专利摘要:
implementations of the present invention include obtaining, by a client node from a first trust protocol case, a trust protocol domain name from a different second trust protocol case, wherein the domain protocol from the trust protocol trust is a unique identifier of the second trust protocol case in a unified trust protocol network including multiple trust protocol cases that are communicatively linked by two or more relays, the trust protocol domain name includes a label human readable and the domain name of the trust protocol is uniquely a string identifier of the second trust protocol case; identify the second trust protocol case string identifier based on the trust protocol domain name of the second trust protocol case, where the second trust protocol case string identifier indicates a protocol network configuration trust of the second trust protocol case; and accessing, through the client node, the second trust protocol case based on the trust protocol network configuration indicated by the string identifier of the second trust protocol case.
公开号:BR112019008025A2
申请号:R112019008025
申请日:2018-11-16
公开日:2019-09-10
发明作者:Qiu Honglin
申请人:Alibaba Group Holding Ltd;
IPC主号:
专利说明:

“COMPUTER IMPLEMENTED METHOD, COMPUTER READABLE MEANS AND SYSTEM TO IMPLEMENT A METHOD”
Field of the Invention [001] The present invention relates to computer-implemented methods for a domain name scheme for trusted protocol systems.
Background of the Invention [002] Distributed accounting systems (DLSs), which can also be called consensus networks and / or trust protocol networks (blockchain), allow participating entities to store data in a secure and immutable way. DLSs are commonly referred to as trust protocol networks without referring to any particular user case (for example, cryptocurrencies). Examples of types of trust networks can include public trust networks, private trust networks and consortium trust networks. A public trust protocol network is open for all entities to use DLS and participate in the consensus process. A private trusted protocol network is provided for a specific entity, which centrally controls read and write permissions. A consortium trust protocol network is provided for a select group of entities, which control the consensus process and include an access control layer.
[003] Trust protocols are used in cryptocurrency networks, which allow participants to make transactions to buy / sell goods and / or services using a cryptocurrency. A common cryptocurrency includes Bitcoin. In cryptocurrency networks, record-keeping models are used to record transactions between users. Examples of record-keeping models include an output model
Petition 870190056811, dated 06/19/2019, p. 9/61
2/41 of unused transaction (unspent transaction output - UTXO), and the account model (also referred to as account-based model or account / balance model).
Description of the Invention [004] The embodiments of the present invention include computer-implemented methods for a domain name scheme for trusted protocol systems. More particularly, the achievements of the present disclosure refer to a unified domain name scheme for cross-chain interactions in trust protocol systems.
[005] In some embodiments, actions include obtaining, through a client node from a first trust protocol case, a trust protocol domain name from a different second trust protocol case, where the name of trust protocol domain is a unique identifier for the second trust protocol case in a unified trust protocol network that comprises multiple trust protocol cases that are communicatively linked by two or more relays, the trust protocol domain name it comprises a human-readable label and the domain name of the trust protocol corresponds exclusively to a chain identifier of the second case of trust protocol; identify the chain identifier of the second trust protocol case based on the domain name of the trust protocol of the second trust protocol case, where the chain identifier of the second trust protocol case indicates a protocol network configuration confidence in the second case of the trust protocol; and accessing, through the client node, the second trust protocol case based on the trust protocol network configuration indicated by the chain identifier of the second trust protocol case.
[006] Other achievements include systems, devices and
Petition 870190056811, dated 06/19/2019, p. 10/61
3/41 corresponding computer programs, configured to perform the actions of the encrypted methods on computer storage devices.
[007] These and other achievements may optionally include one or more of the following characteristics:
[008] A first feature, which can be combined with any of the following features, including cross-chain transactions between the first trust protocol case and the second trust protocol case based on the domain name of the trust protocol the second case of trust protocol.
[009] A second feature, combinable with any of the following features, where the human-readable label includes a text-based label.
[0010] A third characteristic, combinable with any of the following characteristics, in which the chain identifier of the second case of the trust protocol includes a hash value of a block of genesis of the second case of the trust protocol and a network identifier of the second case of trust protocol.
[0011] A fourth characteristic, combinable with any of the following characteristics, in which each of the plurality of trust protocol cases in the unified trust protocol network has only one trust protocol domain name that uniquely identifies each of the plurality of trust protocol cases.
[0012] A fifth characteristic, combinable with any of the following characteristics, in which the identification of the chain identifier of the second case of the trust protocol based on the domain name of the trust protocol includes the identification of the chain identifier of the second case confidence protocol, according to information from
Petition 870190056811, dated 06/19/2019, p. 11/61
4/41 queries stored locally on the client node based on the domain name of the trust protocol.
[0013] A sixth characteristic, combinable with any of the following characteristics, in which the identification of the chain identifier of the second case of trust protocol based on the domain name of the trust protocol includes: send, to a name server of unified trust domain, a request that includes the trust protocol domain name to identify the chain identifier of the second trust protocol case; and receiving, from the unified trust domain name server, a response that includes the string identifier of the second trust protocol case.
[0014] A seventh characteristic, combinable with any of the following characteristics, in which the first case of trust protocol and the second case of trust protocol are implemented based on different trust protocol platforms.
[0015] The present invention also provides one or more computer-readable storage media coupled to one or more processors and having instructions stored on it that, when executed by one or more processors, cause the one or more processors to perform operations according to realizations of the methods provided here.
[0016] The present invention further provides a system for implementing the methods provided herein. The system includes one or more processors, and a computer-readable storage medium coupled to one or more processors with instructions stored on it that, when executed by one or more processors, cause one or more processors to perform operations according to achievements of the methods provided here.
[0017] It is understood that the methods according to this
Petition 870190056811, dated 06/19/2019, p. 12/61
The invention may include any combination of the embodiments and features described herein. That is, the methods according to the present invention are not limited to the combinations of embodiments and characteristics specifically described herein, but also include any combination of the embodiments and characteristics provided.
[0018] Details of one or more embodiments of the present invention are presented in the accompanying drawings and in the description below. Other features and advantages of the present invention will be apparent from the description and drawings, and from the claims.
Brief Description of the Drawings [0019] Figure 1 illustrates an example of an environment that can be used to perform embodiments of the present invention.
[0020] Figure 2 illustrates an example of conceptual architecture according to embodiments of the present invention.
[0021] Figure 3 illustrates an example of a unified trust protocol (UBCDN) domain name of a trust protocol case, according to embodiments of the present invention.
[0022] Figure 4 illustrates an example of UBCDN management scheme in a unified trust protocol network, in accordance with realizations of the present invention.
[0023] Figure 5 illustrates an example of a process for using a trust protocol domain name from a trust protocol case for cross-chain interactions in a unified trust protocol network, in accordance with realizations of the present invention.
[0024] Figure 6 illustrates an example of a process for authenticating a UBCDN of a trust protocol case, in accordance with realizations of the present invention.
[0025] Figure 7 describes an example of a process for
Petition 870190056811, dated 06/19/2019, p. 13/61
6/41 owner of a UBCDN of a trust protocol case (an owner of UBCDN), according to embodiments of the present invention.
[0026] Figure 8 illustrates an example of a relay process for cross-chain interactions in a unified trust protocol network, in accordance with embodiments of the present invention.
[0027] Similar reference symbols in the various drawings indicate similar elements.
Description of Embodiments of the Invention [0028] Embodiments of the present invention include computer-implemented methods for a domain name scheme for trusted protocol systems. More particularly, the achievements of the present disclosure refer to a unified domain name scheme for cross-chain interactions in trust protocol systems.
[0029] In some embodiments, the actions include actions that include the obtaining, by a client node, of a first case of trust protocol, of a domain name of the trust protocol of a second case of different trust protocol, in which the trust protocol domain name is a unique identifier for the second trust protocol case in a unified trust protocol network including multiple trust protocol cases that are communicatively linked by two or more relays, the protocol domain name of trust includes a human-readable label and the domain name of the trust protocol corresponds exclusively to a chain identifier of the second case of the trust protocol; identify the chain identifier of the second trust protocol case based on the domain name of the trust protocol of the second trust protocol case, where the chain identifier of the second trust protocol case indicates a protocol network configuration trusted by
Petition 870190056811, dated 06/19/2019, p. 14/61
7/41 second case of trust protocol; and accessing, through the client node, the second trust protocol case based on the trust protocol network configuration indicated by the chain identifier of the second trust protocol case.
[0030] To provide an additional context for realizations of the present invention, and as introduced above, distributed accounting systems (DLSs), which can also be referred to as consensus networks (for example, constituted by peer-to-peer nodes), and trust protocol networks, allowing participating entities to conduct transactions in a secure and immutable manner and to store data. Although the term trust protocol is generally associated with the Bitcoin cryptocurrency network, the trust protocol is used here to refer generally to a DLS without reference to any particular use case. As introduced above, a trust protocol network can be provided as a public trust protocol network, a private trust protocol network, or a consortium trust network.
[0031] In a public trust protocol network, the consensus process is controlled by nodes in the consensus network. For example, hundreds, thousands, even millions of entities can cooperate in a public trust protocol network, each of which operates at least one node in the public trust protocol network. Thus, the public trust protocol network can be considered a public network in relation to the participating entities. In some examples, most entities (nodes) must sign each block in order for the block to be valid, and added to the trust protocol (distributed accounting) of the trust protocol network. An example of a public trust protocol network includes the Bitcoin network, which is a peer-to-peer payment network. The Bitcoin network uses distributed accounting, known as
Petition 870190056811, dated 06/19/2019, p. 15/61
8/41 confidence. As noted above, the term trust protocol, however, is used to generally refer to distributed accounts with no particular reference to the Bitcoin network.
[0032] In general, a public trust protocol network supports public transactions. A public transaction is shared with all nodes within the public trust protocol network and is stored in a global trust protocol. A global trust protocol is a trust protocol that is replicated on all nodes. That is, all nodes are in a perfect state of consensus regarding the global trust protocol. To reach consensus (for example, agreeing to add a block to a trust protocol), a consensus protocol is implemented within the public trust protocol network. An example of a consensus protocol includes, without limitation, proof of work (POW) implemented in the Bitcoin network.
[0033] In general, a private trust protocol network is provided for a particular entity, which centrally controls read and write permissions. The entity controls which nodes are able to participate in the trust protocol network. Consequently, private trust protocol networks are generally referred to as allowed networks that place restrictions on who is allowed to participate in the network, and on their level of participation (for example, only in certain transactions). Various types of access control mechanisms can be used (for example, existing participants vote to add new entities, a regulatory authority can control admission).
[0034] In general, a consortium trust protocol network is private between participating entities. In a consortium trust protocol network, the consensus process is controlled by an authorized set of nodes, one or more nodes being operated by a
Petition 870190056811, dated 06/19/2019, p. 16/61
9/41 respective entity (for example, a financial institution, insurance company). For example, a consortium of ten (10) entities (for example, a financial institution, insurance company) may operate a consortium trust protocol network, each operating at least one node in the consortium trust protocol network. In this sense, the consortium trust protocol network can be considered a private network in relation to the participating entities. In some examples, each entity (node) must sign all blocks for the block to be valid and added to the trust protocol. In some examples, at least a subset of entities (nodes) (for example, at least 7 entities) must sign all blocks for the block to be valid and added to the trust protocol.
[0035] The realizations of the present invention are described here in more detail with reference to a consortium trust protocol network. It is contemplated, however, that the embodiments of the present invention can be performed on any appropriate type of trusted protocol network.
[0036] The embodiments of the present invention are described in more detail here in view of the above context. More particularly, and as shown above, the embodiments of the present invention are intended for a domain name scheme for cross-chain interactions in trusted protocol systems.
[0037] Several trust protocol platforms, environments or products have been developed based on different trust protocol technologies. Examples of trust protocol products include Ethereum and Bitcoin. The current trust protocol network includes multiple trust protocol cases deployed based on the different trust protocol products. For example, the current trust protocol network includes multiple cases of trust protocol
Petition 870190056811, dated 06/19/2019, p. 17/61
10/41 as public trust protocols, private trust protocols, or consortium trust protocols that are developed based on Ethereum or Bitcoin technologies.
[0038] The current access mode of each trust protocol case requires access from a client node (also called the client terminal) of the trust protocol or its technical components, such as SDKs. In order to accurately connect to a specific trust protocol case, the customer needs to load their trust network settings. These trust protocol network settings are typically hash, member certificates, etc. These configurations are unreadable for humans and it is difficult to identify which chains the configurations identify.
[0039] The present invention provides a domain name scheme for the trust protocol network. Specifically, a unified trust protocol (UBCDN) domain name is provided to serve as a unique identifier for each trust protocol case (also referred to as a trust protocol chain or chain case) in the trust protocol network . A case of a trust protocol can be, for example, an implementation or practice of a trust protocol based on a trust protocol or technology platform (for example, Ethereum). Each UBCDN uniquely links a domain name of a trust protocol case (also known as a domain name of the trust protocol) with a corresponding network configuration of the trust protocol case (also referred to as a protocol network configuration reliable). In some embodiments, the trust protocol network configuration can be represented or indicated by a string identifier. A client node of a trust case can obtain a trust network configuration
Petition 870190056811, dated 06/19/2019, p. 18/61
11/41, analyzing the UBCDN to identify the chain identifier. Based on the configuration of the trust protocol network, the client node can connect to, or otherwise access, the specific case of the trust protocol.
[0040] The described domain name scheme can provide a unified protocol for interactions between trust protocol systems in a unified (or global) trust protocol network that includes multiple or all trust protocol cases deployed, based on on different trusted protocol products or technologies. All trust protocol cases in the unified trust network follow the same domain name scheme and unique UBCDNs are assigned. In some embodiments, each trust protocol case in the unified trust protocol network is assigned a single UBCDN that can be recognized by all trust protocol cases in the unified trust network, regardless of different platforms, technologies, or retransmitters that are used in the unified trust protocol network. In some realizations, the UBCDN defines a domain of administrative autonomy, authority or control of a trust protocol case within the unified trust protocol network. In some embodiments, the unified trust protocol network can be thought of as a counterpart of the Internet to the IP network, while UBCDN can be thought of as mapping a domain name to an IP resource on the IP network with an address of IP of the IP Resource.
[0041] Each case of trust protocol in the unified trust protocol network can be uniquely identified by a corresponding UBCDN, in order to facilitate multiple or cross-chain communications. For example, unlike existing cross-chain achievements like COSMOS, which uses a relay chain to
Petition 870190056811, dated 06/19/2019, p. 19/61
12/41 cross-chain interactions, in which each trust protocol is assigned an identifier (ID) within the relay chain network, but the ID is only local in scope and cannot be reused in other relay chain networks , in the described domain name scheme, the UBCDN can be used and is globally recognized by all trust protocol cases in the unified trust network, despite how many relay chains are included in the unified trust network.
[0042] In addition, the domain name scheme described simplifies the identification or addressing protocol for cross-chain interactions in trust protocol systems. For example, in the described domain name scheme, a single UBCDN is sufficient to uniquely identify a case of trust protocol and is globally recognizable by all cases of trust protocol in the unified trust network for interactions between different trust protocol networks, whereas in COSMOS a trust protocol case is assigned to multiple different IDs when the trust protocol case is associated with multiple relay chains for the trust protocol case to interact with other trust protocols.
[0043] In addition, the UBCDN can include a human-readable identifier or label, helping users to memorize and arrive at a trust protocol case easily, and thus promote the adoption or use of the trust protocol case. For example, operators or owners of public trust protocols, private trust protocols or consortium trust protocols can choose trust protocol domain names that match their names, helping users to remember trust case identifiers , and also facilitates the translation, resolution, or other identification of the
Petition 870190056811, dated 06/19/2019, p. 20/61
13/41 chain corresponding to the domain names of the trust protocol, accelerating cross-chain interactions in the unified trust network.
[0044] In addition to providing easily recognizable and memorable names to identify trust protocol cases, the UBCDN allows a trust protocol case to retain its trust protocol domain name even though the underlying network configuration of the trust protocol case trust is changed (for example, by system update or move or migration to a different physical location in the network address topology). In the event of such a change or update, the trust protocol case string identifier can be changed while the trust protocol domain name can remain the same. The UBCDN owner can change the mapping of the trust protocol domain name to the updated chain identifier and allow others (for example, other trust protocol cases or client nodes) to use the same trust protocol domain name for refer and access the trust protocol case.
[0045] Figure 1 represents an example of an environment (100) that can be used to carry out realizations of the present invention. In some examples, the sample environment (100) allows entities to participate in a consortium trust protocol network (102). The example environment (100) includes computing systems or devices (106, 108) and a network (110). In some examples, the network (110) includes a local area network (LAN), wide area network (WAN), the Internet or a combination of them, and connects web sites, user devices (for example, computing devices ) and backend system. In some examples, the network (110) can be accessed via a wired and / or wireless communication link.
Petition 870190056811, dated 06/19/2019, p. 21/61
14/41 [0046] In the example described, the computing systems (106, 108) can include any appropriate computing system that allows participation as a node in the consortium trust protocol network (102). Examples of computing devices include, without limitation, a server, a desktop computer, a laptop computer, a tablet computing device and a smartphone. In some instances, computer systems (106, 108) host one or more services implemented per computer to interact with the consortium trust protocol network (102). For example, the computing system (106) can host computer-implemented services from a first entity (for example, user A), such as a transaction management system that the first entity uses to manage its transactions with one or more entities ( for example, other users). The computing system (108) can host computer-implemented services from a second entity (for example, user B), such as a transaction management system that the second entity uses to manage its transactions with one or more other entities (for example , other users). In the example in Figure 1, the consortium trust protocol network (102) is represented as a peer-to-peer network of nodes, and the computing systems (106, 108) provide nodes of the first entity and second entity, respectively , who participate in the consortium trust protocol network (102).
[0047] Figure 2 illustrates an example of conceptual architecture (200) according to embodiments of the present invention. The exemplary conceptual architecture (200) includes an entity layer (202), a hosted services layer (204) and a trust protocol network layer (206). In the example shown, the entity layer (202) includes three entities, Entity_1 (E1), Entity_2 (E2) and Entity_3 (E3), each entity having a respective transaction management system (208).
Petition 870190056811, dated 06/19/2019, p. 22/61
15/41 [0048] In the example described, the hosted services layer (204) includes interfaces (210) for each transaction management system (208). In some examples, a respective transaction management system (208) communicates with a respective interface (210) over a network (for example, the network (110) in Figure 1) using a protocol (for example, data transfer protocol) secure hypertext (HTTPS)). In some examples, each interface (210) provides a communication connection between a respective transaction management system (208), and the trust protocol network layer (206). More particularly, the interface (210) communicates with a trust protocol network (212) of the trust protocol layer (206). In some examples, communication between an interface (210) and the trust protocol network layer (206) is conducted using remote procedure calls (RPCs). In some examples, interfaces (210) "host" the trust protocol network nodes for the respective transaction management systems (208). For example, interfaces (210) provide the application programming interface (API) for accessing the trusted protocol network (212).
[0049] As described here, the trust protocol network (212) is provided as a peer-to-peer network including a number of nodes (214) that record information immutably in a trust protocol (216). Although a single trust protocol (216) is schematically represented, several copies of the trust protocol (216) are provided, and are maintained through the trust protocol network (212). For example, each node (214) stores a copy of the trust protocol. In some embodiments, the trust protocol (216) stores information associated with transactions that are carried out between two or more entities that participate in the consortium trust protocol network.
[0050] Figure 3 illustrates an example of the domain name of the
Petition 870190056811, dated 06/19/2019, p. 23/61
16/41 unified trust protocol (UBCDN) (300) of a case of trust protocol, according to embodiments of the present invention. The UBCDN (300) can include a trust protocol domain name (310) and a corresponding string identifier (320) of the trust case. The domain name of the trust protocol (310) can be human-readable. The chain identifier (320) can indicate a trust protocol network configuration of the trust case and allows access to the trust case based on the trust protocol network settings. In some embodiments, the UBCDN (300) may include additional fields or be represented as a string or other data structure.
[0051] The domain name of the trust protocol (310) can be easy to use. For example, the domain name of the trust protocol (310) can be a text-based label that is easier to remember than the corresponding numeric string identifier (320) (for example, a 40-character hexadecimal address used in Ethereum protocols In some embodiments, the domain name of the trust protocol (310) can be represented as a string or other data structure.
[0052] In some embodiments, the domain name of the trust protocol (310) may have a defined syntax to further facilitate the understanding of the origin, ownership or organization of the underlying trust protocol case. For example, the domain name of the trust protocol (310) can be designed similarly to the domain name on the IP network. The trust protocol domain name (310) can include one or more parts or labels. The one or more labels can be concatenated and have a domain hierarchy descending from the label from right to left in the name. Each label on the left specifies a
Petition 870190056811, dated 06/19/2019, p. 24/61
17/41 domain subdivision or subdomain to the right. For example, a domain name from the chain's trust protocol (310). organization indicates that the underlying chainl trust protocol case is a subdomain of the organization's domain and belongs to the organization. In some embodiments, the domain name of the trust protocol (310) may define an additional or different syntax.
[0053] The chain identifier (320) can include an addressable identifier that is used to address and access the trust protocol case in the trust protocol network. The chain identifier (320) can indicate a trust protocol network configuration of the trust case and allow access to the trust case based on the trust protocol network settings. For example, multiple cases of trust protocol can be implemented based on Ethereum technology. The trust protocol case can be, for example, a MainNet chain, a test chain, a private chain, or a consortium chain. An Ethereum customer can establish a connection to an Ethereum trust protocol case by loading the genesis block (ie, the first block) of the Ethereum trust protocol case. The genesis block is equivalent to a unique identifier for the Ethereum trust protocol case. Thus, in some embodiments, one or more fields (for example, a hash value) from the genesis block of an Ethereum trust protocol case can be extracted as the string identifier (320) of the Ethereum trust protocol case. In some embodiments, the chain identifier of a trust protocol case may include a hash value from a trust protocol genesis block as well as a network ID that identifies the trust protocol case. In some embodiments, the network ID allows transactions in the case of the trust protocol to appear different from other chains, for example, by signing
Petition 870190056811, dated 06/19/2019, p. 25/61
18/41 transactions differently, depending on the network ID used. As such, the network ID indicates an additional network configuration that can be used to link or otherwise access the case of the trust protocol. The chain identifier (320) can include additional or different components or fields, for example, depending on the underlying trust protocol technology or platform of the trust protocol case.
[0054] The UBCDN (300) creates a one-to-one mapping of the trust protocol domain name (310) and its corresponding chain identifier (320) of the trust protocol case. Given the domain name of the trust protocol (310), its corresponding string identifier (320) can be translated, resolved, or otherwise identified, and vice versa. As such, a node can access the trust protocol case based on the trust protocol network configuration indicated by the chain identifier (320). As an analogy, the trust protocol domain name (310) of a trust protocol case is similar to a domain name according to the Domain Name System (DNS) of an Internet Protocol (IP) resource ) (for example, example.com) and the string identifier (320) is similar to the IP address of the IP characteristic on the IP network.
[0055] In some embodiments, for a given trust protocol domain name (310), its corresponding string identifier (320) can be translated, resolved or otherwise identified using UBCDN query information that is cached or not stored locally, within a query computer, or remotely on the unified trust protocol network (for example, on a central UBCDN server). The UBCDN query information can include multiple UBCDN (300), each UBCDN (300) corresponding to multiple cases of trust protocol. UBCDN query information can be
Petition 870190056811, dated 06/19/2019, p. 26/61
19/41 stored, for example, in a lookup table or other data structure. The one or more nodes (for example, a client node, a consensus node, or a relay node) or a server on the unified trust protocol network can store UBCDN query information. When searching based on UBCDN query information, a string identifier (320) corresponding to a given trust protocol domain name (310) can be identified and vice versa.
[0056] When UBCDN information is cached locally, the UBCDN query process can be faster than performing a remote UBCDN query, for example, on a remote UBCDN server. In some embodiments, in the last remote UBCDN query, a user enters a domain name from the trust protocol (310), for example, “chain. organization 1 ”in an SDK of the user’s computing device (that is, the client node). The client node sends a request or query that includes the domain name of the trust protocol (310) “chain. organization ”to a remote UBCDN server, for example, over the Internet outside the chain. Upon receiving the request, the remote UBCDN server searches the UBCDN query information for an entry corresponding to the domain name of the trust protocol (310) “chain. organization ”and identifies the chain identifier (320) corresponding to the domain name of the trust protocol (310). Then, the remote UBCDN server responds to the client node with the chain identifier (320) corresponding to the domain name of the trust protocol (310), for example, sending a response including the corresponding chain identifier (320) to the domain name of the trust protocol (310) for the client node.
[0057] Figure 4 illustrates an example of a UBCDN (400) management scheme in a trusted protocol network
Petition 870190056811, dated 06/19/2019, p. 27/61
20/41 unified, in accordance with embodiments of the present invention. The example of the UBCDN (400) management scheme can provide improved reliability and security for UBCDN-based cross-chain communications. In some embodiments, the example of a UBCDN management scheme (400) relies on a public key infrastructure (PKI) to establish trust in the unified trust protocol network.
[0058] For example, a certification authority (CA) (410) (for example, the PKI operator) can be used. The CA (410) issues a domain certificate (“Domain Certificate”) (420a, 420b and 420c) (collectively, domain certificate (420)) for each owner of a UBCDN (430a, 430b and 430c) (collectively , owner of UBCDN (430)). The UBCDN owner (430) can be, for example, an owner or operator of the trust protocol case. As illustrated, the owner of UBCDN (430a) is an owner of a domain name of the trust protocol “Exemplol .chain,” the owner of UBCDN (430b) is an owner of a domain name of the trust protocol “Example2.chain ”, And the owner of UBCDN (430b) is an owner of a domain name of the trust protocol“ ExampleN.chain. ” [0059] In some embodiments, the UBCDN owner (430) can obtain a domain certificate (420) by applying aa CA (410) with a certificate signing request (not shown in Figure 4). In some embodiments, the certificate request is an electronic document that contains the domain name of the trust protocol, the case information for the trust protocol (for example, the chain identifier or other network settings), and a public key from the UBCDN owner (430). After verifying that the owner of UBCDN (430) has the right to administratively manage the domain name of the trust protocol of the trust case, the CA (410) can
Petition 870190056811, dated 06/19/2019, p. 28/61
21/41 sign the request, thus producing a public domain certificate (420). In some embodiments, the domain certificate (420) can be served to any node (for example, a client node, a consensus node, or a relay node) that would like to access the underlying trust protocol case from the protocol domain name of trust (for example, “Example chain”) and proof to the node that the CA (410) trusts and issued a certificate to the owner of UBCDN (430).
[0060] The domain certificate (420) can include a domain name of the trust protocol (for example, “Example chain.”) And a public key of the UBCDN owner (430). The UBCDN owner (430) is the holder of the private key corresponding to the public key. The CA (410) can digitally sign the trust protocol domain name and the public key of the UBCDN owner (430) using the CA's own private key. The domain certificate (420) can include the digital signature signed by the CA (410) in the domain name of the trust protocol and the public key of the UBCDN owner (430).
[0061] As described in relation to Figure 3, a UBCDN can include a domain name of the trust protocol (for example, "Example chain.") And a corresponding string identifier. The UBCDN owner (430) can publish the UBCDN and sign the UBCDN using the private key of the UBCDN owner (430). In some embodiments, the UBCDN owner (430) publishes one or more UBCDN messages (for example, UBCDN messages (440A, 450A, 440)) so that the UBCDN can be authenticated or verified.
[0062] In some embodiments, UBCDN messages (440) may include UBCDN, a resulting UBCDN digital signature, and a domain certificate. The domain certificate can be the respective domain certificate (420) received from the CA (410). The UBCDN can include the
Petition 870190056811, dated 06/19/2019, p. 29/61
22/41 trust protocol domain name and chain identifier (for example, trust protocol domain name (310) and chain identifier (320), as described in relation to Figure 3). As illustrated, the UBCDN owner (430a) issues a UBCDN message (440a) that includes the trust protocol domain name (442a) “Example chain” and a corresponding chain identifier (444a) “VO Chain Identifier ”, A digital signature (446a) and a domain certificate (448a). The domain certificate (448a) can be the domain certificate (420a) issued by the CA (410) and received by the UBCDN owner (430a) from the CA (410). The digital signature (446a) can result from the signature of the UBCDN owner (430a) of the UBCDN (that is, the domain name of the trust protocol (442a) “Example chain” and a corresponding string identifier (444a) “Identifier String V0 ”, in this case) using the private key of the UBCDN owner (430a).
[0063] Similarly, the UBCDN owner (430b) issues a UBCDN message (440b) that includes the domain name of the trust protocol (442b) “Example2.chain” and a corresponding chain identifier (444b) “Chain identifier Vx ”, a digital signature (446b) and a domain certificate (448b). The domain certificate (448b) can be the domain certificate (420b) issued by the CA (410) and received by the UBCDN owner (430b) from the CA (410). The digital signature (446a) may result from the signature of the UBCDN owner (430b) of the UBCDN (ie the domain name of the trust protocol (442b) “Example2.chain” and a corresponding chain identifier (444a) String V0 ”in this case), using the private key of the UBCDN owner (430b).
[0064] In some embodiments, an authentication or verification process can be performed, for example, by any node in the unified trust protocol network or by third parties to verify the validity of
Petition 870190056811, dated 06/19/2019, p. 30/61
23/41 a UBCDN based on the UBCDN message. This can ensure the security that is important for e-commerce, especially in connection with mobile payment transactions for cross-chain interactions in trust protocol systems.
[0065] In some embodiments, the authentication or verification process may include, for example, verifying that the domain name of the trust protocol is the same as the domain name of the trust protocol in the domain certificate; verify that the owner of UBCDN (for example, the owner of UBCDN (430a)) is the owner of the trust protocol domain name (for example, "the trust protocol domain name (442a)" Example .chain " ) by checking the digital signature on the UBCDN (for example, the digital signature (446a)) using the public key on the domain certificate (for example, the domain certificate (420a)) issued by the CA (410), and verify that the certificate domain (for example, the domain certificate (448a)) is issued by the trusted CA (410).
[0066] In some embodiments, after checking the validity of the UBCDN, for example, based on the authentication or verification process, a client node can use the UBCDN for cross-chain interactions in the unified trust protocol network. For example, the client node can receive and read a UBCDN message, check the validity or legality of the UBCDN and confirm that the UBCDN is issued by the UBCDN owner; and then use the UBCDN to uniquely identify and access the trust protocol case, for example, by identifying the string identifier corresponding to the trust protocol domain name in the UBCDN.
[0067] Figure 5 illustrates an example process (500) for using a trust protocol domain name from a trust protocol case for cross-chain interactions in a unified trust protocol network, according to present invention. In
Petition 870190056811, dated 06/19/2019, p. 31/61
24/41 some realizations, the process example (500) can be executed using one or more computer executable programs executed using one or more computing devices. For clarity of presentation, the following description generally describes the process (500) in the context of the other figures in this description. For example, the process example (500) can be executed by a client node of a first trust protocol case, such as, the computing system (106) or (108) of the trust protocol network trust protocol ( 102), as described in relation to Figure 1, or the node (214) of the trust protocol network (212), as described in relation to Figure 2. However, it will be understood that the process (500) can be performed, for for example, by any suitable system, environment, software and hardware, or a combination of systems, environments, software and hardware, as appropriate. In some embodiments, several process steps (500) can be performed in parallel, in combination, in loops or in any order.
[0068] In (510), a client node of a first trust protocol case obtains a domain name of the trust protocol from a second case of different trust protocol. In some embodiments, the first case of trust protocol and the second case of trust protocol are implemented based on different trust protocol platforms. In some embodiments, the first case of trust protocol and the second case of trust protocol belong to different owners or operators. The first trust protocol example and the second trust protocol example are in a unified trust network including a number of trust protocol cases that are linked in communication by two or more relays.
[0069] The domain name of the trust protocol is a
Petition 870190056811, dated 06/19/2019, p. 32/61
25/41 unique identifier for the second trust protocol case in the unified trust network, even if the unified trust network includes two or more relays. In some embodiments, each of the trust protocol case numbers in the unified trust network has only one trust protocol domain name that uniquely identifies each of the trust protocol case numbers in the trust protocol network unified.
[0070] The domain name of the trust protocol includes a human-readable label. In some embodiments, the human-readable label includes a text-based label. The domain name of the trust protocol corresponds exclusively to a string identifier in the second case of the trust protocol. The trust protocol domain name and chain identifier can be represented by a UBCDN such as UBCDN (300), as described in Figure 3. As an example, the trust protocol domain name can be the domain name of the trust protocol (310), while the chain identifier can be the corresponding chain identifier (320) in the UBCDN (300).
[0071] In (520), the client node of the first trust case identifies the chain identifier of the second trust case based on the domain name of the trust case of the second trust case, where the chain identifier of the second trustee case indicates a trustee network configuration of the second trustee case. In some embodiments, the chain identifier of the second trust protocol case includes a hash value from a genesis block of the second trust protocol case and a network identifier of the second trust protocol case, for example, as described in relation to Figure 3.
[0072] In some embodiments, the identification of the
Petition 870190056811, dated 06/19/2019, p. 33/61
26/41 chain of the second trust protocol case based on the domain name of the trust protocol includes the identification of the chain identifier of the second trust protocol case according to the query information stored locally on the client node based on the domain name of the trust protocol.
[0073] In some embodiments, the identification of the chain identifier of the second trust protocol case based on the domain name of the trust protocol includes the identification of the chain identifier of the second trust protocol case of a name server. remote unified trust domain based on the trust protocol domain name. For example, the client node of the first trust case sends a request or query to the unified trust domain name server. The request includes the domain name of the trust protocol to identify the chain identifier of the second trust protocol case. Then, the client node of the first trust case receives a response to the request from the domain name server of the unified trust protocol, where the response includes the chain identifier of the second trust case.
[0074] In (530), the client node of the first trust protocol case accesses the second trust protocol case based on the trust protocol network configuration indicated by the chain identifier of the second trust protocol case. For example, the first trust protocol case accesses the second trust protocol case through a client node of the second trust protocol case based on the hash value of the genesis block of the second trust protocol case indicated by the identifier of the second case of the trust protocol. In some embodiments, the first case of
Petition 870190056811, dated 06/19/2019, p. 34/61
27/41 trust protocol accesses the second trust protocol case through a client node of the second trust protocol using a relay (for example, a relay node or a relay chain) or another application that is communicatively linked to the first case of trust protocol and the second case of trust protocol.
[0075] In some embodiments, to access and obtain data from the second trust protocol case, the client node of the second trust protocol case can configure a network configuration, such as a node's IP address and port number ( for example, a consensus node) of the second trust protocol and the hash value of the genesis block of the second trust protocol case. The client node of the second trust case can connect to the node of the second trust case via the IP address and the port number of the node of the second trust case. The client node of the second case of the trust protocol can read, retrieve, download or otherwise obtain the data from the node of the second case of the trust protocol and verify that the data obtained comes from the second case of the trust protocol , for example, based on a Simple Payment Verification (SPV) protocol from the second case of the trust protocol to determine whether the data obtained points to the hash value of the genesis block of the second case of the trust protocol.
[0076] In (540), the client node of the first trust protocol case performs cross-chain transactions between the first trust protocol case and the second trust protocol case based on the domain name of the trust protocol of the second case of trust protocol. In some embodiments, the execution of cross-chain transactions between the first case of the trust protocol and the second case of
Petition 870190056811, dated 06/19/2019, p. 35/61
28/41 trust protocol includes sending, by the first trust protocol case, a cross-chain request that includes the trust protocol domain name from the second trust protocol case and a data request, to a relay which is communicatively linked to the first case of trust protocol and the second case of trust protocol. The relay receives the cross-chain request and reads the trust protocol domain name from the second trust protocol case, loads the corresponding trust protocol network configuration from the second trust case, uses the configuration to connect to refer to the second case of trust protocol. The relay can retrieve, download or otherwise receive the requested data from the second trust protocol case and send the requested data to the first trust protocol case.
[0077] Figure 6 illustrates an example of process (600) for authenticating a UBCDN of a trust protocol case, in accordance with realizations of the present invention. In some embodiments, the process example (600) can be run using one or more computer executable programs executed using one or more computing devices. For clarity of presentation, the following description generally describes the process (600) in the context of the other figures in this description. For example, the process example (600) that can be performed by the computing system (106) or (108) of the consortium trust protocol network (102), as described in relation to Figure 1, or the node (214 ) of the trust protocol network (212), as described in relation to Figure 2. However, it will be understood that the process (600) can be performed, for example, by any suitable system, environment, software and hardware, or a combination of systems, environments, software and hardware, as appropriate. In some embodiments, several process steps (600) can be performed in
Petition 870190056811, dated 06/19/2019, p. 36/61
29/41 parallel, in combination, in loops or in any order.
[0078] At (610), a computing system obtains a unified trust protocol (UBCDN) domain name message from a trust protocol case. In some embodiments, the computing system is a third party in the unified trust protocol network. In some embodiments, the computing system is a client node of a second trust protocol case other than the trust protocol case in the unified trust protocol network.
[0079] The UBCDN message can be, for example, the UBCDN message (440) as described in relation to Figure 4. The UBCDN message includes a UBCDN from the trust protocol case, a digital signature from a UBCDN owner at the UBCDN; and a UBCDN domain certificate.
[0080] The UBCDN of the trust case includes a domain name of the trust case of the trust case, where the domain name of the trust case is a unique identifier of the trust case in a network unified trust protocol including a number of trust protocol cases that are communicatively linked by two or more retransmitters. The trust protocol domain name includes a human-readable label and a trust protocol case string identifier corresponding exclusively to the trust protocol domain name.
[0081] In some embodiments, the UBCDN domain certificate includes the domain name of the trust protocol of the trust protocol case, the public key of the UBCDN owner, and a digital signature from the CA on the domain name of the protocol of trust trust of the trust protocol case and the public key of the UBCDN owner.
Petition 870190056811, dated 06/19/2019, p. 37/61
30/41 [0082] In (620), the computing system verifies that the UBCDN domain certificate is issued by a trusted certification authority (CA) using a public key from the certification authority. In some embodiments, the certification authority's digital signature is obtained by signing the certification authority on the domain name of the trust protocol of the trust protocol case and the public key of the UBCDN owner using a private key from the corresponding certification authority to the public key of the certification authority. In some embodiments, verifying that the UBCDN domain certificate is issued by a trusted certification authority using a public key from the certification authority, includes verifying that the UBCDN domain certificate is issued by the CA using the domain certificate, the signature CA digital ID and the CA public key.
[0083] In (630), in response to the verification that the UBCDN domain certificate is issued by the CA, the computing system checks whether the UBCDN is issued by the UBCDN owner using a public key of the UBCDN owner. In some embodiments, the UBCDN owner 's digital signature is obtained by the UBCDN owner by signing the UBCDN using a private key corresponding to the public key of the UBCDN owner. In some embodiments, verifying that the UBCDN of the trust protocol case is issued by the UBCDN owner using a public key from the UBCDN owner, including verifying that UBCDN is issued by the UBCDN owner using UBCDN, the digital signature of the UBCDN owner UBCDN, and the public key of the UBCDN owner. For example, the UBCDN owner can sign the UBCDN using the owner's private key and generate a digital signature, for example, according to a signed algorithm. The computing system as a recipient of the UBCDN message can determine whether the UBCDN is issued by the
Petition 870190056811, dated 06/19/2019, p. 38/61
31/41 owner of UBCDN using the UBCDN, the digital signature and the public key of the owner, for example, according to a signature verification algorithm.
[0084] In (640), in response to verifying that the UBCDN is issued by the UBCDN owner, the computing system performs cross-chain transactions between the trust protocol case and the second trust protocol case based on the name domain of the trust protocol of the trust protocol case, for example, according to the process example (500) as described in relation to Figure 5.
[0085] Figure 7 illustrates a process example (700) of a UBCDN owner of a trust protocol case (a UBCDN owner), according to embodiments of the present invention. In some embodiments, the process example (700) can be performed using one or more computer executable programs executed using one or more computing devices. For clarity of presentation, the following description generally describes the process (700) in the context of the other figures in this description. For example, the process example (700) can be performed by the UBCDN owner (430) as described in relation to Figure 4. However, it will be understood that the process (700) can be performed, for example, by any system, appropriate environment, software and hardware, or a combination of systems, environments, software and hardware, as appropriate. In some embodiments, several process steps (700) can be performed in parallel, in combination, in loops or in any order.
[0086] In (710), a UBCDN owner of a trust protocol case (a UBCDN owner, like the UBCDN owner (430)) obtains from a trusted certification authority (CA) (for example, the CA (410)), a domain certificate (for example, the domain certificate (420)) of the UBCDN of the trust protocol case. The UBCDN of
Petition 870190056811, dated 06/19/2019, p. 39/61
32/41 trust protocol case includes a trust protocol domain name and a corresponding trust protocol string identifier exclusively for the trust protocol domain name. The UBCDN can be, for example, the UBCDN (300), as described in Figure 3. The domain name of the trust protocol is a unique identifier of the trust protocol case in a unified trust network, including a number of trust protocol cases that are communicatively linked by two or more relays. In some embodiments, the domain name of the trust protocol includes a human-readable label. The string identifier indicates a trust protocol network configuration of the trust case.
[0087] The UBCDN domain certificate includes the domain name of the trust protocol of the trust protocol case, a public key of the UBCDN owner, and a digital signature from the CA on the domain name of the trust protocol of the case of trust protocol and the public key of the UBCDN owner. The UBCDN domain certificate can be, for example, the domain certificate (420), as described in relation to Figure 4 [0088] In (720), the UBCDN owner signs the UBCDN of the trust protocol case, for example example, using the private key of the UBCDN owner, for example, according to a signature algorithm.
[0089] In (730), the UBCDN owner publishes a UBCDN message (for example, the UBCDN message (440a or 440b)) from the trust protocol case. The UBCDN message includes the UBCDN of the trust protocol case, a digital signature of the UBCDN owner resulting from the UBCDN signature, and the domain certificate of the UBCDN.
Petition 870190056811, dated 06/19/2019, p. 40/61
33/41
UBCDN.
[0090] In (740), the UBCDN owner identifies an updated chain identifier of the trust case indicating an updated trust protocol network configuration of the trust case. For example, a change or update to the trust protocol network configuration of the trust case may occur (for example, due to a system update or a change in the physical location of one or more computing devices, such as the genesis). The chain identifier can be updated to reflect the update of the trust protocol network configuration of the trust case (for example, by updating the hash value of the trust block genesis block). For example, as illustrated in Figure 4, for the same domain name as the trust protocol (442a) “Example chain,” the chain identifier (444a) “Chain identifier VO” has been updated to a chain identifier (454a ) “Chain Identifier V1”, to reflect the change in the trust protocol network configuration of the trust case.
[0091] In (750), the UBCDN owner signs an updated UBCDN of the trust protocol case, for example, using the private key of the UBCDN owner. The updated UBCDN for the trust case includes the domain name of the trust case for the trust case and the updated chain identifier for the trust case. For example, as illustrated in Figure 4, the updated UBCDN of the trust protocol case includes the same domain name as the trust protocol (442a) "Example chain" and the updated chain identifier (454a) "Chain Identifier V1" .
[0092] In (760), the UBCDN owner publishes an updated UBCDN message from the trust protocol case. THE
Petition 870190056811, dated 06/19/2019, p. 41/61
34/41 updated UBCDN message includes the updated UBCDN from the trust protocol case, an updated digital signature from the UBCDN owner resulting from the updated UBCDN signature, and the UBCDN domain certificate. For example, as shown in Figure 4, the UBCDN owner (430a) issues an updated UBCDN message (450a) that includes the trust protocol domain name (442a) “Example chain.” And the updated chain identifier ( 454a) “V1 chain identifier”, a digital signature (456a) and a domain certificate (458a). The domain certificate (458a) can be the domain certificate (420a) issued by the CA (410) and received by the UBCDN owner (430a) from the CA (410). The updated digital signature (456a) may result from the signature by the UBCDN owner (430a) of the updated UBCDN (that is, the domain name of the trust protocol (442a) “Example chain” and the updated chain identifier (454a) “Chain Identifier V0” in this case) using the private key of the UBCDN owner (430a).
[0093] Figure 8 illustrates a process example (800) of a relay for cross-chain interactions in a unified trust protocol network, in accordance with embodiments of the present invention. The unified trust protocol network includes multiple cases of trust protocol that are communicatively linked by two or more relays. In some embodiments, the process example (800) can be performed using one or more computer executable programs executed using one or more computing devices. For clarity of presentation, the following description generally describes the process (800) in the context of the other figures in this description. For example, the process example (800), which can be performed by the relay on a unified trust protocol network. However, it will be understood that the process (800) can be performed, for example, by any system, environment,
Petition 870190056811, dated 06/19/2019, p. 42/61
35/41 appropriate software and hardware, or a combination of systems, environments, software and hardware, as appropriate. For example, the relay can be a node (for example, the computing system (106) or (108) as described in relation to Figure 1 or the node (214) as described in relation to Figure 2), a protocol case trust (for example, a trust protocol network (102) or the trust protocol network (212)), or another computer system in the unified trust protocol network. In some embodiments, several process steps (800) can be performed in parallel, in combination, in loops or in any order.
[0094] In (810), the relay, which is communicatively linked to a first trust protocol case and a second trust protocol case in the unified trust network, identifies a domain name of the trust protocol confidence of a first case of trust protocol. The trust protocol domain name of the first trust case is a unique identifier of the first trust case and corresponds exclusively to a chain identifier of the first trust case in the unified trust network. In some embodiments, the trust protocol domain name of the first trust protocol case includes a first human-readable label.
[0095] In (820), the relay identifies a domain name of the trust protocol of the second case of trust protocol. The trust protocol domain name of the second trust protocol case is a unique identifier for the second trust protocol case and corresponds exclusively to a chain identifier of the second trust protocol case in the unified trust network. In some embodiments, the trust protocol domain name of the second trust protocol case includes a second label
Petition 870190056811, dated 06/19/2019, p. 43/61
36/41 readable by humans.
[0096] In some embodiments, a relay may designate a local identifier for each trust protocol that is communicatively linked. The local identifier is designated for use by the relay and cannot be used by other nodes or relays on the unified trust protocol network. In some embodiments, identifying a trust protocol domain name from the first trust case includes using the trust protocol domain name from the first trust case as the local identifier of the first trust case or replacing the local identifier of the first trust case with the domain name of the trust protocol of the first case of trust. Likewise, identifying a trust protocol domain name from the second trust protocol case includes using the trust protocol domain name from the second trust protocol case as the local identifier of the second trust protocol case. trust or the replacement of the unique identifier of the second trust protocol case with the domain name of the trust protocol of the second trust case.
[0097] In (830), the relay receives an access request to access the second case of the trust protocol. The access request includes the domain name of the trust protocol of the second case of trust protocol.
[0098] In (840), the relay identifies the chain identifier of the second trust protocol case based on the trust protocol domain name of the second trust protocol case. The chain identifier of the second case of trust indicates a trust protocol network configuration of the second case of trust
Petition 870190056811, dated 06/19/2019, p. 44/61
37/41 trust protocol.
[0099] In some embodiments, the identification of the chain identifier of the second trust protocol case based on the domain name of the trust protocol of the second trust protocol case includes the identification of the chain identifier of the second trust protocol case trust, according to the query information stored locally on the relay based on the domain name of the trust protocol.
[00100] In some embodiments, identifying the chain identifier of the second trust protocol case based on the domain name of the trust protocol of the second trust protocol case includes the identification of the chain identifier of the second trust protocol case based on the trust protocol domain name of the second trust protocol case of a remote unified trust domain name server.
[00101] In (850), the relay provides access to the second trust protocol case for the first trust protocol case based on the trust protocol network configuration indicated by the chain identifier of the second trust protocol case. In some embodiments, the relay provides access to the second trust protocol case for the first trust protocol case according to a communication protocol designed for cross-chain interactions. For example, the relay can load the trust protocol network configuration indicated by the chain identifier of the second trust protocol case corresponding to the trust protocol domain name of the second trust protocol case. The relay uses the trust protocol network configuration to connect to the second trust protocol case, obtains a result
Petition 870190056811, dated 06/19/2019, p. 45/61
38/41 requested by the first trust protocol case from the second trust protocol case and returns the result requested by the first trust protocol case to the first trust protocol case, for example, according to the examples of techniques described in relation to to Figure 5.
[00102] In some embodiments, provide, by the relay, access to the second case of trust protocol for the first case of trust protocol based on the network configuration of trust protocol indicated by the chain identifier of the second case of trust protocol includes providing, by the retransmitter, access to the second trust protocol case to the first trust protocol case via a second relay.
[00103] In some embodiments, the trust protocol network configuration indicated by the chain identifier of the second trust protocol case is identified by the second relay based on the same chain identifier as the second trust protocol case. In some embodiments, the second trust protocol case is accessed by the second relay based on the trust protocol network configuration indicated by the chain identifier of the second trust protocol case. In other words, the first trust protocol case can use the same domain name as the second trust protocol case, regardless of which relay it is, or how many relays are used to interact with the second trust protocol case.
[00104] In some embodiments, the trust protocol network configuration indicated by the chain identifier of the second trust protocol case is identified by the second relay according to the search information stored locally in the second relay based on the same chain identifier of the second protocol case
Petition 870190056811, dated 06/19/2019, p. 46/61
39/41 confidence.
[00105] In some embodiments, the trust protocol network configuration indicated by the chain identifier of the second trust protocol case is identified by the second relay based on the trust protocol domain name of the second trust protocol case of a unified domain name of remote trust protocol server.
[00106] The described features can be implemented in digital electronic circuits or in computer hardware, firmware, software or in combinations thereof. The apparatus can be implemented in a computer program product tangibly incorporated in an information vehicle (for example, in a machine-readable storage device) for realization by a programmable processor; and the steps of the method can be performed by a programmable processor executing an instruction program to execute functions of the described achievements operating on the input data and generating the output. The described features can be advantageously implemented in one or more computer programs that are executable in a programmable system including at least one programmable processor coupled to receive data and instructions from, and to transmit data and instructions to, a data storage system, at least one input device and at least one output device. A computer program is a set of instructions that can be used, directly or indirectly, on a computer to perform a certain activity or obtain a certain result. A computer program can be written in any form of programming language, including compiled or interpreted languages, and can be implemented in any way, including as an independent program or as a module, component, subroutine or other unit suitable for
Petition 870190056811, dated 06/19/2019, p. 47/61
40/41 use in a computing environment.
[00107] Processors suitable for carrying out an instruction program include, for example, microprocessors for general and special use, and the single processor or one of multiple processors of any type of computer. Generally, a processor will receive instructions and data from either a read-only memory or a random access memory or both. The elements of a computer can include a processor to execute instructions and one or more memories to store instructions and data. Generally, a computer can also include, or is operationally coupled to communicate with, one or more mass storage devices for storing data files; such devices include magnetic disks, such as internal hard drives and removable disks; magneto-optical discs; and optical discs. Storage devices suitable for tangibly incorporating computer program instructions and data include all forms of non-volatile memory, including, for example, semiconductor memory devices, such as EPROM, EEPROM and flash memory devices; magnetic disks, such as internal hard drives and removable disks; magneto-optical discs; and CD-ROM and DVD-ROM discs. The processor and memory can be supplemented by, or incorporated into, application-specific integrated circuits (ASICs).
[00108] To provide interaction with a user, the features can be implemented on a computer with a display device, such as a cathode ray tube (CRT) or liquid crystal display (LCD) monitor to display information to the user and a keyboard and a pointing device, such as a mouse or a trackball, through which the user can provide input to the computer.
[00109] The features can be implemented in a
Petition 870190056811, dated 06/19/2019, p. 48/61
41/41 computer system that includes an administrative (back-end) component, such as a data server, or that includes a middleware component, such as an application server or an Internet server, or that includes a user interface (front-end), such as a client computer with a graphical user interface or an Internet browser, or any combination of them. The system components can be connected by any form or means of digital data communication, such as a communication network. Examples of communication networks include, for example, a local area network (LAN), a wide area network (WAN) and the computers and networks that make up the Internet.
[00110] The computer system can include clients and servers. A client and a server are usually remote with each other and usually interact over a network, as described. The client and server relationship arises because of computer programs running on the respective computers and having a client-server relationship between them.
[00111] In addition, the logical flows represented in the figures do not require the particular order shown, or sequential order, to achieve the desired results. In addition, other steps can be provided, or steps can be eliminated, from the described flows, and other components can be added or removed from the described systems. Therefore, other achievements are within the scope of the following claims.
[00112] A number of embodiments of the present invention have been described. However, it will be understood that various modifications can be made without departing from the spirit and scope of the present invention. Therefore, other achievements are within the scope of the following claims.
权利要求:
Claims (10)
[1]
Claims
1. METHOD (500) IMPLEMENTED BY COMPUTER, characterized by the fact that it comprises the steps of:
obtain (510), by a client node from a first trust protocol case (blockchain), a trust protocol domain name (310) from a different second trust protocol case, where:
the trust protocol domain name (310) is a unique identifier for the second trust protocol case in a unified trust protocol network comprising a plurality of trust protocol cases that are communicatively linked by two or more relays ;
the trust protocol domain name (310) comprises a human-readable label; and the trust protocol domain name (310) corresponds to a string identifier (320) of the second trust protocol case;
identifying (520) the chain identifier (320) of the second trust protocol case based on the trust protocol domain name (310) of the second trust protocol case, where the chain identifier (320) of the second trust protocol case indicates a trust protocol network configuration of the second trust protocol case; and accessing (530), through the client node, the second trust protocol case based on the trust protocol network configuration indicated by the chain identifier (320) of the second trust protocol case.
[2]
2. METHOD (500), according to claim 1, characterized by the fact that it also comprises the execution (540) of cross-chain transactions between the first case of trust protocol
Petition 870190056811, dated 06/19/2019, p. 50/61
2/3 and the second case of trust protocol based on the domain name trust protocol (310) of the second case of trust protocol.
[3]
3. METHOD (500), according to claim 1, characterized by the fact that the human-readable label comprises a text-based label.
[4]
4. METHOD (500), according to claim 1, characterized by the fact that the chain identifier (320) of the second case of trust protocol comprises a hash value of a block of genesis of the second case of trust protocol and a network identifier for the second trust protocol case.
[5]
5. METHOD (500), according to claim 1, characterized by the fact that each of the plurality of trust protocol cases in the unified trust protocol network has only one trust protocol domain name (310) that uniquely identifies each of the plurality of trust protocol cases.
[6]
6. METHOD (500), according to claim 1, characterized by the fact that identifying (520) the chain identifier (320) of the second trust protocol case based on the domain name of the trust protocol (310) it comprises identifying the chain identifier (320) of the second trust protocol case according to query information stored locally on the client node based on the trust protocol domain name (310).
[7]
7. METHOD (500), according to claim 1, characterized by the fact that the identification of the chain identifier (320) of the second case of trust protocol based on the domain name of the trust protocol (310) comprises:
send a request that includes the protocol domain name to a unified trust domain name server
Petition 870190056811, dated 06/19/2019, p. 51/61
3/3 confidence (310) to identify the chain identifier (320) of the second trust protocol case; and receiving, from the unified trust domain name server, a response that includes the string identifier (320) of the second trust protocol case.
[8]
8. METHOD (500), according to claim 1, characterized by the fact that the first case of trust protocol and the second case of trust protocol are implemented based on different trust protocol platforms.
[9]
9. LEGIBLE MEDIA BY COMPUTER, characterized by the fact that it is coupled to one or more processors and with instructions stored in it that, when executed by one or more processors, cause one or more processors to perform operations according to the method, as defined in any one of claims 1 to 8.
[10]
10. SYSTEM FOR IMPLEMENTING A METHOD, characterized by the fact that it includes:
a computing device; and a computer-readable storage device coupled to the computing device and having instructions stored on it that, when executed by the computing device, cause the computing device to perform operations according to the method, as defined in any one of claims 1 to 8.
类似技术:
公开号 | 公开日 | 专利标题
BR112019007991A2|2019-09-10|computer-implemented method of a relay for cross-chain interactions in a unified trusted protocol network, computer readable, non-transient storage media, and system
BR112019008025A2|2019-09-10|computer-implemented method, non-transient computer-readable storage medium, and system
BR112019008000A2|2019-09-10|computer-implemented method for authenticating a domain name, storage medium, and system
同族专利:
公开号 | 公开日
RU2707938C1|2019-12-02|
JP6688939B2|2020-04-28|
US20190253252A1|2019-08-15|
EP3549329A4|2020-01-15|
AU2018348320B2|2020-01-16|
EP3549329A2|2019-10-09|
CA3041163C|2020-10-06|
WO2019072271A2|2019-04-18|
JP2020501403A|2020-01-16|
MX2019004663A|2019-08-21|
CA3041163A1|2019-04-18|
EP3549329B1|2021-06-23|
PH12019500880A1|2019-11-25|
CN110199307A|2019-09-03|
SG11201903526PA|2019-05-30|
KR102112459B1|2020-05-19|
WO2019072271A3|2019-09-12|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题

US6502135B1|1998-10-30|2002-12-31|Science Applications International Corporation|Agile network protocol for secure communications with assured system availability|
US7418504B2|1998-10-30|2008-08-26|Virnetx, Inc.|Agile network protocol for secure communications using secure domain names|
KR101029364B1|2008-06-24|2011-04-13|주식회사 케이티|Mobile terminal unit for providing integrated web browsing service, mobile communication system, local area wireless communication system and method thereof|
US10396992B2|2014-06-30|2019-08-27|Vescel, Llc|Authentication of a user and/or a device through parallel synchronous update of immutable hash histories|
JP2018516026A|2015-03-20|2018-06-14|リヴェッツ・コーポレーションRivetz Corp.|Automatic device integrity authentication using blockchain|
US10963881B2|2015-05-21|2021-03-30|Mastercard International Incorporated|Method and system for fraud control of blockchain-based transactions|
US9870562B2|2015-05-21|2018-01-16|Mastercard International Incorporated|Method and system for integration of market exchange and issuer processing for blockchain-based transactions|
US10084794B2|2015-06-02|2018-09-25|ALTR Solutions, Inc.|Centralized access management of web-based or native applications|
US10303887B2|2015-09-14|2019-05-28|T0.Com, Inc.|Data verification methods and systems using a hash tree, such as a time-centric merkle hash tree|
EP3193299A1|2016-01-15|2017-07-19|Accenture Global Services Limited|Device, method and system for autonomous selection of a commodity supplier through a blockchain distributed database|
US20170236123A1|2016-02-16|2017-08-17|Blockstack Inc.|Decentralized processing of global naming systems|
EP3420514A1|2016-02-23|2019-01-02|Nchain Holdings Limited|A method and system for securing computer software using a distributed hash table and a blockchain|
WO2017145049A1|2016-02-23|2017-08-31|nChain Holdings Limited|Consolidated blockchain-based data transfer control method and system|
US9855785B1|2016-04-04|2018-01-02|Uipco, Llc|Digitally encoded seal for document verification|
US20170302663A1|2016-04-14|2017-10-19|Cisco Technology, Inc.|BLOCK CHAIN BASED IoT DEVICE IDENTITY VERIFICATION AND ANOMALY DETECTION|
US11223598B2|2016-05-03|2022-01-11|Nokia Of America Corporation|Internet security|
WO2017218983A1|2016-06-16|2017-12-21|The Bank Of New York Mellon|Distributed, centrally authored block chain network|
EP3476102B1|2016-06-24|2020-06-17|Innogy Innovation Gmbh|Augmented reality system|
WO2018006945A1|2016-07-05|2018-01-11|Rwe International Se|Observation system|
US10860735B2|2016-08-05|2020-12-08|Sensoriant, Inc.|Database system for protecting and securing stored data using a privacy switch|
US11258587B2|2016-10-20|2022-02-22|Sony Corporation|Blockchain-based digital rights management|
WO2018103850A1|2016-12-08|2018-06-14|Telefonaktiebolaget Lm Ericsson |Method and apparatus for creating a finite blockchain|
US10686590B2|2016-12-23|2020-06-16|Joseph Santilli|Methods and systems for crowdsourcing an outcome to an issue|
US9992022B1|2017-02-06|2018-06-05|Northern Trust Corporation|Systems and methods for digital identity management and permission controls within distributed network nodes|
US11196573B2|2017-03-06|2021-12-07|Nokia Technologies Oy|Secure de-centralized domain name system|
AU2018230763A1|2017-03-08|2019-10-31|Ip Oversight Corporation|System and method for creating commodity asset-secured tokens from reserves|
US10102265B1|2017-04-12|2018-10-16|Vijay K. Madisetti|Method and system for tuning blockchain scalability for fast and low-cost payment and transaction processing|
US10412045B1|2017-04-17|2019-09-10|Verisign, Inc.|Domain name registration reservation through the use of encoding domain names for pools|
US20190166085A1|2017-04-19|2019-05-30|Peking University Shenzhen Graduate School|Blockchain-based domain name resolution system|
US10320574B2|2017-05-05|2019-06-11|International Business Machines Corporation|Blockchain for open scientific research|
US20180330386A1|2017-05-09|2018-11-15|Heonsu Kim|Proof of ownership device and methods for using the same|
US10984134B2|2017-07-14|2021-04-20|Microsoft Technology Licensing, Llc|Blockchain system for leveraging member nodes to achieve consensus|
CN107566337B|2017-07-26|2019-08-09|阿里巴巴集团控股有限公司|Communication means and device between a kind of block chain node|
US20190066068A1|2017-08-22|2019-02-28|Sap Se|Transaction Platform Providing Unified Interaction with Multiple Heterogeneous Blockchains|
US20190073670A1|2017-09-05|2019-03-07|PeerNova, Inc.|Capturing Related Events in Cryptographically Linked Records|
US10938567B2|2017-09-12|2021-03-02|Kadena Llc|Parallel-chain architecture for blockchain systems|
US20190116038A1|2017-10-12|2019-04-18|Rivetz Corp.|Attestation With Embedded Encryption Keys|
US11121870B2|2017-10-12|2021-09-14|Mastercard International Incorporated|Method and system for interacting public and private blockchains with controlled participation|
CN108347486A|2018-02-12|2018-07-31|众安信息技术服务有限公司|Across chain communication means, device and system based on block chain|
CN108712257B|2018-04-03|2020-04-17|阿里巴巴集团控股有限公司|Cross-block-chain authentication method and device and electronic equipment|
CN108683630B|2018-04-03|2020-05-29|阿里巴巴集团控股有限公司|Cross-block-chain authentication method and device and electronic equipment|
US11132707B2|2018-04-25|2021-09-28|At&T Intellectual Property I, L.P.|Blockchain solution for an automated advertising marketplace|
CN108665365B|2018-05-16|2021-07-13|四川大学|Mixed block chain architecture system, processing method and processing system|
US11176571B2|2018-09-06|2021-11-16|MadHive, Inc.|Methods and system for serving targeted advertisements to a consumer device|
US11204751B2|2018-09-07|2021-12-21|International Business Machines Corporation|Mitigating incompatibilities due to code updates in a system containing multiple networked electronic control units|
US10404467B1|2018-09-09|2019-09-03|Tyson York Winarski|Blockchain digest augmention of media files including group-of-pictures video streams for MXF files|
US20190050854A1|2018-09-28|2019-02-14|Intel Corporation|Blockchain-based digital data exchange|
US20200118068A1|2018-10-10|2020-04-16|QuestaWeb, Inc.|Hierarchical Blockchain Architecture for Global Trade Management|
US11093479B2|2018-11-06|2021-08-17|Workday, Inc.|Ledger data generation and storage for trusted recall of professional profiles|AU2018347192B2|2018-11-16|2020-06-25|Advanced New Technologies Co., Ltd.|A domain name management scheme for cross-chain interactions in blockchain systems|
CA3041208C|2018-11-16|2021-05-04|Alibaba Group Holding Limited|Cross-chain interactions using a domain name scheme in blockchain systems|
CN111899104A|2018-11-27|2020-11-06|创新先进技术有限公司|Service execution method and device|
WO2019120336A2|2019-04-19|2019-06-27|Alibaba Group Holding Limited|Methods and devices for establishing communication between blockchain networks|
US10880260B1|2019-06-19|2020-12-29|Etherweb Technologies LLC|Distributed domain name resolution and method for use of same|
CN110719322B|2019-09-25|2021-06-22|东北大学|Data cross storage method based on block chain cross-chain|
CN110933173A|2019-12-03|2020-03-27|上海墨珩网络科技有限公司|Block chain technology-based networking method and device|
CN111163165A|2019-12-28|2020-05-15|北京工业大学|Voting consensus method based on Fabric alliance chain|
CN111294339B|2020-01-16|2021-10-15|北京航空航天大学|Homogeneous alliance chain cross-chain method and device based on Fabric architecture|
CN111190974B|2020-04-10|2021-01-26|支付宝信息技术有限公司|Method, device and equipment for forwarding and acquiring verifiable statement|
CN112380294B|2020-12-31|2021-04-06|支付宝信息技术有限公司|Block chain cross-chain access method and device|
CN113923227A|2021-06-02|2022-01-11|支付宝信息技术有限公司|Block chain message distribution method and device|
法律状态:
2021-04-06| B25A| Requested transfer of rights approved|Owner name: ADVANTAGEOUS NEW TECHNOLOGIES CO., LTD. (KY) |
2021-04-27| B25A| Requested transfer of rights approved|Owner name: ADVANCED NEW TECHNOLOGIES CO., LTD. (KY) |
2021-10-05| B350| Update of information on the portal [chapter 15.35 patent gazette]|
2021-12-21| B09A| Decision: intention to grant [chapter 9.1 patent gazette]|
2021-12-21| B15K| Others concerning applications: alteration of classification|Free format text: A CLASSIFICACAO ANTERIOR ERA: H04L 29/08 Ipc: H04L 9/32 (2006.01), G06F 21/64 (2013.01) |
优先权:
申请号 | 申请日 | 专利标题
PCT/CN2018/115918|WO2019072271A2|2018-11-16|2018-11-16|A domain name scheme for cross-chain interactions in blockchain systems|
[返回顶部]