Disclosure of Invention
In view of the above, the present invention is directed to a method, apparatus, electronic device and computer-readable storage medium for encrypting a trusted asset using a blockchain technique, which can achieve independent, flexible, integrity, reliability and completeness property of entrustment of the trusted asset.
In order to solve the technical problems, the invention adopts the following technical scheme:
in a first aspect, an embodiment of the present application provides a method for encrypting asset hosting by using a blockchain technique, including the following steps:
selecting or creating a block chain supporting intelligent contracts as an asset hosting chain, wherein the asset hosting chain is provided with SPV contracts and asset hosting contracts used for processing the intelligent hosting of the assets, the SPV contracts are used for tracking encrypted assets, storing block head histories of the encrypted asset chains and providing SPV verification services;
the method comprises the following steps of asset escrow registration, wherein an entrusting party uses a private key signature to generate an escrow transaction on an encrypted asset chain and broadcasts the escrow transaction; the asset hosting contract processes the hosting transaction and invokes a corresponding SPV contract for validation; if the verification is passed, adding the escrow transaction into an escrow asset list of the trusting party account, and if the verification is not passed, the escrow transaction fails to be registered;
the assets are traded, the asset hosting contracts are matched with the hosted assets according to the hosting strategies set by the entrusting party, and generates and broadcasts two proposed transactions over the asset hosting chain, the two proposed transactions being used to implement the encrypted asset permutations in different principal accounts, the corresponding entrusting party signs the proposed transaction and broadcasts the signed proposal transaction on the asset hosting chain, the asset hosting contract respectively attaches the signatures of the entrusted parties after receiving the two proposed transactions signed by the entrusting party, and broadcast on the corresponding encrypted asset chain, the proposed transaction is added into the escrow asset list of the corresponding consignor account by the asset escrow contract after being confirmed by the belonging encrypted asset chain, and removing the traded escrow transaction from the escrow asset list, wherein if the asset escrow contract does not keep up with two proposed transactions signed by the principal within a certain time, the asset transaction will fail.
In a possible design of the first aspect, the escrow transaction is set using a UTXO model, and a lock script of the UTXO to be escrowed for the transaction should satisfy the following condition: before the set height is not reached, the UTXO can be spent by any two parties of the entrusting party, the entrusted party or the monitoring party for signature confirmation; after the set altitude is reached, the client's signature can cost the UTXO.
Correspondingly, the proposed transaction is set by using a UTXO model, the transaction input of the proposed transaction points to the corresponding UTXO corresponding to the managed transaction, and the locking script output by the transaction meets the following conditions: the UTXO can be spent only by signature confirmation of any two parties of an entrusting party, a trustee or a supervising party of the transaction opponent before the set height is not reached, and the UTXO can be spent by signature of the entrusting party of the transaction opponent after the set height is reached.
In another possible design of the first aspect, the escrow transaction is set by using an Account model, the escrow amount of the escrow transaction is to be frozen, and the transaction freezing of the encrypted asset needs to satisfy the following conditions: the balance of the account of the entrusting party is not less than the total amount of the funds in the frozen state, and any two parties of the entrusting party, the entrusted party or the supervising party can unfreeze and spend the funds which are not more than the amount of the escrow before the set height is not reached; after a certain height is reached, the corresponding escrow funds frozen by the user principal account are thawed.
Correspondingly, the proposed transaction is set by adopting an Account model, the transaction input amount is the escrow amount of the corresponding escrow transaction, the escrow amount output by the transaction is frozen, and the transaction freezing of the encrypted asset needs to meet the following conditions: before the set height is not reached, any two parties of the trustee, the trustee or the supervisor of the counterparty carry out signature confirmation to unfreeze and spend funds which are not higher than the escrow amount of the counterparty; after reaching a certain height, the corresponding escrow funds frozen by the counterparty are thawed.
In one possible design of the first aspect, contracts, maintained by a third party, that record the latest exchange rates of various encrypted assets are further deployed on the asset hosting chain.
In a second aspect, an embodiment of the present application provides an apparatus for encrypting asset hosting using a blockchain technique, including:
the system comprises a selecting or creating module, a verification module and a verification module, wherein the selecting or creating module is used for selecting or creating a block chain supporting intelligent contracts as an asset hosting chain, and SPV contracts and asset hosting contracts used for processing the intelligent hosting of assets are deployed on the asset hosting chain, wherein the SPV contracts are used for tracking encrypted assets, storing block head histories of the encrypted asset chains and providing SPV verification services;
the asset escrow registration module is used for generating an escrow transaction by using a private key signature on the encrypted asset chain by a trusting party and broadcasting the escrow transaction; the asset hosting contract processes the hosting transaction and invokes a corresponding SPV contract for validation; if the verification is passed, adding the escrow transaction into an escrow asset list of the trusting party account, and if the verification is not passed, the escrow transaction fails to be registered;
an asset transaction module for an asset hosting contract to match a hosted asset according to a hosting policy set by a principal, and generates and broadcasts two proposed transactions over the asset hosting chain, the two proposed transactions being used to implement the encrypted asset permutations in different principal accounts, the corresponding entrusting party signs the proposed transaction and broadcasts the signed proposal transaction on the asset hosting chain, the asset hosting contract respectively attaches the signatures of the entrusted parties after receiving two proposed transactions signed by the entrusting party, and broadcast on the corresponding encrypted asset chain, the proposed transaction is added into the escrow asset list of the corresponding trusting party account by the asset escrow contract after being confirmed by the belonging encrypted asset chain, and removing the traded escrow transaction from the escrow asset list, wherein if the asset escrow contract does not have two proposed transactions signed by the principal in good agreement within a certain time, the two proposed transactions are invalid.
In one possible design of the second aspect, the managed transaction is set by using a UTXO model, and a lock script of the UTXO managed transaction should satisfy the following condition: before the set height is not reached, the UTXO can be spent only by signature confirmation of any two parties of the entrusting party, the entrusted party or the monitoring party; after the set altitude is reached, the client's signature can cost the UTXO.
Correspondingly, the proposed transaction is set by using a UTXO model, the transaction input of the proposed transaction points to the UTXO corresponding to the managed transaction, and the locking script output by the transaction meets the following conditions: the UTXO can be spent only by signature confirmation of any two parties of an entrusting party, a trustee or a supervising party of the transaction opponent before the set height is not reached, and the UTXO can be spent by signature of the entrusting party of the transaction opponent after the set height is reached.
In another possible design of the second aspect, the escrow transaction is set by using an Account model, an escrow amount of the escrow transaction is frozen, and the transaction freezing of the encrypted asset needs to satisfy the following conditions: the balance of the account of the entrusting party is not less than the total amount of the funds in the frozen state, and any two parties of the entrusting party, the entrusted party or the supervising party can unfreeze and spend the funds which are not more than the amount of the escrow before the set height is not reached; after reaching a certain height, the corresponding escrow funds frozen by the escrow account are thawed.
Correspondingly, the proposed transaction is set by adopting an Account model, the transaction input amount is the escrow amount of the corresponding escrow transaction, the escrow amount output by the transaction is frozen, and the transaction freezing of the encrypted asset needs to meet the following conditions: before the set height is not reached, any two parties of the trustee, the trustee or the supervisor of the counterparty carry out signature confirmation to unfreeze and spend funds which are not higher than the escrow amount of the counterparty; after reaching a certain height, the corresponding escrow funds frozen by the counterparty are thawed.
In one possible design of the second aspect, contracts, maintained by third parties, that record the latest exchange rates of various encrypted assets are further deployed on the asset hosting chain.
In a third aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the computer program is executed by the processor to perform the above method for encrypting asset hosting by using a block chain technique.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the method for encrypting asset hosting by using a block chain technique described above.
The invention has the following beneficial effects:
(1) the method has independence, realizes management of encrypted assets on a block chain, and is not independently controlled by a client, a beneficiary and any other third party;
(2) the method has flexibility, and under the mechanism, the block chain can simultaneously hold various encrypted assets with different types, including homogeneous and heterogeneous encrypted assets;
(3) the system has integrity, can completely record the processes of mutual conversion and transaction of various encrypted assets and expenditure of each charge, complete most of automatic accounting and bookkeeping activities of operation, maintain the integrity of the trusting encrypted assets and provide a basis for tax payment;
(4) the system has reliability, can accept and execute the transaction and payment instruction of the trustee which accords with the content agreed in advance, and refuses to execute the transaction and payment instruction of the trustee which does not accord with the content agreed in advance;
(5) the system has completeness, can perform intelligent contract operation so as to provide support for a plurality of necessary decisions, such as conditional automatic clearing execution, extraction of management fees and transaction related fees and the like; and the related intelligent contract operation of liability and guarantee can be supported.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an embodiment of the present invention discloses a method for encrypting a trusted asset by using a block chain technique, including the following steps:
and S10, selecting or creating a blockchain supporting the intelligent contract as an asset hosting chain, wherein the asset hosting chain is deployed with an SPV (simple Payment Verification) contract and an asset hosting contract for processing the asset intelligent hosting, and the SPV contract is used for tracking the encrypted asset, storing the blockhead history of the encrypted asset chain and providing SPV Verification service.
According to step S10, the asset hosting chain set by the blockchain technology may be used to host encrypted assets on various encrypted asset chains through an asset hosting contract, and the tracking and verification of the encrypted hosted assets may be realized through an SPV contract, so as to ensure the security and the historical transaction traceability of the hosted assets.
In other application examples, contracts which are maintained by a third party and record the latest exchange rate of various encrypted assets can be further deployed on the asset hosting chain. The asset hosting contract selects the exchange rate contract maintained by the third party as an accounting basis and can be used for accounting the digital assets of the consignor.
S20, the asset hosting registration, the entrusting party uses the private key signature to generate a hosting transaction on the encrypted asset chain, and broadcasts the hosting transaction; the asset hosting contract processes the hosting transaction and calls a corresponding SPV contract for verification; if the verification is passed, the escrow transaction is added to an escrow asset list of the principal account, and if the verification is not passed, the escrow transaction fails to register.
The asset escrow registration is a process that an entrusting party registers an asset to be transacted on an encrypted asset chain, generates an escrow transaction and adds the escrow transaction to an escrow asset list of an account of the entrusting party. Before asset hosting registration, the entrusting party should have a registered account number on the asset hosting contract, and if the registered account number is not available, the account number needs to be registered first.
After asset hosting registration, the asset hosting dating makes transaction matches according to the hosted asset lists registered by different consignor accounts. Proceeding to S30, the asset is traded, the asset hosting contract matches the hosted asset according to a hosting policy set by the principal, and two proposed transactions are generated and broadcast on the asset hosting chain, the two proposed transactions being used to implement encrypted asset replacement in different principal accounts, the corresponding entrusting party signs the proposed transaction and broadcasts on the asset hosting chain, the asset hosting chain attaches the signature of the entrusted party after receiving two proposed transactions signed by the entrusting party, and broadcast on the corresponding encrypted asset chain, the proposed transaction is added into the escrow asset list of the corresponding trusting party account by the asset escrow contract after being confirmed by the belonging encrypted asset chain, and removing the traded escrow transaction from the escrow asset list, wherein if the asset escrow contract does not have two proposed transactions signed by the principal in good agreement within a certain time, the two proposed transactions are invalid.
In step S30, the asset hosting contract tracks the hosting policies preset by each consignor, the accounting price is not lower than a certain proportion when trading and exchanging assets, the asset management fee is based on the performance rating rate, and after matching the hosting trades meeting the hosting policies, the asset management fee timely generates and broadcasts suggested trades on the hosting asset chain, so that the hosting trades meeting the requirements can be efficiently transacted. A common signature of the entrusting party and the entrusted party is required during the transaction because the entrusted party has the advising and partial signing rights to operate the entrusted asset but cannot have ownership of the entrusted asset, whereas if only the entrusted party's signature allows the transaction to be effected, the entrusting party's asset operation is not controllable. Of course, it will be understood by those skilled in the art that it may also be a common signature of one neutral supervisor trusted by both the trusted party and the trusted party.
In the implementation process of the current block chain technology, there are two record storage manners, i.e., an un-spent Transaction Output (UTXO) mode and an Account mode, so that in the specific application example of the present invention, the managed Transaction and the proposed Transaction respectively adopt the UTXO model and the Account model, which are described in detail below.
In one specific application example of the present application, in the UXTO mode, in step S20, the managed transaction is set by using the UTXO model, and the lock script of the UTXO to be managed transaction should satisfy the following conditions: before the set height is not reached, the UTXO can be spent only by signature confirmation of any two parties of the entrusting party, the entrusted party or the monitoring party; after the set altitude is reached, the client's signature can cost the UTXO. In step S30, the proposed transaction is also set using the UTXO model, the transaction input of which points to the corresponding UTXO corresponding to the escrow transaction, and the lock script output by the transaction should satisfy the following conditions: the UTXO can be spent only by signature confirmation of any two parties of an entrusting party, a trustee or a supervising party of the transaction opponent before the set height is not reached, and the UTXO can be spent by signature of the entrusting party of the transaction opponent after the set height is reached. The reason for setting the height limit is that the escrow essentially refers the principal to give the principal the management right of the funds to the consignee for a period of time, and the setting of the period of time corresponds to the setting of the height in the block chain (before the expiration height), and the consignee has the right to manage the funds.
In another specific application example of the present application, in the Account mode, in step S20, the escrow transaction is set by using an Account model, the escrow amount of the escrow transaction is frozen, and the transaction freezing of the encrypted asset needs to satisfy the following conditions: the balance of the account of the entrusting party is not less than the total amount of the funds in the frozen state, and any two parties of the entrusting party, the entrusted party or the supervising party can unfreeze and spend the funds which are not more than the amount of the escrow before the set height is not reached; after reaching a certain height, the corresponding escrow funds frozen by the escrow account are thawed. In step S30, the proposed transaction is set using Account model, the transaction input amount is the escrow amount of the corresponding escrow transaction, the escrow amount output by the transaction is frozen, and the transaction freezing of the encrypted asset needs to satisfy the following conditions: before the set height is not reached, any two parties of the trustee, the trustee or the supervisor of the counterparty carry out signature confirmation to unfreeze and spend funds which are not higher than the escrow amount of the counterparty; after reaching a certain height, the corresponding escrow funds frozen by the counterparty are thawed.
The electronic device of the embodiment of the present invention is described in detail below with reference to fig. 2. On a hardware level, the electronic device includes a processor, and optionally an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a Non-Volatile Memory (NVM), such as at least one disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be interconnected by an internal bus, which may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. Wherein the bus can be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 2, but this does not represent only one bus or one type of bus.
The memory for storing the program, in particular, the program may include program code including computer operating instructions, the memory may include memory and non-volatile storage, and provide instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form the content recommendation device on a logic level. And the processor is used for executing the program stored in the memory and is specifically used for executing the method operation executed when the server is taken as an execution main body.
The method for encrypting a trusted asset using block chain technology as described above in the embodiment of the present invention illustrated in fig. 1 may be applied to or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), etc., and may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component. The various methods, steps and logic blocks disclosed in embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in a decoder. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
Of course, the electronic device in the embodiment of the present specification does not exclude other implementations, such as a logic device or a combination of software and hardware, besides a software implementation, that is, the execution subject of the following processing flow is not limited to each logic unit, and may be hardware or a logic device.
Embodiments of the present invention also provide a computer-readable storage medium storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to perform operations comprising:
selecting or creating a block chain supporting intelligent contracts as an asset hosting chain, wherein the asset hosting chain is provided with SPV contracts and asset hosting contracts used for processing the intelligent hosting of the assets, the SPV contracts are used for tracking encrypted assets, storing block head histories of the encrypted asset chains and providing SPV verification services;
the method comprises the following steps of asset escrow registration, wherein an entrusting party uses a private key signature to generate an escrow transaction on an encrypted asset chain and broadcasts the escrow transaction; the asset hosting contract processes the hosting transaction and invokes a corresponding SPV contract for validation; if the verification is passed, adding the escrow transaction into an escrow asset list of the trusting party account, and if the verification is not passed, the escrow transaction fails to be registered;
asset trading, wherein an asset hosting contract matches a hosted asset according to a hosting policy set by a principal and generates and broadcasts two proposed trades on an asset hosting chain, the two proposed trades being used to implement encrypted asset replacement in different principal accounts, the corresponding entrusting party signs the proposed transaction and broadcasts on the asset hosting chain, the asset hosting chain attaches the signature of the entrusted party after receiving two proposed transactions signed by the entrusting party, and broadcast on the corresponding encrypted asset chain, the proposed transaction is added into the escrow asset list of the corresponding trusting party account by the asset escrow contract after being confirmed by the belonging encrypted asset chain, and removing the traded escrow transaction from the escrow asset list, wherein if the asset escrow contract does not have two proposed transactions signed by the principal in good agreement within a certain time, the two proposed transactions are invalid.
The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
Referring to fig. 3, a schematic structural diagram of an apparatus 10 for encrypting a trusted asset using blockchain technology according to another embodiment of the present invention is shown, which includes a selection or creation module 101, an asset hosting registration module 102 and an asset transaction module 103, corresponding to an embodiment of the method of the present invention.
The selection or creation module 101 is configured to select or create a blockchain supporting intelligent contracts as an asset hosting chain, on which SPV contracts and asset hosting contracts for handling intelligent hosting of assets are deployed, wherein the SPV contracts are used for tracking encrypted assets, storing blockhead histories of the encrypted asset chains, and providing SPV verification services.
According to the selection or creation module 101, the asset hosting chain set by using the blockchain technology can host encrypted assets on various encrypted asset chains through the asset hosting contract, and the tracking and verification of the encrypted hosted assets are realized through the SPV contract, so that the security and the historical transaction traceability of the hosted assets are ensured.
In other application examples, contracts which are maintained by a third party and record the latest exchange rate of various encrypted assets can be further deployed on the asset hosting chain. The asset hosting contract selects the exchange rate contract maintained by the third party as an accounting basis and can be used for accounting the digital assets of the consignor.
The asset hosting registration module 102 is used for the entrusting party to generate a hosting transaction on the encrypted asset chain by using a private key signature and broadcast the hosting transaction; the asset hosting contract processes the hosting transaction and invokes a corresponding SPV contract for validation; if the verification is passed, the escrow transaction is added to an escrow asset list of the principal account, and if the verification is not passed, the escrow transaction fails to register.
The asset escrow registration is a process that an entrusting party registers an asset to be transacted on an encrypted asset chain, generates an escrow transaction and adds the escrow transaction to an escrow asset list of an account of the entrusting party. Before asset hosting registration, the entrusting party should have a registered account number on the asset hosting contract, and if the registered account number is not available, the account number needs to be registered first.
After asset hosting registration, the asset hosting dating makes transaction matches according to the hosted asset lists registered by different consignor accounts. Entering into the asset transaction module 103 for processing, the asset hosting contract matches the hosted asset according to the hosting policy set by the principal, and two proposed transactions are generated and broadcast on the asset hosting chain, the two proposed transactions being used to implement encrypted asset replacement in different principal accounts, the corresponding entrusting party signs the proposed transaction and broadcasts on the asset hosting chain, the asset hosting chain attaches the signature of the entrusted party after receiving two proposed transactions signed by the entrusting party, and broadcast on the corresponding encrypted asset chain, the proposed transaction is added into the escrow asset list of the corresponding trusting party account by the asset escrow contract after being confirmed by the belonging encrypted asset chain, and removing the traded escrow transaction from the escrow asset list, wherein if the asset escrow contract does not have two proposed transactions signed by the principal in good agreement within a certain time, the two proposed transactions are invalid.
An asset transaction module 103 for an asset hosting contract matching a hosted asset according to a hosting policy set by a principal, and generates and broadcasts two proposed transactions over the asset hosting chain, the two proposed transactions being used to implement the encrypted asset permutations in different principal accounts, the corresponding entrusting party signs the proposed transaction and broadcasts on the asset hosting chain, the asset hosting chain attaches the signature of the entrusted party after receiving two proposed transactions signed by the entrusting party, and broadcast on the corresponding encrypted asset chain, the proposed transaction is added into the escrow asset list of the corresponding trusting party account by the asset escrow contract after being confirmed by the belonging encrypted asset chain, and removing the traded escrow transaction from the escrow asset list, wherein if the asset escrow contract does not have two proposed transactions signed by the principal in good agreement within a certain time, the two proposed transactions are invalid.
In the asset transaction module, an asset hosting contract tracks a hosting strategy preset by each consignor, the accounting price is not lower than a certain proportion during asset transaction and interchange, the asset management fee is matched with the hosting transaction which is set according to the hosting strategy according to the grading rate of performance and the like for each consignor, and then the suggested transaction is generated and broadcast on a hosting asset chain in time, so that the hosting transaction which is set according to the requirement can be efficiently transacted. A common signature of the entrusting party and the entrusted party is required during the transaction because the entrusted party has the advising and partial signing rights to operate the entrusted asset but cannot have ownership of the entrusted asset, whereas if only the entrusted party's signature allows the transaction to be effected, the entrusting party's asset operation is not controllable. Of course, it will be understood by those skilled in the art that it may also be a common signature of one neutral supervisor trusted by both the trusted party and the trusted party.
In the implementation process of the current block chain technology, there are two record storage manners, i.e., an un-spent Transaction Output (UTXO) mode and an Account mode, so that in the specific application example of the present invention, the managed Transaction and the proposed Transaction respectively adopt the UTXO model and the Account model, which are described in detail below.
In one specific application example of the present application, in the UXTO mode, in the asset hosting registration module 102, the hosted transaction is set by using the UTXO model, and the lock script of the UTXO to be hosted transaction should satisfy the following conditions: before the set height is not reached, the UTXO can be spent only by signature confirmation of any two parties of the entrusting party, the entrusted party or the monitoring party; after the set altitude is reached, the client's signature can cost the UTXO. Correspondingly, in the asset transaction module 103, the proposed transaction is also set by using the UTXO model, the transaction input of the proposed transaction points to the corresponding UTXO corresponding to the managed transaction, and the lock script output by the transaction should satisfy the following conditions: the UTXO can be spent only by signature confirmation of any two parties of an entrusting party, a trustee or a supervising party of the transaction opponent before the set height is not reached, and the UTXO can be spent by signature of the entrusting party of the transaction opponent after the set height is reached. The reason for setting the height limit is that the escrow essentially refers the principal to give the principal the management right of the funds to the consignee for a period of time, and the setting of the period of time corresponds to the setting of the height in the block chain (before the expiration height), and the consignee has the right to manage the funds.
In another specific application example of the present application, in the Account mode, in the asset escrow registration module 102, the escrow transaction is set by the Account model, the escrow amount of the escrow transaction is frozen, and the transaction freezing of the encrypted asset needs to satisfy the following conditions: the balance of the account of the entrusting party is not less than the total amount of the funds in the frozen state, and any two parties of the entrusting party, the entrusted party or the supervising party can unfreeze and spend the funds which are not more than the amount of the escrow before the set height is not reached; after reaching a certain height, the corresponding escrow funds frozen by the escrow account are thawed. Correspondingly, in the asset transaction module 103, the proposed transaction is set by using an Account model, the transaction input amount is the escrow amount of the corresponding escrow transaction, the escrow amount output by the transaction is frozen, and the transaction freezing of the encrypted asset needs to satisfy the following conditions: before the set height is not reached, any two parties of the trustee, the trustee or the supervisor of the counterparty carry out signature confirmation to unfreeze and spend funds which are not higher than the escrow amount of the counterparty; after reaching a certain height, the corresponding escrow funds frozen by the counterparty are thawed.
It is to be understood that the exemplary embodiments described herein are illustrative and not restrictive. Although one or more embodiments of the present invention have been described with reference to the accompanying drawings, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims.