CN113468268B - Cross-chain processing method and device, electronic equipment and readable storage medium - Google Patents

Cross-chain processing method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN113468268B
CN113468268B CN202110732919.XA CN202110732919A CN113468268B CN 113468268 B CN113468268 B CN 113468268B CN 202110732919 A CN202110732919 A CN 202110732919A CN 113468268 B CN113468268 B CN 113468268B
Authority
CN
China
Prior art keywords
cross
data
chain
verified
link
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110732919.XA
Other languages
Chinese (zh)
Other versions
CN113468268A (en
Inventor
刘晓赫
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202110732919.XA priority Critical patent/CN113468268B/en
Publication of CN113468268A publication Critical patent/CN113468268A/en
Application granted granted Critical
Publication of CN113468268B publication Critical patent/CN113468268B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

The disclosure provides a cross-chain processing method, a device, electronic equipment and a readable storage medium, and relates to the technical field of blockchains, in particular to the technical field of blockchain cross-chains. The specific implementation scheme is as follows: generating first data to be verified by the first cross-link relay based on a cross-link processing request of target data on the second application chain initiated on the first application chain, and sending the first data to be verified to a relay chain node; and the relay chain node performs first verification on the first data to be verified, generates second data to be verified when the second cross-chain relay passes the first verification, sends the second data to be verified to the second application chain node, performs second verification on the second data to be verified by the second application chain node, and processes the target data when the second verification passes. Based on the scheme, the credibility of the cross-chain transaction can be verified, and the safety and credibility of the cross-chain transaction can be guaranteed.

Description

Cross-chain processing method and device, electronic equipment and readable storage medium
Technical Field
The disclosure relates to the technical field of blockchains, in particular to the technical field of blockchain cross-links, and specifically relates to a cross-link processing method, a device, electronic equipment and a readable storage medium.
Background
The development of the block chain technology to date creates countless different block chains, and data on each block chain is isolated, so that the block chains become a data island, and interconnection and intercommunication between different block chains cannot be realized.
Cross-chain technology is a technology for addressing data interactions between two or more blockchains, such that data can cross chain-to-chain obstacles, allowing value to circulate between different blockchains.
In cross-chain transactions, how to verify the trustworthiness of cross-chain transactions on blockchains is an important issue that needs to be addressed in cross-chain technology.
Disclosure of Invention
In order to solve at least one of the defects, the disclosure provides a cross-chain processing method, a device, an electronic device and a readable storage medium.
According to a first aspect of the present disclosure, there is provided a method of cross-chain processing, the method comprising:
The first cross-link relay generates first data to be verified based on a cross-link processing request of target data on a second application chain initiated on a first application chain, and sends the first data to be verified to a relay chain node;
the relay chain node performs first verification on the first data to be verified, so that the second cross-chain relay generates second data to be verified when the first verification passes, the second data to be verified is sent to the second application chain node, the second application chain node performs second verification on the second data to be verified, and when the second verification passes, the target data is processed.
According to a second aspect of the present disclosure, there is provided another method of cross-chain processing, the method comprising:
the relay link point receives first data to be verified sent by a first cross-link relay, and performs first verification on the first data to be verified, wherein the first data to be verified is generated by the first cross-link relay based on a cross-link processing request initiated on a first application chain and aiming at target data on a second application chain;
When the first verification passes, the second cross-link relay generates second data to be verified, and the second data to be verified is sent to a second application link node;
And the second application chain node performs second verification on the second data to be verified, and processes the target data when the second verification passes.
According to a third aspect of the present disclosure, there is provided a cross-chain processing apparatus, the apparatus comprising:
the data to be verified module is used for generating first data to be verified based on a cross-link processing request of target data on a second application chain initiated on a first application chain by the first cross-link relay, and sending the first data to be verified to the relay chain node;
The data verification module is used for carrying out first verification on the first data to be verified by the relay chain node, so that second data to be verified is generated when the second cross-chain relay passes the first verification, the second data to be verified is sent to the second application chain node, the second application chain node carries out second verification on the second data to be verified, and when the second verification passes the second verification, the target data is processed.
According to a fourth aspect of the present disclosure, there is provided another cross-chain processing apparatus, the apparatus comprising:
The first data verification module is used for receiving first data to be verified sent by the first cross-link relay by the relay link point, and carrying out first verification on the first data to be verified, wherein the first data to be verified is generated by the first cross-link relay based on a cross-link processing request initiated on the first application link and aiming at target data on the second application link;
The data module to be verified is used for generating second data to be verified by the second cross-link relay when the first verification passes and sending the second data to be verified to the second application link node;
And the second data verification module is used for carrying out second verification on the second data to be verified by the second application chain node, and processing the target data when the second verification passes.
According to a fifth aspect of the present disclosure, there is provided an electronic device comprising:
at least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores instructions executable by the at least one processor to enable the at least one processor to perform the cross-chain processing method.
According to a sixth aspect of the present disclosure, there is provided a non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the above-described cross-chain processing method.
According to a seventh aspect of the present disclosure, there is provided a computer program product comprising a computer program which, when executed by a processor, implements the above-described cross-chain processing method.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the disclosure, nor is it intended to be used to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following specification.
The beneficial effects that this disclosure provided technical scheme brought are:
According to the scheme provided by the embodiment of the disclosure, first data to be verified is generated by a first cross-link relay based on a cross-link processing request of target data on a second application chain initiated on a first application chain, and the first data to be verified is sent to a relay chain node; and the relay chain node performs first verification on the first data to be verified, generates second data to be verified when the second cross-chain relay passes the first verification, sends the second data to be verified to the second application chain node, performs second verification on the second data to be verified by the second application chain node, and processes the target data when the second verification passes. Based on the scheme, the credibility of the cross-chain transaction can be verified, and the safety and credibility of the cross-chain transaction can be guaranteed.
Drawings
The drawings are for a better understanding of the present solution and are not to be construed as limiting the present disclosure. Wherein:
FIG. 1 is a schematic diagram of a cross-chain system provided by an embodiment of the present disclosure;
FIG. 2 is a schematic flow chart of a cross-link processing method according to an embodiment of the disclosure;
FIG. 3 is a flow diagram of another cross-chain processing method provided by an embodiment of the present disclosure;
FIG. 4 is a schematic flow chart of a specific implementation of a cross-chain processing method provided by an embodiment of the disclosure;
FIG. 5 is a schematic diagram of a cross-chain processing apparatus according to an embodiment of the present disclosure;
FIG. 6 is a schematic diagram of another cross-chain processing apparatus provided by an embodiment of the present disclosure;
Fig. 7 is a block diagram of an electronic device for implementing the cross-chain processing method provided by embodiments of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure are described below in conjunction with the accompanying drawings, which include various details of the embodiments of the present disclosure to facilitate understanding, and should be considered as merely exemplary. Accordingly, one of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present disclosure. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Fig. 1 shows a schematic structural diagram of a cross-link system provided by an embodiment of the present disclosure, where the method provided by the embodiment of the present disclosure is applicable to the cross-link system shown in fig. 1, and the cross-link system includes a relay link, a first application link, a first cross-link relay, a second application link, and a second cross-link relay.
The relay chain, namely the relay blockchain, is deployed with a cross-chain management contract for application chain management, verification of application chain certification information, triggering of a cross-chain event, storage inquiry of a cross-chain transaction and the like. By abstracting the behavior of the heterogeneous chain, the relay chain standardizes the implementation interface of the parallel chain, and the cross-chain management contract can be updated by implementing the blockchain abstract class so as to adapt to the new heterogeneous chain type. The interfaces defined in the relay chain may be as shown in table 1.
TABLE 1
The function realized by the interface named 'RegisterBlockchain' is registration application chain information, the function realized by the interface named 'UnregisterBlockchain' is cancellation application chain information, and the function realized by the interface named 'DataVerification' is verification of the validity of the message sent by the application chain.
The first application chain and the second application chain are parallel chains participating in cross-chain transactions, cross-chain contracts and business contracts are deployed, the cross-chain contracts and the business contracts can be communicated through cross-contract calling, and unified validity verification, data serialization and security authentication can be carried out on cross-chain messages of the business contracts based on the cross-chain contracts.
The first cross-chain relay and the second cross-chain relay, namely the relay, are interactive components connected with different block chain systems and are used for connecting an application block chain and a relay chain. The relay can monitor cross-chain events occurring in the blockchain and the relay chain. By abstracting the behavior of heterogeneous chains, cross-chain relay can define the interfaces shown in table 2, and different heterogeneous chains only need to implement the interfaces according to their own characteristics.
TABLE 2
The function realized by the interface named 'Init' is initializing application chain configuration, the function realized by the interface named 'Stop' is stopping operation, the function realized by the interface named 'LISTENINGEVENTS' is monitoring a cross-chain event, the event is transmitted to a core module for processing, and the function realized by the interface named 'InvokeProxyContract' is used for calling a cross-chain contract and transmitting a message of a relay chain to a parallel chain.
The cross-chain system provided by the embodiment of the disclosure can further comprise a cross-chain client, namely, a user can initiate requests to different types of application blockchains and relay chains by using an entry of the cross-chain system.
The cross-chain system provided by the embodiment of the disclosure does not limit the number of the application blockchains, can be expanded according to actual needs, and supports the access of heterogeneous blockchains.
The initialization flow of the cross-chain system provided by the embodiment of the disclosure is specifically as follows:
each application chain starts up the network and deploys cross-link contracts (relay links are specified at initialization) and business contracts;
Deploying a cross-link management contract by a relay link;
the information of each application chain is registered with a cross-chain management contract of the relay chain. The registered information depends on the trust model of the application chain, which may be an origin block or a verifier certificate;
The configuration and initiation relay is used to connect the application blockchain with the relay chain.
When the cross-chain system provided by the embodiments of the present disclosure wants to support the blockchain a of the new blockchain type, the following modifications are required:
(1) Upgrading a cross-link management contract of the relay chain, and supporting registration, management and verification of the blockchain A;
(2) Compiling a cross-link contract of an intelligent contract language facing to the block chain A;
(3) And writing a plug-in of the cross-chain relay based on the SDK of the block chain A, and realizing a corresponding interface to enable the relay to have the capability of communicating with the block chain A.
A running application chain would become very simple to access a cross-chain system, as follows:
(1) The application chain deploys cross-chain contracts oriented to own intelligent contract language;
(2) Upgrading the existing business contracts, and communicating with the cross-link contracts through cross-contract calling;
(3) Authorizing cross-link rights of the business contract through the cross-link contract;
(4) Registering information of the application chain to the relay chain, such as registering a trust root of the application chain, and proving validity of the message based on the trust root when the cross-chain message verification is performed subsequently;
(5) The cross-chain relay is configured and initiated to connect the relay chain with the application chain.
At this time, the application chain can access the cross-chain system to establish cross-chain connection with other application chains.
In the prior art, the interoperability of two heterogeneous or isomorphic blockchains is generally realized through a relay mode, and the two chains need to respectively establish a light client for maintaining the state of the opposite blockchain. In this way, because two blockchains need to directly verify the message of each other, the codes of the blockchains need to be modified, the implementation difficulty is high, and the hot plug of the blockchains cannot be realized, i.e. the functions of accessing, exiting and updating the application chains cannot be realized under the condition that the operation of a cross-chain system is not influenced. In addition, when one blockchain wants to cross chains with heterogeneous blockchains of different types, the blockchains need to be adapted one by one, so that the complexity of the adaptation is high.
The cross-link system provided by the embodiment of the disclosure can realize the access of the application chain by deploying the cross-link contracts and the business intelligent contracts and registering the application chain to the cross-link management contracts of the relay chain, does not need complex code transformation work, reduces the realization difficulty of the cross-link system, and supports the hot plug of the application blockchain, namely, the function of accessing, exiting and updating the application blockchain under the condition of not affecting the operation of the cross-link system. In addition, in the cross-chain system provided by the embodiment of the disclosure, when the application blockchain needs to cross chains with heterogeneous blockchains of different types, the application blockchain does not need to be adapted in pairs, only the relay chain needs to be adapted, and the adaptation complexity is reduced.
Fig. 2 shows a flow diagram of a cross-link processing method provided by an embodiment of the disclosure, and as shown in fig. 2, the method may mainly include:
step S210: the first cross-link relay generates first data to be verified based on a cross-link processing request of target data on a second application chain initiated on a first application chain, and sends the first data to be verified to a relay chain node;
step S220: the relay chain node performs first verification on the first data to be verified, so that the second cross-chain relay generates second data to be verified when the first verification passes, the second data to be verified is sent to the second application chain node, the second application chain node performs second verification on the second data to be verified, and when the second verification passes, the target data is processed.
The first application chain and the second application chain can be two blockchains participating in cross-chain transaction, the first cross-chain relay is respectively communicated with the first application chain and the relay chain, and the second cross-chain relay is respectively communicated with the second application chain and the relay chain. The first application chain node is a blockchain node in the first application chain, the second application chain node is a blockchain node in the second application chain, and the relay chain node is a blockchain node in the relay chain.
The first application chain may be an initiator of the cross-chain processing request, and the user may invoke a service contract of the first application chain to initiate the cross-chain processing request through a client of the first application chain.
The target data is a resource involved in a cross-chain process, and as a typical example, the usage scenario of the cross-chain process may initiate a cross-chain transaction for a user on a first application chain to write a certificate onto a second application chain.
The first data to be verified can be generated by the first cross-link relay and sent to the relay link node for verifying the credibility of the cross-link processing request on the first application chain to the relay link.
When the first data to be verified is not verified, the cross-link processing request on the first application link can be considered to be unreliable, and the cross-link processing flow can be terminated.
When the first data to be verified is verified, the cross-link processing request on the first application chain can be considered to be trusted, and the relay chain node can generate second data to be verified, wherein the second data to be verified is used for verifying the credibility of the cross-link processing request on the first application chain to the second application chain.
When the first application chain and the second application chain are heterogeneous blockchains, the first data to be verified on the first application chain may not be directly verified by the second application chain, and in the cross-chain system provided by the embodiment of the disclosure, since the first application chain and the second application chain are both matched with the relay chain, after the relay chain verifies that the first data to be verified is credible, the second data to be verified can be generated, and the second application chain can complete verification of the validity of the cross-chain processing request by verifying the second data to be verified, thereby overcoming the limitation of the existing cross-chain system.
According to the method provided by the embodiment of the disclosure, first data to be verified is generated by a first cross-link relay based on a cross-link processing request of target data on a second application chain initiated on a first application chain, and the first data to be verified is sent to a relay chain node; and the relay chain node performs first verification on the first data to be verified, generates second data to be verified when the second cross-chain relay passes the first verification, sends the second data to be verified to the second application chain node, performs second verification on the second data to be verified by the second application chain node, and processes the target data when the second verification passes. Based on the scheme, the credibility of the cross-chain transaction can be verified, and the safety and credibility of the cross-chain transaction can be guaranteed.
In an alternative embodiment of the present disclosure, a first cross-link relay generates first data to be verified based on a cross-link processing request initiated on a first application link for target data on a second application link, including:
the first application chain node responds to a cross-chain processing request initiated on the first application chain and aiming at target data on the second application chain to generate a first cross-chain event;
and when the first cross-link relay monitors a first cross-link event, generating first data to be verified.
The first application chain can trigger a first cross-chain event after being initiated, and the first cross-chain relay can monitor the first cross-chain event through event monitoring. The event information of the first cross-link event may include basic information of the cross-link processing request.
The first cross-link relay may package the first data to be verified and the basic information of the cross-link processing request into a first transaction, and submit the first transaction to the relay link.
In an optional embodiment of the disclosure, when the first cross-link relay monitors the first cross-link event, generating the first data to be verified includes:
When the first cross-link relay monitors a first cross-link event, generating a first presence evidence of the first cross-link event, and taking the first presence evidence as first data to be verified;
the relay chain node performs first verification on first data to be verified, including:
the relay chain node performs a first verification of the first presence document.
Wherein the first presence attestation is a presence attestation of a first cross-chain event.
In actual use, a first presence credential for a first cross-chain event may be generated from trust information for a first application chain.
The relay chain node may obtain trust information of the first application chain in advance, so as to verify validity of the first presence certificate based on the trust information of the first application chain.
The first application chain can initiate a registration request when joining the cross-chain system, and registers trust information of the first application chain to the relay chain, so that a foundation is provided for the follow-up relay chain to verify the first data to be verified based on the trust information of the first application chain.
In particular, the trust information may comprise at least one of a trust root, startup block information, and a certificate of the verifier node.
Fig. 3 shows a flow diagram of a cross-link processing method provided by an embodiment of the disclosure, and as shown in fig. 3, the method may mainly include:
Step S310: the relay link point receives first data to be verified sent by a first cross-link relay, and performs first verification on the first data to be verified, wherein the first data to be verified is generated by the first cross-link relay based on a cross-link processing request initiated on a first application chain and aiming at target data on a second application chain;
Step S320: when the first verification passes, the second cross-link relay generates second data to be verified, and the second data to be verified is sent to a second application link node;
Step S330: and the second application chain node performs second verification on the second data to be verified, and processes the target data when the second verification passes.
The first application chain and the second application chain can be two blockchains participating in cross-chain transaction, the first cross-chain relay is respectively communicated with the first application chain and the relay chain, and the second cross-chain relay is respectively communicated with the second application chain and the relay chain. The first application chain node is a blockchain node in the first application chain, the second application chain node is a blockchain node in the second application chain, and the relay chain node is a blockchain node in the relay chain.
The first application chain may be an initiator of the cross-chain processing request, and the user may invoke a service contract of the first application chain to initiate the cross-chain processing request through a client of the first application chain.
The target data is a resource involved in a cross-chain process, and as a typical example, the usage scenario of the cross-chain process may be to write credentials to a second application chain for a user on the first application chain.
The first data to be verified can be generated by the first cross-link relay and sent to the relay link node for verifying the credibility of the cross-link processing request on the first application chain to the relay link.
When the first data to be verified is not verified, the cross-link processing request on the first application link can be considered to be unreliable, and the cross-link processing flow can be terminated.
When the first data to be verified is verified, the cross-link processing request on the first application chain can be considered to be trusted, and the relay chain node can generate second data to be verified, wherein the second data to be verified is used for verifying the credibility of the cross-link processing request on the first application chain to the second application chain.
When the first application chain and the second application chain are heterogeneous blockchains, the first data to be verified on the first application chain cannot be directly verified by the second application chain, and in the cross-chain system provided by the embodiment of the disclosure, as the first application chain and the second application chain are both matched with the relay chain, after the relay chain verifies that the first data to be verified is credible, the second data to be verified can be generated, and the second application chain can complete verification of the validity of the cross-chain processing request through verifying the second data to be verified, so that the limitation of the existing cross-chain system is overcome.
According to the method provided by the embodiment of the disclosure, first data to be verified is generated by a first cross-link relay based on a cross-link processing request of target data on a second application chain initiated on a first application chain, and the first data to be verified is sent to a relay chain node; and the relay chain node performs first verification on the first data to be verified, generates second data to be verified when the second cross-chain relay passes the first verification, sends the second data to be verified to the second application chain node, performs second verification on the second data to be verified by the second application chain node, and processes the target data when the second verification passes. Based on the scheme, the credibility of the cross-chain transaction can be verified, and the safety and credibility of the cross-chain transaction can be guaranteed.
In an alternative embodiment of the present disclosure, a first cross-link relay generates first data to be verified based on a cross-link processing request initiated on a first application link for target data on a second application link, including:
the first application chain node responds to a cross-chain processing request initiated on the first application chain and aiming at target data on the second application chain to generate a first cross-chain event;
and when the first cross-link relay monitors a first cross-link event, generating first data to be verified.
The first application chain can trigger a first cross-chain event after being initiated, and the first cross-chain relay can monitor the first cross-chain event through event monitoring. The event information of the first cross-link event may include basic information of the cross-link processing request.
The first cross-link relay may package the first data to be verified and the basic information of the cross-link processing request into a first transaction, and submit the first transaction to the relay link.
In an optional embodiment of the disclosure, when the first cross-link relay monitors the first cross-link event, generating the first data to be verified includes:
When the first cross-link relay monitors a first cross-link event, generating a first presence evidence of the first cross-link event, and taking the first presence evidence as first data to be verified;
the relay chain node performs first verification on first data to be verified, including:
the relay chain node performs a first verification of the first presence document.
Wherein the first presence attestation is a presence attestation of a first cross-chain event.
In actual use, a first presence credential for a first cross-chain event may be generated from trust information for a first application chain.
The relay chain node may obtain trust information of the first application chain in advance, so as to verify validity of the first presence certificate based on the trust information of the first application chain.
The first application chain can initiate a registration request when joining the cross-chain system, and registers trust information of the first application chain to the relay chain, so that a foundation is provided for the follow-up relay chain to verify the first data to be verified based on the trust information of the first application chain.
In particular, the trust information may comprise at least one of a trust root, startup block information, and a certificate of the verifier node.
Fig. 4 is a schematic flow chart of a specific implementation of a cross-link processing method provided by an embodiment of the disclosure, where a specific flow is as follows:
1. User Alice of application chain a (i.e., the first application chain) invokes service contract 2 of application chain a through the cross-chain Client (i.e., the cross-chain Client);
2. The business contract 2 of the application chain A triggers a cross-chain call condition, target data on the business contract 2 of the application chain B (namely a second application chain) is to be processed, and then the cross-chain contract of the application chain A is called through cross-contract call;
3. Triggering a first cross-link event E1 by applying a cross-link contract of the chain A, wherein the E1 identifies basic information of the cross-link processing request;
4. The relay connected with the application chain A (namely a first cross-chain relay) monitors the event to obtain a first cross-chain event E1;
5. the first cross-link relay parses a first cross-link event E1, and then generates a first presence credential P1 of the first cross-link event E1, where the first presence credential P1 may be used to prove validity of the first cross-link event E1;
6. the first cross-link relay generates a first transaction T1 of a cross-link management contract for sending to the relay link, wherein the first transaction T1 contains basic information of a cross-link processing request and a first presence certificate P1;
7. Executing a first transaction T1 by a cross-link management contract of the relay link, verifying the validity of a first presence certificate P1, then recording basic information of the cross-link processing request in an account book, and if the first presence certificate P1 passes the verification, sending out a second cross-link event E2, wherein the event information of the second cross-link event E2 comprises the basic information of the cross-link processing request;
8. The second cross-link relay connected with the application chain B monitors a second cross-link event E2, and analyzes the second cross-link event to obtain the resource positioning of the calling target data;
9. The relay link node analyzes the second cross-link event E2 and generates a second presence certificate P2 for proving the validity of the second cross-link event E2;
10. the relay link point generates a second transaction T2 of the cross-link contract for sending to the application chain B, wherein the second transaction T2 contains basic information of the cross-link processing request and a second presence certificate P2;
11. executing a second transaction T2 by applying the cross-link contract of the chain B, verifying the validity of the second presence certificate P2, and obtaining the resource positioning of the call target data;
12. the cross-link contract of the application chain B processes the target data by calling the business contract across contracts.
Based on the same principle as the method shown in fig. 2, fig. 5 shows a schematic structural diagram of a cross-link processing apparatus provided by an embodiment of the disclosure, and as shown in fig. 5, the cross-link processing apparatus 50 may include:
the to-be-verified data module 510 is configured to generate first to-be-verified data based on a cross-link processing request initiated on the first application link for target data on the second application link by the first cross-link relay, and send the first to-be-verified data to the relay link node;
The data verification module 520 is configured to perform a first verification on the first data to be verified by the relay link node, so that the second cross-link relay generates second data to be verified when the first verification passes, sends the second data to be verified to the second application link node, and performs a second verification on the second data to be verified by the second application link node, and processes the target data when the second verification passes.
According to the device provided by the embodiment of the disclosure, first data to be verified is generated by a first cross-link relay based on a cross-link processing request of target data on a second application chain initiated on a first application chain, and the first data to be verified is sent to a relay chain node; and the relay chain node performs first verification on the first data to be verified, generates second data to be verified when the second cross-chain relay passes the first verification, sends the second data to be verified to the second application chain node, performs second verification on the second data to be verified by the second application chain node, and processes the target data when the second verification passes. Based on the scheme, the credibility of the cross-chain transaction can be verified, and the safety and credibility of the cross-chain transaction can be guaranteed.
Optionally, when the data module to be verified generates the first data to be verified based on the cross-link processing request initiated on the first application link and to the target data on the second application link by the first cross-link relay, the data module to be verified is specifically configured to:
the first application chain node responds to a cross-chain processing request initiated on the first application chain and aiming at target data on the second application chain to generate a first cross-chain event;
and when the first cross-link relay monitors a first cross-link event, generating first data to be verified.
Optionally, when the first cross-link relay monitors the first cross-link event, the data module to be verified is specifically configured to:
When the first cross-link relay monitors a first cross-link event, generating a first presence evidence of the first cross-link event, and taking the first presence evidence as first data to be verified;
The data verification module is specifically configured to, when the relay link node performs a first verification on the first data to be verified:
the relay chain node performs a first verification of the first presence document.
It will be appreciated that the above-described modules of the cross-chain processing apparatus in the embodiments of the present disclosure have the functionality to implement the corresponding steps of the method of the cross-chain processing apparatus in the embodiment shown in fig. 2. The functions can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above. The modules may be software and/or hardware, and each module may be implemented separately or may be implemented by integrating multiple modules. For the functional description of each module of the above-mentioned testing device, reference may be specifically made to the corresponding description of the cross-link processing method in the embodiment shown in fig. 2, which is not repeated herein.
Based on the same principle as the method shown in fig. 3, fig. 6 shows a schematic structural diagram of a cross-link processing apparatus provided by an embodiment of the disclosure, and as shown in fig. 6, the cross-link processing apparatus 60 may include:
The first data verification module 610 is configured to receive, by the relay link point, first data to be verified sent by a first cross-link relay, and perform first verification on the first data to be verified, where the first data to be verified is generated by the first cross-link relay based on a cross-link processing request initiated on the first application chain and on target data on the second application chain;
the to-be-verified data module 620 is configured to generate second to-be-verified data by using the second cross-link relay when the first verification passes, and send the second to-be-verified data to the second application link node;
And the second data verification module 630 is configured to perform a second verification on the second data to be verified by the second application chain node, and process the target data when the second verification passes.
According to the device provided by the embodiment of the disclosure, first data to be verified is generated by a first cross-link relay based on a cross-link processing request of target data on a second application chain initiated on a first application chain, and the first data to be verified is sent to a relay chain node; and the relay chain node performs first verification on the first data to be verified, generates second data to be verified when the second cross-chain relay passes the first verification, sends the second data to be verified to the second application chain node, performs second verification on the second data to be verified by the second application chain node, and processes the target data when the second verification passes. Based on the scheme, the credibility of the cross-chain transaction can be verified, and the safety and credibility of the cross-chain transaction can be guaranteed.
Optionally, when the data module to be verified passes the first verification and the second cross-link relay generates the second data to be verified, the data module to be verified is specifically configured to:
When the first verification is passed, the relay link node generates a second cross-link event;
and when the second cross-link relay monitors a second cross-link event, generating second data to be verified.
Optionally, when the to-be-verified data module monitors the second cross-link event in the second cross-link relay, the to-be-verified data module is specifically configured to:
When the second cross-link relay monitors a second cross-link event, generating a second presence evidence of the second cross-link event, and taking the second presence evidence as second data to be verified;
The second data verification module is specifically configured to:
the second application chain node performs a second verification of a second presence document.
It will be appreciated that the above-described modules of the cross-chain processing apparatus in the embodiments of the present disclosure have the functionality to implement the corresponding steps of the method of the cross-chain processing apparatus in the embodiment shown in fig. 3. The functions can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the functions described above. The modules may be software and/or hardware, and each module may be implemented separately or may be implemented by integrating multiple modules. For the functional description of each module of the above-mentioned testing device, reference may be specifically made to the corresponding description of the cross-link processing method in the embodiment shown in fig. 3, which is not repeated herein.
According to embodiments of the present disclosure, the present disclosure also provides an electronic device, a readable storage medium and a computer program product.
The electronic device includes: at least one processor; and a memory communicatively coupled to the at least one processor; wherein the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a cross-chain processing method as provided by embodiments of the present disclosure.
Compared with the prior art, the electronic equipment generates first data to be verified based on a cross-link processing request of target data on a second application chain initiated on a first application chain by a first cross-link relay, and sends the first data to be verified to a relay chain node; and the relay chain node performs first verification on the first data to be verified, generates second data to be verified when the second cross-chain relay passes the first verification, sends the second data to be verified to the second application chain node, performs second verification on the second data to be verified by the second application chain node, and processes the target data when the second verification passes. Based on the scheme, the credibility of the cross-chain transaction can be verified, and the safety and credibility of the cross-chain transaction can be guaranteed.
The readable storage medium is a non-transitory computer readable storage medium storing computer instructions for causing a computer to perform a cross-chain processing method as provided by embodiments of the present disclosure.
Compared with the prior art, the readable storage medium generates first data to be verified based on a cross-link processing request of target data on a second application chain initiated on a first application chain by a first cross-link relay, and sends the first data to be verified to a relay chain node; and the relay chain node performs first verification on the first data to be verified, generates second data to be verified when the second cross-chain relay passes the first verification, sends the second data to be verified to the second application chain node, performs second verification on the second data to be verified by the second application chain node, and processes the target data when the second verification passes. Based on the scheme, the credibility of the cross-chain transaction can be verified, and the safety and credibility of the cross-chain transaction can be guaranteed.
The computer program product comprises a computer program which, when executed by a processor, implements a cross-chain processing method as provided by embodiments of the present disclosure.
Compared with the prior art, the computer program product generates first data to be verified by the first cross-link relay based on a cross-link processing request of target data on a second application chain initiated on a first application chain, and sends the first data to be verified to a relay chain node; and the relay chain node performs first verification on the first data to be verified, generates second data to be verified when the second cross-chain relay passes the first verification, sends the second data to be verified to the second application chain node, performs second verification on the second data to be verified by the second application chain node, and processes the target data when the second verification passes. Based on the scheme, the credibility of the cross-chain transaction can be verified, and the safety and credibility of the cross-chain transaction can be guaranteed.
Fig. 7 shows a schematic block diagram of an example electronic device 2000 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
Fig. 7 shows a schematic block diagram of an example electronic device 2000 that may be used to implement embodiments of the present disclosure. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. The electronic device may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the disclosure described and/or claimed herein.
As shown in fig. 7, the apparatus 2000 includes a computing unit 2010 that may perform various appropriate actions and processes according to a computer program stored in a Read Only Memory (ROM) 2020 or a computer program loaded from a storage unit 2080 into a Random Access Memory (RAM) 2030. In the RAM 2030, various programs and data required for the operation of the device 2000 may also be stored. The computing unit 2010, ROM 2020, and RAM 2030 are connected to each other by a bus 2040. An input/output (I/O) interface 2050 is also connected to bus 2040.
Various components in the device 2000 are connected to the I/O interface 2050, including: an input unit 2060 such as a keyboard, a mouse, or the like; an output unit 2070, such as various types of displays, speakers, and the like; a storage unit 2080 such as a magnetic disk, an optical disk, or the like; and a communication unit 2090 such as a network card, modem, wireless communication transceiver, etc. The communication unit 2090 allows the device 2000 to exchange information/data with other devices through a computer network such as the internet and/or various telecommunication networks.
The computing unit 2010 may be a variety of general purpose and/or special purpose processing components having processing and computing capabilities. Some examples of computing unit 2010 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various computing units running machine learning model algorithms, a Digital Signal Processor (DSP), and any suitable processor, controller, microcontroller, or the like. The computing unit 2010 performs the cross-chain processing methods provided in the embodiments of the present disclosure. For example, in some embodiments, the cross-chain processing methods provided in embodiments of the present disclosure may be implemented as a computer software program tangibly embodied on a machine-readable medium, such as storage unit 2080. In some embodiments, some or all of the computer program may be loaded and/or installed onto the device 2000 via the ROM 2020 and/or the communication unit 2090. One or more steps of the cross-chain processing method provided in embodiments of the present disclosure may be performed when the computer program is loaded into RAM 2030 and executed by computing unit 2010. Alternatively, in other embodiments, the computing unit 2010 may be configured to perform the cross-chain processing methods provided in the embodiments of the present disclosure in any other suitable manner (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
Program code for carrying out methods of the present disclosure may be written in any combination of one or more programming languages. These program code may be provided to a processor or controller of a general purpose computer, special purpose computer, or other programmable data processing apparatus such that the program code, when executed by the processor or controller, causes the functions/operations specified in the flowchart and/or block diagram to be implemented. The program code may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of this disclosure, a machine-readable medium may be a tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. The machine-readable medium may be a machine-readable signal medium or a machine-readable storage medium. The machine-readable medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the internet.
The computer system may include a client and a server. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server may be a cloud server, a server of a distributed system, or a server incorporating a blockchain.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps recited in the present disclosure may be performed in parallel, sequentially, or in a different order, provided that the desired results of the disclosed aspects are achieved, and are not limited herein.
The above detailed description should not be taken as limiting the scope of the present disclosure. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present disclosure are intended to be included within the scope of the present disclosure.

Claims (10)

1. A method of cross-chain processing, comprising:
the first cross-link relay generates first data to be verified based on a cross-link processing request of target data on a second application chain initiated on a first application chain, and sends the first data to be verified to a relay chain node;
the relay chain node performs first verification on the first data to be verified, so that second cross-chain relay generates second data to be verified when the first verification passes, the second data to be verified is sent to a second application chain node, the second application chain node performs second verification on the second data to be verified, and the target data is processed when the second verification passes.
2. The method of claim 1, wherein the first cross-chain relay generates the first data to be verified based on a cross-chain processing request initiated on the first application chain for target data on the second application chain, comprising:
the first application chain node responds to a cross-chain processing request initiated on the first application chain and aiming at target data on the second application chain to generate a first cross-chain event;
and when the first cross-link relay monitors the first cross-link event, generating first data to be verified.
3. The method of claim 2, wherein the first cross-link relay generating first data to be verified when listening for the first cross-link event comprises:
when the first cross-link relay monitors the first cross-link event, generating a first presence evidence of the first cross-link event, and taking the first presence evidence as first data to be verified;
the relay chain node performs first verification on the first data to be verified, including:
and the relay chain node performs first verification on the first presence certificate.
4. A method of cross-chain processing, comprising:
The method comprises the steps that a relay link point receives first data to be verified, which is sent by a first cross-link relay, and performs first verification on the first data to be verified, wherein the first data to be verified is generated by the first cross-link relay based on a cross-link processing request which is initiated on a first application chain and is used for target data on a second application chain;
When the first verification passes, a second cross-link relay generates second data to be verified, and the second data to be verified is sent to a second application link node;
and the second application chain node performs second verification on the second data to be verified, and processes the target data when the second verification passes.
5. The method of claim 4, wherein the second cross-chain relay generates second data to be verified when the first verification passes, comprising:
When the first verification is passed, the relay link node generates a second cross-link event;
and when the second cross-link relay monitors the second cross-link event, generating second data to be verified.
6. The method of claim 5, wherein the second cross-chain relay generating second data to be verified when listening for the second cross-chain event comprises:
When the second cross-link relay monitors the second cross-link event, generating a second presence evidence of the second cross-link event, and taking the second presence evidence as second data to be verified;
The second application chain node performs first verification on the first data to be verified, including:
the second application chain node performs a second verification on the second presence document.
7. A cross-chain processing apparatus, comprising:
the data to be verified module is used for generating first data to be verified based on a cross-link processing request of target data on a second application chain initiated on a first application chain by the first cross-link relay, and sending the first data to be verified to the relay chain node;
The data verification module is used for carrying out first verification on the first data to be verified by the relay chain node, so that second data to be verified is generated when the first verification passes by the second cross-chain relay, the second data to be verified is sent to the second application chain node, the second data to be verified is subjected to second verification by the second application chain node, and the target data is processed when the second verification passes by the second application chain node.
8. A cross-chain processing apparatus, comprising:
The first data verification module is used for receiving first data to be verified sent by a first cross-link relay by the relay link point, and carrying out first verification on the first data to be verified, wherein the first data to be verified is generated by the first cross-link relay based on a cross-link processing request initiated on a first application link and aiming at target data on a second application link;
The data to be verified module is used for generating second data to be verified by a second cross-link relay when the first verification passes and sending the second data to be verified to a second application link node;
And the second data verification module is used for carrying out second verification on the second data to be verified by a second application chain node, and processing the target data when the second verification passes.
9. An electronic device, comprising:
at least one processor; and
A memory communicatively coupled to the at least one processor; wherein,
The memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-6.
10. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method of any one of claims 1-6.
CN202110732919.XA 2021-06-29 2021-06-29 Cross-chain processing method and device, electronic equipment and readable storage medium Active CN113468268B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110732919.XA CN113468268B (en) 2021-06-29 2021-06-29 Cross-chain processing method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110732919.XA CN113468268B (en) 2021-06-29 2021-06-29 Cross-chain processing method and device, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN113468268A CN113468268A (en) 2021-10-01
CN113468268B true CN113468268B (en) 2024-07-19

Family

ID=77874052

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110732919.XA Active CN113468268B (en) 2021-06-29 2021-06-29 Cross-chain processing method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN113468268B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035046A (en) * 2018-11-16 2019-07-19 阿里巴巴集团控股有限公司 The interactive system of transregional piece of chain
CN110751475A (en) * 2019-10-24 2020-02-04 杭州趣链科技有限公司 Cross-chain method, system, equipment and storage medium for blockchain transaction

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111614656B (en) * 2018-11-16 2021-12-24 创新先进技术有限公司 Credible management method and device for cross-link data and electronic equipment
CN112765595B (en) * 2018-11-16 2024-05-10 创新先进技术有限公司 Cross-blockchain data processing method, device, client and blockchain system
CN110046998B (en) * 2019-01-31 2020-04-14 阿里巴巴集团控股有限公司 Cross-chain right using system, method, device, electronic equipment and storage medium
CN112348672B (en) * 2019-08-07 2023-08-08 淘宝(中国)软件有限公司 Cross-chain transaction method and device, multi-block chain system and computing equipment
WO2020098835A2 (en) * 2020-02-03 2020-05-22 Alipay (Hangzhou) Information Technology Co., Ltd. Blockchain-based trustable gurantees
CN112446785B (en) * 2020-11-06 2023-09-22 杭州趣链科技有限公司 Cross-chain transaction method, system, device, equipment and storage medium
CN112532393B (en) * 2020-11-20 2024-06-18 杭州趣链科技有限公司 Verification method for cross-chain transaction, relay link point equipment and medium
CN112508566B (en) * 2020-12-01 2024-04-05 浙商银行股份有限公司 Cross-link privacy transaction method and device based on alliance links
CN112783877B (en) * 2020-12-30 2024-06-07 北京百度网讯科技有限公司 Cross-chain data verification method, device, equipment and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110035046A (en) * 2018-11-16 2019-07-19 阿里巴巴集团控股有限公司 The interactive system of transregional piece of chain
CN110751475A (en) * 2019-10-24 2020-02-04 杭州趣链科技有限公司 Cross-chain method, system, equipment and storage medium for blockchain transaction

Also Published As

Publication number Publication date
CN113468268A (en) 2021-10-01

Similar Documents

Publication Publication Date Title
CN113434881B (en) Credibility verification method and device for cross-chain transaction and electronic equipment
US11842322B2 (en) Smart contract interpreter
CN113420090B (en) Cross-chain processing method and device, electronic equipment and readable storage medium
CN112783877B (en) Cross-chain data verification method, device, equipment and storage medium
US12126732B2 (en) Blockchain consensus method, device and system
CN113377875B (en) Cross-chain data processing method and device, electronic equipment and readable storage medium
CN111769958A (en) Block chain cross-chain processing method, device, equipment and storage medium
US11368447B2 (en) Oauth2 SAML token service
US20220100777A1 (en) Transaction request construction method and apparatus, transaction request processing method and apparatus, device and storage medium
CN110503433B (en) Method, device, equipment and medium for implementing endorsement in block chain
WO2019015272A1 (en) Information processing method and device
CN112714158B (en) Transaction processing method, relay network, cross-link gateway, system, medium and equipment
CN110688428B (en) Method and device for issuing intelligent contracts
CN111831461A (en) Method and device for processing business process
CN113360547B (en) Cross-chain query method and device, electronic equipment and readable storage medium
JP7506266B2 (en) Blockchain-based data processing method and device
CN113641388B (en) Cloud mobile phone updating method, related device and computer program product
CN113468268B (en) Cross-chain processing method and device, electronic equipment and readable storage medium
CN113434883B (en) Cross-chain processing method and device, electronic equipment and readable storage medium
CN117632545A (en) Data sharing method and device of business system and electronic equipment
CN111598544A (en) Method and apparatus for processing information
CN113420275B (en) Data connection processing method, related device and computer program product
CN113609156B (en) Data query and write method and device, electronic equipment and readable storage medium
CN112929453B (en) Method and device for sharing session data
CN113516523A (en) Order data processing method and order receiving system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant