Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A method for detecting a transaction data source in a multi-chain scenario of a superbook

A detection method and transaction data technology, which are applied in the detection field of multi-channel data sources, can solve the problems of inability to achieve data isolation, synchronization and storage of data with different degrees of sensitivity, etc., so as to avoid sensitive data leakage and ensure security. sexual effect

Active Publication Date: 2019-02-26
SICHUAN UNIV
View PDF1 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

This technology uses an initial sign check (ECC) system for securely transmitting transactions between multiple servers or machines without compromising their privacy. It also increases the amount of randomness that can be added during transmission compared with previous systems where only one server was able to verify its own identity before sending it over again. By doing this, these techniques help prevent unauthorized access from leaking important financial details about customers' accounts.

Problems solved by technology

This technical problem addressed in this patented text relates to improving trustworthiness between collaborative systems such as hyperledgers or Blockchard® while maintaining their ability to store large amounts of data securely over time. Current methods involve adding new tokens at random locations along with other tokens until they reach agreement. These techniques may expose important parts of data even if some were compromised due to attacks from hackers who could modify these areas.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A method for detecting a transaction data source in a multi-chain scenario of a superbook
  • A method for detecting a transaction data source in a multi-chain scenario of a superbook

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] The present invention will be further described in detail below in conjunction with the accompanying drawings and specific embodiments.

[0024] figure 1 It is the processing flow chart from transaction submission to block generation in the original Hyperledger Fabric;

[0025] combine figure 2 (The processing flow chart of submitting transactions to generated blocks in the super ledger of this scheme), the improved complete transaction execution and sorting include the following steps (each node has been started and completed):

[0026] Step 1: The client generates a transaction proposal, signs it to obtain a SignedProposal, sends the SignedProposal to the endorsement node for endorsement, and the channel information of the transaction is included in SignedProposal.ProposalBytes.Header.ChannelHeader;

[0027] Step 2: The endorsement node simulates the execution of the transaction after receiving the proposal request, modifies the ProposalResponse data structure in t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a method for detecting a transaction data source under a multi-chain scenario of a super account book. The specific steps are as follows: allowing a client end to construct a transaction proposal to endorse to an endorsing node; simulating a transaction, returning an endorsement response, and a header hash; constructing a transaction request Envelope and sorting the requests; verifying client and endorsement node signatures; verifying the hash value of the transaction header and the corresponding field; continuing to execute the original sorting operation and generate blocks; The invention realizes the detection that the malicious client intentionally discloses the sensitive information due to the inadequate verification of the channel at the exchange, avoids the sensitive data disclosure problem caused by the distribution error of the transaction channel due to the lack of verification of the sorting service, and thus ensures the safety of the transaction dataunder the multi-chain scenario.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Owner SICHUAN UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products