Method and device for sending and verifying cross-chain communication data

A technology of communication data and transmission method, applied in the field of cross-chain communication data transmission and verification, to achieve the effect of improving security and ensuring security

Active Publication Date: 2020-07-28
北京新创智链科技有限公司
View PDF7 Cites 20 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, there are great security problems in cross-chain technology in the existing technol

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and device for sending and verifying cross-chain communication data
  • Method and device for sending and verifying cross-chain communication data
  • Method and device for sending and verifying cross-chain communication data

Examples

Experimental program
Comparison scheme
Effect test

no. 1 example

[0058] Such as figure 2 Shown is a schematic diagram of the verification of cross-chain transactions from the side chain to the main chain in the embodiment of this paper. In this figure, multiple nodes (user terminals) in the side chain are described to conduct transactions to the main chain (transaction data such as transaction requests) , these cross-chain transaction data form communication data, wherein the communication data includes multiple cross-chain transaction data, and the multiple cross-chain transaction data is used as a sequence (multiple cross-chain transaction data are stored in one cross-chain transaction block ), the hash value of the hash chain node corresponding to this sequence can also include the block header information of the block formed by the side chain for these transaction data, and the process of verifying the communication data at the relay node of the main chain.

[0059] Step 201, multiple nodes initiate cross-chain transactions to the main...

no. 2 example

[0118] As another example of this paper, such as Figure 6 Shown is the verification flowchart of one side chain sending cross-chain transaction data to the other side chain in the embodiment of this article. In this example, the verification process of the first side chain sending cross-chain transaction data to the second side chain through the main chain is described ,details as follows:

[0119] Step 601, multiple nodes in the first side chain initiate cross-chain transactions to the main chain.

[0120] In this step, multiple nodes in the first side chain need to conduct cross-chain transactions to the second side chain, such as querying or storing data, but since the first side chain and the second side chain belong to two side chains, in this article In the technical solution, the two side chains cannot communicate directly, and need to be forwarded through the main chain. Therefore, in this embodiment, multiple nodes (computers, mobile phones, screen board computers o...

no. 3 example

[0140] In this example, refer to the attached Figure 8 The communication data structure, that is, in the block with a height of H+2, there are also information about the voting and signature of multiple decision-maker nodes in the side chain for the block with a height of H+1, and the main chain relay node or other Functional nodes (or side chain nodes that receive cross-chain transaction data) can follow the attached Figure 9 The flow chart of the method for verifying communication data shown in the verification process:

[0141] Step 901, after the main chain relay node receives the above-mentioned cross-chain communication data, the main chain relay node calculates the hash value of the block header according to the block header information whose block height is H+1.

[0142] In this step, the main chain relay node calculates the block header of the block with a height of H+1 through the block header information in the communication data (such as the hash value of the pa...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to the technical field of blockchain security, in particular to a method and device for sending and verifying cross-chain communication data. According to the scheme, hash operation is carried out on cross-chain transaction data to form a current hash chain node related to the front and back of a hash chain node; and the cross-chain transaction data and the hash value of thecurrent hash chain node are sent to a target block chain, operation is carried out on the cross-chain transaction data by using the same hash operation method in the target block chain, and a calculation result is compared with the hash value of the current hash chain node so as to verify the cross-chain communication data. The security of communication between a side chain and a main chain can beimproved.

Description

technical field [0001] This article relates to the field of blockchain security technology, in particular to a method and device for sending and verifying cross-chain communication data. Background technique [0002] A distributed ledger system (DLS), which may also be referred to as a consensus network and / or a blockchain network, enables participating entities to store data securely and immutably. Without referencing any specific use case, DLS is often referred to as a blockchain network. [0003] Example types of blockchain networks may include public blockchain networks, private blockchain networks, and consortium blockchain networks. The public blockchain network is open to all entities to use DLS and to participate in the consensus process. Private blockchain networks are provided for specific entities that centrally control read and write permissions. Consortium blockchain networks are provided for selected groups of entities that control the consensus process and ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L29/06H04L9/06H04L29/08G06Q40/04G06F21/64
CPCH04L63/083H04L67/10H04L67/1097H04L9/0643G06Q40/04G06F21/64H04L9/50
Inventor 胡勇新蒋万江谢新强周爱佘伦凯
Owner 北京新创智链科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products