[go: up one dir, main page]

CN109347868B - Information verification method, device and storage medium - Google Patents

Information verification method, device and storage medium Download PDF

Info

Publication number
CN109347868B
CN109347868B CN201811429203.7A CN201811429203A CN109347868B CN 109347868 B CN109347868 B CN 109347868B CN 201811429203 A CN201811429203 A CN 201811429203A CN 109347868 B CN109347868 B CN 109347868B
Authority
CN
China
Prior art keywords
transaction
information
transaction information
initiator
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811429203.7A
Other languages
Chinese (zh)
Other versions
CN109347868A (en
Inventor
韩宇龙
李琳
张聪
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
MIGU Culture Technology Co Ltd
Original Assignee
MIGU Culture Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by MIGU Culture Technology Co Ltd filed Critical MIGU Culture Technology Co Ltd
Priority to CN201811429203.7A priority Critical patent/CN109347868B/en
Publication of CN109347868A publication Critical patent/CN109347868A/en
Application granted granted Critical
Publication of CN109347868B publication Critical patent/CN109347868B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • H04L63/105Multiple levels of security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Marketing (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

本发明公开了一种信息验证方法,应用于区块链网络中,包括:获取第一交易信息,所述第一交易信息用于表征在所述区块链网络中的信息交互;基于所获取的第一交易信息,对所述第一交易信息的发起方进行验证;当确定所述第一交易信息的发起方位于轻量目录访问协议的服务节点中时,将所述第一交易信息中的交易数据提交至所述区块链网络中。本发明还公开了一种信息验证装置和存储介质。

Figure 201811429203

The invention discloses an information verification method, which is applied to a blockchain network and includes: acquiring first transaction information, where the first transaction information is used to represent information interaction in the blockchain network; The first transaction information of the first transaction information is verified, and the initiator of the first transaction information is verified; when it is determined that the initiator of the first transaction information is located in the service node of the Lightweight Directory Access Protocol, the first transaction information is stored in the The transaction data is submitted to the blockchain network. The invention also discloses an information verification device and a storage medium.

Figure 201811429203

Description

Information verification method, device and storage medium
Technical Field
The present invention relates to network and information verification technologies, and in particular, to an information verification method, an information verification apparatus, and a storage medium.
Background
In the use process of the existing block chain technology, because the identities of users at all nodes in a block chain network are equivalent and single, and the identity identifications of the users cannot be embodied through a multi-dimensional organizational structure such as a multilayer tree structure, the existing block chain network cannot utilize the logic relationship of the multilayer tree structure to perform service processing, and therefore, the existing block chain network cannot utilize the international relationship of all nodes to realize complex service logics related to the hierarchical relationship of the users, such as upper and lower transaction limits, fusing and the like, and cannot utilize the logic relationship of the multilayer tree structure to perform verification and recording on transactions in the block chain network.
Disclosure of Invention
The embodiment of the invention provides an information verification method, an information verification device and a storage medium, wherein first transaction information can be obtained and used for representing information interaction in a block chain network; verifying an initiator of the first transaction information based on the acquired first transaction information; when the initiator of the first transaction information is determined to be located in a service node of a lightweight directory access protocol, submitting transaction data in the first transaction information to the blockchain network. By submitting the transaction data in the first transaction information into the blockchain network, a formed directory tree of the blockchain network can be formed by mapping the user and identity hierarchical structure in the blockchain network to the lightweight directory access protocol service node by using the position of the initiator of the first transaction information in the lightweight directory access protocol service node, so as to further complete corresponding operation processing by using the formed tree-like storage structure.
The technical scheme of the embodiment of the invention is realized as follows:
the embodiment of the invention provides an information verification method, which is applied to a block chain network and comprises the following steps:
acquiring first transaction information, wherein the first transaction information is used for representing information interaction in the blockchain network;
verifying an initiator of the first transaction information based on the acquired first transaction information;
when the initiator of the first transaction information is determined to be located in a service node of a lightweight directory access protocol, submitting transaction data in the first transaction information to the blockchain network.
In the above scheme, the method further comprises:
when it is determined that the initiator of the first transaction information is not located in a service node of a lightweight directory access protocol, establishing a mapping and a hierarchy identity of a service node directory corresponding to the first transaction initiator for the blockchain network and the lightweight directory access protocol.
In the foregoing solution, the establishing a mapping and a hierarchical identity of a service node directory for the blockchain network and the lightweight directory access protocol, which correspond to the first transaction information initiator, includes:
according to the identity code of the first transaction initiator, encoding a public key corresponding to the first transaction initiator to form a first transaction user address;
mapping the formed user address to a tree structure formed by service nodes of the lightweight directory access protocol;
storing the formed user address in a directory of the lightweight directory access protocol.
In the foregoing solution, the encoding, according to the identity code of the first transaction initiator, the public key corresponding to the first transaction initiator to form a first transaction user address includes:
carrying out random hash coding on the public key initiated by the first transaction;
and performing binary to visual character string encoding based on the result of the random hash encoding to form a first transaction user address in a character string format.
In the above solution, the mapping the formed user address to the tree structure formed by the service node of the lightweight directory access protocol includes:
for each non-spent transaction output included in the first transaction information, tracing an output script corresponding to a previous non-spent transaction output for each non-spent transaction output;
based on the first transaction information, completing verification of matching of signature verification and corresponding public keys of each non-spending transaction output contained in the first transaction information in the blockchain network;
based on the first transaction information, completing hierarchical mapping and user right verification in a service node of the lightweight directory access protocol.
In the above solution, the completing the hierarchical mapping and the user right verification in the service node of the lightweight directory access protocol based on the first transaction information includes:
combining the identity coding information of the last transaction initiator corresponding to the first transaction information, the value of the corresponding coding bit and the response timestamp sequence into a data block, and sending the data block to a service node of the lightweight directory access protocol;
the service node of the lightweight directory access protocol stores the user information in the blockchain network in a logical hierarchy formed in an original blockchain network in the lightweight directory access protocol service node based on the received data block and forms a mapped directory tree according to the lightweight directory access protocol;
after the light weight directory access protocol service node is mapped successfully, sending confirmation information, and sending updated identity coding bit information based on the corresponding identity coding bit;
and the transaction party corresponding to the first transaction information encrypts the updated identity code bit information and the corresponding identity code through the corresponding public key, and adds the encrypted information to the non-cost transaction output in the first transaction information.
In the foregoing solution, the verifying the initiator of the first transaction information based on the acquired first transaction information includes:
and performing hierarchical mapping of the transaction user and authority verification of the transaction user in the service node of the lightweight directory access protocol.
In the above solution, the performing, in the service node of the lightweight directory access protocol, the hierarchical mapping of the transaction user and the authorization verification of the transaction user includes:
the execution node corresponding to the first transaction information acquires corresponding identity coding information, corresponding coding bit information and corresponding timestamp sequence information from the unspent transaction output of the previous transaction associated with the first transaction information;
sending the identity code of the transaction receiver corresponding to the first transaction information, and corresponding identity code bit and timestamp sequence information to a service node of the lightweight directory access protocol;
verifying the address of the transaction receiver corresponding to the first transaction information and the address of the father node of the transaction receiver corresponding to the first transaction information;
and when the address of the transaction receiver corresponding to the first transaction information is consistent with the verification of the address of the father node of the transaction receiver corresponding to the first transaction information, rejecting the transaction corresponding to the first transaction information.
In the above scheme, the method further comprises:
and when the address of the transaction receiver corresponding to the first transaction information is inconsistent with the verification of the address of the father node of the transaction receiver corresponding to the first transaction information, adding a new block comprising the first transaction information to the block chain network.
The embodiment of the present invention further provides an information verification apparatus, which is applied to a block chain network, and includes:
the information transmission module is used for acquiring first transaction information, and the first transaction information is used for representing information interaction in the block chain network;
the information processing module is used for verifying an initiator of the first transaction information based on the acquired first transaction information;
the information processing module is used for submitting the transaction data in the first transaction information to the blockchain network when the initiator of the first transaction information is determined to be located in a service node of a lightweight directory access protocol.
In the above-mentioned scheme, the first step of the method,
the information processing module is configured to establish a mapping and a hierarchical identity of a service node directory corresponding to the first transaction initiator for the blockchain network and the lightweight directory access protocol when it is determined that the initiator of the first transaction information is not located in a service node of the lightweight directory access protocol.
In the above-mentioned scheme, the first step of the method,
the information processing module is used for coding a public key corresponding to the first transaction initiator according to the identity code of the first transaction initiator to form a first transaction user address;
the information processing module is used for mapping the formed user address to a tree structure formed by the service node of the lightweight directory access protocol;
and the information processing module is used for storing the formed user address in a directory of the lightweight directory access protocol.
In the above-mentioned scheme, the first step of the method,
the information processing module is used for carrying out random hash coding on the public key initiated and sent by the first transaction;
and the information processing module is used for carrying out binary to visual character string coding based on the result of the random hash coding so as to form a first transaction user address in a character string format.
In the above-mentioned scheme, the first step of the method,
the information processing module is used for tracing an output script corresponding to the previous transaction output which is output according to each transaction which is not spent aiming at each transaction output which is not spent and is contained in the first transaction information;
the information processing module is used for completing verification of matching of signature verification and corresponding public keys of each non-spending transaction output in the first transaction information in the blockchain network based on the first transaction information;
and the information processing module is used for completing hierarchical mapping and user right verification in a service node of the lightweight directory access protocol based on the first transaction information.
In the above-mentioned scheme, the first step of the method,
the information processing module is used for combining the identity coding information of the last transaction initiator corresponding to the first transaction information, the value of the corresponding coding bit and the response timestamp sequence into a data block;
the information transmission module is used for sending the data block to a service node of the lightweight directory access protocol;
the information processing module is used for storing the user information in the block chain network in a logic hierarchical structure formed in an original block chain network in the lightweight directory access protocol service node and forming a mapped directory tree according to a lightweight directory access protocol;
the information transmission module is used for sending confirmation information after the lightweight directory access protocol service node is successfully mapped;
the information transmission module is used for sending updated identity coding bit information;
the information processing module is used for encrypting the updated identity coding bit information and the corresponding identity codes;
the information transmission module is used for adding the encrypted information to the non-cost transaction output in the first transaction information.
In the above scheme, the apparatus further comprises:
and the verification module is used for carrying out the hierarchical mapping of the transaction user and the authority verification of the transaction user in the service node of the lightweight directory access protocol.
In the above-mentioned scheme, the first step of the method,
the information processing module is used for acquiring corresponding identity coding information, corresponding coding bit information and corresponding timestamp sequence information of a corresponding transaction initiator from the unspent transaction output of the previous transaction related to the first transaction information;
the information transmission module is used for sending the identity code of the transaction receiver corresponding to the first transaction information, and corresponding identity code bit and timestamp sequence information to the service node of the lightweight directory access protocol;
the verification module is used for verifying the address of the transaction receiver corresponding to the first transaction information and the address of the father node of the transaction receiver corresponding to the first transaction information;
the information processing module is used for rejecting the transaction corresponding to the first transaction information when the address of the transaction receiver corresponding to the first transaction information is consistent with the verification of the address of the father node of the transaction receiver corresponding to the first transaction information.
In the above-mentioned scheme, the first step of the method,
the information processing module is configured to add a new block including the first transaction information to the block chain network when the verification of the address of the transaction receiver corresponding to the first transaction information is inconsistent with the verification of the address of the parent node of the transaction receiver corresponding to the first transaction information.
An embodiment of the present invention further provides an information verification apparatus, including:
a processor and a memory for storing executable instructions capable of running on the processor,
wherein the processor is configured to execute the executable instructions to perform the following operations:
acquiring first transaction information, wherein the first transaction information is used for representing information interaction in the blockchain network;
verifying an initiator of the first transaction information based on the acquired first transaction information;
when the initiator of the first transaction information is determined to be located in a service node of a lightweight directory access protocol, submitting transaction data in the first transaction information to the blockchain network.
An embodiment of the present invention further provides a computer-readable storage medium, which stores executable instructions, where the executable instructions, when executed by a processor, implement the following operations:
acquiring first transaction information, wherein the first transaction information is used for representing information interaction in the blockchain network;
verifying an initiator of the first transaction information based on the acquired first transaction information;
when the initiator of the first transaction information is determined to be located in a service node of a lightweight directory access protocol, submitting transaction data in the first transaction information to the blockchain network.
In the embodiment of the invention, first transaction information is acquired, and the first transaction information is used for representing information interaction in the block chain network; verifying an initiator of the first transaction information based on the acquired first transaction information; when the initiator of the first transaction information is determined to be located in a service node of a lightweight directory access protocol, submitting transaction data in the first transaction information to the blockchain network; the user and identity hierarchy in the blockchain network may be mapped to the LDAP service node and form a directory tree, and transaction processing through the blockchain network may be implemented by submitting transaction data in the first transaction information to the blockchain network.
Drawings
FIG. 1A is a diagram illustrating an organization of digital currency used in a transaction process according to an embodiment of the invention;
FIG. 1B is a schematic diagram of a user identity code during a transaction in an embodiment of the invention;
FIG. 1C is a schematic diagram of a user identity code during a transaction in an embodiment of the invention;
fig. 2 is a schematic process diagram of an alternative information verification method according to an embodiment of the present invention;
FIG. 3 is a diagram illustrating a process of performing hierarchical mapping and user right verification in a service node of the lightweight directory access protocol;
fig. 4 is a schematic diagram of an optional process of the information verification method according to the embodiment of the present invention
Fig. 5 is a schematic diagram illustrating a process of implementing communication with an LDAP service node and mapping a hierarchical relationship of a blockchain network to a corresponding LDAP directory according to an embodiment of the present invention;
fig. 6 is a schematic structural diagram of an alternative information verification apparatus according to an embodiment of the present invention;
fig. 7 is an alternative composition diagram of an information verification apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention clearer, the present invention will be further described in detail with reference to the accompanying drawings, the described embodiments should not be construed as limiting the present invention, and all other embodiments obtained by a person of ordinary skill in the art without creative efforts shall fall within the protection scope of the present invention.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein is for the purpose of describing embodiments of the invention only and is not intended to be limiting of the invention.
Before further detailed description of the embodiments of the present invention, terms and expressions mentioned in the embodiments of the present invention are explained, and the terms and expressions mentioned in the embodiments of the present invention are applied to the following explanations.
1) The transaction information is used for representing information interaction through the blockchain network, such as account transaction, transaction authorization admission and account transaction fusing.
2) The block chain network incorporates new blocks into a set of a series of centerless nodes of the block chain in a consensus manner, and has the capability of deploying intelligent contracts.
3) The Lightweight Directory Access Protocol (LDAP light Directory Access Protocol) is an information service for providing a Directory service, information in a Directory is organized according to a tree structure, specific information is stored in a data structure of an entry (entry), LDAP stores data in a file, and an index-based file database, rather than a relational database, may be used to improve efficiency.
4) The account book data, the actual block data storage, i.e. the record of a series of ordered and non-falsifiable transactions recorded in the blockchain, is represented in the form of a file system, including personal information of the user, and a series of records of transactions conducted using the blockchain network.
5) The state of the ledger, also referred to as state data, i.e., the state of the ledger data, may be expressed in the form of key-value pairs in the database terminal, including key-value pairs configured with the identification information of the user as a key and the personal information of the user as a value.
6) It is commonly recognized that a procedure in a blockchain network is used to agree between a plurality of nodes in the blockchain network, for example, to agree on whether to establish a mapping and a hierarchical identity for a service node directory of the blockchain network and a lightweight directory access protocol corresponding to the first transaction initiator, according to whether the initiator of the first transaction information is located in a service node of the lightweight directory access protocol. Mechanisms to achieve consensus include Proof of workload (PoW), Proof of rights of interest (PoS), Proof of authorization of shares (DPoS), Proof of Elapsed Time (PoET), and so on.
7) The intelligent contract is a program which is deployed in a blockchain network and is triggered to execute according to conditions, for example, the process of verifying the signature verification of each non-spent transaction output contained in the first transaction information and the matching of the corresponding public key in the blockchain network can be automatically triggered by the corresponding intelligent contract.
First, an organization structure of digital currency used in a transaction process in a blockchain network implementing an embodiment of the present invention will be described.
Fig. 1A is a schematic diagram of an organization structure of digital currency used in a transaction process in an embodiment of the present invention, where, in the transaction process, an owner 1 is an initiator of the transaction, an owner 2 is a receiver of the transaction, and a digital signature including a public key of the owner 1, specifically, a digital signature and a public key that may be for a public key of the owner 1, may be used to verify an asset bound by the owner 0 on the public key of the owner 1, and output a hash including a public key of the owner 2; when the owner 2 uses the asset obtained in transaction 2, a digital signature signed against the owner's 2 public key, and the owner's 2 public key, is verified using the owner's 2 private key. Further, the identity of the user participating in the transaction needs to be verified during the transaction, taking transaction 1 (transaction 1) as an example in the figure, owner 0 obtains a piece of digital asset through transaction 1, and if it needs to be transferred to owner 1 through transaction 1, the transaction submitted by the client (which may be represented as a node with a wallet function) includes:
1) in the input to the data structure of transaction 1, a digital signature signed by the private key of owner 0 is included (i.e., the signature of owner 0 is signed against the public key of the digital asset that owner 0 obtained in transaction 1).
2) In the output of transaction 1, the public key hash of owner 1 is included. The output script also comprises an encrypted transmission ciphertext.
The encrypted transmission ciphertext comprises an identity code of a sender of the current transaction 1, the number system information and a time stamp sequence, wherein the number system information is used for representing the number system adopted by the identity code. The above information is encrypted with the public key of the owner 1 of the current transaction. When owner 1 needs to transfer the digital asset obtained in transaction 1 to owner 2 through the client, the client transmits the ciphertext using encryption in the output forming transaction 2 as follows.
The encrypted transmission ciphertext of the transaction 1 is decrypted by using a private key of the owner 1 to obtain an identity code of the owner 0, the identity code of the owner 1 is obtained by updating based on the identity code of the owner 0, and the updated identity code (namely, the identity code of the owner 1, which is a sender of the transaction 2) is encrypted and operated by using a public key of a receiver of the current transaction (namely, a next owner, and an owner 2 of the next transaction referring to the current transaction) according to an irreversible encryption algorithm, such as an elliptic curve Encryption (ECC) algorithm, so as to form the encrypted transmission ciphertext.
Fig. 1B is a schematic diagram of user identity codes in the transaction process in the embodiment of the present invention, as shown in fig. 1B, the identity codes employ variable word length codes (a coding algorithm for constructing codewords with the shortest average length of different headers according to the occurrence probability of characters), for example, a huffman code-like manner, and each node embodies a hierarchical relationship by a digital code, where an identity code bit is the last digit of the identity code and embodies the order of the hierarchy to which the current user belongs. The user A has no identity code all the time, and the identity code of the user B is as follows: 0, identity code bit is 0. The identity code of user C is: 1, the identity code bit is 1. The identity code of user D is: 10, the identity code bit is 0. The identity code of user E is: and 11, the identity code bit is 1. The coding needs to determine a number system (binary, octal or hexadecimal, etc.) from the first transaction of the founding block, and the identity coding bits are arranged on the child nodes in a sequential branching and arranging manner according to the sequentially increasing manner of the carry-free ones of the corresponding number system, so as to embody the ordered hierarchical relationship. As shown in the figure, the binary coding mode is adopted, the maximum number of child node users of any user is 2, the right branch identity coding bit is 1, and the left branch identity coding bit is 0, so that a tree-shaped hierarchical structure of a binary tree is formed, the hierarchical relationship of a certain user can be uniquely determined through identity coding, and different binary systems can form a data structure of an n-branch tree.
Fig. 1C is a schematic diagram of a user identity code in a transaction process according to an embodiment of the present invention, as shown in fig. 1C, the blockchain network includes a plurality of peer-to-peer network nodes, and each of the network nodes includes a blockchain core service unit, a network communication unit, a consensus service unit, and other main modules, and a relevant service process is run under the corresponding module. Each network node is a specific user node, and all the user nodes automatically form a blockchain network after independently running the process service of each unit module, wherein the blockchain network is not hierarchical and is decentralized. The common identification mechanism of the blockchain network in this embodiment adopts a POW (i.e., workload certification), but the present disclosure does not limit the manner and kind of the common identification mechanism, and the adoption of the POW is only one of them, such as POS, DPOS, and under the adoption of the POW common identification mechanism, all or part of the user nodes in the blockchain network need to run "mine digging" (i.e., the relevant nodes perform a series of special random hash calculations on some special information in a competitive manner to continuously try to find a workload certification in their own block to meet the target of the preset difficulty number, and the user nodes that preferentially meet the workload certification can obtain the reward of electronic money, i.e., generate a digital asset carrier for transaction). Each node verifies the received transaction information, if verification is successful, the transaction information is included in a block, and when a node finds a workload certificate, the node broadcasts the block to the nodes of the whole network. Other nodes agree on the block only if all transactions contained in the block are valid and have not previously existed. The block exists in the current longest branch and is added with the block and other 5 verified blocks linked in after the block, and after 6 blocks are confirmed in total, the block is finally confirmed, that is, all transaction information in the block is finally approved. The specific implementation and operation mechanism of the "mining" program under the POW consensus mechanism is not limited to the above-mentioned manner, and is not intended to limit the scope of the present disclosure.
Besides a plurality of peer-to-peer network nodes, the whole system at least needs to include one LDAP service node, or an LDAP service cluster composed of a plurality of nodes. Each service node comprises an LDAP middleware service unit, an LDAP Client service unit and an LDAP Server service unit. The LDAP middleware service unit is operated with core programs such as LDAP middleware service process, database service including user address and identity code of storage block chain network node and related mapping relation metadata, related configuration file and operation script. The LDAP middleware service unit establishes and forms a corresponding tree directory structure on the basis of the block chain network user address and the identity code, completes the mapping with the recognizable service user information based on the LDAP, and introduces the service user information into the LDAP directory according to a Lightweight Directory Access Protocol (LDAP). The LDAP Server and LDAP Client mainly implement management and authentication of user rights, and installation, deployment and configuration thereof are mature technical solutions in the field and are not described herein again. The LDAP Server service unit can also be independent of the LDAP service node and deployed on another independent directory service node.
Fig. 2 is a schematic diagram of an optional process of the information verification method according to the embodiment of the present invention, and as shown in fig. 2, in a process of performing a transaction by a user in a blockchain network, the identity of the user in a different transaction shown in fig. 1A needs to be verified, where the optional process of the information verification method according to the embodiment of the present invention includes the following steps:
step 201: and acquiring first transaction information, wherein the first transaction information is used for representing information interaction in the blockchain network.
Specifically, in the blockchain network, different users can perform transactions to realize asset exchange, and in the transaction process, information interaction in the blockchain network can be indicated through first transaction information.
Step 202: verifying an initiator of the first transaction information based on the acquired first transaction information;
step 203: determining whether the initiator of the first transaction information is located in a service node of a lightweight directory access protocol, if so, executing step 204, otherwise, executing step 205;
step 204: and submitting the transaction data in the first transaction information to the blockchain network.
Step 205: establishing a mapping and a hierarchical identity of a service node directory corresponding to the first transaction initiator for the blockchain network and lightweight directory access protocol.
In one embodiment of the present invention, the establishing a mapping and a hierarchical identity of a service node directory for the blockchain network and lightweight directory access protocol corresponding to the first transaction information initiator includes:
according to the identity code of the first transaction initiator, encoding a public key corresponding to the first transaction initiator to form a first transaction user address; mapping the formed user address to a tree structure formed by service nodes of the lightweight directory access protocol; storing the formed user address in a directory of the lightweight directory access protocol. Through the technical solution shown in this embodiment, in the process of verifying the user identity shown in fig. 1B, before a new transaction submitted by a client, a transaction with a basic structure is formed, which includes input information: hash and index of previous transaction, input script and output information: the method comprises the steps of transferring the amount of assets and outputting a script, wherein the client is a special node which only has a wallet function in a block chain network and may not have the functions of a block chain and a mine digging function. The process of verifying whether the initiator of the transaction is at the user level includes: and starting a virtual machine operating environment, wherein the virtual machine operating environment is used for explaining and executing codes or instructions (such as an enhanced unlocking script in transaction input in a transaction list data packet, namely an intelligent contract code) in the transaction script to be submitted, the contract code finishes communication with the LDAP service node and judges whether the user address of the initiator in the current transaction information exists in a certain level (has a corresponding authority logic relationship) in the LDAP directory structure, and therefore, the verification of the user identity information is realized.
In an embodiment of the present invention, the encoding, according to the identity code of the first transaction initiator, the public key corresponding to the first transaction initiator to form a first transaction user address includes:
performing random hash encoding on the public key of the first transaction initiator; and performing binary to visual character string encoding based on the result of the random hash encoding to form a first transaction user address in a character string format. Through the technical scheme shown in this embodiment, in the process of verifying the identity of the first transaction initiator, when it is determined that the initiator of the first transaction information is not located in a service node of a Lightweight Directory Access Protocol (LDAP), user-level verification is required, the client encodes a public key corresponding to a transaction user (i.e., the initiator) according to an identity code to form a user address, for example, after performing random hash encoding on the public key of the initiator, binary-to-visual string encoding (Base58 encoding) is performed, a string composed of 58 characters formed by encoding is used as the user address, mapped into the LDAP service node to form a tree structure, and stored in a directory based on the Lightweight Directory Access Protocol (LDAP). The user address represents the address of a certain user in the block chain network. Thereby, the encoding of the address of the first transaction user is completed.
In an embodiment of the present invention, the mapping the formed user address to the tree structure formed by the service node of the lightweight directory access protocol includes:
for each non-spent transaction output included in the first transaction information, tracing an output script corresponding to a previous non-spent transaction output for each non-spent transaction output; based on the first transaction information, completing verification of matching of signature verification and corresponding public keys of each non-spending transaction output contained in the first transaction information in the blockchain network; based on the first transaction information, completing hierarchical mapping and user right verification in a service node of the lightweight directory access protocol.
Specifically, fig. 3 is a schematic diagram of a process of completing the hierarchical mapping and the user right verification in the service node of the lightweight directory access protocol, and as shown in fig. 3, the completing the hierarchical mapping and the user right verification in the service node of the lightweight directory access protocol based on the first transaction information includes the following steps:
step 301: the client executes the input script in the transaction to be submitted.
Specifically, the client obtains an output script (lock script) corresponding to each unspent transaction output in the previous transaction order by tracing the unspent transaction output in the previous transaction through an index field value in a pointer pointing to the UTXO in the transaction input (for example, the pointer is in the form of a hash value of the transaction where the UTXO is located and an index (index) implementation of the UTXO in the corresponding transaction), so as to obtain the unspent transaction output in the previous transaction order.
Step 302: the client verifies the input script in the transaction submitted by the generation, and completes the matching and verification of the basic signature and the public key in the unlocking process according to the locking rule of the output script in the UTXO quoted by the input script.
Further, it is also possible to perform hierarchical mapping and user authority verification in the LDAP service node for the enhanced function part (smart contract) code part in the input script.
The input script (unlocking script) of the current transaction is used for verifying the digital signature and the public key of the sender of the current transaction according to the output script which is output by the unconsumed transaction of the previous transaction and indexed according to the locking rule in the output script, the random hash value of the public key of the receiver and other information.
Step 303: the intelligent contract code interacts with a local communication service process of the client, and the local communication service process establishes communication with an LDAP middleware service process of the LDAP service node.
Specifically, the identity of the initiator of the previous transaction, the value of the latest encoded bit and the corresponding timestamp sequence (obtained by locating the UTXO of the previous transaction and decrypting the encrypted transmission ciphertext), the address of the current user (of the initiator of the current transaction) and other state control bit information are encoded into a packed data block, and the packed data block is sent to the LDAP service node.
Step 304: and the LDAP middleware service process converts the user information of the original block chain network based on the user address and the identity code into the user information of a service level according to the received data packet and establishes and generates a recognizable file format.
Specifically, after receiving a data packet, an LDAP middleware Service process in an LDAP Service node divides an n-branch tree-shaped hierarchical structure logically formed on the basis of identity codes in a block chain network one by one, sequentially constructs an n-branch tree-shaped data structure according to the identity codes and the number size of identity code bits, stores the identity codes and the node hierarchical structure relationship in a local database, converts user information of an original block chain network based on a user address and the identity codes into user information of a Service level, establishes and generates a file format recognizable by an LDAP Service (lightweight directory access protocol Service) and introduces the file format into an LDAP DB (lightweight directory access protocol Service database). The user information in the blockchain network is stored in the LDAP service node in a logic hierarchical structure formed in the original blockchain network, and a mapped directory tree is formed according to a Lightweight Directory Access Protocol (LDAP).
Step 305: and after the LDAP service node is successfully mapped, the LDAP service node returns confirmation information to the intelligent contract code, and returns the identity coding bit updated based on the current user address to the intelligent contract code in sequence according to the identity coding bit of the current user address in the hierarchical directory.
And the returned identity code bit of the current user address update is the identity code of the receiver of the current transaction.
Step 306: and after acquiring the updated identity code bit, the intelligent contract code is added to the identity code obtained by decryption to be used as the identity code of the receiver of the current transaction, and the identity code bit are encrypted by using the public key of the receiver of the current transaction and are added into the output script of the current transaction which is not output by the transaction.
And the identity code obtained by decryption is the address of the initiator of the previous transaction.
The output script of the current transaction may further include numerical information (indicating that the identity code is sequentially encoded in binary, octal, or hexadecimal) and a corresponding timestamp sequence.
The intelligent contract adds an updated identity coding bit returned by the LDAP service to the end of an identity coding of an unlocking script (previous transaction) so as to form a new identity coding (if an original identity coding in the locking script is 10, and the current updated identity coding bit is 0, the new identity coding is 100), the new identity coding is used as an identity coding of a sender of the current transaction, the new identity coding and a corresponding timestamp, and the updated identity coding bit form an encrypted transmission ciphertext by using the public encryption of a receiver of the next transaction, and the encrypted transmission ciphertext is added into an output script output by the current transaction.
For the condition that a plurality of transactions are output without cost in the current transaction, the LDAP service node updates the identity coding bit value in a mode of sequentially increasing and accumulating according to the output index sequence number on the basis of the updated identity coding bit, so that the intelligent contract is added to the tail of the unlocked identity coding, a new identity coding corresponding to a receiver of each UTXO is formed, and the new identity coding is added to an output script of the corresponding UTXO until the identity coding bit is increased to the maximum representation value of the set numerical system; the maximum representation value of the binary identity coding bit is 1, and the maximum representation value of the hexadecimal identity coding bit is F; and completing the identity establishment of all nodes in the hierarchy. Meanwhile, only one transaction is input in the data packet of the transaction (admission mechanism transaction), and the special functions of directory hierarchy mapping, authorization verification and the like are completed by distinguishing the transaction from the common transaction.
Further, as an alternative to locating the UTXO of the previous transaction from the input script of the current transaction to obtain the identity code of the sender of the current transaction in step 303, in the intelligent contract code in the input script of the current user, the identity code corresponding to the previous user address (i.e., the address of the sender of the UTXO of the previous transaction referred to by the input transaction script of the current transaction) may be directly set, so that it is not necessary to locate the lock script of the UTXO of the previous transaction, and the current user address is directly mounted below the level of the address of the sender of the current transaction in a manner that the updated identity code bit returned by the LDAP is added to the end of the current user address (the address of the receiver of the current transaction).
In one embodiment of the present invention, the performing, in the service node of the lightweight directory access protocol, hierarchical mapping and user right verification based on the first transaction information includes:
combining the identity coding information of the last transaction initiator corresponding to the first transaction information, the value of the corresponding coding bit and the response timestamp sequence into a data block, and sending the data block to a service node of the lightweight directory access protocol; the service node of the lightweight directory access protocol stores the user information in the blockchain network in a logical hierarchy formed in an original blockchain network in the lightweight directory access protocol service node based on the received data block and forms a mapped directory tree according to the lightweight directory access protocol; after the light weight directory access protocol service node is mapped successfully, sending confirmation information, and sending updated identity coding bit information based on the corresponding identity coding bit; and the transaction party corresponding to the first transaction information encrypts the updated identity code bit information and the corresponding identity code through the corresponding public key, and adds the encrypted information to the non-cost transaction output in the first transaction information. Through the technical scheme shown in this embodiment, after the lightweight directory access protocol service node is successfully mapped, the unconsumed transaction output in the first transaction information includes the updated identity encoding bit information and the corresponding identity encoding that have been encrypted.
In an embodiment of the present invention, the verifying the initiator of the first transaction information based on the acquired first transaction information includes:
and performing hierarchical mapping of the transaction user and authority verification of the transaction user in the service node of the lightweight directory access protocol.
In an embodiment of the present invention, said performing, in the service node of the lightweight directory access protocol, hierarchical mapping of the transaction user and authorization verification of the transaction user includes:
the execution node corresponding to the first transaction information acquires corresponding identity coding information, corresponding coding bit information and corresponding timestamp sequence information from the unspent transaction output of the previous transaction associated with the first transaction information;
sending the identity code of the transaction receiver corresponding to the first transaction information, and corresponding identity code bit and timestamp sequence information to a service node of the lightweight directory access protocol;
verifying the address of the transaction receiver corresponding to the first transaction information and the address of the father node of the transaction receiver corresponding to the first transaction information;
when the address of the transaction receiver corresponding to the first transaction information is consistent with the verification of the address of the father node of the transaction receiver corresponding to the first transaction information, rejecting the transaction corresponding to the first transaction information;
further, when the address of the transaction receiver corresponding to the first transaction information is inconsistent with the verification of the address of the parent node of the transaction receiver corresponding to the first transaction information, adding a new block including the first transaction information to the block chain network. Through the technical scheme shown in the embodiment, when the verification is inconsistent, the unlocking is successful, and the next consensus mechanism is confirmed. After the final confirmation of the consensus mechanism is completed, the new block containing the associated transaction will be linked into the blockchain backbone to complete the authorized transaction.
Through the embodiments shown in the above steps 201 to 205, the logically implicit tree-like hierarchical structure formed by the admission mechanism transaction establishment in the block link network has non-tamper-ability and uniqueness. More applicable to business environments such as enterprise interior or alliance chain. This requires that the organizational hierarchy be established from the beginning, that a root organizational user be established from the beginning by the foundational block and that the root organizational user initiate the establishment of a given maximum number of highest level organizational users as the highest level enterprise within the enterprise or within the federation. Then each highest organization user gradually initiates the admission mechanism transaction downwards, and establishes a multi-level tree-shaped hierarchical structure, the formation and establishment of the logic hierarchical structure are gradually completed according to the admission mechanism transaction and are decentralized, but the traditional technical proposal that the hierarchical structure is directly and completely established at a central node at one time. Meanwhile, in the block chain network, all nodes can still mutually and equally initiate common transactions, but can initiate admission mechanism transactions under some special service scenes, and corresponding transactions and service behaviors are authorized to be determined by directory hierarchy and various logic relations through the expansion and enhancement of intelligent contract interpretation scripts, so that a service system of a block chain can adapt to more complex business application scenes.
Meanwhile, the LDAP directory tree formed by mapping the block chain network identity code to the LDAP service node can be changed according to specific service requirements. The LDAP service node forms a new corresponding relation between a directory tree after the LDAP service node is changed and the original user identity code in the block chain network based on the block chain network identity code and the originally constructed tree hierarchy relation, establishes new service user information, and maps the new service user information into a lightweight directory access protocol LDAP directory so as to judge the directory hierarchy and various logic relations according to the new corresponding relation when the admission mechanism transaction is carried out.
In one embodiment of the invention, when mapping and hierarchical identity establishment from the blockchain network to the LDAP service node directory are completed, a transaction is submitted to the blockchain network, an adjacent node receiving transaction data executes an input script of the transaction to perform basic signature and public key matching and verification, and hierarchical mapping and user authority verification in the LDAP service node are completed for an enhanced function part (intelligent contract) code part in the input script.
For the hierarchy mapping and user authority verification in the LDAP service node, after the LDAP node receives the identity code after the intelligent contract is sent and decrypted, the value of the latest coding bit, the corresponding timestamp sequence and the current user address, the LDAP service node judges various logic relations or admission mechanisms according to the established rule and a directory structure formed by mapping in the identity code mode, the corresponding rule is established by a locking rule set by an output script, and the unlocking verification is carried out by the intelligent contract code of the input script according to the rule. If the rule is set to be that the current user can not initiate a transaction to a previous-level user, the current user wants to spend assets in the corresponding unspent transaction output in the previous transaction (quoted in the input of the current transaction) in the current transaction and unlock the transaction according to the corresponding rule, if a receiver in the unspent transaction output of the current transaction is the previous-level user of the current user, the verification of the intelligent contract will fail, and the transaction will be rejected by the blockchain network.
Specifically, the verification process may be implemented by:
and step A, the adjacent node executes an input script, and acquires an identity code corresponding to a previous layer user address (an address of a sender of the previous transaction), a latest code bit and a timestamp sequence from previous non-cost transaction output (UTXO referenced in the input of the current transaction).
Executing an input script of a transaction to be submitted: for each non-spent transaction output (UTXO) in the current transaction data packet to be submitted, the non-spent transaction output in the last transaction can be traced through an index field value in a pointer pointing to the UTXO in the transaction input (for example, the pointer adopts the form of a hash value of the transaction in which the UTXO is positioned and an index (index) of the UTXO in the corresponding transaction to realize), so that an output script (locking script) corresponding to the non-spent transaction output in the last transaction list is obtained, and an encrypted transmission ciphertext in the output script is decrypted by using a private key of the current transaction initiator, so that an identity code, a latest coding bit and a timestamp sequence corresponding to a last layer of user address (the address of a sender of the previous transaction) are obtained.
And B, performing basic signature and public key matching verification on the intelligent contract code of the input script according to a locking rule set by an output script output by the previous unconsumed transaction, and after the verification is passed, interacting the intelligent contract code with a local communication service process of an adjacent node, transmitting the identity code, the identity code bit and the time stamp sequence value of a receiver of the current transaction to the LDAP service node, and appointing an instruction to acquire the user address of a previous-level user (a parent user of the receiver of the current transaction in a user hierarchy).
Then, the communication Service process communicates with the LDAP middleware Service process of the LDAP Service node, the LDAP middleware Service process locates the corresponding current user address in the local directory structure according to the obtained identity code, the identity code bit, the time stamp sequence value and the request instruction, and communicates with the LDAP Service (lightweight directory access protocol Service end) through an LDAP Client according to the mapping relation between the block chain network user information and the Service user information to carry out LDAP identity verification, if the verification is passed, the upper-level user information of the current user located in the latest LDAP directory is searched, the LDAP middleware Service process corresponds to the user information of the block chain network, namely the user address and the identity code according to the user information, and finally returns the upper-level user address of the current user to the intelligent contract code.
And step C, the intelligent contract verifies and compares the acquired user address of the upper-level node with a corresponding user address of a receiver in the non-cost transaction output of the current transaction, if the verification and comparison result is consistent, the receiver of the next transaction is the upper-level node (father node), and the transaction cannot be initiated to the upper-level node according to the locking rule, so that the transaction is unlocked unsuccessfully, the transaction request is rejected according to a corresponding consensus algorithm mechanism, and if the transaction request is rejected to be brought into a new block under a POW consensus mechanism. And if the verification is inconsistent, the unlocking is successful, and the next step of confirming the consensus mechanism is carried out. After the final confirmation of the consensus mechanism is completed, the new block containing the associated transaction will be linked into the blockchain backbone to complete the authorized transaction.
The input script (unlocking script) of the current transaction is used for verifying the mining node receiving the transaction data when the unconsumed transaction output in the previous transaction needs to be spent in the current transaction: and according to the output script which is output by the unconsumed transaction of the previous transaction and indexed, verifying the digital signature and the public key of the sender of the current transaction according to the locking rule, the random hash value of the public key of the receiver and other information.
Fig. 4 is a schematic diagram of an optional process of the information verification method according to the embodiment of the present invention, and as shown in fig. 4, in a process of performing a transaction by a user in a blockchain network, the identity of the user in a different transaction shown in fig. 1A needs to be verified, where the optional process of the information verification method according to the embodiment of the present invention includes the following steps:
step 401: each user performs initial configuration and starts a block chain core service unit and a service process related to a network communication unit.
The IP and port of the necessary node are convenient for establishing TCP connection for network discovery; the method mainly comprises a block chain core process, a communication service process and the like. The relevant user node then initiates the POW service process, generating a created block (the numerical system set forth in this case is binary for example), at which point the initial blockchain network is up and running. Meanwhile, starting the LDAP Client service and the LDAP Server service on all the LDAP service nodes (if the LDAP service nodes are), then carrying out initial configuration on the LDAP middleware service unit and starting a corresponding service process.
Step 402: one root organization user and 2 highest organization users are determined from the node user addresses that have acquired the rewards in the blockchain network and a hierarchical structure is established.
The method comprises the steps that an admission mechanism transaction can be initiated to user addresses created by 2 highest mechanism users respectively through user addresses with assets on root organization users, the assets obtained by the users with the assets on the root organization users are obtained through a mine digging reward transaction (the mine digging reward transaction belongs to a special mine base transaction, the unlocking verification processing process of the reward assets spent by nodes of the mine digging reward transaction is consistent with the processing mode in the prior block chain technology and is not repeated here), and meanwhile, a hierarchical structure needs to be established, so that an output script in the non-spent transaction output of the admission mechanism transaction needs to set an agreed rule of intelligent contract codes for directory hierarchical mapping expansion.
The root organization user and the highest organization user generally refer to the node running the most complete process (including client side 'wallet' management related process, block chain network core process, network communication service process, consensus mechanism service process and the like), and a user address is created through the service process of the wallet, and the owner of the address serves as the highest administrator or organization.
Step 403: the root organization user will execute the intelligent contract in the transaction input to be executed, completing the hierarchical mapping of the intelligent contract code in the LDAP service node according to the hierarchical structure in the current blockchain network.
Thus, communication with the LDAP service node and mapping of the hierarchical relationship of the blockchain network to the corresponding LDAP directory are achieved.
Wherein, the steps of implementing communication with the LDAP service node and mapping the hierarchical relationship of the blockchain network to the corresponding LDAP directory may be completed as shown in fig. 5, where fig. 5 is a schematic diagram of a process of implementing communication with the LDAP service node and mapping the hierarchical relationship of the blockchain network to the corresponding LDAP directory, according to an embodiment of the present invention:
step 501: and starting a virtual machine running environment by a client of a root organization user to execute the input script, and carrying out unlocking verification on the input script according to the positioned contract rule of the output script in the non-cost transaction output.
Step 502: and verifying the random hash value and the signature of the public key, and decrypting the identity coding ciphertext after the verification is passed.
The admission mechanism transaction originated from the root organization user, and the root organization user has no identity code, so the root organization user is null and represents that a hierarchical structure is not formed in the current block chain network, and if the identity code is not null, the hierarchical structure in the current block chain network is represented.
Step 503: the intelligent contract code will interact with a local communication service process that will establish communication with an LDAP middleware service process of the LDAP service node.
And forming a packed data block by the decrypted identity code, the value of the latest coded bit, the corresponding timestamp sequence, the current user address and other state control bit information and the like, and sending the packed data block to the LDAP service node, wherein the values of the decrypted identity code and the latest coded bit can be all null values.
Step 504: after receiving the data packet, the LDAP middleware service process in the service node analyzes the data packet, acquires the identity code, the identity code bit and the user address information, and stores the user address information, the corresponding identity code and other metadata required for constructing a logic hierarchical structure and a relation in a database corresponding to the LDAP middleware service process.
Step 505: the LDAP middleware Service process establishes the Service user information based on the lightweight directory access protocol and generates a file format which can be identified by the LDAP Service on the basis of the identity code and the user address.
Furthermore, the recognizable file can be automatically imported into the LDAP DB through a script, and meanwhile, the mapping information is also stored into a local database corresponding to the LDAP middleware service process.
Step 506: the LDAP middleware service process confirms the hierarchical sequence of the current node in the blockchain network through the hierarchical expansion rule and the identity code of the admission mechanism transaction and finally forms the hierarchical structure among the selected nodes in the blockchain network.
Specifically, after the LDAP directory is successfully established, the LDAP middleware service process obtains all nodes and identity coding bit information thereof (initial identity coding bit is 0) at all the identity coding levels in the local database according to the identity code, compares the obtained identity coding bit information with the received identity coding bit information, and determines the updated identity coding bit in sequence: automatically accumulating 1 according to the value of the current identity coding bit and synchronously writing the value back to a database (which is an atomic operation), then returning the accumulated identity coding bit to an intelligent contract, confirming the hierarchy sequence of the current node in the block chain network through the hierarchy expansion rule and the identity coding of the access mechanism transaction, and finally forming the hierarchy structure among the selected nodes in the block chain network.
Step 507: and after acquiring the updated identity coding bit, the contract script appends the updated identity coding bit to the end of the identity coding bit (corresponding to the sender of the previous transaction) obtained after unlocking the cipher text input in the previous transaction) to form a new identity code (serving as the identity code of the sender of the current transaction), and adds the identity code, the new identity coding bit obtained by returning and a random hash value calculated by the user address of the receiver to an output script output by the current to-be-submitted non-cost transaction, wherein the identity code is the cipher text formed after being encrypted according to an elliptic curve encryption algorithm (ECC), and sets an unlocking contract code of the next transaction.
Through steps 501 to 507, communication with the LDAP service node and mapping of the hierarchical relationship of the blockchain network to the corresponding LDAP directory is completed.
Step 404: the root organization node client submits the transaction data of the current transaction to the blockchain network, and the adjacent nodes receiving the transaction information perform basic validity verification and user permission verification on the transaction by executing the input script.
Wherein, whether the amount in the previous non-spending transaction output corresponding to the positioning transaction input satisfies the current transaction amount, and the accuracy of the format of each data bit value, etc. If the verification fails, the node will not bring the transaction information into the local block, and will not continue to transmit the transaction information to the network, and the intelligent contract rule is an admission mechanism, such as: and establishing a logic hierarchy structure between specific nodes (preferably a root organization user and a highest organization user), wherein the initiator and the receiver of the current transaction are matched and verified.
The highest organization node is used as a receiver of the transaction, when the transaction needs to be input, authorization unlocking verification needs to be carried out, wherein a contract rule is to establish a hierarchical structure between a root organization node and 2 highest organization nodes, so that the identity and the hierarchical structure can be finally confirmed in the block chain network only if the verification is successful, and meanwhile, a hierarchical directory structure is formed in an LDAP directory of the LDAP service node.
If any of the above verifications fail, the transaction will not be authorized to be completed and the transaction is denied. Meanwhile, if the POW service process is operated on the POW service process, the node does not bring the transaction information into the local block and also does not continuously transmit the transaction information to the network.
If the verification is successful, the adjacent node brings the transaction information into a local block and broadcasts the transaction information, and other nodes running with the POW service also bring the transaction information into the local block and compete after receiving the transaction information.
When the nearby node running the POW service completes the workload certification with enough difficulty, the nearby node broadcasts a block including the verification transaction to the whole network, if the transaction in the block is valid, other nodes recognize the block and confirm that the transaction is completed, and the recognition mode is to link the subsequent blocks into the block.
Thus, an implicit logical tree-like hierarchical structure relationship formed by the root organization node and the 2 highest organization nodes is established in the block chain network, and the hierarchical structure is mapped to the LDAP directory corresponding to the LDAP service node to form a corresponding permission directory.
The highest agency user can sequentially initiate the admission mechanism transaction in sequence according to the overall plan of the hierarchy (authority) in the company or in the alliance, for example, to gradually expand the hierarchical structure in the block chain network and map the hierarchical structure into the LDAP directory corresponding to the LDAP service node, in this example, the highest agency user a (identity code 0) initiates the admission mechanism transaction with the expanded hierarchical structure of the directory, and the new node D (identity code 01) is included under the hierarchical directory.
Step 405: the intelligent contract rule based on the logic relationship is set in the output script in the non-cost transaction output of the transaction order data sent to the user D by the highest mechanism user A as follows: a transaction cannot be initiated to an upper level user.
The intelligent contract and the rule are flexibly set and can be set according to specific service scenes, so that the promissory party can only perform processing operation according to contract regulations, and certain authorization conventions and specifications in service are guaranteed.
Step 406: and the user D initiates a transaction to the highest mechanism user A at the upper stage, and the adjacent node receiving the transaction carries out transaction verification.
After the virtual machine environment of the adjacent node runs, executing an input script, positioning the last uneaten transaction output quoted in the input of the current transaction, and performing unlocking verification according to a contract rule, wherein the unlocking verification comprises the following steps:
firstly, verifying the random hash value and the signature of the public key, and decrypting the identity code ciphertext (the identity code is 0 at the moment) after the verification is passed;
second, the smart contract code will interact with a local communication service process that will establish communication with an LDAP middleware service process of the LDAP service node. And (4) forming a packed data block by the decrypted identity code, the value of the latest coded bit and the service rule request corresponding to the timestamp sequence, the current user address and other state control bit information and the like, and sending the packed data block to the LDAP service node.
And after receiving the data packet, the LDAP middleware service process in the service node analyzes the data packet to acquire the identity code, the identity code bit and the user address information, retrieves and matches the database according to the received identity code and the user address information, and if the identity code and the user address information are not successfully matched, the LDAP middleware service process fails in authorization and returns failure information. If the matching is successful, acquiring the service user information which can be identified by the LDAP according to the mapping relation between the identity code in the block chain network and the service user information of the LDAP directory corresponding to the user address (the mapping relation means that the identity code bit is split according to the rule so that different levels can correspond to different domains or organization units in the LDAP directory, and the user address can correspond to the specific service user information corresponding to the organization unit). And the identity authentication is initiated to the LDAP Server end by the service user information through the LDAP Cient, and the authentication is successful if the service user information is in the corresponding hierarchical directory. Specifically, the hierarchy to which the identity code belongs can be obtained according to the identity code, and the nth entry in the LDAP directory can be positioned according to the hierarchy to which the identity code belongs and the corresponding service user information, so that the directory hierarchy and the user information of the identity code can be obtained.
If the verification is passed, the LDAP middleware service process returns the superior user address and the confirmation information of the current user according to the service rule request.
Thirdly, the intelligent contract code verifies and compares the acquired user address with a corresponding receiver user address in the next non-spending transaction output, and if the result is consistent, the receiver is the upper-level node, so that the transaction is failed to be unlocked. If the results are inconsistent, the transaction unlocking is successful, the current transaction is brought into the block, the transaction information is broadcasted, and other nodes running with the POW service are brought into a local block and compete after receiving the transaction information.
When the competition is successful, the block is included in the block chain, and the transaction initiated by the user D to A is confirmed. And incorporating the random hash calculation value of the user address of the receiver, the locking rule of the next intelligent contract and other information into the output script output by the next unconsumed transaction for the unlocking verification of the receiver of the next transaction.
Through the steps shown in the embodiments 401 to 406, a series of core function flows of communicating with an LDAP service node and mapping the hierarchical relationship of the blockchain network to a corresponding LDAP directory, determining the hierarchical sequence of the current node in the blockchain network by a special node in the blockchain network through the hierarchical expansion rule and the identity code of the admission mechanism transaction, and finally forming the hierarchical structure between selected nodes in the blockchain network, and finally, initiating the special admission mechanism transaction by the special node according to the intelligent contract rule so that the promissory performs unlocking verification and performs related service transaction processing according to the rule are realized.
Fig. 6 is a schematic diagram of an alternative structure of an information verification apparatus according to an embodiment of the present invention, where the information verification apparatus is applied to fig. 6, and the alternative structure of the information verification apparatus according to the embodiment of the present invention includes:
an information transmission module 601, configured to obtain first transaction information, where the first transaction information is used to represent information interaction in the blockchain network;
an information processing module 602, configured to verify an initiator of the first transaction information based on the acquired first transaction information;
the information processing module 602 is configured to submit the transaction data in the first transaction information to the blockchain network when it is determined that the initiator of the first transaction information is located in a service node of a lightweight directory access protocol.
Specifically, in the blockchain network, different users can perform transactions to realize asset exchange, and in the transaction process, information interaction in the blockchain network can be indicated through first transaction information.
In an embodiment of the present invention, the information processing module 602 is configured to, when it is determined that the initiator of the first transaction information is not located in a service node of a lightweight directory access protocol, establish a mapping and a hierarchical identity of a service node directory corresponding to the first transaction initiator for the blockchain network and the lightweight directory access protocol. Through the technical solution shown in this embodiment, in the process of verifying the user identity shown in fig. 1B, before a new transaction submitted by a client, a transaction with a basic structure is formed, which includes input information: hash and index of previous transaction, input script and output information: the method comprises the steps of transferring the amount of assets and outputting a script, wherein the client is a special node which only has a wallet function in a block chain network and may not have the functions of a block chain and a mine digging function. The process of verifying whether the initiator of the transaction is at the user level includes: starting a virtual machine operating environment, where the virtual machine operating environment is used to interpret and execute codes or instructions in a transaction script to be submitted (such as an enhanced unlocking script in a transaction input in a transaction list data packet, that is, an intelligent contract code), and the contract code completes communication with an LDAP service node and judges whether a user address of an initiator in current transaction information exists in a certain level (with a corresponding authority logical relationship) in an LDAP directory structure, so that the information processing module 602 realizes verification of user identity information.
In an embodiment of the present invention, the information processing module 602 is configured to encode a public key corresponding to the first transaction initiator according to the identity code of the first transaction initiator to form a first transaction user address; the information processing module 602 is configured to map the formed user address to a tree structure formed by service nodes of the lightweight directory access protocol; the information processing module 602 is configured to store the formed user address in a directory of the lightweight directory access protocol.
In an embodiment of the present invention, the information processing module 602 is configured to perform random hash encoding on a public key initiated by the first transaction;
the information processing module 602 is configured to perform binary to visual string encoding based on the result of the random hash encoding to form a first transaction user address in a string format. Through the technical solution shown in this embodiment, in the process that the information processing module 602 verifies the identity of the first transaction initiator, when the information processing module 602 determines that the initiator of the first transaction information is not located in a service node of a lightweight directory access protocol, user-level verification is required, the client encodes a public key corresponding to a transaction user (i.e., the initiator) according to an identity code to form a user address, for example, after performing random hash encoding on the public key of the initiator, performs binary to visible character string encoding (Base58 encoding), maps a character string formed by 58 characters formed by encoding as the user address into an LDAP service node to form a tree structure, and stores the tree structure in a directory based on the Lightweight Directory Access Protocol (LDAP). The user address represents the address of a certain user in the block chain network. Thereby, the encoding of the address of the first transaction user is completed.
In an embodiment of the present invention, the information processing module 602 is configured to trace, for each unspent transaction output included in the first transaction information, an output script corresponding to a previous unspent transaction output for the each unspent transaction output;
the information processing module 602 is configured to complete verification in the blockchain network of matching between a signature verification included in each non-spent transaction output in the first transaction information and a corresponding public key based on the first transaction information;
the information processing module 602 is configured to complete hierarchical mapping and user right verification in a service node of the lightweight directory access protocol based on the first transaction information.
In an embodiment of the present invention, the information processing module 602 is configured to combine the identity encoding information of the previous transaction initiator corresponding to the first transaction information and the corresponding value of the encoding bit with the timestamp sequence of the response into a data block;
the information transmission module 601 is configured to send the data block to a service node of the lightweight directory access protocol;
the information processing module 602 is configured to store the user information in the blockchain network in the lightweight directory access protocol service node in a logical hierarchy formed in an original blockchain network and form a mapped directory tree according to a lightweight directory access protocol;
the information transmission module 601 is configured to send out confirmation information after the lightweight directory access protocol service node is successfully mapped;
the information transmission module 601 is configured to send updated identity coded bit information;
the information processing module 602 is configured to encrypt the updated identity encoding bit information and the corresponding identity encoding;
the information transmission module 601 is configured to add the encrypted information to the non-spending transaction output in the first transaction information.
In one embodiment of the invention, the apparatus further comprises:
and the verification module (not shown in the figure) is used for performing the hierarchical mapping of the transaction user and the authority verification of the transaction user in the service node of the lightweight directory access protocol.
In an embodiment of the present invention, the information processing module 602 is configured to obtain, from an unspent transaction output of a previous transaction associated with the first transaction information, identity encoding information corresponding to a corresponding transaction initiator, and corresponding encoding bit information and timestamp sequence information;
the information transmission module 601 is configured to send, to the service node of the lightweight directory access protocol, an identity code of a transaction recipient corresponding to the first transaction information, and corresponding identity code bits and timestamp sequence information;
the verification module is used for verifying the address of the transaction receiver corresponding to the first transaction information and the address of the father node of the transaction receiver corresponding to the first transaction information;
the information processing module 602 is configured to reject the transaction corresponding to the first transaction information when the verification of the address of the transaction receiver corresponding to the first transaction information is consistent with the verification of the address of the parent node of the transaction receiver corresponding to the first transaction information.
In an embodiment of the present invention, the information processing module 602 is configured to add a new block including the first transaction information to the blockchain network when the verification of the address of the transaction receiver corresponding to the first transaction information is inconsistent with the verification of the address of the parent node of the transaction receiver corresponding to the first transaction information.
Fig. 7 is an optional schematic diagram of the information verification apparatus according to the embodiment of the present invention, and as shown in fig. 7, the information verification apparatus 700 may be an apparatus with a storage space having a display function and a communication function. The information verification apparatus 700 shown in fig. 12 includes: at least one processor 701, a memory 702, at least one network interface 704, and a user interface 703. The various components in the information verification apparatus 700 are coupled together by a bus system 705. It is understood that the bus system 705 is used to enable communications among the components. The bus system 705 includes a power bus, a control bus, and a status signal bus in addition to a data bus. But for clarity of illustration the various busses are labeled in figure 7 as the bus system 705.
The user interface 703 may include, among other things, a display, a keyboard, a mouse, a trackball, a click wheel, a key, a button, a touch pad, or a touch screen.
It will be appreciated that the memory 702 can be either volatile memory or nonvolatile memory, and can include both volatile and nonvolatile memory. The memory 702 described in connection with the embodiments of the invention is intended to comprise these and any other suitable types of memory.
The memory 702 in the embodiment of the present invention is used to store various types of data included in the storage information to support the operation of the information verification apparatus 700. Examples of such data include: any computer programs for operating on the information verification apparatus 700, such as an operating system 7021 and application programs 7022; transaction data, user information, intelligent contracts, etc. The operating system 7021 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, for implementing various basic services and processing hardware-based tasks. The application 7022 may include various applications such as a client with an image processing function, a Media Player (Media Player), a Browser (Browser), and the like, for implementing various application services including a pass authentication information processing program. A program for implementing the information verification method according to the embodiment of the present invention may be included in the application program 7022.
The method disclosed in the above embodiments of the present invention may be applied to the processor 701, or implemented by the processor 701. The processor 701 may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be implemented by integrated logic circuits of hardware or operations in the form of software in the processor 701. The Processor 701 may be a general purpose Processor, a Digital Signal Processor (DSP), or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. The processor 701 may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present invention. A general purpose processor may be a microprocessor or any conventional processor or the like. The steps of the method disclosed by the embodiment of the invention can be directly implemented by a hardware decoding processor, or can be implemented by combining hardware and software modules in the decoding processor. The software modules may be located in a storage medium located in the memory 702, and the processor 701 may read the information in the memory 702 and perform the steps of the aforementioned methods in conjunction with its hardware.
In an exemplary embodiment, the information verification apparatus 700 may be implemented by one or more Application Specific Integrated Circuits (ASICs), DSPs, Programmable Logic Devices (PLDs), Complex Programmable Logic Devices (CPLDs), Field Programmable Gate Arrays (FPGAs), general purpose processors, controllers, Micro Controllers (MCUs), microprocessors (microprocessors), or other electronic components for performing the object information processing method.
In an exemplary embodiment, the present invention further provides a computer-readable storage medium, such as the memory 702 including a computer program, which can be executed by the processor 701 of the information verification apparatus 700 to implement the steps of the foregoing method. The computer readable storage medium can be Memory such as FRAM, ROM, PROM, EPROM, EEPROM, Flash Memory, magnetic surface Memory, optical disk, or CD-ROM; or may be a variety of devices including one or any combination of the above memories, such as a mobile phone, computer, tablet device, personal digital assistant, etc.
An embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, performs:
acquiring first transaction information, wherein the first transaction information is used for representing information interaction in the blockchain network;
verifying an initiator of the first transaction information based on the acquired first transaction information;
when the initiator of the first transaction information is determined to be located in a service node of a lightweight directory access protocol, submitting transaction data in the first transaction information to the blockchain network.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, embodiments of the present invention may take the form of a hardware embodiment, a software embodiment, or an embodiment combining software and hardware aspects. Furthermore, embodiments of the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including magnetic disk storage, optical storage, and the like) having computer-usable program code embodied in the medium.
Embodiments of the present invention are described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program operations. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the operations performed by the processor of the computer or other programmable data processing apparatus produce means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program operations may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the operations stored in the computer-readable memory produce an article of manufacture including operating means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program operations may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the operations executed on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The above description is only exemplary of the present invention and should not be taken as limiting the scope of the present invention, and any modifications, equivalents, improvements, etc. that are within the spirit and principle of the present invention should be included in the present invention.

Claims (12)

1.一种信息验证方法,应用于区块链网络中,其特征在于,所述方法包括:1. an information verification method, is applied in the block chain network, it is characterized in that, described method comprises: 获取第一交易信息,所述第一交易信息用于表征在所述区块链网络中的信息交互;acquiring first transaction information, where the first transaction information is used to represent information interaction in the blockchain network; 基于所获取的第一交易信息,对所述第一交易信息的发起方进行验证;verifying the initiator of the first transaction information based on the acquired first transaction information; 当确定所述第一交易信息的发起方位于轻量目录访问协议的服务节点中、且所述第一交易信息对应的交易接收方地址与所述第一交易信息对应的交易接收方的父节点的地址的验证不一致时,将所述第一交易信息中的交易数据提交至所述区块链网络中。When it is determined that the initiator of the first transaction information is located in the service node of the Lightweight Directory Access Protocol, and the address of the transaction receiver corresponding to the first transaction information is the parent node of the transaction receiver corresponding to the first transaction information When the verification of the address is inconsistent, the transaction data in the first transaction information is submitted to the blockchain network. 2.根据权利要求1所述的方法,其特征在于,所述方法还包括:2. The method according to claim 1, wherein the method further comprises: 当确定所述所述第一交易信息的发起方没有位于轻量目录访问协议的服务节点中时,建立与所述第一交易发起方对应的针对所述区块链网络和轻量目录访问协议的服务节点目录的映射和层级身份。When it is determined that the initiator of the first transaction information is not located in the service node of the light-weight directory access protocol, establishing the blockchain network and the light-weight directory access protocol corresponding to the first transaction initiator The mapping and hierarchical identity of the service node directory. 3.根据权利要求2所述的方法,其特征在于,所述建立与所述第一交易信息发起方对应的针对所述区块链网络和轻量目录访问协议的服务节点目录的映射和层级身份,包括:3. The method according to claim 2, wherein the mapping and hierarchy of the service node directory for the blockchain network and the light-weight directory access protocol corresponding to the first transaction information initiator are established. identity, including: 根据所述第一交易发起方的身份编码,将所述第一交易发起方所对应的公钥进行编码以形成第一交易用户地址;According to the identity code of the first transaction initiator, encoding the public key corresponding to the first transaction initiator to form a first transaction user address; 将所形成的用户地址映射至所述轻量目录访问协议的服务节点所形成的树状结构中;mapping the formed user address to the tree structure formed by the service node of the lightweight directory access protocol; 将所形成的用户地址存储于所述轻量目录访问协议的目录中。The formed user address is stored in the directory of the Lightweight Directory Access Protocol. 4.根据权利要求3所述的方法,其特征在于,所述根据所述第一交易发起方的身份编码,将所述第一交易发起方所对应的公钥进行编码以形成第一交易用户地址,包括:4 . The method according to claim 3 , wherein, according to the identity code of the first transaction initiator, the public key corresponding to the first transaction initiator is encoded to form the first transaction user. 5 . address, including: 对所述第一交易发起方的公钥进行随机散列编码;Perform random hash coding on the public key of the first transaction initiator; 基于所述随机散列编码的结果,进行二进制转可视字符串编码,以形成字符串格式的第一交易用户地址。Based on the result of the random hash encoding, binary-to-visual string encoding is performed to form the first transaction user address in a string format. 5.根据权利要求3所述的方法,其特征在于,所述将所形成的用户地址映射至所述轻量目录访问协议的服务节点所形成的树状结构中,包括:5. The method according to claim 3, wherein the mapping of the formed user address to the tree structure formed by the service node of the lightweight directory access protocol comprises: 针对所述第一交易信息中所包含每一项未花费交易输出,追溯针对所述每一项未花费交易输出的上一笔未花费交易输出所对应的输出脚本;For each unspent transaction output included in the first transaction information, trace back the output script corresponding to the last unspent transaction output for each unspent transaction output; 基于所述第一交易信息,在所述区块链网络中完成对所述第一交易信息中所包含每一项未花费交易输出的签名验证与对应的公钥的匹配进行验证;Based on the first transaction information, the verification of the signature of each unspent transaction output included in the first transaction information and the matching of the corresponding public key is completed in the blockchain network; 基于所述第一交易信息,在所述轻量目录访问协议的服务节点中完成层级映射和用户权限验证。Based on the first transaction information, hierarchical mapping and user authority verification are completed in the service node of the lightweight directory access protocol. 6.根据权利要求5所述的方法,其特征在于,所述基于所述第一交易信息,在所述轻量目录访问协议的服务节点中完成层级映射和用户权限验证,包括:6. The method according to claim 5, wherein, based on the first transaction information, the layer mapping and user authority verification are completed in the service node of the lightweight directory access protocol, comprising: 将所述第一交易信息对应的上一交易发起方的身份编码信息和对应的编码位的值与相应的时间戳序列组合为数据块,向所述轻量目录访问协议的服务节点发送;Combining the identity code information of the last transaction initiator corresponding to the first transaction information and the value of the corresponding code bit and the corresponding timestamp sequence into a data block, and sending it to the service node of the lightweight directory access protocol; 所述轻量目录访问协议的服务节点基于所接收的数据块,将所述区块链网络中的用户信息以原始区块链网络中形成的逻辑层次结构存储在所述轻量目录访问协议服务节点中并按照轻量目录访问协议形成映射的目录树;Based on the received data block, the service node of the lightweight directory access protocol stores the user information in the blockchain network in the lightweight directory access protocol service in the logical hierarchy formed in the original blockchain network. In the node and according to the lightweight directory access protocol, the mapped directory tree is formed; 所述轻量目录访问协议服务节点映射成功后发出确认信息,基于相应的身份编码位,发出更新的身份编码位信息;After the light-weight directory access protocol service node is successfully mapped, a confirmation message is sent, and based on the corresponding identity code bit, the updated identity code bit information is sent; 所述第一交易信息对应的交易方通过对应的公钥对所述更新的身份编码位信息和相应的身份编码进行加密,并将经过加密的信息添加至所述第一交易信息中的未花费交易输出中。The transaction party corresponding to the first transaction information encrypts the updated identity code bit information and the corresponding identity code by using the corresponding public key, and adds the encrypted information to the unspent information in the first transaction information. transaction output. 7.根据权利要求1所述的方法,其特征在于,所述基于所获取的第一交易信息,对所述第一交易信息的发起方进行验证,包括:7. The method according to claim 1, wherein the verifying the initiator of the first transaction information based on the acquired first transaction information comprises: 在所述轻量目录访问协议的服务节点中,进行交易用户的层级映射与交易用户的权限验证。In the service node of the lightweight directory access protocol, the hierarchical mapping of the transaction user and the authorization verification of the transaction user are performed. 8.根据权利要求7所述的方法,其特征在于,所述在所述轻量目录访问协议的服务节点中,进行交易用户的层级映射与交易用户的权限验证,包括:8. The method according to claim 7, wherein, in the service node of the lightweight directory access protocol, performing hierarchical mapping of transaction users and authorization verification of transaction users, comprising: 所述第一交易信息对应的执行节点从所述第一交易信息关联的前一笔交易的未花费交易输出中获取相应的交易发起方对应的身份编码信息,以及对应的编码位信息和时间戳序列信息;The execution node corresponding to the first transaction information obtains the identity code information corresponding to the corresponding transaction initiator, as well as the corresponding code bit information and timestamp from the unspent transaction output of the previous transaction associated with the first transaction information sequence information; 向所述轻量目录访问协议的服务节点发送所述第一交易信息对应的交易接收方的身份编码,以及相应的身份编码位与时间戳序列信息;sending the identity code of the transaction recipient corresponding to the first transaction information, and the corresponding identity code bits and timestamp sequence information to the service node of the lightweight directory access protocol; 将所述第一交易信息对应的交易接收方地址与所述第一交易信息对应的交易接收方的父节点的地址进行验证;Verifying the address of the transaction recipient corresponding to the first transaction information and the address of the parent node of the transaction recipient corresponding to the first transaction information; 当所述第一交易信息对应的交易接收方地址与所述第一交易信息对应的交易接收方的父节点的地址的验证一致时,拒绝所述第一交易信息对应的交易。When the verification of the address of the transaction receiver corresponding to the first transaction information is consistent with the address of the parent node of the transaction receiver corresponding to the first transaction information, the transaction corresponding to the first transaction information is rejected. 9.根据权利要求8所述的方法,其特征在于,所述方法还包括:9. The method according to claim 8, wherein the method further comprises: 当所述第一交易信息对应的交易接收方地址与所述第一交易信息对应的交易接收方的父节点的地址的验证不一致时,将包括所述第一交易信息的新区块添加至所述区块链网络中。When the verification of the address of the transaction receiver corresponding to the first transaction information is inconsistent with the verification of the address of the parent node of the transaction receiver corresponding to the first transaction information, a new block including the first transaction information is added to the in the blockchain network. 10.一种信息验证装置,应用于区块链网络中,其特征在于,所述装置包括:10. An information verification device, applied in a blockchain network, characterized in that the device comprises: 信息传输模块,用于获取第一交易信息,所述第一交易信息用于表征在所述区块链网络中的信息交互;an information transmission module, configured to obtain first transaction information, where the first transaction information is used to represent information interaction in the blockchain network; 信息处理模块,用于基于所获取的第一交易信息,对所述第一交易信息的发起方进行验证;an information processing module, configured to verify the initiator of the first transaction information based on the acquired first transaction information; 所述信息处理模块,用于当确定所述第一交易信息的发起方位于轻量目录访问协议的服务节点中、且所述第一交易信息对应的交易接收方地址与所述第一交易信息对应的交易接收方的父节点的地址的验证不一致时,将所述第一交易信息中的交易数据提交至所述区块链网络中。The information processing module is configured to determine that the initiator of the first transaction information is located in the service node of the lightweight directory access protocol, and the address of the transaction receiver corresponding to the first transaction information is the same as the first transaction information. When the verification of the address of the parent node of the corresponding transaction recipient is inconsistent, the transaction data in the first transaction information is submitted to the blockchain network. 11.一种信息验证装置,其特征在于,所述装置包括:11. An information verification device, characterized in that the device comprises: 处理器和用于存储能够在处理器上运行的可执行指令的存储器,a processor and memory for storing executable instructions capable of being executed on the processor, 其中,所述处理器用于运行所述可执行指令时,实现权利要求1-9任一项所述的信息验证方法,执行以下操作:Wherein, when the processor is configured to execute the executable instruction, implement the information verification method described in any one of claims 1-9, and perform the following operations: 获取第一交易信息,所述第一交易信息用于表征在所述区块链网络中的信息交互;acquiring first transaction information, where the first transaction information is used to represent information interaction in the blockchain network; 基于所获取的第一交易信息,对所述第一交易信息的发起方进行验证;verifying the initiator of the first transaction information based on the acquired first transaction information; 当确定所述第一交易信息的发起方位于轻量目录访问协议的服务节点中、且所述第一交易信息对应的交易接收方地址与所述第一交易信息对应的交易接收方的父节点的地址的验证不一致时,将所述第一交易信息中的交易数据提交至所述区块链网络中。When it is determined that the initiator of the first transaction information is located in the service node of the Lightweight Directory Access Protocol, and the address of the transaction recipient corresponding to the first transaction information is the parent node of the transaction recipient corresponding to the first transaction information When the verification of the address is inconsistent, the transaction data in the first transaction information is submitted to the blockchain network. 12.一种计算机可读存储介质,其存储有可执行指令,其特征在于,可执行指令被处理器执行时实现权利要求1-9任一项所述的信息验证方法,包括:12. A computer-readable storage medium storing executable instructions, wherein the information verification method according to any one of claims 1-9 is implemented when the executable instructions are executed by a processor, comprising: 获取第一交易信息,所述第一交易信息用于表征在所述区块链网络中的信息交互;acquiring first transaction information, where the first transaction information is used to represent information interaction in the blockchain network; 基于所获取的第一交易信息,对所述第一交易信息的发起方进行验证;verifying the initiator of the first transaction information based on the acquired first transaction information; 当确定所述第一交易信息的发起方位于轻量目录访问协议的服务节点中、且所述第一交易信息对应的交易接收方地址与所述第一交易信息对应的交易接收方的父节点的地址的验证不一致时,将所述第一交易信息中的交易数据提交至所述区块链网络中。When it is determined that the initiator of the first transaction information is located in the service node of the Lightweight Directory Access Protocol, and the address of the transaction receiver corresponding to the first transaction information is the parent node of the transaction receiver corresponding to the first transaction information When the verification of the address is inconsistent, the transaction data in the first transaction information is submitted to the blockchain network.
CN201811429203.7A 2018-11-27 2018-11-27 Information verification method, device and storage medium Active CN109347868B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811429203.7A CN109347868B (en) 2018-11-27 2018-11-27 Information verification method, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811429203.7A CN109347868B (en) 2018-11-27 2018-11-27 Information verification method, device and storage medium

Publications (2)

Publication Number Publication Date
CN109347868A CN109347868A (en) 2019-02-15
CN109347868B true CN109347868B (en) 2021-06-08

Family

ID=65318275

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811429203.7A Active CN109347868B (en) 2018-11-27 2018-11-27 Information verification method, device and storage medium

Country Status (1)

Country Link
CN (1) CN109347868B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110149205B (en) * 2019-05-27 2022-02-08 北京计算机技术及应用研究所 Method for protecting Internet of things terminal by using block chain
JP7221799B2 (en) * 2019-05-31 2023-02-14 株式会社日立製作所 Information processing system and control method for information processing system
CN110349025B (en) * 2019-07-11 2023-03-28 湖南天河国云科技有限公司 Method and device for preventing loss of contract assets based on non-cost transaction output
CN111523887B (en) * 2020-04-15 2023-05-02 杭州溪塔科技有限公司 Authority control method and device for intelligent contract read-only method and electronic equipment
CN111683083B (en) * 2020-06-05 2022-07-08 成都质数斯达克科技有限公司 Block chain user identity authentication method, device, equipment and medium
CN112241435A (en) * 2020-10-23 2021-01-19 山西特信环宇信息技术有限公司 Cone block chain storage system and consensus storage method
CN112541823A (en) * 2020-12-09 2021-03-23 深圳市快付通金融网络科技服务有限公司 Transaction risk control method, device and equipment based on block chain and storage medium
CN114697350B (en) * 2020-12-31 2023-06-27 福建凯米网络科技有限公司 Data storage method and storage medium based on blockchain
CN114567681B (en) * 2022-01-25 2024-04-05 浙江数秦科技有限公司 Block chain network high-efficiency data transmission method
CN115459914A (en) * 2022-09-14 2022-12-09 山东银瑞信息科技有限公司 A blockchain-based data encryption and peer-to-peer transmission method

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106055993A (en) * 2016-08-13 2016-10-26 深圳市樊溪电子有限公司 Encryption storage system for block chains and method for applying encryption storage system
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106789090A (en) * 2017-02-24 2017-05-31 陈晶 Public key infrastructure system and semi-random participating certificate endorsement method based on block chain
CN108537546A (en) * 2018-04-11 2018-09-14 北京奇虎科技有限公司 Node identities method for tracing, device and computing device based on number of addresses
CN108765151A (en) * 2018-05-11 2018-11-06 深圳市恋上互联网技术有限公司 A kind of method of commerce based on block chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9569771B2 (en) * 2011-04-29 2017-02-14 Stephen Lesavich Method and system for storage and retrieval of blockchain blocks using galois fields
KR101835520B1 (en) * 2016-12-29 2018-04-19 주식회사 코인플러그 Method for providing united point service using updated status of balance database with blockchain and server using the same

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106100847A (en) * 2016-06-14 2016-11-09 惠众商务顾问(北京)有限公司 Asymmetric encryption block chain identity information verification method and device
CN106055993A (en) * 2016-08-13 2016-10-26 深圳市樊溪电子有限公司 Encryption storage system for block chains and method for applying encryption storage system
CN106789090A (en) * 2017-02-24 2017-05-31 陈晶 Public key infrastructure system and semi-random participating certificate endorsement method based on block chain
CN108537546A (en) * 2018-04-11 2018-09-14 北京奇虎科技有限公司 Node identities method for tracing, device and computing device based on number of addresses
CN108765151A (en) * 2018-05-11 2018-11-06 深圳市恋上互联网技术有限公司 A kind of method of commerce based on block chain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
区块链技术在银行支付清算领域的应用探析;周猛,李勇;《金融纵横》;20180630;全文 *

Also Published As

Publication number Publication date
CN109347868A (en) 2019-02-15

Similar Documents

Publication Publication Date Title
CN109347868B (en) Information verification method, device and storage medium
JP7109569B2 (en) Digital certificate verification method and its device, computer equipment and computer program
CN110869967B (en) System and method for parallel processing of blockchain transactions
CN113924747B (en) Blockchain transaction data field verification
CN110912707B (en) Block chain-based digital certificate processing method, device, equipment and storage medium
JP7499852B2 (en) Random Node Selection for Permissioned Blockchains
JP2022549581A (en) Computing system, method, non-transitory computer-readable medium and computer program product for determining the sequential order of blocks in a DAG-structured blockchain
CN110046894B (en) Erasure code-based block chain establishing method capable of reconstructing groups
CN111144881A (en) Selective access to asset transfer data
JP7573645B2 (en) Faster view changes of the blockchain
CN111159288A (en) Method, system, device and medium for storing, verifying and realizing chain structure data
JP7201624B2 (en) Systems and methods for hierarchical token distribution in blockchain networks
CN112446039B (en) Blockchain transaction processing method, device, equipment and storage medium
WO2021108258A1 (en) Optimizations for verification of interactions system and method using probability density functions
US12271894B2 (en) Method of selective authentication of a blockchain user with a smart contract
JP7705207B2 (en) Key regeneration in blockchain networks via OPRF
CN114205136A (en) A method and system for sharing traffic data resources based on blockchain technology
CN116547945A (en) Merkel proof entity
KR20240096559A (en) Methods and systems for distributed blockchain functions
CN115885497A (en) Digital signature
CN116508291A (en) Merck proving entity
CN117121440A (en) Uniform resource identifier
JP2022051652A (en) Credibility verification system for digital asset data packet
JP2023530594A (en) Permitted Event Processing in Distributed Databases
CN116108482A (en) A method and system for intersecting unbalanced private sets

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant