CN114612109B - Block chain-based digital collection generation method and system and electronic equipment - Google Patents

Block chain-based digital collection generation method and system and electronic equipment Download PDF

Info

Publication number
CN114612109B
CN114612109B CN202210500334.XA CN202210500334A CN114612109B CN 114612109 B CN114612109 B CN 114612109B CN 202210500334 A CN202210500334 A CN 202210500334A CN 114612109 B CN114612109 B CN 114612109B
Authority
CN
China
Prior art keywords
side chain
data
interactive
digital collection
attention
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210500334.XA
Other languages
Chinese (zh)
Other versions
CN114612109A (en
Inventor
蔡天琪
蔡恒进
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Longjin Science And Technology Inc
Wuhan University WHU
Original Assignee
Wuhan Longjin Science And Technology Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Longjin Science And Technology Inc filed Critical Wuhan Longjin Science And Technology Inc
Priority to CN202210500334.XA priority Critical patent/CN114612109B/en
Publication of CN114612109A publication Critical patent/CN114612109A/en
Application granted granted Critical
Publication of CN114612109B publication Critical patent/CN114612109B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Engineering & Computer Science (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a block chain-based digital collection generation method, a block chain-based digital collection generation system and electronic equipment. It is known from the idea of web3.0 and the characteristics of blockchains that once the data on blockchains are sealed, the data on the blockchains are ensured and protected and are not falsifiable, and each digital collection is based on the contribution degree of the side chains to the data in the past, so that each digital collection has uniqueness, the value of the digital collection is determined at the time of generation, third parties do not need to participate, and the tamper-proof property of the blockchains provides value confidence.

Description

Block chain-based digital collection generation method and system and electronic equipment
Technical Field
The present application relates to the field of block chain technologies, and in particular, to a method, a system, and an electronic device for generating a digital collection based on a block chain.
Background
The transaction mode needs to be centered on an official or third-party organization and is not beneficial to the market circulation of the Tibetan products.
Disclosure of Invention
In view of the above, the present application provides a method, a system, a storage medium and an electronic device for generating a digital collection based on a blockchain, which can determine the trust level of the collection when generating the collection.
In a first aspect, an embodiment of the present application provides a method for generating a digital collection based on a blockchain, where the method includes the following steps:
and when the first event is detected, the interaction data of the first side chain and the second side chain are sealed and stored to generate a digital collection.
In a second aspect, an embodiment of the present application further provides a digital collection generation system based on a blockchain, where the system includes:
and the digital collection generation module is used for sealing and storing the interaction data of the first side chain and the second side chain when a first event is detected to generate a digital collection.
In a third aspect, an embodiment of the present application further provides a computer device, which includes a memory and a processor, where the memory stores a computer program, and the processor implements the steps of the method in the foregoing method when executing the computer program.
In a fourth aspect, the present application further provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the steps of the above method.
According to the digital collection generation method, the system and the electronic equipment based on the block chain, when a first event occurs, interactive data between a first side chain and a second side chain before the first event occurs are sealed and stored to generate the digital collection, the idea of web3.0 and the characteristics of the block chain can be known, once the data on the block chain is sealed and stored, the data on the chain is ensured and protected, and cannot be tampered.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the embodiments or the prior art descriptions will be briefly described below, and it is obvious that the drawings in the following descriptions are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a schematic flowchart of a method for generating a digital collection based on a blockchain according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a digital collection generation system based on a blockchain according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In Web3.0, each user can form its own data link, and digital contents created by the user, whose ownership is definitely owned by the user, are controlled by the user, and the value created by the user is distributed according to the agreement the user signs with others. Under this architecture, the digital content is no longer simply data, but rather digital assets, because its rights are guaranteed at the asset level. This is similar to the market among digital economies, identifying, respecting, and protecting personal digital property rights, with value exchange based on contracts.
The block chain technology, also called as distributed ledger technology, is actually a decentralized computing protocol, and provides a separation between "infrastructure management right" and "user data control right" by stipulating how different benefit agents create and maintain a distributed computing infrastructure, so as to prevent a single platform from realizing control over user data, user assets and user identities through the computing infrastructure management right.
The block chain is also a transparent and credible right confirmation and tracing system, once one right is digitalized to be a pass-certificate on the block chain, the right can be reliably confirmed, and the whole process of circulation, transaction, conversion and deformation can be traced in the whole process. The blockchain is also a protocol creation and auto-execution platform. Smart contracts are a centralized embodiment of this capability. Through the intelligent contract, the right and value distribution protocol can be efficiently, accurately and credibly executed without a credible third party, and the whole process can be audited. Blockchains are therefore an essential infrastructure for Web 3.0. However, the blockchain is only a means for realizing the confirmation and protection of the rights and interests of the digital assets of the user.
On the blockchain, only the certificate can be confirmed and managed, general data still cannot enjoy equal treatment, and a user needs to verify and protect the digital rights of the user if the user wants to confirm and protect the digital rights of the user.
The vast majority of the notations on the Web3.0 are NFTs (Non-homogeneous Tokens) that originated from EIP-721 (etherium implantation pro 721) introduced at the end of 2017, which contains identifying information recorded in their smart contracts that gives each token its uniqueness, irreplaceability and indivisible nature. Since the digital collections are also unique, irreplaceable and inseparable, the digital collections represent NFTs without specific reference to this application.
Example 1
Based on the core idea of web3.0, the application provides a block chain-based digital collection generation method, and referring to fig. 1, the method comprises the following steps:
and S100, when a first event is detected, sealing the interaction data of the first side chain and the second side chain to generate a digital collection.
In the method for generating a digital collection based on a block chain in this embodiment, when a first event occurs, the interactive data between a first side chain and a second side chain before the first event occurs is sealed and stored, so as to generate the digital collection, and as can be known from the idea of web3.0 and the characteristics of the block chain, once the data on the block chain is sealed and stored, the data on the chain is ensured and protected and cannot be tampered.
The first event in this embodiment refers to an event that has a significant change, such as: sudden increase in demand for a certain product, sudden fire heat in a certain place of interest, sudden intense fire (such as an ice pier) at a certain IP focus, etc.
In one specific embodiment, the first event is that the number of attended persons of the attended person corresponding to the first side chain suddenly increases.
When the attention people of the attention receiver have a sharp increase phenomenon, the influence of the attention receiver is larger and larger than before, the value of the content related to the attention receiver is increased (similar to the increase of the content related to the attention receiver after the star is named), the value of the interactive data of the attention receiver is increased along with the increase of the value of the interactive data of the attention receiver in the embodiment, the interactive data between the attention receiver and the attention receiver is sealed and stored before the sharp increase phenomenon occurs by utilizing the characteristic, the interactive data is converted into a digital collection, and after the sharp increase phenomenon occurs, the data collection is increased in value, so that the benefit of substantial benefits is brought to the attention receiver of the attention receiver. Wherein, the concerned persons are stars, idols, trade names, a certain interest point and the like.
It should be noted that the number of the attendees is at least 1, and each attendee may form its own data side chain to record the interaction data between itself and the attendee. In one embodiment, when the interactive data of the first side chain and the second side chain are sealed, whether the concerned person has the own data side chain is judged, if yes, the interactive data of the first side chain and the second side chain are sealed, if not, the data side chain of the concerned person is created for the concerned person, and the interactive data is recorded on the data side chain.
For example: the concerned person is a 'idol', when the 'idol' is changed from 'small V' to 'large V', the influence of the 'idol' is gradually increased, most of the benefits given to the vermicelli by the 'idol' at present are oral encouragement, signature, coincidence and the like, and cannot bring benefits on substantial benefits of loyalty powder, and the method in the embodiment can bring benefits of substantial benefits to supporters before the 'idol' is named (usually most of the concerns about the 'idol' are loyalty powder before the 'idol' is named), and the values of digital collections converted by different supporters are different, so that the purpose of distributing digital collections with different values according to the loyalty powder contribution degrees (the higher the value obtained when the contribution degree is high) is realized.
In one embodiment, the method further comprises the step of detecting whether the number of people concerned by the person concerned is increased sharply. The method specifically comprises the following steps: A1. the number of the first attention people at the first time point is obtained, and the number of the second attention people at the second time point is obtained. A2. And calculating the attention quantity difference value obtained by subtracting the first attention number from the second attention number. A3. Judging whether the difference value of the concerned quantity is larger than a preset threshold value or not; if yes, determining that a surge phenomenon occurs, and sending data sealing prompt information to the attendee or the attendee; if not, determining that the surge phenomenon does not occur, and returning to the step of obtaining the first number of people concerned at the first time point and obtaining the second number of people concerned at the second time point. The second time point is a time point later than the first time point.
The method for detecting whether the number of people concerned by the person concerned has a sudden increase or not can be various, for example, whether the network data (such as interaction frequency, number of comments, website browsing volume, click volume and the like) in a certain period of time has a sudden increase or not is detected, so that whether the number of people concerned has a sudden increase or not is determined. In one of the easily-realized modes, the attention quantity difference value of attention people in a certain period of time is directly obtained, whether the attention quantity difference value meets a preset threshold value or not is judged, if yes, a surge phenomenon is determined to occur, prompt information for establishing interactive correlation is timely sent to the person to be attended or the person to be attended, and if not, the surge phenomenon is determined not to occur. The method does not need complex logic operation, does not need deep analysis on detection indexes (for example, when interaction frequency, comment quantity, click quantity and website browsing quantity are analyzed, whether the data is triggered by a single user or multiple users needs to be determined), is simple to implement and is accurate in judgment.
It should be noted that the first time point and the second time point in the present embodiment are not a single constant time point, but are time points that dynamically change with time. Such as: if the 0 point on the first day is used as a first time point, the 0 point on the second day is used as a second time point, and if the difference between the second attention number and the first attention number does not reach a preset threshold value, the 0 point on the second day is used as the first time point, and the 0 point on the third day is used as the second time point to continue detection until a surge phenomenon is detected, so that the surge phenomenon can be detected.
Since the number of people of interest is increased rapidly after a certain pop-up IP and the number of people of interest is increased rapidly in a short period of time (for example, the number of people of interest is increased greatly in a short period of time after a certain pop-up tv drama appears in a small V), the time interval between the second time point and the first time point is preferably 1 day, 1 week, 1 month, or 1 year.
Further, step a1 includes acquiring identification information of the person of interest at a first time point, taking the number of the identification information as a first number of persons of interest, acquiring identification information of the person of interest at a second time point, and taking the number of the identification information as the first number of persons of interest. The identification information represents the unique identity information of the attendees, so that the number of attendees can be uniquely determined according to the number of the identification information.
In one embodiment, the step of generating the digital collection comprises:
B1. and acquiring single interaction data of the attendees corresponding to each second side chain from the first side chain, and generating the digital collection according to the single interaction data.
In this embodiment, there are a plurality of second side chains, and in order to generate a digital collection corresponding to each second side chain and realize the value contribution of each second side chain, it is necessary to obtain single interaction data corresponding to each second side chain, and generate a digital collection of each second side chain from the single interaction data. Of course, the first side chain may also generate a digital collection of all the interaction data for an incremental value of its own value.
When the single interactive data corresponding to each second side chain is obtained, the identification information of each second side chain may be obtained first, and the identification information may uniquely represent the identity of the second side chain, and the corresponding single interactive data is obtained from the identification information.
Further, step B1 includes: B11. and extracting pattern information, attribute information and interaction information of the attention person from the single interaction data. B12. And generating a digital collection from the pattern information, the attribute information and the interaction information, and assigning the digital collection to a corresponding second side chain.
The pattern information comprises at least one of head portrait information and photo information of the attendee, the attribute information comprises at least one of identification information, age information, gender information and fan grade information of the attendee, and the interactive information comprises at least one of comment information, joining time information and interactive frequency information of the attendee.
The digital collection is generally formed by adding some attribute features to a picture, and the digital collection is formed by pattern information, attribute information and interactive information, wherein the pattern information is generally used as a substrate, and the attribute information and the interactive information are added to the pattern information to generate the digital collection. The ready-made digital collection is unique and irreplaceable because the pattern information, attribute information and interactive information are often not completely identical. In one embodiment, the attribute information must include identification information representing the unique identity of the interested party, and the digital collection generated therefrom is unique. Meanwhile, the value of the digital collection formed by different pieces of information can be defined in the intelligent contract is different, such as: the higher the activity of the comment information is, the more positive the comment is, the higher the interaction frequency is, and the higher the value of the vermicelli digital collection generated by the digital content with longer adding time is; another example is: the higher the rating the higher the value of the generated digital collection. Wherein, the grade information is determined by the morning and evening of the adding time and/or adding batch, such as: dividing the number of the attendees into a plurality of number intervals according to the accumulated number of the current attendees, wherein the levels in the different number intervals are different; another example is: and determining the adding time point as a measuring index of the grade, taking the attendee added before the first adding time point as a first grade, taking the attendee added after the first adding time point as a second grade, taking the attendee added after the second adding time point as a third grade, and determining the N grades by analogy.
In one embodiment, when the digital collection is generated, different pendants are allocated to the digital collection generated by the attendees in different grades according to the grade information so as to further ensure the uniqueness of the vermicelli digital collection. Such as: assigning golden crown to digital collections generated by first level concerns, silver crown to digital collections generated by second level concerns, and bronze crown to digital collections generated by third level concerns.
In one embodiment, step S100 includes step C1: and performing interactive confirmation on the first side chain and the second side chain to form a data sharing network for trading the digital collection.
In this embodiment, the first side chain and the second side chain perform mutual confirmation while sealing the interactive data, and once the mutual association confirmation is performed, a data sharing network for circulation transaction of the digital collection is formed between the first side chain and the second side chain.
In one embodiment, step C1 includes step C11: and after the first side chain sends an interaction request to the original side chain of the attention person, the original side chain for confirming the interaction request is used as a second side chain to carry out interaction confirmation with the first side chain, so that the data sharing network is formed.
In one embodiment, step C1 includes step C11': and after the original side chain sends an interactive request to the first side chain, the original side chain corresponding to the interactive request confirmed by the first side chain is used as the second side chain to carry out interactive confirmation with the first side chain, and the data sharing network is formed.
The steps C11 and C11' are two specific implementations of the step C1, one is that the first side chain actively sends an interaction request to each original side chain, and the original side chain that confirms the interaction request is used as a second side chain to perform interaction confirmation with the first side chain, so as to form a data sharing network, in the process, the first side chain and the second side chain must agree to form the data sharing network, that is, there may be some original side chains and disagree with the interaction confirmation with the first side chain, so as to ensure equal volunteers of rights of both sides; and the other method is that each original side chain actively sends an interactive request to the first side chain, and the original side chain corresponding to the interactive request confirmed by the first side chain is used as a second side chain to carry out interactive confirmation with the first side chain, so as to form the data sharing network.
It should be noted that, when the interactive confirmation is established between the first side chain and the second side chain, the first embodiment is preferred because when a first event occurs in the first side chain (for example, the number of people concerned by the first side chain changes dramatically), the platform sends a prompt message for establishing interactive confirmation to the first side chain in time to remind the first side chain whether to establish interactive confirmation with each original side chain, and the first side chain sends an interactive request to each original side chain, so as to reduce the distribution computation power of the platform. Of course, when the platform detects that the first event occurs, the platform may send a prompt message suggesting an interactive request to each original side chain to remind whether each original side chain establishes interactive confirmation with the first side chain, and this way requires the platform to record the relevant information of each original side chain, which not only consumes labor, but also consumes storage space.
In one embodiment, before step C11, the method further comprises the following steps of C10: and verifying the authenticity of the interactive data of the original side chain, and sending an interactive request to the original side chain corresponding to the interactive data verified as real by the first side chain.
In this embodiment, the first side chain does not send the interactive request to all the original side chains, but checks whether the interactive data on the original side chains is true or false before sending the interactive request, and sends the interactive request to the corresponding original side chains after checking that the interactive data is true, thereby effectively avoiding a speculative skipper of a non-true supporter.
In one embodiment, step C11 'includes C110': and after the original side chain sends an interaction request to the first side chain, verifying the authenticity of the interaction data of the original side chain, and confirming the interaction request sent by the original side chain corresponding to the interaction data verified as real by the first side chain.
In this embodiment, after the original side chain sends the interaction request to the first side chain, the first side chain does not confirm the interaction requests of all the original side chains, but verifies the authenticity of the interaction data of the original side chain first, and confirms the interaction request sent by the original side chain corresponding to the real interaction data after verifying the authenticity, so that the speculative skimming and skimming can be effectively avoided.
In one embodiment, the method further comprises step C2: the interactive data verification method specifically comprises the following steps:
C21. and obtaining the value verification information corresponding to each original attention person from the first side chain.
C22. Obtaining data to be verified from the original side chain of the original care giver.
C23. And verifying the authenticity of the data to be verified according to the value verification information, and taking the original side chain corresponding to the data to be verified which is verified to be real as the second side chain.
The embodiment is a specific implementation manner of interactive data verification, in the interactive process of a first side chain and a second side chain, information of interactive data is recorded on both the first side chain and the second side chain, if value verification information recorded on the first side chain is consistent with data to be verified recorded on an original side chain, it can be determined that the original side chain does not tamper or fill water into the interactive data, the original side chain can be used as the second side chain to interactively confirm with the first side chain, and if the value verification information recorded on the first side chain is inconsistent with the data to be verified recorded on the original side chain, it is indicated that the original side chain possibly tampers the interactive data, so that the original side chain is not used as the second side chain to interactively confirm with the first side chain, participation of opportunistic behavior can be effectively avoided, and the reliability and authority of the value of a digital Tibetan product are improved. It should be noted that the verification of the interaction data in the foregoing steps C10 and C110' can be implemented in this embodiment.
In one embodiment, after the first event is detected, the method further includes step D1: and sending an uplink request to a main chain, and sealing the main chain on the interactive data after the main chain receives and confirms the uplink request.
Or step D1': and receiving the uplink invitation sent by the main chain, and sealing the main chain on the interactive data after selecting to accept the uplink invitation.
The two embodiments described above are specific implementations of the main chain on the first side chain, and due to the limitation of computing and storage resources, the public platform does not uplink all data, but only uplink the data with large influence and value. Therefore, after a first event is detected, the influence and the value of the first side chain are often changed, at this time, either the main chain actively sends an uplink invitation to the first side chain, or the first side chain actively sends an uplink request to the main chain, and after the other side confirms in any mode, the two sides establish interactive confirmation, so that the sealing of the interactive data on the main chain is realized. The main chain is usually a data chain of a public platform, and the public platform comprises third party platforms such as a microblog platform, a blog platform, a tremble platform and a WeChat friend circle platform, so that the digital Tibetan can be traded in a data sharing network formed by the first side chain and the second side chain and can also be traded in a data disclosure network formed by the first side chain and the main chain, the marketization of the digital Tibetan is enlarged, and the circulation of the digital Tibetan is facilitated. Among them, transactions in the data disclosure network include fair, auction, open, and the like.
In one embodiment, the method further comprises step E1: and acquiring a transaction mechanism of the digital collection, and distributing transaction profits to the initial owner of the digital collection when the digital collection is transacted.
Because of the affirmation of the digital collection, namely the affirmation of the identity of the initial owner of the digital collection, the digital collection can not only be traded on the data sharing network and the data disclosure network, but also the initial owner can obtain the trading profit with the preset proportion from the trading in each trading, thereby ensuring the profit of the initial owner
For example: the transaction mechanism for appointing the digital collection in the intelligent contract is as follows: each time a digital collection is resold, the original owner (i.e., the original creator) of the digital collection can enjoy a 10% revenue from the resell price. Even if the selling price is 1000 yuan at the first resale, after several years, because of the influence and the improvement of the value degree of the first side chain, the resale price is increased to tens of thousands or millions, the initial owner of the digital collection can still obtain 10% of transaction profit from the sales price of tens of thousands or millions, thereby ensuring the profit margin of the initial owner.
Example 2
In addition, the embodiment of the application also provides a digital collection generation system based on the block chain. Referring to fig. 2, fig. 2 is a schematic structural diagram of a block chain-based digital collection generating system according to an embodiment of the present disclosure, where the control system specifically includes: and the digital collection generation module 100 is configured to, when a first event is detected, seal the interaction data of the first side chain and the second side chain to generate a digital collection.
In the digital collection generation system based on the block chain in the embodiment, when a first event occurs, the interactive data between the first side chain and the second side chain before the first event occurs is sealed and stored to generate the digital collection, and as can be known from the idea of web3.0 and the characteristics of the block chain, once the data on the block chain is sealed and stored, the data on the chain is ensured and protected and cannot be tampered.
In one specific embodiment, the first event is a phenomenon that the number of people concerned by the person concerned corresponding to the first side chain suddenly increases.
In one embodiment, the method further comprises the following steps: and the detection module is used for detecting whether the attention number of the attended person is increased sharply.
Wherein the detection module comprises: and the number obtaining submodule is used for obtaining the first number of the attention people at the first time point and obtaining the second number of the attention people at the second time point. And the calculation submodule is used for calculating the attention quantity difference value obtained by subtracting the first attention quantity from the second attention quantity. The judgment submodule is used for judging whether the difference value of the concerned quantity is larger than a preset threshold value or not; if yes, determining that a surge phenomenon occurs, and sending data sealing prompt information to the attendee or the attendee; if not, determining that the surge phenomenon does not occur, and returning to the step of obtaining the first number of people concerned at the first time point and obtaining the second number of people concerned at the second time point. The second time point is a time point later than the first time point.
In one embodiment, the number generation module 100 includes: and the digital collection generation submodule is used for acquiring single interactive data of the attendee corresponding to each second side chain from the first side chain and generating the digital collection according to the single interactive data.
In one embodiment, the data-storage generating sub-module includes an extracting unit, configured to extract the pattern information, the attribute information, and the interaction information of the attendee from the single interaction data. And the generating and distributing unit is used for generating a digital collection from the pattern information, the attribute information and the interaction information and distributing the data collection to the corresponding second side chain.
In one embodiment, the digital Tibetan generating module 100 further includes an interactive confirmation submodule, configured to interactively confirm the first side chain and the second side chain, and form a data sharing network for trading the digital Tibetan.
In one embodiment, the interactive confirmation sub-module includes a first interactive confirmation unit and a second interactive confirmation unit. The first interactive confirmation unit is configured to, after the first side chain sends the interactive request to the original side chain of the attendee, perform interactive confirmation with the first side chain by using the original side chain for confirming the interactive request as a second side chain, and form the data sharing network. And the second interactive confirmation unit is used for performing interactive confirmation with the first side chain by taking the original side chain corresponding to the interactive request confirmed by the first side chain as the second side chain after the original side chain sends the interactive request to the first side chain, so as to form the data sharing network.
In one specific implementation, the system further includes a first data verification unit, configured to verify authenticity of the interaction data of the original side chain before the first side chain sends the interaction request to the original side chain, where the first side chain sends the interaction request to the original side chain corresponding to the interaction data verified as authentic.
In one embodiment, the system further includes a second data verification unit, configured to verify authenticity of the interaction data of the original side chain after the original side chain sends the interaction request to the first side chain, and the first side chain confirms the interaction request sent by the original side chain corresponding to the interaction data verified as authentic.
In one embodiment, the system includes a data verification module for verifying the interaction data. The data verification module includes: and the verification information acquisition submodule is used for acquiring the value verification information corresponding to each original attention person from the first side chain. And the data to be verified acquisition submodule is used for acquiring data to be verified from the original side chain of the original concerned person. And the authenticity verification sub-module is used for verifying the authenticity of the data to be verified according to the value verification information and taking the original side chain corresponding to the data to be verified which is verified to be real as the second side chain.
In one embodiment, the mobile terminal further comprises a first uplink module and a second uplink module. The first uplink module is configured to send an uplink request to a main chain, and seal the main chain on the interactive data after the main chain receives and confirms the uplink request. And the second uplink module is used for receiving the uplink invitation sent by the main chain and sealing the main chain on the interactive data after the uplink invitation is selected to be accepted.
In one embodiment, the system further comprises a profit sharing module for acquiring a trading mechanism of the digital collections, and sharing trading profits to initial owners of the digital collections when the digital collections are traded.
Example 3
The present embodiment provides a computer-readable storage medium, which stores a computer program, and when the computer program is executed by a processor, the computer program performs each process of the embodiment of the block chain-based digital collection generation method described in embodiment 1, and can achieve the same technical effect. For specific implementation, reference may be made to method embodiment 1, which is not described herein again.
Example 4
In addition, referring to the schematic structural diagram of an electronic device shown in fig. 3, the present embodiment further provides an electronic device, where the electronic device includes a bus 51, a processor 52, a transceiver 53, a bus interface 54, a memory 55, and a user interface 56. The electronic device comprises a memory 55.
In this embodiment, the electronic device further includes: one or more programs stored on the memory 55 and executable on the processor 52 are configured to be executed by the processor for performing the following steps, and to achieve the same technical effect:
and when the first event is detected, the interaction data of the first side chain and the second side chain are sealed and stored to generate a digital collection.
A transceiver 53 for receiving and transmitting data under the control of the processor 52.
Where a bus architecture (represented by bus 51) is used, bus 51 may include any number of interconnected buses and bridges, and bus 51 links together various circuits including one or more processors, represented by processor 52, and memory, represented by memory 55. The bus 51 may also link various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further in this embodiment. A bus interface 54 provides an interface between the bus 51 and the transceiver 53. The transceiver 53 may be one element or a plurality of elements, such as a plurality of receivers and transmitters, providing a means for communicating with various other apparatus over a transmission medium. For example: the transceiver 53 receives external data from other devices. The transceiver 53 is used for transmitting data processed by the processor 52 to other devices. Depending on the nature of the computing system, a user interface 56, such as a keypad, display, speaker, microphone, joystick, may also be provided.
The processor 52 is responsible for managing the bus 51 and the usual processing, running a general-purpose operating system as described above. And memory 55 may be used to store data used by processor 52 in performing operations.
Alternatively, the processor 52 may be, but is not limited to: a central processing unit, a singlechip, a microprocessor or a programmable logic device.
It will be appreciated that the memory 55 in embodiments of the invention may be either volatile memory or nonvolatile memory, or may include both volatile and nonvolatile memory. The non-volatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable PROM (EEPROM), or a flash Memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static random access memory (Static RAM, SRAM), Dynamic Random Access Memory (DRAM), Synchronous Dynamic random access memory (Synchronous DRAM, SDRAM), Double Data Rate Synchronous Dynamic random access memory (ddr Data Rate SDRAM, ddr SDRAM), Enhanced Synchronous SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The memory 55 of the systems and methods described in this embodiment is intended to comprise, without being limited to, these and any other suitable types of memory.
In some embodiments, memory 55 stores the following elements, executable modules or data structures, or a subset thereof, or an expanded set thereof: an operating system 551 and application programs 552.
The operating system 551 includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, for implementing various basic services and processing hardware-based tasks. The application 552 includes various applications, such as a Media Player (Media Player), a Browser (Browser), and the like, for implementing various application services. A program implementing the method of an embodiment of the present invention may be included in the application 552.
It should be noted that, in the present specification, the embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments may be referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (12)

1. A block chain-based digital collection generation method is characterized by comprising the following steps:
when a first event is detected, the interactive data of the first side chain and the second side chain are sealed and stored to generate a digital collection; the first event is that the attention number of the attended person corresponding to the first side chain is increased sharply; the interactive data is interactive data between the attention person and the attention person; the digital collection is composed of pattern information, attribute information and interactive information;
detecting whether the attention number of the attended person is increased sharply, specifically:
acquiring a first number of people paying attention at a first time point and a second number of people paying attention at a second time point;
calculating a focus number difference value obtained by subtracting the first focus number from the second focus number;
judging whether the difference value of the concerned quantity is larger than a preset threshold value or not; if yes, determining that a sharp increase phenomenon occurs; wherein the second time point is a time point later than the first time point;
the step of sealing the interaction data of the first side chain and the second side chain comprises the following steps:
performing interactive confirmation on the first side chain and the second side chain to form a data sharing network for the digital collection to perform transaction;
the step of performing interactive confirmation on the first side chain and the second side chain to form a data sharing network for trading the digital collection includes:
after the first side chain sends an interaction request to an original side chain of a concern person, the original side chain which confirms the interaction request is used as a second side chain to carry out interaction confirmation with the first side chain, and the data sharing network is formed;
or alternatively
And after the original side chain sends an interaction request to the first side chain, taking the original side chain corresponding to the interaction request confirmed by the first side chain as the second side chain to carry out interaction confirmation with the first side chain, so as to form the data sharing network.
2. The method of claim 1, wherein the step of detecting whether the number of people attended by the attendee has a surge further comprises:
if the concerned quantity difference is judged to be larger than a preset threshold value, sending data sealing prompt information to the concerned person or the concerned person; and if the attention number difference is judged to be not larger than the preset threshold value, determining that the surge phenomenon does not occur, and returning to the step of obtaining the first attention number at the first time point and obtaining the second attention number at the second time point.
3. The method of claim 1, wherein the step of generating a digital collection comprises:
and acquiring single interaction data of the attendees corresponding to each second side chain from the first side chain, and generating the digital collection according to the single interaction data.
4. The method of claim 3, wherein the step of obtaining single interaction data of the attendee corresponding to each of the second side chains from the first side chain and generating the digital collection according to the single interaction data comprises:
extracting pattern information, attribute information and interaction information of the attention person from the single interaction data;
and generating a digital collection from the pattern information, the attribute information and the interaction information, and assigning the data collection to the corresponding second side chain.
5. The method of claim 1, prior to the first sidechain sending an interactive request to the original sidechain, further comprising:
and verifying the authenticity of the interactive data of the original side chain, and sending an interactive request to the original side chain corresponding to the interactive data verified as real by the first side chain.
6. The method of claim 1, wherein after the original side chain sends the interaction request to the first side chain, further comprising:
and verifying the authenticity of the interactive data of the original side chain, and confirming the interactive request sent by the original side chain corresponding to the interactive data verified as real by the first side chain.
7. The method of claim 1, further comprising the step of interactive data verification, specifically:
obtaining value verification information corresponding to each original person of interest from the first side chain;
obtaining data to be verified from the original side chain of the original concerned person;
and verifying the authenticity of the data to be verified according to the value verification information, and taking the original side chain corresponding to the data to be verified which is verified to be real as the second side chain.
8. The method of any of claims 1-7, after detecting the first event, comprising:
sending an uplink request to a main chain, and sealing the main chain on the interactive data after the main chain receives and confirms the uplink request;
or
And receiving the uplink invitation sent by the main chain, and after the uplink invitation is selected to be accepted, sealing the main chain on the interactive data.
9. The method of any one of claims 1-7, further comprising:
and acquiring a transaction mechanism of the digital collection, and distributing transaction profits to an initial owner of the digital collection when the digital collection is transacted.
10. A blockchain-based digital collection generation system, the system comprising:
the digital collection generation module is used for sealing and storing the interactive data of the first side chain and the second side chain when a first event is detected to generate a digital collection; the first event is that the attention number of the attended person corresponding to the first side chain is increased sharply; the interactive data is interactive data between the attention person and the attention person; the digital collection consists of pattern information, attribute information and interactive information;
the detection module is used for detecting whether the attention number of the attended person is increased sharply;
the detection module comprises a number acquisition submodule, a calculation submodule and a judgment submodule:
the number obtaining submodule is used for obtaining a first number of people concerned with at a first time point and obtaining a second number of people concerned with at a second time point; the calculation submodule is used for calculating the attention quantity difference value obtained by subtracting the first attention quantity from the second attention quantity; the judgment submodule is used for judging whether the attention quantity difference value is larger than a preset threshold value or not; if yes, determining that a sharp increase phenomenon occurs; wherein the second time point is a time point later than the first time point;
the interactive confirmation submodule is used for interactively confirming the first side chain and the second side chain to form a data sharing network for trading the digital collection;
the interactive confirmation submodule comprises a first interactive confirmation unit and a second interactive confirmation unit;
the first interactive confirmation unit is configured to, after the first side chain sends an interactive request to an original side chain of a user of interest, perform interactive confirmation with the first side chain by using the original side chain for confirming the interactive request as a second side chain, and form the data sharing network;
and the second interactive confirmation unit is used for performing interactive confirmation with the first side chain by taking the original side chain corresponding to the interactive request confirmed by the first side chain as the second side chain after the original side chain sends the interactive request to the first side chain, so as to form the data sharing network.
11. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, is adapted to carry out the steps of the method of any one of the preceding claims 1 to 9.
12. An electronic device, comprising: memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the computer program is configured to perform the steps of the method of any of claims 1-9 by the processor.
CN202210500334.XA 2022-05-10 2022-05-10 Block chain-based digital collection generation method and system and electronic equipment Active CN114612109B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210500334.XA CN114612109B (en) 2022-05-10 2022-05-10 Block chain-based digital collection generation method and system and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210500334.XA CN114612109B (en) 2022-05-10 2022-05-10 Block chain-based digital collection generation method and system and electronic equipment

Publications (2)

Publication Number Publication Date
CN114612109A CN114612109A (en) 2022-06-10
CN114612109B true CN114612109B (en) 2022-08-19

Family

ID=81868764

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210500334.XA Active CN114612109B (en) 2022-05-10 2022-05-10 Block chain-based digital collection generation method and system and electronic equipment

Country Status (1)

Country Link
CN (1) CN114612109B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115099810A (en) * 2022-06-14 2022-09-23 蚂蚁区块链科技(上海)有限公司 Brand promotion method based on block chain and block chain link point
CN115296821B (en) * 2022-08-26 2023-02-07 中航信移动科技有限公司 Data processing system for digital collection management

Family Cites Families (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106980692B (en) * 2016-05-30 2020-12-08 国家计算机网络与信息安全管理中心 Influence calculation method based on microblog specific events
US11250111B2 (en) * 2017-02-13 2022-02-15 Tunego, Inc. Tokenized media content management
CN107292390A (en) * 2017-05-24 2017-10-24 重庆邮电大学 A kind of Information Propagation Model and its transmission method based on chaology
JP2022550924A (en) * 2018-11-02 2022-12-06 ヴェローナ ホールディングス エスイーズィーシー tokenization platform
CN110990486A (en) * 2019-11-29 2020-04-10 北京有名知行科技有限公司 Block link evidence issuing and storing method and device based on network data interaction
US20210304196A1 (en) * 2020-03-25 2021-09-30 SneakrCred Inc. System and method for digital fashion asset management through blockchain
US20220076221A1 (en) * 2020-09-09 2022-03-10 Fanticipate, Inc. Event participation and memorabilia
CN114154076A (en) * 2020-11-16 2022-03-08 中国人民解放军战略支援部队信息工程大学 Social user influence measuring method based on multi-angle analysis
CN113407640B (en) * 2021-07-21 2024-03-12 杭州链网科技有限公司 Cross-chain method and system based on multi-chain NFT (network File transfer)
CN114155095B (en) * 2021-09-24 2022-11-15 北京天德科技有限公司 Digital artwork authentication and transaction system and authentication and transaction method
CN114331634A (en) * 2021-12-31 2022-04-12 北京绵白糖智能科技有限公司 Method and device for transferring gifts of digital articles, computer equipment and storage medium
CN114398553A (en) * 2022-01-14 2022-04-26 北京京东方技术开发有限公司 Object recommendation method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN114612109A (en) 2022-06-10

Similar Documents

Publication Publication Date Title
CN114612109B (en) Block chain-based digital collection generation method and system and electronic equipment
MacFeely The big (data) bang: Opportunities and challenges for compiling SDG indicators
CN107085807B (en) Data asset transaction method based on block chain
El-Kenawy et al. A bidder strategy system for online auctions trust measurement
Chang et al. Trust and reputation relationships in service-oriented environments
Balp et al. Preserving capital markets efficiency in the high-frequency trading era
CN116743768B (en) Method, apparatus, device and computer readable storage medium for trading computing power resources
Gandy The political economy of personal information
US11847698B2 (en) Token-based entity risk management exchange
US20100325057A1 (en) Leveraging social capital on a website
Ferreira et al. A conceptual model of operational risk events in the banking sector
Rensleigh Customer perceptions on Internet banking information protection
Khalil et al. Optimal task design: To integrate or separate planning and implementation?
CN109829593B (en) Credit determining method and device for target object, storage medium and electronic device
Whittaker et al. “I have only checked after the event”: Consumer approaches to safe online shopping
Stefanou Finfluencers in the Wild: A Call for Regulation Addressing the Growth of Online Investment Advice
US9495659B2 (en) Apparatus, method, and a computer program for a form identification number
KR100780533B1 (en) On-line agency brokerage method of digital contents based on photo and moving picture
Mundra et al. Online Hybrid model for online fraud prevention and detection
US20210049677A1 (en) System and method for electronic rental platform
Agrawal et al. Decentralised ecosystem for journalism based on blockchain
Jøsang Prospectives for online trust management
Van Buggenhout et al. Personal data and personalisation in media: experts’ perceptions of value, benefits, and risks
CN112651743A (en) Transaction risk prompting method and device based on block chain and related equipment
Corrradi The Double Embeddedness of Bitcoin: Insights from Old and New Economic Sociology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20231212

Address after: 430014 Building 2, Guannan Industrial Park, Donghu New Technology Development Zone, Wuhan City, Hubei Province

Patentee after: WUHAN LONGJIN SCIENCE AND TECHNOLOGY Inc.

Patentee after: WUHAN University

Address before: 430070 Building 2, Guannan Industrial Park, East Lake New Technology Development Zone, Wuhan City, Hubei Province (Station No.: txzc a0089) (Wuhan area of the free trade zone)

Patentee before: WUHAN LONGJIN SCIENCE AND TECHNOLOGY Inc.