[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN113065167A - Method and device for updating downlink data authorization prediction machine and electronic equipment - Google Patents

Method and device for updating downlink data authorization prediction machine and electronic equipment Download PDF

Info

Publication number
CN113065167A
CN113065167A CN202110366917.3A CN202110366917A CN113065167A CN 113065167 A CN113065167 A CN 113065167A CN 202110366917 A CN202110366917 A CN 202110366917A CN 113065167 A CN113065167 A CN 113065167A
Authority
CN
China
Prior art keywords
data
chain
data source
uplink
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110366917.3A
Other languages
Chinese (zh)
Inventor
张�诚
朱国君
张勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Rui Zhuo Xi Tou Technology Development Co ltd
Original Assignee
Beijing Rui Zhuo Xi Tou Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Rui Zhuo Xi Tou Technology Development Co ltd filed Critical Beijing Rui Zhuo Xi Tou Technology Development Co ltd
Priority to CN202110366917.3A priority Critical patent/CN113065167A/en
Publication of CN113065167A publication Critical patent/CN113065167A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention discloses a method, a device and electronic equipment for updating a linked data authorization prediction machine, wherein the method comprises the following steps: the chain module selects a chain data source and broadcasts the chain data source; the downlink node acquires data according to the information of the uplink data source and issues a transaction to request to write the data into the uplink module; and the on-chain module verifies the data and writes the data into the chain after the data is successfully verified. By adopting the method provided by the invention, the data written into the chain is not only subjected to security verification through the node under the chain, but also subjected to selection and verification on the data source through the module on the chain, so that the problem that the data acquired and issued by a third-party data source is possibly artificially tampered when being written into the chain is solved, and the security of the data written into the chain is ensured.

Description

Method and device for updating downlink data authorization prediction machine and electronic equipment
Technical Field
The invention relates to the technical field of block chains, in particular to a method and a device for updating an authorization prediction machine of data under a chain and electronic equipment.
Background
The block chain is a closed environment, and the intelligent contract on the chain passively receives data and cannot actively acquire real world data under the chain. In addition, the intelligent contract only reaches the program in the trigger state when the corresponding condition is met. If the triggering conditions of the intelligent contracts depend on the information under the block chains, the information under the block chains needs to be provided through a prediction machine and is written into the records on the block chains.
The predictive engine is a one-way digital agent that can look up and verify real-world data and present the information to the smart contract in an encrypted manner. The predictive machine is an intermediate layer for securely connecting the blockchain to the system under the chain, and the blockchain can be connected to various environments under the chain such as a data provider, a web API, an enterprise backend, a cloud service provider, an Internet of things device, an electronic signature, a payment system and other blockchains through the predictive machine.
Currently, the link-down data is usually collected and published by a third-party data source, such as bank loan data, real-time transaction data of a trading exchange, and the like. Data stored in the blockchain cannot be directly stored in the blockchain because the data are required to be ensured to be reliable and safe and the data have the possibility of being artificially tampered.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides the following technical scheme.
The invention provides a method for updating an authorized prediction machine of data under a link, which comprises the following steps:
the chain module selects a chain data source and broadcasts the chain data source;
the downlink node acquires data according to the information of the uplink data source and issues a transaction to request to write the data into the uplink module;
and the on-chain module verifies the data and writes the data into the chain after the data is successfully verified.
Preferably, the selecting of the uplink data source by the on-chain module includes:
the on-chain module comprises a storage contract and a governance contract, the storage contract is used for storing data, and the governance contract is used for issuing governance evidence to a user to generate a governance contract user;
a storage contract issues a plurality of data sources;
the governance contract user selects a data source and determines the uplink data source according to the selection result.
Preferably, the governing contract user selects a data source, and determining the uplink data source according to the selection result includes:
the number of the governance contract users is set to be a plurality;
each governance contract user selects a data source;
and determining the data source which is selected most as the uplink data source.
Preferably, a selection period is set, each governance contract user selects the data source in the selection period, the selection is stopped after the selection period is finished, and the data sources which are selected most are obtained through statistics.
Preferably, the selection period is set according to an application.
Preferably, the acquiring, by the downlink node, data according to the information of the uplink data source includes:
the downlink node reads the information of the uplink data source broadcasted by the uplink module;
the downlink node collects data from the uplinkable data source.
Preferably, the verifying the data by the on-chain module, and writing the data to the chain after the verification is successful, includes:
the governance contract user verifies the data and signs after the verification is successful;
and writing the data which is successfully verified and the signature of the governance contract user into the storage contract.
The second aspect of the present invention provides an apparatus for updating an authorized prediction machine of data in a chain, including:
the on-chain module is used for selecting and broadcasting an uplink data source, verifying the data and writing the data into a chain after the data is successfully verified;
and the downlink node is used for acquiring data according to the information of the uplink data source, issuing a transaction and requesting to write the data into the uplink module.
A third aspect of the invention provides a memory storing a plurality of instructions for implementing the method described above.
The invention also provides an electronic device comprising a processor and a memory connected with the processor, wherein the memory stores a plurality of instructions which can be loaded and executed by the processor so as to enable the processor to execute the method.
The invention has the beneficial effects that: the invention provides a method, a device and electronic equipment for updating an authorized prediction machine of downlink data, wherein the method comprises the following steps: the chain module selects a chain data source and broadcasts the chain data source; the downlink node acquires data according to the information of the uplink data source and issues a transaction to request to write the data into the uplink module; and the on-chain module verifies the data and writes the data into the chain after the data is successfully verified. By adopting the method provided by the invention, the data written into the chain is not only subjected to security verification through the node under the chain, but also subjected to selection and verification on the data source through the module on the chain, so that the problem that the data acquired and issued by a third-party data source is possibly artificially tampered when being written into the chain is solved, and the security of the data written into the chain is ensured.
Drawings
FIG. 1 is a flow chart of a method for updating an authorization prediction machine of downlink data according to the present invention;
fig. 2 is a schematic structural diagram of an apparatus for updating the downlink data authorization prediction machine according to the present invention.
Detailed Description
In order to better understand the technical solution, the technical solution will be described in detail with reference to the drawings and the specific embodiments.
The method provided by the invention can be implemented in the following terminal environment, and the terminal can comprise one or more of the following components: a processor, a memory, and a display screen. Wherein the memory has stored therein at least one instruction that is loaded and executed by the processor to implement the methods described in the embodiments described below.
A processor may include one or more processing cores. The processor connects various parts within the overall terminal using various interfaces and lines, performs various functions of the terminal and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory, and calling data stored in the memory.
The Memory may include a Random Access Memory (RAM) or a Read-Only Memory (ROM). The memory may be used to store instructions, programs, code sets, or instructions.
The display screen is used for displaying user interfaces of all the application programs.
In addition, those skilled in the art will appreciate that the above-described terminal configurations are not intended to be limiting, and that the terminal may include more or fewer components, or some components may be combined, or a different arrangement of components. For example, the terminal further includes a radio frequency circuit, an input unit, a sensor, an audio circuit, a power supply, and other components, which are not described herein again.
Example one
As shown in fig. 1, an embodiment of the present invention provides a method for updating an authorization prediction machine of data in a chain, including:
s101, selecting a chain data source and broadcasting by a chain module;
s102, a down-link node collects data and issues a transaction according to the information of the uplink data source, and requests to write the data into the up-link module;
s103, the on-chain module verifies the data and writes the data into the chain after the data is verified successfully.
In an actual application process, the data source for providing data may include a plurality of data sources, and before the on-chain module acquires data, in order to acquire more secure, reliable and high-value data, one of the plurality of data sources is selected and a message is sent to a node below a chain to notify the node of a need for acquiring data. And after receiving the message of the on-chain module, the off-chain node reads the finally determined data source information from the on-chain module and acquires data from the corresponding data source according to the data source information. After the data is collected by the node under the chain, the node can issue a transaction and request to write the data into the module on the chain. After receiving the request of the node under the chain, the module on the chain firstly verifies the data, and if the verification is successful, the data can be written into the chain.
It should be noted that, in order to ensure that the data collected and applied for writing into the chain is safe and reliable, the node under the chain verifies the collected data, and requests to write into the chain after the verification succeeds to ensure that the data is correct and safe, the module on the chain first verifies the data after receiving the request for writing into the data by the node under the chain, and then performs signature after the verification passes and writes the data and the signature into the chain.
By adopting the method provided by the invention, the data written into the chain is not only subjected to security verification through the node under the chain, but also subjected to selection and verification on the data source through the module on the chain, so that the problem that the data acquired and issued by a third-party data source is possibly artificially tampered when being written into the chain is solved, and the security of the data written into the chain is ensured.
Executing step S101, the selecting of the uplink data source by the on-chain module includes:
the on-chain module comprises a storage contract and a governance contract, the storage contract is used for storing data, and the governance contract is used for issuing governance evidence to a user to generate a governance contract user;
a storage contract issues a plurality of data sources;
the governance contract user selects a data source and determines the uplink data source according to the selection result.
In an actual application process, information of the data source is usually written into the chain, and when a module on the chain selects the data source, the module can select the data source by the information written into the data source on the chain.
In embodiments of the present invention, information of the data source may be stored on the storage contract. When the intelligent contract on the chain needs data under the chain, the information of the data source can be published through the storage contract, and the information of a plurality of data sources can be published through the storage contract, so that a user on the chain can select the data source which meets the requirement from the plurality of data sources.
The governance contract on the chain is used for issuing governance evidence to the user, thereby generating governance contract users. The governance contract user selects the data source of the uplink according to the plurality of data sources issued by the storage contract.
In the method, the contract user is controlled to select from a plurality of data sources, so that the uncertainty of the uplink data source can be improved, and the possibility that the data which can be written into the chain is artificially tampered is reduced.
In a preferred embodiment of the present invention, the determining the uplink data source according to the selection result includes:
the number of the governance contract users is set to be a plurality;
each governance contract user selects a data source;
and determining the data source which is selected most as the uplink data source.
As an embodiment, for example, each governance contract user may vote in multiple data sources, and the data source with the highest vote number is the data source selected and determined by each governance contract user jointly, that is, the uplink data source.
By adopting the method, the uplink data source is determined by jointly selecting and determining the uplink data source through a plurality of governance contract users, so that the situation that the data is easily tampered by people caused by determining the uplink data source only by one governance contract user is avoided. Moreover, a plurality of governance contract users jointly select and determine the uplink data source, so that the quality of uplink data can be improved, and the fairness of data source selection are ensured.
In a preferred embodiment of the present invention, a selection period may be set, each governance contract user selects a data source in the selection period, the selection is stopped after the selection period is ended, and the most selected data sources are obtained through statistics.
By setting the selection period and enabling each governance contract user to select the data source in the selection period, the restriction force of the governance contract can be reflected, and each governance contract user can be ensured to have sufficient time to select the data source and fully exercise the governance power of the governance contract.
For example, for some simpler applications, the required linked data is simpler, the factors to be examined are fewer, or the data is more common data, the governing contract user does not need to spend much time for selection, the selection of the data source can be completed within several hours, and the selection period can be set to several hours. And when the selection period is finished, stopping the selection of each governance contract user on the data source, and then counting the number of times each data source is selected.
In a preferred embodiment of the present invention, the acquiring, by the downlink node, data according to the information of the uplink data source includes:
the downlink node reads the information of the uplink data source broadcasted by the uplink module;
the downlink node collects data from the uplinkable data source.
After the uplink module determines the uplink data source, the information of the uplink data source is broadcasted, and the downlink node can read the uplink data at regular time and acquire the information of the uplink data source broadcasted by the uplink module.
After the information of the uplink data source is read by the downlink node, the corresponding data source can be connected, and corresponding data can be collected from the data source.
The downlink node may collect data from the data source by using a common method in the art, which is not described herein again.
And after acquiring the required data, the node under the chain verifies the required data, and if the verification is successful, the node under the chain requests to write the data into the chain.
In an embodiment of the present invention, the verifying the data by the on-chain module, and writing the data to the chain after the verification is successful includes:
the governance contract user verifies the data and signs after the verification is successful;
and writing the data which is successfully verified and the signature of the governance contract user into the storage contract.
As an embodiment, for example, in order to ensure that data on a write chain is not tamper-proof, a node below the chain may perform hash operation on collected data to obtain a hash value, and send the hash value and the data to the chain at the same time, each governance contract user on the chain performs hash operation on the data respectively, and compares the received hash value with a hash value calculated by the user, if the two hash values are consistent, the verification is successful, and the signature is performed. If all governance contract users pass data verification and sign, the data can be written to the chain, otherwise the data cannot be written to the chain.
For another example, the downlink node encrypts data and sends the encrypted data onto the link. Each governance contract user on the chain decrypts the data first and then verifies the data, so that the data can be further ensured to be not tampered.
Example two
As shown in fig. 2, another aspect of the present invention further includes a functional module architecture completely corresponding to the foregoing method flow, that is, the embodiment of the present invention further provides an apparatus for updating an authorized prediction machine for data downlink, including:
the on-chain module 201 is configured to select and broadcast an uplink data source, and is further configured to verify the data by the on-chain module, and write the data into a chain after the data is successfully verified;
and the downlink node 202 is configured to collect data according to the information of the uplink data source and issue a transaction, and request to write the data into the uplink module.
In the uplink module, the selecting an uplink data source includes:
the on-chain module comprises a storage contract and a governance contract, the storage contract is used for storing data, and the governance contract is used for issuing governance evidence to a user to generate a governance contract user;
a storage contract issues a plurality of data sources;
the governance contract user selects a data source and determines the uplink data source according to the selection result.
Further, the governing contract user selects a data source, and determining the uplink data source according to the selection result comprises:
the number of the governance contract users is set to be a plurality;
each governance contract user selects a data source;
and determining the data source which is selected most as the uplink data source.
Furthermore, a selection period is set, each governance contract user selects the data source in the selection period, the selection is stopped after the selection period is finished, and the data sources which are selected most are obtained through statistics.
Further, the selection period is set according to an application.
Wherein the acquiring, by the downlink node, data according to the information of the uplink data source includes:
the downlink node reads the information of the uplink data source broadcasted by the uplink module;
the downlink node collects data from the uplinkable data source.
Further, the verifying the data by the on-chain module, and writing the data into the chain after the verifying is successful, includes:
the governance contract user verifies the data and signs after the verification is successful;
and writing the data which is successfully verified and the signature of the governance contract user into the storage contract.
The device can be implemented by the method for updating the downlink data authorization prediction machine provided in the first embodiment, and specific implementation methods can be referred to the description in the first embodiment and are not described herein again.
The invention also provides a memory storing a plurality of instructions for implementing the method according to the first embodiment.
The invention also provides an electronic device comprising a processor and a memory connected to the processor, wherein the memory stores a plurality of instructions, and the instructions can be loaded and executed by the processor to enable the processor to execute the method according to the first embodiment.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including preferred embodiments and all such alterations and modifications as fall within the scope of the invention. It will be apparent to those skilled in the art that various changes and modifications may be made in the present invention without departing from the spirit and scope of the invention. Thus, if such modifications and variations of the present invention fall within the scope of the claims of the present invention and their equivalents, the present invention is also intended to include such modifications and variations.

Claims (10)

1. A method for authorizing a predictive update of data in a chain, comprising:
the chain module selects a chain data source and broadcasts the chain data source;
the downlink node acquires data according to the information of the uplink data source and issues a transaction to request to write the data into the uplink module;
and the on-chain module verifies the data and writes the data into the chain after the data is successfully verified.
2. The method of claim 1, wherein the on-chain module selecting an uplink data source comprises:
the on-chain module comprises a storage contract and a governance contract, the storage contract is used for storing data, and the governance contract is used for issuing governance evidence to a user to generate a governance contract user;
a storage contract issues a plurality of data sources;
the governance contract user selects a data source and determines the uplink data source according to the selection result.
3. The method of claim 2, wherein the governance contract user selects a data source, and determining the uplink data source according to the selection comprises:
the number of the governance contract users is set to be a plurality;
each governance contract user selects a data source;
and determining the data source which is selected most as the uplink data source.
4. The method for updating the data authorization prediction machine under the chain according to claim 3, wherein a selection period is set, each governance contract user selects the data sources in the selection period, the selection period is ended, the selection is stopped, and the data sources which are selected most are counted.
5. The method for updating the downlink data authorization oracle of claim 4, wherein the selection period is set according to an application.
6. The method of claim 1, wherein the downlink node collecting data according to the information of the uplink data source comprises:
the downlink node reads the information of the uplink data source broadcasted by the uplink module;
the downlink node collects data from the uplinkable data source.
7. The method for authorizing prolog update of data under link of claim 2, wherein said on-link module verifies said data and writes to the link after verification is successful, comprising:
the governance contract user verifies the data and signs after the verification is successful;
and writing the data which is successfully verified and the signature of the governance contract user into the storage contract.
8. An apparatus for authorizing prolog updates for a predictive engine based on downlink data, comprising:
the on-chain module is used for selecting and broadcasting an uplink data source, verifying the data and writing the data into a chain after the data is successfully verified;
and the downlink node is used for acquiring data according to the information of the uplink data source, issuing a transaction and requesting to write the data into the uplink module.
9. A memory storing a plurality of instructions for implementing the method of any one of claims 1-7.
10. An electronic device comprising a processor and a memory coupled to the processor, the memory storing a plurality of instructions that are loadable and executable by the processor to enable the processor to perform the method according to any of claims 1-7.
CN202110366917.3A 2021-04-06 2021-04-06 Method and device for updating downlink data authorization prediction machine and electronic equipment Pending CN113065167A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110366917.3A CN113065167A (en) 2021-04-06 2021-04-06 Method and device for updating downlink data authorization prediction machine and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110366917.3A CN113065167A (en) 2021-04-06 2021-04-06 Method and device for updating downlink data authorization prediction machine and electronic equipment

Publications (1)

Publication Number Publication Date
CN113065167A true CN113065167A (en) 2021-07-02

Family

ID=76565940

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110366917.3A Pending CN113065167A (en) 2021-04-06 2021-04-06 Method and device for updating downlink data authorization prediction machine and electronic equipment

Country Status (1)

Country Link
CN (1) CN113065167A (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108694669A (en) * 2018-07-18 2018-10-23 矩阵元技术(深圳)有限公司 A kind of block chain intelligence contract implementation method and device
CN110633286A (en) * 2019-09-29 2019-12-31 山东爱城市网信息技术有限公司 Block chain-based time service prediction machine implementation method
CN110930254A (en) * 2019-11-19 2020-03-27 腾讯科技(深圳)有限公司 Data processing method, device, terminal and medium based on block chain
CN110992020A (en) * 2019-11-19 2020-04-10 腾讯科技(深圳)有限公司 Data processing method based on intelligent contract, related node and storage medium
CN111145023A (en) * 2019-12-17 2020-05-12 上海交通大学 Cross-chain exchange method, system and medium based on trusted prediction machine
CN111460474A (en) * 2020-03-27 2020-07-28 北京瑞卓喜投科技发展有限公司 Method and device for realizing decentralized prediction machine, storage and computer
CN111488616A (en) * 2020-04-08 2020-08-04 北京瑞策科技有限公司 Method and device for realizing preplan machine of service data block chain
CN111801910A (en) * 2017-12-15 2020-10-20 区块链控股有限公司 System and method for authenticating off-chain data based on proof verification
CN111953648A (en) * 2020-06-22 2020-11-17 北京欧链科技有限公司 Data processing method and device based on block chain prediction machine and electronic equipment
CN112016105A (en) * 2020-08-17 2020-12-01 东北大学秦皇岛分校 Chain uplink and downlink data sharing scheme based on distributed propheter and homomorphic encryption
CN112053240A (en) * 2020-08-07 2020-12-08 深圳区块大陆科技有限公司 Method for realizing predictive speech machine function on block chain
CN112150266A (en) * 2020-05-07 2020-12-29 北京天德科技有限公司 Design principle of intelligent contract prediction machine
CN112507360A (en) * 2020-12-10 2021-03-16 浙商银行股份有限公司 Block chain data uplink method and device based on threshold signature and prediction machine

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111801910A (en) * 2017-12-15 2020-10-20 区块链控股有限公司 System and method for authenticating off-chain data based on proof verification
CN108694669A (en) * 2018-07-18 2018-10-23 矩阵元技术(深圳)有限公司 A kind of block chain intelligence contract implementation method and device
CN110633286A (en) * 2019-09-29 2019-12-31 山东爱城市网信息技术有限公司 Block chain-based time service prediction machine implementation method
CN110930254A (en) * 2019-11-19 2020-03-27 腾讯科技(深圳)有限公司 Data processing method, device, terminal and medium based on block chain
CN110992020A (en) * 2019-11-19 2020-04-10 腾讯科技(深圳)有限公司 Data processing method based on intelligent contract, related node and storage medium
CN111145023A (en) * 2019-12-17 2020-05-12 上海交通大学 Cross-chain exchange method, system and medium based on trusted prediction machine
CN111460474A (en) * 2020-03-27 2020-07-28 北京瑞卓喜投科技发展有限公司 Method and device for realizing decentralized prediction machine, storage and computer
CN111488616A (en) * 2020-04-08 2020-08-04 北京瑞策科技有限公司 Method and device for realizing preplan machine of service data block chain
CN112150266A (en) * 2020-05-07 2020-12-29 北京天德科技有限公司 Design principle of intelligent contract prediction machine
CN111953648A (en) * 2020-06-22 2020-11-17 北京欧链科技有限公司 Data processing method and device based on block chain prediction machine and electronic equipment
CN112053240A (en) * 2020-08-07 2020-12-08 深圳区块大陆科技有限公司 Method for realizing predictive speech machine function on block chain
CN112016105A (en) * 2020-08-17 2020-12-01 东北大学秦皇岛分校 Chain uplink and downlink data sharing scheme based on distributed propheter and homomorphic encryption
CN112507360A (en) * 2020-12-10 2021-03-16 浙商银行股份有限公司 Block chain data uplink method and device based on threshold signature and prediction machine

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
STEVE ELLIS等: ""ChainLink A Decentralized Oracle Network"", pages 1 - 38, Retrieved from the Internet <URL:https://research.chain.link/whitepaper-v1.pdf> *
管哿浠等: ""基于预言机和零知识证明的区块链数据上链方案"", 信息安全与保密通信, 20 October 2022 (2022-10-20), pages 25 - 37 *

Similar Documents

Publication Publication Date Title
CN108683539B (en) Block chain network management method, block chain network management device, block chain network management medium and electronic equipment
CN108596623B (en) Block chain consensus achieving method
CN108959621B (en) Method, device, equipment and storage medium for realizing block chain network
CN108846673B (en) Block data processing method, device, equipment and storage medium
CN110780847B (en) Random number generation method, random number generation device and electronic equipment
CN108711212B (en) Voting certificate storage method, device and system
CN110582769A (en) single-account multi-identity login method, device, server and storage medium
CN110266635B (en) Vehicle information sharing method and device, computer readable medium and electronic equipment
CN108665363B (en) Block chain consensus achieving device
CN108629588B (en) Computer readable medium for block chain consensus achievement
CN110557403A (en) Resource allocation method and device based on block chain, storage medium and node equipment
CN108648082B (en) Computer system for block chain consensus achievement
CN110599233B (en) Advertisement anti-cheating method and device based on click verification
CN112631550A (en) Block chain random number generation method, device, equipment and computer storage medium
CN106649638B (en) Big data acquisition method
CN108961055B (en) Block consensus award and punishment method, device, equipment and storage medium
US9124570B1 (en) Providing an assessment of authentication requests
CN112907243A (en) Block chain transaction auditing method and device
CN112181599B (en) Model training method, device and storage medium
CN113065167A (en) Method and device for updating downlink data authorization prediction machine and electronic equipment
CN110347657B (en) Data generation method, device, electronic equipment and storage medium
CN111858752A (en) Artificial intelligence training method and device based on block chain and storage medium
CN111858753A (en) Block chain-based training parameter processing method, device and storage medium
CN114240436A (en) Electronic certificate verification and cancellation method and device, computer equipment and storage medium
CN115422584A (en) Data deformation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination