CN107481140B - Voucher identification code processing method and system, server and storage medium - Google Patents

Voucher identification code processing method and system, server and storage medium Download PDF

Info

Publication number
CN107481140B
CN107481140B CN201710606995.XA CN201710606995A CN107481140B CN 107481140 B CN107481140 B CN 107481140B CN 201710606995 A CN201710606995 A CN 201710606995A CN 107481140 B CN107481140 B CN 107481140B
Authority
CN
China
Prior art keywords
identification code
asset
digital asset
certificate
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201710606995.XA
Other languages
Chinese (zh)
Other versions
CN107481140A (en
Inventor
罗尉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hunan Seud Network Science & Technology Co ltd
Original Assignee
Hunan Seud Network Science & Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hunan Seud Network Science & Technology Co ltd filed Critical Hunan Seud Network Science & Technology Co ltd
Priority to CN201710606995.XA priority Critical patent/CN107481140B/en
Publication of CN107481140A publication Critical patent/CN107481140A/en
Application granted granted Critical
Publication of CN107481140B publication Critical patent/CN107481140B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/182Distributed file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Software Systems (AREA)
  • Strategic Management (AREA)
  • General Health & Medical Sciences (AREA)
  • General Business, Economics & Management (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Computing Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention provides a voucher identification code processing method of a digital asset, which is applied to a central server and comprises the following steps: receiving a request to generate a credential identification code for a digital asset; acquiring an asset identification code of the digital asset and a user identification code of a user corresponding to the digital asset; and mixing the asset identification code and the user identification code by using a preset algorithm to generate a voucher identification code of the digital asset.

Description

Voucher identification code processing method and system, server and storage medium
Technical Field
The invention relates to the technical field of internet, in particular to a voucher identification code generation method and system of digital assets, a server and a storage medium.
Background
The generation method of the identification code can be various in the prior art. For example, a self-growing sequence of a database is utilized as the identification code. Thus, when there are multiple databases in the system, conflicts may occur, and the portability between the databases is poor and relies on the proper functioning of the databases themselves. If a single point of failure of the database occurs, it may cause failure of the entire system operating with the identification code. And the application of the identification code is mostly used as the query basis of the information and needs the assistance of other information, thereby causing the problems of high complexity and low performance efficiency of the system.
Disclosure of Invention
In view of the above, embodiments of the present invention are directed to a method and system for generating a voucher identification code of a digital asset, a server and a storage medium, which at least partially solve one of the above problems.
In order to achieve the purpose, the technical scheme of the invention is realized as follows:
the embodiment of the invention provides a voucher identification code processing method of a digital asset, which is applied to a central server and comprises the following steps:
receiving a request to generate a credential identification code for a digital asset;
acquiring an asset identification code of the digital asset and a user identification code of a user corresponding to the digital asset;
and mixing the asset identification code and the user identification code by using a preset algorithm to generate a voucher identification code of the digital asset.
Optionally, the method further comprises:
synchronizing the credential identification code to a distributed server;
receiving a verification result of the certificate identification code by the distributed server based on a consensus mechanism;
and when the certificate identification code passes the verification, storing the certificate identification code.
Optionally, the storing the credential identification code when the credential identification code is verified includes:
storing the credential identification code in a database of the central server;
storing the credential identification code in a file system of the central server;
wherein the certificate identification code is further used for being stored in a database and a file system of the distributed server when the certificate identification code passes the verification;
the certificate identification code stored in the database is used for responding to the service request;
the certificate identification code stored in the file system is at least used for backing up and/or disaster tolerance of the database;
and the databases of the central server and the distributed servers are physically isolated from the storage areas corresponding to the file systems.
Optionally, the method further comprises:
encrypting the certificate identification code by using a public key of the distributed server to form a ciphertext;
signing the ciphertext by using a private key of the central server to form an information abstract;
the synchronizing the credential identification code to a distributed server includes:
synchronizing the ciphertext and the information abstract to the distributed server, wherein the information abstract is used for the distributed server to perform integrity verification of the ciphertext; and the ciphertext is used for the distributed server to decrypt the ciphertext by using a private key of the distributed server to obtain the certificate identification code to be verified.
Optionally, the acquiring the asset identification code of the digital asset and the user identification code of the user corresponding to the digital asset includes:
acquiring an asset identification code with a first length and a user identification code with a second length; wherein the first length is greater than the second length;
the mixing processing of the asset identification code and the user identification code by using a preset algorithm to generate the voucher identification code of the digital asset comprises the following steps:
and mixing the user identification code with a predetermined area with the second length in the asset identification code to generate a voucher identification code of the digital asset with the first length.
Optionally, the method further comprises:
determining time information of the digital assets and the user identification codes in association relationship;
converting the time information into a time identifier with a third length; wherein the third length is equal to the first length minus the second length;
the mixing processing of the asset identification code and the user identification code by using a preset algorithm to generate the voucher identification code of the digital asset comprises the following steps:
and mixing the user identification code and the time identification with the asset identification code to generate a certificate identification code of the digital asset with the first length.
Optionally, the asset credential identification code comprises: at least one of a credit code, an application code, a region code, an attribute code, an issue serial number, and an issuer code of the digital asset;
the user identification code includes: at least one of a name, a gender attribute, and a valid credential number.
Optionally, the method further comprises:
determining time information of the digital assets and the user identification codes in association relationship;
generating a time identification based on the time;
the mixing processing of the asset identification code and the user identification code by using a preset algorithm to generate the voucher identification code of the digital asset comprises the following steps:
and mixing the asset identification code, the user identification code and the time identification by using a preset algorithm to generate a voucher identification code of the digital asset.
Optionally, the method further comprises:
receiving a service request for performing preset operation on the digital asset, wherein the service request carries a certificate identification code of the digital asset;
and analyzing the certificate identification code to obtain the asset identification code of the digital asset and the user identification code.
A second aspect of the embodiments of the present invention provides a voucher identification code processing system for a digital asset, including: a central server and a distributed server;
the central server is used for receiving a generation request of a voucher identification code of the digital asset; acquiring an asset identification code of the digital asset and a user identification code of a user corresponding to the digital asset; mixing the asset identification code and the user identification code by using a preset algorithm to generate a voucher identification code of the digital asset; synchronizing the credential identification code to the distributed server; receiving a verification result of the certificate identification code by the distributed server based on a consensus mechanism; when the certificate identification code passes verification, storing the certificate identification code;
the distributed server is used for receiving the certificate identification code, verifying the certificate identification code based on a consensus mechanism, and storing the certificate identification code when the certificate identification code passes verification.
A third aspect of an embodiment of the present invention provides a central server, including:
a communication interface for communication;
a memory for storing information;
and the processor is respectively connected with the communication interface and the memory and is used for realizing the one or more certificate identification code processing methods by executing the computer program stored in the memory.
A fourth aspect of an embodiment of the present invention provides a central server, including: a processor and a computer program;
the processor is used for realizing the voucher identification code processing method of one or more digital assets by executing the computer program.
A fifth aspect of the embodiments of the present invention provides a computer storage medium storing a computer program; the computer program, when executed, enables the above-described credential identification code processing method for one or more digital assets.
The voucher identification code generation method and system, the server and the storage medium of the digital asset provided by the embodiment of the invention utilize the central server to combine the asset identification code and the user identification code to generate when generating the voucher identification code indicating the ownership and/or the use right of the digital asset. Therefore, on one hand, the certificate is generated uniformly by the central server list, so that the uniqueness of the certificate identification is ensured; on the other hand, the voucher identification code is generated by mixing at least an asset identification code and a user identification code, the identification code can be used for tracking the user and the attribution of the digital asset, and the legal transaction and the authority transfer of the subsequent digital asset are facilitated. On the other hand, the trading system generates the voucher identification code again, so that the problems that the identification is difficult to maintain and manage and cannot be used for trading of the digital assets in the trading system due to the fact that the supplied asset vouchers and the like provided by different digital assets are not uniform can be solved, and the trading of the digital assets in the trading system is smoother.
Drawings
Fig. 1A is a schematic flowchart of a credential identifier code processing method for a first digital asset according to an embodiment of the present invention;
fig. 1B is a schematic flowchart of a credential identifier code processing method for a second digital asset according to an embodiment of the present invention;
FIG. 2 is a block diagram of a system for processing digital assets according to an embodiment of the invention;
fig. 3 is a schematic structural diagram of a central server according to an embodiment of the present invention;
FIG. 4 is a flowchart illustrating a voucher identification code processing method for a third digital asset according to an embodiment of the present invention;
fig. 5 is a flowchart illustrating a voucher identification code processing method for a fourth digital asset according to an embodiment of the present invention;
fig. 6 is a flowchart illustrating a method for generating a voucher identification code of a digital asset according to an embodiment of the present invention.
Detailed Description
The technical solution of the present invention is further described in detail with reference to the drawings and the specific embodiments of the specification.
As shown in fig. 1A, the present embodiment provides a voucher identification code processing method for a digital asset, applied in a central server, including:
step S110: receiving a request to generate a credential identification code for a digital asset; the generation request comes from a request end, and the request end can be a distributed server connected with a central server or a user client; for example, a user logs in a verification system where a central server is located by using a mobile phone to trigger and generate a certificate identification code;
step S120: acquiring an asset identification code of the digital asset and a user identification code of a user corresponding to the digital asset;
step S130: and mixing the asset identification code and the user identification code by using a preset algorithm to generate a voucher identification code of the digital asset.
The voucher identification code processing method for the digital asset provided by the embodiment may include: generation of a voucher identification code for a digital asset.
The digital assets may include: digital assets for online games, where the digital assets may be game point cards; the game point card can be used for purchasing props in games, clothes of game characters and the like. The digital asset may further comprise: e-books, network application assets for video or audio usage rights, etc. In summary, the digital assets in this embodiment may be: various assets used in the internet are indicated with digital information.
The central server belongs to a trading platform. In some embodiments, the trading platform further comprises: a distributed server. In this embodiment, the request for generating the voucher identification code of the digital asset can come from a transaction server, which can be used for performing network transaction of the digital asset, and also from a rental server, which can be used for network rental of the digital asset, and the like. In general, the digital request may come from a service server associated with the transfer or attribution of the title of the digital asset.
Of course, in a specific implementation process, the generation request may also come directly from the distributed server. In this embodiment, the distributed server and the service server may be mapped to the same physical server, or the service server is one of the distributed servers.
In this embodiment, the generation request may be a request to generate a credential identification code for the digital asset. The central server initiates the generation of the voucher identification code for the digital asset upon receipt of the voucher identification code. In step S120, the asset identification code of the digital asset corresponding to the user identification code of the user is obtained.
The asset identification code and the user identification code may be information strings, and may be characters having identification significance composed of numbers, letters, and/or other symbols. Of course, the user identification code and the asset identification code are not limited to the information string, and may be a number composed of numbers.
In step S130 of this embodiment, the asset identification code and the user identification code are mixed according to a preset algorithm, and the two identifications jointly generate the voucher identification code of the digital asset.
In this embodiment, the asset identifier code may be used to indicate at least some basic asset attributes of the digital asset, for example, the attributes may indicate that the digital asset is one or a combination of asset type, point card, game gold, or game equipment.
The user identification code may point to a user identification code of a corresponding user, e.g., a user identification code of a user to whom the digital asset is attributed, a user identification code of a party to which the digital asset is leased. The user identification code may be an identification assigned to the user for a transaction platform that conducts the transfer and/or transaction of the digital asset. In some embodiments, the application platform of the digital asset application may also assign an identification to the user. For example, the digital asset is a redemption volume for gaming equipment; the user identification code may be a player identification of a game player assigned to the user by the gaming application platform providing the game.
In this embodiment the asset identification code and the user identification code are mixed to generate the credential identification code. In this way, if the voucher identification code is analyzed, the digital asset and the user identification code corresponding to the voucher identification code can be obtained. The credential identification code may be used for status supervision and management, etc., of the digital asset held or rented by the user.
For example, a game player obtains an equipment exchange roll, generates a voucher identification code based on the equipment exchange roll and a player identification of the swordsman, the voucher identification code is stored in a transaction system, the voucher identification code is used as a query basis of transaction business in the transaction system, and the state of the voucher identification code is recorded in a database of the transaction system by taking the voucher identification code as a key, for example, during selling, during using, transaction freezing and the like.
With the voucher identification code generated by this mechanism, even if the user identification code of the user holding the digital asset or the usage right of the digital asset is not recorded in the subsequent database, it can be obtained by decoding the voucher identification code. In the subsequent use process, if a certain user requests to transfer the digital asset corresponding to the certificate identification code in the service server, the service server can obtain the user identification code by decoding the certificate identification code, and then judges whether the requesting user is authorized to transfer or not based on the user identification code of the transfer request for transmitting the transferred digital asset, if not, directly refusing the operation; obviously, the business server does not need to query the database at this time, can realize the supervision of the digital assets, and can also carry out comprehensive monitoring and tracking on the transfer of the digital assets based on the certificate identification codes of the digital assets. Obviously, the voucher identification code generated in such a way can reduce the complexity of the system and improve the processing efficiency of the system in the subsequent application process.
In addition, the voucher identification code generated by the central server in this embodiment can be applied to transaction systems for transaction of various digital assets, and different asset identification codes or player identifications may be provided by different asset providers, so that there is no way to perform unified management and maintenance in the transaction systems, and further the problem of blocking transfer and use of digital assets is solved.
As a further improvement of this embodiment, as shown in fig. 1B, the method further includes:
step S140: synchronizing the credential identification code to a distributed server;
step S150: receiving a verification result of the certificate identification code by the distributed server based on a consensus mechanism;
step S160: and when the certificate identification code passes the verification, storing the certificate identification code.
In this embodiment, the central server synchronizes the generated credential identification code to the distributed servers for verification, and confirms that the credential identification code is valid after verification, thereby ensuring the uniqueness of the generated credential identification code, reducing the problems of conflict and poor migratability caused by the generation of different servers, and having the characteristics of small conflict such as repetition of the generated identification code and strong migratability that the generated identification code can be migrated at will in a plurality of servers.
In some embodiments, the method further comprises:
converting the original asset identification code of the digital asset into an asset identification code of a uniform format provided by a central server; for example, the information string of the asset identification code with uniform length is supplemented by predetermined characters when the length is insufficient;
the original user identification code is converted into a user identification code of a uniform format provided by the central server, and similarly, an information string such as a user identification code of a uniform length may be supplemented with predetermined characters when the length is insufficient, and the like.
Thus, the original asset identification code and the original user identification code are converted, so that the user identification code and the asset identification code can be conveniently mixed in the subsequent step S130.
Optionally, the step S160 may include:
storing the credential identification code in a database of the central server;
storing the credential identification code in a file system of the central server;
wherein the certificate identification code is further used for being stored in a database and a file system of the distributed server when the certificate identification code passes the verification;
the certificate identification code stored in the database is used for responding to the service request;
the certificate identification code stored in the file system is at least used for backing up and/or disaster tolerance of the database;
and the databases of the central server and the distributed servers are physically isolated from the storage areas corresponding to the file systems.
First, in this embodiment, the central server and the distributed servers both include a database and a file system, and storage areas corresponding to the database and the file system are physically isolated, and one credential identification code exists in the database and the file system of the central server and the distributed servers at the same time, so that it is apparent that the credential identification code is not lost due to a single point of failure, and the reliability of generation, management and application of the credential identification code is obviously improved.
In some embodiments, the distributed servers are distributed in different regions. An application area of a digital asset is also definable, and if so, the step S140 may include: and sending the generated voucher identification code to distributed servers where application areas corresponding to the digital assets are located, verifying by the distributed servers, and storing the voucher identification code in the central server and the distributed servers of the application areas when the certificate identification code passes verification, so that the storage number of the voucher identification code in the system is reduced, and the data storage capacity of the system is integrally reduced.
For example, if the digital asset is a game point card, and the game point card may belong to a specific area service, in step S140, only the distributed servers of the area service where the game point card is located are synchronized, the distributed servers perform authentication, and report respective authentication results to the central server, and the central server counts the authentication results of the distributed servers, and then determines whether the current voucher identification code passes authentication based on a consensus mechanism.
For example, the asset identification code may further include: distinguishing clothing marks; when the distributed server receives a verification instruction carrying a certificate identification code to be verified, the certificate identification code is decoded to obtain the asset identification code, the district service identification is extracted from a specific field of the asset identification code, whether the extracted district service identification is consistent with the district service identification where the distributed server is located or the district service identification of the provided service is judged, if so, verification is continued, and if not, verification is not passed or abnormal, and the central server is reported in time. Of course, this is merely an example, and there are many specific implementations, which are not described here.
In some embodiments, the method further comprises:
the central server receives the verification results of all the distributed servers;
recording the verification result of each distributed server;
and only when the verification result for identifying that the certificate identification code passes meets the preset condition, determining that the certificate identification code is generated without error, namely passing the verification.
For example, when the verification results of a predetermined number of distributed servers indicate that the certificate identification code passes verification, the verification result may be considered to satisfy the predetermined condition.
For another example, the credential identification code is determined to be authenticated only when more than half of the distributed servers that participate in the authentication of the credential identification code provide authentication results that indicate authentication. In summary, the certificate identification code verification based on the consensus mechanism can ensure the reliability, uniqueness and the like of the certificate identification code.
The verifying may include: and comparing the certificate identification code with the existing certificate identification code to determine whether the certificate identification code is unique or not.
Optionally, the method further comprises:
encrypting the certificate identification code by using a public key of the distributed server to form a ciphertext;
signing the ciphertext by using a private key of the central server to form an information abstract;
the step S140 may include:
synchronizing the ciphertext and the information abstract to the distributed server, wherein the information abstract is used for the distributed server to perform integrity verification of the ciphertext; and the ciphertext is used for the distributed server to decrypt the ciphertext by using a private key of the distributed server to obtain the certificate identification code to be verified.
In this embodiment, in order to prevent the problem of secret divulgence and the like in the process of verifying the credential identification code, encrypted transmission in the verification process is performed.
In this embodiment, the central server encrypts the credential identifier code by using asymmetric encryption, so that the credential identifier code is encrypted by using a public key of the distributed server, and a private key of the central server is used to perform signature processing to obtain an information digest of a ciphertext.
The ciphertext and the message digest are synchronized to the distributed servers at the same time in step S140. After the distributed server receives the information digest and the ciphertext, the information digest obtained by signature before verification is verified by using the public key of the central server, and after the verification is passed, the ciphertext is decrypted by using the private key of the distributed server to obtain the certificate identification code to be verified. Specifically, for example, the distributed server signs a ciphertext by using the public key of the central server to obtain another information digest, compares the information digest generated by the distributed server with the received information digest, and decrypts the ciphertext and generates the certificate identification code after the comparison is consistent, so as to avoid the problem that the certificate identification code is tampered in the verification transmission process, which causes different verifications.
In this embodiment, if the distributed servers find that the information digests are compared consistently, the central server is notified, and the central server regenerates the credential identification code, or reselects another alternative distributed server to perform verification of the credential identification code, so as to ensure the accuracy of the verification.
Optionally, the step S120 may include:
acquiring an asset identification code with a first length and a user identification code with a second length; wherein the first length is greater than the second length;
the step S140 may include:
and mixing the user identification code with a predetermined area with the second length in the asset identification code to generate a voucher identification code of the digital asset with the first length.
For example, the asset identification code may be a 256 character string of information; the user identification code can be 128 main information strings; and generating a 256 character string of information for the voucher identification code of the digital asset.
In this embodiment, the following options are: the user identification code will be mixed with the continuously distributed characters of the asset identification code equal to the second length to generate the voucher identification code. In this way, when the voucher identification code is decoded subsequently to restore the asset identification code and the user identification code, only the predetermined area needs to be decoded, so that on one hand, the calculation amount mixed in the voucher identification code generation process can be reduced, and the calculation amount for decoding the voucher identification code can also be reduced.
Optionally, the user identification code may be mixed with the lower part of the asset identification code, or may be mixed with the upper part. For example, the 128-character user identification code is mixed with the first 128 characters of the 256-character asset identification code, or mixed with the last 128 characters, or mixed with the middle 128 characters to obtain the credential identification code. Of course, this is merely an example and is not a limitation on the mixing of the credential identification code generation process.
For example, the last 128 characters of the asset identification code are the issue serial number of the corresponding issued asset identification code, and when the mixing process is performed, the 128 characters corresponding to the issue serial number and the user identification code may be mixed. If so, the first 128 characters of a voucher identification code reserve the first 128 characters of the asset identification code, and the first 128 characters of the asset identification code can carry credit codes and attributes of the digital asset, application identifiers or issuer identifiers applied to the digital asset, and the like, so that the asset identification code and the user identification code can be obtained by fast general decoding in subsequent service processing, and on the other hand, information of the asset identification code which is possibly applied at present can be extracted based on the unmixed part of the asset identification code, and the processing of the service request is accelerated.
Optionally, the method further comprises:
determining time information of the digital assets and the user identification codes in association relationship;
converting the time information into a time identifier with a third length; wherein the third length is equal to the first length minus the second length;
the step S140 may include:
and mixing the user identification code and the time identification with the asset identification code to generate a certificate identification code of the digital asset with the first length.
The time information may be a purchase time for the user corresponding to the user identification code to purchase the digital asset, a lease time for the digital asset, or a gifting time for the digital asset. Of course, some digital assets may have a usage time limit, and the time information may be time information related to the usage time limit, and the time information is converted into a time identifier. The length of the time stamp here is equal to the first length minus the second length. In the step S140, when mixing, the time identifier and the user identifier may be spliced into an information string of a first length, and then mixed with the asset identifier of the first length to obtain the credential identifier of the first length.
In this way, subsequently, when the service server uses the voucher identification code, the time information can be obtained through the voucher identification code, or when asset tracking is performed, the voucher identification code can be decoded, so that not only the user identification code and the asset identification code can be obtained, but also the time information generated by the digital asset and the user identification code can be obtained. For example, the purchase time at which the user purchased the digital asset, the gift time at which the gift was received, the rental time at which the digital asset was rented, and so on.
Optionally, the asset credential identification code comprises: at least one of a credit code, an application code, a region code, an attribute code, an issue serial number, and an issuer code of the digital asset; the user identification code includes: at least one of a name, a gender attribute, and a valid credential number.
The name may be the user's name or a netizen, and to ensure the authenticity of the information, the information on the user's identity document is typically required, for example, the name may be on an identity card or passport. The gender attribute may be information indicating that the user is male or female. The valid certificate number may be: identity identification information which can be inquired in a public authority system of a third party, such as an identity card number or a passport number or a student card number or a household registration number.
The application code may be an application identification of the game application, the area code may be an identification of a uniform of the game, etc.
Optionally, the method further comprises:
determining time information of the digital assets and the user identification codes in association relationship;
generating a time identification based on the time;
the step S140 may include:
and mixing the asset identification code, the user identification code and the time identification by using a preset algorithm to generate a voucher identification code of the digital asset.
The time information in this embodiment is identical to that in the previous embodiment and is not repeated here. In this embodiment, the length of the time identifier may be any predetermined length, for example, the length may be equal to at least one of the user identifier code and the asset identifier code, may be directly equal to the length of the credential identifier code, or may not be equal to any one of the user identifier code and the asset identifier code.
The time information is mixed with the user identification code and the asset identification code, so that the time information required by the obligation server can be conveniently obtained by decoding the voucher identification code in the follow-up process, and meanwhile, the transfer and state transition of the digital asset can be conveniently tracked by utilizing the voucher identification code.
Optionally, the method further comprises:
receiving a service request for performing preset operation on the digital asset, wherein the service request carries a certificate identification code of the digital asset;
and analyzing the certificate identification code to obtain the asset identification code of the digital asset and the user identification code.
In this embodiment, when a service request is received, the asset identification code and the user identification code may be restored by decoding the corresponding credential identification code, which facilitates the permission verification or other operations on the service request, and reduces the system processing complexity.
In some embodiments, the rights to a digital asset may include: the certificate identification code also carries partial characters used for indicating the authority corresponding to the identification code. For example, if user a holds all rights to a digital asset, the corresponding identification code will have characters set therein identifying the ownership made to that digital asset. Therefore, the subsequent service server can determine which rights and interests of the corresponding user to execute on the digital asset directly according to the certificate identification code.
In some embodiments, the method further comprises:
verifying the validity of the asset identification code prior to hybrid generation of the credential identification code;
verifying the validity of the user identification code;
the step S130 may include:
and mixing the asset identification code and the user identification code which respectively pass the validity verification to generate the certificate identification code.
The validation of the asset identification code may include: verifying whether the asset identification code is bound with other user identification codes; if not, the authentication is passed, otherwise, the authentication is not passed; verifying the validity of the asset identification code, further comprising: and verifying whether the asset identification code is a revocation identification code, if so, determining that the validity verification is not passed, otherwise, verifying that the validity verification is passed. For example, in some embodiments, an asset issuer may reclaim portions of assets, and the asset identification codes of these reclaimed assets are obviously obsolete identification codes.
Validation of the player identification code, comprising: verifying authenticity and verifying valid state; the authenticity verification includes: and verifying whether the user identification code is a truly existing identification code is an identification code which can be identified by the platform. The validation of the valid state may include: verifying whether the user identification code is not in a frozen or invalid state. For example, if the user is currently in a user frozen state due to an illegal operation, the user identification code verification is not passed. For another example, if the user has logged off the account, the account is in an invalid state. In this embodiment, before the generation of the credential identification code, validity verification of the asset identification code and the user identification code is performed, so that the validity of the generated credential identification code can be ensured.
As shown in fig. 2, the present embodiment further provides a voucher identification code processing system for a digital asset, including: a central server and a distributed server; in fig. 2, a central server and N distributed servers are included, in turn: distributed server 1, distributed server 2, distributed server 3 up to distributed server N. Wherein the central server may correspond to one or more interconnected physical servers.
The central server is used for receiving a generation request of a voucher identification code of the digital asset; acquiring an asset identification code of the digital asset and a user identification code of a user corresponding to the digital asset; mixing the asset identification code and the user identification code by using a preset algorithm to generate a voucher identification code of the digital asset; synchronizing the credential identification code to the distributed server; receiving a verification result of the certificate identification code by the distributed server based on a consensus mechanism; when the certificate identification code passes verification, storing the certificate identification code;
the distributed server is used for receiving the certificate identification code, verifying the certificate identification code based on a consensus mechanism, and storing the certificate identification code when the certificate identification code passes verification.
In this embodiment, the central server and the distributed servers are connected point-to-point, and can directly perform point-to-point information interaction, and a credential identification code is generated by the central server, but the final verification is performed by the distributed servers.
The authentication of the credential identification code based on the consensus mechanism here can be as follows:
in some embodiments, the distributed server may perform the verification of the credential identification code based on a consensus mechanism. For example, three roles are allocated to the distributed servers based on a distributed consensus algorithm Raft; one as a follower, another as a candidate, and one as a leader. The initial role of one distributed server is a follower, when a code to be verified sent by a central server is received, the code is converted into a candidate, a voting request is sent to other distributed servers, the voting request carries a certificate identification code to be verified, if the distributed server receiving the voting request compares the certificate identification code received by the distributed server with the certificate identification code in the voting request, and if the comparison is consistent, a vote is cast to the distributed server sending the voting request. And if the number of tickets obtained by a certain distributed request exceeds half of the total number of all the distributed servers, the role of the distributed server is converted into a leader, and the distributed server taking the role as the leader sends a verification result to the central server, wherein the verification result indicates that the distributed server passes. In some cases, if the distributed server having no role as a leader returns the verification result to the central server all the time in the verification period, it may indicate that the verification code generated this time does not take effect or fails to be verified. Here, a method for performing the credential identification code verification based on a consensus mechanism of a distributed server is provided.
In summary, the present embodiment provides a processing system of a voucher identification code, which can be used to implement the voucher identification code processing method of a digital asset provided in any one of the foregoing technical solutions.
The storage number of the certificate identification code is represented as a discrete state according to metadata (namely a user identification code and an asset identification code) forming the certificate identification code, and a non-relational data structure is adopted, so that the columnar database has better storage advantage and retrieval performance.
During storage, metadata forming the certificate identification codes are disassembled, and each metadata is stored in one column. When the certificate identification codes are compared in a relevant mode, metadata in the certificate identification codes to be compared are disassembled, each time the metadata is used as a column query condition, searching is conducted in a column database, and if data meeting the query condition exist, the comparison is successful.
As shown in fig. 3, the present embodiment further provides a central server, including:
a communication interface 110 for communication;
a memory 120 for storing information;
and the processor 130 is connected with the communication interface and the memory respectively and is used for implementing the voucher identification code processing method of the digital asset provided by one or more of the above technical solutions by executing the computer program stored in the memory.
In this embodiment, the communication interface 110 may be a central server for performing information interaction with distributed servers, where the physical interface may include: a wired interface and a wireless interface, such as a WiFi interface or a cable interface or a fiber optic cable interface, etc., so as to realize interconnection with the distributed server.
The memory 120 may include: various storage media may be used to store various information, such as computer programs and the credential identification codes.
The processor 130 may include: a Central Processing Unit (CPU), a Microprocessor (MCU), a Digital Signal Processor (DSP), an Application Processor (AP) or a programmable array (PLC) or an application specific integrated circuit, etc.
The processor 130 may be connected to the communication interface 110 and the memory 120 through a bus interface 140 such as an integrated circuit bus, and controls information transmission and reception of the communication interface and information reading from and writing to the memory 120.
The present embodiment further provides a central server, including: a processor and a computer program;
the processor is configured to implement the voucher identification code processing method for the digital asset provided in one or more of the foregoing technical solutions by executing the computer program.
The processor can execute the computer program through computer executable codes such as the computer program, and the like, so as to realize the processing operations of generating and decoding the certificate identification code and the like.
The embodiment of the invention also provides a computer storage medium, wherein the computer storage medium stores a computer program; after being executed, the computer program can realize the voucher identification code processing method of the digital asset provided by one or more of the technical schemes.
The computer storage medium may be various types of storage media, for example, various media that can store program codes, such as a removable storage device, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk. The computer storage medium may be a non-transitory storage medium.
Several specific examples are provided below in connection with any of the above embodiments:
example 1:
the present example provides a credential identification code generation method for a digital asset, comprising:
1) asset identification code generation for digital assets:
first, the network game company registers and issues game information: the game information includes company information, network game information to be issued, the total number of digital assets to be issued in the network game to be issued, and article attribute values.
Next, game information issued by the network game company is sent to the central server, and the central server generates a 256-bit information string (hereinafter referred to as an asset identification code) unique to the world for each issued digital asset, where the asset identification code uniquely indicates one digital asset.
2) Player identification code generation:
first, a network game player registers and registers personal information in a network game using the present technology: name, gender, identification number.
Secondly, after the registration information of the network player is sent to the central server, the central server generates a 128-bit information string (hereinafter, referred to as a player identification code) which is unique globally for the registered network game player, and the player identification code uniquely identifies one piece of player information.
3) Generating a voucher identification code for the digital asset:
firstly, the central server carries out mixed processing operation on the player identification code and the asset identification code of the digital asset to generate a 256-bit information string (hereinafter referred to as voucher identification code of the digital asset) which is unique all over the world and contains the information of the network game player, the information of the network game and the information of the digital asset in the network game. The voucher identification code of the digital asset uniquely identifies the network game player to which the network game digital asset belongs.
4) And storing the certificate identification code:
the central server and each node separately store data in a database mode and a file mode. The main data is stored in a database for service inquiry. The backup data is stored in a file, and is updated regularly for disaster recovery and peer-to-peer. The primary and backup data should be isolated from each other by different physical machines.
5) And (3) synchronizing the certificate identification codes:
and the distributed server calculates the information abstract of the ciphertext and compares the information abstract with the abstract provided by the central service to verify, so that the information is prevented from being tampered. The certificate identification code is enabled by the rear node side, and otherwise, the certificate identification code is acquired from the central server again and verified.
6) Confirming the validity of the certificate identification code:
the generated certificate identification code must finally confirm the validity of the certificate identification code under the condition that enough nodes are consistent with each other through a consensus mechanism among the distributed servers, and meanwhile, the confirmation result of each node is reported to the central server. In the example, a simple and fast distributed consistency algorithm Raft is mainly adopted, and the validity of the certificate identification code can be confirmed under the condition that more than half of distributed servers are consistent with each other.
If the voucher identification code solution of the example is adopted, a universal voucher identification code standard can be formed in the digital asset trading market, and the information of commodities and the information of players can be immediately acquired through algorithm decoding. The transaction circulation link is simplified, and the barrier between the game-transaction platform and the player is broken. The generation of the certificate identification code of the digital asset has several core points that the establishment has a uniform algorithm and a data format, and the content can be read; the data transmission safety is guaranteed not to be tampered during distribution; the different transaction nodes can mutually and quickly agree on the certificate identification code to confirm the validity of the certificate identification code.
This example is based on all the above problems and proposes a digital asset credential generation solution. The problem of between different game manufacturers voucher identification code non-uniform, unable reading is solved. The distributed transaction nodes mutually achieve consensus, the mark effectiveness can be quickly confirmed without depending on a central server, and the system complexity and the performance overhead of the central server are reduced.
Example 2:
this example provides an application example based on the method provided in example 1, including:
1. a digital asset identification code comprising:
collecting metadata of digital assets, such as: the information such as the unified social credit code of the company of the game issuer, the affiliated game, the game area suit, the property of the article, the issuing serial number (500 if 500 are issued), the issuer and the like is collected, and an information string of 256 characters is calculated. The information string may be a character string composed of at least one of letters, numbers and symbols.
2. A player identification code comprising:
metadata of the player is collected, such as: name + gender + valid credential number. By calculating a 128 character string.
3. A digital asset credential identification code comprising:
the asset identification code of the digital asset and the player identification code are mixed, and a 256-character information string is calculated and generated.
4. Credential identification code generation, comprising:
the metadata cannot contain blank characters, different data are separated by "|", and the length of the spliced metadata characters cannot exceed the required fixed size. The metadata is coded by uniformly using a UTF-8 format, the characters which are less than fixed length and are filled with blanks at the tail are represented by "& nssp". The character "& nsp" here is a predetermined character of the exclusive complement.
Examples are:
the metadata length is 26 characters, the fixed length is 30, 123| grand network | legend |1 district | slaughterhouse | attack power is 99, after being converted into UTF-8 coding: 123| & # x76 DB; and # x 5927; and # x7F 51; and # x7 EDC; l & # x4F 20; and # x 5947; l 1& # x 533A; l & # x5C 60; and # x9F 99; and # x 5200; l & # x 653B; and # x51 FB; and # x 529B; :99. Less than 30 bits, and 4 blank symbols at the end.
One credential identification code may be: 123| & # x76 DB; and # x 5927; and # x7F 51; and # x7 EDC; l & # x4F 20; and # x 5947; l 1& # x 533A; l & # x5C 60; and # x9F 99; and # x 5200; l & # x 653B; and # x51 FB; and # x 529B; 99; and nbsp & nbsp & nbsp.
5. The synchronization of the credential identification code may include:
first, the central server encrypts data, specifically as follows: using RAS (public key encryption) encryption algorithm, the central server uses the public key of the transaction node to encrypt data, and uses its own private key to sign to form the information summary.
And secondly, the distributed server decrypts the data, specifically, after each transaction node (corresponding to the distributed server) receives the data, the public key of the central server is used for verifying the signature, and then the private key of the transaction node is used for decryption.
6. The message pushing can comprise:
the encryption transmission is realized mainly based on a websocket wss protocol, the distributed server subscribes a message push service to the central server, and when a new identification code is generated, the client receives the new identification code in real time.
7. The node consensus can comprise:
and (3) adopting a distributed consistency Raft algorithm, under the condition that the identification codes of the N distributed servers are consistent when the N/2+1 exceeds half distributed server points, the identification is achieved, and the validity of the certificate identification code is confirmed. N is a positive integer greater than 2;
in some embodiments, the credential identification code may be considered valid if there are M distributed servers that agree.
8. An identification code store, which may include:
and the voucher identification code respectively stores the main data and the backup data in a persistent manner by adopting a database and file warehouse manner. The main data is stored in the database and used for providing service functions, and the backup data is stored in the file warehouse in a file form and used for disaster recovery and data verification. The database and the file warehouse must be physically separated and respectively deployed on different physical machines.
Example 3:
as shown in fig. 4, the present example provides a method for generating and verifying a credential identification code, including:
step S1: generating an asset identification code for the digital asset;
step S2: generating a user identification code for a user holding the right to use or ownership of the digital asset;
step S3: generating a certificate identification code for holding or using the digital asset based on the asset identification code and the user identification code;
step S4: synchronizing to a distributed server (e.g., each transaction node conducting a digital asset transaction);
step S5: judging whether the information abstract comparison is consistent, if so, entering the step S6: if not, go to step S9;
step S6: judging whether the distributed servers achieve consensus, if yes, entering the step S7, and if not, returning to the step S4;
step S7: reporting the consensus state of each distributed server;
step S8: the generated credential identification code is stored.
Step S9: reacquire the credential identification code, e.g., the distributed server sends a reacquisition request to the central server;
step S10: downloading the credential identification code, such as by the distributed server re-downloading the credential identification code from the central server.
As shown in fig. 5, in summary, the method for generating a credential identifier according to the embodiment of the present invention includes:
step 1: sending a generation request for generating a certificate identification code;
step 2: the central server responds to the generation request to generate a certificate identification code;
and step 3: the central server synchronizes the certificate identification code to a global distributed server;
and 4, step 4: the distributed server verifies the certificate identification code, specifically comprising: and sampling the distributed servers, and if the certificate identification code of the sampled and successful distributed server is enabled to be effective, the certificate identification code is effective.
Example 4:
as shown in fig. 6, this example also provides another credential identification code generation method, including:
step S11: logging in a game platform by utilizing the player identification; the player identification can be one of the white identification codes of the users;
step S12: acquiring game assets; obtaining game assets herein, comprising: purchasing a game asset, obtaining a game asset through a reward of game pass, etc.
Step S13: verifying the player identification code, for example, making a verification whether the player identification code exists and a valid state of the player identification code;
step S14: judging whether the verification passes or not, and ending the process if the verification does not pass;
step S15: verifying the acquired asset identification code of the game asset;
step S16: judging whether the verification passes or not, and ending the process if the verification does not pass;
step S17: mixing the player identification code and the asset identification code to obtain a voucher identification code;
step S18: distributing to a distributed server to verify the certificate identification code;
step S19: and judging whether the certificate passes the verification, indicating that the certificate identification code is successfully generated if the certificate passes the verification, and otherwise indicating that the certificate identification code fails.
In FIG. 6, the validation of the asset identification code and the player identification code is performed simultaneously, and in some embodiments, the validation of the player identification code may be performed first, the process may be terminated immediately when the validation of the asset identification code is not performed, and the validation of the asset identification code may be performed after the validation of the player identification code is performed.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The above-described device embodiments are merely illustrative, for example, the division of the unit is only a logical functional division, and there may be other division ways in actual implementation, such as: multiple units or components may be combined, or may be integrated into another system, or some features may be omitted, or not implemented. In addition, the coupling, direct coupling or communication connection between the components shown or discussed may be through some interfaces, and the indirect coupling or communication connection between the devices or units may be electrical, mechanical or other forms.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, that is, may be located in one place, or may be distributed on a plurality of network units; some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, all the functional units in the embodiments of the present invention may be integrated into one processing module, or each unit may be separately used as one unit, or two or more units may be integrated into one unit; the integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional unit.
Those of ordinary skill in the art will understand that: all or part of the steps for implementing the method embodiments may be implemented by hardware related to program instructions, and the program may be stored in a computer readable storage medium, and when executed, the program performs the steps including the method embodiments.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (12)

1. A voucher identification code processing method of a digital asset is applied to a central server and comprises the following steps:
receiving a request to generate a credential identification code for a digital asset;
acquiring an asset identification code of the digital asset and a user identification code of a user corresponding to the digital asset;
and performing mixed processing on the asset identification code and the user identification code by using a preset algorithm to generate a voucher identification code of the digital asset, wherein the voucher identification code is used for identifying the attribution of the digital asset, and is used for verifying whether a user requesting to transfer the digital asset has the right to transfer the digital asset and/or monitoring the state of the digital asset.
2. The method of claim 1,
the method further comprises the following steps:
synchronizing the credential identification code to a distributed server;
receiving a verification result of the certificate identification code by the distributed server based on a consensus mechanism;
and when the certificate identification code passes the verification, storing the certificate identification code.
3. The method of claim 2,
when the certificate identification code passes the verification, storing the certificate identification code, including:
storing the credential identification code in a database of the central server;
storing the credential identification code in a file system of the central server;
wherein the certificate identification code is further used for being stored in a database and a file system of the distributed server when the certificate identification code passes the verification;
the certificate identification code stored in the database is used for responding to the service request;
the certificate identification code stored in the file system is at least used for backing up and/or disaster tolerance of the database;
and the databases of the central server and the distributed servers are physically isolated from the storage areas corresponding to the file systems.
4. The method according to claim 2 or 3,
the method further comprises the following steps:
encrypting the certificate identification code by using a public key of the distributed server to form a ciphertext;
signing the ciphertext by using a private key of the central server to form an information abstract;
the synchronizing the credential identification code to a distributed server includes:
synchronizing the ciphertext and the information abstract to the distributed server, wherein the information abstract is used for the distributed server to perform integrity verification of the ciphertext; and the ciphertext is used for the distributed server to decrypt the ciphertext by using a private key of the distributed server to obtain the certificate identification code to be verified.
5. The method according to claim 1 or 2,
the acquiring the asset identification code of the digital asset and the user identification code of the user corresponding to the digital asset includes:
acquiring an asset identification code with a first length and a user identification code with a second length; wherein the first length is greater than the second length;
the mixing processing of the asset identification code and the user identification code by using a preset algorithm to generate the voucher identification code of the digital asset comprises the following steps:
and mixing the user identification code with a predetermined area with the second length in the asset identification code to generate a voucher identification code of the digital asset with the first length.
6. The method of claim 5,
the method further comprises the following steps:
determining time information of the digital assets and the user identification codes in association relationship;
converting the time information into a time identifier with a third length; wherein the third length is equal to the first length minus the second length;
the mixing processing of the asset identification code and the user identification code by using a preset algorithm to generate the voucher identification code of the digital asset comprises the following steps:
and mixing the user identification code and the time identification with the asset identification code to generate a certificate identification code of the digital asset with the first length.
7. The method according to claim 1 or 2,
the asset credential identification code comprises: at least one of a credit code, an application code, a region code, an attribute code, an issue serial number, and an issuer code of the digital asset;
the user identification code includes: at least one of a name, a gender attribute, and a valid credential number.
8. The method according to claim 1 or 2,
the method further comprises the following steps:
determining time information of the digital assets and the user identification codes in association relationship;
generating a time identification based on the time;
the mixing processing of the asset identification code and the user identification code by using a preset algorithm to generate the voucher identification code of the digital asset comprises the following steps:
and mixing the asset identification code, the user identification code and the time identification by using the preset algorithm to generate a voucher identification code of the digital asset.
9. The method according to claim 1 or 2,
the method further comprises the following steps:
receiving a service request for performing preset operation on the digital asset, wherein the service request carries a certificate identification code of the digital asset;
and analyzing the certificate identification code to obtain the asset identification code of the digital asset and the user identification code.
10. A central server, comprising:
a communication interface for communication;
a memory for storing information;
a processor, connected to the communication interface and the memory respectively, for implementing the voucher identification code processing method for providing digital assets according to any one of claims 1 to 8 by executing the computer program stored in the memory.
11. A central server, comprising: a processor and a computer program;
the processor is configured to implement the voucher identification code processing method of the digital asset provided in any one of claims 1 to 9 by executing the computer program.
12. A computer storage medium storing a computer program; the computer program, when executed, is capable of implementing a voucher identification code processing method for a digital asset as provided in any one of claims 1 to 9.
CN201710606995.XA 2017-07-24 2017-07-24 Voucher identification code processing method and system, server and storage medium Active CN107481140B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710606995.XA CN107481140B (en) 2017-07-24 2017-07-24 Voucher identification code processing method and system, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710606995.XA CN107481140B (en) 2017-07-24 2017-07-24 Voucher identification code processing method and system, server and storage medium

Publications (2)

Publication Number Publication Date
CN107481140A CN107481140A (en) 2017-12-15
CN107481140B true CN107481140B (en) 2021-02-09

Family

ID=60595968

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710606995.XA Active CN107481140B (en) 2017-07-24 2017-07-24 Voucher identification code processing method and system, server and storage medium

Country Status (1)

Country Link
CN (1) CN107481140B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109003184A (en) * 2018-06-22 2018-12-14 中链科技有限公司 Block chain assets management method and device
CN111191271B (en) * 2018-11-15 2023-06-23 国际商业机器公司 Computer-implemented method, system and storage medium
CN110335148A (en) * 2019-05-31 2019-10-15 上海芯与网络科技有限公司 Securities data parallel processing system (PPS) and method
CN110428304A (en) * 2019-07-31 2019-11-08 北京三快在线科技有限公司 A kind of order settlement system, method and device
CN110837633B (en) * 2019-10-16 2021-10-08 支付宝(杭州)信息技术有限公司 Intelligent certificate implementation method and system and readable storage medium
CN111314230A (en) * 2020-01-16 2020-06-19 深圳壹账通智能科技有限公司 Data reporting and receiving method, electronic device, computer equipment and storage medium
CN112187929B (en) * 2020-09-29 2022-10-21 中国银行股份有限公司 Resource processing method and device
CN113762958A (en) * 2021-01-04 2021-12-07 北京沃东天骏信息技术有限公司 Method and device for generating electronic certificate
CN112766856B (en) * 2021-01-25 2024-01-19 杭州友电科技有限公司 Supply chain digital management method, device, computer equipment and storage medium
CN112905615B (en) * 2021-03-02 2023-03-24 浪潮云信息技术股份公司 Distributed consistency protocol submission method and system based on sequence verification
CN113268364A (en) * 2021-06-25 2021-08-17 中国银行股份有限公司 Application program interface offline method and device based on block chain
CN113627959B (en) * 2021-09-29 2022-08-19 支付宝(杭州)信息技术有限公司 Method and device for generating digital identity of geographic marking product

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571339A (en) * 2010-12-31 2012-07-11 上海格尔软件股份有限公司 Virtual asset protection method based on intelligent key and digital signature
CN105095693A (en) * 2015-07-13 2015-11-25 江苏简果科技发展有限公司 Method and system for safely sharing digital asset based on Internet
CN106445993A (en) * 2016-07-11 2017-02-22 天津米游科技有限公司 Data fingerprint query method and device based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102571339A (en) * 2010-12-31 2012-07-11 上海格尔软件股份有限公司 Virtual asset protection method based on intelligent key and digital signature
CN105095693A (en) * 2015-07-13 2015-11-25 江苏简果科技发展有限公司 Method and system for safely sharing digital asset based on Internet
CN106445993A (en) * 2016-07-11 2017-02-22 天津米游科技有限公司 Data fingerprint query method and device based on block chain

Also Published As

Publication number Publication date
CN107481140A (en) 2017-12-15

Similar Documents

Publication Publication Date Title
CN107481140B (en) Voucher identification code processing method and system, server and storage medium
CN100468386C (en) Time marking system and progam medium for electronic files
CN109961292B (en) Block chain verification code application method, equipment and storage medium
CN109067801B (en) Identity authentication method, identity authentication device and computer readable medium
CN107145768B (en) Copyright management method and system
CN100531365C (en) IPTV authentication and authorization method, server and system
US20190312877A1 (en) Block chain mining method, device, and node apparatus
CN103107996B (en) Digital certificate download online method and system, digital certificate are provided platform
CN108696358B (en) Digital certificate management method and device, readable storage medium and service terminal
CN109983466A (en) A kind of account management system and management method, storage medium based on block chain
CN110191153B (en) Social communication method based on block chain
CN111275419B (en) Block chain wallet signature right confirming method, device and system
CN112165382B (en) Software authorization method and device, authorization server side and terminal equipment
CN107465728B (en) Information processing method, central server and storage medium for identification code
CN1972189A (en) Biometrics authentication system
CN105681340B (en) A kind of application method and device of digital certificate
US20080288410A1 (en) Content Distribution System
CN110599342A (en) Block chain-based identity information authorization method and device
CN110737915B (en) Anti-quantum-computation anonymous identity recognition method and system based on implicit certificate
CN113676332B (en) Two-dimensional code authentication method, communication device and storage medium
CN112565265A (en) Authentication method, authentication system and communication method between terminal devices of Internet of things
CN111461799B (en) Data processing method, data processing device, computer equipment and medium
CN109978479A (en) A kind of electronic invoice method of charging out, device, data sharing server and system
CN108632037B (en) Public key processing method and device of public key infrastructure
CN104301288A (en) Method and system for online identity authentication, online transaction certification, and online certification protection

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant