![]() method and apparatus for processing transaction requests
专利摘要:
it is a method for processing a transaction request, implementable by a first transaction node that can comprise: acquiring transaction data from a target transaction, in which the first transaction node participates in the target transaction; determine, according to the transaction data, a transaction summary after a plurality of transaction nodes each sign a data summary of the transaction data, where the transaction nodes comprise at least the first transaction node and o one or more second transaction nodes; generate a transaction request that comprises the transaction summary; and broadcast the transaction request to one or more consensus nodes, causing the consensus nodes to each save the transaction summary in the transaction request in a block chain after the transaction summary passes the consensus check, where consensus nodes are block chain nodes, where transaction nodes and consensus nodes are block chain nodes in a block chain network. 公开号:BR112019020197A2 申请号:R112019020197 申请日:2018-03-21 公开日:2020-04-22 发明作者:Li Ning 申请人:Alibaba Group Holding Ltd; IPC主号:
专利说明:
: ·, Í 01: Acquire transaction data from a target transaction SI 02: Determine a transaction summary according to the transaction data, after a plurality of the transaction nodes, each uni, sign a data set of the transaction data SI 03: Generate a transaction request that comprises the transaction data and the transaction summary I S104: Disseminate the transaction request to '.nn or other consensus nodes, farm that is consensus nodes, each tiir, save the transaction summary in the transaction request in a block chain after the transaction test passes verification consensus 1/29 “METHOD AND APPARATUS FOR PROCESSING TRANSACTION REQUESTS” CROSSED REFERENCE TO RELATED APPLICATIONS [001] This application is based on and claims the priority of patent application No. CN 62 / 201710190507,1, filed on March 28, 2017, the entire content of which is incorporated into this document as a reference . FIELD OF TECHNIQUES [002] The present application refers to the field of information technologies and, in particular, to methods and systems for processing transaction requests. BACKGROUND [003] The blockchain network, also known as the distributed reason network, is characterized by decentralization, openness and transparency. A block chain network comprises block chain nodes, each with the ability to initiate a transaction request and participate in consensus verification on a transaction request. All block chain nodes are synchronized with the block chain. [004] An existing method for processing a transaction request is as follows: in relation to a transaction, a block chain node participating in that transaction broadcasts a transaction request for that transaction to all consensus nodes ( block chains responsible for consensus verification) in the block chain network, and the transaction request comprises transaction data for that transaction. The transaction data is saved in the block chain after the transaction data has passed the consensus check by all consensus nodes. [005] However, since all consensus nodes can synchronize with the block chain to obtain transaction data for each transaction stored in the block chain, this easily leads to leakage. Petition 870190096492, of 9/26/2019, p. 10/76 2/29 privacy of some block chain nodes that participate in transactions and that are included in the transaction data. In addition, even if the transaction data stored in a block chain is encrypted, there is still a risk that the encrypted transaction data may be decrypted. [006] Therefore, there is a need to solve the problem of the technique of how to design a method to verify a transaction request, so that there is no risk of breach of privacy of a block chain node participating in the transaction. SUMMARY [007] The modalities of this application provide methods and systems for processing transaction requests to address the privacy breach of the existing method for processing transaction requests. [008] According to one aspect, a method for processing a transaction request implementable by a first transaction node may comprise: acquiring transaction data from a target transaction, in which the first transaction node participates in the target transaction; determine, according to the transaction data, a transaction summary after a plurality of transaction nodes each sign a data summary of the transaction data, where the transaction nodes comprise at least the first transaction node and o one or more second transaction nodes; generate a transaction request that comprises the transaction summary; and broadcast the transaction request to one or more consensus nodes, causing the consensus nodes to each save the transaction summary in the transaction request in a block chain after the transaction summary has passed the consensus check, being that consensus nodes are block chain nodes, where transaction nodes and consensus nodes are block chain nodes of a block chain network. The one or Petition 870190096492, of 9/26/2019, p. 11/76 3/29 more transaction nodes may or may not comprise the first transaction node. The consensus nodes and the one or more transaction nodes can overlap or not. [009] In another aspect, an apparatus for processing a transaction request may comprise: an acquisition module configured to acquire transaction data from a target transaction; a determination module configured to determine, according to the transaction data, a transaction summary, the transaction summary being obtained after all transaction nodes have signed a data summary of the transaction data, with the transaction are block chain nodes that participate in the target transaction, and the device is one of the transaction nodes; a generation module configured to generate a transaction request that comprises the transaction data and the transaction summary; and a broadcast module configured to broadcast the transaction request to all consensus nodes, so that all consensus nodes save the transaction summary in the transaction request in a block chain after the transaction summary passes the verification of consensus. [010] According to another aspect, a non-transitory computer-readable storage medium can store instructions that, when executed by a processor of a first transaction node, cause the processor to carry out a method to process a transaction request. The method may comprise: acquiring transaction data from a target transaction, in which the first transaction node participates in the target transaction; determine, according to the transaction data, a transaction summary after a plurality of transaction nodes each sign a data summary of the transaction data, where the transaction nodes comprise at least the first transaction node and o one or more second transaction nodes; generate a transaction request that comprises the transaction summary; and broadcast the transaction request to a Petition 870190096492, of 9/26/2019, p. 12/76 4/29 or more consensus nodes, causing the consensus nodes to each save the transaction summary in the transaction request in a block chain after the transaction summary has passed consensus verification, with the consensus nodes they are block chain nodes, where the transaction nodes and consensus nodes are block chain nodes of a block chain network. [011] According to another aspect, a device, deployable as a first transaction node, can comprise a processor and a non-transitory computer-readable storage medium that stores instructions that, when executed by the processor, cause the device to perform a method for processing a transaction request. The method may comprise: acquiring transaction data from a target transaction, in which the first transaction node participates in the target transaction; determine, according to the transaction data, a transaction summary after a plurality of transaction nodes each sign a data summary of the transaction data, where the transaction nodes comprise at least the first transaction node and o one or more second transaction nodes; generate a transaction request that comprises the transaction summary; and broadcast the transaction request to one or more consensus nodes, causing the consensus nodes to each save the transaction summary in the transaction request in a block chain after the transaction summary passes the consensus check, where the consensus nodes are block chain nodes, where the transaction nodes and the consensus nodes are block chain nodes of a block chain network. [012] According to another aspect, a method for processing a transaction request implementable by a first transaction node may comprise: acquiring transaction data from a target transaction, the first transaction node being a block chain node participating in the target transaction; generate a summary of data based on at least the transaction data; Petition 870190096492, of 9/26/2019, p. 13/76 5/29 transmitting the summary data for one or more second transaction nodes, wherein a plurality of transaction nodes comprises at least the first transaction node and the second transaction nodes; obtain a transaction summary based on at least each of the transaction nodes that subscribe to the data summary; generate a transaction request that comprises the transaction summary; and broadcast the transaction request to one or more consensus nodes, causing the one or more consensus nodes to each check the transaction summary in the transaction request, where the transaction nodes and consensus nodes are block chain nodes of a block chain network. [013] In some embodiments, the first transaction node and the one or more