Unlock instant, AI-driven research and patent intelligence for your innovation.

Consortium chain credibility verification method, system, device and equipment

A verification method and reliability technology, applied in the information field, can solve problems such as poor experience and achieve the effect of improving user experience

Active Publication Date: 2020-06-30
ADVANCED NEW TECH CO LTD
View PDF7 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the problem in the prior art that users have poor experience in authenticating consortium chains, in order to improve user experience, this embodiment of this specification provides a solution that allows users to verify the credibility of consortium chains. The first aspect of the solution includes a method for verifying the credibility of the alliance chain. After the client generates a transaction and stores the transaction on the chain through the docking node, it includes:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Consortium chain credibility verification method, system, device and equipment
  • Consortium chain credibility verification method, system, device and equipment
  • Consortium chain credibility verification method, system, device and equipment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0059] In a specific implementation, the client obtains multiple node addresses in the consortium chain. The client can randomly obtain multiple node addresses in the consortium chain. Randomly obtaining node address verification can make the verification result more fair on the one hand. On the other hand, it can also make the user's request evenly flow to each node, so as to avoid the heavy load of some nodes with many users. Alternatively, the client obtains multiple node addresses in the consortium chain that include the address of the docking node. In this way, the user can first select a batch of node addresses, and then add the addresses of the docking nodes. When adding a docking node for verification, the returned result also includes the verification result of the docking node, which can make the verification more targeted and improve user experience.

[0060] In a specific implementation manner, the client may also send a transaction location query request to the mu...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Disclosed are a credibility verification method, system, device and equipment for an alliance chain. In the solution provided by the embodiment of this specification, after the client completes the transaction on-chain deposit certificate through the docking node, for the transaction, the client initiates an SPV request to multiple nodes in the alliance chain to verify whether the transaction is in the alliance On the chain, the respective verification results of multiple nodes for the transaction can be obtained. Furthermore, the credibility of the consortium chain can be verified based on the consistency of the SPV verification results of multiple nodes to improve user experience.

Description

technical field [0001] The embodiments of this specification relate to the field of information technology, and in particular to the credibility verification method, system, device and equipment of the consortium chain. Background technique [0002] In the consortium chain, there are often multiple nodes with very different functions. For example, on a consortium chain with copyright certificates, it may include work release nodes, copyright registration nodes, copyright transfer nodes, and notary nodes, etc. However, based on the different needs of users, only one of the nodes is usually connected to the user, and this node can be considered as the connection node of the user. For example, a user publishes a transaction through an application program APP published by a certain node, and deposits the transaction in the alliance chain through the docking node, and the subsequent verification is often performed through the docking node. [0003] In this process, it is difficu...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/40G06Q40/04
CPCG06Q20/401G06Q40/04G06Q30/018G06Q50/18G06Q2220/10G06Q30/06G06Q20/4016H04L9/50H04L2209/56H04L63/00G06Q20/3827G06Q2220/00H04L9/3236
Inventor 杨新颖
Owner ADVANCED NEW TECH CO LTD