CN114612109A - Block chain-based digital collection generation method and system and electronic equipment - Google Patents

Block chain-based digital collection generation method and system and electronic equipment Download PDF

Info

Publication number
CN114612109A
CN114612109A CN202210500334.XA CN202210500334A CN114612109A CN 114612109 A CN114612109 A CN 114612109A CN 202210500334 A CN202210500334 A CN 202210500334A CN 114612109 A CN114612109 A CN 114612109A
Authority
CN
China
Prior art keywords
side chain
data
digital collection
interaction
original
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210500334.XA
Other languages
Chinese (zh)
Other versions
CN114612109B (en
Inventor
蔡天琪
蔡恒进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Longjin Science And Technology Inc
Wuhan University WHU
Original Assignee
Wuhan Longjin Science And Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Longjin Science And Technology Inc filed Critical Wuhan Longjin Science And Technology Inc
Priority to CN202210500334.XA priority Critical patent/CN114612109B/en
Publication of CN114612109A publication Critical patent/CN114612109A/en
Application granted granted Critical
Publication of CN114612109B publication Critical patent/CN114612109B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions

Abstract

The application discloses a block chain-based digital collection generation method, a block chain-based digital collection generation system and electronic equipment. It is known from the idea of web3.0 and the characteristics of the block chain that once the data on the block chain is sealed, the data on the chain is ensured and protected and cannot be tampered with, and each digital collection is based on the contribution degree of the side chain to the data in the past, so that each digital collection has uniqueness, the value of the digital collection is ensured at the time of generation, a third party is not required to participate, and the tamperproof property of the block chain enables the digital collection to have value trust degree.

Description

Block chain-based digital collection generation method and system and electronic equipment
Technical Field
The present application relates to the field of blockchain technologies, and in particular, to a method, a system, and an electronic device for generating digital collections based on blockchains.
Background
The trade of the Tibetan usually needs to be authenticated by an official or third party institution to generate value trust, and the trade mode needs to be centered by the official or third party institution and is not beneficial to the market circulation of the Tibetan.
Disclosure of Invention
In view of the above, the present application provides a method, a system, a storage medium and an electronic device for generating digital collections based on block chains, which can determine the trust level of the value of the collection when the collection is generated.
In a first aspect, an embodiment of the present application provides a method for generating a digital collection based on a blockchain, where the method includes the following steps:
and when the first event is detected, the interaction data of the first side chain and the second side chain are sealed and stored to generate the digital collection.
In a second aspect, an embodiment of the present application further provides a block chain-based digital collection generation system, where the system includes:
and the digital collection generation module is used for sealing and storing the interaction data of the first side chain and the second side chain when a first event is detected to generate a digital collection.
In a third aspect, an embodiment of the present application further provides a computer device, which includes a memory and a processor, where the memory stores a computer program, and the processor implements the steps of the method in the foregoing method when executing the computer program.
In a fourth aspect, the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the steps of the above method.
According to the digital collection generation method, the system and the electronic equipment based on the block chain, when a first event occurs, interactive data between a first side chain and a second side chain before the first event occurs are sealed and stored to generate the digital collection, the idea of web3.0 and the characteristics of the block chain can be known, once the data on the block chain is sealed and stored, the data on the chain is ensured and protected, and cannot be tampered.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flowchart of a method for generating a digital collection based on a blockchain according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a digital collection generation system based on a blockchain according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In Web3.0, each user can form its own data link, and digital content created by the user, whose ownership is definitely owned by the user, is controlled by the user, and the value created by the user is distributed according to the agreement the user has signed with others. Under this architecture, the digital content is no longer simply data, but rather digital assets, because its rights are guaranteed at the asset level. This is similar to the market among digital economies, identifying, respecting, and protecting personal digital property rights, with value exchange based on contracts.
The blockchain technology, also called as distributed ledger technology, is actually a decentralized computing protocol, and provides agreement on how different benefit agents create and maintain a distributed computing infrastructure in a decentralized manner, so as to realize separation between the "infrastructure management right" and the "user data control right", and prevent a single platform from realizing control over user data, user assets and user identities through the computing infrastructure management right.
The blockchain is also a transparent and credible right confirmation and tracing system, once one right is digitalized into a certificate on the blockchain, the right can be reliably confirmed, and the whole process of circulation, transaction, conversion and deformation can be tracked in the whole process. The blockchain is also a protocol creation and automation platform. Smart contracts are a centralized embodiment of this capability. Through the intelligent contract, the right and value distribution protocol can be efficiently, accurately and credibly executed without a credible third party, and the whole process can be audited. Blockchains are therefore an essential infrastructure for Web 3.0. However, the blockchain is only a means for realizing the confirmation and protection of the rights and interests of the digital assets of the user.
On the blockchain, only the certificate can be confirmed and managed, general data still cannot enjoy equal treatment, and a user needs to verify and protect the digital rights of the user if the user wants to confirm and protect the digital rights of the user.
The vast majority of the notations on the Web3.0 are NFTs (Non-homogeneous Tokens) that originated from EIP-721 (etherium implantation pro 721) introduced at the end of 2017, which contains identifying information recorded in their smart contracts that gives each token its uniqueness, irreplaceability and indivisible nature. Since the digital collections are also unique, irreplaceable and inseparable, the digital collections represent NFTs without specific reference to this application.
Example 1
Based on the core idea of web3.0, the application provides a block chain-based digital collection generation method, and referring to fig. 1, the method comprises the following steps:
and S100, when a first event is detected, sealing the interaction data of the first side chain and the second side chain to generate a digital collection.
In the method for generating digital collections based on block chains in this embodiment, when a first event occurs, the interactive data between the first side chain and the second side chain before the first event occurs is sealed, and digital collections are generated, and as can be seen from the idea of web3.0 and the characteristics of the block chains, once the data on the block chains are sealed, the data on the chains are ensured and protected and cannot be tampered.
The first event in this embodiment refers to an event that has a significant change, such as: sudden increase in demand for a certain product, sudden fire heat in a certain place of interest, sudden intense fire (such as an ice pier) at a certain IP focus, etc.
In one specific embodiment, the first event is that the number of attended persons of the attended person corresponding to the first side chain suddenly increases.
When the attention people of the attention receiver have a sharp increase phenomenon, the influence of the attention receiver is larger and larger than before, the value of the content related to the attention receiver is increased (similar to the increase of the content related to the attention receiver after the star is named), the value of the interactive data of the attention receiver is increased along with the increase of the value of the interactive data of the attention receiver in the embodiment, the interactive data between the attention receiver and the attention receiver is sealed and stored before the sharp increase phenomenon occurs by utilizing the characteristic, the interactive data is converted into a digital collection, and after the sharp increase phenomenon occurs, the data collection is increased in value, so that the benefit of substantial benefits is brought to the attention receiver of the attention receiver. Wherein, the concerned persons are stars, idols, trade names, a certain interest point and the like.
It should be noted that the number of the attendees is at least 1, and each attendee may form its own data side chain to record the interaction data between itself and the attendee. In one embodiment, when the interactive data of the first side chain and the second side chain are sealed, whether the concerned person has the own data side chain is judged, if yes, the interactive data of the first side chain and the second side chain are sealed, if not, the data side chain of the concerned person is created for the concerned person, and the interactive data is recorded on the data side chain.
For example: the concerned person is a 'idol', when the 'idol' is changed from 'small V' to 'large V', the influence of the 'idol' is gradually increased, most of the benefits given to the vermicelli by the 'idol' at present are oral encouragement, signature, coincidence and the like, and cannot bring benefits on substantial benefits of loyalty powder, and the method in the embodiment can bring benefits of substantial benefits to supporters before the 'idol' is named (usually most of the concerns about the 'idol' are loyalty powder before the 'idol' is named), and the values of digital collections converted by different supporters are different, so that the purpose of distributing digital collections with different values according to the loyalty powder contribution degrees (the higher the value obtained when the contribution degree is high) is realized.
In one embodiment, the method further comprises the step of detecting whether the number of people concerned by the person concerned is increased sharply. The method specifically comprises the following steps: A1. the number of the first attention people at the first time point is obtained, and the number of the second attention people at the second time point is obtained. A2. And calculating the attention quantity difference value obtained by subtracting the first attention quantity from the second attention quantity. A3. Judging whether the difference value of the concerned quantity is larger than a preset threshold value or not; if yes, determining that a surge phenomenon occurs, and sending data sealing prompt information to the attendee or the attendee; and if not, determining that the surge phenomenon does not occur, and returning to the step of acquiring the first number of people concerned at the first time point and acquiring the second number of people concerned at the second time point. The second time point is a time point later than the first time point.
There are various methods for detecting whether the number of people concerned by the person concerned is increased sharply, for example, detecting whether network data (such as interaction frequency, number of comments, website browsing amount, click amount, etc.) in a certain period of time is increased sharply, thereby determining whether the number of people concerned is increased sharply. In one of the easily-realized modes, the attention number difference of attention people in a certain period of time is directly obtained, whether the attention number difference meets a preset threshold value or not is judged, if yes, a surge phenomenon is determined to occur, prompt information for establishing interactive correlation is sent to the attention people or the attention people in time, and if not, the surge phenomenon is determined not to occur. The method does not need complex logic operation, does not need deep analysis on the detection indexes (for example, when the interaction frequency, the comment quantity, the click quantity and the website browsing quantity are analyzed, whether the data is triggered by a single user or by multiple users needs to be determined), is simple to implement and is accurate in judgment.
It should be noted that the first time point and the second time point in this embodiment are not a single constant time point, but are time points that dynamically change with time. Such as: if the first day 0 point is taken as a first time point, the second day 0 point is taken as a second time point, and if the second attention number minus the first attention number does not reach the preset threshold value, the second day 0 point is taken as the first time point, and the third day 0 point is taken as the second time point to continue the detection until the sharp increase phenomenon is detected, so that the detection of the sharp increase phenomenon can be realized.
Since the number of people of interest is increased rapidly after a certain pop-up IP and the number of people of interest is increased rapidly in a short period of time (for example, the number of people of interest is increased greatly in a short period of time after a certain pop-up tv drama appears in a small V), the time interval between the second time point and the first time point is preferably 1 day, 1 week, 1 month, or 1 year.
Further, step a1 includes acquiring identification information of the person of interest at a first point in time, taking the number of the identification information as a first number of persons of interest, acquiring identification information of the person of interest at a second point in time, and taking the number of the identification information as the first number of persons of interest. The identification information represents the unique identity information of the attention people, so that the number of the attention people can be uniquely determined according to the number of the identification information.
In one embodiment, the step of generating the digital collection comprises:
B1. and acquiring single interaction data of the attendees corresponding to each second side chain from the first side chain, and generating the digital collection according to the single interaction data.
In this embodiment, there are a plurality of second side chains, and in order to generate the digital collection corresponding to each second side chain, the value contribution of each second side chain is realized, so it is necessary to obtain single interaction data corresponding to each second side chain, and generate the digital collection of each second side chain from the single interaction data. Of course, the first side chain may also generate a digital collection of all the interaction data for an incremental value of its own value.
When the single interactive data corresponding to each second side chain is obtained, the identification information of each second side chain may be obtained first, the identification information may uniquely represent the identity of the second side chain, and the corresponding single interactive data is obtained from the identification information.
Further, step B1 includes: B11. and extracting pattern information, attribute information and interaction information of the attention person from the single interaction data. B12. And generating a digital collection from the pattern information, the attribute information and the interaction information, and assigning the digital collection to a corresponding second side chain.
The pattern information comprises at least one of head portrait information and photo information of the attendee, the attribute information comprises at least one of identification information, age information, gender information and fan grade information of the attendee, and the interactive information comprises at least one of comment information, joining time information and interactive frequency information of the attendee.
The digital collection is generally formed by adding some attribute features to a picture, and the digital collection is formed by pattern information, attribute information and interactive information, wherein the pattern information is generally used as a substrate, and the attribute information and the interactive information are added to the pattern information to generate the digital collection. The ready-made digital collection is unique and irreplaceable because the pattern information, attribute information, and interaction information are often not likely to be identical. In one embodiment, the attribute information must include identification information representing unique identity information of the interested person, and the digital collection generated therefrom is unique. Meanwhile, the value of the digital collection formed by different pieces of information can be defined in the intelligent contract is different, such as: the higher the activity of the comment information, the more positive and energetic the comment, the higher the interaction frequency, and the higher the value of the vermicelli digital collection generated by the digital content with longer adding time; for another example: the higher the rating the higher the value of the generated digital collection. Wherein, the grade information is determined by the morning and evening of the adding time and/or adding batch, such as: dividing the number of the attendees into a plurality of number intervals according to the accumulated number of the current attendees, wherein the levels in the different number intervals are different; for another example: and determining the adding time point as a measuring index of the grade, taking the attendee added before the first adding time point as a first grade, taking the attendee added after the first adding time point as a second grade, taking the attendee added after the second adding time point as a third grade, and determining the N grades by analogy.
In one embodiment, when the digital collection is generated, different pendants are allocated to the digital collection generated by the attendees in different grades according to the grade information so as to further ensure the uniqueness of the vermicelli digital collection. Such as: assigning golden crown to digital collections generated by first level concerns, silver crown to digital collections generated by second level concerns, and bronze crown to digital collections generated by third level concerns.
In one embodiment, step S100 includes step C1: and carrying out interactive confirmation on the first side chain and the second side chain to form a data sharing network for the digital collection to trade.
In this embodiment, the first side chain and the second side chain perform mutual confirmation while sealing the interactive data, and once the mutual association confirmation is performed, a data sharing network for circulation transaction of the digital collection is formed between the first side chain and the second side chain.
In one embodiment, step C1 includes step C11: and after the first side chain sends an interaction request to the original side chain of the attention person, the original side chain for confirming the interaction request is used as a second side chain to carry out interaction confirmation with the first side chain, so that the data sharing network is formed.
In one embodiment, step C1 includes step C11': and after the original side chain sends an interactive request to the first side chain, the original side chain corresponding to the interactive request confirmed by the first side chain is used as the second side chain to carry out interactive confirmation with the first side chain, and the data sharing network is formed.
The above steps C11 and C11' are two specific implementations of step C1, one is that the first side chain actively sends an interaction request to each original side chain, and the original side chain that confirms the interaction request is used as the second side chain to perform interaction confirmation with the first side chain, so as to form a data sharing network, in the process, the first side chain and the second side chain must agree to each other to form the data sharing network, that is, there may be some original side chains and disagree with the interaction confirmation with the first side chain, so as to ensure equal volunteers of rights of both sides; and the other method is that each original side chain actively sends an interactive request to the first side chain, and the original side chain corresponding to the interactive request confirmed by the first side chain is used as a second side chain to carry out interactive confirmation with the first side chain, so as to form the data sharing network.
It should be noted that, when the interactive confirmation is established between the first side chain and the second side chain, the first embodiment is preferred because when a first event occurs in the first side chain (for example, the number of people concerned in the first side chain changes dramatically), the platform sends a prompt message for establishing the interactive confirmation to the first side chain in time to remind the first side chain whether to establish the interactive confirmation with each original side chain, and the first side chain sends an interactive request to each original side chain, so as to reduce the distribution calculation power of the platform. Of course, when the platform detects that the first event occurs, the platform may send a prompt message suggesting an interactive request to each original side chain to remind whether each original side chain establishes interactive confirmation with the first side chain, and this way requires the platform to record the relevant information of each original side chain, which not only consumes labor, but also consumes storage space.
In one embodiment, before step C11, the method further comprises the following steps of C10: and verifying the authenticity of the interactive data of the original side chain, and sending an interactive request to the original side chain corresponding to the interactive data verified as real by the first side chain.
In this embodiment, the first side chain does not send the interactive request to all the original side chains, but before sending the interactive request, the authenticity of the interactive data on the original side chains is checked, and after the interactive data is checked to be authentic, the interactive request is sent to the corresponding original side chains, so that a speculative skipper who is not a true supporter is effectively avoided.
In one embodiment, step C11 'includes C110': and after the original side chain sends an interaction request to the first side chain, verifying the authenticity of the interaction data of the original side chain, and confirming the interaction request sent by the original side chain corresponding to the interaction data verified as real by the first side chain.
In this embodiment, after the original side chain sends the interaction request to the first side chain, the first side chain does not confirm the interaction requests of all the original side chains, but verifies the authenticity of the interaction data of the original side chain first, and confirms the interaction request sent by the original side chain corresponding to the real interaction data after verifying the authenticity, so that the speculative skimming and skimming can be effectively avoided.
In one embodiment, the method further comprises step C2: the interactive data verification method specifically comprises the following steps:
C21. and obtaining the value verification information corresponding to each original attention person from the first side chain.
C22. Obtaining data to be verified from the original side chain of the original care giver.
C23. And verifying the authenticity of the data to be verified according to the value verification information, and taking the original side chain corresponding to the data to be verified which is verified to be real as the second side chain.
The embodiment is a specific implementation manner of interactive data verification, in the interactive process of a first side chain and a second side chain, information of interactive data is recorded on both the first side chain and the second side chain, if value verification information recorded on the first side chain is consistent with data to be verified recorded on an original side chain, it can be determined that the original side chain does not tamper or fill water into the interactive data, the original side chain can be used as the second side chain to interactively confirm with the first side chain, and if the value verification information recorded on the first side chain is inconsistent with the data to be verified recorded on the original side chain, it is indicated that the original side chain possibly tampers the interactive data, so that the original side chain is not used as the second side chain to interactively confirm with the first side chain, so that participation of opportunistic shooting behavior can be effectively avoided, and reliability and authority of the value of a digital collection are improved. It should be noted that the verification of the interaction data in the foregoing steps C10 and C110' can be implemented in this embodiment.
In one embodiment, after the first event is detected, the method further includes step D1: and sending an uplink request to a main chain, and sealing the main chain on the interactive data after the main chain receives and confirms the uplink request.
Or step D1': and receiving the uplink invitation sent by the main chain, and sealing the main chain on the interactive data after selecting to accept the uplink invitation.
The two embodiments described above are specific implementations of the main chain on the first side chain, and due to the limitation of computing and storage resources, the public platform does not uplink all data, but only uplink the data with large influence and value. Therefore, after the first event is detected, the influence and value of the first side chain often change, at this time, either the main chain actively sends an uplink invitation to the first side chain, or the first side chain actively sends an uplink request to the main chain, and after the other side confirms, the two sides establish interactive confirmation, so as to realize the sealing of the interactive data on the main chain. The main chain is usually a data chain of a public platform, and the public platform comprises third party platforms such as a microblog, a blog, a tremble, a WeChat friend circle and the like, so that the purpose that the digital collection is traded not only in a data sharing network formed by the first side chain and the second side chain, but also in a data disclosure network formed by the first side chain and the main chain is realized, the marketization of the digital collection is expanded, and the circulation of the digital collection is facilitated. Among them, transactions in the data disclosure network include fair, auction, open, and the like.
In one embodiment, the method further comprises step E1: and acquiring a transaction mechanism of the digital collection, and distributing transaction profits to the initial owner of the digital collection when the digital collection is transacted.
The method is characterized in that the digital collection is authenticated, namely the identity of the initial owner of the digital collection is confirmed, so that the digital collection can be traded on a data sharing network and a data disclosure network, and the initial owner can obtain a preset proportion of trading profit from each trading, thereby ensuring the profit of the initial owner
For example: the transaction mechanism for appointing the digital collection in the intelligent contract is as follows: each time a digital collection is resold, the original owner (i.e., the original creator) of the digital collection can enjoy a 10% revenue from the resell price. Therefore, even if the selling price is 1000 yuan in the first resale, after several years, due to the influence and the improvement of the value degree of the first side chain, the resale price is increased to tens of thousands or millions, the initial owner of the digital collection can still obtain 10% of transaction profit from the selling price of tens of thousands or millions, and the profit margin of the initial owner is ensured.
Example 2
In addition, the embodiment of the application also provides a digital collection generation system based on the block chain. Referring to fig. 2, fig. 2 is a schematic structural diagram of a block chain-based digital collection generating system according to an embodiment of the present disclosure, where the control system specifically includes: and the digital collection generating module 100 is configured to, when a first event is detected, seal the interaction data of the first side chain and the second side chain to generate a digital collection.
In the digital collection generation system based on the block chain in this embodiment, when the first event occurs, the interactive data between the first side chain and the second side chain before the first event occurs is sealed, and a digital collection is generated, as can be seen from the idea of web3.0 and the characteristics of the block chain, once the data on the block chain is sealed, the data on the chain is ensured and protected, and cannot be tampered.
In one specific embodiment, the first event is a phenomenon that the number of people concerned by the person concerned corresponding to the first side chain suddenly increases.
In one embodiment, the method further comprises the following steps: and the detection module is used for detecting whether the attention number of the attended person is increased sharply.
Wherein the detection module comprises: and the number obtaining submodule is used for obtaining the first number of the attention people at the first time point and obtaining the second number of the attention people at the second time point. And the calculation submodule is used for calculating the attention number difference value obtained by subtracting the first attention number from the second attention number. The judgment submodule is used for judging whether the difference value of the concerned quantity is larger than a preset threshold value or not; if yes, determining that a surge phenomenon occurs, and sending data sealing prompt information to the attendee or the attendee; and if not, determining that the surge phenomenon does not occur, and returning to the step of acquiring the first number of people concerned at the first time point and acquiring the second number of people concerned at the second time point. Wherein the second time point is a time point later than the first time point.
In one embodiment, the number-table generating module 100 includes: and the digital collection generation submodule is used for acquiring single interaction data of the attendees corresponding to each second side chain from the first side chain and generating the digital collection according to the single interaction data.
In one embodiment, the data-base generation sub-module includes an extraction unit, configured to extract pattern information, attribute information, and interaction information of the attendee from the single interaction data. And the generating and distributing unit is used for generating a digital collection from the pattern information, the attribute information and the interaction information and distributing the data collection to the corresponding second side chain.
In one embodiment, the digital Tibetan generation module 100 further includes an interactive validation sub-module configured to interactively validate the first side chain and the second side chain to form a data sharing network for trading the digital Tibetan.
In one embodiment, the interactive confirmation sub-module includes a first interactive confirmation unit and a second interactive confirmation unit. The first interactive confirmation unit is configured to, after the first side chain sends the interactive request to the original side chain of the attendee, perform interactive confirmation with the first side chain by using the original side chain for confirming the interactive request as a second side chain, and form the data sharing network. And the second interactive confirmation unit is used for performing interactive confirmation with the first side chain by taking the original side chain corresponding to the interactive request confirmed by the first side chain as the second side chain after the original side chain sends the interactive request to the first side chain, so as to form the data sharing network.
In one embodiment, the apparatus further includes a first data verification unit, configured to verify authenticity of the interaction data of the original side chain before the first side chain sends the interaction request to the original side chain, where the first side chain sends the interaction request to the original side chain corresponding to the interaction data verified as authentic.
In one embodiment, the system further includes a second data verification unit, configured to verify authenticity of the interaction data of the original side chain after the original side chain sends the interaction request to the first side chain, and the first side chain confirms the interaction request sent by the original side chain corresponding to the interaction data verified as authentic.
In one embodiment, the system includes a data verification module for verifying the interaction data. The data verification module includes: and the verification information acquisition submodule is used for acquiring the value verification information corresponding to each original attention person from the first side chain. And the data to be verified acquisition submodule is used for acquiring data to be verified from the original side chain of the original concerned person. And the authenticity verification sub-module is used for verifying the authenticity of the data to be verified according to the value verification information and taking the original side chain corresponding to the data to be verified which is verified to be real as the second side chain.
In one embodiment, the mobile terminal further comprises a first uplink module and a second uplink module. The first uplink module is configured to send an uplink request to a main chain, and seal the main chain on the interactive data after the main chain receives and confirms the uplink request. And the second uplink module is used for receiving the uplink invitation sent by the main chain and sealing the main chain on the interactive data after the uplink invitation is selected to be accepted.
In one embodiment, the system further comprises a profit sharing module for acquiring a trading mechanism of the digital collections, and sharing trading profits to initial owners of the digital collections when the digital collections are traded.
Example 3
The present embodiment provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program performs each process of the embodiment of the block chain-based digital collection generation method described in embodiment 1, and can achieve the same technical effect. For specific implementation, refer to method embodiment 1, which is not described herein again.
Example 4
In addition, referring to the schematic structural diagram of an electronic device shown in fig. 3, the present embodiment further provides an electronic device, where the electronic device includes a bus 51, a processor 52, a transceiver 53, a bus interface 54, a memory 55, and a user interface 56. The electronic device comprises a memory 55.
In this embodiment, the electronic device further includes: one or more programs stored on the memory 55 and executable on the processor 52 are configured to be executed by the processor for performing the following steps, and to achieve the same technical effect:
and when the first event is detected, the interaction data of the first side chain and the second side chain are sealed and stored to generate the digital collection.
A transceiver 53 for receiving and transmitting data under the control of the processor 52.
Where a bus architecture (represented by bus 51) is used, bus 51 may include any number of interconnected buses and bridges, with bus 51 linking together various circuits including one or more processors, represented by processor 52, and memory, represented by memory 55. The bus 51 may also link various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further in this embodiment. A bus interface 54 provides an interface between the bus 51 and the transceiver 53. The transceiver 53 may be one element or may be multiple elements, such as multiple receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. For example: the transceiver 53 receives external data from other devices. The transceiver 53 is used for transmitting data processed by the processor 52 to other devices. Depending on the nature of the computing system, a user interface 56, such as a keypad, display, speaker, microphone, joystick, may also be provided.
The processor 52 is responsible for managing the bus 51 and the usual processing, running a general-purpose operating system as described above. And memory 55 may be used to store data used by processor 52 in performing operations.
Alternatively, processor 52 may be, but is not limited to: a central processing unit, a singlechip, a microprocessor or a programmable logic device.
It will be appreciated that the memory 55 in embodiments of the invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic random access memory (ddr Data Rate SDRAM, ddr SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The memory 55 of the systems and methods described in this embodiment is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 55 stores elements, executable modules or data structures, or a subset thereof, or an expanded set thereof as follows: an operating system 551 and application programs 552.
The operating system 551 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, for implementing various basic services and processing hardware-based tasks. The application 552 includes various applications, such as a Media Player (Media Player), a Browser (Browser), and the like, for implementing various application services. A program implementing the method of an embodiment of the present invention may be included in the application 552.
It should be noted that, in the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (15)

1. A block chain-based digital collection generation method is characterized by comprising the following steps:
and when the first event is detected, the interaction data of the first side chain and the second side chain are sealed and stored to generate the digital collection.
2. The method of claim 1, wherein the first event is a sharp increase in the number of people watched by the watched person corresponding to the first side chain.
3. The method as claimed in claim 2, further comprising the step of detecting whether there is a sharp increase in the number of people concerned by the person concerned, specifically:
acquiring a first number of people paying attention at a first time point and a second number of people paying attention at a second time point;
calculating the attention quantity difference value obtained by subtracting the first attention number quantity from the second attention number quantity;
judging whether the difference value of the concerned quantity is larger than a preset threshold value or not; if yes, determining that a surge phenomenon occurs, and sending data sealing prompt information to the attendee or the attendee; if not, determining that no surge phenomenon occurs, and returning to the step of acquiring the first number of people concerned at the first time point and acquiring the second number of people concerned at the second time point;
wherein the second time point is a time point later than the first time point.
4. The method of claim 1, wherein the step of generating a digital collection comprises:
and acquiring single interaction data of the attendees corresponding to each second side chain from the first side chain, and generating the digital collection according to the single interaction data.
5. The method of claim 3 wherein said step of obtaining from said first side chain a single interaction datum for each of said second side chains for a corresponding attendee, and generating said digital collection from said single interaction datum, comprises:
extracting pattern information, attribute information and interaction information of the attention person from the single interaction data;
and generating a digital collection from the pattern information, the attribute information and the interaction information, and assigning the data collection to the corresponding second side chain.
6. The method of claim 1, wherein the step of sealing interaction data of the first sidechain and the second sidechain comprises:
and carrying out interactive confirmation on the first side chain and the second side chain to form a data sharing network for the digital collection to trade.
7. The method of claim 6 wherein the step of interactively validating the first sidechain and the second sidechain to form a data sharing network for the digital collection to be traded comprises:
after the first side chain sends an interaction request to an original side chain of a concern person, the original side chain which confirms the interaction request is used as a second side chain to carry out interaction confirmation with the first side chain, and the data sharing network is formed;
or
And after the original side chain sends an interaction request to the first side chain, taking the original side chain corresponding to the interaction request confirmed by the first side chain as the second side chain to carry out interaction confirmation with the first side chain, so as to form the data sharing network.
8. The method of claim 7, prior to the first sidechain sending an interactive request to the original sidechain, further comprising:
and verifying the authenticity of the interactive data of the original side chain, and sending an interactive request to the original side chain corresponding to the interactive data verified as real by the first side chain.
9. The method of claim 7, wherein after the original side chain sends the interaction request to the first side chain, further comprising:
and verifying the authenticity of the interactive data of the original side chain, wherein the first side chain confirms the interactive request sent by the original side chain corresponding to the interactive data verified as real.
10. The method of claim 1, further comprising the step of interactive data verification, specifically:
obtaining value verification information corresponding to each original person of interest from the first side chain;
obtaining data to be verified from the original side chain of the original concerned person;
and verifying the authenticity of the data to be verified according to the value verification information, and taking the original side chain corresponding to the data to be verified which is verified to be real as the second side chain.
11. The method of any of claims 1-10, after detecting the first event, comprising:
sending an uplink request to a main chain, and sealing the main chain on the interactive data after the main chain receives and confirms the uplink request;
or
And receiving the uplink invitation sent by the main chain, and sealing the main chain on the interactive data after selecting to accept the uplink invitation.
12. The method of any one of claims 1-10, further comprising:
and acquiring a transaction mechanism of the digital collection, and distributing transaction profits to the initial owner of the digital collection when the digital collection is transacted.
13. A blockchain-based digital collection generation system, the system comprising:
and the digital collection generation module is used for sealing and storing the interaction data of the first side chain and the second side chain when a first event is detected to generate a digital collection.
14. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, is adapted to carry out the steps of the method of any one of the preceding claims 1 to 12.
15. An electronic device, comprising: memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the computer program is configured to perform the steps of the method of any of claims 1-12 by the processor.
CN202210500334.XA 2022-05-10 2022-05-10 Block chain-based digital collection generation method and system and electronic equipment Active CN114612109B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210500334.XA CN114612109B (en) 2022-05-10 2022-05-10 Block chain-based digital collection generation method and system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210500334.XA CN114612109B (en) 2022-05-10 2022-05-10 Block chain-based digital collection generation method and system and electronic equipment

Publications (2)

Publication Number Publication Date
CN114612109A true CN114612109A (en) 2022-06-10
CN114612109B CN114612109B (en) 2022-08-19

Family

ID=81868764

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210500334.XA Active CN114612109B (en) 2022-05-10 2022-05-10 Block chain-based digital collection generation method and system and electronic equipment

Country Status (1)

Country Link
CN (1) CN114612109B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115099810A (en) * 2022-06-14 2022-09-23 蚂蚁区块链科技(上海)有限公司 Brand promotion method based on block chain and block chain link point
CN115296821A (en) * 2022-08-26 2022-11-04 中航信移动科技有限公司 Data processing system for digital collection management

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106980692A (en) * 2016-05-30 2017-07-25 国家计算机网络与信息安全管理中心 A kind of influence power computational methods based on microblogging particular event
CN107292390A (en) * 2017-05-24 2017-10-24 重庆邮电大学 A kind of Information Propagation Model and its transmission method based on chaology
CN110990486A (en) * 2019-11-29 2020-04-10 北京有名知行科技有限公司 Block link evidence issuing and storing method and device based on network data interaction
US20210279305A1 (en) * 2017-02-13 2021-09-09 Tunego, Inc. Tokenized media content management
CN113407640A (en) * 2021-07-21 2021-09-17 杭州链网科技有限公司 Multi-chain NFT (network File transfer) based chain crossing method and system
US20210304196A1 (en) * 2020-03-25 2021-09-30 SneakrCred Inc. System and method for digital fashion asset management through blockchain
CN114096977A (en) * 2018-11-02 2022-02-25 维罗纳控股经济特区公司 Tokenization platform
CN114154076A (en) * 2020-11-16 2022-03-08 中国人民解放军战略支援部队信息工程大学 Social user influence measuring method based on multi-angle analysis
CN114155095A (en) * 2021-09-24 2022-03-08 北京天德科技有限公司 Digital artwork authentication and transaction system and authentication and transaction method
US20220076221A1 (en) * 2020-09-09 2022-03-10 Fanticipate, Inc. Event participation and memorabilia
CN114331634A (en) * 2021-12-31 2022-04-12 北京绵白糖智能科技有限公司 Method and device for transferring gifts of digital articles, computer equipment and storage medium
CN114398553A (en) * 2022-01-14 2022-04-26 北京京东方技术开发有限公司 Object recommendation method and device, electronic equipment and storage medium

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106980692A (en) * 2016-05-30 2017-07-25 国家计算机网络与信息安全管理中心 A kind of influence power computational methods based on microblogging particular event
US20210279305A1 (en) * 2017-02-13 2021-09-09 Tunego, Inc. Tokenized media content management
CN107292390A (en) * 2017-05-24 2017-10-24 重庆邮电大学 A kind of Information Propagation Model and its transmission method based on chaology
CN114096977A (en) * 2018-11-02 2022-02-25 维罗纳控股经济特区公司 Tokenization platform
CN110990486A (en) * 2019-11-29 2020-04-10 北京有名知行科技有限公司 Block link evidence issuing and storing method and device based on network data interaction
US20210304196A1 (en) * 2020-03-25 2021-09-30 SneakrCred Inc. System and method for digital fashion asset management through blockchain
US20220076221A1 (en) * 2020-09-09 2022-03-10 Fanticipate, Inc. Event participation and memorabilia
CN114154076A (en) * 2020-11-16 2022-03-08 中国人民解放军战略支援部队信息工程大学 Social user influence measuring method based on multi-angle analysis
CN113407640A (en) * 2021-07-21 2021-09-17 杭州链网科技有限公司 Multi-chain NFT (network File transfer) based chain crossing method and system
CN114155095A (en) * 2021-09-24 2022-03-08 北京天德科技有限公司 Digital artwork authentication and transaction system and authentication and transaction method
CN114331634A (en) * 2021-12-31 2022-04-12 北京绵白糖智能科技有限公司 Method and device for transferring gifts of digital articles, computer equipment and storage medium
CN114398553A (en) * 2022-01-14 2022-04-26 北京京东方技术开发有限公司 Object recommendation method and device, electronic equipment and storage medium

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115099810A (en) * 2022-06-14 2022-09-23 蚂蚁区块链科技(上海)有限公司 Brand promotion method based on block chain and block chain link point
CN115296821A (en) * 2022-08-26 2022-11-04 中航信移动科技有限公司 Data processing system for digital collection management
CN115296821B (en) * 2022-08-26 2023-02-07 中航信移动科技有限公司 Data processing system for digital collection management

Also Published As

Publication number Publication date
CN114612109B (en) 2022-08-19

Similar Documents

Publication Publication Date Title
CN114612109B (en) Block chain-based digital collection generation method and system and electronic equipment
Pasdar et al. Connect api with blockchain: A survey on blockchain oracle implementation
US11699202B2 (en) Method and system to facilitate gamified arbitration of smart contracts
CN102035649B (en) Authentication method and device
CN107085807A (en) A kind of data assets method of commerce based on block chain
Evans Antitrust issues raised by the emerging global internet economy
EP3958502A1 (en) Computer implemented method and system
US20220391887A1 (en) Systems and Methods for Maintenance of NFT Assets
Balp et al. Preserving capital markets efficiency in the high-frequency trading era
US20220270084A1 (en) Leveraging Non-Fungible Tokens and Blockchain to Maintain Social Media Content
US20230100422A1 (en) Systems and Methods for Transaction Management in NFT-Directed Environments
Rensleigh Customer perceptions on Internet banking information protection
Chevalier From smart contract litigation to blockchain arbitration, a new decentralized approach leading towards the blockchain arbitral order
KR102288522B1 (en) System for promoting transaction of digital copyright by supplying certifying information of digital contents
CN116743768B (en) Method, apparatus, device and computer readable storage medium for trading computing power resources
Vučković et al. Does the Right to Use Digital Content Affect Our Digital Inheritance?
Hadfield Delivering Legality on the Internet: Developing Principles for the Private Provision of Commercial Law
US9495659B2 (en) Apparatus, method, and a computer program for a form identification number
Mundra et al. Online Hybrid model for online fraud prevention and detection
Agrawal et al. Decentralised ecosystem for journalism based on blockchain
Rafati Niya et al. DeTi: A Decentralized Ticketing Management Platform
Brown Coded Copyright?: How Copyright Enforcement, Remuneration, and Verification Terms in Blockchain-Enhanced Contract Models for Online Art Sales Compare to Their Traditional Counterparts
Han et al. TSCS: A blockchain-based tokenized subtitling crowdsourcing system
CN115131034A (en) Block chain-based rights and interests digital collection verification method and equipment
CA3090161A1 (en) System and method for electronic rental platform

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231212

Address after: 430014 Building 2, Guannan Industrial Park, Donghu New Technology Development Zone, Wuhan City, Hubei Province

Patentee after: WUHAN LONGJIN SCIENCE AND TECHNOLOGY Inc.

Patentee after: WUHAN University

Address before: 430070 Building 2, Guannan Industrial Park, East Lake New Technology Development Zone, Wuhan City, Hubei Province (Station No.: txzc a0089) (Wuhan area of the free trade zone)

Patentee before: WUHAN LONGJIN SCIENCE AND TECHNOLOGY Inc.