CN113592493A - Asset retrieving method, device and storage medium based on privacy - Google Patents

Asset retrieving method, device and storage medium based on privacy Download PDF

Info

Publication number
CN113592493A
CN113592493A CN202110881850.7A CN202110881850A CN113592493A CN 113592493 A CN113592493 A CN 113592493A CN 202110881850 A CN202110881850 A CN 202110881850A CN 113592493 A CN113592493 A CN 113592493A
Authority
CN
China
Prior art keywords
asset
recovery
transaction
expendable
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110881850.7A
Other languages
Chinese (zh)
Other versions
CN113592493B (en
Inventor
马登极
王志文
吴思进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN202110881850.7A priority Critical patent/CN113592493B/en
Publication of CN113592493A publication Critical patent/CN113592493A/en
Application granted granted Critical
Publication of CN113592493B publication Critical patent/CN113592493B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/383Anonymous user system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The invention belongs to the technical field of computers, and particularly relates to an asset retrieving method, device and storage medium based on privacy. According to the asset retrieving method, the device and the storage medium based on the privacy, the retrieving contract preset through the block chain is used for outputting the locking retrieving address and the receiving address for the transaction of the non-retrieving transaction, and the asset is allowed to be retrieved by a sender of the asset under the condition that the retrieving contract sets conditions. The zone height and the recovery mark of the check are proved by setting the zero knowledge, and the recovery of the asset by the sender can be controlled by combining contract judgment, so that the user can be allowed to use private account transfer safely, the asset can be recovered in time if the other party does not receive the asset within a certain time, and the user can also recover the asset if the other party does not consume the asset within a very long time, such as a private key loss scene, so that the asset cannot be lost and is very safe.

Description

Asset retrieving method, device and storage medium based on privacy
Technical Field
The invention belongs to the technical field of computers, and particularly relates to an asset retrieving method, device and storage medium based on privacy.
Background
The blockchain is a novel decentralized protocol, digital currency transactions or other data can be safely stored, information cannot be forged or falsified, and transaction confirmation on the blockchain is completed by all nodes on the blockchain together. Due to the adoption of a consensus algorithm, an encryption algorithm and other mechanisms, the block chain can effectively manage data such as copyright data, contract data, game props and the like. An intelligent contract is a piece of automatically executable program deployed on a blockchain, and the intelligent contract in a broad sense includes programming languages, compilers, virtual machines, events, state machines, fault tolerance mechanisms, and the like. The intelligent contract combined with the block chain can effectively carry out services such as right confirmation, transaction, right control and the like on the data assets.
In the current mainstream blockchain project, sending assets via privacy contracts risks losing assets somewhat, and is difficult to find and retrieve in advance due to privacy. For example, the receiver address is filled in by mistake or the receiver private key is lost, and the asset cannot be proposed, so that the existing asset transfer scheme based on privacy cannot be retrieved after being transferred out, and irretrievable loss may be caused under some extreme conditions.
Disclosure of Invention
In order to solve the technical problems, the invention provides an asset retrieving method, equipment and a storage medium based on privacy, which can control the sender to retrieve assets by setting the block height and the retrieving identification of a change knowledge proof check and combining with contract judgment based on a privacy asset retrieving scheme with limited time of change knowledge proof.
In order to achieve the purpose, the invention adopts the following technical scheme.
In a first aspect, a privacy-based asset recovery method is provided, a blockchain database is configured with a expendable asset library for crediting expendable assets and a spent asset library for crediting spent assets, a blockchain system is configured with recovery contracts, and the recovery contracts output locking recovery addresses and receiving addresses for transactions of each non-recovery transaction, and the method comprises the following steps: a transaction initiator generates a recovery transaction which uses a first expendable asset and outputs a second expendable asset, wherein the recovery transaction comprises a sender public key and a receiver public key of the first expendable asset, a recovery identifier, an asset ID of the first expendable asset and a recovery address, the recovery identifier is used for marking the recovery transaction, the asset ID of the first expendable asset is obtained by carrying out hash operation on the sender public key, the receiver public key, a random value and a transaction validation height which correspond to the first expendable asset, and the recovery address is used for receiving the second expendable asset;
the method comprises the steps that a transaction initiator takes a recovery identification and a transaction validation height as a proving circuit public input based on a preset zero knowledge proving circuit, a private key signature, a receiving address, a first private key signature and a random value corresponding to a sender public key are taken as private inputs to verify recovery transaction, the first private key signature is a private key signature corresponding to a recovery address provided by the transaction initiator, after verification is passed, whether the first private key signature corresponds to the recovery address is verified based on the zero knowledge proving circuit, and if the first private key signature corresponds to the recovery address, the recovery transaction is executed.
Preferably, the specific step of verifying the recovery transaction based on the change knowledge circuit comprises:
the method comprises the steps that a recovery contract confirms whether a transaction is a recovery transaction or not based on a public input verification recovery identification of a change knowledge circuit, after the transaction is confirmed to be the recovery transaction, a transaction effective height is verified, the transaction effective height is compared with the current block height, if the difference between the transaction effective height and the current block height is smaller than a set minimum height difference N or larger than a set maximum height difference N, height verification is passed, existence certification of a first expendable asset is verified, and if the first expendable asset is an asset in an expendable asset library, transaction verification is passed.
In a second aspect, a computer device is provided, comprising one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method as described in the first aspect above.
In a third aspect, there is provided a storage medium storing a computer program which, when executed by a processor, implements the method as described in the first aspect above.
The invention has the beneficial effects that:
the invention can allow the user to use the private account transfer safely by the private asset retrieving scheme of limited time proved by the zero knowledge, if the other party does not receive the private account transfer within a certain time, the user can retrieve the private account transfer in time, and if the other party does not consume the private account transfer within a very long time, such as a scene of private key loss, the user can retrieve the private account transfer, so that the private account transfer is not lost and is very safe.
Drawings
Fig. 1 is a schematic structural diagram of a computer device according to embodiment 2 of the present invention.
Detailed Description
The invention is described in further detail below with reference to specific embodiments and the attached drawing figures. Those skilled in the art will be able to implement the invention based on these teachings. Moreover, the embodiments of the present invention described in the following description are generally only some embodiments of the present invention, and not all embodiments. Therefore, all other embodiments obtained by a person of ordinary skill in the art based on the embodiments of the present invention without any creative effort shall fall within the protection scope of the present invention.
Example 1
The embodiment provides a privacy-based asset recovery method, a block chain database is provided with a expendable asset library for storing expendable assets and a spent asset library for storing spent assets, a block chain system is provided with recovery contracts, and the recovery contracts are used for outputting locking recovery addresses and receiving addresses for transactions of each non-recovery transaction, and the method comprises the following steps: a transaction initiator generates a recovery transaction which uses a first expendable asset and outputs a second expendable asset, wherein the recovery transaction comprises a sender public key and a receiver public key of the first expendable asset, a recovery identifier, an asset ID of the first expendable asset and a recovery address, the recovery identifier is used for marking the recovery transaction, the asset ID of the first expendable asset is obtained by carrying out hash operation on the sender public key, the receiver public key, a random value and a transaction validation height which correspond to the first expendable asset, and the recovery address is used for receiving the second expendable asset;
the method comprises the steps that a transaction initiator takes a recovery identification and a transaction validation height as a proving circuit public input based on a preset zero knowledge proving circuit, a private key signature, a receiving address, a first private key signature and a random value corresponding to a sender public key are taken as private inputs to verify recovery transaction, the first private key signature is a private key signature corresponding to a recovery address provided by the transaction initiator, after verification is passed, whether the first private key signature corresponds to the recovery address is verified based on the zero knowledge proving circuit, and if the first private key signature corresponds to the recovery address, the recovery transaction is executed.
It should be noted that, in the above scheme, the reason that the recovery identifier and the transaction validation height are used as public inputs is to verify whether the transaction is a recovery transaction based on the recovery identifier, and then verify whether the transaction meets the condition that the recovery transaction is established based on the transaction validation height, and for specific verification, further description is referred; on the other hand, the user can set the recovery address of the first expendable asset based on the recovery contract and the proof of knowledge of change, the transaction initiator proves that the transaction initiator possesses the private key by using the private key signature corresponding to the recovery address, so that the recovery address and the private key signature corresponding to the recovery address need to strictly correspond, and the private key signature corresponding to the sender public key is used for verifying that the transaction initiator possesses the private key of the sender of the first expendable asset so as to prove that the transaction initiator is the sender of the asset.
Further, the specific step of verifying the recovery transaction based on the zero knowledge circuit comprises:
the method comprises the steps that a recovery contract confirms whether a transaction is a recovery transaction or not based on a public input verification recovery identification of a change knowledge circuit, after the transaction is confirmed to be the recovery transaction, a transaction effective height is verified, the transaction effective height is compared with the current block height, if the difference between the transaction effective height and the current block height is smaller than a set minimum height difference N or larger than a set maximum height difference N, height verification is passed, existence certification of a first expendable asset is verified, and if the first expendable asset is an asset in an expendable asset library, transaction verification is passed.
The principle of the scheme provided by the embodiment is that a recovery contract is preset through a block chain, the recovery contract sets a receiving address and a recovery address for each transaction output of non-recovery transactions, and the assets are recovered under the condition of the set conditions of the recovery contract, for example, in practical application, there are two scenes, 1, after transferring, confirmation of the other party is waited, and if the other party still does not receive the transfer within a certain time, such as 1 day, the sender can withdraw the sent assets. 2. The sender may also reclaim the asset if the contra has not been spent for a certain time, such as 1 year, possibly in a scenario where the contra private key is lost. But of course also to meet the large premise that assets are not spent. If the confirmation of the receiving party is not received within a certain time or the cost is not spent beyond a certain time, the height of the transaction effective can be compared with the current height to judge, namely, the height of the effective block of the transfer transaction is smaller than the set minimum height N or larger than the set maximum height N compared with the current height, and the setting of the time is referred to as the setting of the block height difference. After initiating a recovery transaction, the change knowledge proving circuit first determines whether the transaction is a recovery transaction based on the recovery identifier, for example, the recovery identifier is a variable at a specific position in the transaction information, 0 represents non-recovery, and 1 represents recovery, and the setting of the recovery identifier is to be disclosed when spending or recovering the asset (i.e., when generating a non-recovery transaction or a recovery transaction based on the asset), the proving circuit determines whether the transaction is a recovery transaction based on the recovery identifier, if the recovery identifier is set to 0, it is described as a non-recovery transaction, at this time, the private key of the asset should be the private key corresponding to the receiving address, if the recovery identifier is set to 1, it is described as a recovery transaction, at this time, the private key of the asset should be the private key corresponding to the recovery address, here, the asset locking mode is also corresponding to the fixed private key, but here in this embodiment, the asset is expanded to two addresses, similarly, the embodiment realizes the corresponding private key required by the asset selection by setting the verification transaction of the proving circuit. Meanwhile, it is also necessary to verify whether the private key signature provided by the transaction initiation and transmission corresponds to the sender public key of the first expendable transaction, and the asset can be transferred to the address corresponding to the sender public key only if the private key signature corresponds to the sender public key of the first expendable transaction. In the embodiment, the block height and the recovery identification of the check are proved by setting the knowledge of change, and by combining with contract judgment, the recovery of the asset by the sender can be controlled, the user can be allowed to use the private account transfer without worry, if the opposite side does not receive the asset within a certain time, the asset can be recovered in time, if the time exceeds a very long time, the opposite side does not consume the asset, for example, the private key is lost, and the user can also recover the asset, so that the asset cannot be lost and is very safe.
Example 2
A computer device, the device comprising: one or more processors; memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform the method of embodiment 1.
A storage medium storing a computer program which, when executed by a processor, implements the method as described in embodiment 1 above.
Fig. 1 is a schematic structural diagram of an apparatus provided in this embodiment.
As shown in fig. 1, as another aspect, the present application also provides a computer apparatus 500 including one or more Central Processing Units (CPUs) 501 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage section 508 into a Random Access Memory (RAM) 503. In the RAM503, various programs and data necessary for the operation of the apparatus 500 are also stored. The CPU501, ROM502, and RAM503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input portion 506 including a keyboard, a mouse, and the like; an output portion 507 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 performs communication via a network such as the internet, and the processing driver 510 is also connected to the I/O interface 505 as necessary. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as necessary, so that a computer program read out therefrom is mounted into the storage section 508 as necessary.
In particular, according to the embodiments disclosed in the present application, the method described in the above embodiment 1 may be implemented as a computer software program. For example, embodiments disclosed herein include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method described in any of the embodiments above. In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 509, and/or installed from the removable medium 511.
As yet another aspect, the present application also provides a computer-readable storage medium, which may be the computer-readable storage medium included in the apparatus of the above-described embodiment; or it may be a separate computer readable storage medium not incorporated into the device. The computer readable storage medium stores one or more programs for use by one or more processors in performing the methods described herein.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present invention. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules described in the embodiments of the present application may be implemented by software or hardware. The described units or modules may also be provided in a processor, for example, each of the described units may be a software program provided in a computer or a mobile intelligent device, or may be a separately configured hardware device. Wherein the designation of a unit or module does not in some way constitute a limitation of the unit or module itself.
The above description is only a preferred embodiment of the application and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention herein disclosed is not limited to the particular combination of features described above, but also encompasses other arrangements formed by any combination of the above features or their equivalents without departing from the spirit of the present application. For example, the above features may be replaced with (but not limited to) features having similar functions disclosed in the present application.

Claims (4)

1. A privacy-based asset recovery method, wherein a blockchain database is configured with a expendable asset repository for crediting expendable assets and a expended asset repository for crediting expended assets, and wherein a blockchain system is configured with recovery contracts that output a locking recovery address and a receiving address for each transaction of a non-recovery transaction, the method comprising: a transaction initiator generates a recovery transaction which uses a first expendable asset and outputs a second expendable asset, wherein the recovery transaction comprises a sender public key and a receiver public key of the first expendable asset, a recovery identifier, an asset ID of the first expendable asset and a recovery address, the recovery identifier is used for marking the recovery transaction, the asset ID of the first expendable asset is obtained by carrying out hash operation on the sender public key, the receiver public key, a random value and a transaction validation height which correspond to the first expendable asset, and the recovery address is used for receiving the second expendable asset;
the method comprises the steps that a transaction initiator takes a recovery identification and a transaction validation height as a proving circuit public input based on a preset zero knowledge proving circuit, a private key signature, a receiving address, a first private key signature and a random value corresponding to a sender public key are taken as private inputs to verify recovery transaction, the first private key signature is a private key signature corresponding to a recovery address provided by the transaction initiator, after verification is passed, whether the first private key signature corresponds to the recovery address is verified based on the zero knowledge proving circuit, and if the first private key signature corresponds to the recovery address, the recovery transaction is executed.
2. The privacy-based asset recovery method of claim 1, wherein the step of verifying the recovery transaction based on the knowledge of change circuit comprises:
the method comprises the steps that a recovery contract confirms whether a transaction is a recovery transaction or not based on a public input verification recovery identification of a change knowledge circuit, after the transaction is confirmed to be the recovery transaction, a transaction effective height is verified, the transaction effective height is compared with the current block height, if the difference between the transaction effective height and the current block height is smaller than a set minimum height difference N or larger than a set maximum height difference N, height verification is passed, existence certification of a first expendable asset is verified, and if the first expendable asset is an asset in an expendable asset library, transaction verification is passed.
3. A computer device, characterized by one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method recited in claim 1 or 2.
4. A storage medium storing a computer program, characterized in that the program, when executed by a processor, implements the method according to claim 1 or 2.
CN202110881850.7A 2021-08-02 2021-08-02 Asset recovery method, device and storage medium based on privacy Active CN113592493B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110881850.7A CN113592493B (en) 2021-08-02 2021-08-02 Asset recovery method, device and storage medium based on privacy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110881850.7A CN113592493B (en) 2021-08-02 2021-08-02 Asset recovery method, device and storage medium based on privacy

Publications (2)

Publication Number Publication Date
CN113592493A true CN113592493A (en) 2021-11-02
CN113592493B CN113592493B (en) 2023-11-24

Family

ID=78253860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110881850.7A Active CN113592493B (en) 2021-08-02 2021-08-02 Asset recovery method, device and storage medium based on privacy

Country Status (1)

Country Link
CN (1) CN113592493B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109905276A (en) * 2019-01-31 2019-06-18 山东省电子信息产品检验院 A kind of cloud service quality monitoring method and system
US10951410B1 (en) * 2020-07-03 2021-03-16 Onther, Inc. System for implementing a virtual machine based on a zero-knowledge proof circuit for general operation verification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109905276A (en) * 2019-01-31 2019-06-18 山东省电子信息产品检验院 A kind of cloud service quality monitoring method and system
US10951410B1 (en) * 2020-07-03 2021-03-16 Onther, Inc. System for implementing a virtual machine based on a zero-knowledge proof circuit for general operation verification

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
冯浩铭;陈杭;刘彦平;: "一种金融级安全的区块链资产交易系统", 信息通信技术与政策, no. 01 *

Also Published As

Publication number Publication date
CN113592493B (en) 2023-11-24

Similar Documents

Publication Publication Date Title
CN112288097B (en) Federal learning data processing method, federal learning data processing device, computer equipment and storage medium
US11392940B2 (en) Multi-approval system using M of N keys to perform an action at a customer device
EP3812992A1 (en) Block chain transaction method and apparatus
CN113438219B (en) Playback transaction identification method and device based on blockchain all-in-one machine
CN111932233B (en) Resource transfer method, device and equipment
US20200098042A1 (en) Trading Apparatus, And Trading Method
WO2020225814A1 (en) Transferring digital assets possession over a unidirectional connection
CN111401895A (en) Decentralized chain-crossing transfer-in and transfer-out method and system
CN115033923A (en) Method, device, equipment and storage medium for protecting transaction privacy data
WO2022105376A1 (en) Resource transfer method, server, switching device, system, and storage medium
CN112987942B (en) Method, device and system for inputting information by keyboard, electronic equipment and storage medium
CN112927073A (en) Cross-link data interchange method, system, device and electronic equipment
CN114362961B (en) Block chain-based account recovery method, device, equipment and storage medium
CN110648235A (en) Cross-chain asset transfer method based on trusted computing environment (TEE)
JP6532581B1 (en) Virtual currency management system, virtual currency management method and virtual currency management program
CN113592493B (en) Asset recovery method, device and storage medium based on privacy
CN115129518B (en) Backup and recovery method, device, equipment and medium for TEE (trusted execution environment) internal storage data
CN112950183B (en) Cross-chain data interchange method, system, device and electronic equipment
CN113609156B (en) Data query and write method and device, electronic equipment and readable storage medium
CN114841684A (en) Digital currency double-off-line transaction method based on security unit and trusted execution environment
CN107909370B (en) Multiple safety control method and system for electronic payment platform
CN113837735B (en) Transaction method and device for digital currency chip card
CN112968904B (en) Block chain data protection method and system
CN111127003B (en) Wallet account payment method, device and storage medium
EP3944181A1 (en) Method and apparatus for conducting fair lottery while reducing transaction cost by using blockchain network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant