CN110096903A - Assets verification method and block chain network system based on block chain - Google Patents

Assets verification method and block chain network system based on block chain Download PDF

Info

Publication number
CN110096903A
CN110096903A CN201910235229.6A CN201910235229A CN110096903A CN 110096903 A CN110096903 A CN 110096903A CN 201910235229 A CN201910235229 A CN 201910235229A CN 110096903 A CN110096903 A CN 110096903A
Authority
CN
China
Prior art keywords
assets
node
identity information
user
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910235229.6A
Other languages
Chinese (zh)
Other versions
CN110096903B (en
Inventor
李玮
廖强
李南平
徐乔伦
罗进
王晶磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chengdu Jiahua Chain Cloud Technology Co Ltd
Rockontrol Technology Group Ltd By Share Ltd
Original Assignee
Chengdu Jiahua Chain Cloud Technology Co Ltd
Rockontrol Technology Group Ltd By Share Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chengdu Jiahua Chain Cloud Technology Co Ltd, Rockontrol Technology Group Ltd By Share Ltd filed Critical Chengdu Jiahua Chain Cloud Technology Co Ltd
Priority to CN201910235229.6A priority Critical patent/CN110096903B/en
Publication of CN110096903A publication Critical patent/CN110096903A/en
Application granted granted Critical
Publication of CN110096903B publication Critical patent/CN110096903B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Abstract

The embodiment of the present application provides a kind of assets verification method based on block chain and block chain network system, this method comprises: the first node obtains the first assets identity information of the assets to be verified of user and the identity information of the user;The first node searches the second assets identity information of the pre-stored user according to the identity information of the user, and the second assets identity information is what the second node was generated according to the asset data of the assets to be verified of the user;The first node determines whether the assets to be verified of the user are verified according to the comparison result of the first assets identity information and the second assets identity information.By the characteristic that can not distort of block chain technology, user need to only provide the identity information of assets when carrying out assets verifying, without providing specific assets information, the verifying of assets can be completed in the privacy information that user can not have to reveal oneself as a result, and then ensure that the information security of user.

Description

Assets verification method and block chain network system based on block chain
Technical field
This application involves block chain technical field, in particular to a kind of assets verification method based on block chain and Block chain network system.
Background technique
In the prior art, if user wants to carry out pledge, user needs to provide the effective text for the assets that it possesses Part, authentication may be special mechanism or special appraiser, and authentication passes through legal or just and sound standard and program, verifying The validity for the asset file that user provides, and provide relevant documentary evidence.
For example, user needs to carry out mortgage loan to bank, bank, which requires user to provide the relevant property right in its house, to be proved, In such a scenario, authentication is lending department, bank.User needs to provide the information such as its House Property card, personally identifiable information To bank, bank offers loans after audit verifying for user, since bank is when the assets to user are verified, user It needs to provide certain individual privacy informations, such as identification card number, detailed home address to bank, this may have testing for malice Card side deliberately reveals the case where privacy information of user, to not can guarantee the safety of the privacy information of user.
Summary of the invention
The embodiment of the present application is designed to provide a kind of assets verification method based on block chain and block chain network system System leads to not guarantee user's there are leakage of private information when carrying out assets verifying in turn to improve user in the prior art The problem of information security.
In a first aspect, the embodiment of the present application provides a kind of assets verification method based on block chain, it is applied to block chain Block chain node in network, the block chain node includes first node and second node, which comprises described first Node obtains the first assets identity information of the assets to be verified of user and the identity information of the user;The first node The second assets identity information of the pre-stored user, the second assets body are searched according to the identity information of the user Part information is what the second node was generated according to the asset data of the assets to be verified of the user;The first node according to The comparison result of the first assets identity information and the second assets identity information determines the assets to be verified of the user Whether it is verified.
During above-mentioned realization, user need to only mention when carrying out assets verifying to the first node in block chain node For the first assets identity information of assets to be verified and the identity information of user, then first node finds second node root According to the second assets identity information that asset data generates, further according to the ratio of the first assets identity information and the second assets identity information Pair as a result, determine whether the assets to be verified of user are verified, by the characteristic that can not distort of block chain technology, user into When row assets are verified, the identity information of assets only need to be provided, without providing specific assets information, user can as a result, The verifying of assets can be completed in privacy information without revealing oneself, and then ensure that the information security of user.
Optionally, the first node is according to the ratio of the first assets identity information and the second assets identity information Pair as a result, determining whether the assets to be verified of the user are verified, comprising: if the comparison result is first assets Identity information is consistent with the second assets identity information, then the first node determines the assets to be verified verifying of the user Pass through;If the comparison result is that the first assets identity information and the second assets identity information are inconsistent, described First node determines that the assets to be verified verifying of the user does not pass through.
During above-mentioned realization, by the comparison of assets identity information, the first assets that can prevent user from providing are at one's side Information is the case where forgery, due to block chain can not tamper, the second assets identity information can not be modified, so, the I.e. knowable user is compared with the second assets identity information in the first assets identity information that one node need to only provide user There is provided the first assets identity information whether be forge, compared with the prior art in also need to inquire a large amount of evidence to prove to use The reliability for the information that family provides can effectively save the time of verifying in the program.
Optionally, the first assets identity information of the assets to be verified of the first node acquisition user and the user Identity information before, the method also includes: the first node receives the second node and passes through the block chain network Shared the second assets identity information simultaneously stores.
During above-mentioned realization, the second assets identity information is shared to first node by second node, so as to To prevent the second assets identity information to be maliciously tampered, and then guarantee the reliability of the second assets identity information.
Optionally, the second assets identity information be the second node according to default hash algorithm to the assets number According to the first assets cryptographic Hash of generation.The first assets cryptographic Hash is generated as the second assets identity information by hash algorithm, from And the second assets identity information can be prevented to be maliciously tampered, and then guarantee the reliability of the second assets identity information.
Optionally, the first assets identity information of the assets to be verified of the first node acquisition user and the user Identity information before, the method also includes: the first node obtains the assets in the assets digital certificate of the user Digital signature, the assets digital certificate are to obtain after the second node signs to the asset data using default private key , the assets digital certificate includes the first assets identity information, the asset data and the assets number label Name;The first node verifies the assets digital signature using the corresponding default public key of the default private key, if testing Card passes through, then obtains the asset data in the assets digital certificate;The first node is raw according to the default hash algorithm At the corresponding second assets cryptographic Hash of asset data in the assets digital certificate;The first node is by first assets Cryptographic Hash is compared with the second assets cryptographic Hash, if comparing unanimously, thens follow the steps: the first node obtains user Assets to be verified the first assets identity information and the user identity information.
It whether is effective information to verify the first assets identity information of user's offer, also during above-mentioned realization The assets digital certificate of user can be verified by the assets digital certificate of acquisition user, to verify assets number card What whether book was issued by first node, so ensure that the first assets identity information obtained from assets digital certificate can By property.
Optionally, the asset data includes multiple assets attribute and according to the corresponding attribute of each Asset Attributes It is worth the attribute cryptographic Hash generated.
Optionally, the identity information of the user is encrypted identity information, thus can prevent the identity information of user It is leaked.
Second aspect, the embodiment of the present application provide a kind of assets verification method based on block chain, are applied to block chain Block chain node in network, the block chain node includes first node and second node, which comprises described second Node obtains the asset data of the assets to be verified of user and the identity information of the user;The second node is according to Asset data generates the second assets identity information of the assets to be verified;The second node believes the second assets identity Breath and the identity information of the user share to the first node by the block chain network, so that the first node The first assets identity information of the assets to be verified of the user and the identity information of the user are obtained, further according to the use The identity information at family searches the second assets identity information of the pre-stored user, and is believed according to the first assets identity The comparison result of breath and the second assets identity information, determines whether the assets to be verified of the user are verified.
Optionally, the identity information of the second assets identity information and the user is passed through institute by the second node It states block chain network to share to after the first node, the first node receives the second assets that the second node is sent Before identity information and the identity information of user and storage, the method also includes:
The second node signs to the asset data using default private key, obtains assets digital certificate, and will The assets digital certificate is sent to the user, and the assets digital certificate includes the first assets identity information, described Asset data and assets digital signature.
Optionally, the second node is believed according to the second assets identity that the asset data generates the assets to be verified Breath, comprising:
The first assets cryptographic Hash that the second node generates the asset data according to default hash algorithm, described the One assets cryptographic Hash is the second assets identity information.
The third aspect, the embodiment of the present application provide a kind of assets verification method based on block chain, are applied to block link network Block chain node in network, the block chain node includes first node and second node, which comprises second section Point obtains the asset data of the assets to be verified of user and the identity information of the user;The second node is according to the money Produce the second assets identity information that data generate the assets to be verified;The second node is by the second assets identity information And the identity information of the user shares to the first node by the block chain network;The first node receives institute State the second assets identity information of second node transmission and identity information and the storage of user;Described in the first node obtains First assets identity information of the assets to be verified of user and the identity information of the user;The first node is according to The identity information of user searches the second assets identity information of the pre-stored user;The first node is according to described The comparison result of one assets identity information and the second assets identity information, determines whether the assets to be verified of the user are tested Card passes through.
Fourth aspect, the embodiment of the present application provide a kind of block chain network system, including first node and second node;Institute Second node is stated, for obtaining the asset data of the assets to be verified of user and the identity information of the user;Described second Node, for generating the second assets identity information of the assets to be verified according to the asset data;The second node is used In the identity information of the second assets identity information and the user is shared to described by the block chain network One node;The first node, for receiving the identity of the second assets identity information and user that the second node is sent Information simultaneously stores;The first node, for obtaining the first assets identity information and the institute of the assets to be verified of the user State the identity information of user;The first node, for searching the pre-stored use according to the identity information of the user The second assets identity information at family;The first node, for according to the first assets identity information and second assets The comparison result of identity information, determines whether the assets to be verified of the user are verified.
5th aspect, the embodiment of the present application provide the first node in a kind of block chain network, and the first node includes:
Data obtaining module, for obtain the assets to be verified of user the first assets identity information and the user Identity information;
Information searching module, for searching the second money of the pre-stored user according to the identity information of the user Identity information is produced, the second assets identity information is assets number of the second node according to the assets to be verified of the user According to generation;
Authentication module, for the comparison knot according to the first assets identity information and the second assets identity information Fruit, determines whether the assets to be verified of the user are verified.
6th aspect, the embodiment of the present application provide the second node in a kind of block chain network, and the second node includes:
Data acquisition module, for obtaining the asset data of the assets to be verified of user and the identity letter of the user Breath;
Identity information generation module, for generating the second assets identity of the assets to be verified according to the asset data Information;
Information sharing module, it is described for passing through the identity information of the second assets identity information and the user Block chain network shares to the first node, so that the first node obtains the first money of the assets to be verified of the user Identity information and the identity information of the user are produced, searches the pre-stored use further according to the identity information of the user The second assets identity information at family, and according to the comparison knot of the first assets identity information and the second assets identity information Fruit, determines whether the assets to be verified of the user are verified.
7th aspect, the embodiment of the present application provide a kind of block chain node, including processor and memory, the storage Device is stored with computer-readable instruction fetch, and when the computer-readable instruction fetch is executed by the processor, operation is such as above-mentioned The step in the method that first aspect or second aspect provide.
Eighth aspect, the embodiment of the present application provide a kind of readable storage medium storing program for executing, are stored thereon with computer program, the meter The step as above stated in the method that first aspect or second aspect provide is run when calculation machine program is executed by processor.
Other feature and advantage of the application will be illustrated in subsequent specification, also, partly be become from specification It is clear that by implementing the embodiment of the present application understanding.The purpose of the application and other advantages can be by written theorys Specifically noted structure is achieved and obtained in bright book, claims and attached drawing.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of interaction schematic diagram of block chain node provided by the embodiments of the present application;
Fig. 2 is a kind of structural schematic diagram of block chain node provided by the embodiments of the present application;
Fig. 3 is a kind of first pass figure of the assets verification method based on block chain provided by the embodiments of the present application;
Fig. 4 is a kind of second flow chart of the assets verification method based on block chain provided by the embodiments of the present application;
Fig. 5 is a kind of interaction diagrams of the assets verification method based on block chain provided by the embodiments of the present application;
Fig. 6 is the structural block diagram of the first node in a kind of block chain network provided by the embodiments of the present application;
Fig. 7 provides a kind of structural block diagram of the second node in block chain network for the embodiment of the present application;
Fig. 8 is a kind of structural block diagram of block chain network system provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Ground description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.Usually exist The component of the embodiment of the present application described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, is not intended to limit claimed the application's to the detailed description of the embodiments herein provided in the accompanying drawings below Range, but it is merely representative of the selected embodiment of the application.Based on embodiments herein, those skilled in the art are not being done Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile the application's In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
Before introducing the specific embodiment of the application, first the application scenarios of the application are simply introduced.
Block chain network provided by the present application is identical as existing various block chain networks, the basic framework of block chain network It is made of data Layer, network layer, common recognition layer, excitation layer, contract layer and application layer.Wherein, data Layer encapsulates bottom data area Block and the technologies such as relevant data encryption and timestamp;Network layer includes distributed networking mechanism, data dissemination mechanism sum number According to authentication mechanism etc.;All kinds of common recognition algorithms of common recognition layer predominant package network node;Economic factor is integrated into block by fierce layer Chain technical system, main issuing mechanism and distribution mechanism etc. including economic incentives;All kinds of scripts of contract layer predominant package, Algorithm and intelligent contract, are the bases of block chain programmable features;Application layer encapsulates the various application scenarios and case of block chain Example.
The block chain network of the application is also to be made of multiple nodes, and each node has operation and store function Block chain node or module.Such as each node is one or one group of computer or is wherein to have operation independent and storage One module of function.
Block chain is the decentralization distributed data base system for participating in maintenance jointly by nodes all in block chain network, It is by a series of data chunks generated based on cryptography method at each data block is a block in block chain. According to the sequencing of generation time, block is linked together in an orderly manner, forms a data chain, is visually known as area Block chain.Some concepts of block chain network are introduced below.
Node in block chain network is properly termed as block chain node, and wherein block chain network is based on P2P (Peer to Peer, peer-to-peer network) network, it each participates in business and block is stored, verified, the P2P network node of forwarding is a block Node in chain network.
In addition, the account book in block chain network is effectively traded for recording two sides, and this transaction can be permanently checked, such as originally Apply in embodiment, the account book is for being recorded in the transaction generated on first node and second node, as second node generates Second assets identity information This move is recorded in account book as Transaction Information.Transaction record in block chain is rendered as one The state conversion record of key-value pair data record, all key-value pairs constitutes the account book of block chain, and account book has orderly and anti- The characteristics of distorting, state conversion are that each side that participates in system submits chain code to call generating as a result, each trade fair generates one Group assets key assignments tree, these key-value pairs submit to account book as " creation ", " update " or " deletion ".
Chain code is the intelligent contract that block chain provides, and is upper layer application in the medium of bottom block chain interaction.Application program It is interacted by chain code and account book, data is written on block chain, or take out the current state of assets from slip condition database, If second node is after the asset data for obtaining user, which is written in account book by chain code.
The data shared between first node and second node are transmitted by channel, and channel is multiple block chain nodes Between privately owned " subnet " that communicates, for carrying out private and secret trading processing, the node that only channel is added in authorization just may be used Account book data in access path, all operations provided in chain code must all execute on a channel.Interchannel cannot be handed over Fork communication, ensure that the safety of data, can be the different channel of different definitions of asset, so only in the present embodiment There is the user by authorization just to may have access to specified asset data, in the present embodiment, accessible second assets of first node Identity information.
As shown in Figure 1, the node P1 and node P2 in block chain node joined channel C 1, node P2 and node P3 are added Channel C 2, therefore, node P1 possesses account book L1, node P2 possesses account book L1 and L2, and node P3 possesses account book L2.Node P1 is only Account book L1 can be accessed, account book L2 can not be accessed, node P3 can only access account book L2, can not access account book L1, and node P2 can be with Account book L1 and L2 are accessed simultaneously.
Referring to figure 2., Fig. 2 is a kind of structural schematic diagram of block chain node provided by the embodiments of the present application, the block Chain node may include: at least one processor 110, such as CPU, at least one communication interface 120, at least one processor 130 and at least one communication bus 140.Wherein, communication bus 140 is for realizing the direct connection communication of these components.Wherein, The communication interface 120 of equipment is used to carry out the communication of signaling or data with other node devices in the embodiment of the present application.Memory 130 can be high speed RAM memory, be also possible to non-labile memory (non-volatile memory), for example, at least One magnetic disk storage.Memory 130 optionally can also be that at least one is located remotely from the storage device of aforementioned processor.It deposits Computer-readable instruction fetch is stored in reservoir 130, when the computer-readable instruction fetch is executed by the processor 110, Block chain node executes method process shown in following Fig. 3 or Fig. 4.
Referring to figure 3., Fig. 3 is a kind of the first-class of assets verification method based on block chain provided by the embodiments of the present application Cheng Tu, this method are applied to the block chain node in block chain network, which includes first node and second node, This method comprises the following steps:
Step S110: the first assets identity information of the assets to be verified of the first node acquisition user and the use The identity information at family.
First node refers to the block chain node verified to the assets to be verified of user, if such as user want with to be tested Card assets go to bank to carry out mortgage loan, then bank need to verify the assets to be verified of user, whether to verify the user There are the assets, in this case, first node is exactly the block chain that the bank is used to verify the assets to be verified of user Node.
When the assets to be verified to user are verified, the first assets of assets to be verified can be inputted by first node Identity information and the identity information of the user, first node can get the first assets identity information and user as a result, Identity information.
Wherein, the first assets identity information does not imply that the asset data of specific assets to be verified, is that one kind is used for Another identification information of identification asset data, for example, asset data may include when assets to be verified are the house property of user The information such as house property address, price, the first assets identity information are then for identifying these asset datas, i.e. first node not Corresponding asset data can be really obtained, but obtains the first assets identity information, such user is just not required to mention to first node For specific asset data, to ensure that the specific asset data of user are not leaked, and then the privacy of user is protected.
It is generated in addition, the first assets identity information can be second node according to the asset data of the assets to be verified of user Being sent to user afterwards, i.e. second node obtains the asset data of the assets to be verified of user and the identity information of the user, Then the first assets identity information of assets to be verified is generated according to asset data.
Illustratively, if user wants to go to authoritative institution and proves the assets of oneself, the second above-mentioned section can be passed through Point proves that the asset data of user, that is, above-mentioned second node can be the corresponding block chain node of authoritative institution, should Second node can generate the first money when the assets to be verified for confirming user are true according to the asset data of assets to be verified Identity information is produced, then second node can also be mentioned the first assets identity information as the proof of the assets to be verified of the user Supply user.When user is gone using its assets to be verified as a result, it can be proved without providing specific asset data, only need to provide First assets identity information, so first node can obtain the first assets identity information of user's offer and the body of user Part information.
As an example, in order to guarantee that the identity information of user is not also leaked, then the identity information of user can be The identity information of user can also be also passed through hash algorithm and obtain corresponding identity Kazakhstan by encrypted identity information, i.e. second node Uncommon value is used as encrypted identity information, encrypted identity information is then sent to user, and share in first node, So the identity information for the user that first node obtains from second node is not the true identity information of user yet, and The identity information that first node obtains from user is also not the true identity information of user, but encrypted identity information, It can guarantee that the identity of user can not be revealed by first node with this.
It should be noted that assets to be verified not merely refer to the house property of the example above, it can also refer to the money, each of user Kind of academic certificate, professional certificate etc., and if understand in a broad sense, the assets to be verified of user can also refer to that user itself is had Some technical ability, i.e. intangible asset, so, carrying out verifying to the assets to be verified of user in the embodiment of the present application can be understood as It is some tangible or immaterial wealth the verifying held to user, is also possible to certain privacies letter possessed by user itself Breath is verified, so that whether go to verify it in a manner of identity information for the privacy information of user effective, and then guarantees user Privacy can not be leaked.In addition, in order to make it easy to understand, by assets to be verified with physical assets such as house property in the embodiment of the present application For be illustrated, and in practical applications, the assets to be verified of the user can be that above-mentioned cited or other are unlisted Various forms of assets, should all be within the scope of protection of this application.
Step S120: the first node searches the of the pre-stored user according to the identity information of the user Two assets identity informations.
First node searches the second assets identity information of pre-stored user according to the identity information of user, this second Assets identity information is also that second node is generated according to the asset data of the assets to be verified of user, that is to say, that the second section Point obtains the asset data for the assets to be verified that user provides and the identity information of user, and then second node is according to assets number According to the second assets identity information for generating assets to be verified, second node is after generating the second assets identity information by the second assets Identity information and the identity information of user share to first node by block chain network, and then first node is by the of acquisition Two assets identity informations are stored, so, first node can find according to the identity information of user and store on first node The user the second assets identity information.
During above-mentioned realization, the second assets identity information is shared to first node by second node, so as to To prevent the second assets identity information to be maliciously tampered, and then guarantee the reliability of the second assets identity information.
It is to be appreciated that above-mentioned first assets identity information is the assets identity information that first node obtains from user, Second assets identity information is that first node is obtained by the way that second node is shared, is that second node is raw according to asset data At, it is possible to understand that ground, second node is when generating the first assets identity information according to asset data and being sent to user, while the Two nodes also share to first node for the first assets identity information as the second assets identity information, so first node can It receives the second assets identity information that second node is shared by block chain network and is stored.
Step S130: the first node is according to the first assets identity information and the second assets identity information Comparison result, determines whether the assets to be verified of the user are verified.
Due to block chain itself can not tamper, so, second node shares to the second assets identity of first node Information cannot be changed, if if but user oneself obtain the first assets identity information be modified, may cause the first assets Identity information and the second assets identity information are inconsistent, and then lead to that the assets to be verified of the user can not be verified, institute With user provides false assets identity information in order to prevent, also needs the first assets identity information and the second assets identity information It is compared, obtains comparison result.
After above-mentioned acquisition comparison result, as an example, if comparison result is the first assets identity information and second Assets identity information is consistent, indicates that the first assets identity information is not tampered with, it is determined that the assets to be verified verifying of the user is logical It crosses, if comparison result is that the first assets identity information and the second assets identity information be not a kind of, indicates the first assets identity information It may be tampered, it is determined that the assets to be verified verifying of the user does not pass through, and can be tested the assets to be verified of user with this Card.So by the comparison of assets identity information, information is the case where forgery the first assets that can prevent user from providing at one's side, Due to block chain can not tamper, the second assets identity information can not be modified, so, first node need to only mention user The first assets identity that i.e. knowable user provides is compared with the second assets identity information for the first assets identity information supplied Whether information is to forge, compared with the prior art in need to inquire a large amount of evidence also to prove the reliable of information that user provides Property can effectively save the time of verifying in the program.
During above-mentioned realization, user need to only mention when carrying out assets verifying to the first node in block chain node For the first assets identity information of assets to be verified and the identity information of user, then first node finds second node root According to the second assets identity information that asset data generates, further according to the ratio of the first assets identity information and the second assets identity information Pair as a result, determine whether the assets to be verified of user are verified, by the characteristic that can not distort of block chain technology, user into When row assets are verified, the identity information of assets only need to be provided, without providing specific assets information, user can as a result, The verifying of assets can be completed in privacy information without revealing oneself, and then ensure that the information security of user.
As an example, data are distorted in order to prevent, and the second assets identity information is second node according to default Kazakhstan The first assets cryptographic Hash that uncommon algorithm generates asset data.The first assets cryptographic Hash is generated as the second money by hash algorithm Identity information is produced, so as to prevent the second assets identity information to be maliciously tampered, and then guarantees the second assets identity information Reliability.
Wherein, hash algorithm is also known as hashing algorithm, is that the binary value of random length is mapped as to shorter fixed length The binary value of degree, this small binary value are known as cryptographic Hash, are in fact exactly that one piece of data is converted to a regular length Character string.Hash algorithm includes MD2, MD4, MD5 and SHA-1 etc., and the default hash algorithm in the present embodiment can use this Any one in hash algorithms a bit.
In block chain, the Transaction Information in one block of trading is encrypted by hash algorithm, and information pressure Shorten the hash character string being made of string number and letter into, the cryptographic Hash of block chain can uniquely and accurately identify an area Block, arbitrary node can obtain the cryptographic Hash of this block, calculated Hash by simple Hash calculation in block chain Value also just means that the information in this block is not tampered with without variation.
It is above-mentioned that asset data be can refer into existing reality according to the corresponding first assets cryptographic Hash of default hash algorithm generation Existing mode, does not illustrate excessively herein.
As an example, second node can also generate the money of asset data after generating the second assets identity data Digital certificate is produced, which includes the assets digital signature that signature acquisition is carried out to asset data, assets number label For name for confirming integrality and the source of asset data, digital signature is related to public key, private key.It is to be appreciated that digital signature Technology is the private key encryption by summary info with sender, sends recipient to together with original text, and recipient only uses sender The public key of transmission could decrypt encrypted summary info, then generate an abstract letter to the original text received with hash algorithm Breath is compared with the summary info of decryption, if identical, illustrate the information received be it is complete, in transmission process not by Modification, otherwise illustrates that information is modified, therefore digital signature is able to verify that the integrality of information.
In the present embodiment, second node is after getting the asset data of user, using digital signature technology to assets Data are signed, i.e., are encrypted using default private key to asset data, obtain assets digital signature, and then regeneration is final Assets digital certificate.The assets digital certificate is signed by certificate authority (Certification Authority, CA) Hair, assets digital certificate are used for the legitimacy of verification public key, second node when generating assets digital signature using default private key, The corresponding default public key of default private key can be sent to first node, include version, sequence number, signature calculation in assets digital certificate Method type signs originator information, validity period, by signed by, the public-key cryptography signed and issued, CA digital signature, other information etc..
Wherein, most important including the public-key cryptography (i.e. above-mentioned default public key) signed and issued and CA in assets digital certificate Digital signature (i.e. above-mentioned assets digital signature), so, provable default public key is legal as long as through certificate.
In addition, can also include the first assets identity information and asset data in assets digital certificate.It needs to illustrate It is that signified asset data is not the asset data of most original in the present embodiment, by taking house property as an example, original asset data It can be with are as follows: house property address: 1 tunnel 123, flat price: 1,000,000, and asset data includes multiple assets attribute and according to every The attribute cryptographic Hash of the corresponding attribute value generation of a Asset Attributes, i.e. Asset Attributes include house property address and flat price, Attribute cryptographic Hash includes " 1 tunnel 123 " corresponding cryptographic Hash and " 1,000,000 " corresponding cryptographic Hash, so, asset data packet It includes: (house property address, address properties cryptographic Hash) and (flat price, price attribute cryptographic Hash).
Above-mentioned asset data can be specific authoritative institution and obtain the original asset data of user and then pass through Hash What algorithm generated includes the data of Asset Attributes and attribute cryptographic Hash, and the data is then allowed to be sent to second node, and as a result, the The asset data for the not instead of most original that two nodes obtain, the corresponding cryptographic Hash of the asset data of most original, so, the second section Point also can not just obtain the specific asset data of user.Due to the shared characteristic of block chain network, so that in block chain The corresponding cryptographic Hash of original asset data can only be known in network, and can not know the asset data of most original, and then ensure The private data of user is not leaked.
It is to be appreciated that asset data, which can be the various abstract mathematics actually proved in actual life, to be indicated, by a system Column are mutually related combinations of attributes together, constitute complete assets description.Asset data can be by Header and Body two Divide and constitute, a series of metadata of assets are contained in Header, such as asset number generates time, Asset Type and authority Signature of the mechanism (i.e. second node) to the asset data.Actual assets association attributes (such as above-mentioned room is contained in Body Place of production location and flat price), different types of assets can have different attributes.By taking House Property proves as an example, in Body also The cryptographic Hash (i.e. attribute cryptographic Hash) of property right proof is contained, the algorithm title of the Hash, the body of housing ownership people are calculated A series of part data, if mortgaged and given association attributes such as other banks.
So the asset data in assets digital certificate is not original asset data, second node is by the money of generation It producing digital certificate and is sent to user, user provides the assets digital certificate when carrying out assets verifying, to first node, and then the Whether one node can first verify assets digital signature correct, so first node first obtains assets number from assets digital certificate Then word signature is verified the assets digital signature using the corresponding default public key of above-mentioned default private key, the signature verification Pass through, indicate that the assets digital certificate is to be issued by second node, and then obtain the asset data in assets digital certificate again, In order to guarantee that the asset data was not tampered with, then can according to it is above-mentioned be that default hash algorithm generates money in assets digital certificate The corresponding second assets cryptographic Hash of data is produced, then the first assets cryptographic Hash is compared with the second assets cryptographic Hash, if than To consistent, then it represents that the asset data in the assets digital certificate was not tampered with, so, first node can be demonstrate,proved from assets number The first assets identity information is obtained in book.
It whether is effective information to verify the first assets identity information of user's offer, also during above-mentioned realization The assets digital certificate of user can be verified by the assets digital certificate of acquisition user, to verify assets number card What whether book was issued by first node, so ensure that the first assets identity information obtained from assets digital certificate can By property.
Referring to figure 4., Fig. 4 is a kind of second of the assets verification method based on block chain provided by the embodiments of the present application Cheng Tu, this method are applied to the block chain node in block chain network, and the block chain node includes first node and the second section Point, described method includes following steps:
Step S210: the second node obtains the asset data of the assets to be verified of user and the identity of the user Information.
Step S220: the second node generates the second assets identity of the assets to be verified according to the asset data Information.
Step S230: the second node passes through the identity information of the second assets identity information and the user The block chain network shares to the first node.
After the identity information of the second assets identity information and user is shared to first node by second node, pass through One node obtains the first assets identity information of the assets to be verified of the user and the identity information of the user, further according to The identity information of the user searches the second assets identity information of the pre-stored user, and according to first assets It is logical to determine whether the assets to be verified of the user are verified for the comparison result of identity information and the second assets identity information It crosses.
So generating the second assets identity information of asset data by second node, and then user tests in progress assets When card, the first assets identity information of assets to be verified and the body of user need to be only provided to the first node in block chain node Part information, then first node finds the second assets identity information that second node is generated according to asset data, further according to the The comparison result of one assets identity information and the second assets identity information, determines whether the assets to be verified of user are verified, By the characteristic that can not distort of block chain technology, user only need to provide the identity information of assets when carrying out assets verifying, Without providing specific assets information, the verifying of assets is can be completed in the privacy information that user can not have to leakage oneself as a result, And then it ensure that the information security of user.
The specific embodiment of this method is referred to the specific implementation process of above method embodiment, for the letter of description It is clean, no longer excessive description herein.
Referring to figure 5., Fig. 5 is a kind of interactive stream of the assets verification method based on block chain provided by the embodiments of the present application Cheng Tu, this method comprises the following steps:
Step S310: the second node obtains the asset data of the assets to be verified of user and the identity of the user Information.
Step S320: the second node generates the second assets identity of the assets to be verified according to the asset data Information.
Step S330: the second node passes through the identity information of the second assets identity information and the user The block chain network shares to the first node.
Step S340: the first node receives the second assets identity information that the second node is sent and user Identity information simultaneously stores.
Step S350: the first node obtains the first assets identity information and the institute of the assets to be verified of the user State the identity information of user.
Step S360: the first node searches the of the pre-stored user according to the identity information of the user Two assets identity informations.
Step S370: the first node is according to the first assets identity information and the second assets identity information Comparison result, determines whether the assets to be verified of the user are verified.
So generating the second assets identity information of asset data by second node, and then user tests in progress assets When card, the first assets identity information of assets to be verified and the body of user need to be only provided to the first node in block chain node Part information, then first node finds the second assets identity information that second node is generated according to asset data, further according to the The comparison result of one assets identity information and the second assets identity information, determines whether the assets to be verified of user are verified, By the characteristic that can not distort of block chain technology, user only need to provide the identity information of assets when carrying out assets verifying, Without providing specific assets information, the verifying of assets is can be completed in the privacy information that user can not have to leakage oneself as a result, And then it ensure that the information security of user.
The specific embodiment of this method is also referred to the specific implementation process of above method embodiment, for description Succinctly, no longer excessive description herein.
Fig. 6 is please referred to, Fig. 6 is the structure of the first node 400 in a kind of block chain network provided by the embodiments of the present application Block diagram, the first node 400 include:
Data obtaining module 410, for obtain the assets to be verified of user the first assets identity information and the use The identity information at family;
Information searching module 420, for searching the of the pre-stored user according to the identity information of the user Two assets identity informations, the second assets identity information are to be verified assets of the second node 220 according to the user Asset data generate;
Information searching module 420, for according to the first assets identity information and the second assets identity information Comparison result, determines whether the assets to be verified of the user are verified.
Optionally, the information searching module 420, if being specifically used for the comparison result for the first assets identity letter Breath is consistent with the second assets identity information, then the first node 400 determines that the assets to be verified verifying of the user is logical It crosses;If the comparison result is that the first assets identity information and the second assets identity information are inconsistent, described the One node 400 determines that the assets to be verified verifying of the user does not pass through.
Optionally, the first node 400 further include:
Information receiving module, described second shared for receiving the second node 220 by the block chain network Assets identity information simultaneously stores.
Optionally, the second assets identity information be the second node 220 according to default hash algorithm to the money Produce the first assets cryptographic Hash that data generate.
Optionally, the first node 400 further include:
Assets digital certificate acquisition module, the assets digital signature in assets digital certificate for obtaining the user, The assets digital certificate second node 220 is obtained after being signed using default private key to the asset data, The assets digital certificate includes the first assets identity information, the asset data and the assets digital signature;
Signing messages searching module 420, for utilizing the corresponding default public key of the default private key to the assets number Signature is verified, if being verified, obtains the asset data in the assets digital certificate;
Cryptographic Hash generation module, for generating the assets number in the assets digital certificate according to the default hash algorithm According to corresponding second assets cryptographic Hash;
Cryptographic Hash comparison module, for the first assets cryptographic Hash to be compared with the second assets cryptographic Hash.
Optionally, the asset data includes multiple assets attribute and according to the corresponding attribute of each Asset Attributes It is worth the attribute cryptographic Hash generated.
Optionally, the identity information of the user is encrypted identity information.
Please refer to Fig. 7, Fig. 7 provides a kind of structural frames of the second node 500 in block chain network for the embodiment of the present application Figure, the second node 500 include:
Data acquisition module 510, for obtaining the asset data of the assets to be verified of user and the identity of the user Information;
Identity information generation module 520, for generating the second assets of the assets to be verified according to the asset data Identity information;
Information sharing module 530, for passing through the identity information of the second assets identity information and the user The block chain network shares to the first node 400, so that the first node 400 obtains the money to be verified of the user The identity information of the first assets identity information and the user that produce, the identity information lookup further according to the user are deposited in advance The second assets identity information of the user of storage, and believed according to the first assets identity information and the second assets identity The comparison result of breath, determines whether the assets to be verified of the user are verified.
Optionally, the second node 500 further include:
Data signature module, for being signed using default private key to the asset data, acquisition assets digital certificate, And the assets digital certificate is sent to the user, the assets digital certificate include the first assets identity information, The asset data and assets digital signature.
Optionally, the identity information generation module 520, for being generated according to default hash algorithm to the asset data The first assets cryptographic Hash, the first assets cryptographic Hash be the second assets identity information.
It should be understood that first node 400 is corresponding with above-mentioned Fig. 3 embodiment of the method, it is able to carry out what Fig. 3 embodiment of the method was related to Each step, second node 500 is corresponding with above-mentioned Fig. 4 embodiment of the method, is able to carry out each step that Fig. 4 embodiment of the method is related to Suddenly, modules can be by hardware realization in above-mentioned Fig. 6 and Fig. 7, can also be by software realization, and the embodiment of the present application is not It is limited to this.The first node 400 and the specific function of second node 500 may refer to it is described above, to avoid repeating, this Place is appropriate to omit detailed description.
Fig. 8 is please referred to, Fig. 8 is a kind of structural block diagram of block chain network system 600 provided by the embodiments of the present application, described Block chain network system 600 includes first node 400 and second node 500;
The second node 500, for obtaining the asset data of the assets to be verified of user and the identity of the user Information;
The second node 500, for generating the second assets identity of the assets to be verified according to the asset data Information;
The second node 500, for passing through the identity information of the second assets identity information and the user The block chain network shares to the first node 400;
The first node 400, for receiving the second assets identity information and user that the second node 500 is sent Identity information and storage;
The first node 400, for obtaining the first assets identity information and the institute of the assets to be verified of the user State the identity information of user;
The first node 400, for searching the of the pre-stored user according to the identity information of the user Two assets identity informations;
The first node 400, for according to the first assets identity information and the second assets identity information Comparison result, determines whether the assets to be verified of the user are verified.
The specific embodiment of the system is also referred to the specific implementation process of above method embodiment, for description Succinctly, no longer excessive description herein.
The embodiment of the present application provides a kind of readable storage medium storing program for executing, when the computer program is executed by processor, executes such as Method process performed by block chain node in embodiment of the method shown in Fig. 3 or Fig. 4.
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description Specific work process, no longer can excessively be repeated herein with reference to the corresponding process in preceding method.
In conclusion the embodiment of the present application provides a kind of assets verification method based on block chain and block chain network system It unites, in this method, user only need to provide assets to be verified to the first node in block chain node when carrying out assets verifying First assets identity information and the identity information of user, then first node finds second node and is generated according to asset data The second assets identity information determine and use further according to the comparison result of the first assets identity information and the second assets identity information Whether the assets to be verified at family are verified, by the characteristic that can not distort of block chain technology, user when carrying out assets verifying, The identity information of assets only need to be provided, without providing specific assets information, user can not have to reveal oneself as a result, The verifying of assets can be completed in privacy information, and then ensure that the information security of user.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing Show the device of multiple embodiments according to the application, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the application can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.It should also be noted that similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and explained.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain Lid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.

Claims (10)

1. a kind of assets verification method based on block chain, which is characterized in that applied to the block chain node in block chain network, The block chain node includes first node and second node, which comprises
The first node obtains the first assets identity information of the assets to be verified of user and the identity information of the user;
The first node is believed according to the second assets identity that the identity information of the user searches the pre-stored user Breath, the second assets identity information are that the second node is generated according to the asset data of the assets to be verified of the user 's;
The first node is determined according to the comparison result of the first assets identity information and the second assets identity information Whether the assets to be verified of the user are verified.
2. the method according to claim 1, wherein the first node is according to the first assets identity information With the comparison result of the second assets identity information, determine whether the assets to be verified of the user are verified, comprising:
If the comparison result is that the first assets identity information is consistent with the second assets identity information, described first Node determines that the assets to be verified of the user are verified;
If the comparison result is that the first assets identity information and the second assets identity information are inconsistent, described the One node determines that the assets to be verified verifying of the user does not pass through.
3. the method according to claim 1, wherein the first node obtains the of the assets to be verified of user Before one assets identity information and the identity information of the user, the method also includes:
The first node receives the second assets identity information that the second node is shared by the block chain network And it stores.
4. according to the method described in claim 3, it is characterized in that, the second assets identity information is the second node root The first assets cryptographic Hash that the asset data is generated according to default hash algorithm.
5. according to the method described in claim 4, it is characterized in that, the first node obtains the of the assets to be verified of user Before one assets identity information and the identity information of the user, the method also includes:
The first node obtains the assets digital signature in the assets digital certificate of the user, and the assets digital certificate is What the second node was obtained after being signed using default private key to the asset data, the assets digital certificate includes institute State the first assets identity information, the asset data and the assets digital signature;
The first node verifies the assets digital signature using the corresponding default public key of the default private key, if testing Card passes through, then obtains the asset data in the assets digital certificate;
The first node generates the asset data in the assets digital certificate corresponding according to the default hash algorithm Two assets cryptographic Hash;
The first assets cryptographic Hash is compared the first node with the second assets cryptographic Hash, if comparing unanimously, Then follow the steps: the first node obtains the first assets identity information of the assets to be verified of user and the body of the user Part information.
6. according to any method of claim 2-5, which is characterized in that the asset data include multiple assets attribute with And the attribute cryptographic Hash according to the corresponding attribute value generation of each Asset Attributes.
7. the method according to claim 1, wherein the identity information of the user is encrypted identity letter Breath.
8. a kind of assets verification method based on block chain, which is characterized in that applied to the block chain node in block chain network, The block chain node includes first node and second node, which comprises
The second node obtains the asset data of the assets to be verified of user and the identity information of the user;
The second node generates the second assets identity information of the assets to be verified according to the asset data;
The second assets identity information and the identity information of the user are passed through the block link network by the second node Network shares to the first node, so that the first node obtains the first assets identity letter of the assets to be verified of the user Breath and the identity information of the user, search the second of the pre-stored user further according to the identity information of the user Assets identity information, and according to the comparison result of the first assets identity information and the second assets identity information, it determines Whether the assets to be verified of the user are verified.
9. a kind of assets verification method based on block chain, which is characterized in that applied to the block chain node in block chain network, The block chain node includes first node and second node, which comprises
The second node obtains the asset data of the assets to be verified of user and the identity information of the user;
The second node generates the second assets identity information of the assets to be verified according to the asset data;
The second assets identity information and the identity information of the user are passed through the block link network by the second node Network shares to the first node;
The first node receives the identity information of the second assets identity information that the second node is sent and user and deposits Storage;
The first node obtains the first assets identity information of the assets to be verified of the user and the identity of the user Information;
The first node is believed according to the second assets identity that the identity information of the user searches the pre-stored user Breath;
The first node is determined according to the comparison result of the first assets identity information and the second assets identity information Whether the assets to be verified of the user are verified.
10. a kind of block chain network system, which is characterized in that including first node and second node;
The second node, for obtaining the asset data of the assets to be verified of user and the identity information of the user;
The second node, for generating the second assets identity information of the assets to be verified according to the asset data;
The second node, for the identity information of the second assets identity information and the user to be passed through the block Chain network shares to the first node;
The first node, for receiving the identity information of the second assets identity information and user that the second node is sent And it stores;
The first node, for obtain the assets to be verified of the user the first assets identity information and the user Identity information;
The first node, for searching the second assets body of the pre-stored user according to the identity information of the user Part information;
The first node, for the comparison knot according to the first assets identity information and the second assets identity information Fruit, determines whether the assets to be verified of the user are verified.
CN201910235229.6A 2019-03-26 2019-03-26 Asset verification method based on block chain and block chain network system Active CN110096903B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910235229.6A CN110096903B (en) 2019-03-26 2019-03-26 Asset verification method based on block chain and block chain network system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910235229.6A CN110096903B (en) 2019-03-26 2019-03-26 Asset verification method based on block chain and block chain network system

Publications (2)

Publication Number Publication Date
CN110096903A true CN110096903A (en) 2019-08-06
CN110096903B CN110096903B (en) 2021-04-30

Family

ID=67444046

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910235229.6A Active CN110096903B (en) 2019-03-26 2019-03-26 Asset verification method based on block chain and block chain network system

Country Status (1)

Country Link
CN (1) CN110096903B (en)

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555625A (en) * 2019-08-16 2019-12-10 腾讯科技(深圳)有限公司 information processing method and device, computer equipment and storage medium
CN110599172A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Asset information processing method and device based on block chain, equipment and storage medium
CN110751481A (en) * 2019-09-28 2020-02-04 北京瑞卓喜投科技发展有限公司 Digital asset right confirming method and device
CN110782252A (en) * 2019-10-24 2020-02-11 福建福链科技有限公司 Monitoring video data transaction method and system based on block chain
CN111464536A (en) * 2020-03-31 2020-07-28 中国联合网络通信集团有限公司 Block chain cross-chain method and device
CN113011962A (en) * 2021-02-24 2021-06-22 浙江网商银行股份有限公司 Resource allocation method and device
CN113806788A (en) * 2020-06-11 2021-12-17 中国标准化研究院 Data asset management device and method

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103391196A (en) * 2013-07-04 2013-11-13 黄铁军 Asset digital authentication method and device
CN105574435A (en) * 2015-12-22 2016-05-11 杭州安存网络科技有限公司 On-line electronic contract signing and verifying methods, device and system
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets
US20170046651A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
CN107493273A (en) * 2017-08-02 2017-12-19 深圳市易成自动驾驶技术有限公司 Identity identifying method, system and computer-readable recording medium
CN107704773A (en) * 2017-11-06 2018-02-16 东信和平科技股份有限公司 A kind of method and system of estate management real name registration
CN107742212A (en) * 2017-10-13 2018-02-27 深圳怡化电脑股份有限公司 Assets verification method, apparatus and system based on block chain
WO2018128539A1 (en) * 2017-01-08 2018-07-12 Bernard Rene F A method for checking and/or updating information relating to assets
CN108764908A (en) * 2018-06-01 2018-11-06 杭州复杂美科技有限公司 A kind of assets method for anti-counterfeit and system, equipment and storage medium
CN108959457A (en) * 2018-06-15 2018-12-07 北京文创园投资管理有限公司 A kind of inquiry of certificate, verification method and system
CN108985100A (en) * 2018-08-15 2018-12-11 百度在线网络技术(北京)有限公司 Element Security Proof method, apparatus, equipment and medium based on block chain
CN109325852A (en) * 2018-10-25 2019-02-12 平安科技(深圳)有限公司 Loan data processing method, device, equipment and storage medium based on block chain

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103391196A (en) * 2013-07-04 2013-11-13 黄铁军 Asset digital authentication method and device
US20170046651A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Systems and method for tracking enterprise events using hybrid public-private blockchain ledgers
US20170046664A1 (en) * 2015-08-13 2017-02-16 The Toronto-Dominion Bank Systems and methods for tracking and transferring ownership of connected devices using blockchain ledgers
CN105574435A (en) * 2015-12-22 2016-05-11 杭州安存网络科技有限公司 On-line electronic contract signing and verifying methods, device and system
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets
WO2018128539A1 (en) * 2017-01-08 2018-07-12 Bernard Rene F A method for checking and/or updating information relating to assets
CN107493273A (en) * 2017-08-02 2017-12-19 深圳市易成自动驾驶技术有限公司 Identity identifying method, system and computer-readable recording medium
CN107742212A (en) * 2017-10-13 2018-02-27 深圳怡化电脑股份有限公司 Assets verification method, apparatus and system based on block chain
CN107704773A (en) * 2017-11-06 2018-02-16 东信和平科技股份有限公司 A kind of method and system of estate management real name registration
CN108764908A (en) * 2018-06-01 2018-11-06 杭州复杂美科技有限公司 A kind of assets method for anti-counterfeit and system, equipment and storage medium
CN108959457A (en) * 2018-06-15 2018-12-07 北京文创园投资管理有限公司 A kind of inquiry of certificate, verification method and system
CN108985100A (en) * 2018-08-15 2018-12-11 百度在线网络技术(北京)有限公司 Element Security Proof method, apparatus, equipment and medium based on block chain
CN109325852A (en) * 2018-10-25 2019-02-12 平安科技(深圳)有限公司 Loan data processing method, device, equipment and storage medium based on block chain

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
JUAN PORTILLO 等: "Building trust in 3PIP using asset-based security property verification", 《 2016 IEEE 34TH VLSI TEST SYMPOSIUM (VTS)》 *
张婷: "基于区块链技术的数字资产确权交易模型研究", 《福建工程学院学报》 *
徐毅: "基于物联网的隐私保护与信息安全增强模型的框架分析", 《现代信息科技》 *

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555625A (en) * 2019-08-16 2019-12-10 腾讯科技(深圳)有限公司 information processing method and device, computer equipment and storage medium
CN110555625B (en) * 2019-08-16 2024-04-26 腾讯科技(深圳)有限公司 Information processing method, device, computer equipment and storage medium
CN110599172A (en) * 2019-09-19 2019-12-20 腾讯科技(深圳)有限公司 Asset information processing method and device based on block chain, equipment and storage medium
CN110751481A (en) * 2019-09-28 2020-02-04 北京瑞卓喜投科技发展有限公司 Digital asset right confirming method and device
CN110782252A (en) * 2019-10-24 2020-02-11 福建福链科技有限公司 Monitoring video data transaction method and system based on block chain
CN110782252B (en) * 2019-10-24 2022-09-16 福建福链科技有限公司 Monitoring video data transaction method and system based on block chain
CN111464536A (en) * 2020-03-31 2020-07-28 中国联合网络通信集团有限公司 Block chain cross-chain method and device
CN113806788A (en) * 2020-06-11 2021-12-17 中国标准化研究院 Data asset management device and method
CN113011962A (en) * 2021-02-24 2021-06-22 浙江网商银行股份有限公司 Resource allocation method and device
CN113011962B (en) * 2021-02-24 2024-01-05 浙江网商银行股份有限公司 Resource allocation method and device

Also Published As

Publication number Publication date
CN110096903B (en) 2021-04-30

Similar Documents

Publication Publication Date Title
CN110096903A (en) Assets verification method and block chain network system based on block chain
Liu et al. A blockchain-based framework of cross-border e-commerce supply chain
JP6995762B2 (en) Cryptographic methods and systems for the secure extraction of data from the blockchain
CN110535662B (en) Method and system for realizing user operation record based on block chain data certificate storage service
TWI727292B (en) Block chain transaction method and device, and electronic equipment
KR101987692B1 (en) Registry and Automation Management Methods for Smart Contracts in Blockchain Enforcement
CN109086585A (en) History data processing method, system and computer readable storage medium
JP2020035436A (en) Traceability system for pet food
CN106600403A (en) Asset management method, device and system
CN109829326A (en) Cross-domain certification and fair audit duplicate removal cloud storage system based on block chain
KR20200106000A (en) System and method for implementing blockchain-based digital certificate
CN112231284A (en) Block chain-based big data sharing system, method, device and storage medium
CN112801778B (en) Alliance type bad asset block chain system
CN111259439B (en) Intangible asset management service platform based on block chain and implementation method thereof
CN115208628B (en) Data integrity verification method based on block chain
CN113469716A (en) Product tracing method and system based on block chain and identification analysis
US11769146B1 (en) Blockchain transactional identity verification
WO2021169767A1 (en) Data processing method and apparatus, device and medium
CN109447809A (en) A kind of video active identification method of combination block chain
Karamachoski et al. Blockchain-based application for certification management
Kim et al. Role‐based Access Control Video Surveillance Mechanism Modeling in Smart Contract Environment
US20220078006A1 (en) Verifiable object state data tracking
CN110351292A (en) Private key management method, device, equipment and storage medium
Le et al. TrustedChain: A blockchain-based data sharing scheme for supply chain
Eltuhami et al. Identity verification and document traceability in digital identity systems using non-transferable non-fungible tokens

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant