CN113592493B - Asset recovery method, device and storage medium based on privacy - Google Patents

Asset recovery method, device and storage medium based on privacy Download PDF

Info

Publication number
CN113592493B
CN113592493B CN202110881850.7A CN202110881850A CN113592493B CN 113592493 B CN113592493 B CN 113592493B CN 202110881850 A CN202110881850 A CN 202110881850A CN 113592493 B CN113592493 B CN 113592493B
Authority
CN
China
Prior art keywords
asset
transaction
recovery
expendable
address
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110881850.7A
Other languages
Chinese (zh)
Other versions
CN113592493A (en
Inventor
马登极
王志文
吴思进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN202110881850.7A priority Critical patent/CN113592493B/en
Publication of CN113592493A publication Critical patent/CN113592493A/en
Application granted granted Critical
Publication of CN113592493B publication Critical patent/CN113592493B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/383Anonymous user system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Storage Device Security (AREA)

Abstract

The application belongs to the technical field of computers, and particularly relates to an asset recovery method, device and storage medium based on privacy. According to the method, the device and the storage medium for retrieving the asset based on privacy, provided by the application, the retrieving contract preset by the block chain is used for outputting the locked retrieving address and the receiving address for the transaction of the non-retrieving transaction, so that the sender of the asset is allowed to retrieve the asset under the condition of the retrieving contract setting condition. The block height and the recovery mark of the check are proved through setting up the knowledge, and the recovery of the asset by a sender can be controlled by combining contract judgment, so that the user can be allowed to use privacy transfer without confidence, the asset can be recovered in time if the other party fails to receive the information within a certain time, and the user can also recover the asset without consuming the information if the other party fails to consume the information within a certain time, such as a private key loss scene, so that the asset cannot be lost and is very safe.

Description

Asset recovery method, device and storage medium based on privacy
Technical Field
The application belongs to the technical field of computers, and particularly relates to an asset recovery method, device and storage medium based on privacy.
Background
The blockchain is a novel decentralization protocol, can safely store digital currency transactions or other data, information cannot be forged and tampered, and transaction confirmation on the blockchain is completed by all nodes on the blockchain. The blockchain can effectively manage data asset data, such as copyright data, contract data, game props and the like, due to mechanisms such as a consensus algorithm, an encryption algorithm and the like. An intelligent contract is a piece of automatically executable program deployed on a blockchain, and broadly includes programming languages, compilers, virtual machines, events, state machines, fault tolerance mechanisms, and the like. The intelligent contracts combined with the blockchain can effectively perform services such as right confirmation, transaction, right control and the like on the data assets.
In the currently mainstream blockchain project, there is a certain risk of losing the asset by sending the asset through the privacy contract, and because of privacy, it is difficult to find and retrieve in advance. Such as the recipient address being misplaced or the recipient private key being lost, the asset cannot be proposed, and thus the existing privacy-based asset transfer scheme cannot be retrieved after being transferred out, and may cause irrecoverable losses under some extreme conditions.
Disclosure of Invention
In order to solve the technical problems, the application provides a privacy-based asset recovery method, equipment and a storage medium, which can control the recovery of assets by a sender by setting the block height and recovery identification of a check of a zero knowledge proof through setting the privacy asset recovery scheme of the limited time of the zero knowledge proof and combining contract judgment.
In order to achieve the above purpose, the present application adopts the following technical scheme.
In a first aspect, there is provided a privacy-based asset retrieval method, a blockchain database having a spent asset library for holding spent assets, a blockchain system having a retrieval contract configured to output a lock retrieval address and a receive address for each transaction of a non-retrieval transaction, the method comprising: the method comprises the steps that a transaction initiator generates a recovery transaction using a first expendable asset and outputting a second expendable asset, wherein the recovery transaction comprises a sender public key and a receiver public key of the first expendable asset, a recovery identifier, an asset ID of the first expendable asset and the recovery address, the recovery identifier is used for marking the recovery transaction, the asset ID of the first expendable asset is obtained by carrying out hash operation on the sender public key, the receiver public key, a random value which is correspondingly set and the transaction effective height which correspond to the first expendable asset, and the recovery address is used for receiving the second expendable asset;
the transaction initiator takes a recovery identifier and a transaction effective height as public input of a proving circuit based on a preset change knowledge proving circuit, takes a private key signature corresponding to a sender public key, a receiving address, a first private key signature and the random value as private inputs to verify the recovery transaction, wherein the first private key signature is a private key signature corresponding to the recovery address provided by the transaction initiator, after verification, the first private key signature is verified to be corresponding to the recovery address based on the change knowledge proving circuit, and if so, the recovery transaction is executed.
Preferably, the specific step of verifying the recovery transaction based on the zero knowledge circuit comprises:
the recovery contract verifies whether the transaction is a recovery transaction based on the public input verification recovery identifier of the zero knowledge circuit, after the recovery transaction is verified, the transaction effective height is compared with the current block height, if the difference value of the transaction effective height and the current block height is smaller than the set minimum height difference N or larger than the set maximum height difference N, the height verification is passed, the existence evidence of the first expendable asset is verified, and if the first expendable asset is an asset in the expendable asset library, the transaction verification is passed.
In a second aspect, a computer device is provided that includes one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method as described in the first aspect above.
In a third aspect, there is provided a storage medium storing a computer program which, when executed by a processor, implements a method as described in the first aspect above.
The beneficial effects of the application are as follows:
the private asset recovery scheme of limited time proved by zero knowledge can allow a user to use private transfer with confidence, if the other party fails to receive the private transfer in a certain time, the other party can recover the asset in time, if the other party does not consume the private transfer after exceeding a great time, for example, the private key is lost, the user can recover the private transfer, and thus the asset cannot be lost and is very safe.
Drawings
Fig. 1 is a schematic structural diagram of a computer device according to embodiment 2 of the present application.
Detailed Description
The application is described in further detail below with reference to specific examples and figures of the specification. Those of ordinary skill in the art will be able to implement the application based on these descriptions. In addition, the embodiments of the present application referred to in the following description are typically only some, but not all, embodiments of the present application. Therefore, all other embodiments, which can be made by one of ordinary skill in the art without undue burden, are intended to be within the scope of the present application, based on the embodiments of the present application.
Example 1
The embodiment provides a method for retrieving assets based on privacy, wherein a spent asset library for storing spent assets and a spent asset library for storing spent assets are configured in a blockchain database, a blockchain system is configured with a retrieving contract, and the retrieving contract outputs a locking retrieving address and a receiving address for each transaction of non-retrieving transactions, and the method comprises the following steps: the method comprises the steps that a transaction initiator generates a recovery transaction using a first expendable asset and outputting a second expendable asset, wherein the recovery transaction comprises a sender public key and a receiver public key of the first expendable asset, a recovery identifier, an asset ID of the first expendable asset and the recovery address, the recovery identifier is used for marking the recovery transaction, the asset ID of the first expendable asset is obtained by carrying out hash operation on the sender public key, the receiver public key, a random value which is correspondingly set and the transaction effective height which correspond to the first expendable asset, and the recovery address is used for receiving the second expendable asset;
the transaction initiator takes a recovery identifier and a transaction effective height as public input of a proving circuit based on a preset change knowledge proving circuit, takes a private key signature corresponding to a sender public key, a receiving address, a first private key signature and the random value as private inputs to verify the recovery transaction, wherein the first private key signature is a private key signature corresponding to the recovery address provided by the transaction initiator, after verification, the first private key signature is verified to be corresponding to the recovery address based on the change knowledge proving circuit, and if so, the recovery transaction is executed.
In the above scheme, the purpose of taking the recovery identifier and the transaction effective height as the disclosure input is to verify whether the transaction is a recovery transaction based on the recovery identifier, and then verify whether the transaction meets the condition that the recovery transaction is satisfied based on the transaction effective height, and specific verification is further described; on the other hand, the user can set the recovery address of the first expendable asset based on the recovery contract and the zero knowledge proof, and the transaction initiator proves that the user owns the private key by using the private key signature corresponding to the recovery address, so that the recovery address and the private key signature corresponding to the public key of the sender need to be strictly corresponding, and the private key signature corresponding to the public key of the sender is used for verifying that the transaction initiator owns the private key of the sender of the first expendable asset so as to prove that the transaction initiator is the sender of the asset.
Further, the specific steps of verifying the recovery transaction based on the zero knowledge circuit include:
the recovery contract verifies whether the transaction is a recovery transaction based on the public input verification recovery identifier of the zero knowledge circuit, after the recovery transaction is verified, the transaction effective height is compared with the current block height, if the difference value of the transaction effective height and the current block height is smaller than the set minimum height difference N or larger than the set maximum height difference N, the height verification is passed, the existence evidence of the first expendable asset is verified, and if the first expendable asset is an asset in the expendable asset library, the transaction verification is passed.
The principle of the scheme provided by the embodiment is that the transaction output setting of each non-retrieving transaction is locked with the receiving address and the retrieving address through the preset retrieving contract of the blockchain, and the retrieving of the asset is performed under the condition of the setting condition of the retrieving contract, for example, two scenes exist in practical application, 1. The partner is waited for confirmation after transferring, and if the partner is not received within a certain time, such as 1 day, the sender can withdraw the transmitted asset. 2. The sender may also reclaim the asset if the party has not spent over a certain period of time, such as 1 year, the party's private key may be lost. Of course, the great premise that the asset is not spent is also met. The fact that the confirmation of the receiver is not received within a certain time or the fact that the receiver does not spend more than a certain time can be judged by comparing the effective height of the transaction with the current height, namely the effective block height of the transfer transaction is smaller than the set minimum height N or larger than the set maximum height N, and the setting of time is regarded as the setting of the block height difference. After the recovery transaction is initiated, the change knowledge proof circuit firstly judges whether the transaction is a recovery transaction based on the recovery identifier, for example, the recovery identifier is a variable of a certain specific position in transaction information, 0 represents non-recovery, 1 represents recovery, and when spending or recovering an asset (namely, when generating the non-recovery transaction or the recovery transaction based on the asset), the setting of the recovery identifier is to be disclosed, the proof circuit judges whether the transaction is the recovery transaction based on the recovery identifier, if the recovery identifier is set to 0, the proof circuit indicates that the recovery transaction is not to be performed, at this time, the private key of the asset should be the private key corresponding to the receiving address, and if the recovery identifier is set to 1, the proof circuit indicates that the private key of the asset should be the private key corresponding to the recovery address, and the asset locking mode or the fixed private key corresponds to the fixed address. And meanwhile, whether the private key signature provided by the transaction initiating sender corresponds to the public key of the sender which can spend the transaction or not is verified, and the corresponding private key signature can be used for transferring the asset into the address corresponding to the public key of the sender. According to the embodiment, the block height and the recovery mark of the check are proved through setting the zero knowledge, the recovery of the asset by the sender can be controlled by combining contract judgment, the user can be allowed to use private transfer, if the other party fails to receive the asset within a certain time, the asset can be recovered in time, if the other party does not consume the asset after a certain time is exceeded, for example, the user can also recover the asset without losing the private key, and the asset is very safe.
Example 2
A computer apparatus, the apparatus comprising: one or more processors; a memory for storing one or more programs that, when executed by the one or more processors, cause the one or more processors to perform the method described in embodiment 1.
A storage medium storing a computer program which, when executed by a processor, implements the method described in embodiment 1 above.
Fig. 1 is a schematic structural diagram of an apparatus according to this embodiment.
As shown in fig. 1, as another aspect, the present application also provides a computer apparatus 500 including one or more Central Processing Units (CPUs) 501, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage part 508 into a Random Access Memory (RAM) 503. In the RAM503, various programs and data required for the operation of the device 500 are also stored. The CPU501, ROM502, and RAM503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
The following components are connected to the I/O interface 505: an input section 506 including a keyboard, a mouse, and the like; an output portion 507 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker, and the like; a storage portion 508 including a hard disk and the like; and a communication section 509 including a network interface card such as a LAN card, a modem, or the like. The communication section 509 is also connected to the I/O interface 505 as needed via a network execution communication processing driver 510 such as the internet. A removable medium 511 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 510 as needed so that a computer program read therefrom is mounted into the storage section 508 as needed.
In particular, according to the disclosed embodiment of the application, the method described in the above embodiment 1 may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program tangibly embodied on a machine-readable medium, the computer program comprising program code for performing the method described in any of the embodiments above. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 509, and/or installed from the removable media 511.
As still another aspect, the present application also provides a computer-readable storage medium, which may be a computer-readable storage medium contained in the apparatus of the above-described embodiment; or may be a computer-readable storage medium, alone, that is not assembled into a device. The computer-readable storage medium stores one or more programs for use by one or more processors in performing the methods described herein.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units or modules involved in the embodiments of the present application may be implemented in software or in hardware. The described units or modules may also be provided in a processor, for example, each of the units may be a software program provided in a computer or a mobile smart device, or may be separately configured hardware devices. Wherein the names of the units or modules do not in some cases constitute a limitation of the units or modules themselves.
The above description is only illustrative of the preferred embodiments of the present application and of the principles of the technology employed. It will be appreciated by persons skilled in the art that the scope of the application referred to in the present application is not limited to the specific combinations of the technical features described above, but also covers other technical features formed by any combination of the technical features described above or their equivalents without departing from the spirit of the application. Such as the above-mentioned features and the technical features disclosed in the present application (but not limited to) having similar functions are replaced with each other.

Claims (4)

1. A privacy-based asset retrieval method, wherein a blockchain database is configured with a spent asset library for holding spent assets, and a blockchain system is configured with a retrieval contract that outputs a lock retrieval address and a receive address for each transaction of a non-retrieval transaction, the method comprising: the method comprises the steps that a transaction initiator generates a recovery transaction using a first expendable asset and outputting a second expendable asset, wherein the recovery transaction comprises a sender public key and a receiver public key of the first expendable asset, a recovery identifier, an asset ID of the first expendable asset and the recovery address, the recovery identifier is used for marking the recovery transaction, the asset ID of the first expendable asset is obtained by carrying out hash operation on the sender public key, the receiver public key, a random value which is correspondingly set and the transaction effective height which correspond to the first expendable asset, and the recovery address is used for receiving the second expendable asset;
the transaction initiator takes a recovery identifier and a transaction effective height as public input of a proving circuit based on a preset change knowledge proving circuit, takes a private key signature corresponding to a sender public key, a receiving address, a first private key signature and the random value as private inputs to verify the recovery transaction, wherein the first private key signature is a private key signature corresponding to the recovery address provided by the transaction initiator, after verification, the first private key signature is verified to be corresponding to the recovery address based on the change knowledge proving circuit, and if so, the recovery transaction is executed.
2. The privacy-based asset retrieval method of claim 1, wherein the step of verifying the retrieval transaction based on the change knowledge circuit comprises:
the recovery contract verifies whether the transaction is a recovery transaction based on the public input verification recovery identifier of the zero knowledge circuit, after the recovery transaction is verified, the transaction effective height is compared with the current block height, if the difference value of the transaction effective height and the current block height is smaller than the set minimum height difference N or larger than the set maximum height difference N, the height verification is passed, the existence evidence of the first expendable asset is verified, and if the first expendable asset is an asset in the expendable asset library, the transaction verification is passed.
3. A computer device, characterized by one or more processors;
a memory for storing one or more programs,
the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of claim 1 or 2.
4. A storage medium storing a computer program, which when executed by a processor implements the method of claim 1 or 2.
CN202110881850.7A 2021-08-02 2021-08-02 Asset recovery method, device and storage medium based on privacy Active CN113592493B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110881850.7A CN113592493B (en) 2021-08-02 2021-08-02 Asset recovery method, device and storage medium based on privacy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110881850.7A CN113592493B (en) 2021-08-02 2021-08-02 Asset recovery method, device and storage medium based on privacy

Publications (2)

Publication Number Publication Date
CN113592493A CN113592493A (en) 2021-11-02
CN113592493B true CN113592493B (en) 2023-11-24

Family

ID=78253860

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110881850.7A Active CN113592493B (en) 2021-08-02 2021-08-02 Asset recovery method, device and storage medium based on privacy

Country Status (1)

Country Link
CN (1) CN113592493B (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109905276A (en) * 2019-01-31 2019-06-18 山东省电子信息产品检验院 A kind of cloud service quality monitoring method and system
US10951410B1 (en) * 2020-07-03 2021-03-16 Onther, Inc. System for implementing a virtual machine based on a zero-knowledge proof circuit for general operation verification

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109905276A (en) * 2019-01-31 2019-06-18 山东省电子信息产品检验院 A kind of cloud service quality monitoring method and system
US10951410B1 (en) * 2020-07-03 2021-03-16 Onther, Inc. System for implementing a virtual machine based on a zero-knowledge proof circuit for general operation verification

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
一种金融级安全的区块链资产交易系统;冯浩铭;陈杭;刘彦平;;信息通信技术与政策(第01期);全文 *

Also Published As

Publication number Publication date
CN113592493A (en) 2021-11-02

Similar Documents

Publication Publication Date Title
CN112288097B (en) Federal learning data processing method, federal learning data processing device, computer equipment and storage medium
CN109087080B (en) Cross-chain transaction method, device and storage medium
US20210217007A1 (en) Distributed ledger for encrypted digital identity
CN112001731B (en) Block chain account balance deposit certificate and recovery method and device
US20160379013A1 (en) Cryptographic assurances of data integrity for data crossing trust boundaries
US9589153B2 (en) Securing integrity and consistency of a cloud storage service with efficient client operations
CN113438219B (en) Playback transaction identification method and device based on blockchain all-in-one machine
EP3258458B1 (en) Share recovery system, share recovery apparatus, share recovery method, and program
CN114255031A (en) System for executing cross block chain of transaction, cross chain transaction method and equipment
WO2020224235A1 (en) Cross-chain transaction method and apparatus, device, and storage medium
US11804961B1 (en) Secure video content transmission over a computer network
US20200098042A1 (en) Trading Apparatus, And Trading Method
CN110999254B (en) Securely performing cryptographic operations
CN112380067B (en) Metadata-based big data backup system and method in Hadoop environment
WO2020154049A1 (en) Cryptoasset custodial system using power down of hardware to protect cryptographic keys
WO2020142633A1 (en) Apparatus and methods for remote controlled cold storage of digital assets using near field communication tags
CN104506533A (en) RFID (radio frequency identification) label ownership transfer method based on PUF (physical unclonable function)
CN113592493B (en) Asset recovery method, device and storage medium based on privacy
CN112927073A (en) Cross-link data interchange method, system, device and electronic equipment
JP6532581B1 (en) Virtual currency management system, virtual currency management method and virtual currency management program
CN114362961B (en) Block chain-based account recovery method, device, equipment and storage medium
US20210182832A1 (en) Transferring ownership of physical objects and digital counterparts using a distributed ledger and digital tokens on physical objects
CN112950183B (en) Cross-chain data interchange method, system, device and electronic equipment
KR102375144B1 (en) Device, method, system and computer readable storage medium for managing private key using blockchain
WO2021023094A1 (en) Methods and devices for executing n-time hashed time lock contracts

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant