CN113065167A - Method and device for updating downlink data authorization prediction machine and electronic equipment - Google Patents
Method and device for updating downlink data authorization prediction machine and electronic equipment Download PDFInfo
- Publication number
- CN113065167A CN113065167A CN202110366917.3A CN202110366917A CN113065167A CN 113065167 A CN113065167 A CN 113065167A CN 202110366917 A CN202110366917 A CN 202110366917A CN 113065167 A CN113065167 A CN 113065167A
- Authority
- CN
- China
- Prior art keywords
- data
- chain
- data source
- uplink
- module
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 37
- 238000013475 authorization Methods 0.000 title claims abstract description 10
- 238000012795 verification Methods 0.000 claims abstract description 18
- 238000012986 modification Methods 0.000 description 5
- 230000004048 modification Effects 0.000 description 5
- 230000004075 alteration Effects 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 238000013524 data verification Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Business, Economics & Management (AREA)
- Physics & Mathematics (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Engineering & Computer Science (AREA)
- Software Systems (AREA)
- Computer Hardware Design (AREA)
- Economics (AREA)
- General Business, Economics & Management (AREA)
- Technology Law (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Development Economics (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a method, a device and electronic equipment for updating a linked data authorization prediction machine, wherein the method comprises the following steps: the chain module selects a chain data source and broadcasts the chain data source; the downlink node acquires data according to the information of the uplink data source and issues a transaction to request to write the data into the uplink module; and the on-chain module verifies the data and writes the data into the chain after the data is successfully verified. By adopting the method provided by the invention, the data written into the chain is not only subjected to security verification through the node under the chain, but also subjected to selection and verification on the data source through the module on the chain, so that the problem that the data acquired and issued by a third-party data source is possibly artificially tampered when being written into the chain is solved, and the security of the data written into the chain is ensured.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a method and a device for updating an authorization prediction machine of data under a chain and electronic equipment.
Background
The block chain is a closed environment, and the intelligent contract on the chain passively receives data and cannot actively acquire real world data under the chain. In addition, the intelligent contract only reaches the program in the trigger state when the corresponding condition is met. If the triggering conditions of the intelligent contracts depend on the information under the block chains, the information under the block chains needs to be provided through a prediction machine and is written into the records on the block chains.
The predictive engine is a one-way digital agent that can look up and verify real-world data and present the information to the smart contract in an encrypted manner. The predictive machine is an intermediate layer for securely connecting the blockchain to the system under the chain, and the blockchain can be connected to various environments under the chain such as a data provider, a web API, an enterprise backend, a cloud service provider, an Internet of things device, an electronic signature, a payment system and other blockchains through the predictive machine.
Currently, the link-down data is usually collected and published by a third-party data source, such as bank loan data, real-time transaction data of a trading exchange, and the like. Data stored in the blockchain cannot be directly stored in the blockchain because the data are required to be ensured to be reliable and safe and the data have the possibility of being artificially tampered.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides the following technical scheme.
The invention provides a method for updating an authorized prediction machine of data under a link, which comprises the following steps:
the chain module selects a chain data source and broadcasts the chain data source;
the downlink node acquires data according to the information of the uplink data source and issues a transaction to request to write the data into the uplink module;
and the on-chain module verifies the data and writes the data into the chain after the data is successfully verified.
Preferably, the selecting of the uplink data source by the on-chain module includes:
the on-chain module comprises a storage contract and a governance contract, the storage contract is used for storing data, and the governance contract is used for issuing governance evidence to a user to generate a governance contract user;
a storage contract issues a plurality of data sources;
the governance contract user selects a data source and determines the uplink data source according to the selection result.
Preferably, the governing contract user selects a data source, and determining the uplink data source according to the selection result includes:
the number of the governance contract users is set to be a plurality;
each governance contract user selects a data source;
and determining the data source which is selected most as the uplink data source.
Preferably, a selection period is set, each governance contract user selects the data source in the selection period, the selection is stopped after the selection period is finished, and the data sources which are selected most are obtained through statistics.
Preferably, the selection period is set according to an application.
Preferably, the acquiring, by the downlink node, data according to the information of the uplink data source includes:
the downlink node reads the information of the uplink data source broadcasted by the uplink module;
the downlink node collects data from the uplinkable data source.
Preferably, the verifying the data by the on-chain module, and writing the data to the chain after the verification is successful, includes:
the governance contract user verifies the data and signs after the verification is successful;
and writing the data which is successfully verified and the signature of the governance contract user into the storage contract.
The second aspect of the present invention provides an apparatus for updating an authorized prediction machine of data in a chain, including:
the on-chain module is used for selecting and broadcasting an uplink data source, verifying the data and writing the data into a chain after the data is successfully verified;
and the downlink node is used for acquiring data according to the information of the uplink data source, issuing a transaction and requesting to write the data into the uplink module.
A third aspect of the invention provides a memory storing a plurality of instructions for implementing the method described above.
The invention also provides an electronic device comprising a processor and a memory connected with the processor, wherein the memory stores a plurality of instructions which can be loaded and executed by the processor so as to enable the processor to execute the method.
The invention has the beneficial effects that: the invention provides a method, a device and electronic equipment for updating an authorized prediction machine of downlink data, wherein the method comprises the following steps: the chain module selects a chain data source and broadcasts the chain data source; the downlink node acquires data according to the information of the uplink data source and issues a transaction to request to write the data into the uplink module; and the on-chain module verifies the data and writes the data into the chain after the data is successfully verified. By adopting the method provided by the invention, the data written into the chain is not only subjected to security verification through the node under the chain, but also subjected to selection and verification on the data source through the module on the chain, so that the problem that the data acquired and issued by a third-party data source is possibly artificially tampered when being written into the chain is solved, and the security of the data written into the chain is ensured.
Drawings
FIG. 1 is a flow chart of a method for updating an authorization prediction machine of downlink data according to the present invention;
fig. 2 is a schematic structural diagram of an apparatus for updating the downlink data authorization prediction machine according to the present invention.
Detailed Description
In order to better understand the technical solution, the technical solution will be described in detail with reference to the drawings and the specific embodiments.
The method provided by the invention can be implemented in the following terminal environment, and the terminal can comprise one or more of the following components: a processor, a memory, and a display screen. Wherein the memory has stored therein at least one instruction that is loaded and executed by the processor to implement the methods described in the embodiments described below.
A processor may include one or more processing cores. The processor connects various parts within the overall terminal using various interfaces and lines, performs various functions of the terminal and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory, and calling data stored in the memory.
The Memory may include a Random Access Memory (RAM) or a Read-Only Memory (ROM). The memory may be used to store instructions, programs, code sets, or instructions.
The display screen is used for displaying user interfaces of all the application programs.
In addition, those skilled in the art will appreciate that the above-described terminal configurations are not intended to be limiting, and that the terminal may include more or fewer components, or some components may be combined, or a different arrangement of components. For example, the terminal further includes a radio frequency circuit, an input unit, a sensor, an audio circuit, a power supply, and other components, which are not described herein again.
Example one
As shown in fig. 1, an embodiment of the present invention provides a method for updating an authorization prediction machine of data in a chain, including:
s101, selecting a chain data source and broadcasting by a chain module;
s102, a down-link node collects data and issues a transaction according to the information of the uplink data source, and requests to write the data into the up-link module;
s103, the on-chain module verifies the data and writes the data into the chain after the data is verified successfully.
In an actual application process, the data source for providing data may include a plurality of data sources, and before the on-chain module acquires data, in order to acquire more secure, reliable and high-value data, one of the plurality of data sources is selected and a message is sent to a node below a chain to notify the node of a need for acquiring data. And after receiving the message of the on-chain module, the off-chain node reads the finally determined data source information from the on-chain module and acquires data from the corresponding data source according to the data source information. After the data is collected by the node under the chain, the node can issue a transaction and request to write the data into the module on the chain. After receiving the request of the node under the chain, the module on the chain firstly verifies the data, and if the verification is successful, the data can be written into the chain.
It should be noted that, in order to ensure that the data collected and applied for writing into the chain is safe and reliable, the node under the chain verifies the collected data, and requests to write into the chain after the verification succeeds to ensure that the data is correct and safe, the module on the chain first verifies the data after receiving the request for writing into the data by the node under the chain, and then performs signature after the verification passes and writes the data and the signature into the chain.
By adopting the method provided by the invention, the data written into the chain is not only subjected to security verification through the node under the chain, but also subjected to selection and verification on the data source through the module on the chain, so that the problem that the data acquired and issued by a third-party data source is possibly artificially tampered when being written into the chain is solved, and the security of the data written into the chain is ensured.
Executing step S101, the selecting of the uplink data source by the on-chain module includes:
the on-chain module comprises a storage contract and a governance contract, the storage contract is used for storing data, and the governance contract is used for issuing governance evidence to a user to generate a governance contract user;
a storage contract issues a plurality of data sources;
the governance contract user selects a data source and determines the uplink data source according to the selection result.
In an actual application process, information of the data source is usually written into the chain, and when a module on the chain selects the data source, the module can select the data source by the information written into the data source on the chain.
In embodiments of the present invention, information of the data source may be stored on the storage contract. When the intelligent contract on the chain needs data under the chain, the information of the data source can be published through the storage contract, and the information of a plurality of data sources can be published through the storage contract, so that a user on the chain can select the data source which meets the requirement from the plurality of data sources.
The governance contract on the chain is used for issuing governance evidence to the user, thereby generating governance contract users. The governance contract user selects the data source of the uplink according to the plurality of data sources issued by the storage contract.
In the method, the contract user is controlled to select from a plurality of data sources, so that the uncertainty of the uplink data source can be improved, and the possibility that the data which can be written into the chain is artificially tampered is reduced.
In a preferred embodiment of the present invention, the determining the uplink data source according to the selection result includes:
the number of the governance contract users is set to be a plurality;
each governance contract user selects a data source;
and determining the data source which is selected most as the uplink data source.
As an embodiment, for example, each governance contract user may vote in multiple data sources, and the data source with the highest vote number is the data source selected and determined by each governance contract user jointly, that is, the uplink data source.
By adopting the method, the uplink data source is determined by jointly selecting and determining the uplink data source through a plurality of governance contract users, so that the situation that the data is easily tampered by people caused by determining the uplink data source only by one governance contract user is avoided. Moreover, a plurality of governance contract users jointly select and determine the uplink data source, so that the quality of uplink data can be improved, and the fairness of data source selection are ensured.
In a preferred embodiment of the present invention, a selection period may be set, each governance contract user selects a data source in the selection period, the selection is stopped after the selection period is ended, and the most selected data sources are obtained through statistics.
By setting the selection period and enabling each governance contract user to select the data source in the selection period, the restriction force of the governance contract can be reflected, and each governance contract user can be ensured to have sufficient time to select the data source and fully exercise the governance power of the governance contract.
For example, for some simpler applications, the required linked data is simpler, the factors to be examined are fewer, or the data is more common data, the governing contract user does not need to spend much time for selection, the selection of the data source can be completed within several hours, and the selection period can be set to several hours. And when the selection period is finished, stopping the selection of each governance contract user on the data source, and then counting the number of times each data source is selected.
In a preferred embodiment of the present invention, the acquiring, by the downlink node, data according to the information of the uplink data source includes:
the downlink node reads the information of the uplink data source broadcasted by the uplink module;
the downlink node collects data from the uplinkable data source.
After the uplink module determines the uplink data source, the information of the uplink data source is broadcasted, and the downlink node can read the uplink data at regular time and acquire the information of the uplink data source broadcasted by the uplink module.
After the information of the uplink data source is read by the downlink node, the corresponding data source can be connected, and corresponding data can be collected from the data source.
The downlink node may collect data from the data source by using a common method in the art, which is not described herein again.
And after acquiring the required data, the node under the chain verifies the required data, and if the verification is successful, the node under the chain requests to write the data into the chain.
In an embodiment of the present invention, the verifying the data by the on-chain module, and writing the data to the chain after the verification is successful includes:
the governance contract user verifies the data and signs after the verification is successful;
and writing the data which is successfully verified and the signature of the governance contract user into the storage contract.
As an embodiment, for example, in order to ensure that data on a write chain is not tamper-proof, a node below the chain may perform hash operation on collected data to obtain a hash value, and send the hash value and the data to the chain at the same time, each governance contract user on the chain performs hash operation on the data respectively, and compares the received hash value with a hash value calculated by the user, if the two hash values are consistent, the verification is successful, and the signature is performed. If all governance contract users pass data verification and sign, the data can be written to the chain, otherwise the data cannot be written to the chain.
For another example, the downlink node encrypts data and sends the encrypted data onto the link. Each governance contract user on the chain decrypts the data first and then verifies the data, so that the data can be further ensured to be not tampered.
Example two
As shown in fig. 2, another aspect of the present invention further includes a functional module architecture completely corresponding to the foregoing method flow, that is, the embodiment of the present invention further provides an apparatus for updating an authorized prediction machine for data downlink, including:
the on-chain module 201 is configured to select and broadcast an uplink data source, and is further configured to verify the data by the on-chain module, and write the data into a chain after the data is successfully verified;
and the downlink node 202 is configured to collect data according to the information of the uplink data source and issue a transaction, and request to write the data into the uplink module.
In the uplink module, the selecting an uplink data source includes:
the on-chain module comprises a storage contract and a governance contract, the storage contract is used for storing data, and the governance contract is used for issuing governance evidence to a user to generate a governance contract user;
a storage contract issues a plurality of data sources;
the governance contract user selects a data source and determines the uplink data source according to the selection result.
Further, the governing contract user selects a data source, and determining the uplink data source according to the selection result comprises:
the number of the governance contract users is set to be a plurality;
each governance contract user selects a data source;
and determining the data source which is selected most as the uplink data source.
Furthermore, a selection period is set, each governance contract user selects the data source in the selection period, the selection is stopped after the selection period is finished, and the data sources which are selected most are obtained through statistics.
Further, the selection period is set according to an application.
Wherein the acquiring, by the downlink node, data according to the information of the uplink data source includes:
the downlink node reads the information of the uplink data source broadcasted by the uplink module;
the downlink node collects data from the uplinkable data source.
Further, the verifying the data by the on-chain module, and writing the data into the chain after the verifying is successful, includes:
the governance contract user verifies the data and signs after the verification is successful;
and writing the data which is successfully verified and the signature of the governance contract user into the storage contract.
The device can be implemented by the method for updating the downlink data authorization prediction machine provided in the first embodiment, and specific implementation methods can be referred to the description in the first embodiment and are not described herein again.
The invention also provides a memory storing a plurality of instructions for implementing the method according to the first embodiment.
The invention also provides an electronic device comprising a processor and a memory connected to the processor, wherein the memory stores a plurality of instructions, and the instructions can be loaded and executed by the processor to enable the processor to execute the method according to the first embodiment.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention. It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.
Claims (10)
1. A method for authorizing a predictive update of data in a chain, comprising:
the chain module selects a chain data source and broadcasts the chain data source;
the downlink node acquires data according to the information of the uplink data source and issues a transaction to request to write the data into the uplink module;
and the on-chain module verifies the data and writes the data into the chain after the data is successfully verified.
2. The method of claim 1, wherein the on-chain module selecting an uplink data source comprises:
the on-chain module comprises a storage contract and a governance contract, the storage contract is used for storing data, and the governance contract is used for issuing governance evidence to a user to generate a governance contract user;
a storage contract issues a plurality of data sources;
the governance contract user selects a data source and determines the uplink data source according to the selection result.
3. The method of claim 2, wherein the governance contract user selects a data source, and determining the uplink data source according to the selection comprises:
the number of the governance contract users is set to be a plurality;
each governance contract user selects a data source;
and determining the data source which is selected most as the uplink data source.
4. The method for updating the data authorization prediction machine under the chain according to claim 3, wherein a selection period is set, each governance contract user selects the data sources in the selection period, the selection period is ended, the selection is stopped, and the data sources which are selected most are counted.
5. The method for updating the downlink data authorization oracle of claim 4, wherein the selection period is set according to an application.
6. The method of claim 1, wherein the downlink node collecting data according to the information of the uplink data source comprises:
the downlink node reads the information of the uplink data source broadcasted by the uplink module;
the downlink node collects data from the uplinkable data source.
7. The method for authorizing prolog update of data under link of claim 2, wherein said on-link module verifies said data and writes to the link after verification is successful, comprising:
the governance contract user verifies the data and signs after the verification is successful;
and writing the data which is successfully verified and the signature of the governance contract user into the storage contract.
8. An apparatus for authorizing prolog updates for a predictive engine based on downlink data, comprising:
the on-chain module is used for selecting and broadcasting an uplink data source, verifying the data and writing the data into a chain after the data is successfully verified;
and the downlink node is used for acquiring data according to the information of the uplink data source, issuing a transaction and requesting to write the data into the uplink module.
9. A memory storing a plurality of instructions for implementing the method of any one of claims 1-7.
10. An electronic device comprising a processor and a memory coupled to the processor, the memory storing a plurality of instructions that are loadable and executable by the processor to enable the processor to perform the method according to any of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110366917.3A CN113065167A (en) | 2021-04-06 | 2021-04-06 | Method and device for updating downlink data authorization prediction machine and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110366917.3A CN113065167A (en) | 2021-04-06 | 2021-04-06 | Method and device for updating downlink data authorization prediction machine and electronic equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113065167A true CN113065167A (en) | 2021-07-02 |
Family
ID=76565940
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110366917.3A Pending CN113065167A (en) | 2021-04-06 | 2021-04-06 | Method and device for updating downlink data authorization prediction machine and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113065167A (en) |
Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108694669A (en) * | 2018-07-18 | 2018-10-23 | 矩阵元技术(深圳)有限公司 | A kind of block chain intelligence contract implementation method and device |
CN110633286A (en) * | 2019-09-29 | 2019-12-31 | 山东爱城市网信息技术有限公司 | Block chain-based time service prediction machine implementation method |
CN110930254A (en) * | 2019-11-19 | 2020-03-27 | 腾讯科技(深圳)有限公司 | Data processing method, device, terminal and medium based on block chain |
CN110992020A (en) * | 2019-11-19 | 2020-04-10 | 腾讯科技(深圳)有限公司 | Data processing method based on intelligent contract, related node and storage medium |
CN111145023A (en) * | 2019-12-17 | 2020-05-12 | 上海交通大学 | Cross-chain exchange method, system and medium based on trusted prediction machine |
CN111460474A (en) * | 2020-03-27 | 2020-07-28 | 北京瑞卓喜投科技发展有限公司 | Method and device for realizing decentralized prediction machine, storage and computer |
CN111488616A (en) * | 2020-04-08 | 2020-08-04 | 北京瑞策科技有限公司 | Method and device for realizing preplan machine of service data block chain |
CN111801910A (en) * | 2017-12-15 | 2020-10-20 | 区块链控股有限公司 | System and method for authenticating off-chain data based on proof verification |
CN111953648A (en) * | 2020-06-22 | 2020-11-17 | 北京欧链科技有限公司 | Data processing method and device based on block chain prediction machine and electronic equipment |
CN112016105A (en) * | 2020-08-17 | 2020-12-01 | 东北大学秦皇岛分校 | Chain uplink and downlink data sharing scheme based on distributed propheter and homomorphic encryption |
CN112053240A (en) * | 2020-08-07 | 2020-12-08 | 深圳区块大陆科技有限公司 | Method for realizing predictive speech machine function on block chain |
CN112150266A (en) * | 2020-05-07 | 2020-12-29 | 北京天德科技有限公司 | Design principle of intelligent contract prediction machine |
CN112507360A (en) * | 2020-12-10 | 2021-03-16 | 浙商银行股份有限公司 | Block chain data uplink method and device based on threshold signature and prediction machine |
-
2021
- 2021-04-06 CN CN202110366917.3A patent/CN113065167A/en active Pending
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111801910A (en) * | 2017-12-15 | 2020-10-20 | 区块链控股有限公司 | System and method for authenticating off-chain data based on proof verification |
CN108694669A (en) * | 2018-07-18 | 2018-10-23 | 矩阵元技术(深圳)有限公司 | A kind of block chain intelligence contract implementation method and device |
CN110633286A (en) * | 2019-09-29 | 2019-12-31 | 山东爱城市网信息技术有限公司 | Block chain-based time service prediction machine implementation method |
CN110930254A (en) * | 2019-11-19 | 2020-03-27 | 腾讯科技(深圳)有限公司 | Data processing method, device, terminal and medium based on block chain |
CN110992020A (en) * | 2019-11-19 | 2020-04-10 | 腾讯科技(深圳)有限公司 | Data processing method based on intelligent contract, related node and storage medium |
CN111145023A (en) * | 2019-12-17 | 2020-05-12 | 上海交通大学 | Cross-chain exchange method, system and medium based on trusted prediction machine |
CN111460474A (en) * | 2020-03-27 | 2020-07-28 | 北京瑞卓喜投科技发展有限公司 | Method and device for realizing decentralized prediction machine, storage and computer |
CN111488616A (en) * | 2020-04-08 | 2020-08-04 | 北京瑞策科技有限公司 | Method and device for realizing preplan machine of service data block chain |
CN112150266A (en) * | 2020-05-07 | 2020-12-29 | 北京天德科技有限公司 | Design principle of intelligent contract prediction machine |
CN111953648A (en) * | 2020-06-22 | 2020-11-17 | 北京欧链科技有限公司 | Data processing method and device based on block chain prediction machine and electronic equipment |
CN112053240A (en) * | 2020-08-07 | 2020-12-08 | 深圳区块大陆科技有限公司 | Method for realizing predictive speech machine function on block chain |
CN112016105A (en) * | 2020-08-17 | 2020-12-01 | 东北大学秦皇岛分校 | Chain uplink and downlink data sharing scheme based on distributed propheter and homomorphic encryption |
CN112507360A (en) * | 2020-12-10 | 2021-03-16 | 浙商银行股份有限公司 | Block chain data uplink method and device based on threshold signature and prediction machine |
Non-Patent Citations (2)
Title |
---|
STEVE ELLIS等: ""ChainLink A Decentralized Oracle Network"", pages 1 - 38, Retrieved from the Internet <URL:https://research.chain.link/whitepaper-v1.pdf> * |
管哿浠等: ""基于预言机和零知识证明的区块链数据上链方案"", 信息安全与保密通信, 20 October 2022 (2022-10-20), pages 25 - 37 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108683539B (en) | Block chain network management method, block chain network management device, block chain network management medium and electronic equipment | |
CN108596623B (en) | Block chain consensus achieving method | |
CN108959621B (en) | Method, device, equipment and storage medium for realizing block chain network | |
CN108846673B (en) | Block data processing method, device, equipment and storage medium | |
CN110780847B (en) | Random number generation method, random number generation device and electronic equipment | |
CN108711212B (en) | Voting certificate storage method, device and system | |
CN110582769A (en) | single-account multi-identity login method, device, server and storage medium | |
CN110266635B (en) | Vehicle information sharing method and device, computer readable medium and electronic equipment | |
CN108665363B (en) | Block chain consensus achieving device | |
CN108629588B (en) | Computer readable medium for block chain consensus achievement | |
CN110557403A (en) | Resource allocation method and device based on block chain, storage medium and node equipment | |
CN108648082B (en) | Computer system for block chain consensus achievement | |
CN110599233B (en) | Advertisement anti-cheating method and device based on click verification | |
CN112631550A (en) | Block chain random number generation method, device, equipment and computer storage medium | |
CN106649638B (en) | Big data acquisition method | |
CN108961055B (en) | Block consensus award and punishment method, device, equipment and storage medium | |
US9124570B1 (en) | Providing an assessment of authentication requests | |
CN112907243A (en) | Block chain transaction auditing method and device | |
CN112181599B (en) | Model training method, device and storage medium | |
CN113065167A (en) | Method and device for updating downlink data authorization prediction machine and electronic equipment | |
CN110347657B (en) | Data generation method, device, electronic equipment and storage medium | |
CN111858752A (en) | Artificial intelligence training method and device based on block chain and storage medium | |
CN111858753A (en) | Block chain-based training parameter processing method, device and storage medium | |
CN114240436A (en) | Electronic certificate verification and cancellation method and device, computer equipment and storage medium | |
CN115422584A (en) | Data deformation method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |