CN110443077A - Processing method, device and the electronic equipment of digital asset - Google Patents

Processing method, device and the electronic equipment of digital asset Download PDF

Info

Publication number
CN110443077A
CN110443077A CN201910738919.3A CN201910738919A CN110443077A CN 110443077 A CN110443077 A CN 110443077A CN 201910738919 A CN201910738919 A CN 201910738919A CN 110443077 A CN110443077 A CN 110443077A
Authority
CN
China
Prior art keywords
digital asset
terminal
digital
information
identity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910738919.3A
Other languages
Chinese (zh)
Inventor
张兵
袁力
邸烁
徐磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Alshan Block Chain Alliance Technology Co Ltd
Original Assignee
Beijing Alshan Block Chain Alliance Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Alshan Block Chain Alliance Technology Co Ltd filed Critical Beijing Alshan Block Chain Alliance Technology Co Ltd
Priority to CN201910738919.3A priority Critical patent/CN110443077A/en
Publication of CN110443077A publication Critical patent/CN110443077A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • G06Q30/0185Product, service or business identity fraud

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Marketing (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Accounting & Taxation (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application provides a kind of processing method of digital asset, device and electronic equipments, are related to digital asset technical field, can solve the lower technical problem of accuracy that digital asset claims result.The specific scheme is that receiving first digital asset ownership person's information with digital signature that first terminal is sent, and the digital signature is verified;If the digital signature authentication passes through, confirm that the first digital asset ownership person's information is real name information;The identity of second terminal is authenticated according to the real name information, obtains identity authentication result, the second terminal is the terminal for sending the first digital asset and claiming application;If the identity authentication result is to pass through, the first digital asset is sent to the second terminal.

Description

Processing method, device and the electronic equipment of digital asset
Technical field
This application involves digital asset technical field, more particularly, to a kind of processing method of digital asset, device and Electronic equipment.
Background technique
In the period of current digital Age is fast-developing, the digitalized data that every field and scene generate is more and more, These digitized data can be referred to as digital asset (Digital assets).Specifically, digital asset refers to by enterprise Or it is personal possess or control, to hold existing for spreadsheet format in daily activities in case selling or being in and produce Non-monetary asset in the process.
Therefore, these digital assets eventually belong to some enterprise or someone, by the real ownership person of digital asset Possess or controls.For example, article, digitized house property, vehicle, check, dividend income etc..
But ownership person's identity of digital asset is difficult to confirm, this just causes when user claims a certain digital asset, difficult With verify claim the digital asset user whether be the digital asset real ownership person, so that digital asset be made to claim result Accuracy it is lower.
Summary of the invention
The processing method for being designed to provide a kind of digital asset, device and the electronic equipment of the application, to solve number Word assets claim the lower technical problem of accuracy of result.
A kind of processing method of digital asset provided by the invention, comprising:
First digital asset ownership person's information with digital signature that first terminal is sent is received, and to the digital signature It is verified;
If the digital signature authentication passes through, confirm that the first digital asset ownership person's information is real name information;
The identity of second terminal is authenticated according to the real name information, obtains identity authentication result, described second eventually The terminal of application is claimed for the first digital asset of transmission in end;
If the identity authentication result is to pass through, the first digital asset is sent to the second terminal.
Further, the encryption code key of the digital signature is the private key of the first terminal;
It is described that the digital signature is verified, comprising:
The digital signature is verified by public key encryption algorithm using the public key of the first terminal.
Further, further includes:
If the identity authentication result is not pass through, the prompt information of identity mistake is sent to the second terminal.
It is further, described that first digital asset is sent to after the second terminal, further includes:
The state of having claimed is set by the state of first digital asset.
Further, confirmation the first digital asset ownership person's information is after real name information, further includes:
The real name information is stored in block chain network.
Further, further includes:
Multiple digital assets are identified, are not claimed the second digital asset of state;
The recommended information of second digital asset is sent to and the matched third terminal of the second digital asset.
Further, described that multiple digital assets are identified, after the second digital asset for not claimed state, Further include:
It is set as the state of second digital asset to claim publicity state.
A kind of processing unit of digital asset provided by the invention, comprising:
Authentication module, for receiving first digital asset ownership person's information with digital signature of first terminal transmission, and The digital signature is verified;
Confirmation module, for confirming the first digital asset ownership person's information when the digital signature authentication passes through For real name information;
Authentication module obtains authentication knot for authenticating according to the real name information to the identity of second terminal Fruit, the second terminal are the terminal for sending the first digital asset and claiming application;
Sending module, for the identity authentication result be by when, the first digital asset is sent to described second Terminal.
A kind of electronic equipment provided by the invention, including memory, processor, being stored in the memory can be described The step of computer program run on processor, the processor realizes above-mentioned method when executing the computer program.
A kind of computer-readable medium of non-volatile program code that can be performed with processor provided by the invention, institute Stating program code makes the processor execute above-mentioned method.
In the present solution, since the first digital asset ownership person's information received is attached to digital signature, by being signed to number Name is verified, and just the authenticity of the digital signature can be verified using public key encryption algorithm, to judge to receive To the first digital asset ownership person information with the digital signature whether be true ownership person's information, therefore, if should Digital signature is verified, and can confirm that the first digital asset ownership person's information is true and reliable real name information, with Convenient for when the first digital asset is claimed in second terminal application, can be carried out using identity of the real name information to second terminal can First digital asset is just sent to second terminal if identity authentication result is to pass through by the authentication leaned on, to guarantee according to body Part authentication result correctly handles the first digital asset, and preventing non-first digital asset, really ownership person has claimed the One digital asset, has ensured the safety of digital asset during claiming, to promote the accuracy that digital asset claims result.
Detailed description of the invention
It, below will be to specific in order to illustrate more clearly of the application specific embodiment or technical solution in the prior art Embodiment or attached drawing needed to be used in the description of the prior art be briefly described, it should be apparent that, it is described below Attached drawing is some embodiments of the application, for those of ordinary skill in the art, before not making the creative labor It puts, is also possible to obtain other drawings based on these drawings.
Fig. 1 shows the flow chart of the processing method of digital asset provided by the embodiment of the present application;
Fig. 2 shows the system framework figures provided by the embodiment of the present application about digital asset;
Fig. 3 shows the flow chart of user identity authentication provided by the embodiment of the present application;
Fig. 4 shows the flow chart that digital asset provided by the embodiment of the present application is claimed;
Fig. 5 shows the structural schematic diagram of a kind of electronic equipment provided by the embodiment of the present application.
Specific embodiment
Technical solution of the present invention is clearly and completely described below in conjunction with embodiment, it is clear that described reality Applying example is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, the common skill in this field Art personnel every other embodiment obtained without making creative work belongs to the model that the present invention protects It encloses.
The feature and exemplary embodiment of various aspects of the invention is described more fully below.In following detailed description In, many details are proposed, in order to provide complete understanding of the present invention.But to those skilled in the art It will be apparent that the present invention can be implemented in the case where not needing some details in these details.Below to implementation The description of example is used for the purpose of providing by showing example of the invention and better understanding of the invention.The present invention never limits In any concrete configuration set forth below and algorithm, but cover under the premise of without departing from the spirit of the present invention element, Any modification, replacement and the improvement of component and algorithm.In the the accompanying drawings and the following description, well known structure and skill is not shown Art is unnecessary fuzzy to avoid causing the present invention.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
In addition, the term " includes " being previously mentioned in description of the invention and " having " and their any deformation, it is intended that It is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not have It is defined in listed step or unit, but optionally further comprising the step of other are not listed or unit, or optionally It further include the other step or units intrinsic for these process, methods, product or equipment.
Currently, ownership person's identity of digital asset is difficult to confirm, this just causes when user claims a certain digital asset, difficult With verify claim the digital asset user whether be the digital asset real ownership person, so that digital asset be made to claim result Accuracy it is lower, be based on this, a kind of processing method of digital asset, device and electronics provided by the embodiments of the present application are set It is standby, it can solve the lower technical problem of accuracy that digital asset existing in the prior art claims result.
For the processing convenient for understanding the present embodiment, first to a kind of digital asset disclosed in the embodiment of the present application Method, apparatus and electronic equipment describe in detail.
A kind of processing method of digital asset provided by the embodiments of the present application, as shown in Figure 1, comprising:
S11: first digital asset ownership person's information with digital signature that first terminal is sent is received, and to digital signature It is verified.
Wherein, digital signature is also known as public key digital signature, is a kind of similar common physical signature write on paper, still The technology in public key encryption field has been used to realize, the method for identifying digital information.A set of digital signature usually defines two kinds Complementary operation, one is used to sign, another is for verifying.In other words, digital signature is exactly the sender of only information Others the number of segment word string that can not forge that could be generated, this number of segment word string are also that send information to the sender of information true simultaneously One valid certificates of reality.Digital signature is the application of non-symetric key cryptography Yu digital digest technology.
S12: judging whether digital signature authentication passes through, if so, carrying out step S13.
In this step, judge whether the first digital asset ownership person information is the true of information by verifying the digital signature Real sender, to verify the case where others forges first digital asset ownership person's information, therefore, digital signature is to information One valid certificates of sender's transmission information authenticity.
S13: first digital asset ownership person's information of confirmation is real name information.
If digital signature authentication passes through, it can confirm that the first digital asset ownership person's information is true and reliable reality Name information.
S14: it is authenticated according to identity of the real name information to second terminal, obtains identity authentication result.
Wherein, second terminal is the terminal for sending the first digital asset and claiming application.First is claimed in second terminal application When digital asset, reliable authentication can be carried out using identity of the real name information in step S13 to second terminal.
S15: judge whether identity authentication result is to pass through, if so, carrying out step S16.
S16: the first digital asset is sent to second terminal.
If identity authentication result is to pass through, the first digital asset is just sent to second terminal, to guarantee according to identity Authentication result correctly handles the first digital asset, and preventing non-first digital asset, really ownership person has claimed first Digital asset, has ensured the safety of digital asset during claiming, to promote the accuracy that digital asset claims result.
Therefore, in the present embodiment, in order to solve user identity authentication, using number authentication, system user makes Used time needs to carry out real-name authentication, the real name information after user authentication, after handling by system, by information preservation to block chain In network, when user authentication, is verified, and only verifies the authenticity that successfully just can prove that user identity.
It should be noted that needing to solve there are two problem, one is recognizing for user identity in the claiming of digital asset Card, one is to claim management to digital asset.As shown in Fig. 2, the certification of identity and right can be carried out after logging in system by user The management of digital asset, such as search for and claim assets etc..
In order to which more accurately verifying digital signature, the encryption code key of digital signature are the private key of first terminal;This implementation In example, above-mentioned the step of verifying to digital signature (in step S11) be may comprise steps of:
Digital signature is verified by public key encryption algorithm using the public key of first terminal.
As shown in figure 3, the signature private key that user identity proves, only user oneself save, other people have no way of finding out about it, This is also the reason of can carrying out digital identification authentication.
By using private key signature technology, it was demonstrated that the true identity of digital asset claimant prevents the forgery of user identity, It ensures that digital asset is not claimed the loss for leading to assets arbitrarily by other people, while also achieving and the assets claimed are carried out effectively Tracking.
It, can be the following steps are included: if authentication knot in the present embodiment for the ease of the user of timely notification error Fruit is not pass through, then the prompt information of identity mistake is sent to second terminal.
Therefore, the user of second terminal can know in time itself be not the digital asset ownership person's information, can not recognize The digital asset is received, claims application process to avoid second terminal progress is unnecessary.
For the ease of the management of the digital asset to different conditions, the state of digital asset may include: to have claimed;This reality It applies in example, can also include following step after above-mentioned the step of first digital asset is sent to second terminal (i.e. step S16) It is rapid: to set the state of having claimed for the state of the first digital asset.
As shown in figure 4, after the approval, the state of system records user claimed application and change the digital asset.Such as After fruit objection does not occur at the appointed time, which will return user to own, and by assets registration and preservation into block chain network, In order to effective management of the digital asset to various different conditions.
Real name information is tampered in order to prevent, is confirming the step of first digital asset ownership person's information is real name information It, can be the following steps are included: real name information be stored in block chain network after (i.e. step S13).
As shown in figure 3, the real name information of signature is uploaded to system by user carries out authentication, after system is verified, Identity information is saved in block chain network, so that information be prevented to be tampered.
In order to effectively be managed digital asset, the state of digital asset may include: not claim;The present embodiment In, can with the following steps are included:
(1) multiple digital assets are identified, is not claimed the second digital asset of state.
(2) recommended information of the second digital asset is sent to and the matched third terminal of the second digital asset.
Illustratively, digital asset management platform can be searched for from internet imports such as article digital asset, or logical It crosses and subscribes to the agreement with cooperative institution, the digital asset in cooperative institution is imported into digital asset management platform.Digital asset pipe Platform can identify the digital asset that do not claim relevant to user's possibility, and matched digital asset is notified user, in order to User can learn the digital asset that can be claimed in time, improve the Discussing Convenience that digital asset claims process.
In order to carry out significantly more efficient management to digital asset, the state of digital asset may include: to claim publicity.To more After the step of a digital asset is identified, is not claimed the second digital asset of state, can with the following steps are included: The state of the second digital asset is set to claim publicity state.
As shown in figure 4, also may search for the digital asset for claiming publicity state, i.e., in platform after user logs on to system The digital asset that do not claim.When user has found the digital asset for having oneself, Yong Huke in the digital asset for claiming publicity state To submit the application of claiming of digital asset to system, the digital asset that system audit user submits proves information and identity information. Consequently facilitating user quickly and easily finds the digital asset to be obtained.
For the prior art, in the period of current digital Age is fast-developing, generated in every field and scene Digitalized data is more and more, and is getting faster, these digitized data can be referred to as digital asset, wherein for example literary Chapter, digitized house property, vehicle, check, dividend income etc. eventually belong to some entity, and entity can provide credentials table Bright digital asset returns it all.But currently when claiming these digital assets, none generally acknowledges that reliable system can mention For the proof of identification of entity, claiming for digital asset is caused to encounter practical difficulty.
By carrying out ciphering signature verifying using block chain network, solve digital asset claims overall process.Nowadays area Block chain network is exactly the trustable network that all nodes hold partial data, the ciphering signature mechanism based on public and private key, from And solve the trust problem of the whole network, the whole network believed characteristic based on block chain, can be solved digital asset claim in encounter Problem.
In the present embodiment, the complete solution party of block chain Technology design is based on for the overall process of claiming of digital asset Case.Block chain is the distributed network that ciphering signature verifying is carried out based on public private key pair data, and claiming for digital asset is to not having There is the digital asset of owner to carry out the process of Signature Confirmation, it is thereby achieved that the digital asset based on block chain technology was claimed Journey.
A kind of processing unit of digital asset provided by the embodiments of the present application, comprising:
Authentication module, for receiving first digital asset ownership person's information with digital signature of first terminal transmission, and Digital signature is verified;
Confirmation module, for when digital signature authentication passes through, confirming first digital asset ownership person's information for real name letter Breath;
Authentication module obtains identity authentication result for authenticating according to identity of the real name information to second terminal, and Two terminals are the terminal for sending the first digital asset and claiming application;
Sending module, for identity authentication result be by when, the first digital asset is sent to second terminal.
The processing unit of digital asset provided by the embodiments of the present application, the processing with digital asset provided by the above embodiment Method technical characteristic having the same reaches identical technical effect so also can solve identical technical problem.
A kind of electronic equipment provided by the embodiments of the present application, as shown in figure 5, electronic equipment 4 includes memory 41, processor 42, the computer program that can be run on the processor is stored in the memory, the processor executes the calculating The step of realizing method provided by the above embodiment when machine program.
Referring to Fig. 5, electronic equipment further include: bus 43 and communication interface 44, processor 42, communication interface 44 and memory 41 are connected by bus 43;Processor 42 is for executing the executable module stored in memory 41, such as computer program.
Wherein, memory 41 may include high-speed random access memory (RAM, Random Access Memory), It may further include nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.By at least One communication interface 44 (can be wired or wireless) realizes the communication between the system network element and at least one other network element Connection, can be used internet, wide area network, local network, Metropolitan Area Network (MAN) etc..
Bus 43 can be isa bus, pci bus or eisa bus etc..The bus can be divided into address bus, data Bus, control bus etc..Only to be indicated with a four-headed arrow convenient for indicating, in Fig. 5, it is not intended that an only bus or A type of bus.
Wherein, memory 41 is for storing program, and the processor 42 executes the journey after receiving and executing instruction Sequence, method performed by the device that the process that aforementioned the application any embodiment discloses defines can be applied in processor 42, Or it is realized by processor 42.
Processor 42 may be a kind of IC chip, the processing capacity with signal.During realization, above-mentioned side Each step of method can be completed by the integrated logic circuit of the hardware in processor 42 or the instruction of software form.Above-mentioned Processor 42 can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), network Processor (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (Digital Signal Processing, abbreviation DSP), specific integrated circuit (Application Specific Integrated Circuit, referred to as ASIC), ready-made programmable gate array (Field-Programmable Gate Array, abbreviation FPGA) or other are programmable Logical device, discrete gate or transistor logic, discrete hardware components.It may be implemented or execute in the embodiment of the present application Disclosed each method, step and logic diagram.General processor can be microprocessor or the processor is also possible to appoint What conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present application, can be embodied directly in hardware decoding processing Device executes completion, or in decoding processor hardware and software module combination execute completion.Software module can be located at Machine memory, flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register etc. are originally In the storage medium of field maturation.The storage medium is located at memory 41, and processor 42 reads the information in memory 41, in conjunction with Its hardware completes the step of above method.
It is provided by the embodiments of the present application it is a kind of with processor can be performed non-volatile program code it is computer-readable Medium, said program code make the processor execute method provided by the above embodiment.
The computer-readable medium of the non-volatile program code provided by the embodiments of the present application that can be performed with processor, With processing method, device and the electronic equipment technical characteristic having the same of digital asset provided by the above embodiment, so Also it can solve identical technical problem, reach identical technical effect.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extent Pipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according to So be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features into Row equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solution The range of scheme.

Claims (10)

1. a kind of processing method of digital asset characterized by comprising
First digital asset ownership person's information with digital signature that first terminal is sent is received, and the digital signature is carried out Verifying;
If the digital signature authentication passes through, confirm that the first digital asset ownership person's information is real name information;
The identity of second terminal is authenticated according to the real name information, obtains identity authentication result, the second terminal is Send the terminal that the first digital asset claims application;
If the identity authentication result is to pass through, the first digital asset is sent to the second terminal.
2. the method according to claim 1, wherein the encryption code key of the digital signature is the first terminal Private key;
It is described that the digital signature is verified, comprising:
The digital signature is verified by public key encryption algorithm using the public key of the first terminal.
3. the method according to claim 1, wherein further include:
If the identity authentication result is not pass through, the prompt information of identity mistake is sent to the second terminal.
4. the method according to claim 1, wherein described be sent to the second terminal for the first digital asset Later, further includes:
The state of having claimed is set by the state of first digital asset.
5. the method according to claim 1, wherein confirmation the first digital asset ownership person's information is After real name information, further includes:
The real name information is stored in block chain network.
6. the method according to claim 1, wherein further include:
Multiple digital assets are identified, are not claimed the second digital asset of state;
The recommended information of second digital asset is sent to and the matched third terminal of the second digital asset.
7. according to the method described in claim 6, not recognized it is characterized in that, described identify multiple digital assets After second digital asset of neck state, further includes:
It is set as the state of second digital asset to claim publicity state.
8. a kind of processing unit of digital asset characterized by comprising
Authentication module, for receiving first digital asset ownership person's information with digital signature of first terminal transmission, and to institute Digital signature is stated to be verified;
Confirmation module, for when the digital signature authentication passes through, confirming that the first digital asset ownership person's information is real Name information;
Authentication module obtains identity authentication result, institute for authenticating according to the real name information to the identity of second terminal Stating second terminal is the terminal for sending the first digital asset and claiming application;
Sending module, for the identity authentication result be by when, the first digital asset is sent to the second terminal.
9. a kind of electronic equipment, including memory, processor, be stored in the memory to run on the processor Computer program, which is characterized in that the processor realizes that the claims 1 to 7 are any when executing the computer program The step of method described in item.
10. a kind of computer-readable medium for the non-volatile program code that can be performed with processor, which is characterized in that described Program code makes the processor execute described any the method for claim 1 to 7.
CN201910738919.3A 2019-08-09 2019-08-09 Processing method, device and the electronic equipment of digital asset Pending CN110443077A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910738919.3A CN110443077A (en) 2019-08-09 2019-08-09 Processing method, device and the electronic equipment of digital asset

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910738919.3A CN110443077A (en) 2019-08-09 2019-08-09 Processing method, device and the electronic equipment of digital asset

Publications (1)

Publication Number Publication Date
CN110443077A true CN110443077A (en) 2019-11-12

Family

ID=68434643

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910738919.3A Pending CN110443077A (en) 2019-08-09 2019-08-09 Processing method, device and the electronic equipment of digital asset

Country Status (1)

Country Link
CN (1) CN110443077A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110929231A (en) * 2019-12-06 2020-03-27 北京阿尔山区块链联盟科技有限公司 Digital asset authorization method and device and server
CN111046266A (en) * 2019-12-11 2020-04-21 北京阿尔山区块链联盟科技有限公司 Data management method and device and server
CN111090700A (en) * 2019-12-13 2020-05-01 北京阿尔山区块链联盟科技有限公司 Data management method and device and electronic equipment
CN111127103A (en) * 2019-12-24 2020-05-08 北京阿尔山区块链联盟科技有限公司 Value evaluation method and system for digital assets

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170206523A1 (en) * 2015-11-06 2017-07-20 Cable Television Laboratories, Inc Systems and methods for digital asset security ecosystems
CN107257340A (en) * 2017-06-19 2017-10-17 阿里巴巴集团控股有限公司 A kind of authentication method, authentication data processing method and equipment based on block chain
CN107392608A (en) * 2017-07-11 2017-11-24 北京博晨技术有限公司 Digital asset method of commerce and block catenary system based on block catenary system
CN108694668A (en) * 2018-06-15 2018-10-23 腾讯科技(深圳)有限公司 Digital asset method of commerce, device, medium and equipment
CN109416791A (en) * 2016-06-28 2019-03-01 维萨国际服务协会 Digital asset account management
CN109492424A (en) * 2018-09-29 2019-03-19 平安科技(深圳)有限公司 Data assets management method, data assets managing device and computer-readable medium
CN109685664A (en) * 2018-12-20 2019-04-26 姚前 One kind being based on the associated digital asset real name register system of assets mandatory system

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170206523A1 (en) * 2015-11-06 2017-07-20 Cable Television Laboratories, Inc Systems and methods for digital asset security ecosystems
CN109416791A (en) * 2016-06-28 2019-03-01 维萨国际服务协会 Digital asset account management
CN107257340A (en) * 2017-06-19 2017-10-17 阿里巴巴集团控股有限公司 A kind of authentication method, authentication data processing method and equipment based on block chain
CN107392608A (en) * 2017-07-11 2017-11-24 北京博晨技术有限公司 Digital asset method of commerce and block catenary system based on block catenary system
CN108694668A (en) * 2018-06-15 2018-10-23 腾讯科技(深圳)有限公司 Digital asset method of commerce, device, medium and equipment
CN109492424A (en) * 2018-09-29 2019-03-19 平安科技(深圳)有限公司 Data assets management method, data assets managing device and computer-readable medium
CN109685664A (en) * 2018-12-20 2019-04-26 姚前 One kind being based on the associated digital asset real name register system of assets mandatory system

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110929231A (en) * 2019-12-06 2020-03-27 北京阿尔山区块链联盟科技有限公司 Digital asset authorization method and device and server
CN111046266A (en) * 2019-12-11 2020-04-21 北京阿尔山区块链联盟科技有限公司 Data management method and device and server
CN111090700A (en) * 2019-12-13 2020-05-01 北京阿尔山区块链联盟科技有限公司 Data management method and device and electronic equipment
CN111090700B (en) * 2019-12-13 2023-07-18 北京阿尔山区块链联盟科技有限公司 Data management method and device and electronic equipment
CN111127103A (en) * 2019-12-24 2020-05-08 北京阿尔山区块链联盟科技有限公司 Value evaluation method and system for digital assets
CN111127103B (en) * 2019-12-24 2023-10-24 北京阿尔山区块链联盟科技有限公司 Value evaluation method and system for digital asset

Similar Documents

Publication Publication Date Title
CN110443077A (en) Processing method, device and the electronic equipment of digital asset
CN109639410A (en) Data based on block chain deposit card method and device, electronic equipment
CN111464499A (en) Electronic warehouse receipt tracing method and device, computer equipment and storage medium
CN102713922A (en) Anytime validation for verification tokens
CN111314172B (en) Block chain-based data processing method, device, equipment and storage medium
KR20180113229A (en) Loan service providing method using black chain and system performing the same
CN109493087A (en) A kind of method, computer installation and computer readable storage medium based on two dimensional code examination Immovable Property Registration information
CN107944285A (en) The method of commerce and device of a kind of unique right to use of data message
CN111445209A (en) Block chain-based electronic contract signing method and device and storage medium
CN113450092A (en) Block chain network-based article safe and efficient transaction method, system and storage medium
CN112700250A (en) Identity authentication method, device and system in financial scene
CN112417518A (en) File verification method and device, electronic equipment and computer readable medium
US20220158996A1 (en) End-to-End Product Authentication Technique
CN107528697B (en) Electronic certificate verification terminal system based on biological recognition technology and operation method
US11968526B2 (en) Identity management on a mobile device
CN106559433B (en) Method and system for fixing electronic evidence and user identity by using digital certificate
CN110414197B (en) Bank user identity verification method and device based on behavior characteristics
KR20150045543A (en) Genuine product certification and sns posting system, and method using nfc tag and smart phone
CN114519206B (en) Method for anonymously signing electronic contract and signature system
CN103996139A (en) Credit self-guarantee platform web server, and credit self-guarantee system and method
CN114240399A (en) Government affair data processing method and system based on block chain platform
CN113487391A (en) Auction trading method, device and equipment based on block chain and readable storage medium
CN111355757B (en) Cross-chain communication method and device for block chain in supply chain field
CN113393234A (en) Off-chain asset right determining method based on block chain
CN112700327A (en) User confirmation method, device and system in financial scene

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191112