Transaction request processing method and device and alliance chain

文档序号:192421 发布日期:2021-11-02 浏览:27次 中文

阅读说明:本技术 交易请求的处理方法、装置以及联盟链 (Transaction request processing method and device and alliance chain ) 是由 孙海锋 于 2020-04-30 设计创作,主要内容包括:本申请提供了一种交易请求的处理方法、装置、联盟链以及计算机可读存储介质,用于在一定程度上提高联盟链处理交易请求时的安全性,保证数据安全。方法包括:联盟链第一组织获取联盟链中任意联盟链节点发送的交易请求;若交易请求验证为合法,联盟链第一组织向多个联盟链第二组织发送交易请求;若交易请求验证为合法,多个联盟链第二组织分别获取交易请求的第一处理结果,并分别向联盟链第一组织发送第一处理结果;若第一处理结果验证为合法,联盟链第一组织根据多个第一处理结果,获取交易请求的第二处理结果,并向多个联盟链第二组织发送第二处理结果;若第二处理结果验证为合法,多个联盟链第二组织根据第二处理结果处理交易请求。(The application provides a transaction request processing method, a transaction request processing device, a federation chain and a computer-readable storage medium, which are used for improving the security of the federation chain when processing the transaction request to a certain extent and ensuring the data security. The method comprises the following steps: a first alliance chain organization acquires a transaction request sent by any alliance chain node in an alliance chain; if the transaction request is verified to be legal, the first alliance chain organization sends the transaction request to a plurality of second alliance chain organizations; if the transaction request is verified to be legal, the plurality of alliance chain second organizations respectively obtain first processing results of the transaction request and respectively send the first processing results to the alliance chain first organizations; if the first processing result is verified to be legal, the first organization of the alliance chain obtains a second processing result of the transaction request according to the plurality of first processing results and sends the second processing result to the plurality of second organizations of the alliance chain; and if the second processing result is verified to be legal, the plurality of alliance chain second organizations process the transaction request according to the second processing result.)

1. A method for processing a transaction request, the method being applied to a federation chain, the method comprising:

a first alliance chain organization acquires a transaction request sent by any alliance chain node in an alliance chain;

if the transaction request is verified to be legal, the alliance chain first organization sends the transaction request to a plurality of alliance chain second organizations;

if the transaction request is verified to be legal, the plurality of alliance chain second organizations respectively obtain first processing results of the transaction request and respectively send the first processing results to the alliance chain first organizations;

if the first processing result is verified to be legal, the alliance chain first organization obtains a second processing result of the transaction request according to the plurality of first processing results and sends the second processing result to the plurality of alliance chain second organizations;

and if the second processing result is verified to be legal, processing the transaction request by a plurality of alliance chain second organizations according to the second processing result.

2. The method of claim 1, wherein obtaining, by the federation chain first organization, a second processing result for the transaction request based on the plurality of first processing results comprises:

the first organization of the alliance chain obtains the number of consenting processing results in the first processing results;

if the number of the agreement processing results meets a number threshold within a preset time, the first alliance chain generates the agreement processing results of the transaction request as the second processing results, wherein the number of the number threshold is 2f +1, f is the number of the Byzantine nodes of the alliance chain, and the number of the alliance chain organizations in the alliance chain is larger than 3f + 1;

and if the quantity of the agreement processing results is lower than the quantity threshold value in the preset time, generating a refusal processing result of the transaction request by the first organization in the alliance as the second processing result.

3. The method of claim 2, wherein before the federation chain first organization obtains the transaction request sent by any federation chain node in the federation chain, the method further comprises:

randomly selecting one alliance chain organization from the alliance chains as the alliance chain first organization by the any alliance chain node;

the sending, by the federation chain first organization, the transaction request to a plurality of federation chain second organizations comprises:

the federation chain first organization identifies federation chain organizations other than itself in the federation chain as a plurality of the second federation chain second organizations, and broadcasts the transaction request in the federation chain network.

4. The method of claim 3, wherein processing the transaction request according to the second processing result by a plurality of federation chain second organizations comprises:

and the plurality of alliance chain second organizations package the transaction request and the organization identification of the initiating organization of the transaction request according to the received second processing result, obtain the block information corresponding to the transaction request and store the block information.

5. The method of claim 4, further comprising:

the federation chain first organization decrypts a first digital signature of the transaction request by using the public key of the initiating organization, verifies whether the decrypted first digital signature is legal or not, and triggers to send the transaction request to a plurality of federation chain second organizations if the decrypted first digital signature is legal, wherein the first digital signature is obtained by encrypting the private key of the initiating organization by the initiating organization;

the plurality of alliance chain second organizations respectively decrypt the second digital signature of the transaction request by using the public key of the alliance chain first organization, verify whether the decrypted second digital signature is legal or not, if the decrypted second digital signature is legal, trigger to obtain a first processing result of the transaction request and send the first processing result to the alliance chain first organization, wherein the second digital signature is obtained by encrypting the first alliance chain first organization through the private key of the alliance chain first organization;

the alliance chain first organization decrypts third digital signatures of the first processing results by using a threshold signature public key, verifies whether the decrypted third numbers are legal or not, if the third numbers are legal, triggers to obtain a second processing result of the transaction request according to the first processing results and sends the second processing result to the alliance chain second organizations, wherein the third digital signatures are obtained by encrypting the alliance chain second organizations by using a threshold signature private key;

and the plurality of alliance chain second organizations decrypt fourth digital signatures of the second processing result by using the threshold signature public key, verify whether the decrypted fourth digital signatures are legal, and trigger the processing of the transaction request according to the second processing result if the decrypted fourth digital signatures are legal, wherein the fourth digital signatures are synthesized by the alliance chain first organizations according to the plurality of third digital signatures.

6. The method of claim 5, wherein the transaction request comprises a uplink request of an organization to be uplink, a downlink request of an organization to be downlink, a request for updating logistics state of the logistics, a request for updating claim state of the logistics, or a request for updating logistics resources.

7. The method of claim 6, wherein after the federation chain first organization obtains a second processing result of the transaction request based on a plurality of the first processing results, the method further comprises:

when the transaction request is the uplink request or the downlink request, the federation chain first organization further sends the second processing result to a certificate organization in the federation chain;

the certificate organization decrypts a fifth digital signature of the second processing result by using the threshold signature public key and verifies whether the decrypted fifth digital signature is legal or not, wherein the fifth digital signature is synthesized by the first organization of the federation chain according to a plurality of third digital signatures;

if the verification is legal, the certificate organization issues a new digital certificate for the initiating organization in a certificate list according to the second processing result and the block information, or revokes the digital certificate issued by the initiating organization in the certificate list.

8. An apparatus for processing a transaction request, the apparatus comprising:

the first transceiving unit is used for acquiring a transaction request sent by any alliance chain node in an alliance chain;

the first receiving and sending unit is further used for sending the transaction request to a plurality of alliance chain second organizations if the transaction request is verified to be legal by the first processing unit;

the second receiving and sending unit is used for acquiring a first processing result of the transaction request and respectively sending the first processing result to the first organization of the alliance chain if the transaction request is verified to be legal by the second processing unit;

the first processing unit is further configured to, if the transaction request is verified to be legitimate, obtain a second processing result of the transaction request according to the plurality of first processing results, and send the second processing result to the plurality of alliance chain second organizations through the first transceiver unit;

and the second processing unit is further used for processing the transaction request according to the second processing result if the second processing result is verified to be legal.

9. A federation chain comprising a first organization of federation chains and a second organization of federation chains, the first organization of federation chains comprising a first processor and a first memory having stored therein a computer program, the first processor, when invoking the computer program in the first memory, performing the steps performed by the first organization of federation chains in the method of any one of claims 1 to 7; the federation chain second organization comprises a second processor and a second memory, the second memory having stored therein a computer program, the second processor, when calling the computer program in the second memory, performing the steps performed by the federation chain second organization in the method of any one of claims 1 to 7.

10. A computer readable storage medium storing instructions adapted to be loaded by a processor to perform the steps of a method as claimed in any one of claims 1 to 7 performed by a first federation chain organization or by a second federation chain organization.

Technical Field

The present application relates to the field of blockchain, and in particular, to a method and an apparatus for processing a transaction request, a federation chain, and a computer-readable storage medium.

Background

In the block chain technology, a federation chain between a public chain and a private chain is suitable for a federation formed by a plurality of organization organizations with interests in commercial application, and the normal operation of the block chain is commonly maintained, in other words, the federation chain is a cluster formed by a plurality of private chains, and the block chain is a block chain which is commonly managed by a plurality of organizations.

When a alliance chain is created, the established alliance chain member organization is usually most organizations in the subsequent alliance chain, and after the alliance chain is created, a network administrator can examine new organization members, add and uplink the new organization members, so that the purpose of expanding the alliance chain is achieved.

In the existing research process of related technologies, the inventor finds that a security risk exists in an extension mode of a new organization member of an existing federation chain, and if the network administrator is a malicious node or suddenly becomes a malicious node, more malicious nodes can be pulled in for the federation chain, and the data security of the federation chain can be damaged.

Disclosure of Invention

The application provides a transaction request processing method, a transaction request processing device, a federation chain and a computer-readable storage medium, which are used for improving the security of the federation chain when processing the transaction request to a certain extent and ensuring the data security.

In a first aspect, the present application provides a method for processing a transaction request, where the method is applied to a federation chain, and the method includes:

a first alliance chain organization acquires a transaction request sent by any alliance chain node in an alliance chain;

if the transaction request is verified to be legal, the first alliance chain organization sends the transaction request to a plurality of second alliance chain organizations;

if the transaction request is verified to be legal, the plurality of alliance chain second organizations respectively obtain first processing results of the transaction request and respectively send the first processing results to the alliance chain first organizations;

if the first processing result is verified to be legal, the first organization of the alliance chain obtains a second processing result of the transaction request according to the plurality of first processing results and sends the second processing result to the plurality of second organizations of the alliance chain;

and if the second processing result is verified to be legal, the plurality of alliance chain second organizations process the transaction request according to the second processing result.

With reference to the first aspect of the present application, in a first possible implementation manner of the first aspect of the present application, the obtaining, by the first organization in the federation chain, the second processing result of the transaction request according to the plurality of first processing results includes:

acquiring the number of consenting processing results in the plurality of first processing results by the first organization of the alliance chain;

if the quantity of the agreement processing results meets a quantity threshold value within preset time, generating an agreement processing result of the transaction request by the first alliance chain as a second processing result, wherein the quantity threshold value is 2f +1, f is the number of Byzantine nodes of the alliance chain, and the quantity of the alliance chain organizations in the alliance chain is larger than 3f + 1;

and if the quantity of the processing results agreed within the preset time is lower than the quantity threshold, generating a refusal processing result of the transaction request by the first organization in the alliance, and taking the refusal processing result as a second processing result.

With reference to the first possible implementation manner of the first aspect of the present application, in a second possible implementation manner of the first aspect of the present application, before the first organization of the federation chain obtains the transaction request sent by any node of the federation chain, the method further includes:

randomly selecting one alliance chain organization from the alliance chains as an alliance chain first organization by any alliance chain node;

sending, by the federation chain first organization, transaction requests to a plurality of federation chain second organizations comprises:

the federation chain first organization identifies federation chain organizations other than itself in the federation chain as a plurality of second federation chain second organizations, and broadcasts the transaction request in the federation chain network.

With reference to the second possible implementation manner of the first aspect of the present application, in a third possible implementation manner of the first aspect of the present application, the processing, by the second organization of the federation chain, the transaction request according to the second processing result includes:

and the second organization of the alliance chain encapsulates the transaction request and the organization identification of the initiating organization of the transaction request according to the second processing result to obtain the block information corresponding to the transaction request, and stores the block information.

With reference to the third possible implementation manner of the first aspect of the present application, in a fourth possible implementation manner of the first aspect of the present application, the method further includes:

the method comprises the steps that a federation chain first organization decrypts a first digital signature of a transaction request by using a public key of an initiating organization, verifies whether the decrypted first digital signature is legal or not, and triggers sending of the transaction request to a plurality of federation chain second organizations if the decrypted first digital signature is legal, wherein the first digital signature is obtained by encrypting the private key of the initiating organization by the initiating organization;

the method comprises the steps that a plurality of alliance chain second organizations respectively decrypt a second digital signature of a transaction request by using a public key of an alliance chain first organization, verify whether the decrypted second digital signature is legal or not, if the decrypted second digital signature is legal, trigger to obtain a first processing result of the transaction request and send the first processing result to the alliance chain first organization, wherein the second digital signature is obtained by encrypting the alliance chain first organization through a private key of the alliance chain first organization;

the first alliance chain organization decrypts third digital signatures of the first processing results by using the threshold signature public key, verifies whether the decrypted third numbers are legal or not, if the third numbers are legal, triggers a second processing result of the transaction request according to the first processing results, and sends the second processing result to the second alliance chain organizations, wherein the third digital signatures are obtained by encrypting the second alliance chain organizations by using a threshold signature private key;

and the second organization of the alliance chain decrypts the fourth digital signature of the second processing result by using the threshold signature public key, verifies whether the decrypted fourth digital signature is legal or not, and triggers the processing of the transaction request according to the second processing result if the decrypted fourth digital signature is legal, wherein the third digital signature is synthesized by the first organization of the alliance chain according to a plurality of third digital signatures.

With reference to the fourth possible implementation manner of the first aspect of the present application, in a fifth possible implementation manner of the first aspect of the present application, the transaction request includes an uplink request of an organization to be uplink, a downlink request of an organization to be downlink, an update request of a logistics state of the logistics piece, an update request of a claim state of the logistics piece, or an update request of a logistics resource.

With reference to the fifth possible implementation manner of the first aspect of the present application, in a sixth possible implementation manner of the first aspect of the present application, after the first organization in the federation chain obtains the second processing result of the transaction request according to the plurality of first processing results, the method further includes:

when the transaction request is an uplink request or a downlink request, the first alliance of the alliance chain also sends a second processing result to a certificate organization in the alliance chain;

the certificate organization decrypts a fifth digital signature of the second processing result by using the threshold signature public key and verifies whether the decrypted fifth digital signature is legal or not, wherein the fifth digital signature is synthesized by the first organization of the alliance chain according to a plurality of third digital signatures;

if the verification is legal, the certificate organization issues a new digital certificate for the initiating organization in the certificate list according to the second processing result and the block information, or revokes the digital certificate issued by the initiating organization in the certificate list.

In a second aspect, the present application provides an apparatus for processing a transaction request, the apparatus comprising:

the first transceiving unit is used for acquiring a transaction request sent by any alliance chain node in an alliance chain;

the first receiving and sending unit is also used for sending the transaction request to a plurality of alliance chain second organizations if the transaction request is verified to be legal by the first processing unit;

the second receiving and sending unit is used for acquiring a first processing result of the transaction request and respectively sending the first processing result to the first organization of the alliance chain if the transaction request is verified to be legal by the second processing unit;

the first processing unit is further used for acquiring a second processing result of the transaction request according to the plurality of first processing results and sending the second processing result to the plurality of alliance chain second organizations through the first transceiver unit if the first processing result is verified to be legal;

and the second processing unit is also used for processing the transaction request according to the second processing result if the second processing result is verified to be legal.

With reference to the second aspect of the present application, in a first possible implementation manner of the second aspect of the present application, the first processing unit is specifically configured to:

obtaining the number of consenting processing results in the plurality of first processing results;

if the quantity of the agreement processing results meets a quantity threshold value within preset time, generating an agreement processing result of the transaction request as a second processing result, wherein the numerical value of the quantity threshold value is 2f +1, f is the number of Byzantine nodes of the alliance chain, and the quantity of alliance chain organizations in the alliance chain is larger than 3f + 1;

and if the quantity of the processing results agreed within the preset time is lower than the quantity threshold, generating a refusing processing result of the transaction request as a second processing result.

With reference to the first possible implementation manner of the second aspect of the present application, in a second possible implementation manner of the second aspect of the present application, the apparatus further includes a third processing unit, configured to randomly select one federation chain organization from the federation chains as a first federation chain organization;

the first processing unit is specifically configured to identify the alliance chain organization except the alliance chain organization as a plurality of second alliance chain second organizations, and broadcast the transaction request in the alliance chain network through the first transceiver unit.

With reference to the second possible implementation manner of the second aspect of the present application, in a third possible implementation manner of the second aspect of the present application, the second processing unit is specifically configured to:

and according to the second processing result, packaging the transaction request and the organization identifier of the initiating organization of the transaction request to obtain the block information corresponding to the transaction request, and storing the block information.

With reference to the third possible implementation manner of the second aspect of the present application, in a fourth possible implementation manner of the second aspect of the present application, the first processing unit is further configured to decrypt the first digital signature of the transaction request with the public key of the originating organization, and verify whether the decrypted first digital signature is legal, and if the decrypted first digital signature is legal, trigger the first transceiver unit to send the transaction request to the second organizations of the multiple federation chains, where the first digital signature is obtained by encrypting, by the originating organization, the private key of the originating organization;

the second processing unit is further configured to decrypt a second digital signature of the transaction request with a public key of the first organization of the federation chain, verify whether the decrypted second digital signature is legal, if the verification is legal, trigger obtaining of a first processing result of the transaction request, and send the first processing result to the first organization of the federation chain through the second transceiving unit, where the second digital signature is obtained by encrypting, by the first organization of the federation chain, a private key of the first organization of the federation chain;

the first processing unit is further configured to decrypt third digital signatures of the plurality of first processing results with the threshold signature public key, verify whether the decrypted plurality of third numbers are legal, if the decrypted plurality of third numbers are legal, trigger to obtain a second processing result of the transaction request according to the plurality of first processing results, and send the second processing result to the plurality of alliance chain second organizations through the first transceiver unit, where the third digital signatures are obtained by encrypting the alliance chain second organizations through a threshold signature private key;

and the second processing unit is further configured to decrypt a third digital signature of the second processing result with the threshold signature public key, verify whether the decrypted fourth digital signature is legal, and trigger processing of the transaction request according to the second processing result if the decrypted fourth digital signature is legal, where the fourth digital signature is synthesized by the first organization in the federation chain according to the plurality of third digital signatures.

With reference to the fourth possible implementation manner of the second aspect of the present application, in a fifth possible implementation manner of the second aspect of the present application, the transaction request includes an uplink request of an uplink organization to be linked, a downlink request of a downlink organization to be linked, an update request of a logistics state of the logistics piece, an update request of a claim state of the logistics piece, or an update request of a logistics resource.

With reference to the fifth possible implementation manner of the second aspect of the present application, in a sixth possible implementation manner of the second aspect of the present application, the first transceiver unit is further configured to send a second processing result to a certificate organization in a federation chain when the transaction request is an uplink request or a downlink request;

the device also comprises a fourth processing unit, a second processing unit and a third processing unit, wherein the fourth processing unit is used for decrypting a fifth digital signature of the second processing result by using the threshold signature public key and verifying whether the decrypted fifth digital signature is legal or not, and the fifth digital signature is synthesized by the first organization of the alliance chain according to a plurality of third digital signatures; if the verification is legal, according to the second processing result and the block information, a new digital certificate is issued to the initiating organization in the certificate list, or the issued digital certificate of the initiating organization is cancelled in the certificate list.

In a third aspect, the present application further provides a federation chain, where the federation chain includes federation chain organizations such as a first federation chain organization and a second federation chain organization, where the first federation chain organization includes a first processor and a first memory, where the first memory stores a computer program, and the first processor executes the steps executed by the first federation chain organization in the method of the first aspect of the present application when calling the computer program in the first memory; the federation chain second organization comprises a second processor and a second memory, the second memory having stored therein a computer program, the second processor, when calling the computer program in the second memory, performing the steps as performed by the federation chain second organization in the method of the first aspect of the application.

In a fourth aspect, the present application further provides a computer-readable storage medium storing a plurality of instructions adapted to be loaded by a processor to perform the steps performed by an executing entity, such as the first organization in the federation chain or the second organization in the federation chain, in the method of the first aspect of the present application.

From the above, the present application has the following advantageous effects:

in the present application, any alliance link node may send a transaction request to an alliance link first organization, after the alliance link first organization receives the transaction request and verifies the validity of the transaction request, the alliance link first organization sends the transaction request to a plurality of alliance link second organizations, after the plurality of alliance link second organizations respectively verify the validity of the transaction request, a first processing result of the transaction request is obtained, and the first processing result is sent to the alliance link first organization, after the alliance link first organization verifies the validity of the received plurality of first processing results, a second processing result of the transaction request is obtained according to the plurality of first processing results, and a second processing result is sent to the alliance link second organization, after the validity of the second processing result is verified, the alliance link second organization processes the transaction request according to the second processing result, in the processing process of the transaction request, on one hand, a consensus mechanism is introduced in a decision stage, namely a final processing result is obtained through the processing results of a plurality of second alliance chain organizations for the transaction requests, so that the accuracy of verifying the legality of the transaction requests can be improved, and the security risk accompanying the legality of the transaction requests which are unilaterally verified by the first alliance chain organizations is avoided.

Drawings

In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.

FIG. 1 is a schematic view of a scenario of the present application;

FIG. 2 is a schematic flow chart of a method for processing a transaction request according to the present application;

FIG. 3 is a schematic flow chart of a second process result obtaining process of the present application;

FIG. 4 is a schematic flow chart of another method for processing a transaction request according to the present application;

FIG. 5 is a schematic diagram of an embodiment of a transaction request processing device;

FIG. 6 is a schematic diagram of a federation chain organization structure of the present application.

Detailed Description

The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.

In the description that follows, specific embodiments of the present application will be described with reference to steps and symbols executed by one or more computers, unless otherwise indicated. Accordingly, these steps and operations will be referred to, several times, as being performed by a computer, the computer performing operations involving a processing unit of the computer in electronic signals representing data in a structured form. This operation transforms the data or maintains it at locations in the computer's memory system, which may be reconfigured or otherwise altered in a manner well known to those skilled in the art. The data maintains a data structure that is a physical location of the memory that has particular characteristics defined by the data format. However, while the principles of the application have been described in language specific to above, it is not intended to be limited to the specific form set forth herein, and it will be recognized by those of ordinary skill in the art that various of the steps and operations described below may be implemented in hardware.

The principles of the present application may be employed in numerous other general-purpose or special-purpose computing, communication environments or configurations. Examples of well known computing systems, environments, and configurations that may be suitable for use with the application include, but are not limited to, hand-held telephones, personal computers, servers, multiprocessor systems, microcomputer-based systems, mainframe-based computers, and distributed computing environments that include any of the above systems or devices.

The terms "first", "second", and "third", etc. in this application are used to distinguish between different objects and not to describe a particular order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions.

First, before the present application is introduced, the relevant contents of the present application with respect to the application background will be described.

The transaction request processing method, the transaction request processing device and the computer-readable storage medium are applied to a alliance chain, and when a transaction request is initiated, the security of the transaction request is improved to a certain extent, and the data security is guaranteed.

In the prior art, a network administrator, or a management node, may be configured in a federation chain, after the federation chain is established, if a new organization member wants to join the federation chain, an uplink request may be initiated to the network administrator, the network administrator may perform an audit on the uplink request, and after the audit is passed, the network administrator pulls the new organization member into the federation chain, and in the federation chain extension manner, if the network administrator itself is a malicious node (e.g., a node that falsifies information or responds maliciously), or suddenly becomes a malicious node, more malicious nodes may be pulled into the federation chain, which may harm data security of the federation chain, or may not pull in the new organization member normally, and affect extension of the federation chain.

Based on the above-mentioned drawbacks of the related art, the present application provides a method for processing a transaction request, which can overcome the drawbacks of the related art at least to some extent.

Referring to a scene schematic diagram of the present application shown in fig. 1, in a federation chain in the present application, a first federation chain organization and a second federation chain organization exist, and when the first federation chain organization receives a transaction request sent by any federation chain node in the federation chain, after the legitimacy of the transaction request is verified by the first federation chain organization and the second federation chain organization respectively, the second federation chain organization processes the transaction request, so that malicious operation brought to the federation chain when the first federation chain organization has a malicious node condition can be avoided to a certain extent, and data security is ensured.

In the present application, different federation chain nodes may form different federation chain organizations, and the different federation chain organizations form a federation chain, where the federation chain nodes may specifically be different types of devices such as a server device, a physical host, or a User Equipment (UE), and the UE may specifically be a terminal device such as a smart phone, a tablet computer, a notebook computer, a palm computer, a desktop computer, or a Personal Digital Assistant (PDA).

In the federation chain, each federation chain organization may be considered as a whole, or each federation chain may be considered as a cluster device, and thus, in the following description, specific contents of the present application are described for purposes of illustration in terms of federation chain organizations, where in the present application, a federation chain first organization is typically one organization and federation chain second organizations are multiple organizations.

Referring to fig. 2, fig. 2 shows a schematic flow chart of a processing method of a transaction request in the present application, and the processing method of a transaction request provided in the present application may specifically include the following steps:

step S201, a first organization of a alliance chain acquires a transaction request sent by any alliance chain node in the alliance chain;

step S202, if the transaction request is verified to be legal, the first alliance chain organization sends the transaction request to a plurality of second alliance chain organizations;

step S203, if the transaction request is verified to be legal, the plurality of alliance chain second organizations respectively obtain first processing results of the transaction request and respectively send the first processing results to the alliance chain first organizations;

step S204, if the first processing result is verified to be legal, the first organization of the alliance chain obtains a second processing result of the transaction request according to the plurality of first processing results and sends the second processing result to the plurality of second organizations of the alliance chain;

in step S205, if the second processing result is verified to be legal, the plurality of alliance chain second organizations process the transaction request according to the second processing result.

As can be seen from fig. 2, in the present application, any federation chain node may send a transaction request to a federation chain first organization, after the federation chain first organization receives the transaction request and verifies the validity of the transaction request, the federation chain first organization sends the transaction request to a plurality of federation chain second organizations, after the plurality of federation chain second organizations respectively verify the validity of the transaction request, obtains a first processing result of the transaction request, and sends the first processing result to the federation chain first organization, after the federation chain first organization verifies the validity of the received plurality of first processing results, obtains a second processing result of the transaction request according to the plurality of first processing results, and sends a second processing result to the federation chain second organization, after the validity of the second processing result passes the verification, the federation chain second organization processes the transaction request according to the second processing result, in the processing process of the transaction request, on one hand, a consensus mechanism is introduced in a decision stage, namely a final processing result is obtained through the processing results of a plurality of second alliance chain organizations on the transaction request, so that the accuracy of verifying the legality of the transaction request can be improved, and the security risk accompanying the legality of the transaction request which is unilaterally verified by the first alliance chain organization is avoided.

The following proceeds to a detailed description of the various steps shown in fig. 2:

in the present application, the transaction request may be understood to include uplink request, data storage request, data synchronization request, and the like, which require related data transaction.

For example, taking an to-be-uplink organization and an to-be-uplink node as an example, when a certain alliance link node receives a uplink request, a data storage and other transaction requests initiated by the to-be-uplink organization or the to-be-uplink node, the transaction request may be sent to the first alliance link organization, so that the first alliance link organization triggers the processing method of the transaction request provided by the present application.

The to-be-uplink organization or the to-be-uplink node needs to understand that, for an organization or a node which is not uplink or is not added to the alliance chain, a transaction request can be initiated to any alliance chain node or an adjacent alliance chain node, and the alliance chain node which receives the transaction request sends the transaction request to the first organization of the alliance chain to trigger the processing method of the transaction request provided by the application.

In an exemplary implementation, the transaction request referred to in this application may specifically include an uplink request of an organization to be uplink, a downlink request of an organization to be downlink, an update request of logistics state of a logistics item, an update request of a logistics claim state of a logistics item, or an update request of a logistics resource.

It can be understood that, taking the alliance chain applied in the field of logistics as an example, the alliance chain organization in the alliance chain can be various organizations involved in the logistics service, such as a logistics company for carrying out logistics transportation, a financial institution or a bank institution involved in electronic payment in the logistics service, a supply chain company involved in logistics resources, an insurance company involved in logistics claim work, and the like, and various organizations can apply for joining the alliance chain or applying for quitting the alliance chain; or, in the logistics operation, request to upload or download the related logistics state of the logistics, such as the receiving state, the transportation state or the delivery state of the uploaded express; or when the logistics piece is damaged and enters the claim settlement operation, requesting to upload or download the claim settlement state of the corresponding logistics piece, for example, downloading the express delivery piece in the claim settlement operation, specifically including a link of receiving an application, setting up a case, checking and notifying a reimbursement and detailed information of the link; or, in the management process of the logistics resources, the logistics company, the supply chain company, and the financial structure may upload or download the state information of the related logistics resources, taking express delivery as an example, the express delivery resources may specifically include transportation resources such as transportation vehicles, sorting machines, and sorting frames in the transportation link, and may also include various types of resources that may be involved in logistics operations such as various types of human resources, storage resources of various express nodes, information resources, and financial funds.

In yet another exemplary implementation manner, the federation chain first organization and the federation chain second organization in the federation chain may be selected in real time in addition to being pre-selected and configured from the federation chain organizations, so as to prevent the preset federation chain first organization and the preset federation chain second organization from being targeted to the attack, and further reduce the influence of a malicious organization and a malicious node on processing the transaction request.

Correspondingly, when any alliance chain node initiates a transaction request or forwards the transaction request, or when the transaction request is sent to the alliance chain first organization, the alliance chain first organization can be determined in real time.

For example, a list of federation chain organizations may be configured, where organization identifiers and network addresses of the federation chain organizations are recorded in the list, and according to the arrangement order of the federation chain organizations in the organization list and which federation chain organization is the last round of federation chain first organization updated in the list, a federation chain organization in the last round selected as the next order of federation chain organizations of the federation chain first organization may be selected as the current federation chain first organization, or other selection manners may be adopted to select the current federation chain organization in the organization list, and may be adjusted according to actual needs.

In the present application, a random selection is preferably adopted to randomly select one alliance chain organization from alliance chains as the current alliance chain first organization, so as to further reduce the unpredictability of the alliance chain first organization in selection from the random perspective, and thus reduce the possibility that the alliance chain first organization is targeted to attacks.

In order to further reduce the influence caused by the malicious organization and the malicious nodes possibly existing in the second organization of the alliance chain, when the second organization of the alliance chain is selected in real time, the number of the selected second organization of the alliance chain can be enlarged as much as possible.

Preferably, all alliance chain organizations except the alliance chain first organization in the alliance chain can be used as the current alliance chain second organization, in this case, when the alliance chain sends a transaction request to the alliance chain second organization, a broadcasting mode can be adopted, the transaction can be directly broadcast in the alliance chain, compared with a communication mode between alliance chain organizations such as unicast and multicast, the broadcasting mode has the advantage of low communication cost, and the traffic load of the alliance chain first organization can be greatly reduced.

After receiving the transaction request, the first organization in the federation chain verifies the validity of the transaction request, and the verification method may be a verification method adopted by the network administrator in the above-mentioned prior related art to verify the uplink request, or a verification method agreed by the federation chain to any intelligent contract of a node in the federation chain.

After the transaction request passes the verification of the validity at the first organization side of the alliance chain, the transaction request can be sent to the second organization of the alliance chain, and the consensus mechanism of the application is triggered.

It is understood that, similar to the first organization of the federation chain, the second organization of the federation chain may verify the validity of the transaction request by using the above-mentioned verification method employed by the network administrator in the related art to verify the uplink request, or by using any one of the verification methods agreed by the federation chain for any intelligent contract of the nodes of the federation chain.

Every second alliance which receives the transaction request sent by the first alliance can verify the validity of the second alliance to check whether the processing result determined by the first alliance is wrong or even the first alliance is a malicious organization.

After the validity verification, each second alliance can respectively respond to the transaction request, generate a processing result of the transaction request and feed the processing result back to the first alliance, so that the purposes of multi-party verification and multi-party decision are achieved.

After receiving the processing results fed back by the plurality of federation chain second organizations, the federation chain first organization may verify the validity of the processing results, after the processing results are verified to be legal, statistics may be performed, and a final processing result of the transaction request may be obtained on the basis of the statistical results.

In still another exemplary implementation manner, referring to a flowchart of the acquiring process of the second processing result shown in fig. 3, the process of acquiring the second processing result of the transaction request according to the plurality of first processing results by the federation chain first organization, as shown in fig. 3, may include the following steps S301 to S303:

step S301, a first organization of a alliance chain acquires the number of consenting processing results in a plurality of first processing results;

it can be understood that, when the first alliance chain organization receives the first processing result of the transaction request fed back by the second alliance chain organization for the first time, or when the first alliance chain organization receives a preset number of first processing results of the transaction requests fed back by the second alliance chain organization within a preset time, the first alliance chain organization may start to monitor the number of agreement processing results in the received plurality of first processing results, and trigger the following step S302 or step 303 according to the number of agreement processing results in the plurality of first processing results.

Or, the federation chain first organization may count the number of the agreement processing results from the received first processing results when receiving the number of the first processing results of all the federation chain second organizations.

Step S302, if the quantity of the agreement processing results in the preset time meets a quantity threshold, the first organization of the alliance chain generates the agreement processing results of the transaction requests as a second processing result, wherein the numerical value of the quantity threshold is 2f +1, f is the number of Byzantine nodes of the alliance chain, and the quantity of the alliance chain organizations in the alliance chain is larger than 3f + 1;

it can be understood that the byzantine error can be understood as forged information or malicious organization of malicious response, and when the coalition chain overcomes the byzantine error, the number f of byzantine nodes corresponding to the coalition chain can be configured, and the number of the byzantine nodes is the number of the malicious organization allowable by the coalition chain and can be configured in advance.

When the number of agreement processing results in the plurality of first processing results reaches (2 times +1) of the number of Byzantine nodes within the preset time, even if the Byzantine nodes exist in the second organization of the alliance chain, the processing results which are determined integrally can be considered not to be influenced, the error risk is extremely low, and therefore the agreement processing results are generated to serve as the final processing results of the transaction request, namely the second processing results; otherwise, generating a rejection processing result as a second processing result.

In step S303, if the number of the processing results agreed within the preset time is lower than the number threshold, the first organization in the federation generates a processing result of refusing the transaction request as a second processing result.

In order to improve the processing efficiency, the first alliance chain organization can monitor the number of processing agreement results in the first processing results in the process of receiving the first processing fed back by the plurality of second alliance chain organizations, if the number reaches a number threshold value, the processing agreement results can be directly generated at the moment to serve as final second processing results, and the subsequent first processing results sent to the first alliance chain organization can be subjected to neglect processing such as deletion and rejection, so that unnecessary receiving processing and statistical processing are reduced.

After the final processing result, i.e. the second processing result, is obtained, the processing result may be sent to a plurality of federation chain second organizations, so as to synchronize the processing result on the federation chain second organization side.

In the present application, after the first alliance chain organization determines the processing result of the transaction request, the second alliance chain organization may process the transaction request according to the processing result, which is different from the prior related art in which a network administrator unilaterally processes the uplink request.

The second alliance chain organization receiving the processing result sent by the first alliance chain organization can firstly verify the validity of the processing result so as to check whether the processing result determined by the first alliance chain organization is wrong or even whether the possible situation that the first alliance chain organization is a malicious organization occurs, and when the processing result is verified to be legal, the transaction request is processed according to the processing result.

In another exemplary implementation manner, after the validity of the second processing result is verified, the federation chain second organization receiving the second processing result sent by the federation chain first organization may package the transaction request and the organization identifier of the initiating organization of the transaction request according to the second processing result to obtain block information corresponding to the transaction request, and store the block information to complete processing of the transaction request.

For example, taking the transaction request as a uplink request initiated by the to-be-uplink organization as an example, if the second processing result is an approval processing result, and the organization identifier of the initiating organization carried in the uplink request includes an enterprise name, a unified social credit code uscc, a legal identity number id _ card uplink identifier jion, the enterprise name, the unified social credit code uscc, the legal identity number id _ card, and the uplink identifier jion may be encapsulated to obtain block information corresponding to the uplink request, and store and synchronize the block information on configuration block information, for example, the block information may be written into the above-mentioned alliance chain organization list to implement uplink of the to-be-uplink organization and add the block information into an alliance chain.

In another exemplary implementation, referring to another flowchart of the processing method for the transaction request of the present application shown in fig. 4, after obtaining the second processing result, the processing of the certificate may further be included, that is, the following steps S401 to S403 may also be included:

step S401, when the transaction request is an uplink request or a downlink request, the first alliance of the alliance chain also sends a second processing result to the certificate organization in the alliance chain;

it is understood that each organization joining the federation chain may also be configured with a corresponding digital certificate by the certificate organizations in the federation chain to identify the legitimate identity of each federation chain organization in the identity management hierarchy of the federation chain.

Therefore, when the second organization of the federation chain processes the transaction request according to the second processing result, and the to-be-uplink organization performs uplink or downlink on the to-be-downlink organization, the other side can also send the second processing request to the certificate node in the federation chain to trigger the certificate node to perform certificate processing for the to-be-uplink organization or the to-be-downlink organization.

Step S402, the certificate organization decrypts a fifth digital signature of the second processing result by using the threshold signature public key, and verifies whether the decrypted fifth digital signature is legal, wherein the fifth digital signature is synthesized by the first organization of the alliance chain according to a plurality of third digital signatures;

after receiving the second processing result sent by the first alliance chain organization, the certificate organization may also verify the validity of the received second processing result through the threshold signature public key, which may be referred to above specifically and is not described herein again, similarly to the second alliance chain organization.

Step S403, after the second processing result is verified to be legal, the certificate organization issues a new digital certificate for the initiating organization in the certificate list according to the second processing result and the block information, or revokes the digital certificate already issued by the initiating organization in the certificate list.

When the certificate organization processes the certificate of the to-be-uplink organization or the to-be-downlink organization, block information stored by a second organization of a previous federation chain may be specifically referred to, where the block information is obtained by encapsulating an uplink request and an organization identifier of an originating organization thereof, or obtained by encapsulating a downlink request and an organization identifier of an originating organization thereof, and the block information may be stored and synchronized in configuration block information on a link point of a related federation.

When the received second processing result is verified to be legal and block information corresponding to the uplink request or the downlink request is verified to exist, a new digital certificate can be issued to the initiating organization, namely the to-be-uplink organization, in the certificate list, or the digital certificate already issued by the to-be-downlink organization can be revoked.

In another exemplary implementation, the verification of the validity mentioned above may be implemented by a public key and a private key configured in pairs. The public key is called public key (public key), the private key is called private key (private key), and in general, the public key and the private key are contents of an asymmetric encryption algorithm in cryptography, and as the name suggests, the public key can be published, and the private key needs to be safely kept.

In the alliance chain, an initiator of digital information can calculate an abstract locally, then encrypt the abstract through a private key to obtain a digital signature of the digital information, a receiver of the digital information can decrypt the digital signature through a public key corresponding to the private key to obtain an abstract, on the other hand, the receiver of the digital information can calculate another abstract through Hash calculation on the basis of the digital information, and at the moment, if the two abstracts are consistent, due to the uniqueness of a Hash calculation result, the digital information can be considered to be not tampered, forged and pass validity verification in the sending process; on the contrary, if the two digests are inconsistent, the digital information is considered to pass the verification of the validity through tampering and counterfeiting in the sending process.

Correspondingly, the validity verifying part mentioned in the above may specifically include the following:

the first organization of the alliance chain decrypts a first digital signature of the transaction request by using a public key of the initiating organization and verifies whether the decrypted first digital signature is legal or not, wherein the first digital signature is obtained by encrypting the private key of the initiating organization by the initiating organization;

the plurality of alliance chain second organizations respectively decrypt the second digital signature of the transaction request by using the public key of the alliance chain first organization and verify whether the decrypted second digital signature is legal or not, wherein the second digital signature is obtained by encrypting the alliance chain first organization through the private key of the alliance chain first organization;

the first alliance chain organization decrypts the third digital signatures of the first processing results by using the threshold signature public key and verifies whether the decrypted third numbers are legal or not, wherein the third digital signatures are obtained by encrypting the second alliance chain organization through a threshold signature private key;

and the plurality of alliance chain second organizations decrypt the fourth digital signature of the second processing result by using the threshold signature public key and verify whether the decrypted fourth digital signature is legal or not, wherein the fourth digital signature is synthesized by the alliance chain first organization according to the plurality of third digital signatures.

When initiating a transaction request, an initiating organization may also carry a public key of the initiating organization in the transaction request, so that a first organization of a federation chain receiving the transaction request may directly extract the public key from the transaction request, decrypt a digital signature in the received transaction request, and verify the validity of the received transaction request, and of course, the public key of the initiating organization may also be pre-configured, and be synchronized on each organization of the federation chains, for example, a public key list may be configured to record the public keys of each organization of the federation chains;

similarly, when the first organization of the federation chain sends a transaction request to the second organization of the federation chain and runs the consensus mechanism, the first organization of the federation chain encrypts the digital signature of the transaction request by using the private key of the first organization of the federation chain again, and then the second organization of the federation chain decrypts the digital signature by using the public key of the first organization of the federation chain to verify the validity of the transaction request.

If the transaction request is an uplink request initiated by the to-be-uplink organization, the to-be-uplink organization can carry the public key of the to-be-uplink organization in the uplink request, so that the first organization of the alliance chain receiving the first transaction request can verify the validity of the uplink request.

In order to further improve the security of the data, different public and private keys can be used in the consensus stage, and as in the above contents, the first organization in the federation chain sends a transaction request to the second organization in the federation chain, the digital signature can be encrypted by using a common private key, and the second organization in the federation chain feeds back a first processing result of the transaction request to the first organization in the federation chain, the digital signature can be encrypted by using a threshold signature private key. In the subsequent processing stage, the encryption and decryption of the digital signature can be carried out by using the threshold signature public key and the threshold signature private key.

Exemplarily, in the case of the uplink request received by the first alliance chain organization, if the uplink request carries four of the enterprise name of the originating organization, the unified social credit code uscc, the identity number id _ card of the legal person and the uplink identifier jion, the first alliance chain organization may calculate a hash value according to the four of the enterprise name, the unified social credit code uscc, the identity number id _ card of the legal person and the uplink identifier jion to obtain an abstract, decrypt the digital signature of the uplink request by using the public key of the originating organization carried in the uplink request to obtain another abstract, and pass validity verification if the two abstracts are consistent;

the first organization of the alliance chain continuously encrypts the abstract by using the private key of the first organization of the alliance chain to obtain a new digital signature, obtains an uplink request with the new digital signature, and sends the uplink request to a plurality of second organizations of the alliance chain. Similarly, the second organization of the alliance chain calculates the hash value according to the name of the enterprise carried in the uplink request, the unified social credit code uscc, the identity number id _ card of the legal person and the uplink identification jion to obtain an abstract, decrypts the digital signature of the uplink request by using the public key of the first organization of the alliance chain to obtain another abstract, and passes the validity verification if the two abstracts are consistent.

Each alliance chain second organization can respectively respond to the uplink request which passes the verification to generate a processing result of the uplink request and feed the processing result back to the alliance chain first organization, so that the purposes of multi-party verification and multi-party decision are achieved, wherein each alliance chain second organization carries out hash operation on the processing result to obtain a summary, and encrypts the summary by using a threshold signature private key to obtain a digital signature (or a threshold signature) of the processing result;

when a first alliance chain organization receives a first processing result of agreement processing results sent by a plurality of second alliance chain organizations, a threshold value of 2f +1 is obtained, a final unified processing result can be generated and used as a second processing result, the second processing result is subjected to hash operation to obtain a summary, and the summary is encrypted by using a threshold signature private key to obtain a digital signature (or another threshold signature) of the second processing result. And a second organization of the alliance chain receiving the second processing result calculates a hash value according to the enterprise name, the unified social credit code uscc, the identity card number id _ card of the legal person and the uplink identification jion carried by the second processing result to obtain an abstract, decrypts the digital signature of the second processing result by using a threshold signature public key to obtain another abstract, if the two abstracts are consistent, passes the validity verification, processes the uplink request according to the second processing result, and draws the organization with the uplink to the alliance for uplink.

The federation chain first organization may specifically combine the digital signatures with a threshold signature private key of the first organization to encrypt a digest obtained by performing hash calculation on the second digital result to obtain a digital signature, and synthesize a new digital signature as the digital signature of the second processing result, so that the digital signature corresponds to the federation chain second organizations and the federation chain first organization and may be decrypted by a corresponding threshold signature public key, and the pre-door signature public key may be directly carried in the second processing result sent by the federation chain first organization to the federation chain second organization, or may also be pre-configured, and is synchronized on each federation chain organization in the federation chain, for example, configured in a public key list.

In the process, each second organization in the federation chain uses a threshold signature private key of the second organization, encrypts a digital signature of the first processing result, the second organization of the federation chain can adopt a threshold signature public key to decrypt different digital signatures of the first processing result fed back by the second organization of the federation chain, compared with the method of using the private key and the public key of each second organization of the federation chain to encrypt and encrypt the digital signature, when the first organization of the alliance chain is processed, because the public digital signature which can decrypt the encrypted digital signature of the private keys of different threshold signatures is adopted, the calling process of the public key can be obviously reduced, therefore, in the decryption process, the decryption efficiency can be obviously improved, the response time of the recognition mechanism in the application can be obviously improved, and the processing efficiency of the transaction request can be finally improved, which is very beneficial to processing the transaction request by the alliance chain.

In order to better implement the processing method of the transaction request provided by the application, the application also provides a processing device of the transaction request.

Referring to fig. 5, fig. 5 is a schematic structural diagram of a transaction request processing apparatus according to the present application, in which a transaction request processing organization 500 may specifically include the following structures:

a first transceiving unit 501, configured to acquire a transaction request sent by any alliance link node in an alliance link;

the first transceiving unit 501 is further configured to send a transaction request to a plurality of alliance chain second organizations if the transaction request is verified to be legal by the first processing unit;

the second transceiving unit 503 is configured to, if the transaction request is verified to be legitimate by the second processing unit, obtain a first processing result of the transaction request, and send the first processing result to the first organization in the federation chain respectively;

the first processing unit 502 is further configured to, if the first processing result is verified to be legal, obtain a second processing result of the transaction request according to the plurality of first processing results, and send the second processing result to the plurality of alliance chain second organizations through the first transceiver unit 501;

the second processing unit 504 is further configured to process the transaction request according to the second processing result if the second processing result is verified to be legal.

In an exemplary implementation manner, the first processing unit 502 is specifically configured to:

obtaining the number of consenting processing results in the plurality of first processing results;

if the quantity of the agreement processing results meets a quantity threshold value within preset time, generating an agreement processing result of the transaction request as a second processing result, wherein the numerical value of the quantity threshold value is 2f +1, f is the number of Byzantine nodes of the alliance chain, and the quantity of alliance chain organizations in the alliance chain is larger than 3f + 1;

and if the quantity of the processing results agreed within the preset time is lower than the quantity threshold, generating a refusing processing result of the transaction request as a second processing result.

In yet another exemplary implementation, the apparatus further includes a third processing unit 505, configured to randomly select one federation chain organization from the federation chains as the first federation chain organization;

the first processing unit 502 is specifically configured to identify the alliance chain organization except itself in the alliance chain as a plurality of second alliance chain second organizations, and broadcast the transaction request in the alliance chain network through the first transceiver unit.

In another exemplary implementation manner, the second processing unit 504 is specifically configured to:

and according to the second processing result, packaging the transaction request and the organization identifier of the initiating organization of the transaction request to obtain the block information corresponding to the transaction request, and storing the block information.

In another exemplary implementation manner, the first processing unit 502 is further configured to decrypt a first digital signature of the transaction request by using a public key of the originating organization, verify whether the decrypted first digital signature is legal, and if the decrypted first digital signature is legal, trigger the first transceiver unit 501 to send the transaction request to the plurality of federation chain second organizations, where the first digital signature is obtained by encrypting, by using a private key of the originating organization, the first digital signature;

the second processing unit 504 is further configured to decrypt the second digital signature of the transaction request with the public key of the first organization in the federation chain, verify whether the decrypted second digital signature is legal, if the verification is legal, trigger to obtain a first processing result of the transaction request, and send the first processing result to the first organization in the federation chain through the second transceiving unit 503, where the second digital signature is obtained by encrypting, by the first organization in the federation chain, the private key of the first organization in the federation chain;

the first processing unit 502 is further configured to decrypt third digital signatures of the multiple first processing results with the threshold signature public key, verify whether the decrypted multiple third numbers are legal, if the decrypted multiple third numbers are legal, trigger to obtain a second processing result of the transaction request according to the multiple first processing results, and send the second processing result to the multiple alliance chain second organizations through the first transceiving unit 501, where the third digital signatures are obtained by encrypting the alliance chain second organizations through the threshold signature private key;

the second processing unit 504 is further configured to decrypt the third digital signature of the second processing result with the threshold signature public key, verify whether the decrypted fourth digital signature is legal, and trigger processing of the transaction request according to the second processing result if the decrypted fourth digital signature is legal, where the fourth digital signature is synthesized by the first organization in the federation chain according to the plurality of third digital signatures.

In yet another exemplary implementation, the transaction request includes an uplink request of an organization to be uplink, a downlink request of an organization to be downlink, an update request of logistics state of the logistics, an update request of logistics claim state of the logistics, or an update request of logistics resources.

In yet another exemplary implementation manner, the first transceiving unit 501 is further configured to send the second processing result to a certificate organization in the federation chain when the transaction request is an uplink request or a downlink request;

the apparatus further includes a fourth processing unit 506, configured to decrypt a fifth digital signature of the second processing result with the threshold signature public key, and verify whether the decrypted fifth digital signature is legal, where the fifth digital signature is synthesized by the first organization in the federation chain according to the plurality of third digital signatures; if the verification is legal, according to the second processing result and the block information, a new digital certificate is issued to the initiating organization in the certificate list, or the issued digital certificate of the initiating organization is cancelled in the certificate list.

The present application further provides a federation chain, where the federation chain may include federation chain organizations such as a first federation chain organization and a second federation chain organization, and referring to fig. 6, fig. 6 shows a schematic structural diagram of the federation chain organization of the present application, and specifically, the federation chain organization provided by the present application includes a processor 601, a memory 602, and an input/output device 603, where the processor 601 is configured to implement, when executing a computer program stored in the memory 602, the steps performed by the first federation chain organization or the second federation chain organization in the processing method of a transaction request in any embodiment corresponding to fig. 1 to fig. 4; alternatively, the processor 601 is configured to implement the functions of the units in the embodiment corresponding to fig. 5 when executing the computer program stored in the memory 602, for example, the hardware structure corresponding to the first transceiver unit 501 or the second transceiver unit 503 in fig. 5 is the input/output device 603, the hardware structure corresponding to the first processing unit 502, the second processing unit 504, the third processing unit 505, or the fourth processing unit 506 is the processor 601, and the memory 602 is configured to store the computer program required by the processor 601 to execute any method executed by the main body in the processing method of the transaction request in any embodiment corresponding to fig. 1 to fig. 4.

Illustratively, a computer program may be partitioned into one or more modules/units, which are stored in the memory 602 and executed by the processor 601 to accomplish the present application. One or more modules/units may be a series of computer program instruction segments capable of performing certain functions, the instruction segments being used to describe the execution of a computer program in a computer device.

The federation chain organization may include, but is not limited to, a processor 601, memory 602, input output devices 603. Those skilled in the art will appreciate that the illustration is merely an example of a federation chain organization and does not constitute a limitation on the federation chain organization, and may include more or less components than those illustrated, or some components in combination, or different components, e.g., the federation chain organization may also include network access devices, buses, etc., through which the processor 601, memory 602, input output device 603, and network access devices, etc., are connected.

The Processor 601 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like, the processor being the control center of the federation chain organization, with various interfaces and lines connecting the various parts of the entire federation chain organization.

The memory 602 may be used for storing computer programs and/or modules, and the processor 601 may implement various functions of the computer apparatus by executing or executing the computer programs and/or modules stored in the memory 602 and calling data stored in the memory 602. The memory 602 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data (such as a transaction request, a first processing result, a second processing result) created according to a federation chain organization, and the like. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.

It can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the processing apparatus for transaction request, the federation chain organization and the corresponding units thereof described above may refer to the description of the processing method for transaction request in any embodiment corresponding to fig. 1 to 4, and are not described herein again in detail.

It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor.

For this reason, the present application provides a computer-readable storage medium, where a plurality of instructions are stored, where the instructions can be loaded by a processor to execute steps executed by an execution main body, such as a first alliance chain organization or a second alliance chain organization, in the processing method of a transaction request in any embodiment corresponding to fig. 1 to 4 in the present application, for specific operations, reference may be made to descriptions of the processing method of a transaction request in any embodiment corresponding to fig. 1 to 4, which are not described herein again.

Wherein the computer-readable storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.

Because the instructions stored in the computer-readable storage medium can execute the steps executed by the execution main body, such as the first alliance chain organization or the second alliance chain organization, in the processing method of the transaction request in any embodiment corresponding to fig. 1 to 4 of the present application, the beneficial effects that can be realized by the processing method of the transaction request in any embodiment corresponding to fig. 1 to 4 of the present application can be realized, which are described in detail in the foregoing description and are not described again here.

The method, the apparatus, the federation chain, and the computer-readable storage medium for processing the transaction request provided in the present application are described in detail above, and a specific example is applied in the present application to explain the principles and embodiments of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for those skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

24页详细技术资料下载
上一篇:一种医用注射器针头装配设备
下一篇:一种区块链交易删除方法及系统

网友询问留言

已有0条留言

还没有人留言评论。精彩留言会获得点赞!

精彩留言,会给你点赞!