CN114978596B - Registration and processing method and device for ownership of digital assets - Google Patents

Registration and processing method and device for ownership of digital assets Download PDF

Info

Publication number
CN114978596B
CN114978596B CN202210434504.9A CN202210434504A CN114978596B CN 114978596 B CN114978596 B CN 114978596B CN 202210434504 A CN202210434504 A CN 202210434504A CN 114978596 B CN114978596 B CN 114978596B
Authority
CN
China
Prior art keywords
party
medium
entity
target
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210434504.9A
Other languages
Chinese (zh)
Other versions
CN114978596A (en
Inventor
伍鹏程
刘洋
肖林
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Jiede China Technology Co ltd
Original Assignee
Jiede China Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Jiede China Technology Co ltd filed Critical Jiede China Technology Co ltd
Priority to CN202210434504.9A priority Critical patent/CN114978596B/en
Publication of CN114978596A publication Critical patent/CN114978596A/en
Application granted granted Critical
Publication of CN114978596B publication Critical patent/CN114978596B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0866Generation of secret information including derivation or calculation of cryptographic keys or passwords involving user or device identifiers, e.g. serial number, physical or biometrical information, DNA, hand-signature or measurable physical characteristics

Abstract

The application discloses a method and a device for registering and processing ownership of a digital asset. The method for processing the ownership of the digital assets comprises the following steps: the first party receives the registration information sent by the second party; the second party is an initial owner of the ownership of the target digital asset, the registration information is used for indicating that a first association relationship between the first entity certificate medium and the ownership of the target digital asset is registered in the target block chain, and the first entity certificate medium is represented by a first public key acquired by the second party in the first association relationship; the first party verifies the identity of the second party according to the registration information; the first party, upon successful verification, uplinks the registration of the first association to the target blockchain. According to the embodiment of the application, the association relationship between the digital asset ownership and the entity is stored through the blockchain, and the entity can be proved to have the digital asset ownership based on the non-falsifiable characteristic of the blockchain, so that the digital asset can be transferred offline through the entity conveniently.