second transaction nodes may form all transaction nodes that participate in the target transaction, and the transaction data may not be transmitted to the consensus nodes and not saved in a chain of blocks associated with the target transaction. [014] In some embodiments, the transaction data of the target transaction may comprise at least one of a subject of a transaction associated with the target transaction, detailed information on the subject, an account address of an individual participating in the target transaction, or information ID number of the individual participating in the target transaction. [015] In some modalities, signing the data summary may comprise digitally granting a data summary check, and obtaining the transaction summary based on at least each of the first transaction node and the one or more second The transaction that signs and returns the data summary can comprise obtaining the transaction summary based on at least each of the first transaction nodes and the one or more second transaction nodes, each of which signs the data summary on a predefined order [016] According to some modalities of the present disclosure, a transaction request broadcast by a transaction node to all Petition 870190096492, of 9/26/2019, p. 14/76 6/29 consensus comprises a transaction summary, but the transaction request does not comprise transaction data. As a result, when the transaction request passes consensus verification, consensus nodes will not save transaction data in a block chain, and there will be no risk of privacy leakage from the transaction nodes. At the same time, the transaction summary is obtained after all transaction nodes have signed the data summary of the transaction data. As a result, even when there is no transaction data stored in the block chain, the authenticity of the transaction request can still be proven through the data summary recognized by all transaction nodes, so that none of the transaction nodes can deny the target transaction that corresponds to the transaction request. BRIEF DESCRIPTION OF THE DRAWINGS [017] To more clearly describe the technical solutions in the modalities of the present disclosure, the accompanying drawings that illustrate the modalities of the prior art will be briefly described as follows. Of course, the drawings attached in the description below are merely exemplary. For a person skilled in the art, other designs can additionally be obtained according to those designs without inventive effort. [018] Figure 1 is a flow chart of a method for processing a transaction request, according to some of the modalities of the present disclosure. [019] Figure 2a is a schematic diagram of nodes in a typical block chain network, according to some modalities of the present disclosure. [020] Figure 2b is a schematic diagram of nodes in a special block chain network, according to some modalities of the present disclosure. Petition 870190096492, of 9/26/2019, p. 15/76 7/29 [021] Figures 3a to 3c are schematic diagrams of a method for processing a transaction request, according to some modalities of the present disclosure. [022] Figure 4 is a schematic diagram of an apparatus for processing a transaction request, according to some modalities of the present disclosure. DETAILED DESCRIPTION [023] The modalities of the present disclosure provide methods and apparatus for processing a transaction request. [024] To enable a person skilled in the art to better understand the technical solutions in the present disclosure, the technical solutions in the present disclosure will be clearly and completely described with reference to the accompanying drawings in the modalities of this application. Evidently, the modalities described are merely some, rather than all, of the modalities of the present revelation. All other modalities obtained by a person skilled in the art without inventive effort and based on the modalities of the present disclosure should be covered by the present disclosure. [025] Figure 1 is a flow chart of a method for processing a transaction request, according to some of the modalities of the present disclosure. The method can be implemented by a plurality of transaction nodes (or simply “nodes”). A person of ordinary skill in the art could observe that the transaction node can refer to a computing device (for example, a computer, a server, etc.). When many computing devices connect to each other (for example, through a local network or the Internet), they can form a network of connected nodes. The method can comprise the following steps: [026] S101: acquire transaction data from a target transaction. Petition 870190096492, of 9/26/2019, p. 16/76 8/29 [027] In one embodiment of the present disclosure, a target transaction may be one of a variety of transactions that a chain of blocks may be involved in. The transaction data of the target transaction can comprise at least one transaction subject associated with the target transaction, detailed subject information, an account address of an individual participating in the target transaction, or ID information of the individual participating in the target transaction , etc. Any data associated with the target transaction could be the transaction data. The transaction data may comprise privacy information from block chain nodes participating in the target transaction. [028] In one embodiment of the present disclosure, a transaction node is a block chain node that participates in the target transaction, and the first transaction node and the second transaction node below are both block chain nodes that participate in the target transaction. target transaction. [029] In one example, in relation to a target transaction, a transaction node needs to be assigned from all transaction nodes participating in the target transaction to broadcast a transaction request to the target transaction to all consensus nodes for consensus nodes to perform consensus verification. The transaction node that broadcasts a transaction request can be designated through consultation by all transaction nodes, or it can be arbitrarily assigned. The first transaction node in the present disclosure is a transaction node in charge of broadcasting the transaction request to all consensus nodes, and the second transaction node below is a different transaction node than the first transaction node. [030] At the same time, there is at least one transaction node that initiates the target transaction among all transaction nodes participating in the target transaction. The transaction node that initiates the target transaction determines transaction data from the target transaction and generates a data summary of the transaction data, according to Petition 870190096492, of 9/26/2019, p. 17/76 9/29 the transaction data. The first transaction node can integrate the functions of initiating the target transaction and broadcast the transaction request (either be a transaction node that initiates the target transaction or a transaction node that broadcasts the transaction request), or be only responsible for broadcasting the transaction request (being a transaction node that only broadcasts the transaction request, while the second transaction node initiates the target transaction). [031] In a typical block chain network, in addition, each block chain node can act both as a transaction node to participate in the target transaction, and as a consensus node to participate simultaneously in the consensus verification in the request for transaction. Figure 2a is a schematic diagram of nodes in a typical block chain network, according to some modalities of the present disclosure. As shown in Figure 2a, the transaction nodes that participate in the target transaction are node 1 and node 2 that are shaded, while node 3, node 4 and node 5 that are not shaded do not participate in the target transaction. Node 1, node 2, node 3, node 4 and node 5 act as consensus nodes to participate in consensus verification. [032] In some special block chain networks (for example, a block chain network that includes a consensus subnet and a non-consensus subnet), although each block chain node can act as a transaction node to participate in the target transaction, not every block chain node can act as a consensus node to participate in consensus verification. Figure 2b is a schematic diagram of nodes in a special block chain network. As shown in Figure 2b, the block chain network is divided into a consensus subnet and a non-consensus subnet. Node 1, node 2 and node 3 are transaction nodes. At the same time, node 1 and node 2 are block chain nodes in the non-consensus subnet, and node 3, node 4 and node 5 are block chain nodes in the consensus subnet. Consensus checking on a target transaction Petition 870190096492, of 9/26/2019, p. 18/76 10/29 that node 1, node 2 and node 3 participate is carried out by node 3, node 4 and 5. [033] Therefore, the first transaction node can be simultaneously a consensus node or a non-consensus node. In one embodiment of the present disclosure, the first transaction node is at least one transaction node that can broadcast a transaction request from a target transaction. The first transaction node can be a transaction node that integrates functions, such as initiating a target transaction, broadcasting a transaction request, and performing consensus verification, or it can be a transaction node that integrates functions, such as broadcasting a request transaction and perform consensus verification, which is not limited in the present disclosure. [034] S102: determine a transaction summary according to the transaction data, after a plurality of transaction nodes each sign a data summary of the transaction data. Transaction nodes can comprise at least the first transaction node and one or more second transaction nodes. [035] In one embodiment of the present disclosure, the transaction summary is obtained after all transaction nodes have signed (digital signature) a data summary of the transaction data, in which the data summary of the transaction data is generated by the node transaction data that initiates the target transaction according to the transaction data and, in addition, clear text transaction data cannot be obtained inversely according to the data summary. On the other hand, even when the transaction data has a small change, the data summary generated according to the changed transaction data will also change. The data summary of the transaction data can be generated according to a one-way hash function, or it can be generated according to other functions, as long as such transaction data cannot be obtained inversely through the data summary. [036] In one embodiment of the present disclosure, all transaction nodes Petition 870190096492, of 9/26/2019, p. 19/76 11/29 can sign the data summary to obtain a certificate summary. The first summary, the second summary, the third summary and the summary obtained after a plurality of transaction nodes sign the data summary described below are all certificate summaries. The certificate summary is a certificate of authenticity from a data summary recognized by a subscription transaction node. [037] In one embodiment of the present disclosure, the transaction summary is a summary of the final certificate obtained after all transaction nodes have signed the data summary of the transaction data. In one embodiment of the present disclosure, all transaction nodes, including the first transaction node and the second transaction node, must declare that they recognize the authenticity of the data summary by means of the signature. In such a way, the authenticity of the transaction data of the target transaction can be verified by all transaction nodes before all transaction nodes perform consensus verification on the target transaction. [038] In some modalities, signing a data summary (digital signature) is, in fact, changing the character structure of the data summary, so that the signed data summary changes to a new string and takes a certificate summary. In addition, if the certificate summary is additionally signed by other nodes, the character structure of the certificate summary is additionally changed to become a new certificate summary. For example, a data summary signed by 5 transaction nodes and a data summary signed by 4 transaction nodes are completely different. In addition, when 5 transaction nodes sign a data summary, different transaction summaries are obtained if the order in which these 5 transaction nodes sign is different. [039] Thus, in one embodiment of the present disclosure, a transaction summary is obtained after a data summary of the transaction data is Petition 870190096492, of 9/26/2019, p. 20/76 12/29 signed by all transaction nodes. The transaction summary obtained can undoubtedly indicate that all transaction nodes recognize the transaction data and the data summary, that is, they recognize the authenticity of the target transaction. For example, there are 4 transaction nodes that participate in the target transaction, only 3 transaction nodes subscribe to the data summary, and the summary obtained is different from a transaction summary obtained after all 4 transaction nodes sign the data summary due the lack of a signature by the last transaction node. Therefore, it shows that the target transaction was not recognized by all transaction nodes and is not trusted. [040] In addition, if one of the transaction nodes does not recognize the authenticity of the transaction data and a data summary and refuses to sign the data summary, the first transaction node is unable to determine the transaction summary and it will not broadcast a transaction request that comprises a transaction summary to all consensus nodes, which means a failure to initiate a target transaction. In a special case, if the first transaction node acts maliciously because it still generates, only from one transaction node refuses to sign the data summary, a false transaction summary according to the obtained summary (the summary that does not have a signature of the declining transaction node) and disseminating the false transaction summary to all consensus nodes, the interest of the transaction node that refuses to sign will not be damaged even if the false transaction summary is saved in a chain of blocks. This is because the fake transaction summary is an unsigned certificate summary by the transaction node that refuses to sign and cannot be used as a certificate for a claim that the transaction node that refuses to sign recognizes the target transaction. Therefore, requiring multiple signatures on a data summary can not only prevent a malicious node from creating transaction data, but also prevent a bad node Petition 870190096492, of 9/26/2019, p. 21/76 Intended intentionally damages the interests of other block chain nodes (a block chain node does not need to be responsible for a target transaction that corresponds to a summary of data that the block chain node has not signed). [041] In one embodiment of the present disclosure, transaction data is not disseminated to all consensus nodes for consensus verification. Instead, a transaction summary can be broadcast to all consensus nodes for consensus verification and consensus nodes can save the transaction summary to a block chain, which can ensure that the target transaction that matches the summary transaction in the block chain is authentic. [042] In view of the aforementioned, in some embodiments of the present disclosure, transaction data is not disseminated to all consensus nodes for consensus verification and thus there will be no risk of privacy leakage as the transaction data will not be saved in a block chain. If transaction data is merely not sent to the consensus nodes so that the consensus nodes cannot verify the authenticity of a target transaction, a transaction node that initiates the target transaction cannot be prevented from acting maliciously, creating false transactions and damage the interests of other block chain nodes. [043] For this purpose, in some embodiments of the present disclosure, it is required that all transaction nodes participating in a target transaction sign a summary of transaction data data (multiple digital signatures). This is equivalent to shifting the job of verifying that the target transaction is authentic so that all transaction nodes participating in the target transaction complete. In such a way, there is no need to have consensus nodes that verify the authenticity of a transaction request. Of course, there is no need Petition 870190096492, of 9/26/2019, p. 22/76 14/29 to obtain transaction data from the target transaction, and the target transaction recorded in the block chain is also authentic (since a certificate summary signed by all transaction nodes is saved in the block chain). [044] In one embodiment of the present disclosure, there are a variety of ways in which multiple digital signatures are performed on the data summary, such as a broadcast solution for multiple digital signatures, a solution for multiple ordered digital signatures, etc. [045] Here, the solution to broadcast multiple digital signatures can refer to a transaction node that initiates a target transaction, sends a summary of data to other transaction nodes, respectively; when all the transaction nodes do not oppose and sign the data summary, and the transaction summary can be obtained by collecting the data summaries signed by each transaction node (including the summary obtained after signing the transaction node itself in the summary data) and combined according to a specific algorithm. [046] The solution of multiple ordered digital signatures means that a transaction node that initiates a target transaction generates the data summary, then all transaction nodes sign the data summary in an agreed order and the transaction node which is the last signed or other selected transaction node determines the generated transaction summary. [047] In one embodiment of the present disclosure, when the target transaction is initiated by the first transaction node, the first transaction node can generate the data summary according to the transaction data; send the data summary to all second transaction nodes and have all second transaction nodes sign the data summary; acquire the summary after every second transaction node has signed the data summary; determine the transaction summary according to the purchased signed data summary, where the second transaction nodes can be different transaction nodes than the first node Petition 870190096492, of 9/26/2019, p. 23/76 15/29 transaction on all transaction nodes. [048] For example, when the target transaction is initiated by the first transaction node, the multi-signature digital broadcast solution can be used, where the first transaction node generates the data summary according to the transaction data and signs the data summary to obtain a third summary, sends the third summary to all second transaction nodes for signature, respectively, then combines the summaries generated after all second transaction nodes sign the third summary and determines the transaction summary; similarly, when the multiple digital signature diffusion solution is used, the first transaction node can first send the data summary to all the second transaction nodes, respectively, then sign the data summary to obtain a third summary, and finally, combine the summaries generated after all the second transaction nodes sign the data summary and the third summary obtains the transaction summary. [049] In some modalities, when the target transaction is initiated by the first transaction node, the solution of multiple ordered digital signatures can also be used, which will not be repeated. [050] In one embodiment of the present disclosure, when the target transaction is initiated by any second transaction node, the first transaction node can receive the data summary sent by the second transaction node that initiates the target transaction, and after checking whether the data summary is correct, you can sign the data summary to get a first summary; upon receipt of the second summaries obtained after all the second transaction nodes have signed the data summary, determine the transaction summary according to the first summary and the second summaries. [051] In summary, the present disclosure does not limit the method by which the first transaction node determines the transaction summary according to the data Petition 870190096492, of 9/26/2019, p. 24/76 16/29 of the transaction. The first transaction node, such as a transaction node that initiates a target transaction and broadcasts a transaction request, can determine a transaction summary in a variety of multiple subscription solutions, or merely as a transaction node that broadcasts a transaction request. transaction, you can obtain a transaction summary. [052] S103: generate a transaction request that comprises the transaction data and the transaction summary. [053] S104: broadcast the transaction request to one or more consensus nodes, making the consensus nodes each save the transaction summary in the transaction request in a block chain after the transaction summary passes verification consensus. Transaction nodes and consensus nodes are block chain nodes in a block chain network. [054] In some embodiments, the transaction request broadcast by the first transaction node to all consensus nodes comprises the transaction summary, but does not include the transaction data. [055] In some embodiments, after the consensus check on a transaction summary in the transaction request is passed, each consensus node can save only the transaction summary in the block chain and cannot save the transaction data in the chain of blocks. blocks. In one embodiment of the present disclosure, each consensus node may only need to verify the validity of the transaction summary comprised in the transaction request, for example, using a public key provided by the transaction node to attempt to decrypt the transaction summary. If the decryption is successful, it shows that the transaction summary is, in fact, obtained after all transaction nodes have signed the data summary of the transaction data, and it also shows that the target transaction that corresponds to the transaction request it has been unanimously recognized by all transaction nodes and is authentic. The public key provided Petition 870190096492, of 9/26/2019, p. 25/76 17/29 for each transaction node could be provided by each transaction node to a consensus node in advance, or sent to a consensus node in conjunction with the transaction request sent by the first transaction node to the consensus node. [056] For a target transaction, as long as a block chain stores a transaction summary determined according to the transaction data of the target transaction, this can show that the target transaction is authentic, and there is no need for all nodes to consensus to perform consensus verification on the transaction data of the target transaction. [057] In one embodiment of the present disclosure, the transaction request can not only comprise the transaction summary, but also comprise an asset number of an asset to which the target transaction refers. In addition to performing a validity check on the transaction summary, each consensus node can perform verification on the following two aspects according to the number of assets received: 1. determine whether the asset is repeatedly spent; and 2. verify that the asset is used in a fraudulent manner, which must determine asset asset numbers belonging to all transaction nodes, respectively, according to the public key of each transaction node and then determine if there is at least minus an asset number among the asset asset numbers to which the target asset refers, which is not an asset number for an asset belonging to the transaction nodes. If so, it shows that a transaction node in the target transaction fraudulently uses an asset number from a non-transaction node. [058] in such a situation, the transaction summary is saved in the block chain only when it is confirmed that the transaction summary is valid and there is no repeated expenditure of assets or fraudulent use of an asset number. Since the asset number does not refer to the privacy of a transaction node, a consensus node can be charged with checking for repeated asset spend or use Petition 870190096492, of 9/26/2019, p. 26/76 Fraudulent 18/29 of an asset number. [059] In one embodiment of the present disclosure, the first transaction node can additionally save the transaction data in a private database that corresponds to it. [060] In addition, when the target transaction is initiated by the first transaction node, the first transaction node can additionally send transaction data to each second transaction node, and each second transaction node can also save transaction data in a private database that corresponds to it. [061] In some embodiments, each transaction node can also save the summary data in its own private database, which is not limited by the present disclosure. [062] The transaction data can reflect the entire image of a target transaction. To avoid disputes between the transaction nodes in relation to the target transaction and to allow all transaction nodes to consult, at any time, transaction data of the target transaction they participate in, and each transaction node can save the transaction data on account own. At least one transaction node saves the transaction data to ensure that the transaction node is not lost. [063] Thus, as long as all transaction nodes rely on a transaction summary stored in a block chain, the transaction data stored by each transaction node can be verified. Namely, a multi-signature solution that is the same as that used previously when a target transaction is initiated can be used to obtain multiple signatures on transaction data initiated by a transaction node to determine whether a transaction summary stored in a chain of blocks can be obtained. Petition 870190096492, of 9/26/2019, p. 27/76 19/29 [064] In other words, the transaction data stored by each transaction node on its own can be arbitrarily changed by each transaction node. Assuming that the transaction data stored by all transaction nodes is not consistent (some transaction nodes act in a malicious manner), each transaction node can, according to the transaction data to be verified initiated by a transaction node ( which can be composed by the transaction node itself), obtain again a transaction summary to be verified that corresponds to the transaction data to be verified using the multiple digital signature solution used before. If the transaction summary to be verified is the same as the transaction summary stored in the block chain, the transaction node does not act in a malicious way; otherwise, the transaction node may act in a malicious manner. [065] Figures 3a to 3c are schematic diagrams of a method for processing a transaction request, according to some modalities of the present disclosure. As shown in Figures 3a to 3c, the block chain network comprises block chain nodes 1-10, where the shaded block chain nodes 1-6 are transaction nodes, and the block chain nodes 1- 3 and 7-10 are consensus nodes. Transaction node 1 is a transaction node that initiates a target transaction, as well as a transaction node that broadcasts a transaction request. As shown in Figure 3a, transaction node 1 acquires transaction data and generates a data summary according to the transaction data, and subsequently sends the transaction data and data summary to transaction nodes 2-6, so that they sign the data summary, respectively. As shown in Figure 3b, transaction nodes 2-6 can store the transaction data in their own private databases, and return it, after verifying that the data summary and transaction data are correct, the summary obtained after the data summary is signed for transaction node 1. For Petition 870190096492, of 9/26/2019, p. 28/76 On the one hand, transaction node 1 saves transaction data at block chain nodes; on the other hand, transaction node 1 signs its own data summary, and finally, determines a transaction summary according to the summaries received from other transaction nodes and the summary obtained after it signs the data summary itself. As shown in Figure 3c, after determining the transaction summary, transaction node 1 generates a data request that comprises the transaction summary and broadcasts it to each consensus node for consensus verification. If the data request passes verification, each consensus node saves the transaction summary in the block chain. [066] The method for processing a transaction request shown in Figures 3a to 3c is only an exemplary implementation of the technical solution of the present disclosure. In one embodiment of the present disclosure, if the first transaction node is a node that initiates an unrestricted target transaction, if each transaction node is an unrestricted consensus node, and which multiple digital signature solutions are used and which algorithm is used used to combine the summary obtained after all transaction nodes have signed the data summary in a transaction summary are also not limited. [067] Using the method for processing a transaction request shown in Figure 1, a transaction request broadcast by a transaction node to all consensus nodes comprises a transaction summary, but the transaction request does not include transaction data . As a result, when the transaction request passes consensus verification, consensus nodes will not save transaction data in a block chain, and there will be no risk of privacy leakage from the transaction nodes. At the same time, the transaction summary is obtained after all transaction nodes have signed the data summary of the transaction data. As a result, even when there is no transaction data stored in the block chain, the authenticity of the Petition 870190096492, of 9/26/2019, p. 29/76 21/29 transaction request can still be proven through the data summary recognized by all transaction nodes, so that none of the transaction nodes can deny the target transaction that corresponds to the transaction request. [068] In some block chain application scenarios, in addition, some monitoring mechanisms need to be introduced in a block chain network as monitoring nodes. Certificate summaries that correspond to target transactions and stored in a block chain have multiple digital signatures, and can make it easier for a monitoring node to know which transaction nodes participate in a target transaction and whether a target transaction has been unanimously recognized by all the transaction nodes participating in that target transaction. [069] Based on the method for processing a transaction request shown in Figure 1, one embodiment of the present disclosure additionally provides an apparatus 400 for processing a transaction request, as shown in Figure 4. Apparatus 400 can be implemented such as software, hardware, or a combination of both. In one example, apparatus 400 may comprise a processor and a memory coupled together. The memory can be non-transitory and readable by the computer and can store instructions that, when executed by the processor, make the apparatus 400 perform several steps and methods described in this document. The instructions can be implemented as several modules that comprise: [070] an 401 acquisition module configured to acquire transaction data from a target transaction; [071] a determination module 402 configured to determine, according to the transaction data, a transaction summary, the transaction summary being obtained after all transaction nodes have signed a data summary of the transaction data, being that transaction nodes are chain nodes Petition 870190096492, of 9/26/2019, p. 30/76 22/29 blocks that participate in the target transaction, and the device is one of the transaction nodes; [072] a 403 generation module configured to generate a transaction request comprising the transaction data and the transaction summary; and [073] a 404 broadcast module configured to broadcast the transaction request to all consensus nodes, so that all consensus nodes save the transaction summary in the transaction request in a block chain after the transaction summary pass consensus verification. [074] In some modalities, in relation to the determination module 402, when the target transaction is initiated by the device, the device 400 generates the data summary according to the transaction data; sends the data summary to all second transaction nodes, so that all second transaction nodes subscribe to the data summary; acquires the data summary after every second transaction node has signed the data summary; and determines the transaction summary according to the purchased signed data summary. [075] In some modalities, when the target transaction is initiated by any second transaction node, the determination module 402 receives the data summary; checks the data summary according to the transaction data; sign, if the data summary passes verification, the data summary to get a first summary; and upon receipt of second summaries obtained after all the second transaction nodes have signed the data summary, the transaction summary is determined according to the first summary and the second summaries. [076] The device 400 can additionally comprise: a rescue module 405 configured to save the transaction data in a private database that corresponds to the device. [077] The device 400 may additionally comprise: a sending module 406 configured to send, when the target transaction is initiated by the device, Petition 870190096492, of 9/26/2019, p. 31/76 23/29 transaction data for all second transaction nodes, so that each second transaction node saves transaction data in a private database that corresponds to the second transaction node. [078] In the 1990s, an improvement in a technology could be differentiated into a hardware improvement (for example, an improvement to a circuit structure, such as a diode, a transistor, a switch, and the like) or an improvement to software (an enhancement to a method flow). However, in conjunction with technological development, many current enhancements to method flows can be considered as direct enhancements to hardware circuit structures. Designers can obtain a corresponding hardware circuit structure by programming an improved method flow in a hardware circuit. Therefore, an improvement to a method flow can be accomplished by implementing hardware. For example, the Programmable Logic Device (PLD) (for example, Field Programmable Gate Array (FPGA)) is an integrated circuit in which its logical functions are determined by a user through device programming. A designer can program to "integrate" a digital system into a PLD part, without asking a chip maker to design and manufacture a dedicated IC chip. Currently, this type of programming has been mainly implemented through “logical compiler” software, instead of manually manufacturing IC chips. The logic compiler software is similar to a software compiler used to program development and writing, while a particular programming language is used to write source code before compilation, which is called a Hardware Description Language (HDL). There is not just one, but many types of HDL, such as ABEL (Advanced Boolean Expression Language - Advanced Boolean Expression Language), AHDL (Altera Hardware Description Language), Petition 870190096492, of 9/26/2019, p. 32/76 24/29 Confluence, ClIPL (Cornell University programming language - Cornell University Programming Language), HDCal, JHDL (Java Hardware Description Language - Java Hardware Description Language), Lava, Lola, MyHDL, PALASM, RHDL (Ruby Hardware Description Language - Ruby Hardware Description). The most commonly used HDL includes VHDL (Very-High-Speed Integrated Circuit Hardware Description Language) and Verilog. A person skilled in the art would know how to obtain a hardware circuit to implement a logical method flow using the HDLs above to perform some logical programming in the method flow and program the same in an IC. [079] A controller can be implemented in any suitable way. For example, a controller can be, for example, in the form of a microprocessor or processor, as well as a computer-readable medium that stores computer-readable program codes (for example, software or firmware) capable of being executed by ( micro) processor, one per logic, a switch, an Application Specific Integrated Circuit (ASIC), a programmable logic controller and a built-in microcontroller. Controller examples include, but are not limited to, the following microcontrollers: ARC 625D, AT91SAM Atmel, PIC18F26K20 Microchip and C8051F320 Silicone Labs. A memory controller can be additionally implemented as a part of a memory control logic. A person skilled in the art should also be aware that, in addition to that controller being implemented in a manner of pure computer-readable program codes, it is feasible to carry out logical programming in the steps of a method to allow a controller to implement the same functions in a way of a logic port, a switch, an ASIC, a programmable logic controller and a built-in microcontroller. Therefore, such a controller can be considered as a piece of hardware, Petition 870190096492, of 9/26/2019, p. 33/76 25/29 while devices included in it and configured to perform various functions can also be considered as a structure within the hardware part. Alternatively, devices configured to perform various functions can be considered as software modules for implementing a method and structure within a piece of hardware. [080] The system, device, module or unit described in the above modalities can be implemented by a chip or computer entity or implemented by a product that has a function. A typical deployment device is a computer. For example, a computer can be, for example, a personal computer, a laptop computer, a cell phone, a camera phone, a smart phone, a personal digital assistant, a media player, a navigation device, a email device, game console, tablet computer, body-worn device, or a combination of any devices on those devices. [081] For the sake of convenience of description, the above device is divided into several units according to the functions for description. The unit functions can be implemented in one or multiple pieces of software and / or hardware when implementing the present disclosure. [082] A person skilled in the art must understand that the modalities of the present disclosure can be provided as a method, system or computer program product. Therefore, the revealed system can be implemented as a complete hardware modality, a complete software modality or a modality that combines software and hardware to carry out the revealed methods. In addition, the disclosed system may be in the form of a computer program product implemented on one or more computer-usable storage media (including, but not limited to, Petition 870190096492, of 9/26/2019, p. 34/76 26/29 without limitation, a magnetic disk memory, CD-ROM, an optical memory and the like) that comprise program codes that can be used by a computer on the computer. [083] The disclosed system is described with reference to the flowcharts and / or block diagrams of the method, the device (system) and the computer program product according to the modalities of the present disclosure. It should be understood that a computer program instruction can be used to implement each process and / or block in flowcharts and / or block diagrams and a combination of processes and / or blocks in flowcharts and / or block diagrams. These computer program instructions can be provided for a general purpose computer, a special purpose computer, an embedded processor, or a processor for other programmable data processing devices to generate a machine, so that instructions executed by a computer or processor of other programmable data processing devices generate an apparatus to implement a specified function in one or more processes in flowcharts and / or in one or more blocks in block diagrams. [084] These computer program instructions can also be stored in a computer-readable memory that can instruct a computer or other programmable data processing devices to function in a particular way, so that the instructions stored in computer-readable memory they manage a manufactured item that includes an instructional apparatus. The instruction apparatus implements one or more functions in one or more processes in the flowcharts and / or in one or more blocks in the block diagrams. [085] These computer program instructions can also be loaded onto a computer or other data processing devices Petition 870190096492, of 9/26/2019, p. 35/76 27/29 programmable, so that a series of operational steps is performed on the computer or other programmable devices, thereby generating computer-implemented processing. Therefore, instructions executed on the computer or other programmable devices provide steps to implement one or more functions in one or more processes in flowcharts and / or in one or more blocks in block diagrams. [086] In a typical configuration, the computing device includes one or more Central Processing Units (CPUs), input / output interfaces, network interfaces and a memory. [087] The memory can include computer-readable media, such as a volatile memory, a Random Access Memory (RAM) and / or a non-volatile memory, for example, a Read-Only Memory (ROM) or a flash RAM. Memory is an example of a computer-readable medium. [088] Computer-readable media includes permanent, volatile, mobile and immobile media, which can implement information storage using any method or technology. The information can be computer-readable instructions, data structures, program modules or other data. Examples of computer storage media include, but are not limited to, Phase Change RAMs (PRAMs), Static RAMs (SRAMs), Dynamic RAMs (DRAMs), other types of Random Access Memories (RAMs), Read Only Memories (ROMs), Electrically Erasable Programmable Read Only Memories (EEPROMs), flash memories or other memory technologies, Compact Disc Read Only Memories (CDROMs), Digital Versatile Discs (DVDs) or other optical memories, cassettes, cassette memories and magnetic disk or other magnetic memory devices or any other non-transmitting media, which can be used to store information accessible to a computing device. According Petition 870190096492, of 9/26/2019, p. 36/76 28/29 definitions in this document, computer-readable media does not include transient media, such as modulated and carrier data signals. [089] It should also be noted that the terms "which includes", "which comprises" or any other variants thereof are intended to cover a non-exclusive inclusion, so that a process, method, merchandise or device comprising a series of elements not only understand those elements, but also understand other elements that are not listed, or additionally understand elements that are inherent to the process, method, commodity or device. When there is no additional restriction, the elements defined by the statement "which comprises a ..." do not exclude additional similar elements in a process, method, commodity or device which comprises the defined elements. [090] A person skilled in the art must understand that the modalities of the present disclosure can be provided as a method, a system or a computer program product, therefore, the present disclosure can be implemented as a complete hardware modality, a modality complete software or a modality that combines software and hardware. In addition, the present disclosure may be in the form of a computer program product implemented on one or more storage media usable by a computer (including, but not limited to, magnetic disk memory, CD-ROM, optical memory and that include computer-usable program codes. [091] The present disclosure can be described in a regular context of a computer executable instruction that is executed by a computer, such as a program module. In several modalities, the program module comprises a routine, a program, an object, a component, a data structure and the like to perform a particular task or implement a type of Petition 870190096492, of 9/26/2019, p. 37/76 29/29 particular summary data. The present disclosure can also be practiced in distributed computing environments. In these distributed computing environments, remote processing devices connected through communication networks perform tasks. In distributed computing environments, a program module can be located on local and remote computer storage media, including storage devices. [092] The modalities in this description are described progressively with each modality focusing on differences from other modalities, and the modalities can be mutually called identical or similar parts of them. For the system modality, its description is relatively simple as it is substantially similar to the method modality. The description of the method modality can be called related parts of it. [093] The modalities of the present disclosure are merely exemplary, and are not used to limit the present disclosure. For a person skilled in the art, the modalities revealed can be modified or altered in several ways. Any modification, replacement or equivalent enhancement made within the spirit and principle of the present disclosure must be covered by the claims of the present disclosure
权利要求:
Claims (20) [1] 1. Method for processing a transaction request, implementable by a first transaction node, the method being CHARACTERIZED by the fact that it comprises: acquire transaction data from a target transaction, in which the first transaction node participates in the target transaction; determine, according to the transaction data, a transaction summary after a plurality of transaction nodes each sign a data summary of the transaction data, where the transaction nodes comprise at least the first transaction node and one or more second transaction nodes; generate a transaction request that comprises the transaction summary; and broadcast the transaction request to one or more consensus nodes, causing the consensus nodes to each save the transaction summary in the transaction request in a block chain after the transaction summary passes the consensus check, where the consensus nodes are block chain nodes, where the transaction nodes and the consensus nodes are block chain nodes of a block chain network. [2] 2. Method, according to claim 1, CHARACTERIZED by the fact that, when the target transaction is initiated by the first transaction node, determining the transaction summary according to the transaction data comprises: generate, by the first transaction node, the data summary according to the transaction data; send the data summary to the one or more second transaction nodes; acquire the data summary after the second transaction nodes each sign the data summary; and determine the transaction summary according to the data summary Petition 870190096492, of 9/26/2019, p. 39/76 2/8 signed purchased. [3] 3. Method, according to claim 1, CHARACTERIZED by the fact that, when the target transaction is initiated by any one or more second transaction nodes, determining the transaction summary according to the transaction data comprises: receive the data summary from the initiation of the second transaction node; check the data summary according to the transaction data; sign, if the data summary passes verification, the data summary to get a first summary; and upon receipt of the second summaries obtained after the second transaction nodes, each one signs the data summary, determines the transaction summary according to the first summary and the second summaries. [4] 4. Method, according to claim 1, CHARACTERIZED by the fact that it additionally comprises: save the transaction data to a private database that corresponds to the first transaction node. [5] 5. Method, according to claim 4, CHARACTERIZED by the fact that when the target transaction is initiated by the first transaction node, the method additionally comprising: send the transaction data to the one or more second transaction nodes, causing each second transaction node to save the transaction data in a private database that corresponds to the second transaction node. [6] 6. Non-transitory computer-readable storage medium CHARACTERIZED by the fact that it stores instructions that, when executed by a processor of a first transaction node, make the processor Petition 870190096492, of 9/26/2019, p. 40/76 3/8 perform a method to process a transaction request, the method comprising: acquire transaction data from a target transaction, in which the first transaction node participates in the target transaction; determine, according to the transaction data, a transaction summary after a plurality of transaction nodes each sign a data summary of the transaction data, where the transaction nodes comprise at least the first transaction node and one or more second transaction nodes; generate a transaction request that comprises the transaction summary; and broadcast the transaction request to one or more consensus nodes, causing the consensus nodes to each save the transaction summary in the transaction request in a block chain after the transaction summary passes the consensus check, in that transaction nodes and consensus nodes are block chain nodes in a block chain network. [7] 7. Non-transitory computer-readable storage medium, according to claim 6, CHARACTERIZED by the fact that, when the target transaction is indicated by the first transaction node, determining the transaction summary according to the transaction data comprises: generate, by the first transaction node, the data summary according to the transaction data; send the data summary to the one or more second transaction nodes; acquire the data summary after the second transaction nodes each sign the data summary; and determine the transaction summary according to the purchased signed data summary. [8] 8. Non-transitory computer-readable storage medium, in accordance with Petition 870190096492, of 9/26/2019, p. 41/76 4/8 with claim 6, CHARACTERIZED by the fact that, when the target transaction is initiated by any one or more second transaction nodes, determining the transaction summary according to the transaction data comprises: receive the data summary from the initiation of the second transaction node; check the data summary according to the transaction data; sign, if the data summary passes verification, the data summary to get a first summary; and upon receipt of the second summaries obtained after the second transaction nodes, each one signs the data summary, determines the transaction summary according to the first summary and the second summaries. [9] 9. Non-transitory computer-readable storage medium, according to claim 6, the method being CHARACTERIZED by the fact that it additionally comprises: save the transaction data to a private database that corresponds to the first transaction node. [10] 10. Non-transitory computer-readable storage medium, according to claim 9, CHARACTERIZED by the fact that, when the target transaction is initiated by the first transaction node, the method additionally comprising: send the transaction data to the one or more second transaction nodes, causing each second transaction node to save the transaction data in a private database that corresponds to the second transaction node. [11] 11. Device implementable as a first transaction node, CHARACTERIZED by the fact that it comprises a processor and a non-transitory computer-readable storage medium that stores instructions that, Petition 870190096492, of 9/26/2019, p. 42/76 5/8 when executed by the processor, make the device perform a method to process a transaction request, the method comprising: acquire transaction data from a target transaction, in which the first transaction node participates in the target transaction; determine, according to the transaction data, a transaction summary after a plurality of transaction nodes each sign a data summary of the transaction data, where the transaction nodes comprise at least the first transaction node and one or more second transaction nodes; generate a transaction request that comprises the transaction summary; and broadcast the transaction request to one or more consensus nodes, causing the consensus nodes to each save the transaction summary in the transaction request in a block chain after the transaction summary passes the consensus check, in that transaction nodes and consensus nodes are block chain nodes in a block chain network. [12] 12. Apparatus, according to claim 11, CHARACTERIZED by the fact that, when the target transaction is initiated by the first transaction node, determining the transaction summary according to the transaction data comprises: generate, by the first transaction node, the data summary according to the transaction data; send the data summary to the one or more second transaction nodes; acquire the data summary after the second transaction nodes each sign the data summary; and determine the transaction summary according to the purchased signed data summary. [13] 13. Apparatus according to claim 11, CHARACTERIZED by Petition 870190096492, of 9/26/2019, p. 43/76 6/8 fact that, when the target transaction is initiated by any one or more second transaction nodes, determining the transaction summary according to the transaction data comprises: receive the data summary from the initiation of the second transaction node; check the data summary according to the transaction data; sign, if the data summary passes verification, the data summary to get a first summary; and upon receipt of the second summaries obtained after the second transaction nodes, each one signs the data summary, determines the transaction summary according to the first summary and the second summaries. [14] 14. Apparatus, according to claim 11, the method being CHARACTERIZED by the fact that it additionally comprises: saving the transaction data in a private database that corresponds to the first transaction node. [15] 15. Apparatus, according to claim 14, CHARACTERIZED by the fact that, when the target transaction is initiated by the first transaction node, the method additionally comprises: send the transaction data to the one or more second transaction nodes, causing each second transaction node to save the transaction data in a private database that corresponds to the second transaction node. [16] 16. Method for processing a transaction request, implementable by a first transaction node, the method being CHARACTERIZED by the fact that it comprises: acquire transaction data from a target transaction, the first transaction node being a block chain node that participates in the target transaction; Petition 870190096492, of 9/26/2019, p. 44/76 7/8 generate a summary of data based on at least the transaction data; transmitting the summary of data to one or more second transaction nodes, wherein a plurality of transaction nodes comprise at least the first transaction node and the second transaction nodes; obtain a transaction summary based on at least each of the transaction nodes that subscribe to the data summary; generate a transaction request that comprises the transaction summary; and broadcast the transaction request to one or more consensus nodes, causing the one or more consensus nodes to each check the transaction summary in the transaction request, where the transaction nodes and consensus nodes are block chain nodes of a block chain network. [17] 17. Method, according to claim 16, CHARACTERIZED by the fact that: transaction data is not transmitted to the consensus nodes and is not saved in a block chain associated with the target transaction. [18] 18. Method, according to claim 16, CHARACTERIZED by the fact that: the transaction data of the target transaction comprises at least one of a subject of a transaction associated with the target transaction, detailed subject information, an account address of an individual participating in the target transaction, or ID information of the individual participating in the transaction target. [19] 19. Method, according to claim 16, CHARACTERIZED by the fact that: signing the data summary comprises digitally granting a data summary check; and obtain the transaction summary based on at least each of the Petition 870190096492, of 9/26/2019, p. 45/76 8/8 first transaction node and the one or more second transaction nodes that sign and return the data summary comprises obtaining the transaction summary based on at least each of the first transaction node and the one or more second nodes transactions, each of which signs the data summary in a predefined order. [20] 20. Method, according to claim 16, CHARACTERIZED by the fact that it additionally comprises: have consensus nodes each save the transaction summary in a block chain associated with the target transaction in response to all consensus nodes that have verified the transaction summary.
类似技术:
公开号 | 公开日 | 专利标题 BR112019020197A2|2020-04-22|method and apparatus for processing transaction requests AU2018257226B2|2021-06-24|Consensus verification method and device KR20190099054A|2019-08-23|Blockchain node communication method and apparatus BR112019016831B1|2021-01-19|blockchain system and data storage method and device ES2810828T3|2021-03-09|Procedure and device for processing a service request ES2820554T3|2021-04-21|Method and apparatus for authenticating a user, method and apparatus for registering a wearable device CN110795501A|2020-02-14|Method, device, equipment and system for creating verifiable statement based on block chain ES2872101T3|2021-11-02|Distributed key management for trusted runtime environments WO2021114872A1|2021-06-17|Verifiable claim-based service processing method, apparatus, and device ES2871028T3|2021-10-28|Service request authentication method and apparatus JP7007398B2|2022-01-24|Methods and equipment for processing transaction requests US20200195447A1|2020-06-18|Communication method of client device, issuing device and server BR112019010368B1|2021-12-14|METHOD FOR PROCESSING A SERVICE REQUEST AND DEVICE FOR PROCESSING A SERVICE REQUEST
同族专利:
公开号 | 公开日 AU2019101613A4|2020-01-23| CN107395557A|2017-11-24| KR20190123774A|2019-11-01| CN107395557B|2020-05-15| US10915901B2|2021-02-09| RU2730439C1|2020-08-21| AU2021200420A1|2021-02-25| JP2020512779A|2020-04-23| US20180285869A1|2018-10-04| ZA201906110B|2020-08-26| TWI705350B|2020-09-21| SG11201908382PA|2019-10-30| US20210142324A1|2021-05-13| US20200202352A1|2020-06-25| CA3057331C|2021-07-06| AU2018243625A1|2019-10-03| EP3602454A1|2020-02-05| US10748150B2|2020-08-18| WO2018183055A1|2018-10-04| KR102337538B1|2021-12-09| TW201837772A|2018-10-16| CN111724150A|2020-09-29| MX2019011548A|2019-11-28| CA3057331A1|2018-10-04| PH12019502186A1|2020-06-08|
引用文献:
公开号 | 申请日 | 公开日 | 申请人 | 专利标题 US6138107A|1996-01-04|2000-10-24|Netscape Communications Corporation|Method and apparatus for providing electronic accounts over a public network| US6157920A|1997-11-19|2000-12-05|Lucent Technologies Inc.|Executable digital cash for electronic commerce| CA2266208C|1999-03-19|2008-07-08|Wenking Corp.|Remote road traffic data exchange and intelligent vehicle highway system| US20020087481A1|2000-12-29|2002-07-04|Shlomi Harif|System, method and program for enabling an electronic commerce heterogeneous network| ES2659723T3|2002-06-12|2018-03-19|Cardinalcommerce Corporation|Universal merchant platform for payment authentication| DE10339440A1|2003-08-25|2005-04-07|Demag Cranes & Components Gmbh|Method for monitoring a chain hoist and chain hoist| US20110320347A1|2007-03-30|2011-12-29|Obopay, Inc.|Mobile Networked Payment System| US20090319425A1|2007-03-30|2009-12-24|Obopay, Inc.|Mobile Person-to-Person Payment System| JP2007310624A|2006-05-18|2007-11-29|Dainippon Printing Co Ltd|Workflow system using electronic envelope, method, computer program| US20090119207A1|2007-11-04|2009-05-07|William Grecia|Point of sale payment system for multiple recipients using a digital payment service| US8528814B2|2009-02-09|2013-09-10|Giftcodes.Com, Llc|System and method for preventing fraud by generating new prepaid gift accounts| US10438181B2|2009-07-22|2019-10-08|Visa International Service Association|Authorizing a payment transaction using seasoned data| WO2011081952A1|2009-12-14|2011-07-07|Cashedge, Inc.|Internetworking between p2p networks| US20120284187A1|2011-03-15|2012-11-08|Ayman Hammad|System and method for processing payment transactions| US20120317034A1|2011-06-13|2012-12-13|Microsoft Corporation|Transparent virtual currency using verifiable tokens| US20130290226A1|2012-04-05|2013-10-31|Maynard Dokken|System and method for social graph and graph assets valuation and monetization| WO2015142765A1|2014-03-17|2015-09-24|Coinbase, Inc|Bitcoin host computer system| US20150363782A1|2014-06-16|2015-12-17|Bank Of America Corporation|Cryptocurrency transaction validation system| KR101660627B1|2015-02-03|2016-09-28|한양대학교 에리카산학협력단|Method and apparatus for protecting transasction of encrypted currency| US9875510B1|2015-02-03|2018-01-23|Lance Kasper|Consensus system for tracking peer-to-peer digital records| US20160224949A1|2015-02-04|2016-08-04|Ripple Labs Inc.|Temporary consensus subnetwork in a distributed network for payment processing| EP3278287A4|2015-03-31|2018-08-22|Nasdaq, Inc.|Systems and methods of blockchain transaction recordation| AU2016288644A1|2015-07-02|2018-02-22|Nasdaq, Inc.|Systems and methods of secure provenance for distributed transaction databases| US20170017954A1|2015-07-14|2017-01-19|Fmr Llc|Point-to-Point Transaction Guidance Apparatuses, Methods and Systems| US10303887B2|2015-09-14|2019-05-28|T0.Com, Inc.|Data verification methods and systems using a hash tree, such as a time-centric merkle hash tree| CN105678182B|2015-12-29|2019-04-12|布比(北京)网络技术有限公司|A kind of method and device of data manipulation control| CN105719185B|2016-01-22|2019-02-15|杭州复杂美科技有限公司|The data comparison and common recognition method of block chain| CN105790954B|2016-03-02|2019-04-09|布比(北京)网络技术有限公司|A kind of method and system constructing electronic evidence| CN105975868A|2016-04-29|2016-09-28|杭州云象网络技术有限公司|Block chain-based evidence preservation method and apparatus| CN105871545B|2016-06-03|2019-03-15|中国银联股份有限公司|Credible electronic certificate trustship method and system| CN105976232B|2016-06-24|2020-04-28|深圳前海微众银行股份有限公司|Asset transaction method and device| CN106230851B|2016-08-29|2019-12-13|中金云金融(北京)大数据科技股份有限公司|Data security method and system based on block chain| US10249194B2|2016-08-30|2019-04-02|International Business Machines Corporation|Modifying behavior of autonomous vehicle based on advanced predicted behavior analysis of nearby drivers| CN106534273A|2016-10-31|2017-03-22|中金云金融(北京)大数据科技股份有限公司|Block chain metadata storage system, and storage method and retrieval method thereof| AU2016101976A4|2016-11-11|2016-12-08|Klianev, Ivan MR|Open Network of Permissioned Ledgers| CN106503995A|2016-11-17|2017-03-15|中国银行股份有限公司|A kind of data sharing method, source node, destination node and system| CN106411503B|2016-11-28|2019-11-08|中国银行股份有限公司|The bookkeeping methods and system, ballot and accounting nodes of block chain ballot accounting mode| US10862959B2|2016-11-28|2020-12-08|Keir Finlow-Bates|Consensus system and method for adding data to a blockchain| CN106533675A|2016-12-19|2017-03-22|北京洋浦伟业科技发展有限公司|Digital signature method and system| CN106487821B|2017-01-04|2020-07-03|北京天云智汇科技有限公司|Digital signature method based on Internet block chain technology| US20180219676A1|2017-01-27|2018-08-02|Walmart Apollo, Llc|Managing smart appliances using blockchain technology| US20180218454A1|2017-01-27|2018-08-02|Walmart Apollo, Llc|Managing participation in a monitored system using blockchain technology| US10484346B2|2017-02-07|2019-11-19|Microsoft Technology Licensing, Llc|Establishment of consortium blockchain network| CN111917864A|2017-02-22|2020-11-10|创新先进技术有限公司|Service checking method and device| WO2018172439A1|2017-03-22|2018-09-27|NEC Laboratories Europe GmbH|Method for operating a blockchain| CN107196900B|2017-03-24|2020-04-24|创新先进技术有限公司|Consensus checking method and device|CN107450981B|2017-05-31|2020-04-24|创新先进技术有限公司|Block chain consensus method and equipment| CN110163004A|2018-02-14|2019-08-23|华为技术有限公司|A kind of method, relevant device and system that block chain generates| CN108646983B|2018-05-08|2021-04-06|北京融链科技有限公司|Processing method and device for storing service data on block chain| CN108769230B|2018-06-06|2021-06-18|腾讯科技(深圳)有限公司|Transaction data storage method, device, server and storage medium| CN109257427B|2018-09-26|2021-04-02|网宿科技股份有限公司|Service processing method and system based on block chain| KR102042361B1|2018-10-26|2019-11-07|에이치닥 테크놀로지 아게|Apparatus, system, method for blockchain linkage and signal relay| CN109614813B|2018-10-31|2020-06-23|阿里巴巴集团控股有限公司|Privacy transaction method and device based on block chain and application method and device thereof| CN109934709A|2018-11-05|2019-06-25|阿里巴巴集团控股有限公司|Data processing method, device and server based on block chain| CN110020956A|2018-11-26|2019-07-16|阿里巴巴集团控股有限公司|A kind of exchange method and system, computer equipment and storage medium of transregional piece of chain| EP3559891B1|2018-11-27|2021-11-17|Advanced New Technologies Co., Ltd.|Executing multi-party transactions using smart contracts| CN110046991B|2018-12-12|2020-08-11|阿里巴巴集团控股有限公司|Data processing method and system based on intelligent contract of block chain| CN110046992A|2018-12-12|2019-07-23|阿里巴巴集团控股有限公司|A kind of transaction Hash acquisition methods and system based on block chain intelligence contract| CN109903026A|2018-12-14|2019-06-18|阿里巴巴集团控股有限公司|Event-handling method and device, electronic equipment based on block chain| CN110020544B|2018-12-26|2021-08-24|创新先进技术有限公司|Hash information processing method and system for storage record in block of block chain| WO2019101226A2|2019-02-28|2019-05-31|Alibaba Group Holding Limited|System and method for generating digital marks| US11269858B2|2019-03-26|2022-03-08|International Business Machines Corporation|Information management in a decentralized database including a fast path service| WO2019120326A2|2019-03-29|2019-06-27|Alibaba Group Holding Limited|Managing sensitive data elements in a blockchain network| CN110019490A|2019-04-01|2019-07-16|北京柏链基石科技有限公司|Information query method, device and its equipment based on block chain| CN110099108A|2019-04-26|2019-08-06|深圳前海微众银行股份有限公司|A kind of block chain event De-weight method, device, computer equipment and storage medium| CN110310203A|2019-06-21|2019-10-08|普洛斯科技有限公司|A kind of block chain method of commerce and device| CN110705935A|2019-09-27|2020-01-17|北京京东振世信息技术有限公司|Logistics document processing method and device| CN112036878A|2020-08-28|2020-12-04|平安科技(深圳)有限公司|Data processing method and device|
法律状态:
2021-05-04| B25A| Requested transfer of rights approved|Owner name: ADVANTAGEOUS NEW TECHNOLOGIES CO., LTD. (KY) | 2021-05-25| B25A| Requested transfer of rights approved|Owner name: ADVANCED NEW TECHNOLOGIES CO., LTD. (KY) | 2021-10-19| B350| Update of information on the portal [chapter 15.35 patent gazette]|
优先权:
[返回顶部]
申请号 | 申请日 | 专利标题 CN201710190507.1A|CN107395557B|2017-03-28|2017-03-28|Service request processing method and device| PCT/US2018/023517|WO2018183055A1|2017-03-28|2018-03-21|Method and apparatus for processing transaction requests| 相关专利
Sulfonates, polymers, resist compositions and patterning process
Washing machine
Washing machine
Device for fixture finishing and tension adjusting of membrane
Structure for Equipping Band in a Plane Cathode Ray Tube
Process for preparation of 7 alpha-carboxyl 9, 11-epoxy steroids and intermediates useful therein an
国家/地区
|