Method, system, device and equipment for verifying credibility of alliance chain

A verification method and reliability technology, applied in the information field, can solve problems such as poor experience and achieve the effect of improving user experience

Active Publication Date: 2019-07-23
ADVANCED NEW TECH CO LTD
View PDF8 Cites 14 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] In view of the problem in the prior art that users have poor experience in authenticating consortium chains, in order to improve user experience, this embodiment of this specification provides a solution that allows users to verify the credibility of consortium chains. The first aspect of the solution includes a method for verifying the credibility of the alliance chain. After the client generates a transaction and stores the transaction on the chain through the docking node, it includes:

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method, system, device and equipment for verifying credibility of alliance chain
  • Method, system, device and equipment for verifying credibility of alliance chain
  • Method, system, device and equipment for verifying credibility of alliance chain

Examples

Experimental program
Comparison scheme
Effect test

Embodiment approach

[0061] In a specific implementation, the client obtains multiple node addresses in the consortium chain. The client can randomly obtain multiple node addresses in the consortium chain. Randomly obtaining node address verification can make the verification result more fair on the one hand. On the other hand, it can also make the user's request evenly flow to each node, so as to avoid the heavy load of some nodes with many users. Alternatively, the client obtains multiple node addresses in the consortium chain that include the address of the docking node. In this way, the user can first select a batch of node addresses, and then add the addresses of the docking nodes. When adding a docking node for verification, the returned result also includes the verification result of the docking node, which can make the verification more targeted and improve user experience.

[0062] In a specific implementation manner, the user may also send a simple payment verification SPV request to the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method, system, device and equipment for verifying the credibility of an alliance chain. After a client completes transaction on-chain storage through a butt joint node, forthe transaction, the client initiates a transaction position query request to a plurality of nodes in an alliance chain for the transaction, so that respective query results of the plurality of nodesfor the transaction can be obtained. Furthermore, the credibility of the alliance chain can be verified based on the consistency degree of the position query results of the multiple nodes, and the user experience is improved.

Description

technical field [0001] The embodiments of this specification relate to the field of information technology, and in particular to a method, system, device and equipment for verifying the credibility of a consortium chain. Background technique [0002] In the consortium chain, there are often multiple nodes with very different functions. For example, on a consortium chain with copyright certificates, it may include work release nodes, copyright registration nodes, copyright transfer nodes, and notary nodes, etc. However, based on the different needs of users, only one of the nodes is usually connected to the user, and this node can be considered as the connection node of the user. For example, a user publishes a transaction through an application program APP published by a certain node, and deposits the transaction in the alliance chain through the docking node, and the subsequent verification is often performed through the docking node. [0003] In this process, it is diffic...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/08H04L29/06G06Q40/04
CPCG06Q40/04H04L63/123H04L67/10
Inventor 杨新颖
Owner ADVANCED NEW TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products