Description

Registration and processing method and device for ownership of digital assets
Technical Field
The application belongs to the technical field of block chains, and particularly relates to a method and a device for registering and processing ownership of a digital asset.
Background
As blockchain technology evolves, ownership of digital assets (e.g., songs, paintings, etc.) can be transferred based on blockchain technology. For example, non-homogeneous Token/Non-replaceable Token (NFT) is a currency document based on block-chain technology, which can be used to represent ownership of digital assets. However, the method for transferring the ownership of the digital asset makes the transaction of the ownership of the digital asset be transferred based on the online block chain technology, and the transaction cannot be performed by means of offline transfer.
Disclosure of Invention
The embodiment of the application provides a method and a device for registering and processing ownership of a digital asset, which can solve the technical problem that ownership of the digital asset cannot be transferred offline in the related art.
In a first aspect, an embodiment of the present application provides a method for processing ownership of a digital asset, where the digital asset is an NFT, and the method includes:
a first party receives registration information sent by a second party; the second party is an initial owner of the ownership of the target digital asset, the registration information is used for indicating that a first association relationship between the first entity certificate medium and the ownership of the target digital asset is registered in the target block chain, the first entity certificate medium is represented by a first public key acquired by the second party in the first association relationship, the first public key is a public key corresponding to the first private key, and the first private key is stored in the first entity certificate medium; the first public key and the first private key are generated based on at least the following three under the condition that the user obtains the first entity certificate medium: the unique identification of the second party registered on the first party, the unique identification of the first entity voucher medium and the mnemonic; the unique identification of the first entity credential medium is generated by a third party based on the received user information; the mnemonic words are generated by the first entity voucher medium or by a third party;
the first party verifies the identity of the second party according to the registration information;
the first party, upon successful verification, uplinks the registration of the first association to the target blockchain.
In a second aspect, an embodiment of the present application provides a method for registering ownership of a digital asset, where the method includes:
the second party obtains a first public key of the first entity certificate medium; wherein the second party is an initial owner of ownership of the target digital asset and the first public key is a public key corresponding to a first private key stored in the first entity credential medium;
the second party generates registration information; wherein the registration information is used for indicating that the incidence relation of the first entity certificate medium and the ownership of the target digital asset is registered in the target block chain;
the second party sends the registration information to the first party; and the registration of the association relation is linked to the target block chain by the first party after the authentication of the second party is successful.
In a third aspect, an embodiment of the present application provides a method for processing ownership of a digital asset, including:
the first entity voucher medium receives the unique identification of the first entity voucher medium sent by a third party;
the first entity credential medium generates a first public key and a first private key based on at least three of: the unique identification of the second party registered on the first party, the unique identification of the first entity voucher medium and the mnemonic;
the first entity certificate medium acquires a third public key; the second entity certificate medium is used for storing the third private key;
the first entity voucher medium generates change information; the change information is used for indicating that a first incidence relation between a first entity certificate medium and the ownership of the target digital asset is changed into a second incidence relation between a second entity certificate medium and the ownership of the target digital asset in the target block chain, the first entity certificate medium is used for storing a first private key, and the first public key is a public key corresponding to the first private key;
the first entity voucher medium sends change information to the first party; the change from the first association relationship to the second association relationship is that the first party links to the target block chain after the first party successfully authenticates the identity of the first entity certificate medium based on the uplink information in the target block chain.
In a fourth aspect, an embodiment of the present application provides a method for processing ownership of a digital asset, including:
when a user obtains a first entity certificate medium through a third party, the third party obtains user information and a registered unique identifier of a second party on the first party, wherein the user information comprises user identity information and user address information;
the third party generates a unique identifier of the first entity certificate medium based on the user identity information and the registered unique identifier of the second party on the first party, and the unique identifier is used for the first entity certificate medium to generate a first public key and a first private key;
the third party sends the first entity credential medium containing the unique identification to the user based on the user address information.
In a fifth aspect, an embodiment of the present application provides an apparatus for processing ownership of a digital asset, where the digital asset is an NFT, and the apparatus includes:
a first receiving unit, which is used for receiving the registration information sent by the second party by the first party; the second party is an initial owner of the ownership of the target digital asset, the registration information is used for indicating that a first association relationship between the first entity certificate medium and the ownership of the target digital asset is registered in the target block chain, the first entity certificate medium is represented by a first public key acquired by the second party in the first association relationship, the first public key is a public key corresponding to the first private key, and the first private key is stored in the first entity certificate medium; the first public key and the first private key are generated based on at least three of the following under the condition that the user acquires the first entity certificate medium: the unique identification of the second party registered on the first party, the unique identification of the first entity voucher medium and the mnemonic; the unique identification of the first entity credential medium is generated by a third party based on the received user information; the mnemonic words are generated by the first entity voucher medium or by a third party;
the verification unit is used for verifying the identity of the second party by the first party according to the registration information;
and the uplink unit is used for the first party to uplink the registration of the first association relation to the target block chain under the condition of successful verification.
In a sixth aspect, an embodiment of the present application provides an apparatus for registering ownership of a digital asset, including:
the first obtaining unit is used for obtaining a first public key of the first entity certificate medium by the second party; wherein the second party is an initial owner of ownership of the target digital asset and the first public key is a public key corresponding to a first private key stored in the first entity credential medium;
a first generation unit for generating registration information by the second party; wherein the registration information is used for indicating that the incidence relation of the first entity certificate medium and the ownership of the target digital asset is registered in the target block chain;
a first sending unit, configured to send registration information to a first party by a second party; and the registration of the association relation is linked to the target block chain by the first party after the authentication of the second party is successful.
In a seventh aspect, an embodiment of the present application provides a device for processing ownership of a digital asset, including:
the second receiving unit is used for the first entity certificate medium to receive the unique identifier of the first entity certificate medium sent by the third party;
a second generating unit for the first entity credential medium to generate a first public key and a first private key based on at least three of: the unique identification of the second party registered on the first party, the unique identification of the first entity voucher medium and the mnemonic;
a second obtaining unit, configured to obtain, by the first entity credential medium, the third public key; the second entity certificate medium is used for storing the third private key;
a second generation unit for generating change information for the first entity voucher medium; the change information is used for indicating that a first incidence relation between a first entity certificate medium and the ownership of the target digital asset is changed into a second incidence relation between a second entity certificate medium and the ownership of the target digital asset in the target block chain, the first entity certificate medium is used for storing a first private key, and the first public key is a public key corresponding to the first private key;
a second sending unit, configured to send change information to the first party by using the first entity credential medium; and changing the first association relation to the second association relation into that the first party links the first entity credential medium to the target block chain after the first party successfully authenticates the identity of the first entity credential medium based on the uplink information in the target block chain.
In an eighth aspect, an embodiment of the present application provides a device for processing digital asset ownership, including:
the third acquisition unit is used for acquiring user information and a registered unique identifier of a second party on a first party when a user acquires a first entity certificate medium through a third party, wherein the user information comprises user identity information and user address information;
a third generation unit, configured to generate, by a third party, a unique identifier of a first entity credential medium based on user identity information and a unique identifier registered by the second party on the first party, where the unique identifier is used for the first entity credential medium to generate a first public key and a first private key;
and the third sending unit is used for sending the first entity certificate medium containing the unique identifier to the user by a third party based on the user address information.
In a ninth aspect, an embodiment of the present application provides an electronic device, including: a processor and a memory storing a private key and program instructions; the processor, when executing the program instructions, implements a method as provided in any of the first to fourth aspects.
According to the method and device for registering, changing and verifying the ownership of the digital asset, the entity certificate medium, the electronic device and the program product, the association relation between the ownership of the digital asset and the entity is stored through the blockchain, and the ownership of the digital asset can be proved based on the non-falsifiable characteristic of the blockchain, so that the digital asset can be transferred offline through the entity conveniently.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required to be used in the embodiments of the present application will be briefly described below, and for those skilled in the art, other drawings may be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of an application scenario provided by an embodiment of the present application;
FIG. 2 is a schematic flow chart diagram of a method for registering ownership of a digital asset provided by one embodiment of the present application;
FIG. 3 is a flow diagram illustrating a method for processing ownership of a digital asset provided by an embodiment of the present application;
FIG. 4 is a flow diagram illustrating a method for processing ownership of a digital asset provided in accordance with yet another embodiment of the present application;
FIG. 5 is a flow chart illustrating a method for processing ownership of a digital asset provided in accordance with another embodiment of the present application;
FIG. 6 is a flow chart illustrating a method for processing ownership of a digital asset provided in accordance with another embodiment of the present application;
FIG. 7 is a flow chart illustrating a method for processing ownership of a digital asset provided in accordance with another embodiment of the present application;
FIG. 8 is a flow chart illustrating a method for processing ownership of a digital asset provided in accordance with yet another embodiment of the present application;
FIG. 9 is a block diagram of a processing device for ownership of digital assets according to an embodiment of the present application;
fig. 10 is a schematic structural diagram of a digital asset ownership registration apparatus according to another embodiment of the present application;
FIG. 11 is a block diagram of a digital asset ownership processing apparatus according to another embodiment of the present application;
fig. 12 is a schematic structural diagram of a processing device for ownership of digital assets according to another embodiment of the present application;
fig. 13 is a schematic structural diagram of an electronic device according to still another embodiment of the present application.
Detailed Description
Features of various aspects and exemplary embodiments of the present application will be described in detail below, and in order to make objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail below with reference to the accompanying drawings and specific embodiments. It should be understood that the specific embodiments described herein are intended to be illustrative only and are not intended to be limiting. It will be apparent to one skilled in the art that the present application may be practiced without some of these specific details. The following description of the embodiments is merely intended to provide a better understanding of the present application by illustrating examples thereof.
It should be noted that, in this document, relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising ...comprises 8230; "does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
In order to solve the problem of the prior art, embodiments of the present application provide a method and an apparatus for registering and processing ownership of a digital asset, an entity credential medium, and an electronic device.
The following describes a method for processing/registering ownership of digital assets according to an embodiment of the present application, with reference to an application scenario diagram provided in fig. 1.
As shown in fig. 1, in this application scenario, a first party 102, a second party 101, a first entity credential medium 103, a second entity credential medium 104, a third party 105 and a target blockchain are included.
The second party 101 is the initial owner of ownership of the target digital asset. For example, the second party 101 may be the issuer of the owner of the target digital asset, or may be the user who originally owns the digital asset. Alternatively, the target digital asset may be created/generated by the second party 101, or the target digital asset may not be created/generated by the second party 101, but the owner of the target digital asset transfers ownership to the second party 101 by a transfer means other than blockchain technology. It should be noted that the initial owner of the target digital asset refers to the initial owner of the ownership of the target digital asset in the target block chain, and is not necessarily the initial owner that is online.
The second party 101 may specifically be an electronic device, such as a mobile phone, a palm top computer, a tablet computer, a notebook computer, a personal computer, a server, a self-service machine, and so on.
The target digital asset is a virtual digital item, having no physical entities, represented and stored digitally, e.g., the target digital asset may be music, images, videos, text, etc.
Ownership of the target digital asset is used to indicate ownership of the target digital asset. For example, ownership of the target digital asset may be copyright of music, images or paintings, patent rights, or copyright of literary works, etc.
Ownership of the target digital asset may be represented by an identification, for example, ownership of the target digital asset may be identified by the unique identification of the target digital asset, or the digital file of the target digital asset itself. Alternatively, the target digital asset ownership may be uniquely identified by NFT, which may be referred to as NFT digital asset.
In the target blockchain, the first entity credential medium 103 may be represented as having ownership of the target digital asset by storing an association between an identification of ownership of the target digital asset and the first entity credential medium 103. The first entity certificate medium corresponds to the target digital asset one to one, and specifically, the first public key in the first entity certificate medium corresponds to the unique identifier of the target digital asset. The blockchain stores a correspondence between the unique identifier of the first entity credential medium, the first public key, and the unique identifier of the target digital asset.
Alternatively, the association may represent the identity of the first entity credential medium 103 by a first public key of the first entity credential medium 103. Specifically, the first entity certificate medium 103 stores a first private key in a secret manner, and in the association relationship in the target block chain, the first entity certificate medium 103 can be represented by a first public key corresponding to the first private key, and the ownership of the target digital asset can be represented by the unique identifier of the target digital asset. Wherein the unique identification of the target digital asset may be an assigned identification or may be the digital file itself of the target digital asset. Alternatively, in addition to the first entity credential medium 103 being representable by the first public key, the identity of the first entity credential medium 103 may also be attested to facilitated by the unique identification of the first entity credential medium 103.
In embodiments of the present application, the entity credential medium of the ownership association of the target digital asset may be registered, altered, and verified in the target blockchain. The registration refers to that the association relationship of the ownership of the target digital asset is linked up in the target block chain for the first time. The change refers to changing the latest association relation of ownership of the target digital asset from one entity certificate medium to another entity certificate medium in the target block chain. Authentication refers to verifying that a certain entity voucher medium is the current (latest) owner of ownership of the target digital asset through the information disclosed in the target blockchain.
The first party 102 is independent of the target blockchain, has an operation authority related to the target blockchain, and can directly perform an operation with the target blockchain to uplink information into the target blockchain, or the first party 102 may not directly perform an operation with the target blockchain but uplink information into the target blockchain in an intelligent contract manner, that is, the target blockchain may receive information to be uplink-connected by the first party 102 through a working system, and then generate an intelligent contract, and the working system of the target blockchain transmits the information to the target blockchain. The first party 102 may uplink the following information in the target blockchain: all the association relations of the ownership of the target digital asset are registered or changed, and in addition, all the association relations of the ownership of the target digital asset can be searched, acquired and verified from the target block chain. The first party can realize the unified management of data by storing the association relationship between the digital assets and the entity certificate medium into the block chain.
In one example, the first party 102 may be referred to as an operating platform for digital assets. The first party 102 may be an electronic device such as a cell phone, a palm top computer, a tablet computer, a laptop computer, a personal computer, a server cluster, and so forth.
Optionally, the target blockchain may also authenticate the identity of the first party 102, and only if the authentication is successful, the first party 102 is allowed to uplink in the target blockchain, so as to improve the reliability of the information source that is uplink in the target blockchain.
Specifically, the first party 102 may sign the uplink information through its own second private key, so that the target block chain can verify the digital signature based on a first public key provided by the first party 102 in advance, to authenticate the identity of the first party 102, and to confirm whether the received information is sent by the first party 102.
The third party 105 is a digital collection security platform for receiving predetermined information of the entity certificate medium and writing important information for generating a key to the entity certificate medium based on the predetermined information as a unique identifier of the entity certificate medium. The subscription information of the entity voucher medium can come from the second party or directly come from the user information input by the user. For example, when a third party receives predetermined information of a second party, the predetermined information includes mailing address information and an issuer identification of the second party, and the digital storage product security platform writes the issuer identification of the second party into the physical voucher medium and sends the physical voucher medium to the second party through the mailing address.
The first entity certificate medium 103 may include a storage medium and a processor, where the storage medium stores a first private key, and optionally, the first entity certificate medium 103 may further store a first public key corresponding to the first private key, and may further store one or more information such as a unique identifier of the first entity certificate medium 103, a unique identifier/issue time/storage address of the target digital asset, which is not limited in this embodiment of the present application. It should be noted that the private keys described in the embodiments of the present application are all kept secret.
Alternatively, the storage medium in the first entity credential medium 103 may include a Secure Element (SE), and in this embodiment, of the information stored in the storage medium, at least the first private key is stored in the Secure Element.
Alternatively, the first physical voucher medium 103 can be in the form of a card. Alternatively, the first entity voucher medium 103 can be other electronic devices, such as a mobile phone, a palm computer, a tablet computer, etc.
The first entity voucher medium 103 has communication capabilities and is able to communicate with the second party 101, the first party 102 or other first entity voucher medium. The off-line transaction of the ownership of the digital assets is realized through the newly added entity voucher medium, the security of the digital assets can be improved through storing the digital assets in the entity voucher medium,
fig. 2 illustrates a flowchart of a method for registering ownership of a digital asset provided by an embodiment of the present application, which may be performed by the second party 101 shown in fig. 1. As shown in fig. 2, the method includes the following steps 201 to 203:
in step 201, the second party 101 obtains the first public key of the first entity credential medium.
The second party 101 is the initial owner of ownership of the target digital asset and the first public key is the public key corresponding to the first private key stored in the first entity credential medium 103.
The second party 101 may obtain the first public key by any one of the following ways:
(1) The second party 101 obtains the first public key stored in the first entity credential medium 103 through the first communication connection established with the entity credential medium 103. For example, the second party 101 may establish a communication connection with the first entity credential medium 103 through NFC to obtain the first public key.
(2) The second party 101 looks up the corresponding first public key according to the identity of the first entity credential medium 103. In this alternative embodiment, the second party 101 may store the corresponding relationship between the identifier of the first entity credential medium 103 and the first public key in advance, so as to search for the corresponding first public key based on the identifier of the first entity credential medium 103. In an alternative application scenario, the second party 101 may store a list of the identifiers and corresponding public keys of the plurality of first entity credential media 103, and search the list for the corresponding first public key according to the identifier of the first entity credential media 103.
(3) The second party 101 receives the input first public key. That is, it may be the user that inputs the first public key to the second party 101. Illustratively, the first entity credential medium 103 may be in the form of a card, on which the first public key is printed, and the user may input the first public key on the card to the second party 101 through a user interaction unit (e.g., a touch screen, a keyboard, a mouse, a microphone, etc.).
In step 202, the second party 101 generates registration information.
The registration information is used to indicate a first association of the first entity voucher medium 103 with the ownership of the target digital asset being registered in the target blockchain.
Since the first public key is a public key corresponding to the first private key stored in the first entity certificate medium 103, the first public key can be used to represent the first entity certificate medium 103, and based on the asymmetric cryptographic characteristics between the public and private key pairs, the digital signature signed by the first private key of the first entity certificate medium 103 is verified by the first public key to verify the identity of the first entity certificate medium 103.
Optionally, the registration information may comprise information for verifying the identity of the second party 101.
The registration information may also include, for example, a first digital signature of the second party 101, the first digital signature being used for enabling the first party 102 to verify the identity of the second party 101 by means of a second public key, the second public key being a public key corresponding to the second private key.
Alternatively, the first digital signature may be obtained by signing the specified information with the first private key, and the specified information may be partial information in the registration information, and in one example, the step 202 of the second party 101 generating the registration information may include the following steps 2021 to 2023:
step 2021, the second party 101 generates a registration message body. Wherein the registration message body may include the first public key and the unique identification of the target digital asset.
Step 2022, the second party 101 signs the registration message body with the second private key to obtain the first digital signature.
Step 2023, the second party 101 generates a registration message according to the registration message text and the first digital signature, and obtains registration information. Wherein the registration message comprises a registration message body and a first digital signature.
The registration message body includes the first public key and an identification for indicating ownership of the target digital asset. The registration message includes a registration message body and a first digital signature. The first digital signature is obtained by signing the registration message body through the second private key. The second private key corresponds to the second public key, and the second public key is used for enabling the first party 102 to check the first digital signature to verify the identity of the second party 101, that is, the first party 102 checks the first digital signature through the second public key, compares the information obtained by checking the signature with the text of the registration message, and judges whether the information is consistent, if so, the registration message is sent by the second party 101, and if not, the identity of the second party 101 is not verified.
The data structure of the registration message is a format agreed in advance by the first party 102 and the second party 101, and in an alternative embodiment, the data structure of the registration message may be as shown in the following table:
table 1 data structure of registration message
Figure BDA0003612445640000111
Wherein, the registration message identifier is used for indicating that the message is a registration message; the target digital asset identifier may be a unique identifier for indicating ownership of the target digital asset, for example, NFT identification information, or the like, or may be a digital file of the target digital asset itself; the release time may be the time at which the target digital asset is created/generated/published; other information may include an address of the target digital asset storage, an index to look up the target digital asset at a certain address, a unique identifier of the first entity credential medium 103 (the unique identifier of the first entity credential medium 103 may be used as an aid for one of the credentials representing the identity of the first entity credential medium 103), and so on, which is not limited in this embodiment.
In step 203 the second party 101 sends registration information to the first party 102.
Registration of the first association is uplinked to the target blockchain by the first party 102 after successful authentication of the second party 101.
That is, the uplink process is performed by the first party 102.
Fig. 3 is a flowchart illustrating a method for processing ownership of a digital asset, which is NFT and can be performed by the first party 102 shown in fig. 1 according to an embodiment of the present application.
As shown in fig. 3, the method includes the following steps 301 to 303:
in step 301, the first party 102 receives the registration information sent by the second party 101.
As described in the embodiment shown in fig. 3, the registration information is used to indicate a first association relationship for registering the ownership of the first entity certificate medium 103 and the target digital asset in the target block chain, and the first public key is a public key corresponding to a first private key stored in the first entity certificate medium 103. The first entity voucher medium 103 is represented in the first association by a first public key acquired by the second party. The first public key and the first private key are generated based on at least three of the following under the condition that the user acquires the first entity certificate medium: a unique identification of a second party's registration with the first party, a unique identification of the first entity's voucher medium, and a mnemonic. The unique identification of the first entity credential medium is generated by a third party based on the received user information; the mnemonic is generated by the first entity voucher medium or by a third party.
The key pair in the entity medium is generated by the card and is generated based on the introduced first entity certificate medium and the first party, and the first public key and the first private key are generated based on at least three of the following: a unique identification of a second party's registration with the first party, a unique identification of the first entity's voucher medium, and a mnemonic. After the public key and the private key are generated, the private key is only stored in the entity medium, and any other platform or medium cannot obtain the private key. In the prior art, a public and private key pair is generated by a platform, and the platform can be attacked, so that the private key is revealed. In the scheme, the private key is only stored in the entity certificate medium and cannot be revealed.
The first party 102 verifies 302 the identity of the second party 101 based on the registration information.
The registration information may comprise information for verifying the identity of the second party 101. In an alternative embodiment, the registration information may include a first digital signature generated by the second party 101, and accordingly, the step 302 of the first party 102 verifying the identity of the second party 101 according to the registration information may include steps 3021, 3022, 3023, and 3024:
step 3021, the first party 102 parses the registration information to obtain a first digital signature;
step 3022, the first party 102 obtains a second public key corresponding to the second party 101;
step 3023, the first party 102 verifies the first digital signature using the second public key to determine the validity of the first digital signature;
in step 3024, the first party 102 verifies the identity of the second party 101 based on the validity of the first digital signature. If the first digital signature is valid, it is determined that the registration information was sent by the second party 101, otherwise, the authentication of the second party 101 fails.
In an alternative embodiment, the registration information may be a registration message comprising a registration message body and a first digital signature obtained by the second party 101 signing the registration message body using the second private key. In this way, step 3021 parses the registration information to obtain the first digital signature, and may parse the registration message based on a pre-negotiated data structure of the registration message to obtain a text of the registration message and the first digital signature. The data structure of the registration message may be, for example, as shown in table 1.
In step 303, the first party 102 links the registration of the first association to the target block chain if the verification is successful.
The uplink of the first party 102 in the target blockchain may use the blockchain technique in the related art, and the detailed description of the embodiment of the present application is omitted here.
The first association of the first party 102 in the target blockchain may be implemented by storing the first public key and the identification of the ownership of the target digital asset in a block, such that, based on the asymmetric cryptographic characteristics of the public-private key pair, the registration information stored in the block can indicate that the ownership of the target digital asset has the first association with the first entity credential medium 103, i.e., can indicate that the first entity credential medium 103 owns the ownership of the target digital asset.
In an alternative embodiment, the first party 102 may directly link the registration message/registration message body to the target block chain, and the first association relationship can be represented by the registration message/registration message body.
In another optional embodiment, the first party 102 may sign the first association relationship through a public key corresponding to a private key owned by the first party 102 and upload the first association relationship to the target block chain, so that the first association relationship stored in the target block chain is information obtained after the first party 102 signs the public key, and the first association relationship may be obtained only by checking the first party 102's private key, thereby ensuring that other people cannot check the information disclosed in the target block chain, improving the operation right of the first party 102 on the ownership of the target digital asset in the target block chain, and improving the security.
After the first party 102 registers the first association relationship of the ownership of the target digital asset in the target blockchain, the user owning the first entity voucher medium 103 is equivalent to owning the ownership of the target digital asset, because the first private key stored in the first entity voucher medium 103 is private, and the first entity voucher medium 103 can prove its identity and thus own ownership of the target digital asset by using the asymmetric cryptography between the first private key and the first public key.
Optionally, the registration information may further include a unique identifier of the first entity credential medium 103, and when the first party 102 links the first association relationship, the unique identifier of the first entity credential medium 103 may also be linked to the target block chain.
It should be noted that the private key stored in the entity credential medium in the embodiment of the present application may not be readable, and may be stored in the secure element SE, so as to ensure the security of the private key.
Then, when the ownership of the target digital asset needs to be transferred, the first entity voucher medium 103 can be directly handed over to other people, and the ownership of the target digital asset can be transferred by offline transfer of the first entity voucher medium 103, so that the operation of online transfer of the ownership of the target digital asset can be avoided, and the convenience of ownership transfer of the target digital asset is improved.
Of course, instead of directly handing over the entity credential medium, the first association of ownership of the target digital asset may be changed from the first entity credential medium to the second entity credential medium on the target blockchain.
Any entity voucher medium can be carried in the form of a card or an electronic device, that is, ownership of the target digital asset can be changed from one card to another card, or from one card to an electronic device such as a mobile phone, or from an electronic device such as a mobile phone to a card, or from an electronic device to another electronic device, which is not limited in the embodiment of the present application.
In the embodiment of the application, the card of the NFT right is integral and not separable. The card can be dynamically circulated, a user only needs to trade the card when performing offline transaction, and the right of NFT in the card can be verified by inquiring at a first party. Different from the existing cash card, the scheme is based on the dependence on the block chain storage ownership relation and the private key stored in the card, after the card is handed over to a buyer or an added person, a seller cannot tamper data in the background, and then the ownership of the card is changed back to the seller.
Fig. 4 is a flowchart illustrating an alternative implementation of a method for processing ownership of digital assets provided by the embodiment of the present application, which may be performed by the first entity credential medium 103 shown in fig. 1. As shown in fig. 4, the method includes the following steps 401 to 405:
in step 401, the first entity certificate medium receives the unique identifier of the first entity certificate medium sent by the third party.
The first entity voucher medium receives information written by a third party as a unique identifier of the first entity voucher medium. This information may be, for example, a unique identification of the second party's registration with the first party, such as an issuer identification of the second party; the information can also be user information, such as a mailbox, a mobile phone number and the like of the user.
Step 402, the first entity credential medium generates a first public key and a first private key based on at least three of: a unique identification of a second party's registration with the first party, a unique identification of the first entity's voucher medium, and a mnemonic.
A user initializing an entity credential medium via a mobile application, comprising:
step 4041, the first entity voucher medium generates mnemonics;
step 4042, the first entity credential medium generates a first private key of the first entity credential medium based on the mnemonic word, the unique identifier of the first entity credential medium and the registered unique identifier of the second party on the first party;
step 4043, the first entity credential media generates a corresponding first public key based on the first private key.
In step 403, the first entity credential medium 103 obtains the third public key.
The third public key is a public key corresponding to the third private key, and the second entity certificate medium is used for storing the third private key. Alternatively, when the first entity credential medium 103 acquires the third public key in step 403, the third public key stored in the second entity credential medium 104 may be acquired by the first entity credential medium 103 through the second communication connection established with the second entity credential medium 104. Illustratively, a card (first entity credential medium 103) may be brought close to a mobile phone (second entity credential medium 104), a communication connection is established through NFC communication, and the mobile phone sends a third public key to the card, so that the card gets the third public key. Alternatively, the first entity certificate medium 103 may receive the inputted third public key, where the first entity certificate medium 103 may be provided with a user interaction unit, such as a keyboard, a touch screen, a mouse, etc., so as to receive the input of the user.
In step 404, the first entity voucher medium 103 generates change information.
In step 405, the first entity credential medium 103 sends change information to the first party 102.
The first entity credential medium 103 is configured to store a first private key, and the first public key is a public key corresponding to the first private key. The second entity credential medium 104 is to store a third private key, the third public key being a public key corresponding to the third private key.
The change information described above is used to indicate that the first association relationship of the first entity voucher medium 103 with the ownership of the target digital asset is changed to the second association relationship of the second entity voucher medium 104 with the ownership of the target digital asset in the target blockchain. The change of the association relationship is linked from the first party 102 to the target blockchain after the first party 102 successfully authenticates the first entity credential medium 103 based on the information disclosed by the target blockchain.
Specifically, the change information may include the third public key and an identifier of ownership of the target digital asset to indicate that the target to be transferred is the second entity credential medium 104 having the third private key, and the change information may further include authentication information of the first entity credential medium 103, such as a digital signature, which may be obtained by the first entity credential medium 103 signing the specified information by the first private key which is privately owned, so that the first party 102 authenticates the first entity credential medium 103. Optionally, the alteration information may further include a unique identification of the second entity credential medium 104, which is an identification assigned to the second entity credential medium 104, different from the private key.
When authenticating the first entity certificate medium 103, the first party 102 authenticates based on the uplink information disclosed in the target block chain, in which registration information of the ownership of the target digital asset and change information of the ownership every time are stored. First party 102 may look up the uplink information associated with the target digital asset in the target blockchain based on the identification of the target digital asset, thereby determining the latest owner (i.e., the latest associated physical credential medium) of ownership of the target digital asset based on the latest uplink information. The public key of the latest owner may be included in the uplink information, and the digital signature in the change information sent by the first entity certificate medium 103 may be checked based on the public key, and if the result of the check is valid, it is determined that the first entity certificate medium 103 is the latest owner of the ownership of the target digital asset, so that the change from the first association relationship to the second association relationship may be linked to the target block chain, so that the latest owner of the ownership of the target digital asset is changed to the second entity certificate medium 104 having the third private key. In the changed new association relationship, the identity of the second entity credential medium 104 may be certified by the third public key of the second entity credential medium 104, and optionally, the unique identifier of the second entity credential medium 104 may also be linked to the target block chain as auxiliary credential information.
In a specific alternative embodiment, the alteration information may include a second digital signature obtained after the first entity credential medium 103 is signed by the first private key. The second digital signature is used to enable the first party 102 to verify whether the first entity credential medium 103 is the most recent entity credential medium in the target blockchain associated with the target digital asset ownership.
Accordingly, the step 404 of generating the change information by the first entity credential medium 103 can be specifically realized by executing the following steps 4041 to 4043:
step 4041, the first entity credential medium 103 generates a change message body.
The change message body includes the third public key and the unique identifier of the target digital asset. The unique identification of the target digital asset may be used to represent ownership of the target digital asset.
Step 4042, the first entity credential medium 103 signs the altered message body with the first private key to obtain a second digital signature.
Step 4043, the first entity credential medium 103 generates a change message according to the change message text and the second digital signature, and obtains change information.
The change message includes a change message body and a second digital signature.
Alternatively, an exemplary data structure of the change message may be as shown in the following table:
table 2 data structure of change messages
Figure BDA0003612445640000171
Wherein, the change message identifier is used for indicating that the message is a change message; the change time is the time at which ownership of the target digital asset changes.
Optionally, after the first entity credential medium 103 sends the change information to the first party 102 in the step 405, the first entity credential medium 103 may further receive a change confirmation message sent by the first party 102 and control the target module in the first entity credential medium 103 to change from the first state to the second state in response to the change confirmation message.
Illustratively, the change of the target module in the first entity credential medium 103 from the first state to the second state may be achieved by any one or more of the following:
(1) The target module may include a display screen, and the first entity credential medium 103 controls the target module in the first entity credential medium 103 to change from the first state to the second state, including: the first entity voucher medium 103 controls the display content of the display to be changed from the first content to the second content.
For example, the first entity voucher medium 103 can be a visual card with a display that can be set to unavailable or otherwise change the content displayed thereon, illustratively, the display of the visual card can have the identification of the target digital asset displayed thereon before the change confirmation message is received, and the content displayed on the display of the visual card can have the identification of the target digital asset deleted after the change confirmation message is received.
(2) The target module may include an audio playing module, and the first entity voucher medium 103 controls the target module in the first entity voucher medium 103 to change from the first state to the second state, including: the first entity voucher medium 103 controls the change of the playing content of the audio playing module from the third content to the fourth content.
For example, the first entity voucher medium 103 can be a card with a music player, the target digital asset can be music, and the music can be played if the card receives a play instruction before receiving the change confirmation message, and can no longer be played if the card receives a play instruction after receiving the change confirmation message.
(3) The target module may include a storage medium module, and the first entity credential medium 103 controls the target module in the first entity credential medium 103 to change from a first state to a second state, including: the first entity voucher medium 103 controls the change of the storage content of the storage medium module from the fifth content to the sixth content.
For example, the target digital asset itself may be stored in the first entity voucher medium 103, and the stored target digital asset may be deleted after receiving the change confirmation message.
Corresponding to the embodiment shown in fig. 4, fig. 5 is a flowchart illustrating a method for processing ownership of digital assets according to an embodiment of the present application, where the method may be performed by the first party 102 shown in fig. 1, and after performing step 203, as shown in fig. 5, the method may further include steps 601 to 603 as follows:
in step 601, the first party 102 receives the change information sent by the first entity credential medium 103.
The change information is used to indicate a change in the target blockchain of the first association to a second association of the second entity credential medium 104 with the ownership of the target digital asset.
At step 602, the first party 102 verifies whether the first entity voucher medium 103 is the latest entity voucher medium associated with the target digital asset ownership in the target blockchain according to the change information.
The alteration information may include identity information indicating an identity of the first entity credential medium 103, for example, a second digital signature obtained by signing with a first private key of the first entity credential medium 103. When verifying whether the first entity certificate medium 103 is the latest entity certificate medium associated with the target digital asset ownership in the target block chain, the first party 102 may search the latest uplink information of the target digital asset ownership from the target block chain, and check the second digital signature by using the public key stored in the latest uplink information to determine whether the second digital signature is valid. Alternatively, the change information may be a change message (e.g., a data structure shown in table 2), where the change message includes a change message body and a second digital signature, the second digital signature is obtained by the first entity credential medium 103 signing the change message body through the first private key, and the change message body includes a third public key and an identifier for indicating ownership of the target digital asset, so that the first party 102 may determine whether the first entity credential medium 103 is a latest entity credential medium associated with the ownership of the target digital asset in the target block chain by comparing whether the change message body is obtained after verifying and signing the second digital signature.
The change information may also include a unique identification of the target digital asset such that the first party 102 may look up the uplink information in the target blockchain storing an association of ownership of the target digital asset by the unique identification of the target digital asset. Furthermore, the first party 102 checks the second digital signature based on the public key disclosed in the found latest uplink information, and if the result of checking the signature is valid, it is determined that the first entity certificate medium 103 is the latest entity certificate medium associated with the target digital asset ownership, otherwise, in case of failure of checking the signature, it is determined that the first entity certificate medium 103 is not the latest owner of the target digital asset ownership.
Optionally, to improve the accuracy of the target digital asset ownership verification, it may be determined that the association relationship of the target digital asset ownership has been registered in the target blockchain based on the earliest searched uplink information before the first party 102 verifies the second digital signature based on the public key disclosed in the latest searched uplink information.
That is, the uplink information linked with the earliest ownership of the target digital asset is searched, whether the uplink information is the registration information is determined, and if the ownership of the target digital asset is registered, the first entity certificate medium 103 is continuously verified whether the new owner of the ownership of the target digital asset is determined, otherwise, if the ownership of the target digital asset is not registered, the first party 102 may consider that the target digital asset may be untrusted, not perform the change of ownership, and feed back the result of the failed/not-found change of the ownership, thereby avoiding the loss of the rights and interests of the target party to be changed (i.e., the party owning the second entity certificate medium 104).
In step 603, the first party 102 links the change from the first association relationship to the second association relationship to the target block chain if the verification is successful.
After the change of the first party 102 association, a change confirmation message may also be sent to the first entity credential medium 103 and/or the second entity credential medium 104.
Before the first party 102 changes ownership of the target digital asset, the first party 102 needs to verify whether the first entity voucher medium 103 is the most recent owner of ownership of the target digital asset. In addition to changing the ownership of the target digital asset, there may be other situations that require the verification of the latest owner of the target digital asset, and in this case, the processing method for ownership of the digital asset provided in this embodiment of the present application further provides an optional implementation manner, which can implement the verification of whether the entity certificate medium is the latest owner of the ownership of the digital asset.
Fig. 6 is a flowchart illustrating a method for processing ownership of digital asset according to an embodiment of the present application, where the method may be executed by the first entity voucher medium 103 shown in fig. 1, and after executing step 603, as shown in fig. 6, the method may further include the following steps 701 to 703:
in step 701, the first entity credential medium 103 obtains authentication information.
The verification information is used to verify whether the entity credential medium associated with the target digital asset ownership is the first entity credential medium 103. Alternatively, the authentication information may be provided by a "challenger", and when someone (i.e., the "challenger") challenges whether the first entity certificate medium owns a certain digital asset ownership, a piece of authentication information is provided, based on which the first entity certificate medium 103 authenticates the identity of its own owner.
For example, the authentication information may be a randomly generated set of numbers. The authentication information may be obtained by the first entity certificate medium 103 establishing communication with an electronic device of the "challenger", or may be directly input to the first entity certificate medium 103 through the user interaction unit.
In step 702, the first entity certificate medium 103 signs the verification information through the first private key, and obtains a third digital signature.
After obtaining the verification information, the first entity credential medium 103 signs the verification information with the first private key, and the obtained third digital signature is used for enabling the first party to perform signature verification based on the public key of the latest owner disclosed in the target block chain so as to determine whether the first entity credential medium 103 is the owner with the latest ownership of the target digital asset.
The first entity credential medium 103 sends the verification information and the third digital signature to the first party 102, step 703.
After the third digital signature is generated, the verification information and the third digital signature are sent to the first party 102, so that the first party 102 can search the uplink information storing the association relationship of the ownership of the target digital asset in the target block chain, and perform signature verification on the third digital signature according to the public key disclosed in the searched latest uplink information. If the result of the verification is valid, the public key of the latest owner of the ownership of the target digital asset is considered to be paired with the private key used when the third digital signature is signed, so that the first entity certificate medium 103 is confirmed to be the latest entity certificate medium having an association relationship with the ownership of the target digital asset, otherwise, if the result of the verification of the third digital signature is invalid, the verification can be considered to be failed, and the first entity certificate medium 103 is not the latest owner of the ownership of the target digital asset.
Optionally, when the first entity certificate medium 103 signs the verification information through the first private key to obtain the third digital signature in step 702, the first entity certificate medium 103 may generate a verification message body according to the verification information, where the verification message body at least includes the verification information.
Optionally, the verification message body may also include a unique identifier for representing the target digital asset for use as a basis for the first party 102 to look up the uplink information in the target blockchain.
The first entity credential media 103 may then sign the verification message body with the first private key, resulting in a third digital signature.
When the first entity credential medium 103 sends the verification information and the third digital signature to the first party 102 in the step 703, the first entity credential medium 103 may generate a verification message according to the verification message body and the third digital signature, optionally, the verification message may include the verification message body and the third digital signature, and a data structure of an exemplary verification message may be as shown in the following table:
table 3 data structure of verification messages
Figure BDA0003612445640000211
Where the verification message identifier is used to indicate to the first party 102 that the message is a verification message, the first party 102 may perform a verification procedure based on the verification message identifier.
After generating the verification message, the first entity credential medium 103 may send the verification message to the first party 102.
Optionally, after sending the verification information and the third digital signature to the first party 102, the first entity certificate medium 103 may further receive a verification result fed back by the first party 102, where the verification result is used to indicate whether the identity of the first entity certificate medium 103 is the latest entity certificate medium having an association relationship with the target digital asset ownership.
The verification result may be prompted on the related hardware module of the first entity voucher medium 103 by voice, video, image, text, indicator light, etc. For example, if the verification is successful, the indicator light on the card (first entity credential medium 103) is green, otherwise, the indicator light is red, or, if the verification is successful, the display screen on the card shows that the text verification is successful, otherwise, the verification fails, and so on, which are not listed.
In correspondence with the embodiment shown in fig. 6, fig. 7 is a schematic flow chart of an alternative implementation of the method for processing ownership of digital asset provided in the embodiment of fig. 1 of the present application, which may be executed by the first party 102 shown in fig. 1, and after the first party 102 executes step 203, as shown in fig. 7, the method may further include the following steps 801 to 804:
in step 801, the first party 102 receives the verification information and the third digital signature sent by the first entity voucher medium 103.
As described in the embodiment shown in fig. 7, the verification information is used to verify whether the entity credential medium associated with the target digital asset ownership is the first entity credential medium 103, the third digital signature is obtained by the first entity credential medium 103 by signing the verification information with the first private key, and the first private key is stored in the first entity credential medium 103.
In step 802, the first party 102 searches for uplink information storing an association relationship of ownership of the target digital asset in the target blockchain.
The first party 102, after obtaining the verification information and the third digital signature, may be equivalent to receiving a request for the first entity certificate medium 103 to verify the identity of its owner, so as to search, in response to the request, the uplink information storing the association relationship of the ownership of the target digital asset in the target blockchain.
Alternatively, the target digital asset may be indicated by the first entity voucher medium 103, e.g., the first entity voucher medium 103 may send a unique identification of the target digital asset to the first party 102, thereby enabling the first party to determine the target digital asset to be looked up.
In one example, the verification information and the third digital signature sent by the first entity certificate medium 103 received by the first party 102 may be a verification message as described in the embodiment shown in fig. 6, specifically, the verification message includes a verification message body and the third digital signature, and the verification message body includes the verification information and a unique identifier for representing the target digital asset. Alternatively, the data structure of the verification message may be as shown in table 3.
Accordingly, when the first party 102 searches for the uplink information storing the association relationship of the ownership of the target digital asset in the target block chain, the uplink information storing the association relationship of the ownership of the target digital asset may be searched for in the target block chain according to the identifier of the ownership of the target digital asset in the verification message.
In step 803, the first party 102 verifies the third digital signature using the public key of the latest entity credential medium to determine the validity of the third digital signature.
The first party 102 may or may not find at least one uplink message storing an association of ownership of the target digital asset. In the case of the finding, it is considered that the public key of the latest owner of the ownership of the target digital asset is stored in the found latest uplink information, and further, the first party 102 may check the third digital signature through the public key disclosed in the found latest uplink information, and verify the identity of the first entity credential medium 103 according to the validity of the check result.
At step 804, the first party 102 verifies the identity of the first entity credential medium 103 based on the validity of the third digital signature.
Optionally, to improve the verification accuracy, the first party 102 may further determine whether the association relationship of the ownership of the target digital asset is already registered in the target block chain based on the located uplink information before the third digital signature is signed, and the registered information may be registration of the uplink association relationship of the first party 102 in the embodiments shown in fig. 2 and 3.
If the third digital signature is registered, that is, the information initially registered in the association relationship is found, the third digital signature may be signed based on the public key of the latest block, otherwise, if the registered block is not found, the target digital asset is considered not to be linked in the target block chain, may be illegal and untrusted, the verification process of the embodiment of the present application is not performed any more, and a result of the verification failure or a result of the target digital asset being unregistered is fed back.
After the first party 102 determines whether the first entity voucher medium 103 is the latest entity voucher medium having an associated relationship with the ownership of the target digital asset, the first party 102 may further feed back (via a communication connection) a verification result to the first entity voucher medium 103 and/or the verifying party, the verification result being capable of indicating whether the first entity voucher medium 103 is the latest owner of the ownership of the target digital asset. The verification party is a party for providing verification information, such as the "challenger" described in the embodiment shown in fig. 6.
Optionally, the information on the uplink may further include a unique identifier of the first entity credential medium 103, so that, when the verifier performs verification, the first party 102 may further include the unique identifier of the first entity credential medium 103 in addition to the result of the public key-based signature verification, in the verification result that is searched, extracted, and returned by the verifier, so that the verifier performs double confirmation.
That is, the target blockchain further stores the unique identifier of the latest entity voucher medium associated with the target digital asset ownership, and after the first party receives the verification information and the third digital signature sent by the first entity voucher medium, the first party can further acquire the unique identifier of the latest entity voucher medium associated with the target digital asset ownership in the target blockchain, and then verify the identity of the first entity voucher medium through the unique identifier of the latest entity voucher medium.
Further, after the first party verifies the identity of the first entity certificate medium according to the validity of the third digital signature, the first party may feed back a verification result to the first entity certificate medium and/or the verifying party, where the verification result may include, in addition to the validity of the third digital signature, a unique identifier of a latest entity certificate medium associated with the target digital asset ownership, so that the verification result may prove the identity of the first entity certificate medium by using the unique identifier of the latest entity certificate medium associated with the target digital asset ownership as an auxiliary verification manner.
Fig. 8 illustrates a flow diagram of a method for registration of ownership of a digital asset provided by one embodiment of the present application, which may be performed by the third party 105 shown in fig. 1. As shown in fig. 2, the method includes the following steps 901 to 903:
step 901, when a user obtains a first entity credential medium through a third party, the third party obtains user information and a registered unique identifier of a second party on the first party, wherein the user information includes user identity information and user address information.
When a user orders the entity voucher medium on the network, the third party receives user information input by the user and acquires the registered unique identifier of the second party on the first party through communication connection with the second party. The user information comprises user identity information and user address information, the identity information comprises a user mailbox, a mobile phone number and the like, and the user address information is used for a third party to send a first entity certificate medium to a user according to the user address information.
In step 902, the third party generates a unique identifier of the first entity certificate medium based on the user identity information and the unique identifier registered by the second party on the first party, where the unique identifier is used for the first entity certificate medium to generate the first public key and the first private key.
And the third party writes the acquired user identity information and the registered unique identifier of the second party in the first party into the entity certificate medium as the unique identifier of the first entity certificate medium. The unique identification of the first entity certificate medium is used for generating a first public key and a first private key by a user through the mobile application and the unique identification of the first entity certificate medium.
Specifically, a user initializes a first entity credential medium through a mobile application.
In step 903, the third party sends the first entity credential medium containing the unique identifier to the user based on the user address information.
Optionally, the method further includes steps 1001 to 1003 of:
step 1001, when a user obtains a first entity credential medium through a second party, a third party receives target address information sent by the second party and a registered unique identifier of the second party on the first party.
When the user obtains the first entity voucher medium through the second party, the third party obtains the reservation information of the second party through the communication connection with the second party, wherein the reservation information comprises the publisher identification and the mailing address information of the second party.
In step 1002, the third party generates a unique identifier of the first entity credential medium based on the registered unique identifier of the second party at the first party.
And the third party writes the acquired target address information and the registered unique identifier of the second party in the first party into the entity certificate medium so as to be used for the entity certificate medium to generate a first public key and a first private key.
Step 1003, the third party sends the first entity certificate medium containing the unique identifier of the first entity certificate medium to the second party based on the target address information, so that the second party user sends the first entity certificate medium containing the unique identifier of the first entity certificate medium. Optionally, the method further includes the following steps 1101 to 1103:
in step 1101, when the user re-acquires the first entity credential medium, the third party acquires the target information of the user and the target address information of the user.
When the user loses the entity certificate medium and needs to obtain a new entity certificate medium again, the third party obtains user target information and user target address information input by the user, the user target information is user information corresponding to the lost entity certificate medium, and the user target address is mailing address information of the entity certificate medium obtained again by the user.
1102, verifying target information of a user by a third party based on user information;
and under the condition that the third party is successfully verified, the third party generates a unique identifier of the first entity certificate medium based on the user identity information and the unique identifier registered by the second party on the first party, wherein the unique identifier is used for generating a first public key and a first private key by the first entity certificate medium.
Step 1103, the third party sends the first entity credential medium containing the unique identifier to the user based on the user address information.
Fig. 9 is a schematic diagram illustrating a processing apparatus for processing ownership of digital assets according to an embodiment of the present application. The processing device for digital asset ownership provided in the embodiments of the present application may be used to execute the processing method for digital asset ownership provided in the embodiments shown in fig. 3, fig. 5, and fig. 7 of the present application. For parts not detailed in the embodiment of the registration apparatus of digital asset ownership provided in the embodiment of the present application, reference may be made to the description in the embodiment of the processing method of digital asset ownership provided in the embodiments shown in fig. 3, fig. 5, and fig. 7 of the present application.
As shown in fig. 9, the apparatus for processing ownership of a digital asset provided in this embodiment of the present application includes a first receiving unit 11, a verifying unit 12, and an uplink unit 13, where the digital asset is an NFT.
A first receiving unit 11, configured to receive, by a first party, registration information sent by a second party; the second party is an initial owner of the ownership of the target digital asset, the registration information is used for indicating that a first association relationship between the first entity certificate medium and the ownership of the target digital asset is registered in the target block chain, the first entity certificate medium is represented by a first public key acquired by the second party in the first association relationship, the first public key is a public key corresponding to the first private key, and the first private key is stored in the first entity certificate medium; the first public key and the first private key are generated based on at least three of the following under the condition that the user acquires the first entity certificate medium: the unique identification of the second party registered on the first party, the unique identification of the first entity voucher medium and the mnemonic; the unique identification of the first entity credential medium is generated by a third party based on the received user information; the mnemonic words are generated by the first entity voucher medium or by a third party;
the authentication unit 12 is used for the first party to authenticate the identity of the second party according to the registration information;
and an uplink unit 13, configured to, if the verification is successful, the first party uplink the registration of the first association relationship to the target block chain.
Fig. 10 is a schematic structural diagram of a digital asset ownership registration apparatus according to an embodiment of the present application. The device for registering the ownership of the digital asset provided by the embodiment of the application can be used for executing the method for registering the ownership of the digital asset provided by the embodiment of fig. 2 of the application. For parts not described in detail in the embodiments of the registration apparatus of digital asset ownership provided in the embodiments of the present application, reference may be made to the description in the embodiment of the registration method of digital asset ownership provided in the embodiment shown in fig. 2 of the present application.
As shown in fig. 10, the registration apparatus for digital asset ownership provided in the embodiment of the present application includes a first acquisition unit 21, a first generation unit 22, and a first transmission unit 23.
The first obtaining unit 21 is configured to obtain, by the second party, a first public key of the first entity credential medium; wherein the second party is an initial owner of ownership of the target digital asset and the first public key is a public key corresponding to a first private key stored in the first entity credential medium;
the first generation unit 22 is used for the second party to generate the registration information; wherein the registration information is used for indicating that the incidence relation of the first entity certificate medium and the ownership of the target digital asset is registered in the target block chain;
the first sending unit 23 is used for sending the registration information to the first party by the second party; and the registration of the association relation is linked to the target block chain by the first party after the authentication of the second party is successful.
Fig. 11 is a schematic structural diagram of a processing device for digital asset ownership provided in an embodiment of the present application. The apparatus for processing the ownership of digital asset provided in the embodiment of the present application may be configured to execute the method for processing the ownership of digital asset provided in the embodiments shown in fig. 4 and fig. 6 of the present application. For parts not detailed in the embodiment of the registration apparatus of digital asset ownership provided in the embodiment of the present application, reference may be made to the description in the embodiment of the processing method of digital asset ownership provided in the embodiments shown in fig. 4 and 6 of the present application.
As shown in fig. 11, the apparatus for processing digital asset ownership provided in the embodiment of the present application includes a second receiving unit 31, a second generating unit 32, a second obtaining unit 33, and a second sending unit 34.
A second receiving unit 31, configured to receive, by the first entity credential medium, the unique identifier of the first entity credential medium sent by the third party;
a second generating unit 32, configured to generate, by the first entity credential medium, the first public key and the first private key based on at least the following three: the unique identification of the second party registered on the first party, the unique identification of the first entity voucher medium and the mnemonic;
a second obtaining unit 33, configured to obtain the third public key by the first entity credential medium; the second entity certificate medium is used for storing the third private key;
a second generating unit 32, configured to generate change information by the first entity credential medium; the change information is used for indicating that a first incidence relation between a first entity certificate medium and the ownership of the target digital asset is changed into a second incidence relation between a second entity certificate medium and the ownership of the target digital asset in the target block chain, the first entity certificate medium is used for storing a first private key, and the first public key is a public key corresponding to the first private key;
a second sending unit 34, configured to send change information to the first party by using the first entity credential medium; the change from the first association relationship to the second association relationship is that the first party links to the target block chain after the first party successfully authenticates the identity of the first entity certificate medium based on the uplink information in the target block chain.
The embodiment of the present application further provides an entity credential medium, where the entity credential medium includes a secure element SE and a processor, the SE is used to store a private key, and the entity credential medium further stores program instructions, and the program instructions, when executed by the processor, implement the method provided in the embodiment shown in fig. 4 or fig. 6.
Alternatively, the physical voucher medium can be in the form of a card.
Optionally, the entity voucher medium can further comprise a display screen and/or an audio playing module.
As shown in fig. 12, the apparatus for processing digital asset ownership provided in the embodiment of the present application includes a third obtaining unit 41, a third generating unit 42, and a third transmitting unit 43.
A third obtaining unit 41, configured to, when a user obtains the first entity credential medium through a third party, obtain user information and a unique identifier registered by the second party on the first party, where the user information includes user identity information and user address information;
a third generating unit 42, configured to generate, by the third party, a unique identifier of the first entity credential medium based on the user identity information and the unique identifier registered by the second party on the first party, where the unique identifier is used for the first entity credential medium to generate the first public key and the first private key;
a third sending unit 43, configured to send, by the third party, the first entity credential medium containing the unique identifier to the user based on the user address information.
Optionally, the apparatus further comprises: a third receiving unit 44, configured to, when the user obtains the first entity credential medium through the second party, receive, by the third party, the destination address information sent by the second party and the unique identifier registered by the second party on the first party; a third generating unit 42, configured to generate, by the third party, the unique identifier of the first entity credential medium based on the unique identifier of the second party registered with the first party; a third sending unit 43, configured to send, by the third party, the first entity credential medium including the unique identifier of the first entity credential medium to the second party based on the destination address information, so that the second party user sends the first entity credential medium including the unique identifier of the first entity credential medium.
Optionally, the apparatus further comprises: a third obtaining unit 41, configured to, when the user obtains the first entity credential medium again, obtain target information of the user and user target address information by a third party; a third verification unit 45 for verifying the target information of the user based on the user information by a third party; a third generating unit 42, configured to, when the third party succeeds in verification, generate, by the third party, a unique identifier of the first entity credential medium based on the user identity information and a unique identifier registered by the second party on the first party, where the unique identifier is used for the first entity credential medium to generate the first public key and the first private key; a third sending unit 43, configured to send, by the third party, the first entity credential medium containing the unique identifier to the user based on the user address information.
An embodiment of the present application further provides an electronic device, including: a processor and a memory storing program instructions; a processor, when executing program instructions, implements a method as provided in any of the embodiments of fig. 2-8.
Embodiments of the present application further provide a program product, where instructions in the program product, when executed by a processor of an electronic device, enable the electronic device to perform the method provided in any one of the embodiments shown in fig. 2 to 8.
Fig. 13 shows a hardware structure diagram of an electronic device according to an embodiment of the present application.
The electronic device may include a processor 1301 and a memory 1302 storing program instructions.
Specifically, the processor 1301 may include a Central Processing Unit (CPU), or an Application Specific Integrated Circuit (ASIC), or may be configured to implement one or more Integrated circuits of the embodiments of the present Application.
Memory 1302 may include mass storage for data or instructions. By way of example, and not limitation, memory 1302 may include a Hard Disk Drive (HDD), a floppy Disk Drive, flash memory, an optical Disk, a magneto-optical Disk, magnetic tape, or a Universal Serial Bus (USB) Drive or a combination of two or more of these. Memory 1302 may include removable or non-removable (or fixed) media, where appropriate. Memory 1302 may be internal or external to the integrated gateway disaster recovery device, where appropriate. In a particular embodiment, the memory 1302 is non-volatile solid-state memory.
In a particular embodiment, memory 1302 includes Read Only Memory (ROM). Where appropriate, the ROM may be mask-programmed ROM, programmable ROM (PROM), erasable PROM (EPROM), electrically Erasable PROM (EEPROM), electrically rewritable ROM (EAROM), or flash memory, or a combination of two or more of these.
The memory may include Read Only Memory (ROM), random Access Memory (RAM), magnetic disk storage media devices, optical storage media devices, flash memory devices, electrical, optical, or other physical/tangible memory storage devices. Thus, in general, the memory includes one or more tangible (non-transitory) readable storage media (e.g., a memory device) encoded with software comprising computer-executable instructions and when the software is executed (e.g., by one or more processors), it is operable to perform operations described with reference to the method according to an aspect of the application.
The processor 1301 realizes any one of the above-described embodiments by reading and executing program instructions stored in the memory 1302.
In one example, the electronic device may also include a communication interface 1303 and a bus 1310. As shown in fig. 13, the processor 1301, the memory 1302, and the communication interface 1303 are connected to each other via a bus 1310 to complete communication therebetween.
The communication interface 1303 is mainly used to implement communication between modules, apparatuses, units and/or devices in this embodiment of the application.
The bus 1310 includes hardware, software, or both to couple the components of the electronic device to one another. By way of example, and not limitation, a bus may include an Accelerated Graphics Port (AGP) or other graphics bus, an Enhanced Industry Standard Architecture (EISA) bus, a Front Side Bus (FSB), a Hypertransport (HT) interconnect, an Industry Standard Architecture (ISA) bus, an infiniband interconnect, a Low Pin Count (LPC) bus, a memory bus, a Micro Channel Architecture (MCA) bus, a Peripheral Component Interconnect (PCI) bus, a PCI-Express (PCI-X) bus, a Serial Advanced Technology Attachment (SATA) bus, a video electronics standards association local (VLB) bus, or other suitable bus or a combination of two or more of these. Bus 1310 may include one or more buses, where appropriate. Although specific buses are described and shown in the embodiments of the present application, any suitable buses or interconnects are contemplated by the present application.
The embodiment of the application can be realized by providing a readable storage medium. The readable storage medium having stored thereon program instructions; which when executed by a processor implements any of the methods in the embodiments described above.
It is to be understood that the present application is not limited to the particular arrangements and instrumentality described above and shown in the attached drawings. A detailed description of known methods is omitted herein for the sake of brevity. In the above embodiments, several specific steps are described and shown as examples. However, the method processes of the present application are not limited to the specific steps described and illustrated, and those skilled in the art can make various changes, modifications, and additions or change the order between the steps after comprehending the spirit of the present application.
The functional blocks shown in the above-described structural block diagrams may be implemented as hardware, software, firmware, or a combination thereof. When implemented in hardware, it may be, for example, an electronic circuit, an Application Specific Integrated Circuit (ASIC), suitable firmware, plug-in, function card, or the like. When implemented in software, the elements of the present application are the programs or code segments used to perform the required tasks. The program or code segments may be stored in a machine-readable medium or transmitted by a data signal carried in a carrier wave over a transmission medium or a communication link. A "machine-readable medium" may include any medium that can store or transfer information. Examples of a machine-readable medium include an electronic circuit, a semiconductor memory device, a ROM, a flash memory, an Erasable ROM (EROM), a floppy disk, a CD-ROM, an optical disk, a hard disk, an optical fiber medium, a Radio Frequency (RF) link, and so forth. The code segments may be downloaded via computer networks such as the internet, intranet, etc.
It should also be noted that the exemplary embodiments mentioned in this application describe some methods or systems based on a series of steps or devices. However, the present application is not limited to the order of the above-described steps, that is, the steps may be performed in the order mentioned in the embodiments, may be performed in an order different from the order in the embodiments, or may be performed simultaneously.
Aspects of the present application are described above with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by program instructions. These program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, enable the implementation of the functions/acts specified in the flowchart and/or block diagram block or blocks. Such a processor may be, but is not limited to, a general purpose processor, a special purpose processor, an application specific processor, or a field programmable logic circuit. It will also be understood that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware for performing the specified functions or acts, or combinations of special purpose hardware and computer instructions.
As described above, only the specific embodiments of the present application are provided, and it can be clearly understood by those skilled in the art that, for convenience and brevity of description, the specific working processes of the system, the module and the unit described above may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. It should be understood that the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive various equivalent modifications or substitutions within the technical scope of the present application, and these modifications or substitutions should be covered within the scope of the present application.

Claims (38)

1. A method for processing ownership of a digital asset, wherein the digital asset is NFT, the method comprising:
the first party receives the registration information sent by the second party; the second party is an initial owner of the ownership of the target digital asset, the registration information is used for indicating that a first association relationship between a first entity certificate medium and the ownership of the target digital asset is registered in a target block chain, the first entity certificate medium is represented by a first public key obtained by the second party in the first association relationship, the first public key is a public key corresponding to a first private key, and the first private key is stored in the first entity certificate medium; the first public key and the first private key are generated based on at least three of the following under the condition that the user obtains the first entity certificate medium: a unique identifier of the second party at the first party's registration, a unique identifier of the first entity's credential medium, and a mnemonic; the unique identifier of the first entity credential media is generated by a third party based on the received user information; the mnemonic words are generated by the first entity voucher medium or the third party;
the first party verifies the identity of the second party according to the registration information;
and the first party uplinks the registration of the first association relation to the target block chain under the condition of successful verification.
2. The method of claim 1, wherein the registration information comprises a first digital signature generated by the second party using a second private key, and wherein the first party verifies the identity of the second party based on the registration information comprises:
the first party analyzes the registration information to obtain the first digital signature;
the first party acquires a second public key corresponding to the second party;
the first party verifies the first digital signature by using the second public key so as to judge the validity of the first digital signature;
the first party verifies the identity of the second party based on the validity of the first digital signature.
3. The method of claim 2, wherein the registration message is a registration message, and the first party parses the registration message to obtain the first digital signature, comprising:
the first party analyzes the registration message to obtain a registration message text and the first digital signature; and the first digital signature is obtained by the second party by using the second private key to sign the registration message body.
4. The method of claim 1, wherein the registration information further comprises a unique identification of the first entity credential medium;
the first party, in case of successful verification, uplinks the registration of the first association relationship to the target block chain, including:
and the first party links the registration of the first association relation and the unique identification of the first entity certificate medium into the target block chain under the condition of successful verification.
5. The method of claim 1, further comprising, after uplink of the registration of the first association into the target block chain:
the first party receives change information sent by the first entity certificate medium; wherein the change information is used to indicate that the first association relationship is changed into a second association relationship between a second entity certificate medium and the ownership of the target digital asset in the target blockchain, and in the second association relationship, the second entity certificate medium is represented by a third public key acquired by the first entity certificate medium, the third public key is a public key corresponding to a third private key, and the third private key is stored in the second entity certificate medium;
the first party verifies whether the first entity certificate medium is the latest entity certificate medium associated with the target digital asset ownership in the target block chain according to the change information;
and the first party links the change from the first incidence relation to the second incidence relation to the target block chain under the condition of successful verification.
6. The method of claim 5, wherein the change information comprises a second digital signature generated by the first entity credential medium using the first private key, and wherein the first party verifies whether the first entity credential medium is a latest entity credential medium in the target blockchain associated with the target digital asset ownership according to the change information, comprising:
the first party analyzes the change information to obtain the second digital signature;
the first party acquires a public key of a latest entity certificate medium associated with the target digital asset ownership in the target block chain;
the first party verifies the second digital signature by using the public key of the latest entity certificate medium so as to judge the validity of the second digital signature;
the first party verifies the identity of the first entity credential medium based on the validity of the second digital signature.
7. The method of claim 6, wherein the change information includes a unique identification of the target digital asset, and wherein the first party obtains a latest public key associated with ownership of the target digital asset in the target blockchain, including:
the first party searches uplink information storing the incidence relation of the ownership of the target digital asset in the target block chain through the unique identifier of the target digital asset;
and the first party extracts the latest public key from the searched latest uplink information.
8. The method of claim 7, wherein the registration information includes a unique identifier of the target digital asset, and further comprising, before the first party signs the second digital signature using the latest public key to determine the validity of the second digital signature:
and the first party searches the registration information of the incidence relation storing the ownership of the target digital asset in the target block chain.
9. The method of claim 6, wherein the change information is a change message, wherein the change message includes a change message body and the second digital signature, wherein the second digital signature is obtained by the first entity credential medium signing the change message body with the first private key, and wherein the change message body includes the third public key and the unique identifier of the target digital asset.
10. The method of claim 5, wherein the first party, upon successful verification, after uploading the change to the first association relationship into the target blockchain, further comprises:
and the first party sends a change confirmation message to the first entity certificate medium and/or the second entity certificate medium.
11. The method of claim 1, further comprising, after uplink of the registration of the first association into the target block chain:
the first party receives the verification information and the third digital signature sent by the first entity certificate medium; the third digital signature is obtained by the first entity certificate medium through signing the verification information through the first private key;
the first party acquires a public key of a latest entity certificate medium associated with the target digital asset ownership in the target block chain;
the first party verifies the third digital signature by using the public key of the latest entity certificate medium so as to judge the validity of the third digital signature;
the first party verifies the identity of the first entity credential medium based on the validity of the third digital signature.
12. The method of claim 11, wherein the first party receives the verification information and the third digital signature from the first entity credential medium, comprising:
the first party receives a verification message sent by the first entity certificate medium; the verification message comprises a verification message body and the third digital signature, and the verification message body comprises the verification information.
13. The method of claim 12, wherein the verification message body further includes a unique identification of the target digital asset;
the first party obtaining a public key of a latest entity credential medium associated with the target digital asset ownership in the target blockchain, including:
the first party searches uplink information storing the incidence relation of the ownership of the target digital asset in the target block chain through the unique identifier of the target digital asset;
and the first party extracts the public key of the latest entity certificate medium from the searched latest uplink information.
14. The method of claim 12, wherein the target blockchain further stores a unique identifier of a latest entity voucher medium associated with the target digital asset ownership, and wherein after the first party receives the verification information and the third digital signature transmitted by the first entity voucher medium, the method further comprises:
the first party acquires the unique identification of the latest entity certificate medium associated with the target digital asset ownership in the target block chain;
and the first party verifies the identity of the first entity certificate medium through the unique identification of the latest entity certificate medium.
15. The method of claim 11, further comprising, before the first party signs the third digital signature using the public key of the up-to-date entity credential medium to determine the validity of the third digital signature:
and the first party searches the registration information of the incidence relation storing the ownership of the target digital asset in the target block chain.
16. The method of claim 14, further comprising, after the first party verifies the identity of the first entity credential medium based on the validity of the third digital signature:
the first party feeds back a verification result to the first entity certificate medium and/or the verifying party; wherein the verification result is used for indicating the identity of the first entity certificate medium, and the verifier is used for providing the verification information; the verification result includes the validity of the third digital signature or, in addition to the validity of the third digital signature, the verification result includes a unique identification of a latest entity credential medium associated with the target digital asset ownership.
17. A method for registering ownership rights in a digital asset, comprising:
the second party obtains a first public key of the first entity certificate medium; wherein the second party is an initial owner of ownership of the target digital asset and the first public key is a public key corresponding to a first private key stored in the first entity credential medium;
the second party generating registration information; wherein the registration information is to indicate that an association of the first entity credential medium and the target digital asset ownership is registered in a target blockchain;
the second party sends the registration information to the first party; wherein the registration of the association is uplinked to the target blockchain by the first party after successful authentication of the second party.
18. The method of claim 17, wherein the registration information comprises a first digital signature generated by the second party using a second private key, the first digital signature being used to enable the first party to verify the identity of the second party by a second public key, the second public key being a public key corresponding to the second private key; the second party generating registration information, including:
the second party generates a registration message text; wherein the registration message body comprises the first public key and the unique identifier of the target digital asset;
the second party signs the registration message text through the second private key to obtain the first digital signature;
the second party generates a registration message according to the registration message text and the first digital signature to obtain the registration information; wherein the registration message comprises the registration message body and the first digital signature.
19. The method of claim 17, wherein obtaining, by the second party, the first public key of the first entity credential medium comprises:
the second party acquires the first public key stored in the first entity certificate medium through a first communication connection established with the first entity certificate medium; alternatively, the first and second electrodes may be,
the second party searches the pre-stored first public key according to the identifier of the first entity certificate medium; alternatively, the first and second electrodes may be,
the second party receives the first public key as input.
20. The method of claim 17, wherein the target digital asset ownership is represented by a digital file of the target digital asset.
21. The method of claim 17, wherein the registration information further comprises at least one of: a storage address of the target digital asset; a time of release of the target digital asset; a unique identification of the first entity credential medium.
22. A method for processing ownership of a digital asset, comprising:
the first entity certificate medium receives the unique identification of the first entity certificate medium sent by the third party;
the first entity credential medium generates a first public key and a first private key based on at least three of: the unique identification of the second party registered on the first party, the unique identification of the first entity voucher medium and the mnemonic;
the first entity certificate medium acquires a third public key; the second entity certificate medium is used for storing the third private key;
the first entity voucher medium generates change information; wherein the change information is used for indicating that a first association relationship between the first entity certificate medium and the ownership of the target digital asset is changed into a second association relationship between the second entity certificate medium and the ownership of the target digital asset in a target blockchain, the first entity certificate medium is used for storing the first private key, and the first public key is a public key corresponding to the first private key;
the first entity credential medium sends the change information to a first party; wherein the change from the first association to the second association is that the first party links to the target block chain after the first party successfully authenticates the first entity credential medium based on the uplink information in the target block chain.
23. The method of claim 22, wherein the change information comprises a second digital signature obtained after the first entity credential medium is signed with the first private key, and wherein the second digital signature is used for enabling the first party to verify whether the identity of the first entity credential medium is the latest entity credential medium in the target block chain associated with the target digital asset ownership; the first entity credential medium generates change information, including:
the first entity voucher medium generates a change message text; wherein the change message body comprises the third public key and the unique identifier of the target digital asset;
the first entity certificate medium signs the change message text by using the first private key to obtain the second digital signature;
the first entity certificate medium generates a change message according to the change message text and the second digital signature to obtain the change information; wherein the change message comprises the change message body and the second digital signature.
24. The method of claim 22, wherein obtaining the third public key by the first entity credential medium comprises:
the first entity certificate medium acquires the third public key stored in the second entity certificate medium through a second communication connection established with the second entity certificate medium; alternatively, the first and second electrodes may be,
the first entity credential medium receives the third public key as input.
25. The method of claim 22, further comprising, after the first entity-credential medium sends the change information to the first party:
the first entity certificate medium receives a change confirmation message sent by the first party; wherein the change confirmation message is used to indicate that the first party has uplink the change of the first association relationship to the target block chain;
in response to the change confirmation message, the first entity credential medium controls a target module in the first entity credential medium to change from a first state to a second state.
26. The method of claim 25,
the target module comprises a display screen, and the first entity certificate medium controls the target module in the first entity certificate medium to change from a first state to a second state, and the method comprises the following steps: the first entity certificate medium controls the display content of the display screen to change from first content to second content; and/or the presence of a gas in the gas,
the target module comprises an audio playing module, and the first entity certificate medium controls the target module in the first entity certificate medium to change from a first state to a second state, and the method comprises the following steps: the first entity certificate medium controls the playing content of the audio playing module to be changed from third content to fourth content; and/or the presence of a gas in the atmosphere,
the target module comprises a storage medium module, and the first entity certificate medium controls the target module in the first entity certificate medium to change from a first state to a second state, and the method comprises the following steps: the first entity certificate medium controls the storage content of the storage medium module to be changed from fifth content to sixth content.
27. The method of claim 22, further comprising:
the first entity voucher medium acquires authentication information;
the first entity certificate medium signs the verification information by using the first private key to obtain a third digital signature;
the first entity credential medium sending the verification information and the third digital signature to the first party;
the first party is configured to check the third digital signature based on uplink information related to the target digital asset in the target block chain, so as to determine whether the identity of the first entity certificate medium is the latest entity certificate medium having an association relationship with the ownership of the target digital asset.
28. The method of claim 27, wherein the first entity credential medium signs the verification information using the first private key, resulting in a third digital signature, comprising:
the first entity certificate medium generates a verification message text according to the verification information;
the first entity certificate medium signs the verification message text by using the first private key to obtain a third digital signature;
the first entity credential media sending the verification information and the third digital signature to the first party including:
the first entity certificate medium generates a verification message according to the verification message text and the third digital signature;
and the first entity certificate medium sends the verification message to the first party.
29. The method of claim 28 wherein the verification message body includes a unique identifier of the target digital asset, the unique identifier of the target digital asset being used as a basis for the first party to locate uplink information associated with the target digital asset in the target blockchain.
30. The method of claim 27, wherein after the first entity credential medium sends the verification information and the third digital signature to the first party, further comprising:
the first entity certificate medium receives a verification result fed back by the first party; wherein the verification result is used for indicating whether the identity of the first entity certificate medium is the latest entity certificate medium having an association relation with the target digital asset ownership.
31. A method for processing ownership of a digital asset, comprising:
when a user obtains a first entity certificate medium through a third party, the third party obtains user information and a registered unique identifier of a second party on the first party, wherein the user information comprises user identity information and user address information;
a third party generates a unique identifier of a first entity certificate medium based on user identity information and a registered unique identifier of a second party on a first party, wherein the unique identifier is used for generating a first public key and a first private key by the first entity certificate medium;
and the third party sends the first entity certificate medium containing the unique identification to the user based on the user address information.
32. The method of claim 31, further comprising:
when a user obtains a first entity certificate medium through a second party, a third party receives target address information sent by the second party and a registered unique identifier of the second party on the first party;
the third party generates the unique identification of the first entity certificate medium based on the registered unique identification of the second party at the first party;
and the third party sends the first entity certificate medium containing the unique identifier of the first entity certificate medium to the second party based on the target address information, so that the second party user sends the first entity certificate medium containing the unique identifier of the first entity certificate medium.
33. The method of claim 31 or 32, further comprising:
when the user acquires the first entity certificate medium again, the third party acquires the target information and the target address information of the user;
the third party verifies the target information of the user based on the user information;
under the condition that the third party is successfully verified, the third party generates a unique identifier of a first entity certificate medium based on user identity information and a registered unique identifier of the second party on the first party, wherein the unique identifier is used for the first entity certificate medium to generate a first public key and a first private key;
and the third party sends the first entity certificate medium containing the unique identification to the user based on the user address information.
34. A device for processing ownership of a digital asset, said digital asset being NFT, comprising:
a first receiving unit, configured to receive, by a first party, registration information sent by a second party; wherein the second party is an initial owner of the ownership of the target digital asset, the registration information is used for indicating a first association relationship of registering a first entity certificate medium and the ownership of the target digital asset in the target block chain, the first entity certificate medium is represented by a first public key acquired by the second party in the first association relationship, the first public key is a public key corresponding to a first private key, and the first private key is stored in the first entity certificate medium; the first public key and the first private key are generated based on at least three of the following under the condition that the user obtains the first entity certificate medium: a unique identifier of the second party at the first party's registration, a unique identifier of the first entity's credential medium, and a mnemonic; the unique identifier of the first entity credential media is generated by a third party based on the received user information; the mnemonic words are generated by the first entity voucher medium or the third party;
the verification unit is used for verifying the identity of the second party by the first party according to the registration information;
and a uplink unit, configured to, if the first party succeeds in verification, uplink the registration of the first association relationship to the target block chain.
35. An apparatus for registering ownership of a digital asset, comprising:
the first obtaining unit is used for obtaining a first public key of the first entity certificate medium by the second party; wherein the second party is an initial owner of ownership of the target digital asset and the first public key is a public key corresponding to a first private key stored in the first entity credential medium;
a first generation unit for the second party to generate registration information; wherein the registration information is used to indicate an association registering the first entity credential medium and the target digital asset ownership in a target blockchain;
a first sending unit, configured to send the registration information to a first party by the second party; wherein the registration of the association is uplinked to the target blockchain by the first party after successful authentication of the second party.
36. A device for processing digital asset ownership, comprising:
the second receiving unit is used for the first entity certificate medium to receive the unique identifier of the first entity certificate medium sent by the third party;
a second generating unit, configured to generate, by the first entity credential medium, the first public key and the first private key based on at least the following three: the unique identification of the second party registered on the first party, the unique identification of the first entity voucher medium and the mnemonic;
a second obtaining unit, configured to obtain, by the first entity credential medium, a third public key; the second entity certificate medium is used for storing the third private key;
the second generation unit is used for generating change information by the first entity certificate medium; wherein the change information is used for indicating that a first association relationship between the first entity certificate medium and the ownership of the target digital asset is changed into a second association relationship between the second entity certificate medium and the ownership of the target digital asset in a target blockchain, the first entity certificate medium is used for storing the first private key, and the first public key is a public key corresponding to the first private key;
a second sending unit, configured to send the change information to a first party by using the first entity credential medium; wherein the change from the first association relationship to the second association relationship is that the first party links to the target blockchain after the first party successfully authenticates the first entity credential medium based on the uplink information in the target blockchain.
37. A device for processing digital asset ownership, comprising:
the third acquisition unit is used for acquiring user information and a registered unique identifier of a second party on a first party when a user acquires a first entity certificate medium through a third party, wherein the user information comprises user identity information and user address information;
a third generation unit, configured to generate, by a third party, a unique identifier of a first entity credential medium based on user identity information and a unique identifier registered by the second party on the first party, where the unique identifier is used for the first entity credential medium to generate a first public key and a first private key;
and the third sending unit is used for sending the first entity certificate medium containing the unique identifier to the user by a third party based on the user address information.
38. An electronic device, characterized in that the electronic device comprises: a processor and a memory storing a private key and program instructions;
the processor, when executing the program instructions, implements the method of any of claims 1-33.
CN202210434504.9A 2022-04-24 2022-04-24 Registration and processing method and device for ownership of digital assets Active CN114978596B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210434504.9A CN114978596B (en) 2022-04-24 2022-04-24 Registration and processing method and device for ownership of digital assets

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210434504.9A CN114978596B (en) 2022-04-24 2022-04-24 Registration and processing method and device for ownership of digital assets

Publications (2)

Publication Number Publication Date
CN114978596A CN114978596A (en) 2022-08-30
CN114978596B true CN114978596B (en) 2023-04-18

Family

ID=82980225

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210434504.9A Active CN114978596B (en) 2022-04-24 2022-04-24 Registration and processing method and device for ownership of digital assets

Country Status (1)

Country Link
CN (1) CN114978596B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP7459199B1 (en) * 2022-09-20 2024-04-01 キヤノン株式会社 Image Processing System

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553662A (en) * 2014-10-29 2016-05-04 航天信息股份有限公司 Dynamic digital right management method and system based on identification password
CN107566116A (en) * 2017-06-15 2018-01-09 中国银联股份有限公司 The method and device of registration is really weighed for digital asset
CN110956453A (en) * 2019-11-22 2020-04-03 肖光昱 Circulation payment clearing method and device based on asset digital certificate and medium
CN111213170A (en) * 2018-09-18 2020-05-29 王健 Asset hosting method, storage medium, blockchain system, and blockchain node
CN111460525A (en) * 2020-03-31 2020-07-28 腾讯科技(深圳)有限公司 Data processing method and device based on block chain and storage medium
US10783597B1 (en) * 2019-08-12 2020-09-22 Alibaba Group Holding Limited Blockchain-based judgment execution
CN112543166A (en) * 2019-09-20 2021-03-23 北京思源政通科技集团有限公司 Real name login method and device
CN112990925A (en) * 2021-04-21 2021-06-18 支付宝(杭州)信息技术有限公司 Asset certificate management method and device
CN113076527A (en) * 2021-04-19 2021-07-06 支付宝(杭州)信息技术有限公司 Block chain-based digital asset processing method and device
CN113327165A (en) * 2021-06-07 2021-08-31 支付宝(杭州)信息技术有限公司 Transaction method based on block chain
CN113469820A (en) * 2021-07-27 2021-10-01 支付宝(杭州)信息技术有限公司 Asset management method, device and system based on block chain
CN113506111A (en) * 2021-09-07 2021-10-15 支付宝(杭州)信息技术有限公司 Entity article ownership registration method and device based on block chain
CN113610520A (en) * 2021-07-21 2021-11-05 上海浦东发展银行股份有限公司 Data processing method, system, device, computer equipment and storage medium
CN113743921A (en) * 2021-09-09 2021-12-03 网易(杭州)网络有限公司 Digital asset processing method, device, equipment and storage medium
CN114218591A (en) * 2021-12-17 2022-03-22 上海旺链信息科技有限公司 Digital asset management method capable of realizing anonymous transaction

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2020154741A1 (en) * 2019-01-27 2020-07-30 Auth9, Inc. Method, computer program product and apparatus for transferring ownership of digital assets

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105553662A (en) * 2014-10-29 2016-05-04 航天信息股份有限公司 Dynamic digital right management method and system based on identification password
CN107566116A (en) * 2017-06-15 2018-01-09 中国银联股份有限公司 The method and device of registration is really weighed for digital asset
CN111213170A (en) * 2018-09-18 2020-05-29 王健 Asset hosting method, storage medium, blockchain system, and blockchain node
US10783597B1 (en) * 2019-08-12 2020-09-22 Alibaba Group Holding Limited Blockchain-based judgment execution
CN112543166A (en) * 2019-09-20 2021-03-23 北京思源政通科技集团有限公司 Real name login method and device
CN110956453A (en) * 2019-11-22 2020-04-03 肖光昱 Circulation payment clearing method and device based on asset digital certificate and medium
CN111460525A (en) * 2020-03-31 2020-07-28 腾讯科技(深圳)有限公司 Data processing method and device based on block chain and storage medium
CN113076527A (en) * 2021-04-19 2021-07-06 支付宝(杭州)信息技术有限公司 Block chain-based digital asset processing method and device
CN112990925A (en) * 2021-04-21 2021-06-18 支付宝(杭州)信息技术有限公司 Asset certificate management method and device
CN113327165A (en) * 2021-06-07 2021-08-31 支付宝(杭州)信息技术有限公司 Transaction method based on block chain
CN113610520A (en) * 2021-07-21 2021-11-05 上海浦东发展银行股份有限公司 Data processing method, system, device, computer equipment and storage medium
CN113469820A (en) * 2021-07-27 2021-10-01 支付宝(杭州)信息技术有限公司 Asset management method, device and system based on block chain
CN113506111A (en) * 2021-09-07 2021-10-15 支付宝(杭州)信息技术有限公司 Entity article ownership registration method and device based on block chain
CN113743921A (en) * 2021-09-09 2021-12-03 网易(杭州)网络有限公司 Digital asset processing method, device, equipment and storage medium
CN114218591A (en) * 2021-12-17 2022-03-22 上海旺链信息科技有限公司 Digital asset management method capable of realizing anonymous transaction

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
何源源 .数字版权保护中的区块链智能合约法律规制研究.中国优秀硕士学位论文全文数据库 中国优秀硕士学位论文全文数据库 信息科技辑.2020,G117-192. *
曹迪龙.基于区块链的数字作品交易系统的研究.计算机技术与发展.2021,全文. *

Also Published As

Publication number Publication date
CN114978596A (en) 2022-08-30

Similar Documents

Publication Publication Date Title
TWI697842B (en) Two-dimensional barcode processing method, device and system
US11870769B2 (en) System and method for identifying a browser instance in a browser session with a server
KR102358546B1 (en) System and method for authenticating a client to a device
US20190251561A1 (en) Verifying an association between a communication device and a user
US9124571B1 (en) Network authentication method for secure user identity verification
EP2962421B1 (en) Systems, methods and devices for performing passcode authentication
KR101829730B1 (en) Method for certifying a user by using mobile id through blockchain database, and terminal and server using the same
CN103167491A (en) Authentication method of mobile terminal uniqueness based on software digital certificate
US9065806B2 (en) Internet based security information interaction apparatus and method
US20070067227A1 (en) Equipment-information transmitting apparatus, service control apparatus, equipment-information transmitting method, and computer products
US20140172741A1 (en) Method and system for security information interaction based on internet
JP2015088080A (en) Authentication system, authentication method, and program
WO2019010669A1 (en) Method, apparatus and system for identity validity verification
US8601270B2 (en) Method for the preparation of a chip card for electronic signature services
CN114978596B (en) Registration and processing method and device for ownership of digital assets
US20220286294A1 (en) Secure digital signing of a document
CN107872321B (en) Electronic identity authentication method and electronic identity terminal equipment
JP2010182070A (en) Apparatus, method and program for processing information
US11936649B2 (en) Multi-factor authentication
CN112150151B (en) Secure payment method, apparatus, electronic device and storage medium
JP6988525B2 (en) Registration system and registration method
JP2019050014A (en) Account opening system, account opening method, and program
CN115037484B (en) Digital collection receiving method and device and electronic equipment
US20220269770A1 (en) Information processing system, server apparatus, information processing method, and computer program product
KR20160039593A (en) Method for Providing OTP based on Location

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant