CN112561407B - Asset management method, system and device based on block chain - Google Patents

Asset management method, system and device based on block chain Download PDF

Info

Publication number
CN112561407B
CN112561407B CN202110192811.6A CN202110192811A CN112561407B CN 112561407 B CN112561407 B CN 112561407B CN 202110192811 A CN202110192811 A CN 202110192811A CN 112561407 B CN112561407 B CN 112561407B
Authority
CN
China
Prior art keywords
evidence
service
result
service operation
asset
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110192811.6A
Other languages
Chinese (zh)
Other versions
CN112561407A (en
Inventor
严旭东
陈锐发
吴钱宗
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Ant Blockchain Technology Shanghai Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Ant Blockchain Technology Shanghai Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd, Ant Blockchain Technology Shanghai Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202110924910.9A priority Critical patent/CN113657877A/en
Priority to CN202110192811.6A priority patent/CN112561407B/en
Publication of CN112561407A publication Critical patent/CN112561407A/en
Application granted granted Critical
Publication of CN112561407B publication Critical patent/CN112561407B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Economics (AREA)
  • Computing Systems (AREA)
  • Development Economics (AREA)
  • Data Mining & Analysis (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

One or more embodiments of the present specification provide a blockchain-based asset management method, system, and apparatus. The method can comprise the following steps: the method comprises the steps of obtaining a service operation request initiated by a business participant, wherein the service operation request is used by a basic service party for executing corresponding service operation and obtaining result evidence obtained by execution, and the result evidence is used for indicating that the service operation is related to an asset certificate owned by the business participant; and determining process evidence corresponding to the service operation provided by the basic service party in the service operation request, wherein the result evidence and the process evidence are respectively stored in the blockchain system, and the matching result of the result evidence and the process evidence is used for verifying the credibility of the asset certificate.

Description

Asset management method, system and device based on block chain
Technical Field
One or more embodiments of the present disclosure relate to the field of blockchain technologies, and in particular, to a method, system, and apparatus for asset management based on blockchain.
Background
With the rapid development of financial business, the asset owner usually uses services such as nuclear contract or surcharge in the formation process and the survival process of the asset certificate, and these services can prove the authenticity of the corresponding asset certificate. However, in the related art, it is common that certification materials obtained by using the above-described service such as the core contract or the surcharge are held by the asset owner and provided to other business participants by the asset owner to certify the authenticity of the asset certificate to the other business participants. At this time, the proving material provided by the asset owner can be tampered and forged in a single way, so that the authenticity of the asset certificate is difficult to effectively prove, and the risk of asset transfer is increased.
Disclosure of Invention
In view of the above, one or more embodiments of the present disclosure provide a method, system and apparatus for block chain based asset management.
To achieve the above object, one or more embodiments of the present disclosure provide the following technical solutions:
according to a first aspect of one or more embodiments herein, there is provided a blockchain-based asset management system, comprising:
the basic service party is used for acquiring a service operation request initiated by a service participant, executing corresponding service operation according to the service operation request and acquiring result evidence obtained by execution, wherein the result evidence is used for indicating that the service operation is related to an asset certificate owned by the service participant;
the penetration service party is used for acquiring the service operation request and determining a process evidence corresponding to the service operation provided by the basic service party in the service operation request;
and the block chain system is used for respectively storing the result evidence and the process evidence, and the matching result of the result evidence and the process evidence is used for verifying the credibility of the asset certificate.
According to a second aspect of one or more embodiments of the present specification, there is provided a blockchain-based asset management method applied to a pass through service; the method comprises the following steps:
the method comprises the steps of obtaining a service operation request initiated by a business participant, wherein the service operation request is used by a basic service party for executing corresponding service operation and obtaining result evidence obtained by execution, and the result evidence is used for indicating that the service operation is related to an asset certificate owned by the business participant;
and determining process evidence corresponding to the service operation provided by the basic service party in the service operation request, wherein the result evidence and the process evidence are respectively stored in the blockchain system, and the matching result of the result evidence and the process evidence is used for verifying the credibility of the asset certificate.
According to a third aspect of one or more embodiments of the present specification, a blockchain-based asset management apparatus is provided, which is applied to a penetration service; the device comprises:
an obtaining unit, configured to obtain a service operation request initiated by a service participant, where the service operation request is used by a basic service party to perform a corresponding service operation and obtain a result evidence obtained by the execution, and the result evidence is used to indicate that the service operation is related to an asset credential owned by the service participant;
a determining unit, configured to determine process evidence corresponding to the service operation provided by the basic service provider in the service operation request, where the result evidence and the process evidence are respectively stored in the blockchain system, and a matching result of the result evidence and the process evidence is used to verify the credibility of the asset credential.
According to a fourth aspect of one or more embodiments of the present specification, there is provided an electronic apparatus comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor implements the method according to the second aspect by executing the executable instructions.
According to a fifth aspect of one or more embodiments of the present description, a computer-readable storage medium is presented, on which computer instructions are stored, which instructions, when executed by a processor, carry out the steps of the method according to the second aspect.
Drawings
Fig. 1 is a schematic diagram of an architecture of an asset management system according to an exemplary embodiment of the present disclosure.
Fig. 2 is a flowchart of a method for asset management based on blockchains according to an exemplary embodiment of the present disclosure.
Fig. 3 is a flow chart of another method for blockchain-based asset management provided by an exemplary embodiment of the present disclosure.
Fig. 4 is a flowchart of another method for blockchain-based asset management provided by an exemplary embodiment of the present disclosure.
Fig. 5 is a schematic structural diagram of an electronic device according to an exemplary embodiment of the present disclosure.
Fig. 6 is a block diagram of an asset management device based on a blockchain according to an exemplary embodiment of the present disclosure.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the following exemplary embodiments do not represent all implementations consistent with one or more embodiments of the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of one or more embodiments of the specification, as detailed in the claims which follow.
It should be noted that: in other embodiments, the steps of the corresponding methods are not necessarily performed in the order shown and described herein. In some other embodiments, the method may include more or fewer steps than those described herein. Moreover, a single step described in this specification may be broken down into multiple steps for description in other embodiments; multiple steps described in this specification may be combined into a single step in other embodiments.
The blockchain technique (also known as the distributed ledger technique) is a decentralized distributed database technique. Due to the adoption of a decentralized network structure, a consensus mechanism and a chain block structure, the block chain technology has the characteristics of decentralized, public transparency, no tampering, trustiness and the like, and is suitable for a plurality of application scenes with high requirements on data reliability.
Blockchains are generally divided into three types: public chain (Public Blockchain), Private chain (Private Blockchain) and alliance chain (Consortium Blockchain). In addition, there are various types of combinations, such as private chain + federation chain, federation chain + public chain, and other different combinations. The most decentralized of these is the public chain. The public chain is represented by bitcoin and ether house, and the participants joining the public chain can read the data record on the chain, participate in transaction, compete for the accounting right of the new block, and the like, and each participant (i.e. node) can freely join and leave the network. The private chain is opposite, the data writing authority of the network is controlled by a certain organization or organization, and the data reading authority is regulated by the organization; briefly, the private chain can be a weakly centralized system with strict restrictions and few participating nodes, so that the private chain is more suitable for use within a particular organization. A federation chain is a block chain between a public chain and a private chain, and "partial decentralization" can be achieved. Each node in the federation chain usually has a corresponding entity organization or organization, and participants jointly maintain the operation of the block chain by authorizing to join the network and forming a profit-related federation.
In the blockchain network, corresponding blockchain transactions (transaction for short) are submitted to blockchain link points, and the blockchain transactions are executed by the blockchain link points, so that the corresponding operation purpose is realized. Based on the decentralized architecture of the blockchain network, each blockchain transaction on the blockchain needs to be executed on all blockchain nodes in the blockchain network, so as to ensure that the blockchain account book data maintained by each blockchain node are consistent. If the transaction logic is simple, such as bitcoin for example, the blockchain transaction is only used for implementing the transfer operation, and this will not cause excessive resource consumption even if the blockchain transaction needs to be executed at all blockchain nodes. However, if the blockchain provides the functionality of an intelligent contract and the blockchain transaction invokes the intelligent contract, the situation may be quite different. The intelligent contracts on the blockchain are contracts which can be triggered to be executed by transactions on a blockchain system, and the intelligent contracts can be defined by the form of codes.
In the blockchain network, corresponding blockchain transactions are submitted to blockchain link points, corresponding intelligent contracts can be triggered and executed by the blockchain transactions, and complex functions can be realized by calling the intelligent contracts. While smart contracts are pre-deployed executable code on a blockchain, smart contracts allow for trusted transactions to be conducted without third parties, and which transactions are traceable and irreversible. One or more interfaces may be defined in the smart contract, each interface for implementing a corresponding function. When an intelligent contract is invoked via a blockchain transaction, it may be declared which interface or interfaces defined in the intelligent contract to invoke to implement the corresponding functionality.
With the rapid development of financial business, the asset owner usually uses services such as nuclear contract or surcharge in the formation process and the survival process of the asset certificate, and these services can prove the authenticity of the corresponding asset certificate. However, in the related art, it is common that certification materials obtained by using the above-described service such as the core contract or the surcharge are held by the asset owner and provided to other business participants by the asset owner to certify the authenticity of the asset certificate to the other business participants. At this time, the proving material provided by the asset owner can be tampered and forged in a single way, so that the authenticity of the asset certificate is difficult to effectively prove, and the risk of asset transfer is increased.
The asset voucher can be used to prove that the owner of the asset owns a certain asset, and the asset transfer is often required to be performed according to the asset voucher, wherein the asset can be off-chain assets such as cash, securities or real estate, and the like, and can also be on-chain assets such as tokens (tokens) in a block chain, and the like. The asset certificate may be a debt, a contract or a transaction record, and many asset certificates may also be an electronic contract or an electronic transaction record that can be inquired on the internet, and the description does not limit this.
The specification can combine the asset transfer process with the blockchain, and can ensure the reliability and authenticity of the asset certificate involved in the asset transfer process. The following examples are given for illustrative purposes.
FIG. 1 is an architectural diagram of an asset management system shown herein. As shown in fig. 1, the system may include a base server 11, a pass through server 12, and a blockchain system 13. The basic service provider 11 may include several service nodes, such as the service node 1, the service node 2, and the service node 3 shown in fig. 1.
In the process of any asset transfer service, the service participant can send a service operation request to the basic service party 11, so that the basic service party 11 can perform a service operation according to the service operation request, and accordingly, the service participant can be provided with corresponding service support, and the basic service party 11 can obtain corresponding result evidence by performing the service operation, and the result evidence can be used for indicating that the service operation is associated with the asset credential owned by the service participant.
The base server 11 may include several service nodes. The service operation provided by the basic service part 11 often involves one or more service nodes, and each service node may provide at least one basic service capability, so that the process of the basic service part 11 providing the service operation may include providing, by each service node, a corresponding basic service capability according to a service operation request, where the basic service capability may include core subscription, real-name authentication, or a proxy payment, and the description does not limit this. For example, the service node 1 shown in fig. 1 may provide basic service capability of core contract, the service node 2 may provide basic service capability of charging and paying for agency, and the service node 3 may provide basic service capability of real name authentication, etc.
In an embodiment, in the case that the service operation only involves one service node, the pass through service 12 sends the service operation request to the service node, so that forwarding of the service operation request to the pass through service 12 by the service node can be avoided, and the service node can be prevented from influencing the authenticity of both the result evidence obtained by the basic service 11 and the process evidence obtained by the pass through service 12 by tampering with the service operation request.
In an embodiment, when the service operation involves multiple service nodes, the pass through service provider 12 forwards the service operation request to at least one service node, and it is also possible to prevent any service node from tampering the service operation request, thereby avoiding affecting the authenticity of the subsequently obtained result evidence and process evidence. Thus, the penetration service provider 12 may be a downstream side of the basic service provider 11, and the penetration service provider 12 may also be an upstream side of the basic service provider 11, which is not limited in this specification.
In an embodiment, in the case that the service operation request contains the party authentication information, the service operation performed by the basic service party 11 involves a service node for information authentication, and the basic service capability that the service node for information authentication can provide includes verifying the party authentication information, so that it can be verified whether the party authentication information is authentic and authentic. And the precondition that the business participant has the asset certificate can include: the party authentication information is verified. The participant card information may include information such as an identity card or a business license of any participant in the asset transfer process. Taking the commodity buying and selling process as an example, the party authentication information may include information such as an identity card or a business license of a commodity seller, and may also include information such as an identity card or a business license of a commodity purchaser, which is not limited in this specification.
In an embodiment, in case the service operation request contains service execution information, the service operation performed by the base service provider 11 relates to a service node for performing the service, and the service node for performing the service may perform the asset transfer service corresponding to the asset credential according to the service execution information. Taking the commodity buying and selling process as an example, suppose that the user a purchases 100 commodities from the merchant B in a three-period payment manner, wherein the user a needs to pay 1000 yuan per month to the merchant B through the bank C, the merchant B is a business participant with 3000 yuan of asset credentials, and the bank C is a node for executing business services. The merchant B can send a service operation request to the corresponding penetration service party every month, and the service operation request can include a request for transferring 1000 yuan of the account number of the user A at the bank C to the account number of the merchant B at the bank C. The pass through service may forward the service operation request to bank C, and then bank C may deduct 1000 yuan from the account of user a and add 1000 yuan to the account of merchant B according to the received service operation request, thereby implementing the asset transfer service.
The through service provider 12 may obtain a service operation request sent by a service participant or the through service provider 12 may obtain a service operation request forwarded by the basic service provider 11, and the through service provider 12 may determine a process proof of a service operation corresponding to the service operation provided by the basic service provider 11 in the service operation request, for example, the process proof may be a key request message of the service operation corresponding to the service operation provided by the basic service provider 11 in the service operation request, or the process proof may be the service operation request itself, and the description does not limit this.
The blockchain system 13 may be configured to store the result evidence and the process evidence, and the result evidence and the process evidence stored in the blockchain system 13 may be prevented from being tampered and may be traced, so that authenticity and reliability of the result evidence and the process evidence may be ensured, authenticity and reliability of a matching result obtained according to the result evidence and the process evidence may be further ensured, and the matching result of the result evidence and the process evidence may be used to verify credibility of the asset credential owned by the business participant. Wherein the trustworthiness of the asset credential may include at least one of: the credibility of the identity information of the business participant, the credibility of the quota information of the asset certificate, the credibility of the valid period of the asset certificate, the credibility of the association relation between the business participant and the asset certificate and the like.
In an embodiment, whether the matching result of the result evidence and the process evidence is used for verifying the credibility of the identity information of the business participant, the credibility of the quota information of the asset certificate or the credibility of the validity period of the asset certificate is related to the service operation provided by the basic service party, for example, if the service operation includes a verification process for the authentication information of the participant, the matching result of the result evidence and the process evidence can be used for indicating the credibility of the identity information of the business participant, and the like.
In one embodiment, the basic service provider 11 may receive the process proof from the pass through service provider 12, and the basic service provider 11 stores the process proof and the result proof into the blockchain system 13; alternatively, the penetration service 12 may receive the result evidence from the base service 11, and the penetration service 12 saves the result evidence and the process evidence to the blockchain system 13; alternatively, the result evidence may be stored in the blockchain system 13 by the basic service party 11 and the process evidence may be stored in the blockchain system 13 by the pass through service party 12, which is not limited in this specification.
The basic service party 11 generates a result evidence according to the service operation request initiated by the service participant, and the penetration service party 12 generates a process evidence according to the service operation request, so that the basic service party 11 and the penetration service party 12 respectively provide proofs aiming at the asset certificates from respective view angles, thereby avoiding any party from forging the proofs aiming at the asset certificates, ensuring the authenticity of a matching result of the result evidence and the process evidence, and further playing a role in increasing the credit for the asset certificates.
In an embodiment, the result evidence may further include a first signature obtained by the basic service party 11 by signing with a private key in a maintained asymmetric key pair, so that the blockchain system 13 may execute an intelligent contract for signature verification after obtaining the result evidence, the blockchain system 13 may determine a first public key corresponding to the basic service party 11, the blockchain system 13 may verify the first signature according to the first public key, and the blockchain system 13 only verifies the result evidence if the first signature is verified according to the first public key. That is, the precondition for the blockchain system 13 to verify the proof of result includes: the blockchain system 13 verifies the first signature included in the result proof, thereby ensuring that the result proof is both generated by the underlying service provider 11 and that the result proof has not been tampered during transmission.
Similarly, the process proof may further include a second signature obtained by the penetrating service 12 by signing with a private key in a maintained asymmetric key pair, and then the blockchain system 13 may execute an intelligent contract for signature verification after obtaining the process proof, and the blockchain system 13 may determine a second public key corresponding to the penetrating service 12, and the blockchain system 13 may verify the second signature according to the second public key, and only when the second signature passes verification according to the second public key, the blockchain system 13 verifies the process proof. That is, the precondition for the proof of the deposit process of the blockchain system 13 includes: the blockchain system 13 verifies the second signature included in the process proof to ensure that the process proof was both generated by the pass through service 12 and that the process proof was not tampered with during transmission.
In one embodiment, the blockchain system 13 verifies the respective result evidences and the respective process evidences, the blockchain system 13 may receive an evidence query transaction initiated for any asset credential, and the blockchain system 13 may execute an intelligent contract with a query function according to the evidence query transaction, thereby obtaining the result evidences and the process evidences corresponding to the asset credentials. The blockchain system 13 may receive an evidence query transaction sent by a client corresponding to the pass through service 12, or the blockchain system 13 may receive an evidence query transaction initiated by any other client, which is not limited in this specification.
In an embodiment, the blockchain system 13 receives an evidence query transaction sent by any client, the blockchain system 13 may return the result evidence and the process evidence obtained by the query and corresponding to the asset credential to the client sending the evidence query transaction, and the client matches the result evidence and the process evidence to obtain a corresponding matching result, so that the result evidence and the process evidence can be matched under the chain, and the matching efficiency can be improved.
In an embodiment, in the case that the result evidence includes first identification information generated by the basic service party 11 for the received service operation request, and the process evidence includes second identification information generated by the pass through service party 12 for the received service operation request, the evidence query transaction may include the first identification information and the second identification information, so that the blockchain system 13 may query the corresponding result evidence and process evidence according to the first identification information and the second identification information, respectively. The first identification information and the second identification information may include an ID (Identity document) or a name.
In an embodiment, in the case that the result evidence includes the first identification information generated by the basic service party 11 for the received service operation request, the process evidence includes the second identification information generated by the pass-through service party 12 for the received service operation request, and a mapping relationship between the first identification information and the second identification information may be maintained in the blockchain system 13, the evidence query transaction received in the blockchain system 13 may include only the first identification information or only the second identification information, and of course, the evidence query transaction may include both the first identification information and the second identification information, which is not limited in this specification. When the evidence query transaction only includes the first identification information, the blockchain system 13 may determine the corresponding second identification information from the maintained mapping relationship according to the first identification information, so that the blockchain system 13 may query the corresponding result evidence and the corresponding process evidence according to the first identification information and the second identification information, respectively. Similarly, when the evidence inquiry transaction only includes the second identification information, the blockchain system 13 may determine the corresponding first identification information from the maintained mapping relationship according to the second identification information.
The mapping relation between the first identification information and the second identification information is maintained in the block chain system, so that the situation that any party tampers or forges the identification information can be avoided, and the situation that any party forges the association relation between the first identification information and the second identification information can be avoided, and the result evidence and the process evidence inquired subsequently according to the first identification information and the second identification information are corresponding to the same asset certificate.
In an embodiment, the blockchain system 13 may further receive an evidence verification transaction initiated for any asset credential, and the blockchain system 13 may execute an intelligent contract with a verification function according to the evidence verification transaction, so that the result evidence corresponding to the asset credential and the process evidence may be matched to obtain a matching result. Wherein if the result evidence matches the process evidence, it may indicate that the corresponding asset credential is authentic, and if the result evidence does not match the process evidence, it may indicate that the corresponding asset credential is not authentic. The blockchain system 13 may receive an evidence verification transaction sent by a client corresponding to the pass through service 12, or the blockchain system 13 may receive an evidence query transaction initiated by any other client, which is not limited in this specification.
Of course, the evidence query transaction and the evidence verification transaction may be independent blockchain transactions, or the same blockchain transaction may include contents included in the evidence query transaction and contents included in the evidence verification transaction, which is not limited in this specification.
FIG. 2 is a flow chart illustrating a blockchain-based asset management method in an exemplary embodiment of the present description. As shown in fig. 2, the method is applied to a pass through service (e.g., the pass through service 12 shown in fig. 1); the method may comprise the steps of:
step 202, obtaining a service operation request initiated by a business participant, where the service operation request is used by a basic service party to execute a corresponding service operation and obtain a result evidence obtained by the execution, where the result evidence is used to indicate that the service operation is related to an asset credential owned by the business participant.
In an embodiment, the pass through server may directly obtain the service operation request initiated by the service participant, or the pass through server may obtain the service operation request forwarded by the base server, which is not limited in this specification. After the basic service party obtains the service operation request, the basic service party can execute the service operation according to the service operation request, so that corresponding service support can be provided for the business participant, and the basic service party can obtain corresponding result evidence through executing the service operation, wherein the result evidence can be used for indicating that the service operation provided by the basic service party is associated with the asset certificate owned by the business participant.
Step 204, determining a process evidence corresponding to the service operation provided by the basic service party in the service operation request, wherein the result evidence and the process evidence are respectively stored in the blockchain system, and a matching result of the result evidence and the process evidence is used for verifying the credibility of the asset credential.
In an embodiment, the pass through service may determine a process proof corresponding to the service operation provided by the basic service provider in the service operation request, for example, the process proof may be a critical request message corresponding to the service operation provided by the basic service provider in the service operation request, or the process proof may be the service operation request itself, and the like, which is not limited in this specification.
The blockchain system can be used for storing and certifying the result evidence and the process evidence, and the result evidence and the process evidence stored and certified in the blockchain system can be prevented from being tampered and can be traced, so that the authenticity and the reliability of the result evidence and the process evidence can be guaranteed, and the authenticity and the reliability of a matching result obtained by the result evidence and the process evidence can be further guaranteed. And the result of the matching of the result evidence with the process evidence can be used to verify the trustworthiness of the asset credentials owned by the business participant. Wherein the trustworthiness of the asset credential may include at least one of: the credibility of the identity information of the business participant, the credibility of the quota information of the asset certificate, the credibility of the valid period of the asset certificate and the credibility of the association relation between the business participant and the asset certificate.
In an embodiment, the process evidence may further include a digital signature obtained by the penetrating service party signing with a private key in a maintained asymmetric key pair, and then the block chain system may execute an intelligent contract for signature verification after obtaining the process evidence, may determine a public key corresponding to the penetrating service party, may verify the digital signature according to the determined public key, and only when the digital signature is verified according to the public key, may the block chain system store the process evidence. That is, the precondition of evidence of the proof process of the blockchain system includes: the blockchain system verifies the digital signature contained in the process evidence, so that the process evidence can be guaranteed to be generated by the penetration service party and can be guaranteed not to be tampered in the process of transmission.
In one embodiment, the penetration service side can receive the result evidence from the basic service side, and the penetration service side stores the result evidence and the process evidence into the block chain system; or, the basic service side can receive the process evidence from the penetration service side, and the basic service side stores the process evidence and the result evidence into the block chain system; alternatively, the basic service side may store the result evidence in the blockchain system, and the pass through service side may store the process evidence in the blockchain system, respectively, which is not limited in this specification.
In one embodiment, the pass through service may generate an evidence query transaction for the asset credential and transmit the evidence query transaction to the blockchain system, which may then execute the query-enabled smart contract based on the evidence query transaction to obtain the result evidence and the process evidence corresponding to the asset credential.
In an embodiment, in the case that the result evidence includes first identification information generated by the basic service policy on the received service operation request, and the process evidence includes second identification information generated by the pass-through service policy on the received service operation request, the evidence query transaction may include the first identification information and the second identification information, so that the blockchain system may query the corresponding result evidence and process evidence according to the first identification information and the second identification information, respectively.
In an embodiment, in the case that the result evidence includes first identification information generated by the basic service policy for the received service operation request, the process evidence includes second identification information generated by the pass-through service policy for the received service operation request, and a mapping relationship between the first identification information and the second identification information may be maintained in the blockchain system, the evidence query transaction may include only the first identification information or only the second identification information, and of course, the evidence query transaction may include both the first identification information and the second identification information, which is not limited in this specification. When the evidence query transaction only includes the first identification information, the blockchain system can determine corresponding second identification information from the maintained mapping relation according to the first identification information, so that the blockchain system can query corresponding result evidence and process evidence according to the first identification information and the determined second identification information respectively. Similarly, when the evidence inquiry transaction only includes the second identification information, the blockchain system may determine the corresponding first identification information from the maintained mapping relationship according to the second identification information.
In an embodiment, the penetration service side can obtain the result evidence and the process evidence transmitted by the block chain system, and the penetration service side can directly match the received result evidence and the process evidence to obtain a corresponding matching result, so that the result evidence and the process evidence can be matched under the chain, and the matching efficiency can be improved.
In an embodiment, the penetration service may generate an evidence verification transaction for the asset credential, and the penetration service transmits the evidence verification transaction to the blockchain system, and the blockchain system may execute an intelligent contract with a verification function according to the evidence verification transaction, so that the result evidence corresponding to the asset credential may be matched with the process evidence to obtain a matching result. Wherein if the result evidence matches the process evidence, it may indicate that the corresponding asset credential is authentic, and if the result evidence does not match the process evidence, it may indicate that the corresponding asset credential is not authentic.
Of course, the evidence query transaction and the evidence verification transaction may be independent blockchain transactions, or the same blockchain transaction may include contents included in the evidence query transaction and contents included in the evidence verification transaction, which is not limited in this specification.
In addition, the specific implementation process of fig. 2 is similar to the embodiment shown in fig. 1, and is not described here again.
For the convenience of understanding, the technical solutions of the present specification will be further described below with reference to fig. 3 to 4. An exemplary description is given of enterprise a purchasing goods from provider B. FIG. 3 is a flowchart of a blockchain-based asset management method in an exemplary embodiment of the present disclosure.
Suppose that enterprise a is expected to purchase 1000 items of merchandise from vendor B and will enter into a purchase agreement where it is agreed that enterprise a will pay 1 ten thousand dollars per month from vendor B via bank C, that enterprise a will pay vendor B10 months in total from 1 month to 10 months, and that vendor B will obtain the corresponding asset credential X. The basic service side comprises an applet M and a bank C. As shown in fig. 3, the following steps may be included:
in step 301, the vendor B sends a service operation request to the applet M.
In this embodiment, the vendor B may send a service operation request to the applet M, where the service operation request may include license information of the enterprise a, where the license information includes a license number: the BH110, the service operation request may include account information of enterprise a, and the account information may include an account number: ZH220, and the service operation request instructs to send business license information of enterprise a to applet M for verification, and account information of enterprise a to bank C for verification.
At step 302, the applet M verifies the license information of the enterprise a.
In step 303, the applet M verifies the verification result 1 in the blockchain system.
At step 304, the applet M forwards the service operation request to the pass through service.
In the present embodiment, the applet M includes basic service capability including verifying the authenticity of the license, so the applet M can verify the license information of the enterprise a after receiving the service operation request. The applet M may also generate an external ticket number 1 from the received service operation request: m01. Assuming that the applet M verifies the license information of the enterprise a, the obtained verification result 1 may include that the license information of the enterprise a license number BH110 is authentic, and the external form number 1 is M01. The applet M can store the obtained verification result 1 in the blockchain system.
In this embodiment, the applet M may forward the received service operation request to the pass through service.
Step 305, the pass through service side extracts the key request information in the service operation request.
Step 306, the pass through server stores the key request message into the blockchain system.
Step 307, the pass through service party forwards the service operation request to bank C.
In this embodiment, the pass through service may extract key request information from the service operation request according to the license information of the enterprise a and the account information of the enterprise a included in the service operation request, where the key request information may include: business license information of enterprise a and account information of enterprise a, wherein the business license information may include a license number BH110, and the account information may include an account number ZH 220.
In this embodiment, the pass through service may generate an internal single number for the received service operation request: and ND 15. The key request information may further include an internal single number ND 15. The pass through service can store the obtained key request information into the blockchain system.
In this embodiment, the pass through service may also forward the service operation request to the bank C, so that the bank C may verify the account information of the enterprise a.
At step 308, bank C verifies the account information of enterprise a.
In step 309, bank C deposits the obtained verification result 2 to the blockchain system.
In this embodiment, the basic service capability included in the bank C includes verifying authenticity of the account information, and then after receiving the service operation request, the bank C may verify the account of the enterprise a according to the account information of the enterprise a included in the service operation request, for example, may verify whether real-name authentication information of the account of the enterprise a is correct, whether the account of the enterprise a is abnormal in the last year, and may also verify whether the credit level of the enterprise a at the bank C meets the preset level requirement, and the like. The bank C may also generate an external ticket number 2 according to the service operation request: C20.
in this embodiment, it is assumed that after the bank C verifies the account information of the enterprise a, the obtained verification result 2 may include: the account of enterprise a corresponding to account number ZH220 is normal and the external ticket number 2 is C20. The bank C may deposit the obtained verification result 2 into the blockchain system.
In this embodiment, the pass through service may also obtain the external ticket number 1 corresponding to the service operation request from the applet M: m01, and obtaining the external form number 2 corresponding to the service operation request from bank C: c20, so that the mapping relationship can be obtained by the penetration service side as follows: external single number 1 (M01) -external single number 2 (C20) -internal single number (ND 15). The penetration service party can store the mapping relation into the block chain, so that any party can be prevented from tampering the single number or forging the mapping relation between the external single number and the internal single number.
In this embodiment, in the case where the vendor B determines that the license information of the enterprise a is authentic and authentic through the applet M and determines that the account of the enterprise a is normal through the bank C, the purchase agreement between the vendor B and the enterprise a is in effect, and the vendor B owns the asset credential X which records: business a repays 1 ten thousand yuan from month 1 to month 10 to provider B through bank C each month.
FIG. 4 is a flowchart of a blockchain-based asset management method in an exemplary embodiment of the present disclosure. Assuming that at month 3, after supplier B received enterprise A's monthly 3 repayment, supplier B wishes to apply for financing to financial institution D using asset X, and supplier B also provides an external ticket number 1, M01, at which time financial institution D needs to verify the authenticity of asset X.
In step 401, financial institution D sends an evidence inquiry transaction to the blockchain system.
At step 402, the blockchain system executes an intelligent contract with a query function.
In this embodiment, financial institution D may send an evidence inquiry transaction to the blockchain system, which may include an external single number 1, M01. The blockchain system can query transactions according to the evidence, execute an intelligent contract with a query function, and determine an external single number 2 corresponding to the external single number 1 and an internal single number corresponding to the external single number 1 according to a mapping relation maintained on the blockchain system, so that the blockchain system can respectively obtain a verification result 1 of evidence according to the external single number 1, obtain a verification result 2 of evidence according to the external single number 2 and obtain key request information of evidence according to the internal single number.
At step 403, financial institution D sends an evidence verification transaction to the blockchain system.
In step 404, the intelligent contract with verification function is executed.
In this embodiment, the financial institution D may send an evidence verification transaction to the blockchain system, and the evidence transaction may also include an external single number 1, i.e., M01. The blockchain system may verify the transaction according to the evidence, execute an intelligent contract with verification function, and thus may match the verification result 1 obtained in step 402 with the key request information, and match the verification result 2 with the key request information.
In the present embodiment, it is assumed that the blockchain system determines that the verification result 1 matches the key request information by executing the smart contract with a check function, for example, the smart contract with a check function may be used to determine that the license number BH110 included in the verification result 1 matches the license number BH110 included in the key request information; and the blockchain system may determine that the verification result 2 matches the key request information by executing an intelligent contract with verification function, for example, the intelligent contract with verification function may be used to determine that the account number ZH220 included in the verification result 2 is consistent with the account number ZH220 included in the key request information.
In this embodiment, the blockchain system obtains a matching result by executing an intelligent contract with a verification function, where the matching result includes that the verification result 1 matches the key request information and the verification result 2 matches the key request information, so as to indicate that the asset credential X owned by the provider B is trusted, and to prove that the asset credential X is indeed provided with corresponding basic service capabilities by the applet M and the bank C.
In step 405, the blockchain system returns the matching results to financial institution D.
In this embodiment, financial institution D may receive the matching result returned by the blockchain system, and from the matching result, financial institution D may determine that asset credential X owned by vendor B is authentic, so that financial institution D may provide funding support to vendor B.
Fig. 5 shows a schematic structural diagram of an electronic device according to an exemplary embodiment of the present description. Referring to fig. 5, at the hardware level, the electronic device includes a processor 502, an internal bus 504, a network interface 506, a memory 508 and a non-volatile memory 510, but may also include hardware required for other services. The processor 502 reads a corresponding computer program from the non-volatile memory 510 into the memory 508 and then runs, forming a blockchain-based asset management device on a logical level. Of course, besides the software implementation, the present specification does not exclude other implementations, such as logic devices or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may be hardware or logic devices.
Referring to fig. 6, in a software implementation, the block chain-based asset management apparatus may include an acquisition unit 602 and a determination unit 604. Wherein:
an obtaining unit 602, configured to obtain a service operation request initiated by a service participant, where the service operation request is used by a basic service party to perform a corresponding service operation and obtain a result evidence obtained by the execution, where the result evidence is used to indicate that the service operation is related to an asset credential owned by the service participant;
a determining unit 604, configured to determine process evidence corresponding to the service operation provided by the basic service provider in the service operation request, where the result evidence and the process evidence are respectively stored in the blockchain system, and a matching result of the result evidence and the process evidence is used to verify the credibility of the asset credential.
Optionally, the process evidence includes a digital signature generated by the pass through service by signing with an identity private key, where the precondition for the blockchain system to store the process evidence includes: the blockchain system verifies the digital signature.
Optionally, the method further includes:
a first evidence storing unit 606, configured to store the process evidence into the blockchain system;
a second evidence storing unit 608, configured to receive the result evidence from the base service party, and store the result evidence and the process evidence into the blockchain system.
Optionally, the method further includes:
a first generating unit 610 for generating an evidence inquiry transaction for the asset credential;
a first transmission unit 612, configured to transmit the evidence query transaction to the blockchain system, so that the blockchain system obtains result evidence and process evidence corresponding to the asset credential by executing an intelligent contract with a query function.
Alternatively to this, the first and second parts may,
in the case that the result evidence comprises first identification information generated by the basic service party for the service operation request and the process evidence comprises second identification information generated by the penetrating service party for the service operation request, the evidence inquiry transaction comprises the first identification information and the second identification information;
and in the case that the result evidence comprises first identification information generated by the basic service party for the service operation request, the process evidence comprises second identification information generated by the penetration service party for the service operation request, and a mapping relation between the first identification information and the second identification information is maintained in the blockchain system, the evidence inquiry transaction comprises the first identification information and/or the second identification information.
Optionally, the method further includes:
a second generating unit 614 for generating an evidence verification transaction for the asset credential;
a second transmission unit 616, configured to transmit the evidence verification transaction to the blockchain system, so that the blockchain system matches the result evidence corresponding to the asset credential with the process evidence by executing an intelligent contract with a verification function, and outputs a matching result, where if the result evidence matches the process evidence, it indicates that the asset credential is trusted, and if the result evidence does not match the process evidence, it indicates that the asset credential is not trusted.
Optionally, the credibility of the asset credential includes at least one of:
the credibility of the identity information of the business participant, the credibility of the quota information of the asset certificate, the credibility of the valid period of the asset certificate and the credibility of the association relation between the business participant and the asset certificate.
The systems, devices, modules or units illustrated in the above embodiments may be implemented by a computer chip or an entity, or by a product with certain functions. A typical implementation device is a computer, which may take the form of a personal computer, laptop computer, cellular telephone, camera phone, smart phone, personal digital assistant, media player, navigation device, email messaging device, game console, tablet computer, wearable device, or a combination of any of these devices.
In a typical configuration, a computer includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present specification. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the specification, as detailed in the appended claims.
The terminology used in the description herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the description. As used in this specification and the appended claims, the singular forms "a", "an", and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, the first information may also be referred to as second information, and similarly, the second information may also be referred to as first information, without departing from the scope of the present specification. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
The above description is only a preferred embodiment of the present disclosure, and should not be taken as limiting the present disclosure, and any modifications, equivalents, improvements, etc. made within the spirit and principle of the present disclosure should be included in the scope of the present disclosure.

Claims (19)

1. A blockchain-based asset management system, comprising:
the basic service party is used for acquiring a service operation request initiated by a service participant, executing corresponding service operation according to the service operation request and acquiring result evidence obtained by execution, wherein the result evidence is used for indicating that the service operation is related to an asset certificate owned by the service participant; the basic service party comprises a plurality of service nodes, the service operation relates to one or more service nodes, and each service node provides corresponding basic service capability according to the service operation request to complete the service operation, wherein at least one service node receives the service operation request from the penetration service party;
the penetration service party is different from the basic service party and is used for acquiring the service operation request and determining process evidence corresponding to the service operation provided by the basic service party in the service operation request;
and the block chain system is used for respectively storing the result evidence and the process evidence, and the matching result of the result evidence and the process evidence is used for verifying the credibility of the asset certificate.
2. The system of claim 1, wherein the first and second sensors are disposed in a common housing,
in the case that the service operation request contains party authentication information, the service operation relates to a service node for information authentication, and the basic service capability provided by the service node for information authentication comprises verification of the party authentication information;
the precondition that the business participant possesses the asset certificate comprises the following steps: the party authentication information is verified.
3. The system of claim 1, wherein the first and second sensors are disposed in a common housing,
in the case that the service operation request contains service execution information, the service operation relates to a service node for executing a service, and the basic service capability provided by the service node for executing the service includes: and executing the asset transfer service corresponding to the asset certificate according to the service execution information.
4. The system of claim 1, wherein the first and second sensors are disposed in a common housing,
the result evidence further comprises a first signature generated by the basic service party by adopting an identity private key for signature, wherein the precondition for the block chain system to store the result evidence comprises: the blockchain system verifies the first signature;
the process evidence further comprises a second signature generated by signing by the penetration service party by using an identity private key, wherein the precondition for the blockchain system to store the process evidence comprises the following conditions: the blockchain system verifies the second signature.
5. The system of claim 1, wherein the first and second sensors are disposed in a common housing,
the basic service party receives the process evidence from the penetration service party and stores the process evidence and the result evidence into the blockchain system;
or, the penetration service side receives the result evidence from the basic service side and stores the result evidence and the process evidence into the blockchain system;
or, the result evidence is stored into the blockchain system by the basic service party, and the process evidence is stored into the blockchain system by the penetration service party.
6. The system of claim 1, the blockchain system to:
receiving an evidence query transaction initiated against the asset credential;
and acquiring result evidence and process evidence corresponding to the asset certificate by executing the intelligent contract with the query function.
7. The system of claim 6, wherein the first and second sensors are arranged in a single package,
in the case that the result evidence comprises first identification information generated by the basic service party for the service operation request and the process evidence comprises second identification information generated by the penetrating service party for the service operation request, the evidence inquiry transaction comprises the first identification information and the second identification information;
or, in a case that the result evidence includes first identification information generated by the basic server for the service operation request, the process evidence includes second identification information generated by the pass-through server for the service operation request, and a mapping relationship between the first identification information and the second identification information is maintained in the blockchain system, the evidence inquiry transaction includes the first identification information and/or the second identification information.
8. The system of claim 6, the blockchain system further to:
receiving an evidence verification transaction initiated against the asset credential;
matching result evidence and process evidence corresponding to the asset credential by executing an intelligent contract having a verification function;
outputting the obtained matching result; wherein the asset credential is trusted if the result evidence matches the process evidence and untrusted if the result evidence does not match the process evidence.
9. The system of claim 1, the trustworthiness of the asset credential comprising at least one of:
the credibility of the identity information of the business participant, the credibility of the quota information of the asset certificate, the credibility of the valid period of the asset certificate and the credibility of the association relation between the business participant and the asset certificate.
10. An asset management method based on a block chain is applied to a penetration service party; the method comprises the following steps:
obtaining a service operation request initiated by a service participant, wherein the service operation request is used by a basic service party to execute a corresponding service operation and obtain result evidence obtained by execution, the result evidence is used for indicating that the service operation is related to an asset certificate owned by the service participant, the basic service party comprises a plurality of service nodes, the service operation relates to one or more service nodes, the service operation is executed and completed by each service node according to basic service capability provided by the obtained service operation request, and the service operation request received by at least one service node comes from the penetration service party;
and determining process evidence corresponding to the service operation provided by the basic service party in the service operation request, wherein the result evidence and the process evidence are respectively stored in a blockchain system, and the matching result of the result evidence and the process evidence is used for verifying the credibility of the asset certificate.
11. The method of claim 10, wherein the process proof comprises a digital signature generated by the pass through service signed with a private identity key, wherein the precondition for the blockchain system to certify the process proof comprises: the blockchain system verifies the digital signature.
12. The method of claim 10, further comprising:
storing the process evidence into the blockchain system;
or receiving the result evidence from the basic service side, and storing the result evidence and the process evidence into the blockchain system.
13. The method of claim 10, further comprising:
generating an evidence query transaction for the asset credential;
transmitting the evidence query transaction to the blockchain system to enable the blockchain system to obtain result evidence and process evidence corresponding to the asset credential by executing an intelligent contract with a query function.
14. The method of claim 13, wherein the first and second light sources are selected from the group consisting of,
in the case that the result evidence comprises first identification information generated by the basic service party for the service operation request and the process evidence comprises second identification information generated by the penetrating service party for the service operation request, the evidence inquiry transaction comprises the first identification information and the second identification information;
or, in a case that the result evidence includes first identification information generated by the basic server for the service operation request, the process evidence includes second identification information generated by the pass-through server for the service operation request, and a mapping relationship between the first identification information and the second identification information is maintained in the blockchain system, the evidence inquiry transaction includes the first identification information and/or the second identification information.
15. The method of claim 13, further comprising:
generating an evidence verification transaction for the asset credential;
and transmitting the evidence verification transaction to the blockchain system so that the blockchain system matches the result evidence and the process evidence corresponding to the asset certificate by executing an intelligent contract with a verification function and outputs a matching result, wherein if the result evidence matches the process evidence, the asset certificate is trusted, and if the result evidence does not match the process evidence, the asset certificate is not trusted.
16. The method of claim 10, the trustworthiness of the asset credential comprising at least one of:
the credibility of the identity information of the business participant, the credibility of the quota information of the asset certificate, the credibility of the valid period of the asset certificate and the credibility of the association relation between the business participant and the asset certificate.
17. An asset management device based on a block chain is applied to a penetration service party; the device comprises:
the service operation request is used for executing corresponding service operation by a basic service party and obtaining result evidence obtained by execution, wherein the result evidence is used for indicating that the service operation is related to an asset certificate owned by the service participant, the basic service party comprises a plurality of service nodes, the service operation relates to one or more service nodes, the service operation is executed and completed by each service node according to basic service capability provided by the obtained service operation request, and the service operation request received by at least one service node comes from the penetration service party;
a determining unit, configured to determine a process evidence corresponding to the service operation provided by the basic service provider in the service operation request, where the result evidence and the process evidence are respectively stored in a blockchain system, and a matching result of the result evidence and the process evidence is used to verify the credibility of the asset credential.
18. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor implements the method of any one of claims 10-16 by executing the executable instructions.
19. A computer readable storage medium having stored thereon computer instructions which, when executed by a processor, carry out the steps of the method according to any one of claims 10-16.
CN202110192811.6A 2021-02-20 2021-02-20 Asset management method, system and device based on block chain Active CN112561407B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN202110924910.9A CN113657877A (en) 2021-02-20 2021-02-20 Asset management method, system and device based on block chain
CN202110192811.6A CN112561407B (en) 2021-02-20 2021-02-20 Asset management method, system and device based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110192811.6A CN112561407B (en) 2021-02-20 2021-02-20 Asset management method, system and device based on block chain

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN202110924910.9A Division CN113657877A (en) 2021-02-20 2021-02-20 Asset management method, system and device based on block chain

Publications (2)

Publication Number Publication Date
CN112561407A CN112561407A (en) 2021-03-26
CN112561407B true CN112561407B (en) 2021-06-22

Family

ID=75034386

Family Applications (2)

Application Number Title Priority Date Filing Date
CN202110192811.6A Active CN112561407B (en) 2021-02-20 2021-02-20 Asset management method, system and device based on block chain
CN202110924910.9A Pending CN113657877A (en) 2021-02-20 2021-02-20 Asset management method, system and device based on block chain

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN202110924910.9A Pending CN113657877A (en) 2021-02-20 2021-02-20 Asset management method, system and device based on block chain

Country Status (1)

Country Link
CN (2) CN112561407B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112561407B (en) * 2021-02-20 2021-06-22 支付宝(杭州)信息技术有限公司 Asset management method, system and device based on block chain
CN112990925B (en) * 2021-04-21 2021-08-10 支付宝(杭州)信息技术有限公司 Asset certificate management method and device
CN113469820A (en) * 2021-07-27 2021-10-01 支付宝(杭州)信息技术有限公司 Asset management method, device and system based on block chain

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109886677A (en) * 2018-12-29 2019-06-14 阿里巴巴集团控股有限公司 A kind of commodity based on block chain purchase method and apparatus
CN110322321A (en) * 2019-06-28 2019-10-11 北京百度网讯科技有限公司 Electronic bill assignment method, device, equipment and medium based on block chain
CN112015823A (en) * 2020-10-20 2020-12-01 支付宝(杭州)信息技术有限公司 Block chain data deleting method and device

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110046998B (en) * 2019-01-31 2020-04-14 阿里巴巴集团控股有限公司 Cross-chain right using system, method, device, electronic equipment and storage medium
RU2736447C1 (en) * 2019-01-31 2020-11-17 Алибаба Груп Холдинг Лимитед Asset cross-trade in networks of blockchains
CN110458702A (en) * 2019-07-15 2019-11-15 阿里巴巴集团控股有限公司 Based on the virtual resource allocation method and device of block chain, electronic equipment
CN111047321A (en) * 2019-12-27 2020-04-21 支付宝实验室(新加坡)有限公司 Service processing method and device, electronic equipment and storage medium
CN112561407B (en) * 2021-02-20 2021-06-22 支付宝(杭州)信息技术有限公司 Asset management method, system and device based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109886677A (en) * 2018-12-29 2019-06-14 阿里巴巴集团控股有限公司 A kind of commodity based on block chain purchase method and apparatus
CN110322321A (en) * 2019-06-28 2019-10-11 北京百度网讯科技有限公司 Electronic bill assignment method, device, equipment and medium based on block chain
CN112015823A (en) * 2020-10-20 2020-12-01 支付宝(杭州)信息技术有限公司 Block chain data deleting method and device

Also Published As

Publication number Publication date
CN112561407A (en) 2021-03-26
CN113657877A (en) 2021-11-16

Similar Documents

Publication Publication Date Title
US11847621B2 (en) Systems and methods for math-based currency escrow transactions
US11895246B2 (en) Devices, systems, and methods for facilitating low trust and zero trust value transfers
US10225076B2 (en) Splitting digital promises recorded in a blockchain
CN108885761B (en) Method for secure point-to-point communication on a blockchain
US20210390549A1 (en) Systems and methods for building blockchains for verifying assets for smart contracts
CN111026789B (en) Block chain-based electronic bill query method and device and electronic equipment
CN112561407B (en) Asset management method, system and device based on block chain
AU2017216289A1 (en) Systems and methods for storing and sharing transactional data using distributed computer systems
CN110221919B (en) Virtual resource allocation method and device based on block chain
JP2020014193A (en) Computer network system for cryptographically protected token-based alternative management, and method of using the same
CN111444209B (en) Data processing method, device, equipment and medium based on block chain
CN112767163B (en) Block chain-based digital commodity transaction method and device
CN111738724B (en) Cross-border resource transfer authenticity auditing method and device, and electronic equipment
TW202016819A (en) Block-chain transaction method and device and electronic device
CN110275925B (en) Virtual resource allocation method and device based on block chain
CN110458561B (en) Method and device for realizing confidential transaction in block chain network
US20200242573A1 (en) Cryptographic transactions supporting real world requirements
EP4135259A1 (en) Delegated off-chain payments using cryptocurrencies
US20210350366A1 (en) Application queue api with database of virtual queues for real-time processing distributed ledger system
CN115131034A (en) Block chain-based rights and interests digital collection verification method and equipment
WO2021060340A1 (en) Transaction information processing system
CN113469820A (en) Asset management method, device and system based on block chain
CN112508557A (en) Virtual certificate method and system based on block chain
JP7048039B1 (en) Payment systems, payment devices, payment methods and payment programs
CN115660679B (en) Decentralizing safe transaction method based on hash locking

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40047872

Country of ref document: HK