CN110096903A - Assets verification method and block chain network system based on block chain - Google Patents
Assets verification method and block chain network system based on block chain Download PDFInfo
- Publication number
- CN110096903A CN110096903A CN201910235229.6A CN201910235229A CN110096903A CN 110096903 A CN110096903 A CN 110096903A CN 201910235229 A CN201910235229 A CN 201910235229A CN 110096903 A CN110096903 A CN 110096903A
- Authority
- CN
- China
- Prior art keywords
- assets
- node
- identity information
- user
- verified
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/018—Certifying business or products
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/03—Credit; Loans; Processing thereof
Abstract
The embodiment of the present application provides a kind of assets verification method based on block chain and block chain network system, this method comprises: the first node obtains the first assets identity information of the assets to be verified of user and the identity information of the user;The first node searches the second assets identity information of the pre-stored user according to the identity information of the user, and the second assets identity information is what the second node was generated according to the asset data of the assets to be verified of the user;The first node determines whether the assets to be verified of the user are verified according to the comparison result of the first assets identity information and the second assets identity information.By the characteristic that can not distort of block chain technology, user need to only provide the identity information of assets when carrying out assets verifying, without providing specific assets information, the verifying of assets can be completed in the privacy information that user can not have to reveal oneself as a result, and then ensure that the information security of user.
Description
Technical field
This application involves block chain technical field, in particular to a kind of assets verification method based on block chain and
Block chain network system.
Background technique
In the prior art, if user wants to carry out pledge, user needs to provide the effective text for the assets that it possesses
Part, authentication may be special mechanism or special appraiser, and authentication passes through legal or just and sound standard and program, verifying
The validity for the asset file that user provides, and provide relevant documentary evidence.
For example, user needs to carry out mortgage loan to bank, bank, which requires user to provide the relevant property right in its house, to be proved,
In such a scenario, authentication is lending department, bank.User needs to provide the information such as its House Property card, personally identifiable information
To bank, bank offers loans after audit verifying for user, since bank is when the assets to user are verified, user
It needs to provide certain individual privacy informations, such as identification card number, detailed home address to bank, this may have testing for malice
Card side deliberately reveals the case where privacy information of user, to not can guarantee the safety of the privacy information of user.
Summary of the invention
The embodiment of the present application is designed to provide a kind of assets verification method based on block chain and block chain network system
System leads to not guarantee user's there are leakage of private information when carrying out assets verifying in turn to improve user in the prior art
The problem of information security.
In a first aspect, the embodiment of the present application provides a kind of assets verification method based on block chain, it is applied to block chain
Block chain node in network, the block chain node includes first node and second node, which comprises described first
Node obtains the first assets identity information of the assets to be verified of user and the identity information of the user;The first node
The second assets identity information of the pre-stored user, the second assets body are searched according to the identity information of the user
Part information is what the second node was generated according to the asset data of the assets to be verified of the user;The first node according to
The comparison result of the first assets identity information and the second assets identity information determines the assets to be verified of the user
Whether it is verified.
During above-mentioned realization, user need to only mention when carrying out assets verifying to the first node in block chain node
For the first assets identity information of assets to be verified and the identity information of user, then first node finds second node root
According to the second assets identity information that asset data generates, further according to the ratio of the first assets identity information and the second assets identity information
Pair as a result, determine whether the assets to be verified of user are verified, by the characteristic that can not distort of block chain technology, user into
When row assets are verified, the identity information of assets only need to be provided, without providing specific assets information, user can as a result,
The verifying of assets can be completed in privacy information without revealing oneself, and then ensure that the information security of user.
Optionally, the first node is according to the ratio of the first assets identity information and the second assets identity information
Pair as a result, determining whether the assets to be verified of the user are verified, comprising: if the comparison result is first assets
Identity information is consistent with the second assets identity information, then the first node determines the assets to be verified verifying of the user
Pass through;If the comparison result is that the first assets identity information and the second assets identity information are inconsistent, described
First node determines that the assets to be verified verifying of the user does not pass through.
During above-mentioned realization, by the comparison of assets identity information, the first assets that can prevent user from providing are at one's side
Information is the case where forgery, due to block chain can not tamper, the second assets identity information can not be modified, so, the
I.e. knowable user is compared with the second assets identity information in the first assets identity information that one node need to only provide user
There is provided the first assets identity information whether be forge, compared with the prior art in also need to inquire a large amount of evidence to prove to use
The reliability for the information that family provides can effectively save the time of verifying in the program.
Optionally, the first assets identity information of the assets to be verified of the first node acquisition user and the user
Identity information before, the method also includes: the first node receives the second node and passes through the block chain network
Shared the second assets identity information simultaneously stores.
During above-mentioned realization, the second assets identity information is shared to first node by second node, so as to
To prevent the second assets identity information to be maliciously tampered, and then guarantee the reliability of the second assets identity information.
Optionally, the second assets identity information be the second node according to default hash algorithm to the assets number
According to the first assets cryptographic Hash of generation.The first assets cryptographic Hash is generated as the second assets identity information by hash algorithm, from
And the second assets identity information can be prevented to be maliciously tampered, and then guarantee the reliability of the second assets identity information.
Optionally, the first assets identity information of the assets to be verified of the first node acquisition user and the user
Identity information before, the method also includes: the first node obtains the assets in the assets digital certificate of the user
Digital signature, the assets digital certificate are to obtain after the second node signs to the asset data using default private key
, the assets digital certificate includes the first assets identity information, the asset data and the assets number label
Name;The first node verifies the assets digital signature using the corresponding default public key of the default private key, if testing
Card passes through, then obtains the asset data in the assets digital certificate;The first node is raw according to the default hash algorithm
At the corresponding second assets cryptographic Hash of asset data in the assets digital certificate;The first node is by first assets
Cryptographic Hash is compared with the second assets cryptographic Hash, if comparing unanimously, thens follow the steps: the first node obtains user
Assets to be verified the first assets identity information and the user identity information.
It whether is effective information to verify the first assets identity information of user's offer, also during above-mentioned realization
The assets digital certificate of user can be verified by the assets digital certificate of acquisition user, to verify assets number card
What whether book was issued by first node, so ensure that the first assets identity information obtained from assets digital certificate can
By property.
Optionally, the asset data includes multiple assets attribute and according to the corresponding attribute of each Asset Attributes
It is worth the attribute cryptographic Hash generated.
Optionally, the identity information of the user is encrypted identity information, thus can prevent the identity information of user
It is leaked.
Second aspect, the embodiment of the present application provide a kind of assets verification method based on block chain, are applied to block chain
Block chain node in network, the block chain node includes first node and second node, which comprises described second
Node obtains the asset data of the assets to be verified of user and the identity information of the user;The second node is according to
Asset data generates the second assets identity information of the assets to be verified;The second node believes the second assets identity
Breath and the identity information of the user share to the first node by the block chain network, so that the first node
The first assets identity information of the assets to be verified of the user and the identity information of the user are obtained, further according to the use
The identity information at family searches the second assets identity information of the pre-stored user, and is believed according to the first assets identity
The comparison result of breath and the second assets identity information, determines whether the assets to be verified of the user are verified.
Optionally, the identity information of the second assets identity information and the user is passed through institute by the second node
It states block chain network to share to after the first node, the first node receives the second assets that the second node is sent
Before identity information and the identity information of user and storage, the method also includes:
The second node signs to the asset data using default private key, obtains assets digital certificate, and will
The assets digital certificate is sent to the user, and the assets digital certificate includes the first assets identity information, described
Asset data and assets digital signature.
Optionally, the second node is believed according to the second assets identity that the asset data generates the assets to be verified
Breath, comprising:
The first assets cryptographic Hash that the second node generates the asset data according to default hash algorithm, described the
One assets cryptographic Hash is the second assets identity information.
The third aspect, the embodiment of the present application provide a kind of assets verification method based on block chain, are applied to block link network
Block chain node in network, the block chain node includes first node and second node, which comprises second section
Point obtains the asset data of the assets to be verified of user and the identity information of the user;The second node is according to the money
Produce the second assets identity information that data generate the assets to be verified;The second node is by the second assets identity information
And the identity information of the user shares to the first node by the block chain network;The first node receives institute
State the second assets identity information of second node transmission and identity information and the storage of user;Described in the first node obtains
First assets identity information of the assets to be verified of user and the identity information of the user;The first node is according to
The identity information of user searches the second assets identity information of the pre-stored user;The first node is according to described
The comparison result of one assets identity information and the second assets identity information, determines whether the assets to be verified of the user are tested
Card passes through.
Fourth aspect, the embodiment of the present application provide a kind of block chain network system, including first node and second node;Institute
Second node is stated, for obtaining the asset data of the assets to be verified of user and the identity information of the user;Described second
Node, for generating the second assets identity information of the assets to be verified according to the asset data;The second node is used
In the identity information of the second assets identity information and the user is shared to described by the block chain network
One node;The first node, for receiving the identity of the second assets identity information and user that the second node is sent
Information simultaneously stores;The first node, for obtaining the first assets identity information and the institute of the assets to be verified of the user
State the identity information of user;The first node, for searching the pre-stored use according to the identity information of the user
The second assets identity information at family;The first node, for according to the first assets identity information and second assets
The comparison result of identity information, determines whether the assets to be verified of the user are verified.
5th aspect, the embodiment of the present application provide the first node in a kind of block chain network, and the first node includes:
Data obtaining module, for obtain the assets to be verified of user the first assets identity information and the user
Identity information;
Information searching module, for searching the second money of the pre-stored user according to the identity information of the user
Identity information is produced, the second assets identity information is assets number of the second node according to the assets to be verified of the user
According to generation;
Authentication module, for the comparison knot according to the first assets identity information and the second assets identity information
Fruit, determines whether the assets to be verified of the user are verified.
6th aspect, the embodiment of the present application provide the second node in a kind of block chain network, and the second node includes:
Data acquisition module, for obtaining the asset data of the assets to be verified of user and the identity letter of the user
Breath;
Identity information generation module, for generating the second assets identity of the assets to be verified according to the asset data
Information;
Information sharing module, it is described for passing through the identity information of the second assets identity information and the user
Block chain network shares to the first node, so that the first node obtains the first money of the assets to be verified of the user
Identity information and the identity information of the user are produced, searches the pre-stored use further according to the identity information of the user
The second assets identity information at family, and according to the comparison knot of the first assets identity information and the second assets identity information
Fruit, determines whether the assets to be verified of the user are verified.
7th aspect, the embodiment of the present application provide a kind of block chain node, including processor and memory, the storage
Device is stored with computer-readable instruction fetch, and when the computer-readable instruction fetch is executed by the processor, operation is such as above-mentioned
The step in the method that first aspect or second aspect provide.
Eighth aspect, the embodiment of the present application provide a kind of readable storage medium storing program for executing, are stored thereon with computer program, the meter
The step as above stated in the method that first aspect or second aspect provide is run when calculation machine program is executed by processor.
Other feature and advantage of the application will be illustrated in subsequent specification, also, partly be become from specification
It is clear that by implementing the embodiment of the present application understanding.The purpose of the application and other advantages can be by written theorys
Specifically noted structure is achieved and obtained in bright book, claims and attached drawing.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached
Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair
The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this
A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of interaction schematic diagram of block chain node provided by the embodiments of the present application;
Fig. 2 is a kind of structural schematic diagram of block chain node provided by the embodiments of the present application;
Fig. 3 is a kind of first pass figure of the assets verification method based on block chain provided by the embodiments of the present application;
Fig. 4 is a kind of second flow chart of the assets verification method based on block chain provided by the embodiments of the present application;
Fig. 5 is a kind of interaction diagrams of the assets verification method based on block chain provided by the embodiments of the present application;
Fig. 6 is the structural block diagram of the first node in a kind of block chain network provided by the embodiments of the present application;
Fig. 7 provides a kind of structural block diagram of the second node in block chain network for the embodiment of the present application;
Fig. 8 is a kind of structural block diagram of block chain network system provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete
Ground description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.Usually exist
The component of the embodiment of the present application described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause
This, is not intended to limit claimed the application's to the detailed description of the embodiments herein provided in the accompanying drawings below
Range, but it is merely representative of the selected embodiment of the application.Based on embodiments herein, those skilled in the art are not being done
Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi
It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile the application's
In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
Before introducing the specific embodiment of the application, first the application scenarios of the application are simply introduced.
Block chain network provided by the present application is identical as existing various block chain networks, the basic framework of block chain network
It is made of data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer.Wherein, data Layer encapsulates bottom data area
Block and the technologies such as relevant data encryption and timestamp;Network layer includes distributed networking mechanism, data dissemination mechanism sum number
According to authentication mechanism etc.;All kinds of common recognition algorithms of common recognition layer predominant package network node;Economic factor is integrated into block by fierce layer
Chain technical system, main issuing mechanism and distribution mechanism etc. including economic incentives;All kinds of scripts of contract layer predominant package,
Algorithm and intelligent contract, are the bases of block chain programmable features;Application layer encapsulates the various application scenarios and case of block chain
Example.
The block chain network of the application is also to be made of multiple nodes, and each node has operation and store function
Block chain node or module.Such as each node is one or one group of computer or is wherein to have operation independent and storage
One module of function.
Block chain is the decentralization distributed data base system for participating in maintenance jointly by nodes all in block chain network,
It is by a series of data chunks generated based on cryptography method at each data block is a block in block chain.
According to the sequencing of generation time, block is linked together in an orderly manner, forms a data chain, is visually known as area
Block chain.Some concepts of block chain network are introduced below.
Node in block chain network is properly termed as block chain node, and wherein block chain network is based on P2P (Peer to
Peer, peer-to-peer network) network, it each participates in business and block is stored, verified, the P2P network node of forwarding is a block
Node in chain network.
In addition, the account book in block chain network is effectively traded for recording two sides, and this transaction can be permanently checked, such as originally
Apply in embodiment, the account book is for being recorded in the transaction generated on first node and second node, as second node generates
Second assets identity information This move is recorded in account book as Transaction Information.Transaction record in block chain is rendered as one
The state conversion record of key-value pair data record, all key-value pairs constitutes the account book of block chain, and account book has orderly and anti-
The characteristics of distorting, state conversion are that each side that participates in system submits chain code to call generating as a result, each trade fair generates one
Group assets key assignments tree, these key-value pairs submit to account book as " creation ", " update " or " deletion ".
Chain code is the intelligent contract that block chain provides, and is upper layer application in the medium of bottom block chain interaction.Application program
It is interacted by chain code and account book, data is written on block chain, or take out the current state of assets from slip condition database,
If second node is after the asset data for obtaining user, which is written in account book by chain code.
The data shared between first node and second node are transmitted by channel, and channel is multiple block chain nodes
Between privately owned " subnet " that communicates, for carrying out private and secret trading processing, the node that only channel is added in authorization just may be used
Account book data in access path, all operations provided in chain code must all execute on a channel.Interchannel cannot be handed over
Fork communication, ensure that the safety of data, can be the different channel of different definitions of asset, so only in the present embodiment
There is the user by authorization just to may have access to specified asset data, in the present embodiment, accessible second assets of first node
Identity information.
As shown in Figure 1, the node P1 and node P2 in block chain node joined channel C 1, node P2 and node P3 are added
Channel C 2, therefore, node P1 possesses account book L1, node P2 possesses account book L1 and L2, and node P3 possesses account book L2.Node P1 is only
Account book L1 can be accessed, account book L2 can not be accessed, node P3 can only access account book L2, can not access account book L1, and node P2 can be with
Account book L1 and L2 are accessed simultaneously.
Referring to figure 2., Fig. 2 is a kind of structural schematic diagram of block chain node provided by the embodiments of the present application, the block
Chain node may include: at least one processor 110, such as CPU, at least one communication interface 120, at least one processor
130 and at least one communication bus 140.Wherein, communication bus 140 is for realizing the direct connection communication of these components.Wherein,
The communication interface 120 of equipment is used to carry out the communication of signaling or data with other node devices in the embodiment of the present application.Memory
130 can be high speed RAM memory, be also possible to non-labile memory (non-volatile memory), for example, at least
One magnetic disk storage.Memory 130 optionally can also be that at least one is located remotely from the storage device of aforementioned processor.It deposits
Computer-readable instruction fetch is stored in reservoir 130, when the computer-readable instruction fetch is executed by the processor 110,
Block chain node executes method process shown in following Fig. 3 or Fig. 4.
Referring to figure 3., Fig. 3 is a kind of the first-class of assets verification method based on block chain provided by the embodiments of the present application
Cheng Tu, this method are applied to the block chain node in block chain network, which includes first node and second node,
This method comprises the following steps:
Step S110: the first assets identity information of the assets to be verified of the first node acquisition user and the use
The identity information at family.
First node refers to the block chain node verified to the assets to be verified of user, if such as user want with to be tested
Card assets go to bank to carry out mortgage loan, then bank need to verify the assets to be verified of user, whether to verify the user
There are the assets, in this case, first node is exactly the block chain that the bank is used to verify the assets to be verified of user
Node.
When the assets to be verified to user are verified, the first assets of assets to be verified can be inputted by first node
Identity information and the identity information of the user, first node can get the first assets identity information and user as a result,
Identity information.
Wherein, the first assets identity information does not imply that the asset data of specific assets to be verified, is that one kind is used for
Another identification information of identification asset data, for example, asset data may include when assets to be verified are the house property of user
The information such as house property address, price, the first assets identity information are then for identifying these asset datas, i.e. first node not
Corresponding asset data can be really obtained, but obtains the first assets identity information, such user is just not required to mention to first node
For specific asset data, to ensure that the specific asset data of user are not leaked, and then the privacy of user is protected.
It is generated in addition, the first assets identity information can be second node according to the asset data of the assets to be verified of user
Being sent to user afterwards, i.e. second node obtains the asset data of the assets to be verified of user and the identity information of the user,
Then the first assets identity information of assets to be verified is generated according to asset data.
Illustratively, if user wants to go to authoritative institution and proves the assets of oneself, the second above-mentioned section can be passed through
Point proves that the asset data of user, that is, above-mentioned second node can be the corresponding block chain node of authoritative institution, should
Second node can generate the first money when the assets to be verified for confirming user are true according to the asset data of assets to be verified
Identity information is produced, then second node can also be mentioned the first assets identity information as the proof of the assets to be verified of the user
Supply user.When user is gone using its assets to be verified as a result, it can be proved without providing specific asset data, only need to provide
First assets identity information, so first node can obtain the first assets identity information of user's offer and the body of user
Part information.
As an example, in order to guarantee that the identity information of user is not also leaked, then the identity information of user can be
The identity information of user can also be also passed through hash algorithm and obtain corresponding identity Kazakhstan by encrypted identity information, i.e. second node
Uncommon value is used as encrypted identity information, encrypted identity information is then sent to user, and share in first node,
So the identity information for the user that first node obtains from second node is not the true identity information of user yet, and
The identity information that first node obtains from user is also not the true identity information of user, but encrypted identity information,
It can guarantee that the identity of user can not be revealed by first node with this.
It should be noted that assets to be verified not merely refer to the house property of the example above, it can also refer to the money, each of user
Kind of academic certificate, professional certificate etc., and if understand in a broad sense, the assets to be verified of user can also refer to that user itself is had
Some technical ability, i.e. intangible asset, so, carrying out verifying to the assets to be verified of user in the embodiment of the present application can be understood as
It is some tangible or immaterial wealth the verifying held to user, is also possible to certain privacies letter possessed by user itself
Breath is verified, so that whether go to verify it in a manner of identity information for the privacy information of user effective, and then guarantees user
Privacy can not be leaked.In addition, in order to make it easy to understand, by assets to be verified with physical assets such as house property in the embodiment of the present application
For be illustrated, and in practical applications, the assets to be verified of the user can be that above-mentioned cited or other are unlisted
Various forms of assets, should all be within the scope of protection of this application.
Step S120: the first node searches the of the pre-stored user according to the identity information of the user
Two assets identity informations.
First node searches the second assets identity information of pre-stored user according to the identity information of user, this second
Assets identity information is also that second node is generated according to the asset data of the assets to be verified of user, that is to say, that the second section
Point obtains the asset data for the assets to be verified that user provides and the identity information of user, and then second node is according to assets number
According to the second assets identity information for generating assets to be verified, second node is after generating the second assets identity information by the second assets
Identity information and the identity information of user share to first node by block chain network, and then first node is by the of acquisition
Two assets identity informations are stored, so, first node can find according to the identity information of user and store on first node
The user the second assets identity information.
During above-mentioned realization, the second assets identity information is shared to first node by second node, so as to
To prevent the second assets identity information to be maliciously tampered, and then guarantee the reliability of the second assets identity information.
It is to be appreciated that above-mentioned first assets identity information is the assets identity information that first node obtains from user,
Second assets identity information is that first node is obtained by the way that second node is shared, is that second node is raw according to asset data
At, it is possible to understand that ground, second node is when generating the first assets identity information according to asset data and being sent to user, while the
Two nodes also share to first node for the first assets identity information as the second assets identity information, so first node can
It receives the second assets identity information that second node is shared by block chain network and is stored.
Step S130: the first node is according to the first assets identity information and the second assets identity information
Comparison result, determines whether the assets to be verified of the user are verified.
Due to block chain itself can not tamper, so, second node shares to the second assets identity of first node
Information cannot be changed, if if but user oneself obtain the first assets identity information be modified, may cause the first assets
Identity information and the second assets identity information are inconsistent, and then lead to that the assets to be verified of the user can not be verified, institute
With user provides false assets identity information in order to prevent, also needs the first assets identity information and the second assets identity information
It is compared, obtains comparison result.
After above-mentioned acquisition comparison result, as an example, if comparison result is the first assets identity information and second
Assets identity information is consistent, indicates that the first assets identity information is not tampered with, it is determined that the assets to be verified verifying of the user is logical
It crosses, if comparison result is that the first assets identity information and the second assets identity information be not a kind of, indicates the first assets identity information
It may be tampered, it is determined that the assets to be verified verifying of the user does not pass through, and can be tested the assets to be verified of user with this
Card.So by the comparison of assets identity information, information is the case where forgery the first assets that can prevent user from providing at one's side,
Due to block chain can not tamper, the second assets identity information can not be modified, so, first node need to only mention user
The first assets identity that i.e. knowable user provides is compared with the second assets identity information for the first assets identity information supplied
Whether information is to forge, compared with the prior art in need to inquire a large amount of evidence also to prove the reliable of information that user provides
Property can effectively save the time of verifying in the program.
During above-mentioned realization, user need to only mention when carrying out assets verifying to the first node in block chain node
For the first assets identity information of assets to be verified and the identity information of user, then first node finds second node root
According to the second assets identity information that asset data generates, further according to the ratio of the first assets identity information and the second assets identity information
Pair as a result, determine whether the assets to be verified of user are verified, by the characteristic that can not distort of block chain technology, user into
When row assets are verified, the identity information of assets only need to be provided, without providing specific assets information, user can as a result,
The verifying of assets can be completed in privacy information without revealing oneself, and then ensure that the information security of user.
As an example, data are distorted in order to prevent, and the second assets identity information is second node according to default Kazakhstan
The first assets cryptographic Hash that uncommon algorithm generates asset data.The first assets cryptographic Hash is generated as the second money by hash algorithm
Identity information is produced, so as to prevent the second assets identity information to be maliciously tampered, and then guarantees the second assets identity information
Reliability.
Wherein, hash algorithm is also known as hashing algorithm, is that the binary value of random length is mapped as to shorter fixed length
The binary value of degree, this small binary value are known as cryptographic Hash, are in fact exactly that one piece of data is converted to a regular length
Character string.Hash algorithm includes MD2, MD4, MD5 and SHA-1 etc., and the default hash algorithm in the present embodiment can use this
Any one in hash algorithms a bit.
In block chain, the Transaction Information in one block of trading is encrypted by hash algorithm, and information pressure
Shorten the hash character string being made of string number and letter into, the cryptographic Hash of block chain can uniquely and accurately identify an area
Block, arbitrary node can obtain the cryptographic Hash of this block, calculated Hash by simple Hash calculation in block chain
Value also just means that the information in this block is not tampered with without variation.
It is above-mentioned that asset data be can refer into existing reality according to the corresponding first assets cryptographic Hash of default hash algorithm generation
Existing mode, does not illustrate excessively herein.
As an example, second node can also generate the money of asset data after generating the second assets identity data
Digital certificate is produced, which includes the assets digital signature that signature acquisition is carried out to asset data, assets number label
For name for confirming integrality and the source of asset data, digital signature is related to public key, private key.It is to be appreciated that digital signature
Technology is the private key encryption by summary info with sender, sends recipient to together with original text, and recipient only uses sender
The public key of transmission could decrypt encrypted summary info, then generate an abstract letter to the original text received with hash algorithm
Breath is compared with the summary info of decryption, if identical, illustrate the information received be it is complete, in transmission process not by
Modification, otherwise illustrates that information is modified, therefore digital signature is able to verify that the integrality of information.
In the present embodiment, second node is after getting the asset data of user, using digital signature technology to assets
Data are signed, i.e., are encrypted using default private key to asset data, obtain assets digital signature, and then regeneration is final
Assets digital certificate.The assets digital certificate is signed by certificate authority (Certification Authority, CA)
Hair, assets digital certificate are used for the legitimacy of verification public key, second node when generating assets digital signature using default private key,
The corresponding default public key of default private key can be sent to first node, include version, sequence number, signature calculation in assets digital certificate
Method type signs originator information, validity period, by signed by, the public-key cryptography signed and issued, CA digital signature, other information etc..
Wherein, most important including the public-key cryptography (i.e. above-mentioned default public key) signed and issued and CA in assets digital certificate
Digital signature (i.e. above-mentioned assets digital signature), so, provable default public key is legal as long as through certificate.
In addition, can also include the first assets identity information and asset data in assets digital certificate.It needs to illustrate
It is that signified asset data is not the asset data of most original in the present embodiment, by taking house property as an example, original asset data
It can be with are as follows: house property address: 1 tunnel 123, flat price: 1,000,000, and asset data includes multiple assets attribute and according to every
The attribute cryptographic Hash of the corresponding attribute value generation of a Asset Attributes, i.e. Asset Attributes include house property address and flat price,
Attribute cryptographic Hash includes " 1 tunnel 123 " corresponding cryptographic Hash and " 1,000,000 " corresponding cryptographic Hash, so, asset data packet
It includes: (house property address, address properties cryptographic Hash) and (flat price, price attribute cryptographic Hash).
Above-mentioned asset data can be specific authoritative institution and obtain the original asset data of user and then pass through Hash
What algorithm generated includes the data of Asset Attributes and attribute cryptographic Hash, and the data is then allowed to be sent to second node, and as a result, the
The asset data for the not instead of most original that two nodes obtain, the corresponding cryptographic Hash of the asset data of most original, so, the second section
Point also can not just obtain the specific asset data of user.Due to the shared characteristic of block chain network, so that in block chain
The corresponding cryptographic Hash of original asset data can only be known in network, and can not know the asset data of most original, and then ensure
The private data of user is not leaked.
It is to be appreciated that asset data, which can be the various abstract mathematics actually proved in actual life, to be indicated, by a system
Column are mutually related combinations of attributes together, constitute complete assets description.Asset data can be by Header and Body two
Divide and constitute, a series of metadata of assets are contained in Header, such as asset number generates time, Asset Type and authority
Signature of the mechanism (i.e. second node) to the asset data.Actual assets association attributes (such as above-mentioned room is contained in Body
Place of production location and flat price), different types of assets can have different attributes.By taking House Property proves as an example, in Body also
The cryptographic Hash (i.e. attribute cryptographic Hash) of property right proof is contained, the algorithm title of the Hash, the body of housing ownership people are calculated
A series of part data, if mortgaged and given association attributes such as other banks.
So the asset data in assets digital certificate is not original asset data, second node is by the money of generation
It producing digital certificate and is sent to user, user provides the assets digital certificate when carrying out assets verifying, to first node, and then the
Whether one node can first verify assets digital signature correct, so first node first obtains assets number from assets digital certificate
Then word signature is verified the assets digital signature using the corresponding default public key of above-mentioned default private key, the signature verification
Pass through, indicate that the assets digital certificate is to be issued by second node, and then obtain the asset data in assets digital certificate again,
In order to guarantee that the asset data was not tampered with, then can according to it is above-mentioned be that default hash algorithm generates money in assets digital certificate
The corresponding second assets cryptographic Hash of data is produced, then the first assets cryptographic Hash is compared with the second assets cryptographic Hash, if than
To consistent, then it represents that the asset data in the assets digital certificate was not tampered with, so, first node can be demonstrate,proved from assets number
The first assets identity information is obtained in book.
It whether is effective information to verify the first assets identity information of user's offer, also during above-mentioned realization
The assets digital certificate of user can be verified by the assets digital certificate of acquisition user, to verify assets number card
What whether book was issued by first node, so ensure that the first assets identity information obtained from assets digital certificate can
By property.
Referring to figure 4., Fig. 4 is a kind of second of the assets verification method based on block chain provided by the embodiments of the present application
Cheng Tu, this method are applied to the block chain node in block chain network, and the block chain node includes first node and the second section
Point, described method includes following steps:
Step S210: the second node obtains the asset data of the assets to be verified of user and the identity of the user
Information.
Step S220: the second node generates the second assets identity of the assets to be verified according to the asset data
Information.
Step S230: the second node passes through the identity information of the second assets identity information and the user
The block chain network shares to the first node.
After the identity information of the second assets identity information and user is shared to first node by second node, pass through
One node obtains the first assets identity information of the assets to be verified of the user and the identity information of the user, further according to
The identity information of the user searches the second assets identity information of the pre-stored user, and according to first assets
It is logical to determine whether the assets to be verified of the user are verified for the comparison result of identity information and the second assets identity information
It crosses.
So generating the second assets identity information of asset data by second node, and then user tests in progress assets
When card, the first assets identity information of assets to be verified and the body of user need to be only provided to the first node in block chain node
Part information, then first node finds the second assets identity information that second node is generated according to asset data, further according to the
The comparison result of one assets identity information and the second assets identity information, determines whether the assets to be verified of user are verified,
By the characteristic that can not distort of block chain technology, user only need to provide the identity information of assets when carrying out assets verifying,
Without providing specific assets information, the verifying of assets is can be completed in the privacy information that user can not have to leakage oneself as a result,
And then it ensure that the information security of user.
The specific embodiment of this method is referred to the specific implementation process of above method embodiment, for the letter of description
It is clean, no longer excessive description herein.
Referring to figure 5., Fig. 5 is a kind of interactive stream of the assets verification method based on block chain provided by the embodiments of the present application
Cheng Tu, this method comprises the following steps:
Step S310: the second node obtains the asset data of the assets to be verified of user and the identity of the user
Information.
Step S320: the second node generates the second assets identity of the assets to be verified according to the asset data
Information.
Step S330: the second node passes through the identity information of the second assets identity information and the user
The block chain network shares to the first node.
Step S340: the first node receives the second assets identity information that the second node is sent and user
Identity information simultaneously stores.
Step S350: the first node obtains the first assets identity information and the institute of the assets to be verified of the user
State the identity information of user.
Step S360: the first node searches the of the pre-stored user according to the identity information of the user
Two assets identity informations.
Step S370: the first node is according to the first assets identity information and the second assets identity information
Comparison result, determines whether the assets to be verified of the user are verified.
So generating the second assets identity information of asset data by second node, and then user tests in progress assets
When card, the first assets identity information of assets to be verified and the body of user need to be only provided to the first node in block chain node
Part information, then first node finds the second assets identity information that second node is generated according to asset data, further according to the
The comparison result of one assets identity information and the second assets identity information, determines whether the assets to be verified of user are verified,
By the characteristic that can not distort of block chain technology, user only need to provide the identity information of assets when carrying out assets verifying,
Without providing specific assets information, the verifying of assets is can be completed in the privacy information that user can not have to leakage oneself as a result,
And then it ensure that the information security of user.
The specific embodiment of this method is also referred to the specific implementation process of above method embodiment, for description
Succinctly, no longer excessive description herein.
Fig. 6 is please referred to, Fig. 6 is the structure of the first node 400 in a kind of block chain network provided by the embodiments of the present application
Block diagram, the first node 400 include:
Data obtaining module 410, for obtain the assets to be verified of user the first assets identity information and the use
The identity information at family;
Information searching module 420, for searching the of the pre-stored user according to the identity information of the user
Two assets identity informations, the second assets identity information are to be verified assets of the second node 220 according to the user
Asset data generate;
Information searching module 420, for according to the first assets identity information and the second assets identity information
Comparison result, determines whether the assets to be verified of the user are verified.
Optionally, the information searching module 420, if being specifically used for the comparison result for the first assets identity letter
Breath is consistent with the second assets identity information, then the first node 400 determines that the assets to be verified verifying of the user is logical
It crosses;If the comparison result is that the first assets identity information and the second assets identity information are inconsistent, described the
One node 400 determines that the assets to be verified verifying of the user does not pass through.
Optionally, the first node 400 further include:
Information receiving module, described second shared for receiving the second node 220 by the block chain network
Assets identity information simultaneously stores.
Optionally, the second assets identity information be the second node 220 according to default hash algorithm to the money
Produce the first assets cryptographic Hash that data generate.
Optionally, the first node 400 further include:
Assets digital certificate acquisition module, the assets digital signature in assets digital certificate for obtaining the user,
The assets digital certificate second node 220 is obtained after being signed using default private key to the asset data,
The assets digital certificate includes the first assets identity information, the asset data and the assets digital signature;
Signing messages searching module 420, for utilizing the corresponding default public key of the default private key to the assets number
Signature is verified, if being verified, obtains the asset data in the assets digital certificate;
Cryptographic Hash generation module, for generating the assets number in the assets digital certificate according to the default hash algorithm
According to corresponding second assets cryptographic Hash;
Cryptographic Hash comparison module, for the first assets cryptographic Hash to be compared with the second assets cryptographic Hash.
Optionally, the asset data includes multiple assets attribute and according to the corresponding attribute of each Asset Attributes
It is worth the attribute cryptographic Hash generated.
Optionally, the identity information of the user is encrypted identity information.
Please refer to Fig. 7, Fig. 7 provides a kind of structural frames of the second node 500 in block chain network for the embodiment of the present application
Figure, the second node 500 include:
Data acquisition module 510, for obtaining the asset data of the assets to be verified of user and the identity of the user
Information;
Identity information generation module 520, for generating the second assets of the assets to be verified according to the asset data
Identity information;
Information sharing module 530, for passing through the identity information of the second assets identity information and the user
The block chain network shares to the first node 400, so that the first node 400 obtains the money to be verified of the user
The identity information of the first assets identity information and the user that produce, the identity information lookup further according to the user are deposited in advance
The second assets identity information of the user of storage, and believed according to the first assets identity information and the second assets identity
The comparison result of breath, determines whether the assets to be verified of the user are verified.
Optionally, the second node 500 further include:
Data signature module, for being signed using default private key to the asset data, acquisition assets digital certificate,
And the assets digital certificate is sent to the user, the assets digital certificate include the first assets identity information,
The asset data and assets digital signature.
Optionally, the identity information generation module 520, for being generated according to default hash algorithm to the asset data
The first assets cryptographic Hash, the first assets cryptographic Hash be the second assets identity information.
It should be understood that first node 400 is corresponding with above-mentioned Fig. 3 embodiment of the method, it is able to carry out what Fig. 3 embodiment of the method was related to
Each step, second node 500 is corresponding with above-mentioned Fig. 4 embodiment of the method, is able to carry out each step that Fig. 4 embodiment of the method is related to
Suddenly, modules can be by hardware realization in above-mentioned Fig. 6 and Fig. 7, can also be by software realization, and the embodiment of the present application is not
It is limited to this.The first node 400 and the specific function of second node 500 may refer to it is described above, to avoid repeating, this
Place is appropriate to omit detailed description.
Fig. 8 is please referred to, Fig. 8 is a kind of structural block diagram of block chain network system 600 provided by the embodiments of the present application, described
Block chain network system 600 includes first node 400 and second node 500;
The second node 500, for obtaining the asset data of the assets to be verified of user and the identity of the user
Information;
The second node 500, for generating the second assets identity of the assets to be verified according to the asset data
Information;
The second node 500, for passing through the identity information of the second assets identity information and the user
The block chain network shares to the first node 400;
The first node 400, for receiving the second assets identity information and user that the second node 500 is sent
Identity information and storage;
The first node 400, for obtaining the first assets identity information and the institute of the assets to be verified of the user
State the identity information of user;
The first node 400, for searching the of the pre-stored user according to the identity information of the user
Two assets identity informations;
The first node 400, for according to the first assets identity information and the second assets identity information
Comparison result, determines whether the assets to be verified of the user are verified.
The specific embodiment of the system is also referred to the specific implementation process of above method embodiment, for description
Succinctly, no longer excessive description herein.
The embodiment of the present application provides a kind of readable storage medium storing program for executing, when the computer program is executed by processor, executes such as
Method process performed by block chain node in embodiment of the method shown in Fig. 3 or Fig. 4.
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description
Specific work process, no longer can excessively be repeated herein with reference to the corresponding process in preceding method.
In conclusion the embodiment of the present application provides a kind of assets verification method based on block chain and block chain network system
It unites, in this method, user only need to provide assets to be verified to the first node in block chain node when carrying out assets verifying
First assets identity information and the identity information of user, then first node finds second node and is generated according to asset data
The second assets identity information determine and use further according to the comparison result of the first assets identity information and the second assets identity information
Whether the assets to be verified at family are verified, by the characteristic that can not distort of block chain technology, user when carrying out assets verifying,
The identity information of assets only need to be provided, without providing specific assets information, user can not have to reveal oneself as a result,
The verifying of assets can be completed in privacy information, and then ensure that the information security of user.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through
Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing
Show the device of multiple embodiments according to the application, the architectural framework in the cards of method and computer program product,
Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code
Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held
Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement
The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes
It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart
The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement
It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the application can integrate one independent portion of formation together
Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module
It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words
The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter
Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a
People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps.
And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited
The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field
For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair
Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.It should also be noted that similar label and letter exist
Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing
It is further defined and explained.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any
Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain
Lid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality
Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation
In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to
Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those
Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment
Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that
There is also other identical elements in process, method, article or equipment including the element.
Claims (10)
1. a kind of assets verification method based on block chain, which is characterized in that applied to the block chain node in block chain network,
The block chain node includes first node and second node, which comprises
The first node obtains the first assets identity information of the assets to be verified of user and the identity information of the user;
The first node is believed according to the second assets identity that the identity information of the user searches the pre-stored user
Breath, the second assets identity information are that the second node is generated according to the asset data of the assets to be verified of the user
's;
The first node is determined according to the comparison result of the first assets identity information and the second assets identity information
Whether the assets to be verified of the user are verified.
2. the method according to claim 1, wherein the first node is according to the first assets identity information
With the comparison result of the second assets identity information, determine whether the assets to be verified of the user are verified, comprising:
If the comparison result is that the first assets identity information is consistent with the second assets identity information, described first
Node determines that the assets to be verified of the user are verified;
If the comparison result is that the first assets identity information and the second assets identity information are inconsistent, described the
One node determines that the assets to be verified verifying of the user does not pass through.
3. the method according to claim 1, wherein the first node obtains the of the assets to be verified of user
Before one assets identity information and the identity information of the user, the method also includes:
The first node receives the second assets identity information that the second node is shared by the block chain network
And it stores.
4. according to the method described in claim 3, it is characterized in that, the second assets identity information is the second node root
The first assets cryptographic Hash that the asset data is generated according to default hash algorithm.
5. according to the method described in claim 4, it is characterized in that, the first node obtains the of the assets to be verified of user
Before one assets identity information and the identity information of the user, the method also includes:
The first node obtains the assets digital signature in the assets digital certificate of the user, and the assets digital certificate is
What the second node was obtained after being signed using default private key to the asset data, the assets digital certificate includes institute
State the first assets identity information, the asset data and the assets digital signature;
The first node verifies the assets digital signature using the corresponding default public key of the default private key, if testing
Card passes through, then obtains the asset data in the assets digital certificate;
The first node generates the asset data in the assets digital certificate corresponding according to the default hash algorithm
Two assets cryptographic Hash;
The first assets cryptographic Hash is compared the first node with the second assets cryptographic Hash, if comparing unanimously,
Then follow the steps: the first node obtains the first assets identity information of the assets to be verified of user and the body of the user
Part information.
6. according to any method of claim 2-5, which is characterized in that the asset data include multiple assets attribute with
And the attribute cryptographic Hash according to the corresponding attribute value generation of each Asset Attributes.
7. the method according to claim 1, wherein the identity information of the user is encrypted identity letter
Breath.
8. a kind of assets verification method based on block chain, which is characterized in that applied to the block chain node in block chain network,
The block chain node includes first node and second node, which comprises
The second node obtains the asset data of the assets to be verified of user and the identity information of the user;
The second node generates the second assets identity information of the assets to be verified according to the asset data;
The second assets identity information and the identity information of the user are passed through the block link network by the second node
Network shares to the first node, so that the first node obtains the first assets identity letter of the assets to be verified of the user
Breath and the identity information of the user, search the second of the pre-stored user further according to the identity information of the user
Assets identity information, and according to the comparison result of the first assets identity information and the second assets identity information, it determines
Whether the assets to be verified of the user are verified.
9. a kind of assets verification method based on block chain, which is characterized in that applied to the block chain node in block chain network,
The block chain node includes first node and second node, which comprises
The second node obtains the asset data of the assets to be verified of user and the identity information of the user;
The second node generates the second assets identity information of the assets to be verified according to the asset data;
The second assets identity information and the identity information of the user are passed through the block link network by the second node
Network shares to the first node;
The first node receives the identity information of the second assets identity information that the second node is sent and user and deposits
Storage;
The first node obtains the first assets identity information of the assets to be verified of the user and the identity of the user
Information;
The first node is believed according to the second assets identity that the identity information of the user searches the pre-stored user
Breath;
The first node is determined according to the comparison result of the first assets identity information and the second assets identity information
Whether the assets to be verified of the user are verified.
10. a kind of block chain network system, which is characterized in that including first node and second node;
The second node, for obtaining the asset data of the assets to be verified of user and the identity information of the user;
The second node, for generating the second assets identity information of the assets to be verified according to the asset data;
The second node, for the identity information of the second assets identity information and the user to be passed through the block
Chain network shares to the first node;
The first node, for receiving the identity information of the second assets identity information and user that the second node is sent
And it stores;
The first node, for obtain the assets to be verified of the user the first assets identity information and the user
Identity information;
The first node, for searching the second assets body of the pre-stored user according to the identity information of the user
Part information;
The first node, for the comparison knot according to the first assets identity information and the second assets identity information
Fruit, determines whether the assets to be verified of the user are verified.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910235229.6A CN110096903B (en) | 2019-03-26 | 2019-03-26 | Asset verification method based on block chain and block chain network system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910235229.6A CN110096903B (en) | 2019-03-26 | 2019-03-26 | Asset verification method based on block chain and block chain network system |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110096903A true CN110096903A (en) | 2019-08-06 |
CN110096903B CN110096903B (en) | 2021-04-30 |
Family
ID=67444046
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910235229.6A Active CN110096903B (en) | 2019-03-26 | 2019-03-26 | Asset verification method based on block chain and block chain network system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110096903B (en) |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110555625A (en) * | 2019-08-16 | 2019-12-10 | 腾讯科技(深圳)有限公司 | information processing method and device, computer equipment and storage medium |
CN110599172A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Asset information processing method and device based on block chain, equipment and storage medium |
CN110751481A (en) * | 2019-09-28 | 2020-02-04 | 北京瑞卓喜投科技发展有限公司 | Digital asset right confirming method and device |
CN110782252A (en) * | 2019-10-24 | 2020-02-11 | 福建福链科技有限公司 | Monitoring video data transaction method and system based on block chain |
CN111464536A (en) * | 2020-03-31 | 2020-07-28 | 中国联合网络通信集团有限公司 | Block chain cross-chain method and device |
CN113011962A (en) * | 2021-02-24 | 2021-06-22 | 浙江网商银行股份有限公司 | Resource allocation method and device |
CN113806788A (en) * | 2020-06-11 | 2021-12-17 | 中国标准化研究院 | Data asset management device and method |
Citations (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103391196A (en) * | 2013-07-04 | 2013-11-13 | 黄铁军 | Asset digital authentication method and device |
CN105574435A (en) * | 2015-12-22 | 2016-05-11 | 杭州安存网络科技有限公司 | On-line electronic contract signing and verifying methods, device and system |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
US20170046651A1 (en) * | 2015-08-13 | 2017-02-16 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
CN107493273A (en) * | 2017-08-02 | 2017-12-19 | 深圳市易成自动驾驶技术有限公司 | Identity identifying method, system and computer-readable recording medium |
CN107704773A (en) * | 2017-11-06 | 2018-02-16 | 东信和平科技股份有限公司 | A kind of method and system of estate management real name registration |
CN107742212A (en) * | 2017-10-13 | 2018-02-27 | 深圳怡化电脑股份有限公司 | Assets verification method, apparatus and system based on block chain |
WO2018128539A1 (en) * | 2017-01-08 | 2018-07-12 | Bernard Rene F | A method for checking and/or updating information relating to assets |
CN108764908A (en) * | 2018-06-01 | 2018-11-06 | 杭州复杂美科技有限公司 | A kind of assets method for anti-counterfeit and system, equipment and storage medium |
CN108959457A (en) * | 2018-06-15 | 2018-12-07 | 北京文创园投资管理有限公司 | A kind of inquiry of certificate, verification method and system |
CN108985100A (en) * | 2018-08-15 | 2018-12-11 | 百度在线网络技术(北京)有限公司 | Element Security Proof method, apparatus, equipment and medium based on block chain |
CN109325852A (en) * | 2018-10-25 | 2019-02-12 | 平安科技(深圳)有限公司 | Loan data processing method, device, equipment and storage medium based on block chain |
-
2019
- 2019-03-26 CN CN201910235229.6A patent/CN110096903B/en active Active
Patent Citations (13)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103391196A (en) * | 2013-07-04 | 2013-11-13 | 黄铁军 | Asset digital authentication method and device |
US20170046651A1 (en) * | 2015-08-13 | 2017-02-16 | The Toronto-Dominion Bank | Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers |
US20170046664A1 (en) * | 2015-08-13 | 2017-02-16 | The Toronto-Dominion Bank | Systems and methods for tracking and transferring ownership of connected devices using blockchain ledgers |
CN105574435A (en) * | 2015-12-22 | 2016-05-11 | 杭州安存网络科技有限公司 | On-line electronic contract signing and verifying methods, device and system |
CN105956923A (en) * | 2016-04-20 | 2016-09-21 | 上海如鸽投资有限公司 | Asset transaction platform and digital certification and transaction method for assets |
WO2018128539A1 (en) * | 2017-01-08 | 2018-07-12 | Bernard Rene F | A method for checking and/or updating information relating to assets |
CN107493273A (en) * | 2017-08-02 | 2017-12-19 | 深圳市易成自动驾驶技术有限公司 | Identity identifying method, system and computer-readable recording medium |
CN107742212A (en) * | 2017-10-13 | 2018-02-27 | 深圳怡化电脑股份有限公司 | Assets verification method, apparatus and system based on block chain |
CN107704773A (en) * | 2017-11-06 | 2018-02-16 | 东信和平科技股份有限公司 | A kind of method and system of estate management real name registration |
CN108764908A (en) * | 2018-06-01 | 2018-11-06 | 杭州复杂美科技有限公司 | A kind of assets method for anti-counterfeit and system, equipment and storage medium |
CN108959457A (en) * | 2018-06-15 | 2018-12-07 | 北京文创园投资管理有限公司 | A kind of inquiry of certificate, verification method and system |
CN108985100A (en) * | 2018-08-15 | 2018-12-11 | 百度在线网络技术(北京)有限公司 | Element Security Proof method, apparatus, equipment and medium based on block chain |
CN109325852A (en) * | 2018-10-25 | 2019-02-12 | 平安科技(深圳)有限公司 | Loan data processing method, device, equipment and storage medium based on block chain |
Non-Patent Citations (3)
Title |
---|
JUAN PORTILLO 等: "Building trust in 3PIP using asset-based security property verification", 《 2016 IEEE 34TH VLSI TEST SYMPOSIUM (VTS)》 * |
张婷: "基于区块链技术的数字资产确权交易模型研究", 《福建工程学院学报》 * |
徐毅: "基于物联网的隐私保护与信息安全增强模型的框架分析", 《现代信息科技》 * |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110555625A (en) * | 2019-08-16 | 2019-12-10 | 腾讯科技(深圳)有限公司 | information processing method and device, computer equipment and storage medium |
CN110555625B (en) * | 2019-08-16 | 2024-04-26 | 腾讯科技(深圳)有限公司 | Information processing method, device, computer equipment and storage medium |
CN110599172A (en) * | 2019-09-19 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Asset information processing method and device based on block chain, equipment and storage medium |
CN110751481A (en) * | 2019-09-28 | 2020-02-04 | 北京瑞卓喜投科技发展有限公司 | Digital asset right confirming method and device |
CN110782252A (en) * | 2019-10-24 | 2020-02-11 | 福建福链科技有限公司 | Monitoring video data transaction method and system based on block chain |
CN110782252B (en) * | 2019-10-24 | 2022-09-16 | 福建福链科技有限公司 | Monitoring video data transaction method and system based on block chain |
CN111464536A (en) * | 2020-03-31 | 2020-07-28 | 中国联合网络通信集团有限公司 | Block chain cross-chain method and device |
CN113806788A (en) * | 2020-06-11 | 2021-12-17 | 中国标准化研究院 | Data asset management device and method |
CN113011962A (en) * | 2021-02-24 | 2021-06-22 | 浙江网商银行股份有限公司 | Resource allocation method and device |
CN113011962B (en) * | 2021-02-24 | 2024-01-05 | 浙江网商银行股份有限公司 | Resource allocation method and device |
Also Published As
Publication number | Publication date |
---|---|
CN110096903B (en) | 2021-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110096903A (en) | Assets verification method and block chain network system based on block chain | |
Liu et al. | A blockchain-based framework of cross-border e-commerce supply chain | |
JP6995762B2 (en) | Cryptographic methods and systems for the secure extraction of data from the blockchain | |
CN110535662B (en) | Method and system for realizing user operation record based on block chain data certificate storage service | |
TWI727292B (en) | Block chain transaction method and device, and electronic equipment | |
KR101987692B1 (en) | Registry and Automation Management Methods for Smart Contracts in Blockchain Enforcement | |
CN109086585A (en) | History data processing method, system and computer readable storage medium | |
JP2020035436A (en) | Traceability system for pet food | |
CN106600403A (en) | Asset management method, device and system | |
CN109829326A (en) | Cross-domain certification and fair audit duplicate removal cloud storage system based on block chain | |
KR20200106000A (en) | System and method for implementing blockchain-based digital certificate | |
CN112231284A (en) | Block chain-based big data sharing system, method, device and storage medium | |
CN112801778B (en) | Alliance type bad asset block chain system | |
CN111259439B (en) | Intangible asset management service platform based on block chain and implementation method thereof | |
CN115208628B (en) | Data integrity verification method based on block chain | |
CN113469716A (en) | Product tracing method and system based on block chain and identification analysis | |
US11769146B1 (en) | Blockchain transactional identity verification | |
WO2021169767A1 (en) | Data processing method and apparatus, device and medium | |
CN109447809A (en) | A kind of video active identification method of combination block chain | |
Karamachoski et al. | Blockchain-based application for certification management | |
Kim et al. | Role‐based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment | |
US20220078006A1 (en) | Verifiable object state data tracking | |
CN110351292A (en) | Private key management method, device, equipment and storage medium | |
Le et al. | TrustedChain: A blockchain-based data sharing scheme for supply chain | |
Eltuhami et al. | Identity verification and document traceability in digital identity systems using non-transferable non-fungible tokens |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |