CN111274324A - Admissibility digital asset transfer method - Google Patents

Admissibility digital asset transfer method Download PDF

Info

Publication number
CN111274324A
CN111274324A CN202010088032.7A CN202010088032A CN111274324A CN 111274324 A CN111274324 A CN 111274324A CN 202010088032 A CN202010088032 A CN 202010088032A CN 111274324 A CN111274324 A CN 111274324A
Authority
CN
China
Prior art keywords
account
user
address
digital assets
ruler
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010088032.7A
Other languages
Chinese (zh)
Inventor
黎智帅
张楠坤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Yuanlian Technology Co ltd
Original Assignee
Beijing Yuanlian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Yuanlian Technology Co ltd filed Critical Beijing Yuanlian Technology Co ltd
Priority to CN202010088032.7A priority Critical patent/CN111274324A/en
Publication of CN111274324A publication Critical patent/CN111274324A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • G06F16/2471Distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The invention relates to a permissible digital asset transfer method.A credibility block chain asset service platform comprises an account guiding module, an asset tracking module, a limit weakening module and an access renting module; the method provides a new idea for managing the user query in batches, the user can find a private interface queried by the user according to the allocated address code so as to start the query service, and when the user exchanges the service, a dynamic exchange management mode is implemented, namely, the digital assets exchanged as an intermediary are adjusted at any time according to the heat degree of each period, and are provided with nodes for managing the exchange, all processes from query to storage to exchange are integrated, and the user can realize the whole service process.

Description

Admissibility digital asset transfer method
Technical Field
The invention relates to the management of block chain system assets on the Internet, in particular to an admissible digital asset transfer method.
Background
The development of blockchain storage and the advent of the big data era have led to the widespread interest and use of blockchain systems due to their wide advantages. With the development of artificial intelligence and blockchain technology, a new idea is provided for the storage and management of digital assets and other problems existing in modern service transactions. The block chain is used for solving the problems of decentralization, non-tampering, non-traceability, tampering, repudiation and the like of service transaction. Therefore, the fused block chain and the modern storage are privately researched, and the method has important scientific significance and application value.
Disclosure of Invention
Accordingly, the present invention provides a method for permissible digital asset transfer that solves or partially solves the above-mentioned problems.
In order to achieve the effect of the technical scheme, the technical scheme of the invention is as follows: a method of permissible digital asset transfer comprising the steps of:
the digital asset transfer method comprises the steps that firstly, a credibility block chain asset service platform is built, and the credibility block chain asset service platform comprises an account guiding module, an asset tracking module, a boundary weakening module and an access renting module; the account guiding module comprises a probing unit and an account restricting unit; the credibility block chain asset service platform can provide query service for the user, and the freer user is in charge of helping the user to query the account condition of the user as long as the user provides the address code of the private interface of the account of the user to the freer user; the method comprises the steps that a user applies for inquiring the account condition of the user from a free user, the free user submits the application to an access renting module, then the access renting module randomly distributes an inquiring interface to the free user, and the free user has the right of inquiring by an inquiring access point accessed to an address bifurcation scale through the inquiring interface; the default of the query access point is a sealed state, the query access point is a position where the free user can start to query at the address bifurcation ruler, an address socket can be searched forward along the main ruler from the query access point, the sealed state represents that the query access point does not work, and the free user cannot start to query from the query access point; when the free user is according to B in the address code of the private interface of the account of the user provided by the user1Finding the address bifurcation scale where the private interface of the user's account is located, said probing unit analyzing B2In (B)21The value of the address code on the address bifurcation scale where the private interface of the user's account is located is less than B21The free user finds the address socket of the left branch ruler or the right branch ruler where the private interface of the account of the user is located on the main ruler from the activated inquiry access point forward along the ascending direction of the address scale, namely, the inserting position of the left branch ruler or the right branch ruler where the private interface of the account of the user is located on the main ruler, then finds the left branch ruler or the right branch ruler where the private interface of the account of the user is located on the main ruler, and finds the private interface of the account of the user on the main rulerFinding a private interface of the account of the user on the left bifurcate ruler or the right bifurcate ruler, inquiring the condition of the account of the user through the private interface of the account of the user, wherein the condition of the account of the user comprises the types, names and quantities of all digital assets currently owned by the user, the dissociative user only has the right of viewing and has no right of modification, and after the inquiry is finished, reporting the condition of the account of the user to the user; in the inquiry process, the exploration unit is always responsible for recording the inquiry time of each user and recording the inquiry times of the user, and when the account of the user has no operation for D time lengths, namely the account of the user has no transfer-in and transfer-out of digital assets and the user does not inquire the account, the user is set as a rigid user; when more than 50 percent of users on the same bifurcated left or right side with the private interface of the user's account are rigid users,
the account bootstrapping module sets more than 50 percent of the forked left or right ruler of the user as a stiff user as a discarding forked ruler, recalls the private interface of the user's account at the position in the address forked ruler of the private interface of the stiff user's account on the discarding forked ruler, and recalls the positions of the private interface of the stiff user's account on the discarding forked ruler and the private interfaces of the accounts of the users set as the stiff user for more than D time lengths on all the address forked scales at the same time, and the positions of the private interfaces of the accounts of the users set as the stiff user for more than D time lengths in the address forked ruler, assigns the private interfaces of the other users on the discarding forked ruler except the stiff user to the positions of the private interfaces of the accounts set as the stiff user for more than D time lengths in the address forked ruler, the method comprises the steps that private interfaces of accounts of other users except the dull user on the discarding bifurcation ruler are completely distributed, the discarding bifurcation ruler is deleted from a main ruler where the discarding bifurcation ruler is located, a position is left in an address socket where the discarding bifurcation ruler is located, if the discarding bifurcation ruler is the bifurcating left ruler, an empty bifurcating left ruler can be inserted, and if the discarding bifurcation ruler is the bifurcating right ruler, the discarding bifurcation ruler can be insertedEntering an empty bifurcated right ruler and broadcasting to all newly registered users, wherein the newly registered users can choose to apply for the account guide module, and then the private interfaces of the newly registered users can be preferentially distributed to the empty bifurcated left ruler or the empty bifurcated right ruler; the position of the private interface of the withdrawn account in the address bifurcation scale indicates that the position interface of the private interface inserted into the account is free and can be used for inserting the private interfaces of the accounts of other users; the credible block chain asset service platform provides a plurality of storage modes of account addresses of digital assets of users, the asset tracking module is responsible for the asset tracking module, the asset tracking module is responsible for the multidimensional storage modes of the account addresses of the digital assets of all the users in the credible block chain asset service platform, the multidimensional storage modes comprise a first-dimension storage mode, a second-dimension storage mode and a third-dimension storage mode, the specific process is that the one-dimension registering unit is responsible for the first-dimension storage mode and is carried out according to the types of the digital assets, namely the account addresses of the digital assets of the users belonging to the same digital asset in the credible block chain asset service platform are placed in the same time clustering lattice within every D time lengths, the time lattice consists of a plurality of account lattices and omission lattices, and the account lattices are stored separately from the omission lattices, the method comprises the steps that two account grids are repeatedly stored in a clustering grid as a row, the two account grids in the row are adjacent to each other, the account grid in the row is called as an adjacent account grid, account addresses of digital assets of users who possess private interfaces of accounts in an address bifurcation scale and account addresses of digital assets of rigid users who possess the private interfaces of accounts on a discarding bifurcation scale are stored in the account grids, account addresses of digital assets of users who are set as the rigid users and exceed D time lengths are stored in a missing grid according to a time range, and an account address of the digital asset of the user who is set as the rigid user and exceed D time lengths is placed in a missing grid by an asset tracking module within 3D time lengths; the account addresses of the users of the digital assets contained in each account space are variable, the number of the users is flexible, and the maximum number is G1+ epsilon, the rule deposited is that the private interface of the account is in the same sub-systemThe account addresses of the same type of digital assets of the users with the left side or the right side of the fork are placed in the same account space as much as possible, the account addresses of the same type of digital assets of the users with the left side or the right side of the fork with the private interfaces of the account in the same address socket are placed in two account spaces in a row as much as possible, and if the number of the account addresses of the same type of digital assets of the users with the left side or the right side of the fork with the private interfaces of the account in the same address socket exceeds G1+ epsilon, the order of ascending according to the bifurcation scale of the private interface of the user's account when the asset tracking module stores the account address of the digital asset will exceed G1The method comprises the following steps that a plurality of users are placed in adjacent account grids, the users are not placed in two next-row account grids, and the like, and account addresses of the same type of digital assets of the users on a bifurcate left ruler or a bifurcate right ruler of the same address socket are stored in the adjacent account grids; if the number of account addresses of the same type of digital assets of the same user with the private interface of the account on the same bifurcated left or right ruler exceeds 2 (G)1+ epsilon), the asset tracking module is placed in two account boxes of the next row according to the ascending order of the bifurcation scale, and the like, and then account addresses of the same type of digital assets of the users with the private interfaces of the accounts on the bifurcate left ruler or the bifurcate right ruler of the same address socket are stored; g1Epsilon is a natural number and is determined by the overseas overall user; the two-dimensional depositing unit is responsible for a second-dimensional depositing mode and stores the digital assets in a time constraint mode, namely, the change of account addresses of the digital assets under the time change is counted by taking the same account grid, the same omission grid and the same time clustering grid as a unit, account time traces are repeatedly constructed and marked in time limit coordinates, the abscissa of the time limit coordinates is time t, the maximum value of the abscissa of the time limit coordinates is limited to D time lengths, an observing time point is set on the abscissa of the time limit coordinates by a mobile user in the boundary, the number of the observing time points is not less than D, and is not more than D + epsilon, and the counting is carried out by taking the same account grid, the same omission grid and the same time clustering grid as a unit on the observing time change pointThe account address of the digital asset changes, the ordinate of the time limit coordinate is a discrete value, the discrete value is only three, and is respectively 1, 0, -1, 1 represents that the account address of the digital asset contained in the same account grid or the same missing grid or the same time clustering grid has the forwarding of the digital asset, 0 represents that the account address of the digital asset contained in the same account grid or the same missing grid or the same time clustering grid has no change, 1 represents that the digital asset is forwarded from the account address of the digital asset contained in the same account grid or the same missing grid or the same time clustering grid, the two-dimensional depositing unit is responsible for constructing an account time trace for each account grid, each missing grid and each time clustering grid, and an account time trace is constructed after D time units; the three-dimensional posting unit is responsible for a third-dimensional storage mode, if more than D/2 1 account addresses exist in an account time trace constructed by taking a missing grid as a unit, broadcasting is carried out to all users who have the account addresses of the digital assets in the legacy grid, the users who have the account addresses of the digital assets in the legacy grid can apply for tuning away from the legacy grid and applying for rejoining the address bifurcation scale, and the premise is that active evidence is sent to the users moving in the world, the active evidence is that the digital assets are transferred into or out of the account address group of the digital assets of the users for more than D times in D time units when the previous account time trace is constructed, and the number of times of transferring the digital assets into the account address group of the digital assets of the users is more than that of transferring the digital assets out of the account address group of the digital assets of the users, then the private interface of the user's account is placed into the address fork scale of the private interface that is being loaded into the user's account and the user is no longer an inflexible user; the credibility block chain asset service platform can provide digital asset exchange for users, and the specific work is completed by the limit weakening module, the limit weakening module counts the digital assets which are the most hot and owned by the private interfaces of the accounts of the users in all the users on the same forked left ruler or forked right ruler by taking the same forked left ruler or forked right ruler as a unit, namely the digital assets which are the most hot and owned by the private interfaces of the accounts of the users on the same forked left ruler or forked right rulerThe account time traces of all types of digital assets owned by the user are called out for analysis, the limit weakening module finds out the first three names of the digital assets represented by the account time traces with the most sums up of 1 and-1 in each conversion period, the digital assets with the first name in each conversion period are the first names of the digital assets represented by the account time traces with the most sums up of 1 and-1, the digital assets with the second name in each conversion period are the second names of the digital assets represented by the account time traces with the most sums up of 1 and-1, and the digital assets with the third name in each conversion period are the third names of the digital assets represented by the account time traces with the most sums up of 1 and-1; establishing exchange pairs among the top three digital assets in each exchange period and exchange pairs among all the digital assets except the top three digital assets in each exchange period and the top three digital assets in each exchange period, and establishing an exchange pattern graph every 1 exchange period, wherein each exchange pattern graph is only effective in the next exchange period and the closed exchange period, namely, exchanging the digital assets in the next exchange period and the closed exchange period according to the exchange pattern graph established in the last exchange period; the definition of the exchange pattern graph is (V)1,V2,V3,ZX,JD,LT),V1Digital asset node, V, representing digital assets ranked first in a redemption period2Digital asset nodes, V, representing digital assets ranked second in a redemption period3The nodes represent digital asset nodes of digital assets ranked as the third name in a conversion period, ZX represents a maintenance node of a conversion pattern graph in a conversion period and is responsible for maintaining mutual conversion of the digital assets in a conversion period, JD represents a conversion channel group and comprises a plurality of conversion channels, the conversion channels are used for transmitting the digital assets when the digital assets are converted among each other in a conversion period, each conversion channel comprises a locking area, the locking area is arranged in the middle of the conversion channel and is used for locking the digital assets, LT represents a digital asset node group and comprises a plurality of digital asset nodes, and each digital asset node represents a container of a type of digital assets,the containers of the digital assets of one type represent addresses capable of storing only one type of digital assets, and each digital asset node in the digital asset node group represents containers of other digital assets except the digital assets of the first three names in a conversion period; the exchange pattern graph provides that other digital assets except the first three digital assets can be exchanged with the first three digital assets in an exchange period, the first three digital assets in the exchange period can be exchanged with each other, the exchange process is dominated by the boundary weakening module, the exchange process is that firstly, the boundary weakening module comprises all maintenance nodes of the exchange pattern graph, after an exchange period passes, the first three digital assets represented by the account time traces with the most 1 and 1 in the exchange period are counted, and the digital assets respectively represent the V in the exchange pattern graph effective in the next exchange period and the closed exchange period1、V2、 V3When the digital assets except the digital assets with the first three names in the conversion period are required to be converted, both sides of the digital asset conversion are the digital assets with the first three names in the conversion period, or the digital assets with the first three names in the conversion period and the digital assets except the digital assets with the first three names in the conversion period, the limit weakening module establishes a conversion channel between the digital asset nodes represented by the two digital assets for digital asset conversion, a user can select to convert the digital assets between the digital asset nodes with the conversion channel, when the digital assets are converted, the user firstly loads the digital asset nodes represented by the digital assets which are required to be converted into the digital asset nodes which are required to be converted, and then the digital assets are sent into the conversion channel through the digital asset nodes represented by the digital assets which are required to be converted, then the digital assets are locked by the maintenance nodes of the exchange pattern graph in the locking area, the converted digital assets are sent out from the digital asset nodes represented by the other party of the conversion according to the actual conversion proportion, the digital assets to be converted are cancelled from the locking area after the number and the type of the digital assets are verified by the maintenance nodes of the exchange pattern graph, and the number to be converted is cancelledThe digital assets and the converted digital assets are sent to digital asset nodes represented by the converted digital assets of both parties, the maintenance node of the conversion pattern graph in the conversion period is responsible for extracting the digital assets to be converted from the digital asset nodes represented by the digital assets to be converted, and the user extracts the converted digital assets from the digital asset nodes represented by the converted digital assets, so that the conversion service is completed; the credibility block chain asset service platform can provide simplified service of the account address of the digital asset for a user so as to facilitate the memory of the user, and the specific process is that the user determines whether to establish an elastic character string according to the account addresses of different types of digital assets in the current account to replace the account address of the digital asset contained in the account address group of the digital asset of the user, each user has the right of using the elastic character string to replace the account address of the digital asset for three times, firstly, the user selects characters from a character library, the selected characters form the elastic character string, the number of the selected characters is not more than the length limit of the elastic character string, according to the length of the elastic character string, the length of the elastic character string is the number of the characters contained in the elastic character string, and an account constraint unit is compared and verified with the elastic character string in the elastic character region with the same length, if the elastic character strings are completely the same, informing the user of modification, and the user modifies the elastic character strings until all the elastic character strings in the elastic character regions with the same length as the elastic character strings are different, wherein the elastic character strings are changed into verified elastic character strings, and according to the length contained in the verified elastic character strings, the account constraint unit puts the verified elastic character strings into the elastic character regions with the same length as the verified elastic character strings, and simultaneously constructs an elastic verification sequence, wherein the elastic verification sequence is formed by adding the account addresses of the digital assets needing to establish the equivalence relation on the basis of the verified elastic character strings, the method is that the elastic verification sequence consists of an address tail and a sequence head, the address tail contains the account addresses of the digital assets needing to establish the equivalence relation, the sequence head places the verified elastic character strings which are constructed only, and the sequence head is connected with the address tail, putting a hash index at the tail part of the sequence head, and indexing the sequence head by the hash indexMapping with the address tail, splitting the verified elastic character string in the sequence head into characters, arranging the split characters according to the sequence of the characters in the verified elastic character string, sequentially connecting the characters, and putting the constructed elastic verification sequence into a verification library, wherein the verification library is a data space specially used for placing the elastic verification sequence; when the digital assets need to be sent or received, if the digital assets are given by the user, the digital assets are directly sent or received, if the digital assets are given by the character strings, the limit weakening module is compared with sequence heads in the elastic verification sequences in the verification library, and if the digital assets are completely the same, the digital assets are sent or received by using the account addresses of the digital assets in the address tails connected with the completely same sequence heads; each elastic character area is stored with an elastic character string with the same length, and the elastic character areas with the same length of the elastic character string are stored with verified elastic character strings with the same length as the elastic character strings;
setting three types of users on the credibility block chain asset service platform, wherein the three types of users comprise in-bound users, out-bound overall users and free users, the in-bound mobile user has authority to operate within the trusted blockchain asset service platform, the out-of-bound orchestration user is responsible for orchestration and management of the universe of trusted blockchain asset service platforms, but does not have specific operation rights, the wandering user is responsible for data transfer and operation between the inside and outside of the trusted zone block chain asset service platform, but must apply to the rights-of-way rental module, a plurality of inquiry interfaces are arranged in the access renting module, the inquiry interfaces are used for inquiring the condition of the account of the user, an interface between the credibility block chain asset service platform and the outside, namely the access renting module, is used for inquiring digital assets; the account guide module is responsible for arranging relevant information of the user account and assisting the service of the user account; the detection unit is responsible for providing inquiry service of the condition of the account of the user of the account for the user; when the account of the user is established, the probing unit is used for each user to be onThe credibility block chain asset service platform establishes an account inquiry address of a digital asset of a user, the account inquiry address of the digital asset of the user is unique in the credibility block chain asset service platform, the account inquiry address of the digital asset of the user is equal to a private interface of an account of the user, the condition of the account of the user can be inquired through the private interface of the account of the user, and the condition of the account of the user comprises types, names and quantity of all digital assets currently owned by the user; the detection unit establishes a plurality of address bifurcation rulers, and each address bifurcation ruler comprises a main ruler, a plurality of bifurcation left rulers, a bifurcation right ruler and a plurality of inquiry access points; a plurality of address sockets are evenly engraved on the main scale, a bifurcated left scale and a bifurcated right scale are inserted into one address socket, position interfaces are evenly distributed on the bifurcated left scale or the bifurcated right scale, a private interface of an account of a user is inserted into the position socket and indicates that the account of the user can be inquired, and the private interface of the account of the user is an interface between the account of the user and the outside; marking address scales of the address sockets on each address socket, wherein the address scale of the first address socket is 1, the address scale of the second address socket is 2, and sequentially ascending until the address scale of the Nth address socket is N, namely N address scales are distributed on each main scale; query access points are distributed in the middle of every two address sockets, if the address scale of the address socket immediately before the query access point is D1Then the address scale of the access point is queried as D15; the address scale is the scale on the main scale and is used for marking the relative position on the main scale; the bifurcate left ruler and the bifurcate right ruler are marked with bifurcate scales, and the bifurcate scales are used for marking the relative positions of the private interface of the account of the user on the bifurcate left ruler and the bifurcate right ruler; sequentially ascending from the nearest position interface of the ground address socket to the first position interface and the second position interface, wherein the branch scale of the first position interface is 1, the branch scale of the second position interface is 2, until the branch scale of the Nth/2 position interface is N/2, and N/2 position interfaces are distributed on each branch left ruler and each branch right ruler; d1N is a natural number, fromOverall planning the user decision outside the country;
the address bifurcation scale is used for storing a private interface of an account of a user, and an address code of the private interface of the account of the user can be calculated according to the position of the private interface of the account of the user in the address bifurcation scale, the address code of the private interface of the account of the user is a unique code of an account inquiry address of each digital asset of the user on the credible block chain asset service platform, and the unique code is represented as B1.B2.B3,B1Number of address bifurcation scales where private interfaces for users' accounts are located, B2Is represented by ZB21Or YB21Z denotes the private interface of the user's account on the bifurcated left scale, Y denotes the private interface of the user's account on the bifurcated right scale, B21Address scales of address sockets inserted on the main scale by a bifurcated left or right scale in which a private interface of a user's account is located, B3A bifurcated scale representing a location interface where a private interface of an account of a user is located; each address branching scale is marked in ascending order according to the established sequence, the position of the private interface of the user in the address branching scale is distributed in ascending order according to the registration time of the user, firstly, the private interface is distributed in ascending order according to the address scale of the address socket, namely, the position interface on the bifurcate left ruler and the bifurcate right ruler with smaller address scales is preferentially placed on the private interface of the account of the user, the left and right branch rules on the same address socket are distributed alternatively, the private interface of the user account is placed on the left branch rule on the same address socket, then the private interface of the user account is placed on the right branch rule on the same address socket, the order of placing on the bifurcate left ruler or the bifurcate right ruler is distributed according to the ascending order of the size of the bifurcate scale, and the position interface with small bifurcate scale preferentially places the private interface of the account of the user; after the private interface of the account of the user is placed, forming an address code of the private interface of the account of the user, and sending the address code of the private interface of the account of the user to the user by the probing unit; the account restriction unit is used for enabling the account address and the characters of the digital assets of the user to be matchedThe relationship is established so as to be convenient for the user to memorize; the account constraint unit establishes an equivalence relation between an account address of a digital asset of a user and an elastic character string, wherein the equivalence relation is that digital assets are transferred into or out of the account address of the user in the credibility block chain asset service platform and are equivalent to digital assets transferred into or out of the elastic character string, the number of bits of the elastic character string is limited, the elastic character string is selected from the character library and is a sequence consisting of characters, the sequence of the characters is determined, the arrangement of the characters is different, the elastic character string is different, the length limit of the elastic character string is increased according to time, when the length limit of the elastic character string is not enough, the length limit of the elastic character string is increased to keep the differentiability between different elastic character strings, and, the character library is composed of different characters, the characters contained in the character library are selected by the overseas overall users, the character library is maintained every D time lengths, whether the characters contained in the character library are added or deleted is determined, and if the characters contained in the character library are added or deleted, the characters are broadcasted to all the users; the elastic character string is selected by the out-of-bound overall user when the elastic character string runs from the credibility block chain asset service platform, the value of the length limit of the elastic character string is represented as M, namely the elastic character string contains no more than M characters, and when the elastic character string is verified to exceed the value of M characters
Figure RE-GDA0002447466460000101
Then, the length limit of the elastic character string is changed into M +1, the elastic character string is partitioned according to the length, namely the elastic character strings with the same length are partitioned into the same elastic character area, and each elastic character area contains the elastic character strings with the same length; m is a natural number and is selected by the overseas overall user; the asset tracking module is responsible for managing the account address of the digital asset and establishing a plurality of ways for storing the account address of the digital asset; meanwhile, the asset tracking module comprises a one-dimensional depositing unit, a two-dimensional depositing unit and a three-dimensional depositing unit, and the credibility of each different user is measuredThe method comprises the steps that account addresses of digital assets are established for different types of digital assets on a block chain asset service platform, and only one digital asset is provided; each user corresponds to an account address group of the digital assets, and the account address group of the digital assets of the users consists of account addresses of the digital assets owned by all the users; establishing an account address of a digital asset of an open credibility block chain asset service platform by taking D time lengths as a period, establishing an account address of a digital asset of a closed credibility block chain asset service platform within the D time lengths, then, accepting establishment of an account of a new digital asset within D/3 time lengths, indicating that an accepting user establishes the account address of the new digital asset and transfers the new digital asset to the account address of the new digital asset, and then, starting establishment of an account of the closed new digital asset within the new period D time lengths, wherein the establishment of the account address of the digital asset of the open and closed credibility block chain asset service platform is repeated; d is a natural number, the size of D is specified by the overseas planning user, and the time length is also specified by the overseas planning user and is days, weeks and months;
the boundary weakening module is responsible for managing the conversion among the digital assets, the conversion of the digital assets is consistent with the time establishment of the account address of the new digital assets in the closed time, namely, the conversion among the digital assets is also opened when the account address of the digital assets of the closed period open credibility block chain asset service platform is constructed every 1D time length, the conversion among the digital assets is closed when the account of the new digital assets is established is received in the D/3 time length, the time for opening the conversion of the digital assets in the 1D time lengths is set as the conversion period, and the time for closing the conversion among the digital assets when the account of the new digital assets is established is received in the D/3 time length is set as the closed conversion period.
The beneficial results of the invention are as follows: the invention provides an admissibility digital asset transfer method, which provides a new idea for managing user inquiry in batches, wherein a user can find a private interface inquired by the user according to an allocated address code so as to start inquiry service, and when exchanging service, a dynamic exchange management mode is implemented, namely, the digital asset exchanged as an intermediary is adjusted at any time according to the heat degree of each period, and is provided with nodes for managing exchange, all processes are integrated from inquiry to storage to exchange, and the user can realize the process of the whole service.
Detailed Description
In order to make the technical problems, technical solutions and advantageous effects to be solved by the present invention more apparent, the present invention is described in detail below with reference to the embodiments. It should be noted that the specific embodiments described herein are only for illustrating the present invention and are not to be construed as limiting the present invention, and products that can achieve the same functions are included in the scope of the present invention. The specific method comprises the following steps:
example 1: with the rapid development of internet technology, technologies such as computers, big data, artificial intelligence, internet of things, information security and the like have deep influence on the working, living and thinking modes of people. The rapid development and popularization of internet technology greatly promotes social progress and national economic development. However, the internet technology brings convenience to people and also brings negative effects to the life of people. With the increase of the data volume of the internet and the enhancement of the dependence of people on the internet, the network information security problem becomes more and more prominent, and has certain threat to the information and property security of people. Security problems such as personal privacy disclosure, viruses, trojans, network disruptions, information tampering and loss are common. The method not only threatens the work and life of people, but also brings a series of negative effects on national safety, social stability and economic development. Block chains are the leading-edge technology in the current security field. The block chain is a chain structure of data blocks arranged according to a time sequence, and essentially adopts a decentralized mode to realize the anti-tampering distributed database of the safety of each link by cryptography. The block chain has the characteristics of decentralization, tamper resistance, anonymity, openness and verifiability, traceability, code source opening and the like. The main techniques for constructing block chains include: cryptographic techniques, P2P networks, distributed storage, consensus mechanisms, and intelligent contracts. Specifically, the block chain realizes node exercise right by using a cryptographic technology, and guarantees the integrity, non-repudiation, confidentiality and verifiability of data; the nodes in the blockchain realize node peering and data backup by utilizing a P2P network and distributed storage; the node selects the bookkeeper of each block through a consensus mechanism and resists the attack of Byzantine nodes; the nodes may utilize smart contracts to implement programmable trading and decentralized applications.
The number of international achievements in research on block chains is rapidly rising. In 2016-. Especially, in the top-level cryptography conference eurocypt 2018, 5 blockchain-related papers are commonly included, and one of them is also evaluated as the best paper in the current year. In this best paper, the cryptologist Krzysztof et al presents a simple continuous workload proof mechanism. In 2016, Micaliffu, professor MIT, Tokyo awarded the consensus mechanism Algomnd of "high efficiency democratic", aiming to establish a distributed ledger with low energy consumption, high speed, democratization, good expansibility and almost no bifurcation. In 2018, in 2 months, 400 ten thousand dollars are collected by Micali to develop an Algorand blockchain protocol, the event is generally concerned by media at home and abroad, and the global maximum standardization organization ISO establishes a blockchain and distributed accounting technical committee and promotes the work of international standard formulation and the like in the technical field of blockchain and distributed accounting. The third conference in London, UK was held in ISO/TC 307. China, as an active member of the technical committee, sends out a representative group to participate in the conference.
Example 2: the theoretical basis of artificial intelligence originates from Turing theory in 1950, and group intelligence is a relatively popular research direction in the field of artificial intelligence. Since the advent of the 80 s of the 20 th century, it has become a research hotspot and frontier of other interdisciplines with bioinformatics, economics, and sociology. Group intelligence is an intelligent technology that distributes complex work done by a single complex individual to group cooperation done by a plurality of simple individuals. And the group consisting of a plurality of simple individuals has the advantages of robustness, fault tolerance, flexibility and working efficiency compared with the single individual. Therefore, Hinchey considers swarm intelligence as a new way to handle complex work. All theories and application researches related to group intelligence show that the group intelligence is an effective method for solving the most of complex problems of global optimization, optimal solution searching and the like. The potential parallel and distributed characteristics of the group intelligence are more important for solving most of complex problems, and technical guarantee is provided for intelligent and parallel processing of big data problems. At present, governments and enterprises of various countries pay great attention to artificial intelligence, and a great deal of capital and resources are invested in a dispute, so that artificial intelligence theoretical research and technical application are deeply developed. In foreign countries, an industrial 4.0 strategy is proposed in 2013, and an intelligent factory is created by intelligently fusing technologies such as an artificial intelligence technology and a sensor with an enterprise management system (ERP); the United states pursued the advanced manufacturing partner program (AMP) ";
the time length can be any one time length; for example, the length of time may be one week, ten days, fifteen days; when the private interface of the user's account is on the split left or right ruler, it is referred to as a split left or right user.
The beneficial results of the invention are as follows: the invention provides an admissibility digital asset transfer method, which provides a new idea for managing user inquiry in batches, wherein a user can find a private interface inquired by the user according to an allocated address code so as to start inquiry service, and when exchanging service, a dynamic exchange management mode is implemented, namely, the digital asset exchanged as an intermediary is adjusted at any time according to the heat degree of each period, and is provided with nodes for managing exchange, all processes are integrated from inquiry to storage to exchange, and the user can realize the process of the whole service.
The above description is only for the preferred embodiment of the present invention, and should not be used to limit the scope of the claims of the present invention. While the foregoing description will be understood and appreciated by those skilled in the relevant art, other equivalents may be made thereto without departing from the scope of the claims.

Claims (1)

1. A method for admissible digital asset transfer, said method comprising:
the digital asset transfer method comprises the steps that firstly, a credibility block chain asset service platform is built, and the credibility block chain asset service platform comprises an account guiding module, an asset tracking module, a boundary weakening module and an access renting module; the account guiding module comprises a probing unit and an account restricting unit; the credibility block chain asset service platform can provide query service for the user, and the freer user is in charge of helping the user to query the account condition of the user as long as the user provides the address code of the private interface of the account of the user to the freer user; the method comprises the steps that a user applies for inquiring the account condition of the user from a free user, the free user submits the application to an access renting module, then the access renting module randomly distributes an inquiring interface to the free user, and the free user has the right of inquiring by an inquiring access point accessed to an address bifurcation scale through the inquiring interface; the default of the query access point is a sealed state, the query access point is a position where the free user can start to query at the address bifurcation ruler, an address socket can be searched forward along the main ruler from the query access point, the sealed state represents that the query access point does not work, and the free user cannot start to query from the query access point; when the free user is according to B in the address code of the private interface of the account of the user provided by the user1Finding the address bifurcation scale where the private interface of the user's account is located, said probing unit analyzing B2In (B)21The value of the address code on the address bifurcation scale where the private interface of the user's account is located is less than B21Is activated, and the wandering user starts from the activated inquiry access point and moves forward along the main scale and towards the groundFinding an address socket of a forked left ruler or a forked right ruler where a private interface of an account of a user is located in the ascending direction of address scales, namely, finding an insertion position of the forked left ruler or the forked right ruler where the private interface of the account of the user is located on a main ruler, then finding the forked left ruler or the forked right ruler where the private interface of the account of the user is located, finding the private interface of the account of the user on the forked left ruler or the forked right ruler where the private interface of the account of the user is located, and inquiring the condition of the account of the user through the private interface of the account of the user, wherein the condition of the account of the user comprises the types, names and the number of all digital assets currently owned by the user, the free user only has a viewing right and does not have a modification right, and after the inquiry is finished, reporting the condition of the account of the user; in the inquiry process, the exploration unit is always responsible for recording the inquiry time of each user and recording the inquiry times of the user, and when the account of the user has no operation for D time lengths, namely the account of the user has no transfer-in and transfer-out of digital assets and the user does not inquire the account, the user is set as a rigid user; when more than 50 percent of users on the same bifurcated left or right side with the private interface of the user's account are rigid users,
the account bootstrapping module sets more than 50 percent of the forked left or right ruler of the user as a stiff user as a discarding forked ruler, recalls the private interface of the user's account at the position in the address forked ruler of the private interface of the stiff user's account on the discarding forked ruler, and recalls the positions of the private interface of the stiff user's account on the discarding forked ruler and the private interfaces of the accounts of the users set as the stiff user for more than D time lengths on all the address forked scales at the same time, and the positions of the private interfaces of the accounts of the users set as the stiff user for more than D time lengths in the address forked ruler, assigns the private interfaces of the other users on the discarding forked ruler except the stiff user to the positions of the private interfaces of the accounts set as the stiff user for more than D time lengths in the address forked ruler, other than rigid users on the discard bifurcating rulerAfter the private interfaces of the accounts of the users are distributed, deleting the discarding bifurcation ruler from the main ruler where the discarding bifurcation ruler is located, leaving a position in an address socket where the discarding bifurcation ruler is located, if the discarding bifurcation ruler is the bifurcation left ruler, inserting an empty bifurcation left ruler, if the discarding bifurcation ruler is the bifurcation right ruler, inserting an empty bifurcation right ruler, and broadcasting to all newly registered users, wherein the newly registered users can choose to apply for the account guiding module, and then the private interfaces of the newly registered users can be preferentially distributed to the empty bifurcation left ruler or the empty bifurcation right ruler; the position of the private interface of the withdrawn account in the address bifurcation scale indicates that the position interface of the private interface inserted into the account is free and can be used for inserting the private interfaces of the accounts of other users; the credible block chain asset service platform provides a plurality of storage modes of account addresses of digital assets of users, the asset tracking module is responsible for the asset tracking module, the asset tracking module is responsible for the multidimensional storage modes of the account addresses of the digital assets of all the users in the credible block chain asset service platform, the multidimensional storage modes comprise a first-dimension storage mode, a second-dimension storage mode and a third-dimension storage mode, the specific process is that the one-dimension registering unit is responsible for the first-dimension storage mode and is carried out according to the types of the digital assets, namely the account addresses of the digital assets of the users belonging to the same digital asset in the credible block chain asset service platform are placed in the same time clustering lattice within every D time lengths, the time lattice consists of a plurality of account lattices and omission lattices, and the account lattices are stored separately from the omission lattices, the two account grids in one line are repeatedly stored in the clustering grid as one line, the two account grids in one line are adjacent to each other, the account grid in one line of the account grids is called as the adjacent account grid, the account grid stores the account address of the digital asset of the user with the private interface of the account in the address bifurcation scale and the account address of the digital asset of the stiff user who discards the private interface with the account on the bifurcation scale, the missing grid stores the account address of the digital asset of the user which is set as the stiff user for more than D time lengths, the digital asset is stored according to the time range, and the asset tracking module is used for tracking the digital asset of the user according to the time rangePlacing account addresses of digital assets of users who are set as dead users for more than D time lengths in a missing grid in every 3D time lengths; the account addresses of the users of the digital assets contained in each account space are variable, the number of the users is flexible, and the maximum number is G1+ epsilon, the rule of storage is that the account addresses of the same type of digital assets of the same type of users with the private interfaces of the account on the same forked left ruler or forked right ruler are placed in the same account grid as much as possible, the account addresses of the same type of digital assets of the same type of users with the private interfaces of the account on the forked left ruler or forked right ruler of the same address socket are stored in two account grids in a row as much as possible, and if the number of the account addresses of the same type of digital assets of the same type of users with the private interfaces of the account on the same forked left ruler or forked right ruler exceeds G1+ epsilon, the order of ascending according to the bifurcation scale of the private interface of the user's account when the asset tracking module stores the account address of the digital asset will exceed G1The method comprises the following steps that a plurality of users are placed in adjacent account grids, the users are not placed in two next-row account grids, and the like, and account addresses of the same type of digital assets of the users on a bifurcate left ruler or a bifurcate right ruler of the same address socket are stored in the adjacent account grids; if the number of account addresses of the same type of digital assets of the same user with the private interface of the account on the same bifurcated left or right ruler exceeds 2 (G)1+ epsilon), the asset tracking module is placed in two account boxes of the next row according to the ascending order of the bifurcation scale, and the like, and then account addresses of the same type of digital assets of the users with the private interfaces of the accounts on the bifurcate left ruler or the bifurcate right ruler of the same address socket are stored; g1Epsilon is a natural number and is determined by the overseas overall user; the two-dimensional depositing unit is responsible for a second-dimensional depositing mode and stores the digital assets in a time constraint mode, namely, the change of the account address of the digital assets under the time change is counted by taking the same account form, the same missing form and the same time clustering form as a unit, an account time trace is repeatedly constructed and marked in a time limit coordinate, the abscissa of the time limit coordinate is time t, but the abscissa of the time limit coordinate is time tThe maximum value of the time limit is limited to D time lengths, the mobile user in the boundary sets observation time points on an abscissa of the time limit coordinate, the number of the observation time points is not less than D and not more than D + epsilon, the change of the account address of the digital asset under the time change is counted by taking the same account grid, the same omission grid and the same time clustering grid as a unit on the observation time points, the ordinate of the time limit coordinate is a discrete value, only three discrete values are provided, and are respectively 1, 0, -1 and 1, wherein the discrete values represent that the account address of the digital asset contained in the same account grid or the same omission grid or the same time clustering grid has the transfer of the digital asset, the 0 represents that the account address of the digital asset contained in the same account grid or the same omission grid or the same time clustering grid has no change, and the 1 represents that the digital asset contained in the same account grid or the same omission grid or the same time clustering grid has the digital asset Transferring out the account address, wherein the two-dimensional registering unit is responsible for constructing an account time trace for each account case, each missing case and each time clustering case, and constructing an account time trace after every D time units; the three-dimensional posting unit is responsible for a third-dimensional storage mode, if more than D/2 1 account addresses exist in an account time trace constructed by taking a missing grid as a unit, broadcasting is carried out to all users who have the account addresses of the digital assets in the legacy grid, the users who have the account addresses of the digital assets in the legacy grid can apply for tuning away from the legacy grid and applying for rejoining the address bifurcation scale, and the premise is that active evidence is sent to the users moving in the world, the active evidence is that the digital assets are transferred into or out of the account address group of the digital assets of the users for more than D times in D time units when the previous account time trace is constructed, and the number of times of transferring the digital assets into the account address group of the digital assets of the users is more than that of transferring the digital assets out of the account address group of the digital assets of the users, then the private interface of the user's account is placed into the address fork scale of the private interface that is being loaded into the user's account and the user is no longer an inflexible user; the credibility block chain asset service platform can provide the exchange of digital assets for users, and the specific work is carried out by the worldThe limit weakening module is used for counting the digital assets which are the most hot and owned by the private interfaces of the accounts of the users in all the users on the same forked left ruler or the forked right ruler by taking the same forked left ruler or the forked right ruler as a unit, namely, the account time traces of all types of digital assets owned by the private interfaces of the accounts of the users in all the users on the same forked left ruler or the forked right ruler are called out for analysis, the limit weakening module finds out the first three digital assets represented by the account time traces with the most sums of 1 and-1 in each conversion period, the digital assets with the first ranking in each conversion period are the first digital assets represented by the account time traces with the most sums of 1 and-1, the digital assets with the second ranking in each conversion period are the second digital assets represented by the account time traces with the most sums of 1 and-1, the third name of the digital assets represented by the account time trail with the highest sum of 1 and-1 ranked as the third name in each exchange period; establishing exchange pairs among the top three digital assets in each exchange period and exchange pairs among all the digital assets except the top three digital assets in each exchange period and the top three digital assets in each exchange period, and establishing an exchange pattern graph every 1 exchange period, wherein each exchange pattern graph is only effective in the next exchange period and the closed exchange period, namely, exchanging the digital assets in the next exchange period and the closed exchange period according to the exchange pattern graph established in the last exchange period; the definition of the exchange pattern graph is (V)1,V2,V3,ZX,JD,LT),V1Digital asset node, V, representing digital assets ranked first in a redemption period2Digital asset nodes, V, representing digital assets ranked second in a redemption period3The nodes represent digital asset nodes of digital assets ranked third in a conversion period, ZX represents maintenance nodes of a conversion pattern graph in a conversion period and is responsible for maintaining mutual conversion of the digital assets in a conversion period, JD represents a conversion channel group and comprises a plurality of conversion channels, and the conversion channels are used for maintaining mutual conversion of the digital assets in a conversion periodWhen the digital assets are exchanged with each other in the exchange period, the digital assets are transmitted, each exchange channel comprises a locking area, the locking area is arranged in the middle of the exchange channel and used for locking the digital assets, LT represents a digital asset node group and comprises a plurality of digital asset nodes, each digital asset node represents a container of one type of digital assets, the container of one type of digital assets represents an address capable of only storing one type of specified digital assets, and each digital asset node in the digital asset node group represents a container of other digital assets except for the first three digital assets in the exchange period; the exchange pattern graph provides that other digital assets except the first three digital assets can be exchanged with the first three digital assets in an exchange period, the first three digital assets in the exchange period can be exchanged with each other, the exchange process is dominated by the boundary weakening module, the exchange process is that firstly, the boundary weakening module comprises all maintenance nodes of the exchange pattern graph, after an exchange period passes, the first three digital assets represented by the account time traces with the most 1 and 1 in the exchange period are counted, and the digital assets respectively represent the V in the exchange pattern graph effective in the next exchange period and the closed exchange period1、V2、V3When the digital assets except the digital assets with the first three names in the conversion period are required to be converted, both sides of the digital asset conversion are the digital assets with the first three names in the conversion period, or the digital assets with the first three names in the conversion period and the digital assets except the digital assets with the first three names in the conversion period, the limit weakening module establishes a conversion channel between the digital asset nodes represented by the two digital assets for digital asset conversion, a user can select to convert the digital assets between the digital asset nodes with the conversion channel, when the digital assets are converted, the user firstly loads the digital asset nodes represented by the digital assets which are required to be converted into the digital asset nodes which are required to be converted, and then the digital assets are sent into the conversion channel through the digital asset nodes represented by the digital assets which are required to be converted, then exchanged in the lock areaLocking a maintenance node of the conversion pattern diagram, simultaneously sending out digital assets converted according to an actual conversion proportion from digital asset nodes represented by the other party of conversion, after the number and the types of the digital assets are verified by the maintenance node of the conversion pattern diagram, canceling the locking of the digital assets to be converted in a locking area, sending the digital assets to be converted and the converted digital assets to digital asset nodes represented by the digital assets of both parties of conversion, extracting the digital assets to be converted from the digital asset nodes represented by the digital assets to be converted by the maintenance node of the conversion pattern diagram in a conversion period, and extracting the converted digital assets from the digital asset nodes represented by the converted digital assets by a user so as to finish conversion service; the credibility block chain asset service platform can provide simplified service of the account address of the digital asset for a user so as to facilitate the memory of the user, and the specific process is that the user determines whether to establish an elastic character string according to the account addresses of different types of digital assets in the current account to replace the account address of the digital asset contained in the account address group of the digital asset of the user, each user has the right of using the elastic character string to replace the account address of the digital asset for three times, firstly, the user selects characters from a character library, the selected characters form the elastic character string, the number of the selected characters is not more than the length limit of the elastic character string, according to the length of the elastic character string, the length of the elastic character string is the number of the characters contained in the elastic character string, and an account constraint unit is compared and verified with the elastic character string in the elastic character region with the same length, if the user is completely the same to inform the user of modification, the user modifies the elastic character string until all the elastic character strings in the elastic character area with the same length as the elastic character string are different, the elastic character string is changed into a verified elastic character string, according to the length contained in the verified elastic character string, the account restriction unit puts the verified elastic character string into the elastic character area with the same length as the verified elastic character string, and simultaneously constructs an elastic verification sequence, wherein the elastic verification sequence is obtained by adding digital assets needing to establish equivalence relation on the basis of the verified elastic character stringThe method is that the elastic verification sequence consists of an address tail and a sequence head, the address tail comprises an account address of a digital asset needing to establish an equivalence relation, the sequence head is placed with a verified elastic character string which is just built, the sequence head is connected with the address tail, a Hash index is placed at the tail part of the sequence head, the sequence head and the address tail are mapped through the Hash index, the verified elastic character string in the sequence head is split into characters, the split characters are arranged according to the sequence of the characters in the verified elastic character string and are sequentially connected, the built elastic verification sequence is placed in a verification library, and the verification library is a data space specially used for placing the elastic verification sequence; when the digital assets need to be sent or received, if the digital assets are given by the user, the digital assets are directly sent or received, if the digital assets are given by the character strings, the limit weakening module is compared with sequence heads in the elastic verification sequences in the verification library, and if the digital assets are completely the same, the digital assets are sent or received by using the account addresses of the digital assets in the address tails connected with the completely same sequence heads; each elastic character area is stored with an elastic character string with the same length, and the elastic character areas with the same length of the elastic character string are stored with verified elastic character strings with the same length as the elastic character strings;
setting three types of users on the credibility block chain asset service platform, wherein the three types of users comprise in-bound users, out-bound overall users and free users, the in-bound mobile user has authority to operate within the trusted blockchain asset service platform, the out-of-bound orchestration user is responsible for orchestration and management of the universe of trusted blockchain asset service platforms, but does not have specific operation rights, the wandering user is responsible for data transfer and operation between the inside and outside of the trusted zone block chain asset service platform, but must apply to the rights-of-way rental module, a plurality of inquiry interfaces are arranged in the access renting module, the inquiry interfaces are used for inquiring the condition of the account of the user, and connecting the credibility block chain asset service platform with an external interface, namely the access lease.Using the module to service the query of the digital assets; the account guide module is responsible for arranging relevant information of the user account and assisting the service of the user account; the detection unit is responsible for providing inquiry service of the condition of the account of the user of the account for the user; when an account of a user is established, the probing unit establishes an account query address of the digital asset of the user for each user in the credibility block chain asset service platform, the account query address of the digital asset of the user is unique in the credibility block chain asset service platform, the account query address of the digital asset of the user is equal to a private interface of an account of the user, the condition of the account of the user can be queried through the private interface of the account of the user, and the condition of the account of the user comprises types, names and quantity of all digital assets currently owned by the user; the detection unit establishes a plurality of address bifurcation rulers, and each address bifurcation ruler comprises a main ruler, a plurality of bifurcation left rulers, a bifurcation right ruler and a plurality of inquiry access points; a plurality of address sockets are evenly engraved on the main scale, a bifurcated left scale and a bifurcated right scale are inserted into one address socket, position interfaces are evenly distributed on the bifurcated left scale or the bifurcated right scale, a private interface of an account of a user is inserted into the position socket and indicates that the account of the user can be inquired, and the private interface of the account of the user is an interface between the account of the user and the outside; marking address scales of the address sockets on each address socket, wherein the address scale of the first address socket is 1, the address scale of the second address socket is 2, and sequentially ascending until the address scale of the Nth address socket is N, namely N address scales are distributed on each main scale; query access points are distributed in the middle of every two address sockets, if the address scale of the address socket immediately before the query access point is D1Then the address scale of the access point is queried as D15; the address scale is the scale on the main scale and is used for marking the relative position on the main scale; the bifurcate left ruler and the bifurcate right ruler are marked with bifurcate scales, and the bifurcate scales are used for marking the relative positions of the private interface of the account of the user on the bifurcate left ruler and the bifurcate right ruler; starting from the nearest location interface to the address jack, isThe first position interface and the second position interface are sequentially raised until the bifurcation scale of the Nth/2 position interface is N/2, and N/2 position interfaces are distributed on each bifurcated left ruler and each bifurcated right ruler; d1N is a natural number and is determined by the overseas overall user;
the address bifurcation scale is used for storing a private interface of an account of a user, and an address code of the private interface of the account of the user can be calculated according to the position of the private interface of the account of the user in the address bifurcation scale, the address code of the private interface of the account of the user is a unique code of an account inquiry address of each digital asset of the user on the credible block chain asset service platform, and the unique code is represented as B1.B2.B3,B1Number of address bifurcation scales where private interfaces for users' accounts are located, B2Is represented by ZB21Or YB21Z denotes the private interface of the user's account on the bifurcated left scale, Y denotes the private interface of the user's account on the bifurcated right scale, B21Address scales of address sockets inserted on the main scale by a bifurcated left or right scale in which a private interface of a user's account is located, B3A bifurcated scale representing a location interface where a private interface of an account of a user is located; each address branching scale is marked in ascending order according to the established sequence, the position of the private interface of the user account in the address branching scale is distributed in ascending order according to the registration time of the user, firstly, the address scale of an address socket is in ascending order, namely, the position interface on the branching left ruler and the branching right ruler with smaller address scale is preferentially placed on the private interface of the user account, the branching left ruler or the branching right ruler on the address socket with the same address scale is alternately distributed, firstly, the private interface of the user account is placed on the branching left ruler on the address socket with the same address scale, then the private interface of the user account is placed on the branching right ruler on the same address socket, the sequence placed on the branching left ruler or the branching right ruler is distributed in ascending order according to the size of the branch scale, and the position interface with small branch scale is placed on the branching right rulerA private interface to prioritize placement of a user's account; after the private interface of the account of the user is placed, forming an address code of the private interface of the account of the user, and sending the address code of the private interface of the account of the user to the user by the probing unit; the account constraint unit establishes a relationship between the account address and the characters of the digital assets of the user so as to facilitate the memory of the user; the account constraint unit establishes an equivalence relation between an account address of a digital asset of a user and an elastic character string, wherein the equivalence relation is that digital assets are transferred into or out of the account address of the user in the credibility block chain asset service platform and are equivalent to digital assets transferred into or out of the elastic character string, the number of bits of the elastic character string is limited, the elastic character string is selected from the character library and is a sequence consisting of characters, the sequence of the characters is determined, the arrangement of the characters is different, the elastic character string is different, the length limit of the elastic character string is increased according to time, when the length limit of the elastic character string is not enough, the length limit of the elastic character string is increased to keep the differentiability between different elastic character strings, and, the character library is composed of different characters, the characters contained in the character library are selected by the overseas overall users, the character library is maintained every D time lengths, whether the characters contained in the character library are added or deleted is determined, and if the characters contained in the character library are added or deleted, the characters are broadcasted to all the users; the elastic character string is selected by the out-of-bound overall user when the elastic character string runs from the credibility block chain asset service platform, the value of the length limit of the elastic character string is represented as M, namely the elastic character string contains no more than M characters, and when the elastic character string is verified to exceed the value of M characters
Figure FDA0002382729940000091
Then, the length limit of the elastic character string is changed into M +1, the elastic character string is partitioned according to the length, namely the elastic character strings with the same length are partitioned into the same elastic character area, and each elastic character area contains the elastic character strings with the same length; m is natureA number selected by the out-of-bound pool user; the asset tracking module is responsible for managing the account address of the digital asset and establishing a variety of ways to store the account address of the digital asset.
CN202010088032.7A 2020-02-12 2020-02-12 Admissibility digital asset transfer method Pending CN111274324A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010088032.7A CN111274324A (en) 2020-02-12 2020-02-12 Admissibility digital asset transfer method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010088032.7A CN111274324A (en) 2020-02-12 2020-02-12 Admissibility digital asset transfer method

Publications (1)

Publication Number Publication Date
CN111274324A true CN111274324A (en) 2020-06-12

Family

ID=70997027

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010088032.7A Pending CN111274324A (en) 2020-02-12 2020-02-12 Admissibility digital asset transfer method

Country Status (1)

Country Link
CN (1) CN111274324A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110270763A1 (en) * 2010-04-30 2011-11-03 Tobsc Inc. Methods and apparatus for a financial document clearinghouse and secure delivery network
US20180101906A1 (en) * 2016-10-07 2018-04-12 The Toronto-Dominion Bank Secure element method for distributed electronic ledger
CN108846742A (en) * 2018-05-30 2018-11-20 杭州复杂美科技有限公司 Block chain user credit stage division and system, equipment and storage medium
CN108898412A (en) * 2018-05-08 2018-11-27 广东奥园奥买家电子商务有限公司 A kind of block chain member device digital assets processing platform
CN109102269A (en) * 2018-06-13 2018-12-28 湖南搜云网络科技股份有限公司 Transfer account method and device, block chain node and storage medium based on block chain
CN109194482A (en) * 2018-08-03 2019-01-11 中山大学 A kind of block chain common recognition method proved based on prestige
CN109697596A (en) * 2018-11-02 2019-04-30 湖南智慧政务区块链科技有限公司 A kind of method and device constructing E-Government
CN109767212A (en) * 2018-10-11 2019-05-17 平安科技(深圳)有限公司 Assets exchanging method, system, terminal and storage medium based on block chain
CN110020860A (en) * 2019-04-09 2019-07-16 湖南天河国云科技有限公司 Across the chain assets transfer method of one kind, system and computer readable storage medium
CN110458708A (en) * 2019-07-16 2019-11-15 阿里巴巴集团控股有限公司 Asset allocation method and device competition-based in block chain network

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110270763A1 (en) * 2010-04-30 2011-11-03 Tobsc Inc. Methods and apparatus for a financial document clearinghouse and secure delivery network
US20180101906A1 (en) * 2016-10-07 2018-04-12 The Toronto-Dominion Bank Secure element method for distributed electronic ledger
CN108898412A (en) * 2018-05-08 2018-11-27 广东奥园奥买家电子商务有限公司 A kind of block chain member device digital assets processing platform
CN108846742A (en) * 2018-05-30 2018-11-20 杭州复杂美科技有限公司 Block chain user credit stage division and system, equipment and storage medium
CN109102269A (en) * 2018-06-13 2018-12-28 湖南搜云网络科技股份有限公司 Transfer account method and device, block chain node and storage medium based on block chain
CN109194482A (en) * 2018-08-03 2019-01-11 中山大学 A kind of block chain common recognition method proved based on prestige
CN109767212A (en) * 2018-10-11 2019-05-17 平安科技(深圳)有限公司 Assets exchanging method, system, terminal and storage medium based on block chain
CN109697596A (en) * 2018-11-02 2019-04-30 湖南智慧政务区块链科技有限公司 A kind of method and device constructing E-Government
CN110020860A (en) * 2019-04-09 2019-07-16 湖南天河国云科技有限公司 Across the chain assets transfer method of one kind, system and computer readable storage medium
CN110458708A (en) * 2019-07-16 2019-11-15 阿里巴巴集团控股有限公司 Asset allocation method and device competition-based in block chain network

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
黄严: "基于区块链技术的技术产权化交易模式构想与设计" *

Similar Documents

Publication Publication Date Title
CN110945853B (en) Method for generating and managing multimode identification network based on alliance chain voting consensus algorithm
CN111611315B (en) Financial big data-oriented multi-fork tree structure block chain integrated optimization storage method
Bai et al. BPIIoT: A light-weighted blockchain-based platform for industrial IoT
Thakur et al. Peer to peer energy trade among microgrids using blockchain based distributed coalition formation method
CN107733855A (en) A kind of block catenary system and application process that can support publicly-owned chain, alliance's chain and privately owned chain simultaneously
Al-Maaitah et al. E-voting system based on blockchain technology: A survey
Zhang et al. Cheapay: An optimal algorithm for fee minimization in blockchain-based payment channel networks
CN109978546A (en) A kind of alliance's block chain framework and its classification storage and transaction method for punching
CN102521364B (en) Method for inquiring shortest path between two points on map
CN103678572B (en) Method and system for searching for Internet of Things information based on two layers of DHTs
CN105389370B (en) A kind of time aggregation querying method towards social activity tissue
CN113438084A (en) Green power source tracing method and system based on R-PBFT consensus algorithm and timestamp
CN110533318A (en) A kind of data processing method and equipment based on block chain
CN112380179A (en) Block chain-based steel supply chain information secret sharing method and system
Vafiadis et al. Differentiating blockchain technology to optimize the processes quality in industry 4.0
CN107682395A (en) A kind of big data cloud computing runtime and method
CN106290772B (en) A kind of sewage monitoring system
CN107291746A (en) A kind of method and apparatus for storing and reading data
CN108173899B (en) Information processing method and device of block chain
CN111274324A (en) Admissibility digital asset transfer method
CN112463881B (en) Efficient block chain system and processing method for cloud edge aggregation computing environment
CN102378407A (en) Object name resolution system and method in internet of things
CN109064173A (en) A kind of nodal information management system and method
WO2023065467A1 (en) Method for collaborative work between blockchain and internet of things
CN212115372U (en) Power transmission and transformation project data integrated management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20200612