CN114900334A - NFT authority control method, system, computer readable storage medium and terminal device - Google Patents

NFT authority control method, system, computer readable storage medium and terminal device Download PDF

Info

Publication number
CN114900334A
CN114900334A CN202210395550.2A CN202210395550A CN114900334A CN 114900334 A CN114900334 A CN 114900334A CN 202210395550 A CN202210395550 A CN 202210395550A CN 114900334 A CN114900334 A CN 114900334A
Authority
CN
China
Prior art keywords
nft
target
access
ownership
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210395550.2A
Other languages
Chinese (zh)
Other versions
CN114900334B (en
Inventor
喻念
林哲明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fuzhou Shenjian Chengyuan Information Technology Co ltd
Original Assignee
Fujian Boquan Hashi Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fujian Boquan Hashi Technology Co ltd filed Critical Fujian Boquan Hashi Technology Co ltd
Priority to CN202210395550.2A priority Critical patent/CN114900334B/en
Publication of CN114900334A publication Critical patent/CN114900334A/en
Application granted granted Critical
Publication of CN114900334B publication Critical patent/CN114900334B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/10Network architectures or network communication protocols for network security for controlling access to devices or network resources
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/126Applying verification of the received information the source of the received data
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computing Systems (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Automation & Control Theory (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to an NFT authority control method, a system, a computer readable storage medium and a terminal device, wherein the method comprises the following steps: the access control party receives an access request of the access party, wherein the access request comprises a transaction chain between an original transaction and a final transaction corresponding to a target NFT and a signature corresponding to a public key in a final transaction locking script; determining whether an access party has ownership of the target NFT according to the access request; sending the final transaction corresponding to the target NFT to the full node to verify whether the UTXO in the final transaction is spent; if the UTXO is not spent and the accessing party has ownership of the target NFT, access rights are provided to the accessing party. The method, the system, the computer readable storage medium and the terminal equipment provided by the invention enable the authority management to be independent of any trusted third party, the whole process is simple and quick, and meanwhile, the access authority control safety is also ensured.

Description

NFT authority control method, system, computer readable storage medium and terminal device
Technical Field
The invention relates to the technical field of non-homogeneous token circulation, in particular to an NFT authority control method, an NFT authority control system, a computer-readable storage medium and terminal equipment.
Background
A token or encrypted token (in the context of a blockchain) is a unique virtual token on each blockchain that represents a digital asset. Cryptographic tokens are divided into two broad categories, namely homogeneous tokens and non-homogeneous tokens. Homogeneous tokens are identical, meaning that one token has exactly similar characteristics to another as long as they are referred to by the same name; non-homogeneous tokens (NFT) are different and have the characteristics of indivisible property, uniqueness, etc., which means that no NFT has a function similar to other functions.
Non-homogeneous tokens (NFTs) have the following characteristics: (1) and (3) standardization: NFT has some standardized functions including ownership, transfer, etc. All non-homogeneous tokens have these functions. Any developer can use this function to build its own NFT. (2) Universality: NFT is generic, that is, it can be used by any application that wants to use NFT. Because the blockchain is publicly accessible and everyone can read the smart contracts that deploy NFTs. (3) Fluidity: the liquidity market associated with encrypted assets is very large. People can easily exchange cash or other cryptocurrency according to own needs. Therefore, NFT has high fluidity. (4) Invariance: blockchains are known for invariance. NFT is implemented by smart contracts. This makes the NFT immutable, i.e., the user cannot change his NFT to another NFT. Ownership of the NFT will be permanently recorded in the blockchain unless the user decides to transfer it to another user. (5) Programming: NFT is implemented by smart contracts. NFT tokens may be enhanced and contain other complex functions.
NFT is mostly used in transactions in the fields of collections, game props, certificates and the like, and NFT can also be used for authority control, and at present, no special technical scheme for authority control based on NFT exists in the prior art, so that authority control can be realized without depending on a trusted third party.
Disclosure of Invention
Aiming at the technical problems in the prior art, the invention provides an NFT authority control method, an NFT authority control system, a computer readable storage medium and terminal equipment.
The invention discloses an NFT authority control method, which comprises the following steps:
the access control party receives an access request of the access party, wherein the access request comprises a transaction chain between an original transaction and a final transaction corresponding to a target NFT and a signature corresponding to a public key in a final transaction locking script;
determining whether an access party has ownership of the target NFT according to the access request;
sending the final transaction corresponding to the target NFT to the full node to verify whether the UTXO in the final transaction is spent;
if the UTXO is not spent and the accessing party has ownership of the target NFT, access rights are provided to the accessing party.
Further, determining whether the accessing party has ownership of the target NFT according to the access request includes:
performing local tracing forward along a transaction chain through the input of the final transaction of the target NFT to obtain the current issuing source of the target NFT, and comparing the current issuing source of the target NFT with the pre-stored original issuing source of the target NFT;
verifying the signature through the signature and the public key of the final transaction;
and if the comparison result of the current issuing source and the original issuing source is consistent and the verification passes, determining that the access party has the ownership of the target NFT.
Further, the method further comprises:
the access control side stores an original issuing source of an NFT after the NFT issuing side issues an NFT through a public channel.
Further, the issuing source is the source TXID or the source TXID and the output sequence.
Further, the access control party is an electronic lock device or a Web application gateway.
The invention also provides an NFT authority control system, which comprises a receiving module, an ownership verification module, an UTXO verification module and an authority control module, wherein:
the receiving module is connected with the ownership verification module and the UTXO verification module and used for receiving an access request of an access party, wherein the access request comprises a transaction chain between an original transaction and a final transaction corresponding to a target NFT and a signature corresponding to a public key in a final transaction locking script;
the ownership verification module is connected with the authority control module and used for determining whether the access party has ownership of the target NFT or not according to the access request;
the UTXO verification module is connected with the authority control module and used for sending the final transaction corresponding to the target NFT to the whole node so as to verify whether the UTXO in the final transaction is spent or not;
and the authority control module is used for providing access authority for the access party when the UTXO is not spent and the access party has the ownership of the target NFT.
Further, the ownership verification module comprises an issuing source comparison unit, a signature verification unit and an ownership verification unit, wherein:
the issuing source comparison unit is connected with the ownership verification unit and used for performing local tracing forward along a transaction chain through the input of the final transaction of the target NFT to obtain the current issuing source of the target NFT and comparing the current issuing source of the target NFT with the original issuing source of the target NFT stored in advance;
the signature verification unit is connected with the ownership verification unit and is used for verifying the signature through the signature and the public key of the final transaction;
and the ownership verification unit is used for determining that the access party has the ownership of the target NFT when the comparison result of the current issuing source is consistent with that of the original issuing source and the verification passes.
Further, the system also comprises a storage module, which is connected with the ownership verification module and used for storing the original issuing source of the NFT after the NFT issuer issues the NFT through the public channel.
The present invention also provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the NFT permission control method is implemented.
