CN113191756B - Cross-chain asset security management method, computer device and storage medium - Google Patents

Cross-chain asset security management method, computer device and storage medium Download PDF

Info

Publication number
CN113191756B
CN113191756B CN202110627644.3A CN202110627644A CN113191756B CN 113191756 B CN113191756 B CN 113191756B CN 202110627644 A CN202110627644 A CN 202110627644A CN 113191756 B CN113191756 B CN 113191756B
Authority
CN
China
Prior art keywords
asset
cross
chain
contract
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110627644.3A
Other languages
Chinese (zh)
Other versions
CN113191756A (en
Inventor
何正军
何聿
王志文
吴思进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN202110627644.3A priority Critical patent/CN113191756B/en
Publication of CN113191756A publication Critical patent/CN113191756A/en
Application granted granted Critical
Publication of CN113191756B publication Critical patent/CN113191756B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The invention provides a cross-chain asset security management method, computer equipment and a storage medium, wherein the method comprises the following steps: executing a first cross-link asset transfer transaction, transferring assets to be transferred into a contract and locking, and detecting whether the total amount of the assets locked by the contract is greater than a first threshold value: if yes, unlocking the second asset and transferring the second asset to an asset supervision account; executing a first asset supplementing transaction, and transferring a third asset in the asset supervision account into a contract and locking after the multi-sign verification is successful; executing a first cross-chain asset transfer-back transaction, and recording an asset extraction failure record with a state to be re-extracted in a contract when the amount of a fourth asset to be transferred back is larger than the total amount of assets; executing a second asset supplementing transaction, and transferring a fifth asset in the asset supervision account into a contract and locking after the multi-sign verification is successful; and executing the first asset extraction transaction, unlocking the fourth asset, transferring the fourth asset to the corresponding user, and modifying the record state into the extracted state. The invention reduces the security risk of locking assets across chain contracts.

Description

Cross-chain asset security management method, computer device and storage medium
Technical Field
The application relates to the technical field of block chains, in particular to a cross-chain asset security management method, computer equipment and a storage medium.
Background
In existing blockchain systems of various types, a typical cross-chain asset transfer scheme consists in:
when user A wants to transfer several asset assets1 on blockchain A onto blockchain B:
the chain-spanning contract lock assets1 of block chain A;
the repeater relay passes the information of locking assets1 of the blockchain A to the blockchain B by sending a transaction, and the blockchain B issues asset assets2 representing the same asset type and amount as the assets1 to the user A;
when user A sends a transaction to blockchain B requesting that asset assets3 be transferred back to blockchain A, blockchain B burns assets 3;
repeater relay passes the information of blockchain B burn assets3 to blockchain a by sending a transaction, and the cross-chain contract for blockchain a unlocks assets4 of the same asset type and amount as assets3 and transfers them to user a.
The drawback of the above solution is that the private key of the repeater relay is used under the condition of network communication, when the private key is stolen, the user who steals the private key can lie in the block chain B burnt assets3 when the block chain B burnt assets3 to cheat the asset assets 4.
Disclosure of Invention
In view of the above-described deficiencies or inadequacies in the prior art, it would be desirable to provide a cross-chain asset security management method, computer device, and storage medium that reduces the security risk of loss of cross-chain contract-locked assets due to theft of relay private keys.
In a first aspect, the present invention provides a method for cross-chain asset security management applicable to a blockchain node, including:
performing a first cross-chain asset transfer transaction, transferring and locking a first asset to be transferred in a cross-chain contract, and detecting whether a total amount of the locked asset in the cross-chain contract is greater than a first threshold: if yes, unlocking and transferring the second asset locked in the cross-link contract into the asset supervision account with multiple signatures; wherein, each first private key of the asset monitoring account is respectively stored off-line by a plurality of monitors;
executing a first asset replenishment transaction, transferring and locking a third asset in the asset supervision account in a cross-link contract after the multiple signature verification is successful; the first asset rotation transaction is generated by a plurality of supervisors in response to first notification information and according to a plurality of first private key signatures when alarm information is not received, the first notification information is generated and sent by a first service end in response to the fact that the monitored total amount of assets is smaller than a second threshold value, and the alarm information is generated in response to the fact that private keys of the cross-chain repeaters of the assets are stolen;
Executing a first cross-chain asset transfer-back transaction, and when the amount of a fourth asset to be transferred back is larger than the total amount of the assets, recording an asset extraction failure record with the state of being the asset to be re-extracted in a cross-chain contract, so that a first server generates second notification information when monitoring the asset extraction failure record and sends the second notification information to each monitoring party;
executing a second asset replenishment transaction, transferring and locking a fifth asset in the asset supervision account in the cross-link contract after the multiple signature verification is successful; the second asset replenishment transaction is generated by a plurality of supervisors in response to the second notification information and according to a plurality of first private key signatures when the supervisors do not receive the alarm information;
and executing a first asset extraction transaction, unlocking a fourth asset in the cross-chain contract according to the first cross-chain asset transfer-back transaction, transferring the fourth asset to the corresponding user, and modifying the state of the asset extraction failure record into the extracted state.
In a second aspect, the present invention provides a cross-chain asset security management method applicable to a server, wherein a cross-chain contract of a first blockchain is configured to detect whether a total amount of assets locked in a contract is greater than a first threshold value when a cross-chain asset transfer transaction is executed: if yes, unlocking the second asset and transferring the second asset to the asset monitoring account with multiple signatures; each first private key of the asset supervision account is stored offline by a plurality of supervisors respectively; the method comprises the following steps:
In response to the fact that the monitored total amount of the assets is smaller than a second threshold value, generating first notification information and sending the first notification information to each monitoring party, so that the monitoring parties can generate first asset supplementary transactions according to a plurality of first private key signatures when not receiving alarm information and send the first asset supplementary transactions to nodes of a first block chain for execution, and after the multiple signatures are verified successfully, third assets in an asset supervision account are transferred and locked in a cross-chain contract; wherein the alarm information is generated in response to theft of a private key of a relay of the asset cross-chain;
responding to the asset extraction failure record of which the monitored state is the asset to be re-extracted, generating second notification information and sending the second notification information to each monitoring party so that a plurality of monitoring parties generate second asset supplementary transactions according to a plurality of first private key signatures when not receiving alarm information and send the second asset supplementary transactions to nodes of a first block chain for execution, and transferring and locking a fifth asset in an asset monitoring account in a cross-chain contract after the multiple signatures are verified successfully; the method comprises the steps that a first cross-link asset transfer-back transaction is executed by a cross-link contract, and the cross-link contract records the asset extraction failure record when the amount of a fourth asset to be transferred back is judged to be larger than the total amount of the assets;
the cross-link contract is further configured for executing a first asset extraction transaction, unlocking and transferring a fourth asset in the cross-link contract to the corresponding user according to the first cross-link asset transfer-back transaction, and modifying the state of the asset extraction failure record to be extracted.
In a third aspect, the invention also provides a computer device comprising one or more processors and memory, wherein the memory contains instructions executable by the one or more processors to cause the one or more processors to perform a cross-chain asset security management method provided according to embodiments of the invention.
In a fourth aspect, the present invention further provides a storage medium storing a computer program, where the computer program makes a computer execute the cross-chain asset security management method provided according to the embodiments of the present invention.
According to the cross-link asset security management method, the computer equipment and the storage medium provided by the embodiments of the invention, partial assets locked by cross-link contract are transferred into the asset supervision account with multiple signatures, whether the assets locked by cross-link contract are insufficient or not is monitored through centralized service, a plurality of supervision parties are informed when the assets are insufficient, and the assets in the asset supervision account are transferred back to the cross-link contract only when each supervision party does not receive alarm information, so that an illegal user cannot directly cheat large amount of assets from the cross-link contract even though the private key of the relay is stolen, and thus the security risk that the assets locked by cross-link contract are lost due to the theft of the private key of the relay is reduced; meanwhile, the private key of the asset monitoring account is stored in an off-line mode, so that the private key of the monitoring party is prevented from being stolen.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
fig. 1 is a flowchart of a cross-chain asset security management method according to an embodiment of the present invention.
Fig. 2 is a flowchart of another cross-chain asset security management method according to an embodiment of the present invention.
Fig. 3 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The present application will be described in further detail with reference to the following drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not to be construed as limiting the invention. It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings.
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
Fig. 1 is a flowchart of a cross-chain asset security management method according to an embodiment of the present invention.
As shown in fig. 1, in this embodiment, the present invention provides a method for cross-chain asset security management applicable to a blockchain node, including:
S11: performing a first cross-chain asset transfer transaction, transferring and locking a first asset to be transferred in a cross-chain contract, and detecting whether a total amount of the locked asset in the cross-chain contract is greater than a first threshold:
if yes, go to step S12: unlocking and billing a locked second asset in the cross-link contract into the multi-signed asset curation account; each first private key of the asset monitoring account is stored offline by a plurality of monitors respectively;
s13: executing a first asset replenishment transaction, transferring and locking a third asset in the asset supervision account in a cross-link contract after the multiple signature verification is successful; the first asset rotation transaction is generated by a plurality of supervisors in response to first notification information and according to a plurality of first private key signatures when alarm information is not received, the first notification information is generated and sent by a first service end in response to the fact that the monitored total amount of assets is smaller than a second threshold value, and the alarm information is generated in response to the fact that private keys of the cross-chain repeaters of the assets are stolen;
s15: executing a first cross-chain asset transfer-back transaction, and when the amount of a fourth asset to be transferred back is larger than the total amount of the assets, recording an asset extraction failure record with the state of being the asset to be re-extracted in a cross-chain contract, so that a first server generates second notification information when monitoring the asset extraction failure record and sends the second notification information to each monitoring party;
S17: executing a second asset replenishment transaction, transferring and locking a fifth asset in the asset supervision account in the cross-link contract after the multiple signature verification is successful; the second asset replenishment transaction is generated by a plurality of supervisors in response to the second notification information and according to a plurality of first private key signatures when the supervisors do not receive the alarm information;
s19: and executing a first asset extraction transaction, unlocking a fourth asset in the cross-chain contract according to the first cross-chain asset transfer-back transaction, transferring the fourth asset to the corresponding user, and modifying the state of the asset extraction failure record into the extracted state.
The method is exemplarily described below by taking the example that the user a transfers a plurality of assets on the blockchain a to the blockchain B, the user B transfers small assets on the blockchain B back to the blockchain a, and the user c transfers large assets on the blockchain B back to the blockchain a.
In this embodiment, the asset type of the blockchain a is aaa currency, the asset type characterizing aaa currency on the blockchain B is B _ aaa currency, the first threshold is configured to be 100000aaa currency, the second threshold is configured to be 30000aaa currency, the asset administration account is configured to be a multi-signature account requiring signatures of at least 4 of 6 administrators, and in further embodiments, the first threshold and the second threshold may be configured to be different values according to actual requirements.
When user A wants to transfer 10000aaa coins on blockchain A onto blockchain B, the user side of user A generates a cross-chain asset transfer transaction tx1 and sends it to the network of blockchain A.
In step S11, the node of blockchain a executes tx1, transfers 10000aaa coins in the user' S first account to the cross-chain contract and locks, and at the same time detects whether the total amount of assets (106739aaa coins) locked in the cross-chain contract at this time is greater than the first threshold (100000aaa coins):
if yes, then step S12 is performed to unlock the 50000aaa currency from the cross-chain contract locked asset (106739aaa currency), transferring the 50000aaa currency to an asset administration account.
Specifically, in the present embodiment, the first threshold value that the amount of the second asset is configured to be 50% is taken as an example for illustration; in further embodiments, the amount of the second asset may be configured as the first threshold value in different proportions, the total amount of the second asset, or the difference between the total amount of the second asset and the first threshold value in the third proportion, which may be configured as any proportion between 0% and 100%, according to the actual demand, to achieve the same technical effect.
After the repeater relay monitors that tx1 is successfully executed, tx2 is generated and sent to the network of the blockchain B to trigger the blockchain B to issue 10000B _ aaa coins to the address of the blockchain B of the user A.
When user B wants to transfer the 15000B _ aaa coin on blockchain B back to blockchain A, the user's client of user B generates tx3 and sends it to the network of blockchain B to trigger blockchain B to burn the 15000B _ aaa coin in the address of blockchain B for user B.
After the repeater relay monitors that tx3 is successfully executed, tx4 is generated and sent to the network of the blockchain A to trigger the cross-link contract unlocking 15000aaa currency of the blockchain A and the cross-link contract unlocking 15000aaa currency is transferred to the address of the user B in the blockchain A.
At this time, the first service end monitors that the total asset amount (27692aaa currency) of the cross-link contract lock of the block chain a is smaller than the second threshold (30000aaa currency), generates the first notification information m1, and sends the first notification information m1 to each monitoring party.
After receiving the first notification message m1, each monitoring party can immediately determine whether to receive the alarm message, and can also wait for a period of time and determine whether to receive the alarm message:
if the alarm information is received, a first asset supplementary transaction is not generated temporarily;
and if the alarm information is not received, signing according to the private keys of the asset monitoring accounts stored offline, and generating a first asset supplementary transaction tx5 according to the signatures.
Specifically, the alarm information is generated by the controller of the relay when finding that the private key of the relay is stolen, and is sent to each monitoring party.
In this embodiment, the first asset replenishment transaction tx5 is configured as a single transaction that includes the signatures described above;
in another embodiment, the first asset replenishment transaction tx5 may also be configured as a transaction group, e.g., transaction tx5-x generated by monitor x based on the private key signature of its asset regulatory account stored offline, transaction tx5-y, … generated by monitor y based on the private key signature of its asset regulatory account stored offline, and finally transaction tx5-x, tx5-y, etc. are packaged by monitor x as a transaction group (tx5-x, tx5-y, …, tx 5-z).
In step S13, the node of blockchain a executes the first asset replenishment transaction tx5, performs multiple signature verifications, and if the verification succeeds, transfers the 20000aaa currency in the asset regulatory account into the cross-chain contract and locks.
Specifically, in this embodiment, the amount of the third asset is configured to be 20% of the first threshold (100000aaa currency), and in further embodiments, the amount of the third asset may be configured to be different according to actual requirements, so long as the sum of the second threshold and the amount of the third asset is less than the first threshold, the same technical effect may be achieved.
When user C wants to transfer the 120000B _ aaa token on blockchain B back to blockchain A, user B's client generates tx6 and sends it to blockchain B's network to trigger blockchain B to burn the 120000B _ aaa token in user B's address.
And after monitoring that the tx6 is successfully executed, the relay generates tx7 and sends the tx7 to the network of the block chain A.
In step S15, the node of blockchain a determines that the amount of assets (120000aaa currency) that need to be unlocked and transferred to the user is greater than the total amount of assets (68429aaa currency) locked across chain contracts when tx7 is executed, resulting in a tx7 execution failure, and records an asset extraction failure record in the cross chain contract in the state of assets to be re-extracted. Specifically, the record may include only the status flag and the transaction hash of tx7, and may further include information such as the address of user C, the amount of assets that need to be transferred to user C, etc.
And when the first server monitors that the tx7 fails to execute the asset extraction failure record, generating second notification information m2 and sending the second notification information to each monitoring party.
After receiving the second notification message m2, each monitoring party can also immediately determine whether to receive the alarm message, or wait for a period of time and determine whether to receive the alarm message:
if the alarm information is received, a second asset supplementary transaction is not generated temporarily;
if the alarm information is not received, signing according to the private keys of the asset monitoring accounts stored offline, and generating a second asset replenishment transaction tx8 according to the signatures.
Like the first asset replenishment transaction tx5, the second asset replenishment transaction tx8 may be configured as a single transaction including multiple signatures, or may be configured as a transaction group, which is not described in detail herein.
In step S17, the node of blockchain a performs a second asset replenishment transaction tx8, performs multiple signature verifications, and if successful, transfers the 120000aaa currency in the asset administration account into the cross-chain contract and locks.
Specifically, in this embodiment, the amount of the fifth asset is directly configured as the amount of the fourth asset, and in further embodiments, the amount of the fifth asset may be configured as other different amounts according to actual requirements, for example, the amount of the fifth asset may be configured as the amount of the fourth asset (120000aaa currency) + a third threshold (50000aaa currency) -the total amount of assets locked across chain contracts (68429aaa currency), and so on, which may achieve the same technical effect.
After the tx8 is successfully executed, the first asset extraction transaction tx9 may be generated by the first service end or any monitoring party (or any other service associating party, which may be specifically determined according to actual service requirements) according to the transaction hash of tx7, and is sent to the blockchain network.
In step S19, the node of blockchain A executes a first asset fetch transaction tx9, amending the status of the asset fetch failure record that failed the tx7 execution to fetched from the cross-chain contract unlock 120000aaa currency and billed to the address of user C in blockchain A based on the asset fetch failure record that failed the tx7 execution.
In the embodiment, part of the assets locked by the cross-chain contract are transferred into the asset supervision accounts with multiple signatures, whether the assets locked by the cross-chain contract are insufficient or not is monitored through centralized service, a plurality of supervisors are informed when the assets are insufficient, and the assets in the asset supervision accounts are transferred back to the cross-chain contract only when the supervisors do not receive alarm information, so that even if an illegal user steals a private key of a repeater, the illegal user cannot directly cheat a large amount of assets from the cross-chain contract, and the security risk that the assets locked by the cross-chain contract are lost due to the stealing of the private key of the repeater is reduced; meanwhile, the private key of the asset monitoring account is stored in an off-line mode, so that the private key of the monitoring party is prevented from being stolen.
Fig. 2 is a flowchart of another cross-chain asset security management method according to an embodiment of the present invention. The method illustrated in fig. 2 may be performed in conjunction with the method illustrated in fig. 1.
In the embodiment, as shown in fig. 2, the present invention further provides a cross-chain asset security management method applied to a server, where a cross-chain contract of a first blockchain is configured to detect whether a total amount of assets locked in a contract is greater than a first threshold when a cross-chain asset transfer transaction is executed: if yes, unlocking the second asset and transferring the second asset to the asset supervision account with multiple signatures; each first private key of the asset supervision account is stored offline by a plurality of supervisors respectively; the method comprises the following steps:
S21: in response to the fact that the monitored total amount of the assets is smaller than a second threshold value, generating first notification information and sending the first notification information to each monitoring party, so that the monitoring parties can generate first asset supplementary transactions according to a plurality of first private key signatures when not receiving alarm information and send the first asset supplementary transactions to nodes of a first block chain for execution, and after the multiple signatures are verified successfully, third assets in an asset supervision account are transferred and locked in a cross-chain contract; wherein the alert information is generated in response to theft of a private key of the asset-cross-chain relay;
s23: responding to the asset extraction failure record of which the monitored state is the asset to be re-extracted, generating second notification information and sending the second notification information to each monitoring party so that a plurality of monitoring parties generate second asset supplementary transactions according to a plurality of first private key signatures when not receiving alarm information and send the second asset supplementary transactions to nodes of a first block chain for execution, and transferring and locking a fifth asset in an asset monitoring account in a cross-chain contract after the multiple signatures are verified successfully; the method comprises the following steps that an asset extraction failure record is sent to a cross-link contract when a cross-link contract approximately executes a first cross-link asset transfer-back transaction and judges that the amount of a fourth asset to be transferred back is larger than the total amount of the assets;
The cross-link contract is further configured for executing a first asset extraction transaction, unlocking and transferring a fourth asset in the cross-link contract to the corresponding user according to the first cross-link asset transfer-back transaction, and modifying the status of the asset extraction failure record to extracted.
Preferably, the second asset is sized to be any one of:
a first threshold of a first proportion;
a second proportion of a total amount of assets;
the total amount of assets is different from the first threshold of the third ratio.
The cross-chain asset management principle of the method shown in fig. 2 can refer to the method shown in fig. 1, and is not described in detail here.
Fig. 3 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
As shown in fig. 3, as another aspect, the present application also provides a computer apparatus 300 including one or more Central Processing Units (CPUs) 301 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)302 or a program loaded from a storage section 308 into a Random Access Memory (RAM) 303. In the RAM303, various programs and data necessary for the operation of the apparatus 300 are also stored. The CPU301, ROM302, and RAM303 are connected to each other via a bus 304. An input/output (I/O) interface 305 is also connected to bus 304.
The following components are connected to the I/O interface 305: an input portion 306 including a keyboard, a mouse, and the like; an output section 307 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 308 including a hard disk and the like; and a communication section 309 including a network interface card such as a LAN card, a modem, or the like. The communication section 309 performs communication processing via a network such as the internet. A drive 310 is also connected to the I/O interface 305 as needed. A removable medium 311 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 310 as necessary, so that a computer program read out therefrom is mounted into the storage section 308 as necessary.
In particular, according to an embodiment of the present disclosure, the method described in any of the above embodiments may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing any of the methods described above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 309, and/or installed from the removable medium 311.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described in the present application.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each unit may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The foregoing description is only exemplary of the preferred embodiments of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (6)

1. A method for cross-chain asset security management, the method being applicable to a blockchain node, the method comprising:
Performing a first cross-chain asset transfer transaction, transferring and locking a first asset to be transferred in a cross-chain contract, and detecting whether a total amount of the locked asset in the cross-chain contract is greater than a first threshold: if yes, unlocking and transferring the locked second asset in the cross-link contract into a multi-signature asset supervision account; wherein, each first private key of the asset supervision account is respectively stored off-line by a plurality of supervisors;
executing a first asset replenishment transaction, transferring and locking a third asset in the asset regulatory account in the cross-link contract after the multiple signature verification is successful; the first asset rotation transaction is generated by a plurality of supervisors in response to first notification information and according to a plurality of first private key signatures when alarm information is not received, the first notification information is generated and sent by a first service end in response to the fact that the total amount of the assets is monitored to be smaller than a second threshold value, and the alarm information is generated in response to the fact that private keys of relays of an asset cross-chain are stolen;
executing a first cross-chain asset transfer-back transaction, and when the amount of a fourth asset to be transferred back is larger than the total amount of the assets, recording an asset extraction failure record with the state of being the asset to be re-extracted in a cross-chain contract, so that the first server generates second notification information and sends the second notification information to each supervisor when monitoring the asset extraction failure record;
Executing a second asset replenishment transaction, transferring and locking a fifth asset in the asset supervision account in the cross-link contract after the multiple signature verification is successful; wherein the second asset replenishment transaction is generated by a number of the supervisors in response to a second notification message without receiving the alarm message in accordance with a number of the first private key signatures;
and executing a first asset extraction transaction, unlocking a fourth asset in the cross-chain contract according to the first cross-chain asset transfer-back transaction, transferring the fourth asset to a corresponding user, and modifying the state of the asset extraction failure record into extracted.
2. The method of claim 1, wherein the amount of the second asset is determined as any one of:
a first proportion of the first threshold;
a second proportion of the total amount of assets;
a difference between the total amount of assets and the first threshold of a third proportion.
3. A cross-chain asset security management method, wherein a cross-chain contract for a first blockchain is configured to detect whether a total amount of assets locked in the contract is greater than a first threshold when performing a cross-chain asset transfer transaction: if yes, unlocking the second asset and transferring the second asset to the asset supervision account with multiple signatures; each first private key of the asset supervision account is stored offline by a plurality of supervisors respectively; the method is applicable to a server side and comprises the following steps:
In response to the fact that the monitored total amount of the assets is smaller than a second threshold value, generating first notification information and sending the first notification information to each monitoring party so that the monitoring parties can generate first asset supplementary transactions according to the signatures of the first private keys and send the first asset supplementary transactions to nodes of the first block chain for execution when alarm information is not received, and transferring and locking third assets in the asset supervision accounts in the cross-chain contract after the multiple signatures are verified successfully; wherein the alert information is generated in response to a theft of a private key of a relay of the asset cross-chain;
responding to an asset extraction failure record of which the monitored state is that assets are to be re-extracted, generating second notification information and sending the second notification information to each monitoring party so that a plurality of monitoring parties generate second asset supplementary transactions according to a plurality of first private key signatures when the monitoring parties do not receive the alarm information and send the second asset supplementary transactions to nodes of the first block chain for execution, and transferring and locking a fifth asset in the asset monitoring account in the cross-chain contract after the multiple signatures are verified successfully;
the asset extraction failure record is recorded into the cross-link contract when the cross-link contract approximately executes a first cross-link asset transfer-back transaction and judges that the amount of a fourth asset to be transferred back is larger than the total amount of the assets;
The cross-link contract is further configured for executing a first asset pickup transaction, unlocking and transferring a fourth asset in the cross-link contract to a corresponding user according to the first cross-link asset return transaction, and modifying the status of the asset pickup failure record to be picked.
4. A method according to claim 3, wherein the amount of the second asset is determined as any of:
a first proportion of the first threshold;
a second proportion of the total amount of assets;
a difference between the total amount of assets and the first threshold of a third proportion.
5. A computer device, the device comprising:
one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in any of claims 1-4.
6. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to any one of claims 1-4.
CN202110627644.3A 2021-06-04 2021-06-04 Cross-chain asset security management method, computer device and storage medium Active CN113191756B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110627644.3A CN113191756B (en) 2021-06-04 2021-06-04 Cross-chain asset security management method, computer device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110627644.3A CN113191756B (en) 2021-06-04 2021-06-04 Cross-chain asset security management method, computer device and storage medium

Publications (2)

Publication Number Publication Date
CN113191756A CN113191756A (en) 2021-07-30
CN113191756B true CN113191756B (en) 2022-07-19

Family

ID=76976041

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110627644.3A Active CN113191756B (en) 2021-06-04 2021-06-04 Cross-chain asset security management method, computer device and storage medium

Country Status (1)

Country Link
CN (1) CN113191756B (en)

Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109146448A (en) * 2018-07-13 2019-01-04 杭州复杂美科技有限公司 Across chain assets transfer method, equipment and storage medium
CN109359959A (en) * 2018-09-29 2019-02-19 衢州学院 Across chain assets transfer method, equipment and storage medium
CN111091382A (en) * 2018-10-24 2020-05-01 成都高新信息技术研究院 Block chain asset decentralized cross-chain transaction method and system
CN111199398A (en) * 2018-11-16 2020-05-26 上海派链信息科技有限公司 Method, apparatus, computer-readable storage medium and computer program product for cross-blockchain asset management
CN111311209A (en) * 2020-02-03 2020-06-19 腾讯科技(深圳)有限公司 Cross-block-chain data processing method, device, equipment and computer storage medium
CN111640017A (en) * 2020-05-06 2020-09-08 深圳前海微众银行股份有限公司 Transaction correctness verification method and device applied to alliance chain cross-chain transfer
CN112070499A (en) * 2020-09-14 2020-12-11 天津理工大学 Asset and data chain crossing method and system based on block chain
CN112116472A (en) * 2020-09-18 2020-12-22 上海计算机软件技术开发中心 Block chain cross-chain transaction model and method
CN112150284A (en) * 2020-09-22 2020-12-29 浙江数秦科技有限公司 Block chain heterogeneous chain cross-chain transaction method

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107301536B (en) * 2017-06-12 2019-07-12 腾讯科技(深圳)有限公司 Resource transfers method and device
US10853772B2 (en) * 2018-04-04 2020-12-01 Vijay K. Madisetti Method and system for exchange of value or tokens between blockchain networks
SG11202006981QA (en) * 2018-03-14 2020-08-28 Jieqian Zheng Block chain data processing method, management terminal, user terminal, conversion device, and medium
JP6647731B2 (en) * 2018-11-07 2020-02-14 アリババ・グループ・ホールディング・リミテッドAlibaba Group Holding Limited Managing blockchain sensitive transactions

Patent Citations (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109146448A (en) * 2018-07-13 2019-01-04 杭州复杂美科技有限公司 Across chain assets transfer method, equipment and storage medium
CN109359959A (en) * 2018-09-29 2019-02-19 衢州学院 Across chain assets transfer method, equipment and storage medium
CN111091382A (en) * 2018-10-24 2020-05-01 成都高新信息技术研究院 Block chain asset decentralized cross-chain transaction method and system
CN111199398A (en) * 2018-11-16 2020-05-26 上海派链信息科技有限公司 Method, apparatus, computer-readable storage medium and computer program product for cross-blockchain asset management
CN111311209A (en) * 2020-02-03 2020-06-19 腾讯科技(深圳)有限公司 Cross-block-chain data processing method, device, equipment and computer storage medium
CN111640017A (en) * 2020-05-06 2020-09-08 深圳前海微众银行股份有限公司 Transaction correctness verification method and device applied to alliance chain cross-chain transfer
CN112070499A (en) * 2020-09-14 2020-12-11 天津理工大学 Asset and data chain crossing method and system based on block chain
CN112116472A (en) * 2020-09-18 2020-12-22 上海计算机软件技术开发中心 Block chain cross-chain transaction model and method
CN112150284A (en) * 2020-09-22 2020-12-29 浙江数秦科技有限公司 Block chain heterogeneous chain cross-chain transaction method

Also Published As

Publication number Publication date
CN113191756A (en) 2021-07-30

Similar Documents

Publication Publication Date Title
CN109087080B (en) Cross-chain transaction method, device and storage medium
EP3639468B1 (en) Systems and methods for avoiding or reducing cryptographically stranded resources on a blockchain network
CN111311209B (en) Cross-block-chain data processing method, device, equipment and computer storage medium
CN110363527B (en) Block chain-based evidence storage and supervision method and device
CN109981646B (en) Resource transfer method and device based on block chain and electronic equipment
CN111160881A (en) Method and system for decentralized side-chain issuance of anchored backbone tokens
CN111539803B (en) Mortgage financing monitoring method, system and computer readable storage medium
CN111383114A (en) Asset information management method and device based on block chain
CN110706113A (en) Cross-block-chain data processing method, device, equipment and medium
WO2020206954A1 (en) Method and system for supervising chattel collateral based on consortium blockchain
CN111953754A (en) Cross-chain transaction method, electronic device and readable storage medium
WO2022206439A1 (en) Method and apparatus for providing cross-chain message
CN111915308A (en) Transaction processing method of blockchain network and blockchain network
CN112488834B (en) Node management method, node management device, electronic equipment and readable storage medium
CN113191756B (en) Cross-chain asset security management method, computer device and storage medium
CN113377875A (en) Cross-link data processing method and device, electronic equipment and readable storage medium
CN112927073A (en) Cross-link data interchange method, system, device and electronic equipment
CN116415955A (en) Cross-chain transaction method and system based on combination of hash locking and notary
CN113626850B (en) Request processing method, device, equipment and storage medium based on alliance chain
CN112950183B (en) Cross-chain data interchange method, system, device and electronic equipment
CN111190754B (en) Block chain event notification method and block chain system
CN113689216A (en) Cross-chain transaction processing method and device, equipment, storage medium and program product
US10771242B2 (en) Blockchain-based data processing
US20240013207A1 (en) Method and system for performing electronic transactions
CN112203247B (en) Safe storage method and system for electric energy data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant