present application may have several modifications and variations. Any modification, equivalent substitution, improvement or similar made without departing from the scope of this order must all be within the scope of the claims in this order. [0151] The embodiments and operations described in this specification can be implemented in digital electronic circuits, or in computer software, firmware or hardware, including the structures disclosed in this specification or in combinations of one or more of them. Operations can be implemented as operations performed by a data processing device on data stored on one or more storage devices readable by computer or received from other sources. A data processing device, computer or computing device can encompass data processing devices, devices and machines, including, for example, a programmable processor, a computer, a system on a chip or several of them, or combinations of the above. The device may include logic circuits for special purposes, for example, a central processing unit (CPU), Petition 870190055684, dated 06/17/2019, p. 69/88 62/66 an FPGA (Field Programmable Ports Matrix) or an ASIC (Application Specific Integrated Circuit). The device may also include code that creates an execution environment for the computer program in question, for example, code that constitutes processor firmware, a protocol stack, a database management system, an operating system (for example , an operating system or a combination of operating systems), a cross-platform runtime environment, a virtual machine, or a combination of one or more of them. The device and execution environment can carry out a variety of different computing model infrastructures, such as Web services, distributed computing and grid computing infrastructures. [0152] A computer program (also known, for example, as a program, software, software application, software module, software unit, script or code) can be written in any form of programming language, including compiled languages or interpreted, declarative or procedural languages and can be deployed in any way, including as a stand-alone program or as a module, component, subroutine, object or other unit suitable for use in a computing environment. A program can be stored in a part of a file that contains other programs or data (for example, one or more scripts stored in a markup language document), in a single file dedicated to the program in question or in several coordinated files ( for example, files that store one or more modules, subprograms, or parts of code). A computer program can be run on one computer or on several computers located in one location or distributed in several locations and interconnected by a communication network. [0153] Processors for executing a software program Petition 870190055684, dated 06/17/2019, p. 70/88 63/66 computer include, for example, microprocessors of general and special purpose, and any one or more processors of any type of digital computer. Generally, a processor will receive instructions and data from either a read-only memory or a random access memory or both. The essential elements of a computer are a processor that performs actions according to instructions and one or more memory devices to store instructions and data. Generally, a computer will also include, or be operationally attached to receive data or transfer data to, or both, one or more mass storage devices for data storage. A computer can be incorporated into another device, for example, a mobile device, a personal digital assistant (PDA), a game console, a Global Positioning System (GPS) receiver or a portable storage device. Suitable devices for storing computer program instructions and data include non-volatile memory, media and memory devices, including, for example, semiconductor memory devices, magnetic disks and magneto-optical disks. The processor and memory can be supplemented by, or incorporated into special purpose logic circuits. [0154] Mobile devices may include handsets, user devices (UE), cell phones (e.g. smartphones), tablets, wearable devices (e.g. smart watches and smart glasses), devices implanted in the human body (e.g. biosensors, cochlear implants) or other types of mobile devices. Mobile devices can communicate wirelessly (for example, using radio frequency (RF) signals) to various communication networks (described below). Mobile devices can include sensors to determine the characteristics of the mobile device’s current environment. The sensors can Petition 870190055684, dated 06/17/2019, p. 71/88 64/66 include cameras, microphones, proximity sensors, GPS sensors, motion sensors, accelerometers, ambient light sensors, humidity sensors, gyroscopes, compasses, barometers, fingerprint sensors, facial recognition systems, RF sensors ( for example, WiFi and cellular radios), thermal sensors or other types of sensors. For example, cameras can include a forward or backward-facing camera with movable or fixed lenses, a flash, an image sensor and an image processor. The camera can be a megapixel camera capable of capturing details for facial and / or iris recognition. The camera, together with a data processor and authentication information stored in memory or accessed remotely, can form a facial recognition system. The facial recognition system or one or more sensors, for example, microphones, motion sensors, accelerometers, GPS sensors or RF sensors, can be used for user authentication. [0155] To provide interaction with a user, the embodiments can be implemented on a computer that has a display device and an input device, for example, a liquid crystal display (LCD) or organic emitting diode display light (OLED) / virtual reality (VR) / augmented reality (AR) to display information to the user and a touch screen, keyboard and a pointing device by which the user can provide input to the computer. Other types of devices can also be used to provide interaction with a user; for example, the feedback provided to the user can be any form of sensory feedback, for example, visual feedback, auditory feedback or tactile feedback; and user input can be received in any form, including acoustic, speech, or tactile input. In addition, a computer can interact with a user by sending documents and receiving documents from Petition 870190055684, dated 06/17/2019, p. 72/88 65/66 a device used by the user; for example, sending web pages to a web browser on a user’s client device in response to requests received from the web browser. [0156] The embodiments can be implemented using computing devices interconnected by any form or means of digital data communication wired or wireless (or a combination thereof), for example, a communication network. Examples of interconnected devices are a client and a server that are usually remote from each other and that normally interact through a communication network. A customer, for example, a mobile device, can carry out transactions itself, with a server or through a server, for example, carrying out purchase, sale, payment, delivery, shipping or loan transactions, or authorizing the same. Such transactions can be in real time, so that an action and response are temporarily close; for example, an individual perceives the action and the response occurring substantially simultaneously, the time difference for a response following the individual's action is less than 1 millisecond (ms) or less than 1 second (s), or the response is without delay intentional, taking into account system processing limitations. [0157] Examples of communication networks include a local area network (LAN), a radio access network (RAN), a metropolitan network (MAN) and a wide area network (WAN). The communication network can include all or part of the Internet, another communication network or a combination of communication networks. Information can be transmitted over the communication network according to various protocols and standards, including Long Term Evolution (LTE), 5G, IEEE 802, Internet Protocol (IP) or other protocols or combinations of protocols. The communication network can transmit voice, video, biometric or authentication data or other information between the connected computing devices. Petition 870190055684, dated 06/17/2019, p. 73/88 66/66 [0158] Features described as separate implementations can be implemented, in combination, in a single implementation, while features described as a single implementation can be implemented in multiple implementations, separately or in any suitable sub-combination. The operations described and claimed in a specific order are not to be construed as requiring that the specific order, nor that all illustrated operations be performed (some operations may be optional). As appropriate, multitasking or parallel processing (or a combination of multitasking and parallel processing) can be performed.
权利要求:
Claims (19) [1] Claims 1. METHOD FOR BUSINESS PROCESSING, characterized by the fact that it comprises the steps of: receive, through a first node in the block chain, business information sent by a user; generate a corresponding business request according to the business information, the business request comprising a first smart contract generated according to the business information; and send the business request to a consensus network, so that a third node of the block chain in the consensus network obtains a corresponding business result according to the business request and performs a first designated operation by triggering the first smart contract when it is determined that a second node in the block chain in the consensus network has verified the outcome of the deal as legal. [2] 2. METHOD, according to claim 1, characterized by the fact that the step of generating a first smart contract according to the business information comprises specifically: compile business information using a predefined SOLC compiler to get the first smart contract. [3] 3. METHOD, according to any of claims 1 to 2, characterized by the fact that the step of generating a corresponding business request according to the business information comprises specifically: generate a business request that comprises the first smart contract and a user account address according to the business information; the first designated operation being used to transfer a Petition 870190055684, dated 06/17/2019, p. 75/88 2/9 first defined amount of resources assigned in the user's account address to an account address of the third node in the block chain, optionally where after the step of sending the business request to a consensus network, the method further comprises : freeze the first defined amount of resources designated in the user's account address, using the first smart contract when it is determined that the second node in the block chain has verified the business request as legal. [4] 4. METHOD, according to claim 1, characterized by the fact that the step of sending the business request to a consensus network comprises specifically: send the business request that comprises a first smart contract in a pending verification state to the consensus network. [5] 5. METHOD, according to claim 1, characterized by the fact that after the step of sending the business request to a consensus network, the method also comprises the steps of: receive a query message, sent by the third node in the block chain, to process the business request; and grant an access permission to the third node in the block chain when it is determined that the business request has been processed by the third node in the block chain, so that the third node in the block chain acquires business information from the first block chain node and obtain the business result according to the business information. [6] 6. METHOD, according to claim 1, characterized by the fact that the step of sending the business request to a consensus network comprises specifically: Petition 870190055684, dated 06/17/2019, p. 76/88 3/9 send the business request to the nodes of the block chain in the consensus network to establish a consensus; and the method further comprises: write the business request to a block chain of the first node in the block chain after it is determined that the block chain nodes in the consensus network have established consensus on the business request. [7] 7. METHOD, according to claim 1, characterized by the fact that the method also comprises the step of: acquire the business result from the third node in the block chain or from the second node in the block chain when it is determined that the second node in the block chain has verified the business result as legal. [8] 8. METHOD, according to any one of claims 1 to 7, characterized by the fact that it also comprises the steps of: acquire, through the second node of the consensus network block chain, business feedback information sent by the third node of the block chain; acquire the business result from the third node in the block chain according to the business feedback information, the business result being generated by the third node in the block chain according to the business request sent by the first node in the chain blocks to the consensus network, and when the business outcome is verified as legal, allow the first node in the block chain to perform the first designated operation by triggering a first smart contract, where the step of allowing the first node in the chain of blocks perform the first designated operation Petition 870190055684, dated 06/17/2019, p. 77/88 4/9 triggering a first smart contract specifically comprises: signing on the business feedback information; the signature used to allow a second smart contract, comprised in the business feedback information, to change its own state from a pending verification state to a verification success state, the second smart contract being obtained by the third node in the supply chain. blocks according to the business request; and the second smart contract in the verification success state being used to enable the second smart contract to cause the first node in the block chain to perform the first designated operation using the first smart contract. [9] 9. METHOD, according to claim 8, characterized by the fact that the method also comprises the step of: instruct block chain nodes in the consensus network to establish consensus on business feedback information when the business outcome is verified as legal and record business feedback information in a block chain of the second node in the block chain when it is determined that consensus on business feedback information is established. [10] 10. METHOD, according to claim 8, characterized by the fact that the method also comprises the step of: refuse to sign business feedback information when the business outcome is found to be illegal; and the refusal to sign being used to enable the third node in the block chain to perform a second designated operation by triggering the second smart contract. [11] 11. METHOD according to any one of claims 9 to 10, characterized by the fact that before the Petition 870190055684, dated 06/17/2019, p. 78/88 5/9 acquire, through the second node of the consensus network block chain, business feedback information sent by the third node of the block chain, the method also comprises the steps of: acquire a business request sent by the first node in the block chain to the consensus network, the business request comprising a first smart contract in a state pending verification; acquire, according to the business request, business information corresponding to the business request of the first node in the block chain; check if the business information is legal; and if so, sign the deal request to make the first smart contract change from a pending verification state to a pending acceptance state; the first smart contract in the pending acceptance state being used to allow the first node in the block chain to freeze a first defined amount of resources assigned to a user's account address using the first smart contract; or if not, refuse to sign the business request, so that the first node in the block chain determines that the business request has not been accepted, where the method further comprises: instruct the nodes in the block chain in the consensus network to establish consensus on the business request when the business information is verified as legal and record the business request in a block chain of the second node in the block chain after determining that consensus on the business request is established. [12] 12. METHOD, according to any one of claims 1 to 11, characterized by the fact that it also comprises the Petition 870190055684, dated 06/17/2019, p. 79/88 6/9 stage of: acquire, by the third node in the block chain, the business request sent by the first node in the block chain using the consensus network, the business request comprising the first smart contract generated by the first node in the block chain according to information from the business sent by the user (S208); obtain a business result and business feedback information according to the business request (S209); and send the business feedback information to the consensus network (S211), so that the second node in the block chain in the consensus network acquires the business result from the third node in the block chain according to the information business feedback (S213) and when the business outcome is verified as legal, allow the first node in the block chain to perform a first designated operation by triggering the first smart contract (S215). [13] 13. METHOD, according to claim 12, characterized by the fact that the step of acquiring, by the third node in the block chain, the business request sent by the first node in the block chain, using the consensus network, specifically comprises : obtain a business request that includes a first smart contract in a pending acceptance state. [14] 14. METHOD according to claim 12, characterized by the fact that the first designated operation is used to allow the first node in the block chain to transfer a first defined amount of designated resources to a user account address included in the request business address for an account of the third node in the block chain; the stage of obtaining a business result according to the Petition 870190055684, dated 06/17/2019, p. 80/88 7/9 business request specifically comprises: obtain a second smart contract and the result of the deal according to the deal request; the step of obtaining business feedback information according to the business request comprises specifically: generate, according to the business result, the business feedback information comprising the second smart contract, summary information of the business result, and the account address of the third node in the block chain, in which the step of obtaining a second smart contract according to the business request specifically comprises: determine a business level and business type from the business request; and determine the second smart contract according to the level of business, the type of business and the first smart contract. [15] 15. METHOD, according to claim 12, characterized by the fact that the step of obtaining a business result and business feedback information according to the business request comprises specifically: send, according to the business request, a query message to process the business request to the first node in the block chain; acquire an access permission from the first node in the block chain when a feedback message is received, the feedback message being returned by the first node in the block chain and allowing the third node in the block chain to process the business request; acquire, from the first node in the block chain, business information corresponding to the business request in accordance with Petition 870190055684, dated 06/17/2019, p. 81/88 8/9 business request and access permission; and obtain the business result and business feedback information according to the business information, where the step of obtaining a second smart contract according to the business request comprises specifically: compile business information using a predefined SOLC compiler to obtain the second smart contract. [16] 16. METHOD, according to claim 14, characterized by the fact that the step of sending the business feedback information to the consensus network comprises specifically: send the business feedback information to the consensus network and freeze a second defined amount of resources assigned to the account address of the third node in the block chain triggering the second smart contract. [17] 17. METHOD, according to any of claims 12 to 16, characterized by the fact that the step of sending the business feedback information to the consensus network comprises specifically: send business feedback information to block chain nodes in the consensus network to establish consensus and write business feedback information to a block chain from the third node in the block chain when consensus on the information is determined business feedback was established by the block chain nodes in the consensus network. [18] 18. METHOD, according to any one of claims 12 to 14, characterized by the fact that the method further comprises the steps of: perform a second designated operation by triggering the second Petition 870190055684, dated 06/17/2019, p. 82/88 9/9 smart contract when it is determined that the second node in the block chain has verified the business feedback information as illegal, in which the second designated operation is used to transfer, through the third node in the block chain, the second defined quantity from resources designated in the account address of the third node in the block chain to the address of the user account included in the business request. [19] 19. DEVICE FOR BUSINESS PROCESSING, characterized by the fact that it comprises: a plurality of modules, each module configured to perform steps in the method, as defined in any of claims 1 to 18.
类似技术:
公开号 | 公开日 | 专利标题 BR112019007128A2|2019-10-01|business processing method and business processing apparatus RU2728524C1|2020-07-30|Method and device for consensus verification US10965673B2|2021-03-30|User ID codes for online verification ES2866161T3|2021-10-19|Method and apparatus for communication between nodes of the blockchain AU2019101613A4|2020-01-23|Method and apparatus for processing transaction requests KR102074116B1|2020-02-05|Blockchain node communication method and apparatus BR112019016831B1|2021-01-19|blockchain system and data storage method and device JP2020512715A|2020-04-23|Method, apparatus and electronic device for communication between blockchain nodes, and method, apparatus and electronic device for certificate management based on blockchain KR20190115066A|2019-10-10|Blockchain-based Transaction Processing Method and Apparatus BR112019011800A2|2020-03-31|METHOD FOR PROCESSING TRANSFERS OF ASSETS, APPLIANCE FOR PROCESSING TRANSFERS OF ASSETS AND ELECTRONIC DEVICE TW201917666A|2019-05-01|Data auditing method and device KR20200080284A|2020-07-06|Methods, apparatus, and electronic devices for regulatory inspection BR112019011703A2|2020-12-08|METHOD FOR THE TRANSFER OF ASSETS AND APPLIANCE FOR THE TRANSFER OF ASSETS WO2019217936A1|2019-11-14|Eligibility for access to restricted goods and services using zero-knowledge proofs CN111767578B|2021-06-04|Data inspection method, device and equipment
同族专利:
公开号 | 公开日 SG11201903141QA|2019-05-30| RU2737361C1|2020-11-27| EP3563318A1|2019-11-06| AU2018231022B2|2020-10-08| KR20190068542A|2019-06-18| PH12019500771A1|2019-11-11| TW201833827A|2018-09-16| US20180260909A1|2018-09-13| US10796379B2|2020-10-06| WO2018165104A1|2018-09-13| JP2020501220A|2020-01-16| TWI736705B|2021-08-21| MX2019004111A|2019-08-05| CA3039818A1|2018-09-13| CN107341702A|2017-11-10| AU2018231022A1|2019-05-02| CN107341702B|2020-06-23| JP6929495B2|2021-09-01| KR102221326B1|2021-03-03|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US5832089A|1995-06-07|1998-11-03|Sandia Corporation|Off-line compatible electronic cash method and system| JP2001266039A|2000-03-22|2001-09-28|Sony Corp|Method and device for payment management and program recording medium with the method recorded thereon| SG115453A1|2002-02-27|2005-10-28|Oneempower Pte Ltd|Activity management method| JP2007079645A|2005-09-09|2007-03-29|Nippon Telegr & Teleph Corp <Ntt>|Online sales system, method for the same, terminal for use in the same, program for the same, and storage medium of the same| US8001080B2|2006-09-12|2011-08-16|Infosys Technologies Ltd.|Managing real-time execution of transactions in a network| US20090012804A1|2007-07-03|2009-01-08|Robert Lee Read|Network-based consensus formation method using configurable finite-state machines| CN101847225B|2009-09-01|2016-01-20|于志|A kind of method based on CN39 code managing commodity circulation| US20150379510A1|2012-07-10|2015-12-31|Stanley Benjamin Smith|Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.| US20160203572A1|2013-08-21|2016-07-14|Ascribe Gmbh|Method to securely establish, affirm, and transfer ownership of artworks| US10356094B2|2014-06-30|2019-07-16|Vescel, Llc|Uniqueness and auditing of a data resource through an immutable record of transactions in a hash history| US11232414B2|2014-07-03|2022-01-25|Raise Marketplace Inc.|Cryptocurrency verification system| US20160092988A1|2014-09-30|2016-03-31|Raistone, Inc.|Systems and methods for transferring digital assests using a de-centralized exchange| US10409827B2|2014-10-31|2019-09-10|21, Inc.|Digital currency mining circuitry having shared processing logic| US20160140653A1|2014-11-14|2016-05-19|Ryan McKenzie|Virtual currency bank| US11250391B2|2015-01-30|2022-02-15|Visa International Service Association|Token check offline| US20160224949A1|2015-02-04|2016-08-04|Ripple Labs Inc.|Temporary consensus subnetwork in a distributed network for payment processing| US9967334B2|2015-03-02|2018-05-08|Dell Products Lp|Computing device configuration and management using a secure decentralized transaction ledger| US10592985B2|2015-03-02|2020-03-17|Dell Products L.P.|Systems and methods for a commodity contracts market using a secure distributed transaction ledger| US20160283920A1|2015-03-28|2016-09-29|Justin Fisher|Authentication and verification of digital data utilizing blockchain technology| US20160321629A1|2015-05-01|2016-11-03|Monegraph, Inc.|Digital content rights transfers within social networks| US10812274B2|2015-05-07|2020-10-20|Blockstream Corporation|Transferring ledger assets between blockchains via pegged sidechains| US10635471B2|2015-05-15|2020-04-28|Joshua Paul Davis|System and method for an autonomous entity| US20160342977A1|2015-05-20|2016-11-24|Vennd.io Pty Ltd|Device, method and system for virtual asset transactions| US20160358161A1|2015-06-05|2016-12-08|Peertracks Inc.|Systems and methods for an online music marketplace| CN106296184A|2015-06-05|2017-01-04|地气股份有限公司|Electronic money management method and electronic-monetary system| CN106251144A|2015-06-05|2016-12-21|地气股份有限公司|Electronic money management method and electronic money node apparatus| EP3324355B1|2015-07-13|2020-08-26|Nippon Telegraph and Telephone Corporation|Contract agreement method, agreement verification method, contract agreement system, agreement verification device, contract agreement device, contract agreement program and agreement verification program| WO2017011601A1|2015-07-14|2017-01-19|Fmr Llc|Computationally efficient transfer processing, auditing, and search apparatuses, methods and systems| US20170048209A1|2015-07-14|2017-02-16|Fmr Llc|Crypto Key Recovery and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems| US10366204B2|2015-08-03|2019-07-30|Change Healthcare Holdings, Llc|System and method for decentralized autonomous healthcare economy platform| EP3362965A4|2015-10-13|2019-08-07|Transactive Grid Inc.|Use of blockchain based distributed consensus control| US10649429B2|2015-10-13|2020-05-12|LO3 Energy Inc.|Use of blockchain based distributed consensus control| WO2017069874A1|2015-10-21|2017-04-27|Manifold Technology, Inc.|Event synchronization systems and methods| CN105427104A|2015-12-08|2016-03-23|布比(北京)网络技术有限公司|Method and method for handling digital assets by means of distributed general ledger| US10079724B2|2016-02-20|2018-09-18|Upguard, Inc.|Consensus-based network configuration management| CN105630609B|2016-02-24|2021-05-11|杭州复杂美科技有限公司|Block chain packing storage method| CN105809062B|2016-03-01|2019-01-25|布比(北京)网络技术有限公司|A kind of building of contract executes method and device| CN105808325B|2016-03-03|2019-04-12|布比(北京)网络技术有限公司|A kind of method and device of data processing| CN106228446B|2016-05-12|2019-09-13|北京众享比特科技有限公司|Transaction in assets plateform system and method based on privately owned block chain| US10204341B2|2016-05-24|2019-02-12|Mastercard International Incorporated|Method and system for an efficient consensus mechanism for permissioned blockchains using bloom filters and audit guarantees| US10122621B2|2016-06-16|2018-11-06|Sap Se|Modified consensus protocol for eliminating heartbeat network traffic| CN106204287A|2016-07-18|2016-12-07|上海仲托网络科技有限公司|Mutual insurance based on block chain and help each other guarantee operation method and system| CN109863516A|2016-08-08|2019-06-07|邓白氏公司|It is applied for the trusted platform of network B OP component and integrated BOP| CN106357604B|2016-08-18|2019-07-23|苏州超块链信息科技有限公司|A kind of consistent data accumulation collaboration assemble method| CN106327173A|2016-08-22|2017-01-11|布比(北京)网络技术有限公司|Network payment method and network payment device| US10540652B2|2016-11-18|2020-01-21|Intel Corporation|Technology for secure partitioning and updating of a distributed digital ledger| US10922728B2|2017-01-19|2021-02-16|Raise Marketplace Inc.|Dynamic exchange item information for valid exchange item requests| RU2639015C1|2017-01-26|2017-12-19|Игорь Сан-Сенович Дю|Authenticity and quality control procedure of production in the process of manufacture and implementation| CN111917864A|2017-02-22|2020-11-10|创新先进技术有限公司|Service checking method and device| CN107341702B|2017-03-08|2020-06-23|创新先进技术有限公司|Service processing method and device| CN107391526B|2017-03-28|2021-04-02|创新先进技术有限公司|Data processing method and device based on block chain|CN107341702B|2017-03-08|2020-06-23|创新先进技术有限公司|Service processing method and device| US9967238B1|2017-11-09|2018-05-08|Broadridge Financial Solutions, Inc.|Database-centered computer network systems and computer-implemented methods for cryptographically-secured distributed data management| CN107943469B|2017-11-17|2022-01-11|深圳圣马歌科技有限公司|Intelligent contract issuing method and device| CN108111299B|2017-12-28|2021-03-09|上海唯链信息科技有限公司|Real-time audit system of traceing back based on block chain technique| CN108305058B|2018-02-11|2021-03-02|深圳市图灵奇点智能科技有限公司|Auxiliary expense settlement method and device based on Internet of things and terminal node| CN108564365B|2018-03-13|2021-08-27|中国地质大学(武汉)|Intelligent power grid transaction method and system based on block chain| CN108537050B|2018-03-20|2021-12-14|中国建设银行股份有限公司|Service data transfer method and related device| CN111861433A|2018-03-30|2020-10-30|创新先进技术有限公司|Service execution method and device based on block chain and electronic equipment| US20190318433A1|2018-04-16|2019-10-17|Nobul Corporation|Real estate marketplace method and system| CN110400217A|2018-04-25|2019-11-01|中国移动通信集团广东有限公司|The regular changing process method and device of intelligent contract| CN108595126A|2018-04-27|2018-09-28|腾讯科技(深圳)有限公司|Data-storage system, querying method, inquiry unit, server and storage medium| CN108629565A|2018-04-28|2018-10-09|上海京颐科技股份有限公司|Medical treatment Claims Resolution method and device based on block chain, electronic equipment| US20190340609A1|2018-05-07|2019-11-07|Vijay Mayadas|Computer network systems administering cryptographically-secured, token-based substitution management and methods of use thereof| CN108876113B|2018-05-29|2022-02-18|厦门哈希科技有限公司|Assessment management method, assessment management device, terminal equipment and assessment management system| CN108876606B|2018-05-29|2021-02-09|创新先进技术有限公司|Asset transfer method and device and electronic equipment| CN108876572A|2018-05-29|2018-11-23|阿里巴巴集团控股有限公司|The account checking method and device, electronic equipment of block chain transaction| CN108805712B|2018-05-29|2021-03-23|创新先进技术有限公司|Asset transfer rollback processing method and device and electronic equipment| CN108876401B|2018-05-29|2022-03-01|创新先进技术有限公司|Commodity claim settlement method and device based on block chain and electronic equipment| CN108830606B|2018-05-30|2021-12-28|创新先进技术有限公司|Intelligent contract deploying, calling and executing method and device| CN108924123A|2018-06-29|2018-11-30|北京京东尚科信息技术有限公司|Information processing method, device and system in block chain| CN108985100B|2018-08-15|2022-02-25|百度在线网络技术(北京)有限公司|Block chain-based element security certification method, device, equipment and medium| CN109151030B|2018-08-24|2021-07-27|中国电子科技集团公司信息科学研究院|Internet of things object distributed interaction system and method| CN109067759B|2018-08-27|2020-11-03|深圳前海益链网络科技有限公司|Intelligent contract calling single-point execution system| CN109118377A|2018-08-29|2019-01-01|深圳壹账通智能科技有限公司|A kind of processing method, system and the electronic equipment of the Claims Resolution event based on block chain| CN109285066B|2018-08-30|2020-12-08|福建省农村信用社联合社|Intelligent contract generating and executing method based on banking business flow| CN109583868B|2018-10-17|2020-10-27|北京瑞卓喜投科技发展有限公司|Payment state channel network, construction method and system thereof, and high-frequency transaction system| CN109460643A|2018-10-22|2019-03-12|阿里巴巴集团控股有限公司|A kind of smart machine control method, device and equipment| CN109543457B|2018-11-07|2021-07-09|泰康保险集团股份有限公司|Method and device for controlling calling between intelligent contracts| CN109660514B|2018-11-15|2020-06-09|苏宁易购集团股份有限公司|Implementation method of intelligent equipment system, intelligent equipment control method and system| CN109523362B|2018-11-16|2020-08-18|大唐高鸿信息通信研究院(义乌)有限公司|Second-hand house transaction system and method based on 5G architecture and block chain| CA3040783A1|2018-11-27|2019-04-18|Alibaba Group Holding Limited|System and method for improving security of smart contract on blockchain| US11138597B2|2018-11-27|2021-10-05|Advanced New Technologies Co., Ltd.|System and method for improving security of smart contract on blockchain| EP3559891B1|2018-11-27|2021-11-17|Advanced New Technologies Co., Ltd.|Executing multi-party transactions using smart contracts| CN110033227A|2018-11-28|2019-07-19|阿里巴巴集团控股有限公司|Data processing method, calculates equipment and storage medium at device| CN109544171A|2018-11-30|2019-03-29|众安信息技术服务有限公司|For realizing the method and apparatus of the consistency of transregional piece of chain transaction| CN109583857B|2018-12-11|2021-05-14|腾讯科技(深圳)有限公司|Method, system, device and storage medium for processing public offer task| CN109670953A|2018-12-13|2019-04-23|杭州秘猿科技有限公司|A kind of equity register method, device and equipment| US20200202338A1|2018-12-19|2020-06-25|International Business Machines Corporation|Post-settlement processes| CN110009337B|2018-12-21|2020-04-21|阿里巴巴集团控股有限公司|Data processing method and device based on block chain| CN110020543B|2018-12-21|2020-09-15|阿里巴巴集团控股有限公司|Data processing method and device based on block chain| CN109714412B|2018-12-25|2021-08-10|深圳前海微众银行股份有限公司|Block synchronization method, device, equipment and computer readable storage medium| JP6835810B2|2018-12-28|2021-02-24|株式会社Screenロジスティクス|Production control system, production control method, and production control program| CN109729163A|2018-12-28|2019-05-07|合肥达朴汇联科技有限公司|A kind of data processing method of block chain, device electronic equipment and storage medium| CN109451451B|2019-01-04|2020-12-15|中国联合网络通信集团有限公司|Terminal roaming method, device and storage medium| CN109729092A|2019-01-09|2019-05-07|山东浪潮质量链科技有限公司|A kind of method and apparatus of business platform access| CN109800354B|2019-01-09|2021-06-08|考拉征信服务有限公司|Resume modification intention identification method and system based on block chain storage| CN109871279B|2019-03-11|2021-10-01|京东方科技集团股份有限公司|Consensus task coordination method and device, block chain system and storage medium| CN109981646B|2019-03-26|2021-06-29|创新先进技术有限公司|Resource transfer method and device based on block chain and electronic equipment| US11108553B2|2019-04-05|2021-08-31|International Business Machines Corporation|Database transaction guaranteed commitment| KR102186999B1|2019-04-25|2020-12-04|한국에이아이사이언스 주식회사|Method for providing financial service associated with bank account in consortium blockchain network| CN110147990B|2019-04-29|2020-12-22|创新先进技术有限公司|Payment withholding subscription method and device based on block chain and electronic equipment| CN110138767B|2019-05-07|2021-11-30|百度在线网络技术(北京)有限公司|Transaction request processing method, device, equipment and storage medium| CN110187831A|2019-05-13|2019-08-30|华宇金信软件有限公司|The block data storage system and method for block chain alliance chain| CN110287260A|2019-06-28|2019-09-27|通链科技有限公司|Independent management entity management method and system based on block chain technology| US10771242B2|2019-07-09|2020-09-08|Alibaba Group Holding Limited|Blockchain-based data processing| CN112612856A|2019-07-09|2021-04-06|创新先进技术有限公司|Data processing method and device based on block chain| US11169973B2|2019-08-23|2021-11-09|International Business Machines Corporation|Atomically tracking transactions for auditability and security| CN110380919B|2019-08-30|2021-11-05|望海康信科技股份公司|Processing method and device for block chain request, electronic equipment and readable storage medium| CN110572404B|2019-09-12|2021-08-24|北京笔新互联网科技有限公司|Lightweight block chain network system| CN110597916B|2019-09-21|2021-03-26|腾讯科技(深圳)有限公司|Data processing method and device based on block chain, storage medium and terminal| CN110781192B|2019-10-30|2021-11-30|支付宝信息技术有限公司|Verification method, device and equipment of block chain data| WO2021101945A1|2019-11-19|2021-05-27|Captiv8, Inc.|Systems and methods for identifying, tracking, and managing a plurality of social network users having predefined characteristcs| CN111327624A|2020-02-29|2020-06-23|国网上海市电力公司|On-chain detection method and system for key information system| CN111062814A|2020-03-16|2020-04-24|支付宝信息技术有限公司|Resource transfer method, device and system based on block chain| CN111526154A|2020-04-30|2020-08-11|余伟霞|Service data sharing system based on block chain network| CN111866147A|2020-07-23|2020-10-30|山东浪潮商用系统有限公司|Remote video service handling method, system and management terminal| CN111783144A|2020-08-20|2020-10-16|支付宝信息技术有限公司|Data processing method and device based on block chain| CN112669020B|2021-03-18|2021-09-24|中如信息科技有限公司|Transaction application processing method, device and storage medium|
法律状态:
2021-04-20| B25A| Requested transfer of rights approved|Owner name: ADVANTAGEOUS NEW TECHNOLOGIES CO., LTD. (KY) | 2021-05-11| B25A| Requested transfer of rights approved|Owner name: ADVANCED NEW TECHNOLOGIES CO., LTD. (KY) | 2021-06-29| B07A| Application suspended after technical examination (opinion) [chapter 7.1 patent gazette]| 2021-09-14| B09B| Patent application refused [chapter 9.2 patent gazette]| 2021-10-05| B350| Update of information on the portal [chapter 15.35 patent gazette]| 2021-11-30| B09B| Patent application refused [chapter 9.2 patent gazette]|Free format text: MANTIDO O INDEFERIMENTO UMA VEZ QUE NAO FOI APRESENTADO RECURSO DENTRO DO PRAZO LEGAL |
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 CN201710133969.XA|CN107341702B|2017-03-08|2017-03-08|Service processing method and device| PCT/US2018/021064|WO2018165104A1|2017-03-08|2018-03-06|Business processing method and apparatus| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|