The present invention also provides a terminal device comprising a computer readable storage medium, and a processor, wherein,
a computer readable storage medium storing computer instructions;
and the processor is configured to execute computer instructions to enable the terminal equipment to execute the NFT authority control method.
The NFT authority control method, the NFT authority control system, the NFT authority control computer-readable storage medium and the terminal device have the following beneficial effects:
the access controller determines whether the access party has ownership of the target NFT through an access request sent by the access party (wherein the access request comprises a transaction chain between an original transaction and a final transaction corresponding to the target NFT and a signature corresponding to a public key in a final transaction locking script); sending the final transaction corresponding to the target NFT to the whole node to verify whether the UTXO in the final transaction is spent or not; if the UTXO is not spent and the accessing party has ownership of the target NFT, access rights are provided to the accessing party. The authority control scheme can be applied to the authority control aspects such as electronic locks, JWT (JSON Web Tokens, used for access authority control of Web application) and the like, the access controller determines whether the access party has the ownership of the target NFT or not through an access request, and determines that the access party has the ownership of the target NFT only when the access party has the ownership of the target NFT and the UTXO of the final transaction is not spent by judging whether the UTXO of the final transaction is spent or not, so that the access authority is provided for the access party. The whole process can be completed without the participation of a trusted third party, is simple and quick, and simultaneously ensures the safety of access authority control.
In addition, due to the fact that the NFT can be traded, namely the NFT can be transferred, after the private key for controlling the NFT is leaked, the NFT can be transferred to a new private key which is not leaked to be controlled, and therefore the method is beneficial to rapidly destroying the previous control authority and ensuring the control safety of the access authority.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a flowchart illustrating steps of an NFT permission control method according to an embodiment of the present invention;
FIG. 2 is a flowchart of ownership determination method steps in an embodiment of the present invention;
FIG. 3 is a first schematic diagram of a forward tracing implementation in an embodiment of the present invention;
FIG. 4 is a schematic diagram of a forward tracing implementation in an embodiment of the present invention;
FIG. 5 is a flowchart illustrating steps of an NFT permission control method according to an embodiment of the invention;
fig. 6 is a schematic structural diagram of an NFT authority control system according to an embodiment of the present invention;
FIG. 7 is a block diagram of an ownership verification module according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a terminal device in an embodiment of the present invention;
601-receiving module, 602-ownership verification module, 603-UTXO verification module, 604-rights control module, 605-storage module, 6021-release source comparison unit, 6022-signature verification unit, 6023-ownership verification unit, 10-terminal device, 101-computer readable storage medium, 102-processor.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings, and it is to be understood that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
In an embodiment of the present invention, a method for controlling NFT permissions is provided.
As shown in fig. 1, the NFT authority control method provided in this embodiment includes the following steps:
step S10: the access controller receives an access request of the access party.
Specifically, in this embodiment, the access controller may be hardware or software, such as an electronic lock or a Web application gateway, where the electronic lock is a device that can be unlocked through Token, and has basic block chain authentication, broadcast, and full node interaction capabilities.
The access request comprises a transaction chain between an original transaction and a final transaction corresponding to the target NFT and a signature corresponding to a public key in a final transaction locking script.
For the target NFT, the more the number of transactions of the target NFT before, the longer the transaction chain between the original transaction and the final transaction corresponding to the target NFT, and as each transaction of the target NFT is completed, the transaction chain between the original transaction and the final transaction corresponding to the target NFT is updated (a newly completed transaction is added, that is, the completed latest transaction is added), for example, in fig. 3, each block represents one transaction.
In a P2PKH transaction, the locking script of the final transaction has the public key attributed to the visitor. The P2PKH (path to public key hash, hash to public key) is a scheme for hash to public key transfer based on the UTXO model, and is a relatively common transfer type.
Step S20: and determining whether the accessing party has the ownership of the target NFT according to the access request.
Specifically, in an implementation manner, as shown in fig. 2, the step further includes the following steps:
step S201: and performing local tracing forward along a transaction chain through the input of the final transaction of the target NFT to obtain the current issuing source of the target NFT, and comparing the current issuing source of the target NFT with the pre-stored original issuing source of the target NFT.
Specifically, in this embodiment, the issue source refers to the source TXID or the source TXID and the output sequence. TXID, refers to a transaction hash, which is a unique string of characters that has been verified and added to each transaction in the blockchain. In other words, the TXID is a transaction number that identifies and marks each transaction on the blockchain. The transaction may have multiple inputs and multiple outputs, with the output sequence referring to the several outputs in the transaction.
When issuing an NFT, a mapping relationship is set in advance in which the NFT corresponds to one output in a transaction. When the transaction is limited to only one output, the issuing source refers to the source TXID, for example, the NFT issuing scheme in patent application No. 202111315523.1 is to limit only one output of the transaction in the transaction, so the TXID (source TXID) of the original transaction can be directly used to indicate the issuing source of the NFT;
when there are multiple transaction outputs in a transaction, such as the NFT issue scheme in patent application No. 202210038211.9, an atomic exchange transaction is constructed with two transaction outputs and the NFT corresponds to one of the transaction outputs, so the source of issuance at the time of tracing is the TXID (source TXID) and the output sequence of the original transaction (indicating that the NFT corresponds to the second output of a transaction for which the TXID is the source TXID).
As shown in fig. 3 and 4, after the transaction chain between the original transaction and the final transaction corresponding to the target NFT is acquired, local tracing is performed forward along the transaction chain between the original transaction and the final transaction through the input of the final transaction of the target NFT.
Specifically, performing local tracing upward along a transaction chain between an original transaction and a final transaction means that the original transaction is traced from the final transaction to the original transaction in sequence along the transaction chain, and then the source TXID corresponding to the original transaction is obtained through tracing.
More specifically, after each NFT is issued, the access controller prestores its corresponding TXID (that is, source TXID), in this embodiment, the source TXID of each NFT that is prestored by the access controller is used as the original issuing source of each NFT, and when the ownership of the target NFT is verified, the original issuing source of the target NFT is obtained from the original issuing sources of a plurality of NFTs that are prestored, so as to compare the original issuing source with the current issuing source of the target NFT.
Step S202: and verifying the signature through the signature and the public key of the final transaction.
In this embodiment, the signature corresponding to the public key in the final transaction locking script is obtained by the access party encrypting the plaintext by using its own private key, and if the signature can be decrypted by using the public key of the final transaction, the signature passes the verification.
Step S203: and if the comparison result of the current issuing source and the original issuing source is consistent and the verification passes, determining that the access party has the ownership of the target NFT.
Step S30: and sending the final transaction corresponding to the target NFT to the full node to verify whether the UTXO in the final transaction is spent.
All nodes: also known as a transaction handler. The system saves the information of all the relevant transactions of the users, all the block headers, the Mercker certification, the UTXO and the like, and has the functions of producing virtual currency, forwarding the transactions, detecting double flowers and the like.
Since all the block headers are stored in the whole node, the final transaction corresponding to the target NFT is sent to the whole node, and the whole node returns whether the UTXO in the final transaction is included in other transactions as a transaction input, so that the access controller can judge whether the UTXO is spent. If the UTXO in the final transaction is not included as a transaction input in other transactions, it is an indication that the UTXO is not spent, and if the UTXO in the final transaction is included as a transaction input in other transactions, it is an indication that the UTXO is spent.
Step S40: if the UTXO is not spent and the accessing party has ownership of the target NFT, access rights are provided to the accessing party.
According to the NFT authority control method provided by the invention, an access controller determines whether an access party has ownership of a target NFT through an access request sent by the access party (wherein the access request comprises a transaction chain between an original transaction and a final transaction corresponding to the target NFT and a signature corresponding to a public key in a final transaction locking script); sending the final transaction corresponding to the target NFT to the whole node to verify whether the UTXO in the final transaction is spent or not; if the UTXO is not spent and the accessing party has ownership of the target NFT, access rights are provided to the accessing party. The authority control scheme can be applied to the authority control aspects of electronic locks, JWT and the like, an access controller determines whether the access party has the ownership of the target NFT or not through an access request, and determines that the access party has the ownership of the target NFT and the UTXO of the final transaction is not spent only by judging whether the access party has the ownership of the target NFT or not and determining that the access party has the ownership of the target NFT or not through judging whether the UTXO of the final transaction is spent or not, so that the access authority is provided for the access party. The whole process can be completed without the participation of a trusted third party, is simple and quick, and simultaneously ensures the safety of access authority control. In addition, due to the property that the NFT can be traded, that is, the NFT can be transferred, after the private key for controlling the NFT is leaked, the NFT can be transferred to a new private key which is not leaked for control, so that the control right before being destroyed quickly is facilitated, and the control security of the access right is ensured.
In another embodiment of the present invention, as shown in fig. 5, the NFT authority control method further includes step S50: the access controller stores an original issuing source of an NFT after the NFT issuer issues an NFT through a public channel.
Specifically, the public channel may be a microblog, a release meeting, a exposition or the like, that is, the NFT issuer may issue the NFT through the microblog, the release meeting, the exposition or the like. More specifically, a distribution scheme may enable NFT to be distributed based on the UTXO model for NFT distributors. The issuing scheme may be a prior art NFT issuing scheme such as the NFT issuing scheme in patent application No. 202111315523.1 (limiting unique transaction output) or the NFT issuing scheme in patent application No. 202210038211.9 (atomic exchange).
In another embodiment of the present invention, as shown in fig. 6, there is further provided an NFT authority control system, which includes a receiving module 601, an ownership verifying module 602, a UTXO verifying module 603, and an authority control module 604, wherein:
a receiving module 601, connected to the ownership verifying module 602 and the UTXO verifying module 603, configured to receive an access request of an access party, where the access request includes a transaction chain between an original transaction and a final transaction corresponding to a target NFT, and a signature corresponding to a public key in a final transaction locking script;
an ownership verifying module 602, connected to the authority control module 604, configured to determine whether the accessing party has ownership of the target NFT according to the access request;
the UTXO verification module 603 is connected to the authority control module 604, and configured to send the final transaction corresponding to the target NFT to the full node, so as to verify whether the UTXO in the final transaction is spent;
and an authority control module 604, configured to provide the access authority for the access party when the UTXO is not spent and the access party has the ownership of the target NFT.
In the NFT authority control system provided by the present invention, after the receiving module 601 receives an access request sent by an accessing party (where the access request includes a transaction chain between an original transaction and a final transaction corresponding to a target NFT and a signature corresponding to a public key in a final transaction locking script), the ownership verifying module 602 determines whether the accessing party has ownership of the target NFT; the UTXO verification module 603 sends the final transaction corresponding to the target NFT to the whole node to verify whether the UTXO in the final transaction is spent, and the authority control module 604 provides the access authority for the access party when the UTXO is not spent and the access party has the ownership of the target NFT. The authority control system can be applied to the authority control aspects such as electronic locks, JWT (JSON Web Tokens, access authority control for Web application) and the like, the access controller determines whether the access party has the ownership of the target NFT or not through an access request, and simultaneously determines that the access party has the ownership of the target NFT only if the access party has the ownership of the target NFT and the UTXO of the final transaction is not spent by judging whether the UTXO of the final transaction is spent or not, so that the access authority is provided for the access party. The whole process can be completed without the participation of a trusted third party, is simple and quick, and simultaneously ensures the safety of access authority control.
In another embodiment of the present invention, as shown in fig. 7, the ownership verification module 602 includes an issue source comparison unit 6021, a signature verification unit 6022 and an ownership verification unit 6023, wherein:
the issuing source comparison unit 6021 is connected to the ownership verification unit 6023 and configured to perform local tracing forward along a transaction chain by inputting a final transaction of the target NFT, obtain a current issuing source of the target NFT, and compare the current issuing source of the target NFT with a pre-stored original issuing source of the target NFT;
the signature verification unit 6022 is connected with the ownership verification unit 6023 and is used for verifying the signature with the public key of the final transaction through the signature;
the ownership verification unit 6023 is configured to determine that the access party has ownership of the target NFT when the comparison result between the current issuance source and the original issuance source is consistent and the verification passes.
In another embodiment of the present invention, as shown in fig. 6, the system further includes a storage module 605, and the storage module 605 is connected to the ownership verification module 602 and configured to store an original issuing source of the NFT after the NFT issuer issues an NFT through a public channel.
The invention further provides a computer readable storage medium, on which a computer program is stored, and when being executed by a processor, the computer program implements the NFT permission control method.
The present invention also protects a terminal device 10, as shown in fig. 8, including a computer-readable storage medium 101 and a processor 102, where the computer-readable storage medium 101 stores computer instructions; the processor 102 is configured to execute computer instructions to enable the terminal device 10 to execute the NFT authority control method.
From the above description of the embodiments, those skilled in the art will clearly understand that the present invention can be implemented by combining software and a hardware platform. With this understanding in mind, all or part of the technical solutions of the present invention that contribute to the background art may be embodied in the form of a software product, which can be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, a server, a smart phone, or a network device, etc.) to execute the methods according to the embodiments or some parts of the embodiments.
According to the NFT authority control method, the NFT authority control system, the computer readable storage medium and the terminal device, an access controller determines whether an access party has ownership of a target NFT through an access request sent by the access party (wherein the access request comprises a transaction chain between an original transaction and a final transaction corresponding to the target NFT and a signature corresponding to a public key in a final transaction locking script); sending the final transaction corresponding to the target NFT to the whole node to verify whether the UTXO in the final transaction is spent or not; if the UTXO is not spent and the accessing party has ownership of the target NFT, access rights are provided to the accessing party. The authority control scheme can be applied to the authority control aspects such as electronic locks, JWT (JSON Web Tokens, used for access authority control of Web application) and the like, the access controller determines whether the access party has the ownership of the target NFT or not through an access request, and determines that the access party has the ownership of the target NFT only when the access party has the ownership of the target NFT and the UTXO of the final transaction is not spent by judging whether the UTXO of the final transaction is spent or not, so that the access authority is provided for the access party. The whole process can be completed without the participation of a trusted third party, is simple and quick, and simultaneously ensures the safety of access authority control.
The present invention has been further described with reference to specific embodiments, but it should be understood that the detailed description should not be construed as limiting the spirit and scope of the present invention, and various modifications made to the above-described embodiments by those of ordinary skill in the art after reading this specification are within the scope of the present invention.

Claims (10)

1. An NFT permission control method, the method comprising:
an access controller receives an access request of an access party, wherein the access request comprises a transaction chain between an original transaction and a final transaction corresponding to a target NFT and a signature corresponding to a public key in a final transaction locking script;
determining whether the accessing party has ownership of the target NFT according to the access request;
sending the final transaction corresponding to the target NFT to a full node to verify whether the UTXO in the final transaction is spent;
and if the UTXO is not spent and the access party has the ownership of the target NFT, providing the access authority for the access party.
2. The NFT authority control method of claim 1, wherein the determining whether the accessing party has ownership of the target NFT according to the access request comprises:
performing local tracing forward along the transaction chain through the input of the final transaction of the target NFT to obtain a current issuing source of the target NFT, and comparing the current issuing source of the target NFT with a pre-stored original issuing source of the target NFT;
verifying the signature through the signature and the public key of the final transaction;
and if the comparison result of the current issuing source and the original issuing source is consistent and the verification passes, determining that the access party has the ownership of the target NFT.
3. The NFT authority control method of claim 1, further comprising:
the access control party stores an NFT original issuing source after an NFT issuing party issues an NFT through a public channel.
4. The NFT authority control method of claim 1, wherein the issuing source is a source TXID or a source TXID and an output sequence.
5. The NFT authority control method according to claim 1, wherein the access controller is an electronic lock device or a Web application gateway.
6. An NFT entitlement control system, comprising a receiving module, an ownership verification module, a UTXO verification module, and an entitlement control module, wherein:
the receiving module is connected with the ownership verification module and the UTXO verification module and is used for receiving an access request of an access party, wherein the access request comprises a transaction chain between an original transaction and a final transaction corresponding to a target NFT and a signature corresponding to a public key in a final transaction locking script;
the ownership verification module is connected with the authority control module and used for determining whether the access party has ownership of the target NFT according to the access request;
the UTXO verification module is connected with the authority control module and used for sending the final transaction corresponding to the target NFT to the whole node so as to verify whether the UTXO in the final transaction is spent or not;
the authority control module is used for providing access authority for the access party when the UTXO is not spent and the access party has the ownership of the target NFT.
7. The NFT privilege control system of claim 6, wherein the ownership verification module comprises an issue source comparison unit, a signature verification unit, and an ownership verification unit, wherein:
the issuing source comparing unit is connected with the ownership verifying unit and is used for performing local tracing forward along the transaction chain by inputting the final transaction of the target NFT to obtain the current issuing source of the target NFT and comparing the current issuing source of the target NFT with the pre-stored original issuing source of the target NFT;
the signature verification unit is connected with the ownership verification unit and is used for verifying the signature with the public key of the final transaction through the signature;
and the ownership verification unit is used for determining that the access party has the ownership of the target NFT when the comparison result of the current issuing source is consistent with the comparison result of the original issuing source and the comparison result of the current issuing source and the original issuing source passes the verification of the signature.
8. The NFT authority control system of claim 6, further comprising a storage module, coupled to the ownership verification module, for storing an original issuing source of the NFT after an NFT issuer issues an NFT through a public channel.
9. A computer-readable storage medium, characterized in that the computer-readable storage medium has stored thereon a computer program which, when executed by a processor, implements the NFT permission control method according to any one of claims 1 to 5.
10. A terminal device comprising a computer-readable storage medium and a processor, wherein,
a computer readable storage medium storing computer instructions;
a processor configured to execute computer instructions to cause a terminal device to perform the NFT permission control method of any one of claims 1 to 5.
CN202210395550.2A 2022-04-14 2022-04-14 NFT authority control method, system, computer readable storage medium and terminal equipment Active CN114900334B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210395550.2A CN114900334B (en) 2022-04-14 2022-04-14 NFT authority control method, system, computer readable storage medium and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210395550.2A CN114900334B (en) 2022-04-14 2022-04-14 NFT authority control method, system, computer readable storage medium and terminal equipment

Publications (2)

Publication Number Publication Date
CN114900334A true CN114900334A (en) 2022-08-12
CN114900334B CN114900334B (en) 2023-09-15

Family

ID=82717557

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210395550.2A Active CN114900334B (en) 2022-04-14 2022-04-14 NFT authority control method, system, computer readable storage medium and terminal equipment

Country Status (1)

Country Link
CN (1) CN114900334B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116484326A (en) * 2023-06-12 2023-07-25 深圳市旭子科技有限公司 Multi-account access authority management method and related device based on NFT
WO2024162586A1 (en) * 2023-02-02 2024-08-08 삼성전자주식회사 Apparatus for controlling electronic device through non-fungible token, and method therefor

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20200005284A1 (en) * 2018-07-01 2020-01-02 Madhu Vijayan Systems and Methods for Implementing Blockchain-Based Content Engagement Platforms Utilizing Media Wallets
US20210133700A1 (en) * 2019-10-10 2021-05-06 Forte Labs, Inc. Blockchain Cross-Chain Non-Fungible Token Exchange
CN112965985A (en) * 2021-02-04 2021-06-15 复旦大学 Data consistency maintenance method for realizing cross-chain interoperation
US20210279305A1 (en) * 2017-02-13 2021-09-09 Tunego, Inc. Tokenized media content management
CN113988857A (en) * 2021-11-08 2022-01-28 福建博泉哈希科技有限公司 NFT transaction method, transaction system, computer-readable storage medium and terminal device
CN114201735A (en) * 2021-11-30 2022-03-18 中科苏州智能计算技术研究院 NFT-based digital certificate issuing and verifying method

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210279305A1 (en) * 2017-02-13 2021-09-09 Tunego, Inc. Tokenized media content management
US20200005284A1 (en) * 2018-07-01 2020-01-02 Madhu Vijayan Systems and Methods for Implementing Blockchain-Based Content Engagement Platforms Utilizing Media Wallets
US20210133700A1 (en) * 2019-10-10 2021-05-06 Forte Labs, Inc. Blockchain Cross-Chain Non-Fungible Token Exchange
CN112965985A (en) * 2021-02-04 2021-06-15 复旦大学 Data consistency maintenance method for realizing cross-chain interoperation
CN113988857A (en) * 2021-11-08 2022-01-28 福建博泉哈希科技有限公司 NFT transaction method, transaction system, computer-readable storage medium and terminal device
CN114201735A (en) * 2021-11-30 2022-03-18 中科苏州智能计算技术研究院 NFT-based digital certificate issuing and verifying method

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024162586A1 (en) * 2023-02-02 2024-08-08 삼성전자주식회사 Apparatus for controlling electronic device through non-fungible token, and method therefor
CN116484326A (en) * 2023-06-12 2023-07-25 深圳市旭子科技有限公司 Multi-account access authority management method and related device based on NFT
CN116484326B (en) * 2023-06-12 2024-01-26 深圳市旭子科技有限公司 Multi-account access authority management method and related device based on NFT

Also Published As

Publication number Publication date
CN114900334B (en) 2023-09-15

Similar Documents

Publication Publication Date Title
US11314891B2 (en) Method and system for managing access to personal data by means of a smart contract
US11651109B2 (en) Permission management method, permission verification method, and related apparatus
US11431693B2 (en) Systems, methods, and apparatuses for seeding community sidechains with consent written onto a blockchain interfaced with a cloud based computing environment
US20230342734A1 (en) Systems, methods, and apparatuses for implementing smart flow contracts using distributed ledger technologies in a cloud based computing environment
US10790976B1 (en) System and method of blockchain wallet recovery
KR102636102B1 (en) Computer-implemented methods and systems for validating tokens for blockchain-based cryptocurrencies
Bhaskaran et al. Double-blind consent-driven data sharing on blockchain
US20190236562A1 (en) Systems, methods, and apparatuses for implementing document interface and collaboration using quipchain in a cloud based computing environment
US20190238316A1 (en) Systems, methods, and apparatuses for implementing intelligent consensus, smart consensus, and weighted consensus models for distributed ledger technologies in a cloud based computing environment
US20190236606A1 (en) Systems, methods, and apparatuses for implementing a virtual chain model for distributed ledger technologies in a cloud based computing environment
US20190295069A1 (en) Systems and methods for integrating cryptocurrency wallet identifiers with digital certificates
CN113537984A (en) Content verification method and device based on block chain and electronic equipment
CN114900334B (en) NFT authority control method, system, computer readable storage medium and terminal equipment
US11863689B1 (en) Security settlement using group signatures
EP4165573A1 (en) Method, apparatus, and computer-readable medium for confederated rights and hierarchical key management
WO2024011863A1 (en) Communication method and apparatus, sim card, electronic device, and terminal device
TW202217610A (en) Authentication system and method
CN113988857A (en) NFT transaction method, transaction system, computer-readable storage medium and terminal device
CN110910110A (en) Data processing method and device and computer storage medium
US12074987B1 (en) Systems and methods of using group functions certificate extension
EP3883204A1 (en) System and method for secure generation, exchange and management of a user identity data using a blockchain
CN111078649A (en) Block chain-based on-cloud file storage method and device and electronic equipment
CN114358948A (en) NFT atom exchange method, system, computer-readable storage medium and terminal device
CN114846765A (en) Method and apparatus for providing decentralized identity verification
Rao et al. VAPKI: A blockchain-based identification system with validation and authentication

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20230906

Address after: Room 702-22, 7th Floor, Building 17, Phase 2, Innovation Park, No. 7 Wulongjiang Middle Avenue, High tech Zone, Fuzhou City, Fujian Province, 350100

Patentee after: Fuzhou Shenjian Chengyuan Information Technology Co.,Ltd.

Address before: 350000 b84, 1f, Xiaobai building, southwest of Baolong City Plaza, 193 Gongye Road, Taijiang District, Fuzhou City, Fujian Province

Patentee before: Fujian Boquan Hashi Technology Co.,Ltd.