CN110633965A - Method and system for point-to-point asset mapping and digital asset transaction - Google Patents

Method and system for point-to-point asset mapping and digital asset transaction Download PDF

Info

Publication number
CN110633965A
CN110633965A CN201910894589.7A CN201910894589A CN110633965A CN 110633965 A CN110633965 A CN 110633965A CN 201910894589 A CN201910894589 A CN 201910894589A CN 110633965 A CN110633965 A CN 110633965A
Authority
CN
China
Prior art keywords
transaction
digital asset
trading
parties
data packet
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910894589.7A
Other languages
Chinese (zh)
Other versions
CN110633965B (en
Inventor
张嘉荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201910894589.7A priority Critical patent/CN110633965B/en
Publication of CN110633965A publication Critical patent/CN110633965A/en
Application granted granted Critical
Publication of CN110633965B publication Critical patent/CN110633965B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3827Use of message hashing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The invention discloses a method and a system for point-to-point asset mapping and digital asset transaction, comprising the following steps: (1) the method is characterized in that the method comprises the following steps of realizing the point-to-point transaction of digital assets and certificates in a centralized, Hash encryption and intelligent contract manner based on the bottom layer technology of a block chain, and achieving machine trust, safety and high efficiency; (2) inventory digital assets and network tickets; (3) the value conversion of weak value which cannot be realized by internet users is facilitated; (4) value interaction of the value internet is promoted. The invention can enable digital assets and network tickets which are restricted by various conditions to exert the due value thereof, increase the social welfare income of users, arouse the output value and significance of the digital assets and the network tickets, stimulate consumption, pull demands, activate users, reduce resource waste, expand the output and use channels of the digital assets and the network tickets, improve the customer-obtaining ways of enterprises, increase the stickiness and loyalty of the users, and give greater value enabling to the internet behaviors and data information of the users.

Description

Method and system for point-to-point asset mapping and digital asset transaction
Technical Field
The invention belongs to the technical field of internet and block chain, and particularly relates to a point-to-point asset mapping and digital asset transaction method and system.
Background
Along with the deep popularization of the mobile internet, the network is completely integrated into the life of people, the network is accompanied with the whole life of people, and the internet brings great convenience for the study, the work and the life of people. Due to the popularization of the use of the internet, internet assets, namely digital assets, such as Q coins, bitcoins, coupons of various internet service platforms, cash vouchers, network tickets, network red packages, digital assets converted from all internet behaviors and data information of the internet era are derived, but at the present stage, various use limits of the internet platforms on the internet assets cannot be converted into real assets for flexible use. Such as: i have a deduction ticket of a certain hot pot restaurant, the service life of the deduction ticket is close, but I have no expenditure budget for consumption and can only make the deduction ticket useless, but before the deduction ticket expires, a plurality of users who have no deduction ticket and consume in the hot pot restaurant can obtain the deduction ticket by using less than the deduction amount of the deduction ticket, so that the consumption of the users can obtain the advantages. Therefore, a large amount of idle and waste internet assets exist, troubles and losses are brought to users who have the internet assets which cannot be changed, and users who do not have the internet assets want to control the internet assets to cause user distress with preferential welfare. Thus, the trading of internet digital assets is of no trivial significance.
The existing mode only has the uncompensated transfer or exchange among acquaintances such as relatives, friends and the like, is limited to the acquaintance circle, and cannot release huge amount of digital assets which are valuable per se, but have time limit, control limit and restriction.
The prior point-to-point transaction seriously influences the normalization and the popularization of the transaction due to the problems of imperfect transaction technical means, transaction fraud, transaction default, non-compliance of transaction subject matters and commitment and the like.
The existing popularized digital assets and network right assets are limited by the third party network transaction through the third party guarantee transaction of the platform, the transaction amount is small, the transaction cost is high, the transaction profit is low, the platform is compatible and the like, the mode can not be fallen to the ground and popularized, and the potential massive transaction demand is not triggered due to the fact that no mature digital asset transaction platform and transaction method exist, so that the loss of digital asset owners is not only the loss of digital asset output enterprises, but also the loss of digital asset output enterprises is the loss of users who consume no digital assets, the social resource is idle and wasted, and the popularization, propaganda and marketing restrictions of the digital asset output enterprises are also realized.
With the change of the internet from the information internet to the value internet, the value of the internet behavior and the data information of the user is realized, the asset value on the internet exists in the form of digital assets, the value internet really realizes the value interaction, the value interaction is the transaction and circulation of the digital assets, and the transaction and circulation among multiple digital asset types which are safe, quick, efficient, low in cost, full in coverage and cross-platform must become a strong demand for the development of the times.
Promoting, perfecting and improving the transaction of digital assets, stimulating the liquidity of assets in the whole society, activating social economy, promoting the economic liveness of various industries, stimulating technical innovation and technological progress, increasing the distributed and fragmented value realization and aggregation of weak values which can not carry out value conversion of common internet users through the digital asset transaction and circulation of values such as internet behaviors, data information and the like of the internet users, increasing the social welfare of the common internet users, further stimulating the users to participate in the construction of an internet ecosphere, more scientifically and fairly realizing the distribution of social values, promoting social harmony, improving the participation and the feeling of the whole people, and further promoting the healthy development of the internet and even the whole society.
Disclosure of Invention
In view of the above, the invention provides a method and a system for point-to-point asset mapping and digital asset transaction, which can reactivate a large number of internet digital assets, realize value interaction of the value internet, increase social welfare of the internet, increase social welfare income of users, stimulate the subjective enthusiasm of users participating in the construction of internet ecosphere, enhance the sense of acquisition of users, enhance the revenues of enterprises, promote consumption, promote internal demand and promote economic growth.
A point-to-point digital asset transaction method comprising the steps of:
(1) the method comprises the following steps that two transaction parties pack digital assets of appointed transaction into a digital asset data packet, an authority-confirming password is set for the data packet, the digital asset data packet and the authority-confirming password are sent to the other transaction party after being authorized by an account password of the transaction party, and the authority-confirming password is in a hidden state;
(2) after receiving the digital asset data packet and the hidden-state authorization password, both trading parties verify and confirm the transaction object on the data packet and send a confirmation instruction to the trading partner;
(3) and after receiving a confirmation instruction sent by the opposite party, the two transaction parties unlock and display the right confirmation password received by the party according to the confirmation instruction, further unlock the digital asset data packet received by the party by using the password, and automatically associate the digital asset appointed for transaction with account information for unlocking the digital asset data packet at the moment to finish the right confirmation of the digital asset and finish the transaction.
And further, after the two trading parties reach the trading interest consensus, generating an intelligent contract related to the trading interest consensus, and after the two trading parties carry out network signature confirmation, sending the intelligent contract to a trading platform for comparison and storage.
Furthermore, the two trading parties reach the trading intention and generate a trading intelligent contract, and after the intelligent contract is confirmed by the network signatures of the two trading parties, the trading parties can autonomously set the links of manual execution and automatic execution of the intelligent contract.
Further, the smart contract for trading interest consensus must take effect after both parties to the trade have validated and sent confirmation instructions for the trade subject of the received digital asset data package.
Further, the digital assets packaged by both trading parties in the step (1) must be digital assets which are owned by the accounts of both trading parties and can be circulated for the trading platform.
Further, the transaction accounts of the two transaction parties in step (1) may be any network address for storing assets on the internet.
Further, the trading party intelligent contract in the step (1) initiates a request for packing the digital assets of the agreed trade into a digital asset data package to the trading platform intelligent contract.
Further, in the step (1), the trading platform intelligent contract compares and verifies the digital assets packaged by both trading parties and the digital assets of the agreed trade, after the verification, the digital asset data packets packaged by both trading parties are subjected to hash encryption, and the generated hash value is sent to the intelligent contract of the trading opposite party.
Furthermore, in the step (1), the digital asset data packet is set with the right-confirming password through the transaction party account, and the digital asset data packet and the right-confirming password are sent to the transaction opposite side after being authorized by the transaction party account password.
Furthermore, in the step (1), the right-confirming password is set for the packaged digital asset data packet through the account of the transaction party, and the intelligent contract of the transaction party automatically sends the digital asset data packet and the right-confirming password to the transaction party.
Furthermore, in the step (1), the two parties of the transaction respectively send the data packets to the other party with the same number of the authentication password digits.
Further, in the step (1), the digital asset data package packed by both transaction parties (smart contracts) can only be effectively transmitted to one transaction account (smart contracts), the digital assets disappear from the own asset wallet of the transaction party after the both transaction parties set the authority confirming password for the digital asset data package, the digital asset data package can only be unlocked and confirmed on the account (smart contracts) of the transaction party receiving the digital asset data package after being transmitted and before being returned, and the digital asset data package can only be unlocked and confirmed on the account (smart contracts) of the transaction party packing the digital assets before being transmitted or after being returned.
Further, after the digital asset data package is set with the right-confirming password, only on the account (smart contract) unlocking the right-confirming password, the digital asset corresponding to the data package can be operated in a related mode, namely the right of the digital asset can be confirmed, and any other account (smart contract) even if the digital asset data package and the right-confirming password are obtained has no right to operate on the digital asset.
Further, in the step (2), after receiving the digital asset data packet, both transaction parties perform hash, the hash value is verified and compared with the hash value sent by the transaction platform, the transaction object is confirmed, and a confirmation instruction is sent to the transaction opposite side after verification and confirmation.
Further, after receiving the digital asset data packet, the intelligent contracts of the two transaction parties in the step (2) carry out hash, the hash value is verified and compared with the hash value sent by the platform intelligent contract, the object of the transaction is confirmed, and a confirmation instruction is sent to the intelligent contract of the other transaction party after verification and confirmation.
Further, the confirmation instruction sent by the two transaction parties (intelligent contract) in the step (2) is an unlocking instruction of the digital asset data packet right-confirming password sent by the two transaction parties (intelligent contract), the unlocking instruction takes effect after the two transaction parties (intelligent contract) both send the unlocking instruction and receive the unlocking instruction of the opposite party, and any party needs to unlock the hidden password sent by the opposite party under the condition that the unlocking instruction sent by the opposite party is received and the own party sends the unlocking instruction.
Further, after the two transaction parties (intelligent contracts) in the step (2) send confirmation instructions to the other parties, the two transaction parties lose the authority of transaction termination.
Further, the smart contract must take effect after both trading parties (smart contracts) confirm the trade subject matter of the received digital asset data package and send a confirmation instruction and receive a confirmation instruction of the other party.
Furthermore, any party (intelligent contract) of the transaction does not confirm the transaction subject matter of the received digital asset data packet and sends a confirmation instruction, the transaction cannot be completed, and both parties of the transaction can apply for terminating the transaction; if both sides do not apply for terminating the transaction, the transaction is automatically terminated after 24 hours of intelligent contract network signature of the last side, the digital asset data packet and the right-confirming password are returned, the returned digital asset data packet is associated with the account information of the transaction side initiating unlocking under the unlocking of the right-confirming password, so that the digital asset right-confirming is completed, and the digital asset is returned to the account digital asset wallet of the transaction side again after the transaction is finished.
Further, in the step (3), after the two parties of the transaction receive the confirmation instruction sent by the other party, both the two parties can authorize to unlock the right-confirming password according to the confirmation instruction, click the right-confirming password grids one by one, and unlock the right-confirming password one by one according to the password sequence until the password is completely unlocked.
Further, after the intelligent contracts of the two transaction parties in the step (3) receive the confirmation instruction, the authority confirming password of the digital asset data packet is automatically unlocked, and after the authority confirming password is unlocked, the digital asset is automatically associated with the transaction account information which completes the unlocking of the authority confirming password, so that the authority confirming of the digital asset is completed, and the transaction is completed.
Furthermore, each party who performs the right-confirming password unlocking firstly unlocks a password, the right-confirming password of the corresponding digit of the transaction counter party is automatically displayed.
Further, after the digital asset right is confirmed in the step (3), the digital asset automatically enters a transaction party account digital asset wallet for unlocking the digital asset data packet.
Further, after the confirmation instruction is received in the step (3), both parties of the transaction do not perform unlocking operation on the authorization code, and the authorization code is automatically unlocked 24 hours after the last party of the transaction performs intelligent contract network signature.
A point-to-point digital asset transaction system comprises respective client terminals of two transaction parties and a server terminal serving as a transaction platform, wherein the client terminals, the server terminal and the server terminal are in communication connection through a network, and the client terminals, the server terminal and the server terminal are connected through network communication, wherein:
the client is used for initiating a trading interest intelligent contract request at the server, the server receives the trading interest intelligent contract request, generates an intelligent contract with the trading interest consensus and further sends the intelligent contract to the client initiating the request; the client side initiating the request sends the received intelligent contract to the client side of the transaction object, the intelligent contract content and the transaction execution details are confirmed through negotiation of the client sides of both transaction parties, the intelligent contract is automatically executed after network signature confirmation is carried out, and the intelligent contract is automatically sent to the client side of the other transaction party and the server side through the client sides of both transaction parties;
the client-side intelligent contracts of both trading parties initiate a packaging request of a digital asset to be traded to a server-side intelligent contract, the server-side intelligent contract verifies the authenticity and ownership of the digital asset to be packaged and whether the authenticity and ownership of the digital asset to be packaged accord with a trading range of a trading platform, the server-side intelligent contract compares the digital asset to be packaged with the digital asset agreed for trading in the intelligent contract, after the verification, the packaging request is approved, hash encryption is carried out on a digital asset data packet packaged by the client-side intelligent contracts of both trading parties, and a generated hash value is automatically sent to the client-side intelligent contract of the other trading party;
the client sides of both trading parties set the right-confirming password for the packed digital asset data packet, the right-confirming password is set, and the intelligent contract automatically sends the digital asset data packet and the right-confirming password to the client side intelligent contract of the trading party;
the client intelligent contracts of the two transaction parties receive the hash value of the digital asset data packet sent by the server intelligent contract, and the digital asset data packet and the right-confirming password sent by the client intelligent contract of the other transaction party, wherein the right-confirming password is in a hidden state;
after the client sides of the two transaction parties receive the digital asset data package, the client-side intelligent contract hashes the digital asset data package, and the hash value is automatically verified and compared with the hash value sent by the server-side intelligent contract to determine the consistency of the received transaction object and the transaction object agreed by the transaction intelligent contract;
after the client-side intelligent contracts of both trading parties confirm the trading target objects, automatically sending a confirmation instruction to the client-side intelligent contract of the opposite party and receiving the confirmation instruction sent by the client-side intelligent contract of the opposite party, the trading intelligent contract takes effect;
after the client-side intelligent contracts of both transaction parties receive the confirmation instruction, the right-confirming password of the digital asset data packet is automatically unlocked, and after the right-confirming password is unlocked, the digital asset is automatically associated with the account information of the transaction client-side which completes the unlocking of the right-confirming password, so that the right confirmation of the digital asset is completed, and the transaction is completed.
And further, after the clients of the two trading parties reach the trading interest consensus, an intelligent contract related to the trading interest consensus is generated, and the intelligent contract is sent to the server side for comparison and storage after network signature confirmation is carried out on the clients of the two trading parties.
Furthermore, the client sides of the two trading parties achieve trading intentions and generate trading intelligent contracts, and after the intelligent contracts are confirmed by the network signatures of the client sides of the two trading parties, the client sides of the two trading parties can independently set links of manual execution and automatic execution of the intelligent contracts.
Further, the digital assets packaged by the clients of both trading parties must be digital assets owned by the accounts of the clients of both trading parties and approved for circulation by the server.
Further, the transaction account of the client of the transaction parties may be any network address on the internet for storing assets.
Further, the server compares and verifies the transaction object corresponding to the intelligent contract which is agreed about the transaction intention by the client sides of the two transaction parties, performs hash encryption on the digital asset data packet packaged by the client sides of the two transaction parties after verification, and sends the generated hash value to the client side of the other transaction party.
And further, the server compares and confirms the digital asset data packet and the intelligent contract which are packaged by the client sides of the two transaction parties, sets the right-confirming password for the digital asset data packet by the client sides of the two transaction parties, authorizes the digital asset data packet by the account password of the client side of the transaction party, and then sends the digital asset data packet and the right-confirming password to the client side of the other transaction party.
Furthermore, the data packet authentication code bits sent by the client sides of both transaction sides to the client side of the other transaction side are consistent.
Furthermore, the digital asset data packet packaged by the client sides of the two transaction parties can only be effectively sent to one transaction account, the digital asset disappears from the asset wallet of the transaction party after the client sides of the two transaction parties set the right-confirming password for the digital asset data packet, the digital asset data packet can only be unlocked and confirmed on the account of the transaction party receiving the digital asset data packet after being sent and before being returned, and the digital asset data packet can only be unlocked and confirmed on the account of the transaction party client side packaging the digital asset before being sent or after being returned.
Further, after the digital asset data packet is set with the right-confirming password, only on the client account unlocking the right-confirming password, the digital asset corresponding to the data packet can be operated, namely the right-confirming of the digital asset, and any other client account has no right to operate the digital asset even if the digital asset data packet and the right-confirming password are acquired.
Further, after receiving the digital asset data packet, the client sides of the two transaction parties carry out hash, the hash value is verified and compared with the hash value sent by the server side, the transaction object is confirmed, and a confirmation instruction is sent to the client side of the other transaction party after verification and confirmation.
Furthermore, the confirmation instruction sent by the client sides of the two transaction sides is an unlocking instruction of the digital asset data packet authentication password sent by the client sides of the two transaction sides, the unlocking instruction takes effect after the client sides of the two transaction sides send the unlocking instruction and receive the unlocking instruction of the opposite side, and any client side needs to unlock the hidden password sent by the client side of the opposite side under the condition that the unlocking instruction sent by the client side of the opposite side is received and the client side of the own side sends the unlocking instruction.
Further, after the client sides of the two transaction parties send confirmation instructions to the client side of the other party, the client sides of the two transaction parties lose the authority of transaction termination.
Further, the intelligent contract must take effect after both client sides of the trading parties confirm the transaction object of the received digital asset data packet and send a confirmation instruction and receive a confirmation instruction of the other party.
Furthermore, the client of any party of the transaction does not confirm the transaction object and send a confirmation instruction to the received digital asset data packet, the transaction cannot be completed, and the clients of both parties of the transaction can apply for terminating the transaction; if the clients of both parties do not apply for terminating the transaction, the transaction is automatically terminated after the last party client carries out intelligent contract network signature for 24 hours, the digital asset data packet and the right-confirming password are returned in the original way, the returned digital asset data packet is associated with the account information of the transaction party client initiating unlocking under the unlocking of the right-confirming password, so that the digital asset right confirmation is completed, the transaction is finished, and the digital asset is returned to the transaction party client account digital asset wallet again.
Further, after the clients of both sides of the transaction receive the confirmation instruction sent by the opposite side, both the clients of both sides can unlock the right-confirming password according to the authorization of the confirmation instruction, click the right-confirming password grids one by one, and unlock the right-confirming password one by one according to the password sequence until the password is completely unlocked.
Furthermore, when one client side which firstly performs the right-confirming password unlocking unlocks one password, the right-confirming password of the corresponding digit of the client side of the opposite transaction side can be automatically displayed.
Further, after the digital asset is authenticated, the digital asset automatically enters a transaction party client account digital asset wallet for unlocking the digital asset data packet.
Furthermore, when the right-confirming password is unlocked, the number grids of the hidden positions of the right-confirming password are clicked in sequence, and the unlocking of the right-confirming password is completed.
Further, after the confirmation instruction is received, the clients of both transaction parties do not unlock the right-confirming password, and the right-confirming password is automatically unlocked 24 hours after the client of the last transaction party performs intelligent contract network signature.
Further, the server includes:
the intelligent contract module is used for receiving the trading interest contract request of the client and carrying out related processing so as to enable the client to complete the intelligent contract generation, signing, execution and effect on the trading interest consensus;
the packaging module is used for receiving a packaging request of the client intelligent contract and carrying out related processing so as to enable the client intelligent contract to complete the digital asset packaging operation of the appointed transaction;
the verification module is used for verifying the consistency of the prepackaged digital assets and the digital assets of the deal intelligent contract appointed deal by the server-side intelligent contract;
the transaction module is used for receiving a digital asset transaction request of the client and carrying out related processing so as to enable the client to complete digital asset transaction;
the encryption module is used for receiving an encryption request of the client and carrying out related processing, and completing hash encryption on a digital asset data packet packaged by the intelligent contract of the client;
the processing module is used for receiving and carrying out related processing on related requests of the client on transaction intention contracts, digital asset transactions, digital asset packaging, digital asset right confirmation and data packet sending and withdrawing;
the storage module is used for storing intelligent contracts of the client about the consensus of the transaction intention, the encrypted hash value of the digital asset data packet and transaction related information;
the conversion module is used for receiving a certificate passing request that the client converts the legal tender or digital assets outside the transaction platform of the server into the transaction platform of the server, and performing related processing to enable the client to complete the request;
the confirmation module is used for confirming the transaction digital asset data packet and sending a confirmation instruction;
the unlocking module is used for unlocking the digital asset data packet of the transaction subject matter in the transaction;
the right confirming module is used for confirming the ownership of the digital assets which are finished or not finished in the transaction;
a return module for returning the original path of the digital asset when the transaction is not completed;
the association module is used for binding multi-dimensional information of the digital assets after the transaction is completed and increasing the safety of the assets;
a revocation module to terminate the transaction when the transaction has not been completed.
A point-to-point physical asset and digital asset mutual mapping method, for the both sides that carry on the point-to-point digital asset trade, agree the asset traded as the physical asset, according to both sides agree map the physical asset into the digital asset and trade; the transaction parties reach transaction consensus on the pre-transacted physical assets, the pre-transacted physical assets are subjected to physical image verification or remote real-time verification with a transaction counterpart through a network image by an intelligent logistics mechanism networked with the transaction platform, and the physical assets are mapped onto the transaction platform to generate digital asset ownership certificate which can be recognized and circulated by the transaction platform through verification of the transaction counterpart and network confirmation.
Further, after the physical asset mapping and the digital asset ownership ticket approved and circulated by the trading platform are generated, the trading party holding the digital asset ownership ticket can perform point-to-point digital asset trading according to the method of claim 1, which specifically comprises the following steps:
(1) the method comprises the following steps that both trading parties pack all digital asset tickets of appointed trading into a digital asset data packet, an authority confirming password is set for the data packet, the digital asset data packet and the authority confirming password are sent to the trading opposite party after being authorized by a trading party account password, and the authority confirming password is in a hidden state;
(2) after receiving the digital asset data packet and the hidden-state authorization password, both trading parties verify and confirm the transaction object on the data packet and send a confirmation instruction to the trading partner;
(3) after receiving a confirmation instruction sent by the opposite party, the two transaction parties unlock and display the right confirmation password received by the party according to the confirmation instruction, further unlock the digital asset data packet received by the party by using the password, and at the moment, the digital asset ownership certificate of the appointed transaction is automatically associated with the account information for unlocking the digital asset data packet, so that the digital asset ownership right confirmation is completed, and the transaction is completed.
Furthermore, the intelligent logistics mechanism generates image data or remote real-time verification on the physical assets according to the verification requirements of the transaction opposite side according to the intelligent contract requirements achieved by the transaction two sides, the image data is sent to the transaction opposite side through the transaction platform, and the physical assets are mapped to the transaction platform to generate digital asset ownership certificates which can be recognized and circulated by the transaction platform through verification and network confirmation of the transaction opposite side.
Further, after the physical asset is mapped to the digital asset ownership certificate which can be circulated by the trading platform, the physical asset is temporarily stored in the intelligent logistics organization, and a user who has an agreement that the asset to be traded is the physical asset can only dominate the physical asset through the digital asset ownership certificate.
Furthermore, the digital asset ownership ticket corresponding to the physical asset mapped on the trading platform does not relate to the asset value of the physical asset, and the digital asset ownership ticket is only used for trading with a trading partner who performs physical image verification.
Further, if the transaction party needs to perform a transaction with a third party, the third party needs to perform physical image verification on the physical asset and confirm the physical asset through the network, so that the physical asset is remapped.
Further, after the transaction is completed, both parties of the transaction can control the physical assets stored in the intelligent logistics agency through the transaction platform according to the digital asset ownership certificate obtained through the transaction.
Further, after the transaction is completed, the digital asset ownership certificates obtained by the two transaction parties automatically enter the respective account asset packages of the two transaction parties, and the two transaction parties can dominate the physical asset in the intelligent logistics organization according to the respective transaction account associated information voucher or the right-confirming password.
Further, if the transaction is not completed, both transaction parties can dominate the physical assets stored in the intelligent logistics organization through the transaction platform after the right is confirmed according to the returned digital asset ownership certificate.
Further, if the physical asset mapping is finished and the transaction is not continued, both transaction parties can map and restore the digital asset ownership certificate mapped by the physical asset according to respective transaction accounts after authorization of account passwords, and the physical asset is controlled by the intelligent logistics organization according to respective transaction account associated information certificates or right-confirming passwords.
A system for mutual mapping between point-to-point physical assets and digital assets comprises respective client terminals of two transaction parties and a server terminal serving as a transaction platform, wherein the client terminals, the server terminal and the server terminal are in communication connection through a network, and the system comprises:
the client sides of the trading parties initiate trading applications to the server side after the client sides of the trading parties reach the asset trading intention, wherein the client sides of the trading parties holding the agreed assets to be traded as physical assets also initiate requests of mapping the physical assets into digital asset ownership certificates to the server side;
the server side is connected with a mapping server (corresponding to an intelligent logistics mechanism) nearby the client side which initiates the asset mapping request, and assists the client side to complete the request of mapping the real asset held by the client side into the digital asset ownership ticket;
the mapping server is connected with clients of both trading parties through the server, performs network image or remote real-time verification on real assets agreed to be traded by the clients of both parties through a network image or remote real-time verification technology, and generates digital asset ownership certificates which can be recognized and circulated by the server by mapping the real assets to the server through verification and network confirmation with the client of the trading party.
Further, after the physical asset mapping generates the digital asset ownership ticket whose circulation is authenticated by the server, the client of the transaction party holding the digital asset ownership ticket can perform the point-to-point digital asset transaction according to the method of claim 1, which specifically comprises the following steps:
(1) the client sides of the two transaction parties pack all the digital asset tickets of the appointed transaction into a digital asset data packet, set a right-confirming password for the data packet, and send the digital asset data packet and the right-confirming password to the client side of the other transaction party after being authorized by the account password of the client side of the transaction party, wherein the right-confirming password is in a hidden state;
(2) after receiving the digital asset data packet and the hidden-state authorization password, the client sides of the two transaction parties verify and confirm the transaction object on the data packet and send a confirmation instruction to the client side of the other transaction party;
(3) and after the client sides of the two trading parties receive a confirmation instruction sent by the client side of the other party, unlocking and displaying the right confirmation password received by the client side of the local party according to the confirmation instruction, further unlocking the digital asset data packet received by the client side of the local party by using the password, automatically associating the digital asset ownership certificate agreed for trading with the client side account information for unlocking the digital asset data packet, finishing the ownership confirmation of the digital asset ownership certificate, and finishing the trading.
Furthermore, the mapping server generates image data or remote real-time verification for the physical assets according to the verification requirements of the client of the transaction opposite side according to the intelligent contract requirements achieved by the client of the transaction opposite side, the image data is sent to the client of the transaction opposite side through the server, and the physical assets are mapped to the server to generate all right certificates of the digital assets which can be approved and circulated by the server through the verification of the client of the transaction opposite side and network confirmation.
Further, after the physical asset is mapped to the digital asset ownership certificate which can be circulated by the server side, the physical asset is temporarily stored in an intelligent logistics mechanism controlled by the mapping server, and the client side holding the agreed asset to be traded as the physical asset can only dominate the physical asset through the digital asset ownership certificate.
Furthermore, the digital asset ownership ticket corresponding to the physical asset mapped to the server is not related to the asset value of the physical asset, and the digital asset ownership ticket is only used for trading with a client of a trading partner who performs physical image verification.
Further, if the client of the two transaction parties needs to perform transaction with the third-party client, the third-party client needs to perform real object image verification on the real object asset and confirm the real object asset through the network, so that the real object asset is remapped.
Further, after the transaction is completed, the client sides of both transaction parties can control the physical assets stored in the intelligent logistics mechanisms controlled by the mapping server through the server side according to the digital asset ownership certificate obtained by the transaction.
Further, after the transaction is completed, all digital asset ownership certificates obtained by the client sides of the two transaction parties automatically enter the respective account asset packages of the client sides of the two transaction parties, and the client sides of the two transaction parties can dominate the physical assets in the intelligent logistics mechanisms controlled by the mapping server according to the respective transaction account associated information certificates or the right-confirming passwords.
Further, if the transaction is not completed, the clients of both parties of the transaction can dominate the physical assets stored in the intelligent logistics mechanism governed by the mapping server through the server after the returned digital asset ownership certificate is confirmed.
Further, if the physical asset mapping is finished and the transaction is not continued, the client sides of both transaction parties can map and restore the digital asset ownership certificate mapped by the physical asset after being authorized by the account password according to the respective transaction accounts, and dominate the physical asset in the intelligent logistics mechanism controlled by the mapping server according to the respective transaction account associated information certificate or the right-confirming password.
Further, the mapping server includes:
the mapping module is used for mapping the physical assets into network digital assets;
the image module is used for remotely verifying the real object assets to be traded through images;
the verification module is used for assisting clients of two transaction parties to perform physical verification on the subject matter of the appointed transaction;
the confirmation module is used for comprehensively confirming the physical assets with a client of a transaction counterpart;
and the domination module is used for assisting the clients of the two transaction parties in transferring or extracting the subject matter of the appointed transaction.
The invention relates to a decentralized point-to-point internet digital asset transaction method, which applies a bottom layer technology of a block chain, does not need the guarantee of a third party, carries out point-to-point internet digital asset transaction under the condition that the transaction digital asset does not pass through the third party, solves the trust problem of both parties of the transaction, realizes the transaction and circulation among various digital asset types by machine trust, safety, high efficiency, convenience, low cost, full coverage and cross-platform, effectively takes the deposited internet digital asset and realizes the value interaction of a value internet; therefore, the invention has the following beneficial technical effects:
1. the invention solves the fundamental trust of the internet digital asset transaction, achieves the trust problem without depending on the guarantee of a third party and achieves the effect of machine trust.
2. The invention can reduce the transaction cost, does not need the third party guarantee intervention, and greatly reduces the transaction cost.
3. The invention can improve the transaction efficiency, transfer the transaction object between two transaction parties and greatly improve the transaction efficiency.
4. The invention can effectively and fundamentally put an end to 'double flowers' (double payment) of the digital assets.
5. The invention can keep track of the internet digital assets acquired by the user, increase the use frequency of the internet digital assets, improve the business effect of the enterprise for outputting the internet digital assets, and enable the internet digital assets to serve the required users.
6. The invention can stimulate the value of the internet digital assets, promote the increase of consumption, increase the social welfare of users, stimulate the participation enthusiasm of the users, reduce the resource waste and save the social cost.
7. The invention can increase the user viscosity, broaden the customer channels of enterprises, stimulate consumption and pull internal needs.
8. The invention can excite and awaken idle network resources, increase the chance of network asset change and guide more internet participation behaviors.
9. The invention can improve the transaction category of the Internet and realize the mutual circulation between the Internet digital assets, the network ticket and the real assets.
10. The invention can give more energy to the network behavior and data information of common internet users.
11. The invention realizes the free circulation of the value of the Internet and can effectively stimulate the subjective initiative of the user participating in the construction of the Internet ecosphere.
12. The invention can activate the asset mobility of each industry and improve the economic circulation vitality of the whole society.
13. The invention realizes the high-efficiency conversion of value and promotes the innovation and creation of the whole society.
14. The invention provides a value conversion way for the weak value of fragmentation of a common user.
15. The invention can realize the cross-platform full circulation of the digital assets and realize the value free interaction of the value internet.
Drawings
Fig. 1 is a flow chart illustrating a point-to-point transaction method of internet digital assets according to the invention.
Detailed Description
In order to more specifically describe the present invention, the following detailed description is provided for the technical solution of the present invention with reference to the accompanying drawings and the specific embodiments.
The invention realizes the point-to-point trading method of Internet digital assets, which relates to the data transmission of a client and a server; the point-to-point transaction method of the internet digital assets comprises the following steps:
s01: an internet user (client) intending to trade the internet digital assets and the network ticket applies for a trading intention intelligent contract on an internet digital assets and network ticket trading platform (server).
S02: the agreement of the trading target object and the agreement of the trading details are carried out on the intelligent contract according to the agreement by the trading user and the two parties, then the agreement and the agreement are sent to the Internet digital asset and network ticket trading platform through the signatures of the two parties, the authority and the ownership of the agreed trading target object are confirmed through the platform (the intelligent contract), the agreement between the agreed trading target object and the intelligent contract is confirmed and stored, and the trading request is passed.
S03: the trading user (intelligent contract) makes a data packaging request for the internet digital assets and the network tickets agreed to trade by both parties, confirms the ownership and authenticity of the digital assets and the network tickets agreed by the user through the internet digital assets and the network ticket trading platform (intelligent contract), verifies the agreed consistency of the digital assets and the network tickets, and supports the completion of the data packaging request after confirmation.
S04: the packaged digital asset data packet is subjected to hash encryption through the Internet digital asset and network ticket transaction platform (intelligent contract), and meanwhile, the hash value of the digital asset data packet packaged by the transaction user is sent to the transaction counterpart (intelligent contract).
S05: the trading user (intelligent contract) receives the hash value of the digital asset data packet corresponding to the agreed trading subject packed by the corresponding trading counterparty from the internet digital asset and the network ticket trading platform (intelligent contract).
S06: after the transaction user (intelligent contract) packages the digital assets and the right certificate, the right-confirming encryption is carried out on the packaged data packet, and the right-confirming passwords of the digital asset data packet and the hidden digital asset data packet are sent to the transaction counterpart (intelligent contract).
S07: the digital asset data packet packaged by both trading parties (intelligent contracts) can be effectively transmitted to only one trading account, after both trading parties package the digital assets of agreed trading into the digital asset data packet and set the right-confirming password, the digital assets disappear from the trading user's own account asset wallet, the digital asset data packet can only be unlocked and confirmed on the trading account of the other party receiving the digital asset data packet before being transmitted and returned, and the digital asset data packet can only be unlocked and confirmed on the trading account packaging the digital assets before being transmitted and after being returned.
S08: the two transaction parties (intelligent contracts) receive the hash value of the digital asset data packet of the agreed transaction from the transaction platform (intelligent contracts), and the digital asset data packet of the agreed transaction and the right-confirming password sent by the other transaction party (intelligent contracts), and the right-confirming password is in a hidden state.
S09: the true right hiding cipher code numbers of the transaction data packets sent by both transaction parties (intelligent contracts) to the other party are consistent.
S10: the two-party transaction user (intelligent contract) hashes the digital asset data packet sent by the transaction counter party and verifies and compares the hash value of the digital asset data packet of the agreed transaction object sent by the Internet digital asset and network ticket transaction platform (intelligent contract).
S11: and after the hash verification comparison is carried out, the authenticity and the accuracy of the appointed transaction object and the agreed consistency with the intelligent contract are determined, and a confirmation instruction is sent to the transaction opposite side.
S12: the two parties of the transaction (intelligent contract) confirm the transaction object of the received digital asset data packet and send a confirmation instruction.
S13: and the sending of the confirmation instruction of the two transaction parties (intelligent contracts) is an unlocking instruction of the authorized hidden password of the transaction data packet, and the unlocking instruction takes effect after the two transaction parties send the unlocking instruction and receive the unlocking instruction.
S14: the method comprises the steps that two transaction parties (intelligent contracts) confirm transaction targets of received digital asset data packets and send confirmation instructions, namely unlocking instructions of right hidden passwords of the transaction data packets, the unlocking instructions take effect after the two transaction parties (intelligent contracts) send the unlocking instructions and receive the instructions, and any party needs to unlock the hidden right-confirming passwords sent by the other party after receiving the unlocking instructions of the other party and sending the unlocking instructions by the party.
S15: after the transaction is started, any operation can be performed on the digital asset corresponding to the unlocked authorization code only on the account (smart contract) of the unlocked authorization code, namely the authorization of the digital asset is determined, and any rest of the accounts have no right to perform any operation on the digital asset even if the digital asset data packet and the authorization code are acquired.
S16: after both trading parties (intelligent contracts) send confirmation instructions to the trading parties and receive the confirmation instructions sent by the trading parties, both trading parties (intelligent contracts) can unlock the right password of the trading digital asset data packet (or the hidden right password of the trading digital asset data packet is automatically unlocked).
S17: and automatically associating the digital assets of the appointed transaction with the account information for unlocking the digital asset data packet to finish the digital asset right confirmation and the transaction is finished.
S18: after the two transaction parties (intelligent contracts) verify and confirm the transaction target objects of the digital asset data packets and send confirmation instructions to the two transaction parties, the two transaction parties (intelligent contracts) lose the authority of transaction termination.
S19: if one or both parties (smart contracts) of the transaction do not validate the transaction subject matter against the received digital asset data package and send validation instructions, either party (smart contract) of the transaction may apply for termination of the transaction.
S20: and any party (intelligent contract) does not confirm the transaction target object on the received digital asset data packet and sends a confirmation instruction, and the transaction cannot be completed.
S21: if one or both parties (intelligent contracts) do not confirm the transaction target object of the received digital asset data packet and send a confirmation instruction, the two parties (intelligent contracts) do not apply for terminating the transaction, and the transaction is automatically terminated after 24 hours after the last party carries out network signature of the intelligent contracts.
S22: if one party or two transaction parties (intelligent contracts) do not confirm the transaction subject matter of the received digital asset data packet and send a confirmation instruction, the two parties (intelligent contracts) do not apply for transaction termination, the transaction is automatically terminated after 24 hours after the last party carries out network signature of the intelligent contracts, and the digital asset data packet and the hidden authorization code return the original path.
S23: if one party or two transaction parties (intelligent contracts) do not confirm the transaction subject matter of the received digital asset data packet and send a confirmation instruction, the two parties (intelligent contracts) do not apply for terminating the transaction, the transaction is automatically terminated after 24 hours after the last party carries out network signature of the intelligent contract, the data packet and the hidden authorization code return the original path, the returned digital asset data packet is associated with the personal transaction account information unlocked by the authorization code under the unlocking of the hidden authorization code, the digital asset authorization is completed, the transaction is finished, and the digital asset is returned to the transaction account digital asset wallet again.
S24: if one party or two transaction parties (intelligent contracts) do not confirm the transaction subject matter of the received digital asset package and send a confirmation instruction, both the parties (intelligent contracts) have the authority to apply for terminating the transaction, the digital asset data package and the hidden authority-confirming password return the original path, the returned digital asset data package completes the association with the personal transaction account information unlocked by the authority-confirming password under the unlocking of the hidden authority-confirming password, the digital asset authority confirmation is completed, the transaction is finished, and the digital asset is returned to the account digital asset wallet again.
S25: after both transaction parties (intelligent contracts) send and receive confirmation instructions of the transaction objects sent by the transaction parties, any one of the transaction parties (intelligent contracts) can unlock the received hidden authorization passwords.
S26: both sides (intelligent contracts) can authorize and unlock the right-confirming password according to the confirmation instruction, click the right-confirming password grids one by one in sequence, and unlock the right-confirming password one by one according to the password sequence until the password is completely unlocked.
S27: when one party unlocking the hidden right-confirming password, the other party automatically shows the hidden right-confirming password with the corresponding digit of the transaction party, namely unlocking.
S28: any party (intelligent contract) can unlock the hidden authority password without unlocking according to the password sequence.
S29: the digital assets automatically associate with the personal transaction account information which completes unlocking of the right-confirming password to complete the right confirmation of the digital assets, the digital assets automatically enter the personal transaction account digital asset wallet which completes unlocking of the right-confirming password, and users can freely control the digital assets.
S30: after receiving the confirmation instruction, both parties (intelligent contracts) do not unlock the hidden authorization password, and the hidden authorization password is automatically unlocked 24 hours after the last party of the transaction carries out intelligent contract network signature.
S31: after the intelligent contracts of both transaction parties receive the confirmation instruction, the authority confirming password of the digital asset data packet is automatically unlocked, and after the authority confirming password is unlocked, the digital asset is automatically associated with the account information of the transaction client side which completes the unlocking of the authority confirming password, so that the authority confirming of the digital asset is completed, and the transaction is completed.
S32: if one or both parties of the transaction agree that the assets of the transaction are real-world physical assets, the real assets can be mapped into digital assets for transaction according to the agreement of the two parties; the two trading parties achieve trading consensus on the pre-traded real physical assets, the real physical assets are verified in real time through network images or remote verification through an intelligent logistics mechanism which is networked with the internet digital asset and network ticket trading platform, the real physical assets are verified in real time through the network images or remote verification of the trading parties, the real physical assets can be mapped to the internet digital asset and network ticket trading platform through verification of the trading parties and network signature confirmation, and the digital asset tickets which can be verified and circulated by the trading platform are generated.
S33: after the real physical asset mapping and the circulated digital asset right recognized by the trading platform are generated, the trading user holding the right can carry out point-to-point digital asset trading, and the method comprises the following steps:
(1) the method comprises the following steps that both trading parties pack agreed trading digital assets (tickets) into a digital asset data packet, an authority confirming password is set for the digital asset data packet, the digital asset data packet and the authority confirming password of the agreed trading are sent to the trading opposite party after being authorized by a trading party account password, and the authority confirming password is in a hidden state;
(2) the method comprises the following steps that a trading party receives a digital asset data packet of an agreed transaction and an authority-confirming password in a hidden state, which are sent by a trading opposite party, and sends a confirmation instruction to the trading opposite party after the digital asset data packet of the agreed transaction is verified and confirmed;
(3) after the two transaction parties send and receive the verification confirmation instruction of the digital asset data packet of the appointed transaction sent by the other transaction party, the authorized password of the digital asset data packet of the appointed transaction can be unlocked (or the hidden authorized password of the digital asset data packet of the appointed transaction is automatically unlocked), the digital asset of the appointed transaction is automatically associated with the account information for unlocking the digital asset data packet, the digital asset authorization is completed, and the transaction is completed.
S34: the intelligent logistics mechanism can generate image data or remotely verify real physical assets in real time according to the verification requirements of a trading opposite party according to the intelligent contract requirements of the trading parties, the image data is sent to the trading opposite party through a trading platform and verified and confirmed through a network signature by the trading opposite party, the real physical assets can be mapped to an internet digital asset trading platform, and a digital asset ownership certificate which can be verified and circulated by the trading platform is generated.
S35: after the real physical assets are mapped into the digital asset ownership permit which can be circulated by the trading platform, the real physical assets are temporarily stored in the intelligent logistics organization, and the assets to be traded which have agreed trading are users of the real physical assets and can only dominate the real physical assets through the digital asset ownership permit.
S36: the real physical assets are mapped to the internet digital asset transaction platform, the ownership certificate of the real physical assets is displayed, and the asset value of the real assets is not related.
S37: the digital asset ownership certificate of the real physical asset mapped to the internet digital asset transaction platform can only be used for transaction with a transaction partner who performs physical image or remote real-time verification.
S38: if the transaction with the third party is needed, the real physical asset needs to be subjected to physical image or remote real-time verification by the third party, and signature confirmation is carried out on the verification through the network, so that the remapping of the real physical asset is completed.
S39: after the transaction is completed, one or both parties of the transaction can perform any control on the real physical assets stored in the intelligent logistics mechanism through the internet digital asset transaction platform according to the digital asset ownership certificate mapped by the real physical assets obtained through the transaction.
S40: after the transaction is completed, the digital asset ownership certificate mapped by the real physical asset obtained by the transaction of one party or both parties automatically enters an account asset package of the transaction user on the transaction platform, and the transaction user can perform any domination on the real physical asset at the intelligent logistics mechanism according to the related associated information voucher or the right-confirming password of the account number of the user on the transaction platform.
S41: if the transaction is not completed, one or both parties of the transaction can determine the right according to the returned digital asset ownership certificate mapped by the real physical asset, and then the real physical asset stored in the intelligent logistics mechanism is subjected to any control through the Internet digital asset transaction platform.
S42: if the transaction is not continued after the real physical asset mapping is completed, one or both transaction parties can perform mapping reduction on all the digital asset tickets mapped by the physical assets according to the account number of the transaction user on the transaction platform and authorized by the account number password, and perform any control on the real physical assets in the intelligent logistics institution according to the related associated information voucher or the right-confirming password of the account number of the user on the transaction platform.
The following is a set of specific embodiments describing in detail the specific implementation process of the transaction method for implementing point-to-point transaction of internet digital assets according to the present invention, as shown in fig. 1:
(1) the Internet uses a and b to agree on the intentions of trading the Internet digital assets and network tickets.
(2) The user a and the user b apply for trading and generate trading interest intelligent contracts to the Internet digital asset and network ticket trading platform, after the user a and the user b agree on the interest intelligent contracts according to the agreement, trade subject matters and trading execution details are sent to the Internet digital asset and network ticket trading platform through the signatures of both parties, the authority and the attribution of the agreed trading subject matters are confirmed through the platform, the consistency of the contracts is confirmed and stored, and the generated trading intelligent contracts are synchronized with both trading parties and pass through a trading request.
(3) The user a (intelligent contract) makes a data packaging request for the internet digital assets and the network tickets which are agreed to trade by both parties, confirms the ownership and authenticity of the digital assets and the network tickets which are agreed to trade by the user a (intelligent contract), supports the completion of the data packaging request, makes hash encryption on the packaged digital asset data packet, and sends the hash value of the digital asset data packet which is packaged by the user a (intelligent contract) to the user b (intelligent contract) of the other party of trade.
(4) After a user a finishes packaging the digital assets and the right certificates, the packaged data packets are encrypted for right confirmation, the intelligent contract sends the right confirmation passwords of the digital asset data packets and the hidden digital asset data packets to a user b (an intelligent contract), the digital asset data packets packaged by both trading parties (the intelligent contract) can only be effectively sent to one trading account, after the digital assets subjected to appointed trading are packaged into the digital asset data packets and the right confirmation passwords are set, the digital assets disappear from the own account asset data packets, and before the digital asset data packets are not returned, the right confirmation unlocking can only be carried out on the trading account of the user b on the other trading party receiving the digital asset data packets.
(5) User b (intelligent contract) makes data package request for internet digital assets and network right of both parties 'appointed transaction, confirms ownership and authenticity of digital assets and network right of user's package request through internet digital assets and network right transaction platform (intelligent contract), supports finishing data package request, makes hash encryption for packaged digital assets data package, and sends hash value of digital assets data package packaged by user b (intelligent contract) to user a (intelligent contract) of transaction counterpart.
(6) After the user b packages the digital assets and the right certificate, the packaged data packet is subjected to right confirming encryption, the intelligent contract sends the right confirming password I of the digital asset data packet and the hidden digital asset data packet to the user a (the intelligent contract), the digital asset data packet packaged by both trading parties can only be effectively sent to one trading account, after the digital assets subjected to appointed trading are packaged into the digital asset data packet and the right confirming password is set, the digital assets disappear from the own account asset data packet, and before the digital asset data packet is not returned, the right confirming unlocking can only be carried out on the trading account of the user a of the trading opposite side receiving the digital asset data packet.
(7) A user b (intelligent contract) receives a hash value of a digital asset data packet which is packed by an internet digital asset and network right transaction platform and corresponds to an agreed transaction object, and an authority confirming password of the digital asset data packet which is sent by the user a (intelligent contract) and corresponds to the agreed transaction object, the user b (intelligent contract) hashes the digital asset data packet sent by the user a (intelligent contract), verifies and compares the hash value with the hash value of the digital asset data packet of the agreed transaction object sent by the internet digital asset and network right transaction platform (intelligent contract), further determines the authenticity and accuracy of the agreed transaction object and sends an confirming instruction to the user a (intelligent contract) of the transaction object, and the two transaction parties confirm the transaction object and send the confirming instruction, namely the authority confirming password of the transaction data packet A lock instruction.
(8) A user a (intelligent contract) receives a hash value of a digital asset data packet which is packed by an internet digital asset and a network right transaction platform (intelligent contract) corresponding to a transaction counterpart b (intelligent contract) and corresponds to an agreed transaction object, and an authority confirming password of the digital asset data packet which is sent by the user b (intelligent contract) and is in a hidden state, the user a (intelligent contract) hashes the digital asset data packet sent by the user b (intelligent contract), verifies and compares the hash value of the digital asset data packet which is sent by the internet digital asset and the agreed transaction object sent by the network right transaction platform (intelligent contract), further determines the truth and the accuracy of the transaction object and then sends a confirmation instruction to the user b (intelligent contract) of the transaction counterpart, and the two transaction parties confirm the transaction object and send the confirmation instruction, namely the authority of the transaction data packet And hiding the unlocking instruction of the password.
(9) The two transaction parties (intelligent contracts) confirm the transaction object of the received digital asset data packet and send a confirmation instruction, namely an unlocking instruction of the right hidden password of the transaction data packet, and any party needs to unlock the hidden right password sent by the other party after receiving the unlocking instruction of the other party and sending the unlocking instruction by the party.
(10) After the digital asset data packet of the transaction initial agreement transaction is sent, any operation can be performed on the digital asset corresponding to the unlocked authorization password only on the account of the unlocked authorization password, namely the authorization of the digital asset, and any rest account number has no permission to perform any operation on the digital asset even if the digital asset data packet and the authorization password are acquired.
(11) After both transaction parties (intelligent contracts) send confirmation instructions to the transaction counterpart and receive the confirmation instructions sent by the counterpart, both the transaction parties (intelligent contracts) can unlock the authority-confirming passwords of the digital asset data packets of the transaction (or the hidden authority-confirming passwords of the digital asset data packets of the agreed transaction are automatically unlocked), both the transaction parties (intelligent contracts) can authorize the unlocking of the authority-confirming passwords according to the confirmation instructions, the authority-confirming password lattices are clicked one by one in sequence, the unlocking of the authority-confirming passwords is unlocked one by one according to the password sequence until the passwords are completely unlocked, the digital assets of the agreed transaction are automatically associated with account information for unlocking the digital asset data packets, the digital asset authority confirmation is completed, and the transaction is completed.
(12) After the two transaction parties (intelligent contracts) verify and confirm the transaction target objects of the digital asset data packets and send confirmation instructions to the two transaction parties, the two transaction parties lose the authority of transaction termination.
(13) If one or both parties (intelligent contracts) of the transaction do not confirm the transaction subject matter of the received digital asset data packet and send a confirmation instruction, any party of the transaction can apply for terminating the transaction.
(14) And any party (intelligent contract) does not confirm the transaction target object on the received digital asset data packet and sends a confirmation instruction, and the transaction cannot be completed.
(15) If one party or two transaction parties (intelligent contracts) do not confirm the transaction target object of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for terminating the transaction, and the transaction is automatically terminated 24 hours after the last party carries out network signature of the intelligent contracts.
(16) If one party or two transaction parties (intelligent contracts) do not confirm the transaction target object of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for transaction termination, the transaction is automatically terminated after 24 hours after the last party carries out network signature of the intelligent contracts, and the digital asset data packet and the hidden authorization code return the original path.
(17) If one party or two transaction parties (intelligent contracts) do not confirm the transaction subject matter of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for terminating the transaction, the transaction is automatically terminated after 24 hours after the last party carries out network signature of the intelligent contract, the data packet and the hidden authorization code are returned to the original path, the returned digital asset data packet is associated with the personal transaction account information unlocked by the authorization code under the unlocking of the hidden authorization code, the digital asset authorization is completed, the transaction is finished, and the digital asset is returned to the transaction account digital asset wallet again.
(18) If one party or two transaction parties (intelligent contracts) do not confirm the transaction subject matter of the received digital asset package and send a confirmation instruction, the two parties have the authority to apply for terminating the transaction, the digital asset data package and the hidden authority-confirming password return the original path, the returned digital asset data package is associated with the personal transaction account information unlocked by the authority-confirming password under the unlocking of the hidden authority-confirming password, the digital asset authority confirmation is completed, the transaction is finished, and the digital asset is returned to the account digital asset wallet again.
(19) After the intelligent contracts of both transaction parties receive the confirmation instruction, the authority confirming password of the digital asset data packet is automatically unlocked, and after the authority confirming password is unlocked, the digital asset is automatically associated with the account information of the transaction client side which completes the unlocking of the authority confirming password, so that the authority confirming of the digital asset is completed, and the transaction is completed.
Application scenario simulation 1:
the internet user A goes to travel during holidays and orders the air tickets and hotels through a certain network service platform, and the network service platform gives 300-credit reward to the user A for rewarding the user, increasing the user viscosity and promoting the order amount, so that the user A can be charged for ordering the air tickets later for 300 yuan, and the validity period is 3 months. The user A is given a 120-yuan hotel withholding ticket for later hotel reservation withholding, with a validity period of 6 months. But with a there is no need to take an airplane for the next 3 months and no need to book a hotel for the next 6 months. The feedback reward of the user A to the network service platform is happy and worried, and the feedback output of the network service platform may not achieve the expected effect. In order not to make the acquaintance lost, the user a intends to trade the internet digital assets, i.e., the network ticket, which the user a has obtained but has no actual use requirement, so as to recover the acquaintance lost. The user A gets contact with the user B who has a chance to go out through the Internet digital asset and network ticket transaction platform, and the user B is negotiated by both parties to trade 300 yuan and 120 yuan of hotel discount coupons with the user A at a price of 300 yuan. The method comprises the steps that a user A and a user B apply for trading from an Internet digital asset and network ticket trading platform and generate trading interest intelligent contracts, after the user A and the user B agree on trading target objects and trading execution details according to the agreement, the trading target objects and the trading execution details are sent to the Internet digital asset and network ticket trading platform through signatures of both parties, the authority and the attribution of the agreed trading target objects are confirmed through the platform and the consistency of the contracts is confirmed and stored, and the generated trading intelligent contracts are synchronized with both trading parties and pass through a trading request.
The method comprises the steps that a user A (intelligent contract) makes an asset data packaging request on a 300-point air ticket and a 120-element hotel discount coupon, the attribution right and the authenticity of the digital asset and the network right of the user packaging request are confirmed through an internet digital asset and network right transaction platform (intelligent contract), the data packaging request is completed, the packaged digital asset data packet is subjected to hash encryption, and meanwhile, the hash value of the digital asset data packet packaged by the user A (intelligent contract) is sent to a user B (intelligent contract) of a transaction counterpart.
After the user A packs the digital assets and the right certificate, the packed data packet is encrypted with the right confirmation, the intelligent contract sends the first right confirmation code of the digital asset data packet and the hidden digital asset data packet to the user B (the intelligent contract), the digital asset data packet packed by both trading parties can only be effectively sent to one trading account, the trading party sends the digital asset data packet and the right confirmation code of the appointed trading to the trading party and then the digital assets disappear from the own account data packet, the digital asset data packet can only be unlocked with the right confirmation on the trading account of the trading party B receiving the digital asset data packet after being sent and before being returned, the user A can unlock with the right confirmation and complete the right confirmation on the digital asset data packet according to the right confirmation code of the digital asset data packet before being sent and after being returned, the digital assets are returned to user a's account asset pack.
The user B recharges 300 yuan of the legal tender through the Internet digital asset and network ticket trading platform, and exchanges the voucher into the voucher of the universal circulation of the Internet digital asset and network ticket trading platform, the intelligent contract makes a data packaging request for the voucher of the value 300 yuan, the digital asset and the network ticket of the user packaging request are confirmed for attribution right and authenticity through the Internet digital asset and network ticket trading platform (the intelligent contract), the data packaging request is supported to be completed, the packaged digital asset data packet is subjected to Hash encryption, and meanwhile, the Hash value of the digital asset data packet packaged by the user B (the intelligent contract) is sent to the user A (the intelligent contract) of the opposite transaction party.
After the user B packages the digital assets and the right certificate, the packaged data packet is encrypted with the right confirmation, the intelligent contract sends the first right confirmation code of the digital asset data packet and the hidden digital asset data packet to the user A (the intelligent contract), the digital asset data packet packaged by both trading parties can only be effectively sent to one trading account, the trading party packages the digital assets for appointed trading into the digital asset data packet and sets the right confirmation code, the digital assets disappear from the own account data packet, the digital asset data packet can only be unlocked with the right confirmation on the trading account of the trading party A for receiving the digital asset data packet after being sent and before being returned, the user B can unlock with the right confirmation and complete the right confirmation on the digital asset data packet according to the right confirmation code of the digital asset data packet before being sent and after being returned, the digital assets are returned to user B's account asset pack.
The true authorization hiding password number of the transaction data packet sent by both transaction parties to the other party is consistent.
A user B (intelligent contract) receives a hash value of a digital asset data packet which is from an internet digital asset and a network right trading platform (intelligent contract) and corresponds to an agreed trading target object and is packaged by a trading partner A (intelligent contract), and an authority confirming password of the digital asset data packet and a hidden digital asset data packet which are sent by the user A (intelligent contract), the user B (intelligent contract) hashes the digital asset data packet sent by the user A (intelligent contract), verifies and compares the hash value of the digital asset data packet and the hash value of the digital asset data packet of the agreed trading target object sent by the internet digital asset and the network right trading platform (intelligent contract), further determines the truth and the accuracy of the trading target object and sends a confirmation instruction to the trading partner user A (intelligent contract), and the trading partner confirms the trading target object and sends the confirmation instruction, namely the authority hiding password of the trading data packet The unlock instruction of (1).
The method comprises the steps that a user A (intelligent contract) receives a hash value of a digital asset data packet which is from an internet digital asset and a network right trading platform (intelligent contract) and packed by a trading partner B (intelligent contract) and corresponds to an agreed trading target object, and a right password of the digital asset data packet and a hidden digital asset data packet sent by the user B (intelligent contract), the user A (intelligent contract) hashes the digital asset data packet sent by the user B (intelligent contract), verifies and compares the agreed trading target object hash value with the hash value of the digital asset data packet from the internet digital asset and the agreed trading target object sent by the network right trading platform (intelligent contract), further determines the truth and the accuracy of the trading target object and then sends a confirmation instruction to the trading partner user B (intelligent contract), and the trading partner (intelligent contract) confirms the trade target object confirmation of the received digital asset data packet and sends the confirmation instruction, namely the confirmation instruction is the trading data packet The right is confirmed to hide the unlocking instruction of the password.
After the digital asset data packet verifies and confirms the transaction object, and sends a confirmation instruction to the other transaction party, both transaction parties lose the authority of transaction termination.
If one or both parties (intelligent contracts) of the transaction do not confirm the transaction subject matter of the received digital asset data packet and send a confirmation instruction, any party of the transaction can apply for terminating the transaction.
And any party (intelligent contract) does not confirm the transaction target object on the received digital asset data packet and sends a confirmation instruction, and the transaction cannot be completed.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction target object of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for terminating the transaction, and the transaction is automatically terminated 24 hours after the last party carries out network signature of the intelligent contracts.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction target object of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for transaction termination, the transaction is automatically terminated after 24 hours after the last party carries out network signature of the intelligent contracts, and the digital asset data packet and the hidden authorization code return the original path.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction subject matter of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for terminating the transaction, the transaction is automatically terminated after 24 hours after the last party carries out network signature of the intelligent contract, the data packet and the hidden authorization code are returned to the original path, the returned digital asset data packet is associated with the personal account information unlocked by the authorization code under the unlocking of the hidden authorization code, the digital asset authorization is completed, the transaction is finished, and the digital asset is returned to the account digital wallet again.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction subject matter of the received digital asset package and send a confirmation instruction, the two parties have the authority to apply for terminating the transaction, the digital asset data package and the hidden authorization code return the original path, the digital asset of the returned digital asset data package is associated with the personal account information unlocked by the authorization code under the unlocking of the hidden authorization code, the digital asset authorization is completed, the transaction is finished, and the digital asset is returned to the account digital wallet again.
After both parties (smart contracts) send confirmation instructions of the transaction subject matter, any party of both parties of the transaction can unlock the received hidden authorization code.
Both parties (intelligent contracts) of the transaction can authorize the unlocking of the right-confirming password according to the confirmation instruction, click the right-confirming password grids one by one, unlock the right-confirming password one by one according to the password sequence until the password is completely unlocked, and the hidden right-confirming password with the corresponding digit of the opposite party of the transaction can be automatically displayed and unlocked when the password is unlocked by one party which carries out the hidden right-confirming password unlocking first and every time the password is unlocked.
Any party (intelligent contract) can unlock the hidden authority password without unlocking according to the password sequence.
The digital asset is automatically associated with the personal account information unlocked by the authorization code to complete authorization of the digital asset, and the digital asset automatically enters the personal account asset wallet unlocked by the authorization code.
After receiving the confirmation instruction, both parties (intelligent contracts) do not unlock the hidden authorization password, and the hidden authorization password is automatically unlocked 24 hours after the last party of the transaction carries out intelligent contract network signature.
After the digital asset data packet of the transaction initial agreement transaction is sent, any operation can be performed on the digital asset corresponding to the unlocked authorization password only on the account of the unlocked authorization password, namely the authorization of the digital asset, and any rest account number has no permission to perform any operation on the digital asset even if the digital asset data packet and the authorization password are acquired.
The two transaction parties (intelligent contracts) confirm the transaction object of the received digital asset data packet and send a confirmation instruction, namely an unlocking instruction of the right hidden password of the transaction data packet, and any party needs to unlock the hidden right password sent by the other party after receiving the unlocking instruction of the other party and sending the unlocking instruction by the party.
After both trading parties (intelligent contracts) send confirmation instructions to the trading counterpart (intelligent contracts) and receive the confirmation instructions sent by the counterpart, both trading parties can unlock the authorized password of the trading digital asset data packet (or the hidden authorized password of the trading digital asset data packet is automatically unlocked), the digital asset of the agreed trading is automatically associated with the account information for unlocking the digital asset data packet, the digital asset authorization is completed, and the trading is completed.
After the intelligent contracts of both transaction parties receive the confirmation instruction, the authority confirming password of the digital asset data packet is automatically unlocked, and after the authority confirming password is unlocked, the digital asset is automatically associated with the account information of the transaction client side which completes the unlocking of the authority confirming password, so that the authority confirming of the digital asset is completed, and the transaction is completed.
The user A can convert the universal circulation certificate of the internet digital assets and the network ticket trading platform obtained by trading into the legal currency in the internet digital assets and the network ticket trading platform, and the legal currency is transferred to any asset account appointed by the user A through the authorization of the account password.
User B can transfer the internet digital assets and the air tickets obtained by transaction with 300 points and 120-element hotel deduction tickets from the internet digital assets and the network ticket transaction platform to any platform which can be used and is designated by the user B through account password authorization.
Application scenario simulation 2:
a certain large Internet service platform feeds back users according to participation degree certification or workload certification, the weight proportion of completion of the participation degree certification or workload certification is regulated, relatives, friends, colleagues or strangers can be invited to complete the participation degree certification or workload certification weight proportion instead of the specified proportion or trade with other people, the user Z actively responds and participates, and the user W also actively participates.
When the feedback activity time is half, the user Z can not continuously realize the operation of the participation degree certification or the workload certification on the Internet service platform due to the working reason, and the previous participation degree certification or workload certification can not meet the condition of feedback reward acquisition of the Internet service platform, aiming at the user Z: firstly, the method comprises the following steps: the early payment will be meaningless. Secondly, the method comprises the following steps: there is no opportunity to participate in reward award acquisition.
The user W as the full-time mother has no trouble of the user Z, has a large amount of fragmented idle time on the premise of taking care of family life, can finish and reach the condition of feedback reward acquisition of the Internet service platform, and can create the participation degree certification or the workload certification of the feedback reward acquisition condition redundant to the Internet service platform.
Because the feedback activity rule of the Internet platform is set, the user Z just completes the proportion which is specified by the rule and should be completed by the user Z, so the user Z does not want to give up the previous effort and the acquisition opportunity of participating in the feedback reward, and the user Z initiates a transaction on the network to replace the request of the transaction participation degree certification or the workload certification which can be transacted. The user W finds the demand request of the user Z, the user W is willing to pay for redundant participation degree certification or workload certification, the trading objects of the trading parties are confirmed through the contact of the two parties, the two parties log in a trading platform of the Internet digital assets and the network ticket through respective personal accounts of the two parties, and the trading of the Internet digital assets and the network ticket is started.
The user Z and the user W apply for trading and generate trading interest intelligent contracts to the Internet digital asset and network ticket trading platform, trade subject matters and trading execution details are agreed on the interest intelligent contracts by the user Z and the user W according to the agreement, then the trade subject matters and the trading execution details are sent to the Internet digital asset and network ticket trading platform through signatures of both parties, the authority and the attribution of the agreed trade subject matters are confirmed through the platform, the consistency of the contracts is confirmed and stored, and the trading intelligent contracts are synchronized with both trading parties and pass through a trading request.
User Z (intelligent contract) makes data packing request for digital assets and right certificates agreed by both parties, confirms ownership and authenticity of the digital assets and network right certificates of the user packing request through Internet digital assets and network right trading platform (intelligent contract), supports completion of the data packing request, makes hash encryption on the packed digital asset data package, and sends the hash value of the digital asset data package packed by user Z (intelligent contract) to user W (intelligent contract) of the trading counterpart.
After the user Z finishes packaging the digital assets and the right certificate, the right-confirming encryption is carried out on the packaged data packet, the intelligent contract sends the right-confirming password I of the digital asset data packet and the hidden digital asset data packet to the user W (the intelligent contract), the digital asset data packet packaged by both trading parties can only be effectively sent to one trading account, the trading party packages the digital assets for appointed trading into the digital asset data packet and sets the right-confirming password, the digital assets disappear from the own account asset packet, the right-confirming unlocking can be carried out only on the trading account of the trading opposite party W for receiving the digital asset data packet before the digital asset data packet is sent and after the digital asset data packet is sent and returned, the user Z can carry out the right-confirming unlocking on the digital asset data packet according to the right-confirming password of the digital asset data packet and complete the right confirmation, the digital assets are returned to user Z's account asset pack.
The user W (intelligent contract) makes a data packaging request for the network digital assets and the right of the two parties for the agreed transaction, confirms the ownership and the authenticity of the digital assets and the network right of the user packaging request through the Internet digital assets and the network right transaction platform (intelligent contract), supports the completion of the data packaging request, performs hash encryption on the packaged digital asset data packet, and simultaneously sends the hash value of the digital asset data packet packaged by the user W (intelligent contract) to the user Z (intelligent contract) of the transaction counterpart.
After a user W packages the network right assets, the packaged data packet is encrypted for right confirmation, an intelligent contract sends a right confirmation password I of an asset data packet and a hidden asset data packet to a user Z (an intelligent contract), the digital asset data packet packaged by two transaction parties can only be effectively sent to one transaction account, the digital assets of appointed transaction are packaged into a digital asset data packet by a transaction party and set the right confirmation password, the digital assets disappear from an account asset packet, the right confirmation unlocking can be only carried out on the transaction account of a transaction opposite party Z receiving the digital asset data packet before the digital asset data packet is sent and after the digital asset data packet is sent and returned, the user W can unlock the right confirmation of the digital asset data packet and complete the right confirmation according to the right confirmation password of the digital asset data packet, the digital assets are returned to the account asset pack of user W.
The method comprises the steps that a user W (intelligent contract) receives a hash value of a digital asset data packet which is from an internet digital asset and a network right trading platform (intelligent contract) and packed by a trading partner Z (intelligent contract) and corresponds to an agreed trading target object, and a right confirming password of the digital asset data packet and a hidden digital asset data packet which are sent by the user Z (intelligent contract), the user W (intelligent contract) hashes the digital asset data packet sent by the user Z (intelligent contract), verifies and compares the digital asset data packet with the hash value of the digital asset data packet of the agreed trading target object sent by the internet digital asset and the network right trading platform (intelligent contract), further confirms the truth of the trading target object and sends a confirmation instruction to the trading partner Z (intelligent contract), and the trading partner confirms the trading target object and sends the confirmation instruction, namely the right hiding password of the trading data packet The unlock instruction of (1).
User Z (smart contract) receives the hash value of the asset data package corresponding to the agreed trade subject matter packaged by the trading partner W (smart contract) from the internet digital asset and network ticket trading platform, and the exact passwords of the asset data packet sent by the user W (intelligent contract) and the asset data packet in a hidden state, the user Z (intelligent contract) hashes the asset data packet sent by the user W (intelligent contract), and compares the hash value with the hash value of the asset data packet of the appointed transaction object sent by the Internet digital asset and network ticket transaction platform (intelligent contract), and further determining the authenticity and accuracy of the agreed transaction object, and then sending a confirmation instruction to a user W (intelligent contract) of the transaction opposite side, wherein the transaction side confirms the transaction object of the received digital asset data packet and sends the confirmation instruction, namely the unlocking instruction of the right hidden password of the transaction data packet.
The true right hiding cipher code numbers of the transaction data packets sent by both transaction parties (intelligent contracts) to the other party are consistent.
After the digital asset data packet verifies and confirms the transaction object, and sends a confirmation instruction to the other transaction party, both transaction parties lose the authority of transaction termination.
If one or both parties (intelligent contracts) of the transaction do not confirm the transaction subject matter of the received digital asset data packet and send a confirmation instruction, any party of the transaction can apply for terminating the transaction.
And any party (intelligent contract) does not confirm the transaction target object on the received digital asset data packet and sends a confirmation instruction, and the transaction cannot be completed.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction target object of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for terminating the transaction, and the transaction is automatically terminated 24 hours after the last party carries out network signature of the intelligent contracts.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction target object of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for transaction termination, the transaction is automatically terminated after 24 hours after the last party carries out network signature of the intelligent contracts, and the digital asset data packet and the hidden authorization code return the original path.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction subject matter of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for terminating the transaction, the transaction is automatically terminated after 24 hours after the last party carries out network signature of the intelligent contract, the data packet and the hidden authorization code are returned to the original path, the returned digital asset data packet is associated with the personal account information unlocked by the authorization code under the unlocking of the hidden authorization code, the digital asset authorization is completed, the transaction is finished, and the digital asset is returned to the account digital wallet again.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction subject matter of the received digital asset package and send a confirmation instruction, the two parties have the authority to apply for terminating the transaction, the digital asset data package and the hidden authorization code return the original path, the digital asset of the returned digital asset data package is associated with the personal account information unlocked by the authorization code under the unlocking of the hidden authorization code, the digital asset authorization is completed, the transaction is finished, and the digital asset is returned to the account digital wallet again.
After both parties (smart contracts) send confirmation instructions of the transaction subject matter, any party of both parties of the transaction can unlock the received hidden authorization code. Both sides of the transaction can unlock the right-confirming password according to the authorization of the confirmation instruction, click the right-confirming password grids one by one in sequence, and unlock the right-confirming password one by one in the password sequence until the password is completely unlocked.
When one party unlocking the hidden right-confirming password, the other party automatically shows the hidden right-confirming password with the corresponding digit of the transaction party, namely unlocking.
Any party (intelligent contract) can unlock the hidden authority password without unlocking according to the password sequence.
The digital asset is automatically associated with the personal account information unlocked by the authorization code to complete authorization of the digital asset, and the digital asset automatically enters the personal account asset wallet unlocked by the authorization code.
And the hidden right-confirming password unlocking is realized by clicking the digit lattice of the hidden right-confirming password in sequence to unlock the right-confirming password.
After receiving the confirmation instruction, both parties (intelligent contracts) do not unlock the hidden authorization password, and the hidden authorization password is automatically unlocked 24 hours after the last party of the transaction carries out intelligent contract network signature.
After the digital asset data packet of the transaction initial agreement transaction is sent, any operation can be performed on the digital asset corresponding to the unlocked authorization password only on the account of the unlocked authorization password, namely the authorization of the digital asset, and any rest account number has no permission to perform any operation on the digital asset even if the digital asset data packet and the authorization password are acquired.
The two transaction parties (intelligent contracts) confirm the transaction object of the received digital asset data packet and send a confirmation instruction, namely an unlocking instruction of the right hidden password of the transaction data packet, and any party needs to unlock the hidden right password sent by the other party after receiving the unlocking instruction of the other party and sending the unlocking instruction by the party.
After both transaction parties (intelligent contracts) send confirmation instructions to the transaction counterpart and receive the confirmation instructions sent by the counterpart, both transaction parties can unlock the authority-confirming password of the digital asset data packet of the transaction (or the hidden authority-confirming password of the digital asset data packet of the agreed transaction is automatically unlocked), the digital asset of the agreed transaction is automatically associated with the account information for unlocking the digital asset data packet, the digital asset authority confirmation is completed, and the transaction is completed.
After the intelligent contracts of both transaction parties receive the confirmation instruction, the authority confirming password of the digital asset data packet is automatically unlocked, and after the authority confirming password is unlocked, the digital asset is automatically associated with the account information of the transaction client side which completes the unlocking of the authority confirming password, so that the authority confirming of the digital asset is completed, and the transaction is completed.
The user Z can transfer the participation degree certification or the workload certification of the returned reward acquisition condition of the internet digital assets and the internet service platform obtained by the transaction from the internet digital assets and the network ticket transaction platform to the internet platform participating in the activity by the user Z through account password authorization, so as to complete the activity participation.
The user W can convert the universal circulation certificate of the internet digital assets and the network ticket trading platform obtained by trading into the legal currency and transfer the legal currency into any own appointed asset account through the authorization of the account password.
Application scenario simulation 3:
with the continuous development of the internet, the arrival of the value internet, the continuous perfection and popularization of the internet digital assets and the network licenses, any user participating in the internet behavior can have different and various internet digital assets and network licenses. In addition to the continuous upgrading and perfection of the network certification (token) released by the internet enterprises, mutual mapping between real assets and network assets, sharing of the internet certification and various value increase expectations of the upgrading value, premium transactions except the submission of the internet digital asset certification by users become a normal state.
The user L acquires the network certification assets given by the Internet enterprise due to participation in the activities of the Internet platform, the certification assets can share the value according to the value X at the acquisition moment and the higher-value certification assets W output by the future Internet platform, the growth and value-added expectation of the certification is given, obviously, if the user L carries out the operation of carrying out the withdrawal on the certification assets according to the existing value X, the user L needs the assets very much, and therefore the over-price transaction of the existing certification assets between the certification asset value X and the future certification asset value W is the most ideal choice. In this regard, user L distributes trading interest over the network, and user G achieves trading interest with user L by looking at the future value growth space and value growth expectation of the certified asset. The trading objects of the two trading parties are confirmed through the contact of the two parties, and the two parties log in a trading platform of the internet digital assets and the network ticket through respective personal accounts of the two parties, so that the trading of the internet digital assets and the network ticket is started.
The user L and the user G apply for trading and generate trading interest intelligent contracts to the Internet digital asset and network ticket trading platform, trade subject matters and trading execution details are agreed on the interest intelligent contracts through the user L and the user G according to the agreement, then the agreement is sent to the Internet digital asset and network ticket trading platform through signatures of both parties, the authority and the attribution of the agreed trading subject matters are confirmed through the platform, the consistency of the contracts is confirmed and stored, the intelligent contracts are synchronized with both trading parties, and a trading request is passed.
The user L (intelligent contract) makes a data packaging request for the digital assets agreed by both parties, confirms the ownership and authenticity of the digital assets and the network ticket requested by the user through the Internet digital assets and the network ticket transaction platform (intelligent contract), supports the completion of the data packaging request, makes hash encryption on the packaged digital asset data packet, and sends the hash value of the digital asset data packet packaged by the user L (intelligent contract) to the user G (intelligent contract) of the transaction counterpart.
After the user L packs the digital assets and the right certificate, the packed data packet is encrypted with the right confirmation, the intelligent contract sends the right confirmation password I of the digital asset data packet and the hidden digital asset data packet to the user G (intelligent contract), the digital asset data packet packed by both trading parties can only be effectively sent to one trading account, the trading party packs the digital assets for appointed trading into the digital asset production data packet and sets the right confirmation password, the digital assets disappear from the own account production packet, the digital asset data packet can only be unlocked with the right confirmation on the trading account of the trading exchange G for receiving the digital asset data packet before sending and after returning, the user L can unlock with the right confirmation and complete the right confirmation on the digital asset data packet according to the right confirmation password of the digital asset data packet, the digital assets are returned to the account asset pack of user L.
The user G (intelligent contract) makes a data packaging request for the network right assets agreed by both parties, confirms the ownership and authenticity of the digital assets and the network right documents of the user packaging request through the Internet digital assets and the network right document transaction platform (intelligent contract), supports the completion of the data packaging request, makes hash encryption on the packaged digital asset data package, and sends the hash value of the digital asset data package packaged by the user G (intelligent contract) to the user L (intelligent contract) of the transaction counterpart.
After the user G completes the packaging of the network right certificate assets, the right-confirming encryption is carried out on the packaged data packet, the intelligent contract sends the right-confirming password I of the asset data packet and the hidden asset data packet to the user L (the intelligent contract), the digital asset data packet packaged by both trading parties can only be effectively sent to one trading account, the trading party packages the digital assets for appointed trading into the digital asset data packet and sets the right-confirming password, the digital assets disappear from the own account asset packet, the right-confirming unlocking can only be carried out on the trading account of the trading party L receiving the digital asset data packet before the digital asset data packet is sent and after the digital asset data packet is sent and returned, the user G can carry out the right-confirming unlocking on the digital asset data packet and complete the right-confirming according to the right-confirming password of the digital asset data packet, the digital assets are returned to the user G's account asset pack.
The method comprises the steps that a user G (intelligent contract) receives a hash value of a digital asset data packet which is from an internet digital asset and a network right trading platform (intelligent contract) and packed by a trading partner L (intelligent contract) and corresponds to an agreed trading target object, and a right confirmation password of the digital asset data packet and a hidden digital asset data packet sent by the user L (intelligent contract), the user G (intelligent contract) hashes the digital asset data packet sent by the user L (intelligent contract), verifies and compares the digital asset data packet with the hash value of the digital asset data packet of the agreed trading target object sent by the internet digital asset and the network right trading platform (intelligent contract), further determines the truth of the trading target object and sends a confirmation instruction to the trading partner L (intelligent contract), and the trading partner (intelligent contract) confirms the trading target object received by the trading partner and sends the confirmation instruction, namely the trading data packet The right is confirmed to hide the unlocking instruction of the password.
The method comprises the steps that a user L (intelligent contract) receives a hash value of an asset data packet which is from an internet digital asset and network right transaction platform (intelligent contract) and corresponds to an agreed transaction object and is packaged by a transaction counterpart G (intelligent contract), and a right password of the asset data packet and a hidden asset data packet which are sent by the user G (intelligent contract), the user L (intelligent contract) hashes the asset data packet sent by the user G (intelligent contract), verifies and compares the hash value with the hash value of the asset data packet of the agreed transaction object and sent by the internet digital asset and network right transaction platform (intelligent contract), further determines the authenticity and accuracy of the agreed transaction object and then sends a confirmation instruction to the transaction counterpart user G (intelligent contract), the transaction counterpart (intelligent contract) confirms the transaction object of the received digital asset data packet and sends an unlocking instruction which is the right hidden password of the transaction data packet, and the unlocking instruction is sent by the confirmation instruction .
The true right hiding cipher code numbers of the transaction data packets sent by both transaction parties (intelligent contracts) to the other party are consistent.
After the digital asset data packet verifies and confirms the transaction object, and sends a confirmation instruction to the other transaction party, both transaction parties lose the authority of transaction termination.
If one or both parties (intelligent contracts) of the transaction do not confirm the transaction subject matter of the received digital asset data packet and send a confirmation instruction, any party of the transaction can apply for terminating the transaction.
And any party (intelligent contract) does not confirm the transaction target object on the received digital asset data packet and sends a confirmation instruction, and the transaction cannot be completed.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction target object of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for terminating the transaction, and the transaction is automatically terminated 24 hours after the last party carries out network signature of the intelligent contracts.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction target object of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for transaction termination, the transaction is automatically terminated after 24 hours after the last party carries out network signature of the intelligent contracts, and the digital asset data packet and the hidden authorization code return the original path.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction subject matter of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for terminating the transaction, the transaction is automatically terminated after 24 hours after the last party carries out network signature of the intelligent contract, the data packet and the hidden authorization code are returned to the original path, the returned digital asset data packet is associated with the personal account information unlocked by the authorization code under the unlocking of the hidden authorization code, the digital asset authorization is completed, the transaction is finished, and the digital asset is returned to the account digital wallet again.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction subject matter of the received digital asset package and send a confirmation instruction, the two parties have the authority to apply for terminating the transaction, the digital asset data package and the hidden authorization code return the original path, the digital asset of the returned digital asset data package is associated with the personal account information unlocked by the authorization code under the unlocking of the hidden authorization code, the digital asset authorization is completed, the transaction is finished, and the digital asset is returned to the account digital wallet again.
After both parties (intelligent contracts) send confirmation instructions of transaction objects, both the parties can unlock the right-confirming passwords according to the authorization of the confirmation instructions, click the right-confirming password grids one by one in sequence, and unlock the right-confirming passwords one by one according to the password sequence until the passwords are completely unlocked.
When one party unlocking the hidden right-confirming password, the other party automatically shows the hidden right-confirming password with the corresponding digit of the transaction party, namely unlocking.
Any party (intelligent contract) can unlock the hidden authority password without unlocking according to the password sequence.
The digital asset is automatically associated with the personal account information unlocked by the authorization code to complete authorization of the digital asset, and the digital asset automatically enters the personal account asset wallet unlocked by the authorization code.
After receiving the confirmation instruction, both parties (intelligent contracts) do not unlock the hidden authorization password, and the hidden authorization password is automatically unlocked 24 hours after the last party of the transaction carries out intelligent contract network signature.
After the digital asset data packet of the transaction initial agreement transaction is sent, any operation can be performed on the digital asset corresponding to the unlocked authorization password only on the account of the unlocked authorization password, namely the authorization of the digital asset, and any rest account number has no permission to perform any operation on the digital asset even if the digital asset data packet and the authorization password are acquired.
The two transaction parties (intelligent contracts) confirm the transaction object of the received digital asset data packet and send a confirmation instruction, namely an unlocking instruction of the right hidden password of the transaction data packet, and any party needs to unlock the hidden right password sent by the other party after receiving the unlocking instruction of the other party and sending the unlocking instruction by the party.
After both transaction parties (intelligent contracts) send confirmation instructions to the transaction counterpart and receive the confirmation instructions sent by the counterpart, both transaction parties can unlock the authority-confirming password of the digital asset data packet of the transaction (or the hidden authority-confirming password of the digital asset data packet of the agreed transaction is automatically unlocked), the digital asset of the agreed transaction is automatically associated with the account information for unlocking the digital asset data packet, the digital asset authority confirmation is completed, and the transaction is completed.
After the intelligent contracts of both transaction parties receive the confirmation instruction, the authority confirming password of the digital asset data packet is automatically unlocked, and after the authority confirming password is unlocked, the digital asset is automatically associated with the account information of the transaction client side which completes the unlocking of the authority confirming password, so that the authority confirming of the digital asset is completed, and the transaction is completed.
The user L can convert the universal circulation certificate of the internet digital assets and the network ticket trading platform obtained by trading into the legal currency, and the legal currency is transferred to any asset account appointed by the user L through the authorization of the account password for the life expenditure of the user L.
The user G can communicate the internet digital assets obtained by the transaction and the network certificates which can participate in the value growth and sharing, and continue to hold and enjoy the income increase brought by the value sharing.
Application scenario simulation 4:
the network user M and the network user N achieve trading interest in the network world for real-world physical property S held by the user M.
The user M and the user N apply for trading and generate trading interest intelligent contracts to the Internet digital asset and network right trading platform, trade subject matters and trading execution details are agreed according to the agreement on the interest intelligent contracts by the user M and the user N, then the trade subject matters and the trading execution details are sent to the Internet digital asset and network right trading platform through signatures of both parties, the authority and the attribution of the agreed trade subject matters are confirmed through the platform, the consistency of the contracts is confirmed and stored, and the intelligent contracts are synchronized with both trading parties and pass through a trading request.
The user N (intelligent contract) makes a data packaging request for the digital assets agreed by both parties, confirms the ownership and authenticity of the digital assets and the network ticket requested by the user through the Internet digital assets and the network ticket transaction platform (intelligent contract), supports the completion of the data packaging request, makes hash encryption on the packaged digital asset data package, and simultaneously sends the hash value of the digital asset data package packaged by the user N (intelligent contract) to the user M (intelligent contract) of the transaction counterpart.
After the user N packs the digital assets and the right certificates, the packed data packet is encrypted for right confirmation, the intelligent contract sends the digital asset data packet and the hidden digital asset data packet to the user M (intelligent contract), the digital asset data packet packed by both trading parties can only be effectively sent to one trading account, the trading party packs the digital assets for appointed trading into the digital asset production data packet and sets the right confirmation password, the digital assets disappear from the own account production packet, the digital asset data packet can only be unlocked for right confirmation and the right confirmation on the trading account of the trading exchange M for receiving the digital asset data packet before sending and after returning, the user N can unlock for right confirmation and the right confirmation on the digital asset data packet according to the right confirmation password of the digital asset data packet, the digital assets are returned to the account asset pack of user N.
And the user M (intelligent contract) maps and converts the real-world physical assets S agreed to trade by the two parties into a digital asset permit which can be circulated and traded on the Internet digital asset and network ticket trading platform and packages the digital asset permit into a request of a digital asset data packet. The real-world real asset S of the appointed transaction is connected with a transaction user N through a high-speed and quick network at an intelligent logistics mechanism which is networked with an internet digital asset and network ticket transaction platform, remote verification of the real-world real asset S of the appointed transaction is realized, or image data of the real asset is generated according to the requirement of the user N, the real-world real asset S of the appointed transaction is mapped and converted into a digital asset ticket which can be circulated and transacted on the internet digital asset and network ticket transaction platform after the remote verification of the transaction user N or the verification of the real image data and the confirmation of network signature.
The user M (intelligent contract) makes a data packaging request for the digital asset ticket agreed to trade by both parties mapped by the real physical asset S, confirms the ownership and authenticity of the digital asset and the network ticket requested by the user through the Internet digital asset and network ticket trading platform (intelligent contract), supports the completion of the data packaging request, performs hash encryption on the packaged digital asset data packet, and simultaneously sends the hash value of the digital asset data packet packaged by the user M (intelligent contract) to the user N (intelligent contract) of the trading other party.
The user M (intelligent contract) maps and converts the physical asset S through the Internet digital asset and network ticket trading platform, the circulating and trading digital asset tickets can be packaged and packaged into a digital asset data packet on the Internet digital asset and network ticket trading platform (after the real world physical asset S of the appointed trading is mapped and packaged into the digital asset data packet, only the right password of the digital asset data packet can be used for domination), the right password can be generated for the data packet according to the trading account authorization of the user M, and the right password of the digital asset ticket data packet and the hidden digital asset data packet is sent to the user N (intelligent contract) by the intelligent contract.
The right-confirming password is synchronous with an internet digital asset and network right trading platform (intelligent contract) and an intelligent logistics organization which is networked with the internet digital asset and network right trading platform, the right-confirming password is used as the domination right of a real-world real asset S, a trading user M can only effectively send a packed digital asset data packet to one trading account (user N), after a trading party packs digital assets for agreed transaction into a digital asset production data packet and sets the right-confirming password, the digital assets disappear from an account asset package, after the trading user M sets the right-confirming password for the digital asset data packet for agreed transaction, the right-confirming password loses the authority of the real-world real asset S, the digital asset data packet can only carry out right-confirming and unlocking right-confirming and domination on a trading account of a trading partner N which receives the digital asset data packet before being returned after being sent, before and after the digital asset data packet is sent and returned, the user M can arbitrarily control the real-world physical asset S according to the right-confirming password of the digital asset data packet.
The method comprises the steps that a user M (intelligent contract) receives a hash value of a digital asset data packet of an agreed transaction object, which is packaged by a transaction party N (intelligent contract) from an Internet digital asset and network right transaction platform (intelligent contract), and a right password of the digital asset data packet of the agreed transaction object and a hidden digital asset data packet sent by the user N (intelligent contract), the user M (intelligent contract) hashes the digital asset data packet sent by the user N (intelligent contract), verifies and compares the hash value of the digital asset data packet of the agreed transaction object sent by the Internet digital asset and network right transaction platform (intelligent contract), further determines the truth and the accuracy of the transaction object and then sends a confirmation instruction to the user N (intelligent contract) of the transaction party, and the two transaction parties (intelligent contracts) confirm the transaction object of the received digital asset data packet and send the confirmation instruction, namely the transaction data packet is the transaction data packet The true right hides the unlocking instruction of the password.
The user N (intelligent contract) receives the hash value of the digital asset right data packet of the agreed transaction object packaged by the transaction counterpart M (intelligent contract) from the Internet digital asset and network right transaction platform (intelligent contract), and the exact right passwords of the asset right data packet of the agreed transaction object and the hidden asset right data packet sent by the user M (intelligent contract), the user N (intelligent contract) hashes the asset right data packet sent by the user M (intelligent contract), verifies and compares the hash value of the asset right data packet of the agreed transaction object sent by the Internet digital asset and network right transaction platform (intelligent contract), further determines the truth of the agreed transaction object, and then sends a confirmation instruction to the transaction counterpart user M (intelligent contract).
And the right password of the transaction data packet after unlocking sent by a user M (intelligent contract) and a receiving address specified by the user N (intelligent contract) are sent to an Internet digital asset and network right transaction platform, the Internet digital asset and network right transaction platform (intelligent contract) sends the received unlocked right password and the receiving address specified by the user N (intelligent contract) to an intelligent logistics mechanism which is networked with the Internet digital asset and network right transaction platform, the intelligent logistics mechanism executes a command for dominating real world physical assets S according to the right password, and a transaction party confirms the transaction object of the received digital asset data packet and sends the confirmation command, namely, the unlocking command of the right hidden password of the transaction data packet.
The true right hiding cipher code numbers of the transaction data packets sent by both transaction parties (intelligent contracts) to the other party are consistent.
After the digital asset data packet verifies and confirms the transaction object, and sends a confirmation instruction to the other transaction party, both transaction parties lose the authority of transaction termination.
If one or both parties (intelligent contracts) of the transaction do not confirm the transaction subject matter of the received digital asset data packet and send a confirmation instruction, any party of the transaction can apply for terminating the transaction.
And any party (intelligent contract) does not confirm the transaction target object on the received digital asset data packet and sends a confirmation instruction, and the transaction cannot be completed.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction target object of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for terminating the transaction, and the transaction is automatically terminated 24 hours after the last party carries out network signature of the intelligent contracts.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction target object of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for transaction termination, the transaction is automatically terminated after 24 hours after the last party carries out network signature of the intelligent contracts, and the digital asset data packet and the hidden authorization code return the original path.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction subject matter of the received digital asset data packet and send a confirmation instruction, the two parties do not apply for terminating the transaction, the transaction is automatically terminated after 24 hours after the last party carries out network signature of the intelligent contract, the data packet and the hidden authorization code are returned to the original path, the returned digital asset data packet is associated with the personal account information unlocked by the authorization code under the unlocking of the hidden authorization code, the digital asset authorization is completed, the transaction is finished, and the digital asset is returned to the account asset packet again.
The user M can map and restore the digital assets returned to the internet digital assets and the network ticket transaction platform account asset package into real-world real assets S through account password authorization, and the real-world real assets S are controlled at will at the intelligent logistics agency terminal which is networked with the internet digital assets and the network ticket transaction platform according to the authority-confirming password of the digital asset data package or the associated information certificate of the internet digital assets and the network ticket transaction platform account.
If one party or two transaction parties (intelligent contracts) do not confirm the transaction subject matter of the received digital asset package and send a confirmation instruction, the two parties have the authority to apply for terminating the transaction, the digital asset data package and the hidden authority-confirming password return the original path, the digital assets of the returned digital asset data package are associated with the personal account information unlocked by the authority-confirming password under the unlocking of the hidden authority-confirming password, the digital asset authority confirmation is completed, the transaction is finished, and the digital assets are returned to the account asset package again.
The user M can map and restore the digital assets returned to the internet digital assets and the network ticket transaction platform account asset package into real-world real assets S through account password authorization, and the real-world real assets S are controlled at will at the intelligent logistics agency terminal which is networked with the internet digital assets and the network ticket transaction platform according to the authority-confirming password of the digital asset data package or the associated information certificate of the internet digital assets and the network ticket transaction platform account.
And (3) the two transaction parties (intelligent contracts) confirm the transaction targets of the received digital asset data packet and send a confirmation instruction, namely an unlocking instruction of the right hidden password of the transaction data packet.
After both parties (smart contracts) send confirmation instructions of the transaction subject matter, any party of both parties of the transaction can unlock the received hidden authorization code.
After both parties (intelligent contracts) send confirmation instructions of transaction objects, both the parties can unlock the right-confirming passwords according to the authorization of the confirmation instructions, click the right-confirming password grids one by one in sequence, and unlock the right-confirming passwords one by one according to the password sequence until the passwords are completely unlocked.
When one party unlocking the hidden right-confirming password, the other party automatically shows the hidden right-confirming password with the corresponding digit of the transaction party, namely unlocking.
Any party (intelligent contract) can unlock the hidden authority password without unlocking according to the password sequence.
The digital asset is automatically associated with the personal account information unlocked by the authorization code to complete authorization of the digital asset, and the digital asset automatically enters the personal account asset wallet unlocked by the authorization code.
After receiving the confirmation instruction, both parties do not unlock the hidden right-confirming password, and the hidden right-confirming password is automatically unlocked 24 hours after the last party of the transaction carries out intelligent contract network signature.
After the digital asset data packet of the transaction initial agreement transaction is sent, any operation can be performed on the digital asset corresponding to the unlocked authorization password only on the account of the unlocked authorization password, namely the authorization of the digital asset, and any rest account number has no permission to perform any operation on the digital asset even if the digital asset data packet and the authorization password are acquired.
The two transaction parties (intelligent contracts) confirm the transaction object of the received digital asset data packet and send a confirmation instruction, namely an unlocking instruction of the right hidden password of the transaction data packet, and any party needs to unlock the hidden right password sent by the other party after receiving the unlocking instruction of the other party and sending the unlocking instruction by the party.
After both transaction parties (intelligent contracts) send confirmation instructions to the transaction counterpart and receive the confirmation instructions sent by the counterpart, both transaction parties can unlock the authority-confirming password of the digital asset data packet of the transaction (or the hidden authority-confirming password of the digital asset data packet of the agreed transaction is automatically unlocked), the digital asset of the agreed transaction is automatically associated with the account information for unlocking the digital asset data packet, the digital asset authority confirmation is completed, and the transaction is completed.
After the intelligent contracts of both transaction parties receive the confirmation instruction, the authority confirming password of the digital asset data packet is automatically unlocked, and after the authority confirming password is unlocked, the digital asset is automatically associated with the account information of the transaction client side which completes the unlocking of the authority confirming password, so that the authority confirming of the digital asset is completed, and the transaction is completed.
The user N can freely control the real physical asset S through an intelligent logistics mechanism which is networked by the internet digital asset and network ticket trading platform and the internet digital asset and network ticket trading platform according to the authorized password of the unlocked trading data packet sent by the user M and the associated information of the trading account of the user N, and the real physical asset S is sent to any receiving address appointed by the user N.
The user M can convert the universal circulation certificate of the internet digital assets and the network ticket trading platform obtained by trading into the legal currency in the internet digital assets and the network ticket trading platform, and the legal currency is transferred to any asset account appointed by the user M through the authorization of the account password.
The embodiments described above are presented to enable a person having ordinary skill in the art to make and use the invention. It will be readily apparent to those skilled in the art that various modifications to the above-described embodiments may be made, and the generic principles defined herein may be applied to other embodiments without the use of inventive faculty. Therefore, the present invention is not limited to the above embodiments, and those skilled in the art should make improvements and modifications to the present invention based on the disclosure of the present invention within the protection scope of the present invention.

Claims (17)

1. A point-to-point digital asset transaction method comprising the steps of:
(1) the method comprises the following steps that two transaction parties pack digital assets of appointed transaction into a digital asset data packet, an authority-confirming password is set for the data packet, the digital asset data packet and the authority-confirming password are sent to the other transaction party after being authorized by an account password of the transaction party, and the authority-confirming password is in a hidden state;
(2) after receiving the digital asset data packet and the hidden-state authorization password, both trading parties verify and confirm the transaction object on the data packet and send a confirmation instruction to the trading partner;
(3) and after receiving a confirmation instruction sent by the opposite party, the two transaction parties unlock and display the right confirmation password received by the party according to the confirmation instruction, further unlock the digital asset data packet received by the party by using the password, and automatically associate the digital asset appointed for transaction with account information for unlocking the digital asset data packet at the moment to finish the right confirmation of the digital asset and finish the transaction.
2. The peer-to-peer digital asset transaction method according to claim 1, wherein: in the step (1), the two trading parties reach the trading intention and generate a trading intelligent contract, the intelligent contract is executed after the network signatures of the two trading parties are confirmed, the intelligent contract is automatically sent to the other trading party and a trading platform, the digital assets packaged by the two trading parties and the digital assets of the agreed trading are compared and verified through the platform intelligent contract, after the verification, the digital asset data package packaged by the two trading parties is subjected to hash encryption, and the generated hash value is sent to the intelligent contract of the other trading party.
3. The peer-to-peer digital asset transaction method according to claim 1, wherein: the transaction accounts of the two transaction parties in the step (1) can be any network addresses used for storing assets on the internet, digital asset data packets packaged by the two transaction parties can be effectively sent to only one transaction account, the digital assets disappear from the asset wallet of the transaction party after the two transaction parties set the right-confirming password for the digital asset data packets, the digital asset data packets can be unlocked and confirmed only on the account of the transaction party receiving the digital asset data packets after being sent and before being returned, the digital asset data packets can be unlocked and confirmed only on the account of the transaction party packaging the digital assets before being sent or after being returned, and the digital asset data packets can be unlocked and confirmed only on the account of the right-confirming password for unlocking and conducting related operations, namely digital asset confirmation on the digital assets corresponding to the data packets after the right-confirming password is set, any remaining account, even if acquiring the digital asset data packet and the authorization code, has no right to operate the digital asset.
4. The peer-to-peer digital asset transaction method according to claim 1, wherein: and (3) after receiving the digital asset data packet, the intelligent contracts of the two transaction parties in the step (2) carry out Hash on the digital asset data packet, verify and compare the Hash value with a Hash value sent by the platform intelligent contract, confirm the transaction object, and send a confirmation instruction to the intelligent contract of the other transaction party after verification and confirmation.
5. The peer-to-peer digital asset transaction method according to claim 1, wherein: and (3) after the intelligent contracts of the two transaction parties receive the confirmation instruction, the authority-confirming password of the digital asset data packet is automatically unlocked, and after the authority-confirming password is unlocked, the digital asset is automatically associated with the account information of the transaction client side which completes the unlocking of the authority-confirming password, so that the authority-confirming of the digital asset is completed, and the transaction is completed.
6. The peer-to-peer digital asset transaction method according to claim 1, wherein: the confirmation instruction sent by the two transaction parties in the step (2) is an unlocking instruction of the digital asset data packet authentication password sent by the two transaction parties, the unlocking instruction takes effect after the two transaction parties send the unlocking instruction and receive the unlocking instruction of the opposite party, any party needs to unlock the hidden password sent by the opposite party and can carry out the unlocking operation under the conditions that the unlocking instruction sent by the opposite party is received and the unlocking instruction is sent by the own party, after the two transaction parties send the confirmation instruction to the opposite party, the two transaction parties lose the authority of transaction termination, and any party does not carry out object confirmation on the received digital asset data packet and sends the confirmation instruction, so the transaction cannot be completed, and both the two transaction parties can apply for termination of the transaction; if both sides do not apply for terminating the transaction, the transaction is automatically terminated after 24 hours of intelligent contract network signature of the last side, the digital asset data packet and the right-confirming password are returned, the returned digital asset data packet is associated with the account information of the transaction side initiating unlocking under the unlocking of the right-confirming password, so that the digital asset right-confirming is completed, and the digital asset is returned to the account digital asset wallet of the transaction side again after the transaction is finished.
7. A point-to-point digital asset transaction system is characterized by comprising respective client terminals of two transaction parties and a server terminal serving as a transaction platform, wherein the client terminals, the server terminal and the server terminal are in communication connection through a network, and the client terminals, the server terminal and the server terminal are connected through a network, wherein:
the client is used for initiating a trading interest intelligent contract request at the server, the server receives the trading interest intelligent contract request, generates an intelligent contract with the trading interest consensus and further sends the intelligent contract to the client initiating the request; the client side initiating the request sends the received intelligent contract to the client side of the transaction object, the intelligent contract content and the transaction execution details are confirmed through negotiation of the client sides of both transaction parties, the intelligent contract is automatically executed after network signature confirmation is carried out, and the intelligent contract is automatically sent to the client side of the other transaction party and the server side through the client sides of both transaction parties;
the client-side intelligent contracts of both trading parties initiate a packaging request of a digital asset to be traded to a server-side intelligent contract, the server-side intelligent contract verifies the authenticity and ownership of the digital asset to be packaged and whether the authenticity and ownership of the digital asset to be packaged accord with a trading range of a trading platform, the server-side intelligent contract compares the digital asset to be packaged with the digital asset agreed for trading in the intelligent contract, after the verification, the packaging request is approved, hash encryption is carried out on a digital asset data packet packaged by the client-side intelligent contracts of both trading parties, and a generated hash value is automatically sent to the client-side intelligent contract of the other trading party;
the client sides of both trading parties set the right-confirming password for the packed digital asset data packet, the right-confirming password is set, and the intelligent contract automatically sends the digital asset data packet and the right-confirming password to the client side intelligent contract of the trading party;
the client intelligent contracts of the two transaction parties receive the hash value of the digital asset data packet sent by the server intelligent contract, and the digital asset data packet and the right-confirming password sent by the client intelligent contract of the other transaction party, wherein the right-confirming password is in a hidden state;
after the client sides of the two transaction parties receive the digital asset data package, the client-side intelligent contract hashes the digital asset data package, and the hash value is automatically verified and compared with the hash value sent by the server-side intelligent contract to determine the consistency of the received transaction object and the transaction object agreed by the transaction intelligent contract;
after the client-side intelligent contracts of both trading parties confirm the trading target objects, automatically sending a confirmation instruction to the client-side intelligent contract of the opposite party and receiving the confirmation instruction sent by the client-side intelligent contract of the opposite party, the trading intelligent contract takes effect;
after the client-side intelligent contracts of both transaction parties receive the confirmation instruction, the right-confirming password of the digital asset data packet is automatically unlocked, and after the right-confirming password is unlocked, the digital asset is automatically associated with the account information of the transaction client-side which completes the unlocking of the right-confirming password, so that the right confirmation of the digital asset is completed, and the transaction is completed.
8. The peer-to-peer digital asset transaction system according to claim 7, wherein: the transaction accounts of the clients of the two transaction parties can be any network addresses used for storing assets on the Internet, digital asset data packets packaged by intelligent contracts of the clients of the two transaction parties can be effectively sent to only one transaction account, digital assets disappear from an asset wallet of the transaction party after the clients of the two transaction parties set the authorization passwords for the digital asset data packets, the digital asset data packets can be unlocked and authorized only on the account of the transaction party receiving the digital asset data packets after being sent and before being returned, and the digital asset data packets can be unlocked and authorized only on the account of the transaction party packaging the digital assets before being sent or after being returned. After the digital asset data packet is set with the right-confirming password, only the client account unlocking the right-confirming password can perform related operation on the digital asset corresponding to the data packet, namely the right-confirming of the digital asset, and even if any client account acquires the digital asset data packet and the right-confirming password, no right is provided for operating the digital asset.
9. The peer-to-peer digital asset transaction system according to claim 7, wherein: the confirmation instruction sent by the client-side intelligent contracts of both transaction parties is an unlocking instruction of the digital asset data packet right-confirming password sent by the client-side intelligent contracts of both transaction parties, the unlocking instruction takes effect after the client-side intelligent contracts of both transaction parties send the unlocking instruction and receive the unlocking instruction of the opposite party, the intelligent contract of any party client-side needs to unlock the hidden password sent by the client-side intelligent contract of the opposite party under the condition that the unlocking instruction sent by the client-side intelligent contract of the opposite party is received and the client-side intelligent contract of the own party already sends the unlocking instruction, the client-side intelligent contracts of both transaction parties lose the right of transaction termination after sending the confirmation instruction to the client-side intelligent contract of the opposite party, the intelligent contract of any party client-side does not carry out the object confirmation of the transaction target on the received digital asset, both clients of both trading parties can apply for ending the trade; if the clients of both parties do not apply for terminating the transaction, the transaction is automatically terminated after the last party client carries out intelligent contract network signature for 24 hours, the digital asset data packet and the right-confirming password are returned in the original way, the returned digital asset data packet is associated with the account information of the transaction party client initiating unlocking under the unlocking of the right-confirming password, so that the digital asset right confirmation is completed, the transaction is finished, and the digital asset is returned to the transaction party client account digital asset wallet again.
10. The peer-to-peer digital asset transaction system according to claim 7, wherein: the server side comprises:
the intelligent contract module is used for receiving the trading interest contract request of the client and carrying out related processing so as to enable the client to complete the intelligent contract generation, signing, execution and effect on the trading interest consensus;
the packaging module is used for receiving a packaging request of the client intelligent contract and carrying out related processing so as to enable the client intelligent contract to complete the digital asset packaging operation of the appointed transaction;
the verification module is used for verifying the consistency of the prepackaged digital assets and the digital assets of the deal intelligent contract appointed deal by the server-side intelligent contract;
the transaction module is used for receiving a digital asset transaction request of the client and carrying out related processing so as to enable the client to complete digital asset transaction;
the encryption module is used for receiving an encryption request of the client and carrying out related processing, and completing hash encryption on a digital asset data packet packaged by the intelligent contract of the client;
the processing module is used for receiving and carrying out related processing on related requests of the client on transaction intention contracts, digital asset transactions, digital asset packaging, digital asset right confirmation and data packet sending and withdrawing;
the storage module is used for storing intelligent contracts of the client about the consensus of the transaction intention, the encrypted hash value of the digital asset data packet and transaction related information;
the conversion module is used for receiving a certificate passing request that the client converts the legal tender or digital assets outside the transaction platform of the server into the transaction platform of the server, and performing related processing to enable the client to complete the request;
the confirmation module is used for confirming the transaction digital asset data packet and sending a confirmation instruction;
the unlocking module is used for unlocking the digital asset data packet of the transaction subject matter in the transaction;
the right confirming module is used for confirming the ownership of the digital assets which are finished or not finished in the transaction;
a return module for returning the original path of the digital asset when the transaction is not completed;
the association module is used for binding multi-dimensional information of the digital assets after the transaction is completed and increasing the safety of the assets;
a revocation module to terminate the transaction when the transaction has not been completed.
11. A method for mutual mapping between point-to-point physical assets and digital assets is characterized in that: for both parties performing point-to-point digital asset transaction, the assets in agreed transaction are physical assets, and the physical assets are mapped into digital assets for transaction according to agreement of both parties; the transaction parties reach transaction consensus on the pre-transacted physical assets, the pre-transacted physical assets are subjected to physical image verification or remote real-time verification with a transaction counterpart through a network image by an intelligent logistics mechanism networked with the transaction platform, and the physical assets are mapped onto the transaction platform to generate digital asset ownership certificate which can be recognized and circulated by the transaction platform through verification of the transaction counterpart and network confirmation.
12. The method for mapping between physical assets and digital assets of claim 11, wherein: after the physical asset mapping and the digital asset ownership ticket approved to circulate by the trading platform are generated, the trading party holding the digital asset ownership ticket can trade the point-to-point digital asset according to the method of claim 1, which specifically comprises the following steps:
(1) the method comprises the following steps that both trading parties pack all digital asset tickets of appointed trading into a digital asset data packet, an authority confirming password is set for the data packet, the digital asset data packet and the authority confirming password are sent to the trading opposite party after being authorized by a trading party account password, and the authority confirming password is in a hidden state;
(2) after receiving the digital asset data packet and the hidden-state authorization password, both trading parties verify and confirm the transaction object on the data packet and send a confirmation instruction to the trading partner;
(3) after receiving a confirmation instruction sent by the opposite party, the two transaction parties unlock and display the right confirmation password received by the party according to the confirmation instruction, further unlock the digital asset data packet received by the party by using the password, and at the moment, the digital asset ownership certificate of the appointed transaction is automatically associated with the account information for unlocking the digital asset data packet, so that the digital asset ownership right confirmation is completed, and the transaction is completed.
13. The method for mapping between physical assets and digital assets of claim 11, wherein: the intelligent logistics mechanism generates image data or remote real-time verification on the physical assets according to the verification requirements of a trading opposite party according to the intelligent contract requirements achieved by the trading parties, the image data is sent to the trading opposite party through a trading platform and is verified and confirmed through a network by the trading opposite party, so that the physical assets are mapped to the trading platform to generate digital asset ownership certificates which can be identified and circulated by the trading platform, the physical assets are temporarily stored in the intelligent logistics mechanism after being mapped to the digital asset ownership certificates which can be identified and circulated by the trading platform, and a user holding an agreed physical asset to be traded as the physical asset can only control the physical assets through the digital asset ownership certificates; after the transaction is completed, all digital asset tickets obtained by both transaction parties automatically enter respective account asset packs of both transaction parties, and both transaction parties can command physical assets in an intelligent logistics organization according to respective transaction account associated information certificates or right-confirming passwords; if the transaction is not completed, both transaction parties can command the physical assets stored in the intelligent logistics mechanism through the transaction platform after the returned digital asset ownership certificates are authenticated, and if the physical assets are not transacted after being mapped, both transaction parties can map and restore the digital asset ownership certificates mapped by the physical assets after authorization of account passwords according to respective transaction accounts and command the physical assets in the intelligent logistics mechanism according to respective transaction account associated information certificates or authentication passwords.
14. A system for mapping between a point-to-point physical asset and a digital asset to each other, comprising: the system comprises respective clients of two trading parties and a server serving as a trading platform, wherein the clients and the server are in communication connection through a network, and the client, the server and the server are as follows:
the client sides of the trading parties initiate trading applications to the server side after the client sides of the trading parties reach the asset trading intention, wherein the client sides of the trading parties holding the agreed assets to be traded as physical assets also initiate requests of mapping the physical assets into digital asset ownership certificates to the server side;
the server side is connected with a mapping server nearby a client side which initiates an asset mapping request, and assists the client side to complete a request of mapping the real asset held by the client side into a digital asset ownership ticket;
the mapping server is connected with clients of both trading parties through the server, performs network image or remote real-time verification on real assets agreed to be traded by the clients of both parties through a network image or remote real-time verification technology, and generates digital asset ownership certificates which can be recognized and circulated by the server by mapping the real assets to the server through verification and network confirmation with the client of the trading party.
15. The system for peer-to-peer mapping between physical assets and digital assets of claim 14, wherein: after the physical asset mapping and the digital asset ownership ticket approved and circulated by the server are generated, the client of the transaction party holding the digital asset ownership ticket can perform the point-to-point digital asset transaction according to the method of claim 1, which specifically comprises the following steps:
(1) the client sides of the two transaction parties pack all the digital asset tickets of the appointed transaction into a digital asset data packet, set a right-confirming password for the data packet, and send the digital asset data packet and the right-confirming password to the client side of the other transaction party after being authorized by the account password of the client side of the transaction party, wherein the right-confirming password is in a hidden state;
(2) after receiving the digital asset data packet and the hidden-state authorization password, the client sides of the two transaction parties verify and confirm the transaction object on the data packet and send a confirmation instruction to the client side of the other transaction party;
(3) and after the client sides of the two trading parties receive a confirmation instruction sent by the client side of the other party, unlocking and displaying the right confirmation password received by the client side of the local party according to the confirmation instruction, further unlocking the digital asset data packet received by the client side of the local party by using the password, automatically associating the digital asset ownership certificate agreed for trading with the client side account information for unlocking the digital asset data packet, finishing the ownership confirmation of the digital asset ownership certificate, and finishing the trading.
16. The system for peer-to-peer mapping between physical assets and digital assets of claim 14, wherein: the mapping server generates image data or remote real-time verification on the physical asset according to the verification requirement of a client of a trading opposite party according to the intelligent contract requirement achieved by the client of the trading opposite party, the image data is sent to the client of the trading opposite party through a server, the image data is verified and confirmed by the client of the trading opposite party through a network, so that the physical asset is mapped to the server to generate a digital asset ownership certificate which can be identified and circulated by the server, the physical asset is temporarily stored in an intelligent logistics mechanism controlled by the mapping server after the physical asset is mapped to the digital asset ownership certificate which can be identified and circulated by the server, and the client holding the to-be-traded asset as the physical asset can only control the physical asset through the digital asset ownership certificate; after the transaction is completed, all digital asset tickets obtained by the clients of the two transaction parties automatically enter the respective account asset packages of the clients of the two transaction parties, and the clients of the two transaction parties can dominate the physical assets in the intelligent logistics mechanisms controlled by the mapping server according to the respective transaction account associated information vouchers or the right-confirming passwords; if the transaction is not completed, the client sides of both transaction parties can control the physical assets stored in the intelligent logistics mechanism controlled by the mapping server through the server side after the returned digital asset ownership certificate is authenticated, and if the physical asset mapping is completed and the transaction is not continued, the client sides of both transaction parties can map and restore the digital asset ownership certificate mapped by the physical asset according to respective transaction accounts and authorized by account passwords and control the physical assets in the intelligent logistics mechanism controlled by the mapping server according to respective transaction account associated information certificates or authentication passwords.
17. The system for peer-to-peer mapping between physical assets and digital assets of claim 14, wherein: the mapping server side comprises:
the mapping module is used for mapping the physical assets into network digital assets;
the image module is used for remotely verifying the real object assets to be traded through images;
the verification module is used for assisting clients of two transaction parties to perform physical verification on the subject matter of the appointed transaction;
the confirmation module is used for comprehensively confirming the physical assets with a client of a transaction counterpart;
and the domination module is used for assisting the clients of the two transaction parties in transferring or extracting the subject matter of the appointed transaction.
CN201910894589.7A 2019-09-20 2019-09-20 Method and system for point-to-point asset mapping and digital asset transaction Active CN110633965B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910894589.7A CN110633965B (en) 2019-09-20 2019-09-20 Method and system for point-to-point asset mapping and digital asset transaction

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910894589.7A CN110633965B (en) 2019-09-20 2019-09-20 Method and system for point-to-point asset mapping and digital asset transaction

Publications (2)

Publication Number Publication Date
CN110633965A true CN110633965A (en) 2019-12-31
CN110633965B CN110633965B (en) 2022-03-15

Family

ID=68972029

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910894589.7A Active CN110633965B (en) 2019-09-20 2019-09-20 Method and system for point-to-point asset mapping and digital asset transaction

Country Status (1)

Country Link
CN (1) CN110633965B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112513908A (en) * 2020-10-19 2021-03-16 威富通科技有限公司 Digital asset transfer system

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets
CN107086920A (en) * 2017-06-20 2017-08-22 无锡井通网络科技有限公司 Copyright based on block chain really weighs method
CN108604344A (en) * 2016-02-12 2018-09-28 维萨国际服务协会 Method and system for using digital signature creation Trusted Digital assets transfer
CN108629583A (en) * 2018-04-16 2018-10-09 上海分赋信息科技有限公司 Mapped system and correlation method of the digital asset on mapping chain are realized based on distributed computing technology
CN108683645A (en) * 2018-04-27 2018-10-19 欧阳福 A kind of information-distribution type domain name and data transacting system based on block chain
CN108876603A (en) * 2018-01-03 2018-11-23 上海指旺信息科技有限公司 Share exchange platform based on block chain
CN109089428A (en) * 2015-11-30 2018-12-25 舍普施福特股份公司 For improving the system and method for the safety in block chain transaction in assets
CN110178338A (en) * 2016-08-24 2019-08-27 高阶公司 Digital securitisation, blurring, strategy and the commercial affairs of event ticket

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109089428A (en) * 2015-11-30 2018-12-25 舍普施福特股份公司 For improving the system and method for the safety in block chain transaction in assets
CN108604344A (en) * 2016-02-12 2018-09-28 维萨国际服务协会 Method and system for using digital signature creation Trusted Digital assets transfer
CN105956923A (en) * 2016-04-20 2016-09-21 上海如鸽投资有限公司 Asset transaction platform and digital certification and transaction method for assets
CN110178338A (en) * 2016-08-24 2019-08-27 高阶公司 Digital securitisation, blurring, strategy and the commercial affairs of event ticket
CN107086920A (en) * 2017-06-20 2017-08-22 无锡井通网络科技有限公司 Copyright based on block chain really weighs method
CN108876603A (en) * 2018-01-03 2018-11-23 上海指旺信息科技有限公司 Share exchange platform based on block chain
CN108629583A (en) * 2018-04-16 2018-10-09 上海分赋信息科技有限公司 Mapped system and correlation method of the digital asset on mapping chain are realized based on distributed computing technology
CN108683645A (en) * 2018-04-27 2018-10-19 欧阳福 A kind of information-distribution type domain name and data transacting system based on block chain

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112513908A (en) * 2020-10-19 2021-03-16 威富通科技有限公司 Digital asset transfer system
WO2022082360A1 (en) * 2020-10-19 2022-04-28 威富通科技有限公司 Digital asset transfer system

Also Published As

Publication number Publication date
CN110633965B (en) 2022-03-15

Similar Documents

Publication Publication Date Title
US20220198418A1 (en) Systems and methods for commerce in a distributed system with blockchain protocols and smart contracts
US10817852B2 (en) System for executing, securing, and non-repudiation of pooled conditional smart contracts over distributed blockchain network
CN111127168B (en) Block chain-based photovoltaic financing lease method, system and storage medium
CN105976232B (en) Asset transaction method and device
TWM543413U (en) Web lending platform using technology of blockchain for deal
CN104081425A (en) Electronic cheque-based payment system and methods for issuing, transferring, paying and verifying electronic cheques
US20180053158A1 (en) Techniques for transaction management
CN110599213A (en) Article management method and device based on block chain network and electronic equipment
WO2019227341A1 (en) Maintenance station management method and system, and data management server
CN111951060B (en) Safety tax control invoice data transaction method based on block chain
CN112037068A (en) Resource transfer method, system, device, computer equipment and storage medium
KR20190132047A (en) Method for Providing Service Platform based on Blockchain by using Smart Contract
CN111915349A (en) Cross-platform integral using system and method based on block chain
KR20190132054A (en) Method for Providing Cryptocurrency Trading Platform by using Smart Contract based on Blockchain
KR20190132159A (en) Method for Providing Cryptocurrency Trading Platform based on Blockchain by using Smart Contract
CN112435006A (en) Patent overall process management method, system and equipment applying block chain technology
US10867326B2 (en) Reputation system and method
KR20190115553A (en) Method for Providing Cryptocurrency Trade based on Verification of Information by using Smart Contract based on Blockchain
CN114900536A (en) Block chain-based point acceptance consensus storage method and system
CN110633965B (en) Method and system for point-to-point asset mapping and digital asset transaction
KR102019478B1 (en) The apparatus and method of activation for energy transaction by using block chain of hybrid
CN112016114B (en) Intelligent contract generating method based on cryptocurrency, related equipment and storage medium
CN109584028B (en) Virtual resource allocation method and device
WO2022006107A1 (en) System and method for managing verification and identity information
US8676659B1 (en) Methods and apparatuses for facilitating financial transactions using gamer tag information

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant