Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Method and device for deploying contracts

A contract and privacy technology, applied in the field of contract deployment, can solve problems such as performance loss

Active Publication Date: 2020-10-02
ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] In related technologies, to meet the privacy requirements in various scenarios, one way is to achieve privacy protection through encryption technologies such as homomorphic encryption (Homomorphic encryption) and zero-knowledge proof (Zero-knowledge proof), but it also brings serious performance loss

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for deploying contracts
  • Method and device for deploying contracts
  • Method and device for deploying contracts

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0084] Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numerals in different drawings refer to the same or similar elements unless otherwise indicated. Implementations described in the following exemplary embodiments do not represent all implementations consistent with one or more embodiments of this specification. Rather, they are merely examples of apparatuses and methods consistent with aspects of one or more embodiments of the present specification as recited in the appended claims.

[0085] It should be noted that in other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described in this specification. In some other embodiments, the method may include more or less steps than those described in this specification. In addition, a single step described in this...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

One or more embodiments of this specification provide a method and device for deploying a contract. The method includes: the client obtains a remote attestation report for an off-chain privacy computing node, and the remote attestation report is a self-recommendation generated by an authentication server for an off-chain privacy computing node The self-recommendation information is related to the off-chain trusted execution environment created on the off-chain private computing node; the client sends the word of the off-chain contract to the The bytecode is encrypted and transmitted to the off-chain privacy computing node, and the off-chain privacy computing node decrypts the bytecode in the off-chain trusted execution environment and deploys it; among them, the blockchain node initiates a call to the off-chain contract through the oracle mechanism In the case of , the deployed bytecode can be executed in the off-chain trusted execution environment, and the execution result can be fed back to the blockchain node through the oracle mechanism. This manual can realize the privacy protection of the computing process.

Description

technical field [0001] One or more embodiments of this specification relate to the technical field of verifiable computing, and in particular to a method and device for deploying a contract. Background technique [0002] In related technologies, to meet the privacy requirements in various scenarios, one way is to achieve privacy protection through encryption technologies such as homomorphic encryption (Homomorphic encryption) and zero-knowledge proof (Zero-knowledge proof), but it also brings Serious performance loss. Trusted Execution Environment (TEE) is another solution. TEE can function as a black box in the hardware, and the code and data operating system layer executed in the TEE cannot be peeked at, and only the predefined interface in the code can operate on it. In terms of efficiency, due to the black-box nature of TEE, plaintext data is used for operations in TEE, rather than complex cryptographic operations in homomorphic encryption, and there is no loss in the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6245
Inventor 吴因佥邱鸿霖吴行行
Owner ALIPAY (HANGZHOU) INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products