CN113742761B - Digital identity casting method and device - Google Patents

Digital identity casting method and device Download PDF

Info

Publication number
CN113742761B
CN113742761B CN202111298653.9A CN202111298653A CN113742761B CN 113742761 B CN113742761 B CN 113742761B CN 202111298653 A CN202111298653 A CN 202111298653A CN 113742761 B CN113742761 B CN 113742761B
Authority
CN
China
Prior art keywords
block
certificate
public
node
special
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111298653.9A
Other languages
Chinese (zh)
Other versions
CN113742761A (en
Inventor
林剑
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Spacetime Cloud Technology Co ltd
Original Assignee
Shenzhen Spacetime Cloud Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Spacetime Cloud Technology Co ltd filed Critical Shenzhen Spacetime Cloud Technology Co ltd
Priority to CN202111298653.9A priority Critical patent/CN113742761B/en
Publication of CN113742761A publication Critical patent/CN113742761A/en
Application granted granted Critical
Publication of CN113742761B publication Critical patent/CN113742761B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The invention belongs to the technical field of block chain and virtual identity casting, and provides a digital identity casting method, which is characterized in that a block node access user is screened in advance by using a pass-certificate mechanism while the unique digital identity of a virtual world is cast, a corresponding circulation relation is established according to the respective certificate holding time of the block node and the user, the block node can be exchanged by a common pass-certificate by providing block packaging service to obtain the qualification of applying for casting the digital identity, and meanwhile, the user and the block node automatically and correspondingly circulate through the pass-certificate, so that extra payment processes are reduced, block chain processing resources are saved, and the block chain throughput and transaction efficiency are improved. In addition, the block nodes screened in advance by the evidence passing mechanism compete for the block outlet opportunity and randomly determine a preset number of block nodes to participate in authentication, so that energy waste under the POW mechanism can be reduced.

Description

Digital identity casting method and device
Technical Field
The invention relates to the technical field of block chain and virtual identity casting, in particular to a digital identity casting method and device.
Background
The use of blockchain technology to cast a digital identity (e.g., a digital person) to a user, which broadens the range of activities of users in real and virtual world, is a hot spot and difficulty in the blockchain industry.
The block chain is essentially a distributed account book, and the core characteristic of the distributed account book is the consistency of accounting behaviors, namely, all the nodes on the chain store the same account book together, and the content (i.e. transaction information) on the account book is kept consistent, so that the information confusion caused by respective accounting of different nodes is avoided.
In the prior art, in order to achieve consistency of contents stored in each node, various consensus mechanisms are generated, such as mechanisms of POW, POS, and DPOS, and by using these mechanisms, the general idea is to select a unique accounting block, and after all block link points verify and approve the accounting block through a verification rule, the block exit node and all other nodes store the accounting block together.
And due to the characteristic of block chain consistency, technical possibility is provided for the digital identity to perform various activities in the virtual space. At present, the digital identity is cast by using a block chain, more modes are that a user initiates a transaction demand, a node conducts digital identity storage through POW competition billing right, and then obtains an incentive from the user, and the mode can be summarized as a competition mode. Although the competitive mode can realize digital identity casting, the excitation mode is single, and the defects of energy consumption and the like of the POW mechanism are relatively obvious.
In conclusion, the digital identity casting in the existing competition mode has the technical problems of single incentive mode and energy waste.
Disclosure of Invention
In order to solve the technical problem, the invention provides a digital identity casting method, which comprises the following steps:
setting a digital certificate, wherein the digital certificate comprises a public certificate and a special certificate, the public certificate is opened to a user, and the special certificate is opened to a block node;
calculating first license holding time of the user for the public license and second license holding time of the block node for the special license holding, and associating the corresponding relation between the public license holding time and the special license holding time;
responding to the identity casting request, and randomly determining the block nodes with the preset number to authenticate the digital identity transaction packaged by the block nodes;
and triggering the public pass certificate of the user and the special pass certificate of the block node to flow to the block node according to the corresponding relation aiming at the transaction passing the authentication.
In an improvement, the digital identity casting method further comprises:
calculating the special certificate holding quantity of the block nodes;
and selecting the block nodes with the public evidence number in the first volume interval as candidate nodes to compete to become the block output nodes.
In an improvement, the digital identity casting method further comprises:
calculating a second license holding time of the dedicated license of the block node;
and selecting the block node with the second warranty time in the first time interval as a candidate node to compete to become the block output node.
In an improvement, the digital identity casting method further comprises:
carrying out weight configuration according to the second license holding time and the special certificate holding quantity;
selecting a block node with optimal weight as the block outlet node;
and adjusting the preset number of the randomly determined block nodes downwards to obtain a decrement authentication node for authenticating the digital identity transaction packaged by the optimal weight block node.
In an improvement, the digital identity casting method further comprises:
acquiring the activity reputation of a user in the virtual world;
judging the lifting condition of the activity credit;
and if the activity credit is reduced, reducing the circulation proportion of the public certificate and the special certificate when the user initiates the virtual transaction.
In an improvement, the digital identity casting method further comprises:
acquiring the activity reputation of a user in the virtual world;
judging the lifting condition of the activity credit;
and if the activity credit is increased, increasing the circulation proportion of the public certificate and the special certificate when the user initiates the virtual transaction.
In an improvement, the digital identity casting method further comprises:
acquiring equipment safety factors of block nodes with special certificates;
judging the lifting condition of the safety coefficient of the equipment;
and if the safety factor is reduced, increasing the difficulty coefficient of block node competition out of the block.
In an improvement, the digital identity casting method further comprises:
acquiring equipment safety factors of block nodes with special certificates;
judging the lifting condition of the safety coefficient of the equipment;
and if the safety factor is increased, reducing the difficulty coefficient of block node competition out of the block.
In a further refinement, the digital identity casting method further comprises:
dividing the holding time of the public certificate of pass into a freezing period and a circulating period;
the circulation is prohibited for the public permit in the freezing period, and the circulation is permitted for the public permit in the circulation period.
In a further improvement, the excitation interval is configured in the circulation period; and providing corresponding transaction incentives for the certified users in each incentive interval.
In a further refinement, the digital identity casting method further comprises:
dividing the holding time of the special general certificate into a freezing period and a circulation period;
the circulation is prohibited for the special general certificate in the freezing period, and the circulation is permitted for the special general certificate in the circulation period.
In a further improvement, the excitation interval is configured in the circulation period; and providing corresponding accreditation rewards for the nodes of the accredited block in each incentive interval.
In addition, the present invention also provides a digital identity casting apparatus, comprising:
the digital certificate passing setting module is used for setting digital certificate passing, the digital certificate passing comprises a public certificate passing and a special certificate passing, the public certificate passing is opened to a user, and the special certificate passing is opened to a block node;
the calculation association module is used for calculating first license holding time of the public license for the user and second license holding time of the block node for the special license, and associating the corresponding relation between the public license at the first license holding time and the special license at the second license holding time;
the casting authentication module is used for responding to the identity casting request and randomly determining the block nodes with the preset number to authenticate the digital identity transaction packaged by the block nodes;
and the certificate passing and circulating module is used for triggering the public certificate of the user and the special certificate of the block node to be circulated to the block node according to the proportion according to the corresponding relation aiming at the transaction passing the authentication.
In addition, the present invention also provides a computer storage medium storing a program module, which is executed in a processor and can implement the method of any one of the above.
Compared with the prior art, the invention has the beneficial effects that:
the invention provides a digital identity casting method, which comprises the steps of setting a digital pass card comprising a public pass card and a special pass card, wherein the public pass card is opened to a user, the special pass card is opened to a block node, calculating a first license holding time of the user to the public pass card and a second license holding time of the block node to the special pass card, associating the corresponding relation of the public pass card and the special pass card at the first license holding time, responding to an identity casting request, randomly determining the digital identity transaction of a preset number of block nodes for authentication and packaging, triggering the public pass card of the user and the special pass card of the block node to flow to the block node according to the proportion according to the corresponding relation aiming at the transaction passing the authentication, thereby meeting the requirement of casting the unique digital identity of a virtual world, and simultaneously screening out the block node for the user to be admitted by using a pass card mechanism in advance, the corresponding circulation relation is established according to the respective license holding time of the block nodes and the user, the block nodes can be exchanged for the common pass certificate by providing the block packaging service, the qualification of applying for casting the digital identity is obtained, meanwhile, the user and the block nodes automatically correspond to circulation through the pass certificate, the extra payment process is reduced, the block chain processing resources are saved, and the block chain throughput and the transaction efficiency are improved. In addition, the block nodes screened in advance by the evidence passing mechanism compete for the block outlet opportunity and randomly determine a preset number of block nodes to participate in authentication, so that energy waste under the POW mechanism can be reduced.
Drawings
FIG. 1 is a schematic flow diagram of a digital identity casting method;
FIG. 2 is a schematic view of a first improved flow of the digital identity casting method;
FIG. 3 is a schematic flow diagram of a second modification of the digital identity casting method;
FIG. 4 is a schematic flow diagram of a third modification of the digital identity casting method;
FIG. 5 is a schematic flow diagram of a fourth modification of the digital identity casting method;
FIG. 6 is a schematic flow diagram of a fifth modification of the digital identity casting method;
FIG. 7 is a schematic flow diagram of a sixth modification of the digital identity casting method;
FIG. 8 is a schematic diagram of an architecture of a digital identity casting apparatus;
FIG. 9 is an architectural diagram of a computer device.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein.
It should be understood that, in various embodiments of the present invention, the sequence numbers of the processes do not mean the execution sequence, and the execution sequence of the processes should be determined by the functions and the internal logic of the processes, and should not constitute any limitation on the implementation process of the embodiments of the present invention.
It should be understood that in the present application, "comprising" and "having" and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that, in the present invention, "a plurality" means two or more. "and/or" is merely an association describing an associated object, meaning that three relationships may exist, for example, and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "comprises A, B and C" and "comprises A, B, C" means that all three of A, B, C comprise, "comprises A, B or C" means that one of A, B, C comprises, "comprises A, B and/or C" means that any 1 or any 2 or 3 of A, B, C comprises.
It should be understood that in the present invention, "B corresponding to a", "a corresponds to B", or "B corresponds to a" means that B is associated with a, and B can be determined from a. Determining B from a does not mean determining B from a alone, but may be determined from a and/or other information. And the matching of A and B means that the similarity of A and B is greater than or equal to a preset threshold value.
As used herein, "if" may be interpreted as "at … …" or "when … …" or "in response to a determination" or "in response to a detection", depending on the context.
The technical solution of the present invention will be described in detail with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments.
Example one
Referring to fig. 1, the present embodiment provides a digital identity casting method.
It should be noted that the execution subject of the method shown in fig. 1 may be a software and/or hardware device. The execution subject of the present application may include, but is not limited to, at least one of: user equipment, network equipment, etc. The user equipment may include, but is not limited to, a computer, a smart phone, a Personal Digital Assistant (PDA), the above mentioned electronic equipment, and the like. The network device may include, but is not limited to, a single network server, a server group of multiple network servers, or a cloud of numerous computers or network servers based on cloud computing, wherein cloud computing is one type of distributed computing, a super virtual computer consisting of a cluster of loosely coupled computers. The present embodiment does not limit this.
In this embodiment, the digital identity casting method includes steps S101 to S104, which are specifically as follows:
s101, digital certificates are set, the digital certificates comprise public certificates and special certificates, the public certificates are opened to users, and the special certificates are opened to the block nodes.
In the virtual world, valuable data is generated for various activities involving a subject, and the generation subject of the data may be a natural person or a unit, and may be a mobile terminal, a PC, a robot, or the like.
Where the generation of valuable data needs to be attributed to a specific rights body, the rights body shares ownership and usage rights with the valuable data. Therefore, the rights body is equivalent to a digital person targeting the real world, and the unique digital identity directly determines the meaning of the virtual space activity, in other words, the digital identity in the virtual space is the premise and the basis of various production relations and distribution relations in the virtual society.
It should be noted that digital identity is different from account registration in traditional centralized internet technology.
On one hand, data management in the centralized internet technology is centralized storage and processing, user data is in an unauthorized and uncontrolled state, and digital identities in the virtual world correspond to the real world through a block chain technology, and attribution and use of data generated in the virtual world by the identities are controlled by digital persons.
On one hand, the data leakage risk in the centralized internet technology is extremely high, and the data security level of the data generated by the digital identity in the virtual world is high through the block chain technology.
It should be further noted that, because the digital identity is the basis and precondition for entering the virtual world, the number and intensity of requests for initiating identity casting to the blockchain are very large, and the data throughput and processing efficiency of the blockchain are limited, which inevitably faces a great deal of pressure when facing a large number of requests. In this embodiment, by setting a digital pass card, the digital pass card includes a public pass card and a special pass card, the public pass card is opened to a user, the special pass card is opened to a block node, binary division is performed on data, the block node providing block chain service and a user initiating a casting identity request are divided, the block node can provide the block chain service only if the public pass card is held by the block node, and the user can initiate the casting identity request only if the public pass card is held by the user, so that an illegal request such as a web crawler and a rogue algorithm can be prevented from attacking the block chain system, a node without block chain service capability can be shielded from being added to become a block node, the tentative property without real identity casting requirement or a request unwilling to pay price to bombard the block chain system is reduced, energy is saved, and the technical effect of improving the block chain processing quality is achieved.
S102, calculating first certification time of a user for public certification and second certification time of a block node for private certification, and associating the corresponding relation of the public certification at the first certification time and the private certification at the second certification time;
it should be noted that, in step S101, data binary division forms an opposite relationship between a user and a block node, and one of the opposite purposes is division of labor.
For example, users and the tile nodes with the same or close certified time may have certified flows at the same level.
For example, the corresponding circulation of the long-lasting pass can be performed with several short-lasting passes.
It should be further noted that both the first and second licensing time periods can be flexibly adjusted according to the number of users or the number of the block nodes, for example, the number of users exceeds a certain set value, and the first licensing time period is automatically adjusted correspondingly, so as to satisfy the stability and the currency of the license.
S103, responding to the identity casting request, and randomly determining the block nodes with the preset number to authenticate the digital identity transaction packaged by the block nodes.
It should be noted that in this step, the casting request of the virtual digital identity can only be initiated by the certified user. In other words, the interface to access the blockchain system can be assigned to the certified user through various interface setup techniques.
It should be further noted that the limitation on the access right in this step can effectively screen the high-quality user initiated block chain identity casting service, and avoid invalid attack and low-quality access, thereby saving block chain data processing resources.
It should be noted that in this step, the approval means the presumptive approval of the reputation, so that a preset number of block nodes can be randomly determined to authenticate the block-out packaged digital identity transaction of the block-out nodes, thereby avoiding the network resource occupation caused by the whole network authentication and accelerating the authentication efficiency.
And S104, triggering the public permit of the user and the special permit of the block node to flow to the block node according to the proportion according to the corresponding relation aiming at the transaction passing the authentication.
It should be noted that the block output node is a block node screened by the pass certificate, and the block output node can win from many block nodes through a workload certification or rights and interests certification mechanism to obtain the accounting right. Compared with the whole-network ore digging competition, the method can save a large amount of competition energy consumption and improve the block discharging speed.
It should be further noted that, after the authenticated account-keeping content in step S103 passes, the user automatically pays a reward to the block-out node in this step, and specifically, the public certificate of the user and the private certificate of the block node may be triggered to flow to the block-out node in proportion according to the corresponding relationship. For example, the public credentials of users at the same or similar time of authentication decrease and the private credentials of the egress node increase.
It should be further noted that the corresponding circulation of the public certificate and the special certificate in this step is convenient and fast, the block chain payment process is greatly promoted, the block chain processing resources are released, and the block chain data throughput capacity is improved. In addition, the corresponding circulation of the public certificate and the special certificate can also enable the block nodes to obtain the access qualification of applying for casting the virtual identity, and the universality of the block chain system is improved.
Example two
Referring to fig. 2, on the basis of the first embodiment, the following modified example is provided in the present embodiment.
In a refinement, the digital identity casting method further comprises the steps of:
s105, calculating the special certificate holding quantity of the block nodes;
s106, selecting the block nodes with the public evidence number in the first volume interval as candidate nodes to compete to become block nodes.
It should be noted that, the number of the persistent numbers reflects the stability of the block nodes, and can be used as an important technical index for evaluating the node reputation. In step S105, the block nodes with higher credit are further screened according to the number of the certified quantity to compete out the blocks, thereby further reducing the computing power loss and saving energy.
In addition, in step S106, the first volume interval may be set reasonably according to the total number of the block nodes, so as to achieve the purpose of keeping the sample volume sufficient and screening out the candidate nodes. For example, the candidate node in the first volume interval may be a node whose certified quantity occupies more than half of the total certified quantity.
It should be noted that, in the present modified example, incomplete competition rules are still maintained, and the consensus rules in the competition mode are still maintained while the energy waste defect caused by the whole-network mining is improved.
In a refinement, the digital identity casting method further comprises the steps of:
s107, calculating second license holding time of the special license of the block node;
s108, selecting the block node with the second warranty time in the first time interval as a candidate node to compete to become a block node.
It should be noted that the holding time reflects the stability of the block node, and can be used as an important technical index for evaluating the node reputation. In step S107, the block nodes with higher credit are further screened according to the length of the duration to compete out the blocks, thereby further reducing the computational power loss and saving energy.
In addition, in step S108, the first time interval may be set reasonably according to the stability and the circulation characteristics of the certificate of pass, so as to achieve the purpose of ensuring the reasonable operation of the certificate of pass and screening out the candidate nodes. For example, a candidate node in the first time interval may be within three months from the forensic allocation to the block node.
It should be noted that, in the present modified example, incomplete competition rules are still maintained, and the consensus rules in the competition mode are still maintained while the energy waste defect caused by the whole-network mining is improved.
In a modified embodiment, referring to fig. 3, the digital identity casting method further comprises the steps of:
s109, carrying out weight configuration according to the second license holding time and the special pass certificate holding quantity;
s110, selecting a block node with optimal weight as a block outlet node;
and S111, reducing the preset number of the randomly determined block nodes to obtain a decrement authentication node to authenticate the digital identity transaction packaged by the optimal weight block node.
It should be noted that the duration and the number of the persistent certificates reflect the stability of the node blocks, and can be used as a dual technical index for evaluating the reputation of the node. In steps S109 and S110, weight configuration is performed through the time and the number of the certificates, and the block node with the optimal weight is selected as the block node, for example, the node with the largest average value of the time and the number of the certificates in the current round of calculation is used as the block node with the optimal weight, and the block node is determined by a brand-new consensus to perform a package transaction without using a competition rule of mining, so that the calculation power loss is further reduced, and energy is saved.
It should be noted that, the duration and the number of the proofs are both variables in the blockchain system, and thus the weight determined based on the duration and the number of the proofs is also a variable, thereby ensuring the democratic co-treatment of the blockchain system.
In addition, in step S111, the preset number of randomly determined block nodes is adjusted downward, and the digital identity transaction packed with the optimal block node is authenticated by the authentication node with decreased amount, so that the number of authentication nodes is reduced, the loss of block chain resources is reduced, and the data throughput capacity of the block chain system is enhanced.
EXAMPLE III
Referring to fig. 4, on the basis of the above embodiment, the present embodiment provides some improved examples of improving the reputation mechanism existing in the above-described blockchain system.
In a refinement, the digital identity casting method further comprises the steps of:
s112, obtaining the activity credit of the user in the virtual world;
s113, judging the lifting condition of the activity credit;
s114, if the activity credit is reduced, when the user initiates virtual transaction, reducing the circulation proportion of the public certificate and the special certificate;
s115, if the activity credit is increased, when the user initiates the virtual transaction, the circulation proportion of the public certificate and the special certificate is increased.
It should be noted that the virtual space is not an illegal place, but an extension and expansion of the social relationship and the mental world of the real world, so that the activities in the virtual world with digital identities need to be regulated.
In addition, the reputation evaluation mechanism in the embodiment further strengthens the identity casting scheme under the above-mentioned passing-card mechanism, so that the network actors who acquire the virtual identity are restricted.
In step S114, the activity credit is decreased, and when the user initiates a virtual transaction, the circulation ratio of the public certificate to the private certificate is decreased, for example, the ratio of the public certificate to the private certificate is decreased, such as the limitation of circulation times, the limitation of circulation time, and the like. In step S115, the activity reputation is raised, and when the user initiates a virtual transaction, the flow ratio between the public certificate and the private certificate is increased. The network activity of the virtual identity is adjusted through the two steps, and the technical effect of automatically adjusting the virtual world is achieved.
In a modified example, referring to fig. 5, the digital identity casting method further comprises the steps of:
s116, acquiring the equipment safety factor of the block node with the special certificate;
s117, judging the lifting condition of the safety coefficient of the equipment;
and S118, if the safety factor is reduced, increasing the difficulty coefficient of block node competition out of the block.
And S119, if the safety coefficient is increased, reducing the difficulty coefficient of block node competition out of the block.
It should be noted that, the block nodes are important nodes for providing identity casting, and the safety and stability of the block nodes have an important influence on the safety and stability of the block chain system.
It should be further noted that, in this example, by hooking the device safety factor of the block node holding the special pass certificate with the difficulty factor of competing out the block, the advantage and the disadvantage are realized, the system risk caused by the device problem is reduced, the block node is guided to actively maintain the block chain system, and the safe identity casting service is provided.
Example four
Referring to fig. 6, on the basis of the above embodiment, the present embodiment provides some improved examples of improving the reputation mechanism existing in the above-described blockchain system.
In a refinement, the digital identity casting method further comprises the steps of:
s120, dividing the holding time of the public certificate of pass into a freezing period and a certificate of pass period;
and S121, forbidding circulation of the public certificates in the freezing period, and allowing circulation of the public certificates in the circulation period.
It should be noted that the setting of the freeze period and the circulation period can dynamically adjust the stabilization and circulation of the evidence so as to stimulate and guide the user's activities in the virtual space.
In a modified example, referring to fig. 6, the digital identity casting method further comprises the steps of:
s122, configuring an excitation interval in the circulation period; and providing corresponding transaction incentives for the certified users in each incentive interval.
It should be noted that the circulation period can be flexibly set, so that the risk and benefit of the evidence can be dispersedly managed, the stability and circulation of the evidence can be dynamically adjusted, and the activities of the user in the virtual space can be stimulated and guided.
In a modified example, referring to fig. 7, the digital identity casting method further comprises the steps of:
s123, dividing the holding time of the special general certificate into a freezing period and a circulation period;
and S124, forbidding circulation of the special general certificate in the freezing period and allowing circulation of the special general certificate in the circulation period.
It should be noted that the setting of the freezing period and the circulation period can dynamically adjust the stability and circulation of the general evidence, thereby enhancing the reliability and stability of the block nodes and providing long-term and high-quality casting service.
In a modified example, referring to fig. 7, the digital identity casting method further comprises the steps of:
s125, configuring an excitation interval in the circulation period; and providing corresponding accreditation rewards for the nodes of the accredited block in each incentive interval.
In a preferred embodiment, it is assumed that the manner of awarding is every other time
Figure DEST_PATH_IMAGE001
The award is issued once and for all,
Figure 668205DEST_PATH_IMAGE002
is a warranty (if there is a collateral value,
Figure DEST_PATH_IMAGE003
i.e., the mortgage value) nth period (duration of the warranty period)
Figure 41417DEST_PATH_IMAGE004
Then), the calculated formula is as follows:
Figure DEST_PATH_IMAGE005
c is the final rate of return,
Figure 656201DEST_PATH_IMAGE006
is the efficiency of the recovery of the profit,
Figure 408256DEST_PATH_IMAGE006
the larger, the total return:
Figure DEST_PATH_IMAGE007
the faster the limit value is approached
Figure 824194DEST_PATH_IMAGE008
It should be noted that the excitation interval is determined according to the duration of the license, such as the 1 st period, the 2 nd period, the 3 rd period, the nth period, etc. Wherein the content of the first and second substances,
Figure DEST_PATH_IMAGE009
is the award distribution time interval and n is the number of award distribution time intervals.
It should be further noted that the circulation period can be flexibly set, so that risks and benefits of accreditation are dispersedly managed, stability and circulation of accreditation are dynamically adjusted, reliability and stability of block nodes are enhanced, and long-term high-quality casting service is provided.
It should also be noted that the reward algorithm in the preferred embodiment flexibly uses the mortgage value to associate the reward return, thereby enhancing the reliability and stability of the block nodes and providing long-term quality casting service.
EXAMPLE five
Referring to fig. 8, according to a first embodiment, the present embodiment provides a digital identity casting apparatus, including:
the certificate passing setting module 101 is used for setting digital certificate passing, wherein the digital certificate passing comprises a public certificate passing and a special certificate passing, the public certificate passing is opened to a user, and the special certificate passing is opened to a block node;
the calculation association module 102 is configured to calculate a first certification time of the user for the public certification and a second certification time of the block node for the private certification, and associate a corresponding relationship between the public certification at the first certification time and the private certification at the second certification time;
the casting authentication module 103 is used for responding to the identity casting request and randomly determining the block nodes with the preset number to authenticate the digital identity transaction packaged by the block nodes;
and the certificate passing module 104 is used for triggering the public certificate of the user and the special certificate of the block node to pass to the block node according to the corresponding relation aiming at the transaction passing the authentication.
It should be noted that the apparatus provided in this embodiment is a result of modularization of the method in the first embodiment, and is implemented by a program module or a circuit module corresponding to the method in the first embodiment. The technical problems to be solved by the apparatus and the technical effects to be achieved correspond to the embodiments, and will not be described herein.
EXAMPLE six
Referring to fig. 9, the present embodiment provides a computer apparatus 40 including: a processor 41, a memory 42 and computer programs.
A memory 42 for storing a computer program, which may also be a flash memory (flash). The computer program is, for example, an application program, a functional module, or the like that realizes the above method.
A processor 41 for executing the computer program stored in the memory to implement the steps performed by the apparatus in the above method. Reference may be made specifically to the relevant description in the front-screen method embodiment.
Alternatively, the memory 42 may be separate or integrated with the processor 41.
When the memory 42 is a device separate from the processor 41, the apparatus may further include:
a bus 43 for connecting the memory 42 and the processor 41.
The present invention also provides a readable computer storage medium, in which a computer program is stored, which, when being executed by a processor, is adapted to implement the methods provided by the various embodiments described above.
The readable computer storage medium may be a computer storage medium or a communication medium. Communication media includes any medium that facilitates transfer of a computer program from one place to another. Computer storage media may be any available media that can be accessed by a general purpose or special purpose computer. For example, a readable computer storage medium is coupled to a processor such that the processor can read information from, and write information to, the readable computer storage medium. Of course, a readable computer storage medium may also be an integral part of the processor. The processor and the readable computer storage medium may reside in an Application Specific Integrated Circuits (ASIC). Additionally, the ASIC may reside in user equipment. Of course, the processor and the readable computer storage medium may also reside as discrete components in a communication device. The readable computer storage medium may be Read Only Memory (ROM), Random Access Memory (RAM), CD-ROMs, magnetic tapes, floppy disks, optical data storage devices, and the like.
The present invention also provides a program product comprising execution instructions stored in a readable computer storage medium. The at least one processor of the device may read the execution instructions from the readable computer storage medium, and the execution of the execution instructions by the at least one processor causes the device to implement the methods provided by the various embodiments described above.
In the above embodiments of the apparatus, it should be understood that the Processor may be a Central Processing Unit (CPU), other general purpose processors, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of a method disclosed in connection with the present invention may be embodied directly in a hardware processor, or in a combination of the hardware and software modules within the processor.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (10)

1. A digital identity casting method, comprising:
setting a digital certificate, wherein the digital certificate comprises a public certificate and a special certificate, the public certificate is opened to a user, and the special certificate is opened to a block node;
calculating first license holding time of the user for the public license and second license holding time of the block node for the special license holding, and associating the corresponding relation between the public license holding time and the special license holding time;
responding to the identity casting request, and randomly determining the block nodes with the preset number to authenticate the digital identity transaction packaged by the block nodes;
for the transaction passing the authentication, triggering the public pass certificate of the user and the special pass certificate of the block node to flow to the block node according to the proportion according to the corresponding relation;
the step of triggering the public permit of the user and the special permit of the block node to flow to the block node according to the corresponding relation comprises the step of automatically paying a reward to the block node by the user; the public certification of the users in the same certification time is reduced, and the special certification of the node is increased;
dividing the holding time of the public certificate of pass into a freezing period and a circulating period; the circulation is prohibited for the public permit in the freezing period, and the circulation is permitted for the public permit in the circulation period.
2. The method of claim 1, further comprising:
calculating the special certificate holding quantity of the block nodes;
and selecting the block nodes with the special evidence number in the first volume interval as candidate nodes to compete to become the block output nodes.
3. The method of claim 1, further comprising:
calculating a second license holding time of the dedicated license of the block node;
and selecting the block node with the second warranty time in the first time interval as a candidate node to compete to become the block output node.
4. The method of claim 1, further comprising:
carrying out weight configuration according to the second license holding time and the special certificate holding quantity;
selecting a block node with optimal weight as the block outlet node;
and adjusting the preset number of the randomly determined block nodes downwards to obtain a decrement authentication node for authenticating the digital identity transaction packaged by the optimal weight block node.
5. The method of claim 1, further comprising:
acquiring the activity reputation of a user in the virtual world;
judging the lifting condition of the activity credit;
and if the activity credit is reduced, reducing the circulation proportion of the public certificate and the special certificate when the user initiates the virtual transaction.
6. The method of claim 1, further comprising:
acquiring the activity reputation of a user in the virtual world;
judging the lifting condition of the activity credit;
and if the activity credit is increased, increasing the circulation proportion of the public certificate and the special certificate when the user initiates the virtual transaction.
7. The method of claim 1, further comprising:
acquiring equipment safety factors of block nodes with special certificates;
judging the lifting condition of the safety coefficient of the equipment;
and if the safety factor is reduced, increasing the difficulty coefficient of block node competition out of the block.
8. The method of claim 1, further comprising:
acquiring equipment safety factors of block nodes with special certificates;
judging the lifting condition of the safety coefficient of the equipment;
and if the safety factor is increased, reducing the difficulty coefficient of block node competition out of the block.
9. A digital identity casting apparatus, comprising:
the digital certificate passing setting module is used for setting digital certificate passing, the digital certificate passing comprises a public certificate passing and a special certificate passing, the public certificate passing is opened to a user, and the special certificate passing is opened to a block node;
the calculation association module is used for calculating first license holding time of the public license for the user and second license holding time of the block node for the special license, and associating the corresponding relation between the public license at the first license holding time and the special license at the second license holding time;
the casting authentication module is used for responding to the identity casting request and randomly determining the block nodes with the preset number to authenticate the digital identity transaction packaged by the block nodes;
the certificate passing and circulating module is used for triggering the public certificate of the user and the special certificate of the block node to be circulated to the block node according to the proportion according to the corresponding relation aiming at the transaction passing the authentication;
the step of triggering the public permit of the user and the special permit of the block node to flow to the block node according to the corresponding relation comprises the step of automatically paying a reward to the block node by the user; the public certification of the users in the same certification time is reduced, and the special certification of the node is increased;
dividing the holding time of the public certificate of pass into a freezing period and a circulating period; the circulation is prohibited for the public permit in the freezing period, and the circulation is permitted for the public permit in the circulation period.
10. A storage medium storing program modules, characterized in that the program modules are adapted to perform the method according to any of claims 1-8 when executed on a processor.
CN202111298653.9A 2021-11-04 2021-11-04 Digital identity casting method and device Active CN113742761B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111298653.9A CN113742761B (en) 2021-11-04 2021-11-04 Digital identity casting method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111298653.9A CN113742761B (en) 2021-11-04 2021-11-04 Digital identity casting method and device

Publications (2)

Publication Number Publication Date
CN113742761A CN113742761A (en) 2021-12-03
CN113742761B true CN113742761B (en) 2022-03-15

Family

ID=78727371

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111298653.9A Active CN113742761B (en) 2021-11-04 2021-11-04 Digital identity casting method and device

Country Status (1)

Country Link
CN (1) CN113742761B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115021939B (en) * 2022-06-30 2024-04-09 中国联合网络通信集团有限公司 Identity authentication method, device, equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008722A (en) * 2019-03-27 2019-07-12 互链云网(北京)科技有限公司 Logical card transfer of rewards processing method, device and storage medium based on block chain
CN111242619A (en) * 2020-01-09 2020-06-05 厦门顺势共识信息科技有限公司 Coalition chain consensus method introducing supervision mechanism, block chain network and storage medium
CN111935075A (en) * 2020-06-23 2020-11-13 浪潮云信息技术股份公司 Block chain-based digital identity signing and issuing method, equipment and medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11379832B2 (en) * 2018-12-07 2022-07-05 0Chain, LLC Systems and methods of blockchain for transaction rewards on token locking
CN110580618A (en) * 2018-06-11 2019-12-17 触信(厦门)智能科技有限公司 Commodity transaction method and system for block chain intelligent contracts
US20210304311A1 (en) * 2018-06-14 2021-09-30 Quantstamp, Inc Apparatus and method for assuring performance attributes of a digital asset
CN108900364B (en) * 2018-08-22 2021-11-26 泰康保险集团股份有限公司 Block chain network management method, block chain network management device, block chain network management medium and electronic equipment
PL3748901T3 (en) * 2018-11-27 2021-12-06 Advanced New Technologies Co., Ltd. System and method for information protection
CN111047441A (en) * 2019-11-16 2020-04-21 北京比特时刻图像科技有限公司 Block chain system for issuing multiple integral certificates

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008722A (en) * 2019-03-27 2019-07-12 互链云网(北京)科技有限公司 Logical card transfer of rewards processing method, device and storage medium based on block chain
CN111242619A (en) * 2020-01-09 2020-06-05 厦门顺势共识信息科技有限公司 Coalition chain consensus method introducing supervision mechanism, block chain network and storage medium
CN111935075A (en) * 2020-06-23 2020-11-13 浪潮云信息技术股份公司 Block chain-based digital identity signing and issuing method, equipment and medium

Also Published As

Publication number Publication date
CN113742761A (en) 2021-12-03

Similar Documents

Publication Publication Date Title
Lavi et al. Redesigning bitcoin’s fee market
Tan et al. A blockchain-empowered crowdsourcing system for 5G-enabled smart cities
US20190287100A1 (en) Method for managing token based on heterogeneous blockchain networks, and token management server using the same
Kwon et al. Impossibility of full decentralization in permissionless blockchains
Li et al. Credit-based payments for fast computing resource trading in edge-assisted Internet of Things
Schrepel Is Blockchain the death of antitrust law? The Blockchain antitrust paradox
CN110188137B (en) Integrity-based block chain consensus mechanism
CN114730422A (en) System and method for commerce in a distributed system with blockchain protocol and intelligent contracts
Eklund et al. Factors that impact blockchain scalability
Bugday et al. Creating consensus group using online learning based reputation in blockchain networks
Dahiya et al. Multi attribute auction based incentivized solution against DDoS attacks
KR20190110377A (en) Method for managing token based on heterogeneous blockchains, and token management server using the same
CN113742761B (en) Digital identity casting method and device
CN106330960B (en) Method for limiting transaction by adopting virtual coin and server system
Østbye Exploring The Role of Law in The Governance of Cryptocurrency Systems and Why Limited Liability DAOs might be a Bad Idea
Gans et al. A solomonic solution to ownership disputes: An application to blockchain front-running
CN111049653A (en) Drawing method for electing consensus node
Hu et al. Blockchain-enhanced fair and efficient energy trading in industrial internet of things
CN113784238A (en) Spectrum resource transaction method and system based on block chain network
Xie et al. An improved shapley value benefit distribution mechanism in cooperative game of cyber threat intelligence sharing
CN114925403B (en) Block chain mixed consensus data processing method and system
Masseport et al. Proof of usage: User-centric consensus for data provision and exchange
CN117422549A (en) UTXO-based slicing method used in supervised cryptocurrency scene
Ouaguid et al. Towards a new reward and punishment approach for blockchain-based system
KR20190113162A (en) Method for managing token based on heterogeneous blockchains, and token management server using the same

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant