CN117094723A - Digital asset transaction management method, system, device and storage medium - Google Patents

Digital asset transaction management method, system, device and storage medium Download PDF

Info

Publication number
CN117094723A
CN117094723A CN202310145114.4A CN202310145114A CN117094723A CN 117094723 A CN117094723 A CN 117094723A CN 202310145114 A CN202310145114 A CN 202310145114A CN 117094723 A CN117094723 A CN 117094723A
Authority
CN
China
Prior art keywords
digital asset
user
identity information
platform
transaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310145114.4A
Other languages
Chinese (zh)
Inventor
袁丽
踪训杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Resources Digital Technology Co Ltd
Original Assignee
China Resources Digital Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Resources Digital Technology Co Ltd filed Critical China Resources Digital Technology Co Ltd
Priority to CN202310145114.4A priority Critical patent/CN117094723A/en
Publication of CN117094723A publication Critical patent/CN117094723A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6254Protecting personal data, e.g. for financial or medical purposes by anonymising data, e.g. decorrelating personal data from the owner's identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • General Business, Economics & Management (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Medical Informatics (AREA)
  • Databases & Information Systems (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention provides a digital asset transaction management method, a digital asset transaction management system, digital asset transaction management equipment and a digital asset transaction management storage medium, and relates to the technical field of blockchain. The method comprises the following steps: acquiring the decentralized transaction identity information of the first user, and the digital asset holding certificate and the verifiable certificate, performing trusted verification on the digital asset issuing platform according to the transaction identity information and the verifiable certificate, and transferring the target digital asset to the second user according to the transfer instruction and the first digital asset holding certificate when the verification state is a trusted state and the decentralized transfer identity information of the second user is acquired. The user identity verification is performed by using the decentralization identity platform, and the user cannot acquire the real identity information of the user, so that the user can autonomously control the digital identity information in the digital asset transaction process, the leakage of excessive identity privacy is avoided, and the user identity information safety can be ensured in the digital asset transaction process.

Description

Digital asset transaction management method, system, device and storage medium
Technical Field
The present invention relates to the field of blockchain technologies, and in particular, to a digital asset transaction management method, system, device, and storage medium.
Background
Digital assets are non-monetary assets stored on a digital medium that are owned or controlled by an enterprise or individual and exist in electronic data form, such as digital photographic works, electronic pictorial representations, or the like, with collection attributes, and digital collections are also a type of digital asset. At present, most digital collection issuing platforms establish respective alliance chains, digital collections of different issuing platforms can only circulate on the own alliance chains, and cross-platform sharing and circulation are difficult to realize, so that the asset value of the digital collections is limited. If the transaction of the digital asset is performed through the third-party platform, the third-party platform needs to acquire the real identity information and the asset information of the user, and the security of the third-party platform cannot be ensured. It is therefore desirable to provide a transaction management method that secures user identity information during the performance of digital asset transactions.
Disclosure of Invention
The embodiment of the application mainly aims to provide a digital asset transaction management method, a system, equipment and a storage medium, which ensure the safety of user identity information in the process of carrying out digital asset transaction.
To achieve the above object, a first aspect of an embodiment of the present application provides a digital asset transaction management method applied to a digital asset transaction platform, where the digital asset transaction platform is associated with at least one digital asset issuing platform; the method comprises the following steps:
Acquiring transaction identity information of a first user, wherein the transaction identity information is first decentralised avatar information generated by the digital asset transaction platform on a blockchain for the first user by utilizing a decentralised identity platform;
acquiring a first digital asset holding certificate and a verifiable credential uploaded by the first user; the verifiable certificate is obtained by signing a digital asset holding certificate, and the first digital asset holding certificate characterizes the first user to hold a digital asset on the digital asset issuing platform;
sending trusted verification information to the digital asset issuing platform according to the transaction identity information and the verifiable certificate to carry out trusted verification so as to judge the verification state of the verifiable certificate;
when the verification state is a trusted state and transfer identity information of a second user is obtained, a transfer instruction is obtained, and a target digital asset is transferred to the second user according to the transfer instruction and the first digital asset holding certificate; the transfer instruction is to characterize a target digital asset selected by the first user.
In some embodiments, the acquiring transaction identity information of the first user includes:
Acquiring real-name identity information of a first user, wherein the real-name identity information is third decentralised avatar information generated on the blockchain by a decentralised avatar platform;
inquiring whether the first user has the transaction identity information on the digital asset transaction platform, wherein the transaction identity information is associated with first Tibetan identity information, and the first Tibetan identity information is fourth decentralised avatar information generated by the digital asset issuing platform on a blockchain;
if the transaction identity information exists, activating the transaction identity information;
and if the transaction identity information does not exist, the digital asset transaction platform checks the real-name identity information with the off-center avatar part platform, and after the checking is passed, the transaction identity information is generated.
In some embodiments, the transfer-in identity information is second transaction identity information of the digital asset transaction platform; when the verification state is a trusted state and transfer identity information of a second user is obtained, a transfer instruction is obtained, and a target digital asset is transferred to the second user according to the transfer instruction and the first digital asset holding certificate, including:
When the verification state is a trusted state, inquiring the first digital asset holding certificate in a blockchain to obtain a first user display page, wherein the first user display page is used for displaying the digital asset of the first user;
responding to the transfer instruction, checking the transfer identity information at the off-center avatar platform, and generating a transfer display page of the second user after the checking is passed; the transfer-in display page is a digital asset display page of the second user;
acquiring a transaction signature of the first user, checking the transaction signature, and executing digital asset transfer operation after the check is passed: deleting the target digital asset on the first user display interface and displaying the target digital asset on the transfer-in display page;
transmitting the transfer instruction to the digital asset issuing platform so that the digital asset issuing platform performs a holding certificate updating operation according to the transfer instruction: deleting the target digital asset in the digital asset holding certificate of the first user and adding the target digital asset in the second digital asset holding certificate of the second user.
In some embodiments, the transfer-in identity information is second Tibetan identity information of the digital asset issuing platform; when the verification state is a trusted state and transfer identity information of a second user is obtained, a transfer instruction is obtained, and a target digital asset is transferred to the second user according to the transfer instruction and the first digital asset holding certificate, including:
responding to the transfer instruction, and checking the identity information of the transfer in the off-center avatar platform;
when the verification is passed, the transfer instruction and the transfer identity information are sent to the digital asset issuing platform;
acquiring the first digital asset holding certificate and the second digital asset holding certificate of the second user updated by the digital asset issuing platform after responding to the transfer instruction and the transfer identity information; deleting the target digital asset from the first digital asset holding certificate, and adding the target digital asset to the second digital asset holding certificate of the second user;
querying the first digital asset holding certificate in a blockchain to obtain a first user display page, and generating a transfer-in display page of the second user; the transfer-in display page is a digital asset display page of the second user;
Deleting the target digital asset on the first user display interface, and displaying the target digital asset on the transfer-in display page.
In some embodiments, the method further comprises: presence of a digital asset transfer proof in a blockchain, the digital asset transfer proof being used to characterize the transfer of the target digital asset by the first user to the second user; the digital asset transfer attestation includes at least one of: the transaction identity information of the first user, transfer operation time, the transfer-in identity information of the second user, the target digital asset, the digital asset transaction platform and the digital asset issuing platform.
To achieve the above object, a second aspect of the embodiments of the present application provides a digital asset transaction management method applied to a digital asset issuing platform, where the digital asset issuing platform is associated with a digital asset transaction platform; the method comprises the following steps:
acquiring real-name identity information of a first user, wherein the real-name identity information is third decentralised avatar information generated on a blockchain by a decentralised identity platform;
checking the decentralized identity platform according to the real-name identity information, and generating first Tibetan identity information of the first user based on the real-name identity information after the checking is passed;
Acquiring asset purchase information of the first user, wherein the asset purchase information is used for representing digital assets selected by the first user;
generating a first digital asset holding certificate and issuing private key for the first user in response to the asset purchase information and the first Tibetan identity information; the issuing private key is used for signing the first digital asset holding certificate to obtain a verifiable certificate;
and after receiving the trusted verification information sent by the digital asset transaction platform, generating a verification state of the verifiable certificate and sending the verification state to the digital asset transaction platform, so that the first user transfers the digital asset to the second user on the basis of the identity information in the digital asset transaction platform.
In some embodiments, the method further comprises:
receiving a transfer instruction characterizing transfer of the target digital asset by the first user to the second user;
acquiring second Tibetan identity information of the second user according to the transfer instruction;
acquiring a second digital asset holding certificate of the second user according to the second Tibetan identity information;
in response to the transfer instruction, deleting the target digital asset in the first digital asset holding certificate and adding the target digital asset in the second digital asset holding certificate.
To achieve the above object, a third aspect of an embodiment of the present application provides a digital asset transaction management system, including:
an off-center avatar platform;
the digital asset issuing platform is in communication connection with the off-center avatar platform; the digital asset identification system comprises a centralized identity platform, a first digital asset holding certificate and an issuing private key, wherein the centralized identity platform is used for acquiring real-name identity information of a first user, checking the real-name identity information of the first user, generating first Tibetan identity information of the first user based on the real-name identity information after the checking is passed, and generating a first digital asset holding certificate and the issuing private key of the first user by utilizing the first Tibetan identity information and the asset purchase information in response to asset purchase information of the first user; the issuing private key is used for signing the first digital asset holding certificate to obtain a verifiable certificate;
a digital asset transaction platform in communication with the de-centralized identity platform and the first digital asset issuing platform; the digital asset transaction platform is used for acquiring transaction identity information of a first user, a first digital asset holding certificate and a verifiable certificate, wherein the verifiable certificate is obtained by signing the first digital asset holding certificate, and the digital asset transaction platform is also used for carrying out trusted verification on the digital asset issuing platform according to the transaction identity information and the verifiable certificate to obtain the verification state of the verifiable certificate;
When the verification state is a trusted state, and transfer-in identity information of a second user is obtained, the digital asset transaction platform is used for obtaining a transfer instruction, transferring a target digital asset to the second user according to the transfer instruction and the first digital asset holding certificate, and the digital asset issuing platform is used for updating the first digital asset holding certificate of the first user and the second digital asset holding certificate of the second user according to the transfer instruction.
To achieve the above object, a fourth aspect of the embodiments of the present application proposes an electronic device, including a memory storing a computer program and a processor implementing the method according to the first aspect or the second aspect when the processor executes the computer program.
To achieve the above object, a fifth aspect of the embodiments of the present application proposes a storage medium, which is a computer-readable storage medium storing a computer program that, when executed by a processor, implements the method of the first aspect or the second aspect.
The digital asset transaction platform acquires the decentralized transaction identity information of the first user, the digital asset holding certificate and the verifiable certificate, the digital asset issuing platform is trusted and verified according to the transaction identity information and the verifiable certificate, when the verification state is the trusted state and the decentralized transfer identity information of the second user is acquired, the target digital asset is transferred to the second user according to the transfer instruction and the first digital asset holding certificate. The digital asset transaction platform in the embodiment of the application transfers the digital asset by using the decentralised transaction identity information of the first user and the decentralised transfer identity information of the second user, and the decentralised identity information is generated by the trusted decentralised identity platform according to the real identity information of the user. The digital asset transaction platform utilizes the decentralization identity platform to carry out user identity verification, and cannot acquire the real identity information of the user, so that the user can independently control the digital identity information in the digital asset transaction process, the leakage of excessive identity privacy is avoided, and the safety of the user identity information can be ensured in the digital asset transaction process.
Drawings
FIG. 1 is a schematic diagram of a digital asset transaction management system provided by an embodiment of the present invention.
FIG. 2 is a flow chart of a digital asset transaction management method provided by an embodiment of the present invention.
Fig. 3 is a flowchart of step S110 in fig. 2.
Fig. 4 is a flowchart of step S140 in fig. 2.
Fig. 5 is a flowchart of a further embodiment of step S140 in fig. 2.
Fig. 6 is a flow chart of a digital asset transaction management method according to yet another embodiment of the present invention.
FIG. 7 is a flow chart of a digital asset transaction management method provided by yet another embodiment of the present invention.
Fig. 8 is a schematic diagram of a digital asset structure in a digital asset transaction management method according to still another embodiment of the present invention.
FIG. 9 is a schematic diagram of a first user interface in a digital asset transaction management method according to another embodiment of the present invention.
FIG. 10 is a schematic diagram of a digital asset transaction management method according to yet another embodiment of the present invention.
Fig. 11 is a schematic diagram of a hardware structure of an electronic device according to an embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
It should be noted that although functional block division is performed in a device diagram and a logic sequence is shown in a flowchart, in some cases, the steps shown or described may be performed in a different order than the block division in the device, or in the flowchart.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this invention belongs. The terminology used herein is for the purpose of describing embodiments of the invention only and is not intended to be limiting of the invention.
First, several nouns involved in the present invention are parsed:
blockchain: generally divided into three types: public chains (PublicBlockchain), private chains (PrivateBlockchain) and federated chains (Consortium blockchain). In addition, there are many types of combinations, such as different combinations of private chain+federation chain, federation chain+public chain, and the like. Among them, the highest degree of decentralization is the public chain. Participants joining the public chain may read data records on the chain, participate in transactions, compete for billing rights for new blocks, and so forth. Moreover, each participant (i.e., node) is free to join and leave the network and perform related operations. The private chain is the opposite, the write rights of the network are controlled by an organization or organization, and the data read rights are specified by the organization. In short, the private chain may be a weakly centralized system with few and strict restrictions on participating nodes. This type of blockchain is more suitable for use within a particular organization. The alliance chain is a block chain between public and private chains, and can realize 'partial decentralization'. Each node in the federation chain typically has an entity organization or organization corresponding thereto; participants join the network by authorization and form a benefit-related federation, collectively maintaining blockchain operation. Whether public, private, or federation, it is possible to provide the functionality of a smart contract. Intelligent contracts on blockchains are contracts on blockchain systems that can be executed by transaction triggers. The smart contracts may be defined in the form of codes.
Decentralised identity (Decentralized Identity, DID): the identity system is built based on the blockchain, the DID digital identity system is built based on the blockchain, the identity data is prevented from being controlled by a single centralized mechanism, the identity of each user is controlled by the owner of the user, the individual can independently manage the identity of the user, meanwhile, the identity related data is anchored on the blockchain, and the authentication process does not need to depend on an application party providing the identity. The method has the characteristics of true and credible data, user privacy security protection, strong portability and the like.
Digital asset NFT, commonly known as None-funnelable Token, is a non-homogenous Token. It is a marking mode for encrypting and coding valuable matters such as artwork, characters, game objects and the like by using the blockchain technology and redefining the ownership of digital assets. NFT has transaction properties and is commercially available.
Digital assets are non-monetary assets stored on a digital medium that are owned or controlled by an enterprise or individual and exist in electronic data form, such as digital photographic works, electronic pictorial representations, or the like, with collection attributes, and digital collections are also a type of digital asset. At present, most digital collection issuing platforms establish respective alliance chains, digital collections of different issuing platforms can only circulate on the own alliance chains, and cross-platform sharing and circulation are difficult to realize, so that the asset value of the digital collections is limited. For example, a digital collection purchased by a user on the distribution platform S can only be viewed or traded on the distribution platform S and cannot be transferred to the user on the distribution platform B. If the distribution platform S is closed or the enterprise bankrupts, the user cannot transfer the under-name digital asset, and can only apply for refunds or sustain losses. This approach results in isolation of the digital assets circulating on different federation chains from each other, single application scenarios, and lack of fluidity in the digital asset NFT, which can result in low value and slow development of the digital asset.
In the related art, the transaction of the digital asset can be performed through the third party platform, and the identity authentication mode represented by the single sign-on of the third party platform needs to acquire the real identity information and the asset information of the user during the transaction. It is therefore desirable to provide a transaction management method that secures user identity information during the performance of digital asset transactions.
Based on the above, the embodiment of the invention provides a digital asset transaction management method, a system, equipment and a storage medium, wherein a digital asset transaction platform transfers digital assets by using the decentralised transaction identity information of a first user and the decentralised transfer identity information of a second user, and the decentralised identity information is generated by a trusted decentralised identity platform according to the real identity information of the user. The digital asset transaction platform utilizes the decentralization identity platform to carry out user identity verification, and cannot acquire the real identity information of the user, so that the user can independently control the digital identity information in the digital asset transaction process, the leakage of excessive identity privacy is avoided, and the safety of the user identity information can be ensured in the digital asset transaction process.
The embodiment of the invention provides a digital asset transaction management method, a system, equipment and a storage medium, and specifically, the digital asset transaction management system in the embodiment of the invention is described first by the following embodiment.
The embodiment of the invention provides a digital asset transaction management method, which relates to the technical field of blockchain. Wherein the digital asset transaction management method is applied to a digital asset transaction management system, in one embodiment, referring to fig. 1, the digital asset transaction management system 100 comprises:
the decentralizing identity platform 200 is configured to generate digitized decentralizing identity information of the user on the blockchain, which may be related software for generating digital identities in this embodiment, and the user uploads real identity information to the digital identity software to generate decentralizing identity information instead of real identity information. For identity security, the decentralised identity information provided by the decentralised identity platform 200 is issued by an issuing entity, i.e. the relevant software for the different digital identities only provides a user interface, the underlying connection is to the issuing entity, the digital avatar requirements of the user are sent to the issuing entity, and then the decentralised avatar information generated by the issuing entity is received.
In one embodiment, the de-centralized identity information is denoted as DID identity information, where the DID identity information includes: the DID identifier and DID document of the base layer and the verifiable certificate (Verifiable Credentials, VC) of the application layer, the base layer mainly provides the storage of DID identity information and the guarantee that the DID identity information cannot be tampered, and the user does not directly use the DID for verification in the application process, so that the verifiable certificate VC is utilized by the application layer for transmission and verification in the application process.
In one embodiment, the DID identifier is a string in the following format:
did:example:123456789abcdefghijk
wherein the DID identifier starts with "DID" indicating that the string is an off-center avatar information, "example" is the DID method, is the name of the implementation DID system, and is used to indicate which set of schemes the DID identifier is defined and operated with, and the last "123456789abcdefghijk" is a string produced by the system. Specifically, the DID method may be customized and then registered into the W3C website, where the registration address is: https:// w3c. For example, the DID system of a digital identity software is named: cid, the purpose is to de-center the user's identification card information, then the corresponding DID identifier may be: the character string "123456" is the identification number of the user, and in this example, the identification number is used as the unique identifier in the DID method of cid.
In an embodiment, the above DID identifier is used as a key, the corresponding value is a DID document (DID document), and specific identity information is stored in the DID document, where only one DID identifier exists in the DID document. The DID document is a standard Json format document that includes some user's public key, the DID protocol used, and the DID's service request address, timestamp, signature, etc. The issuing authority in the decentralized avatar platform 200 generates the DID identifier and DID document according to the identity information of the user and then stores the DID identifier and DID document on the blockchain and decentralized storage. The blockchain herein may be a public chain, a federated chain, or even a private chain.
In one embodiment, the verifiable credential is a digital certificate that is used to endorse certain attributes of one DID to another to issue a descriptive claim in which an own digital signature is appended to prove the authenticity of the attributes. Included in the de-centralized identity platform 200 are: an issuer, a holder, a verifier, a DID registration system (i.e., blockchain), wherein the issuer is the issuing authority that can verify credentials; the holder is the holder of the digital certificate, such as an ordinary user; the verifier is a person or an organization for checking the digital certificate when the user uses the digital certificate, for example, when the user purchases a digital collection, the digital asset issuing platform is the verifier when the digital asset issuing platform is to verify the identity of the user; the DID registration system is where the DID identification and DID document are stored, i.e., a blockchain in which the corresponding DID document can be queried through the DID identifier.
It will be appreciated that the process of creating DID identity information is in essence a process of generating a random private key and corresponding public key. Assume that the digital identity software has been accessed to the identity authentication system of the issuing organization, at this time, the user inputs personal information such as a name, an identity card number, a mobile phone number and the like in the decentralised identity platform 200, the issuing organization performs real-name authentication, and after the real-name authentication is passed, the issuing organization generates digital DID identity information of the user based on the identity information of the user, including a DID identifier and a DID document, so as to replace the identity card of the user. In this embodiment, the issuing mechanism issues the DID identity information of the user and provides verifiable credentials corresponding to the DID identity information of the user, and the user can log in the platform accessed to the decentralized identity platform 200 by using the DID identity information, such as a digital asset issuing platform or a digital asset transaction platform.
In addition, when the DID document generation is completed, the off-center avatar platform 200 may upload the DID identifier and DID document to the blockchain for certification. The blockchain here may be a federated chain that must be authenticated to the user himself before being booted to prevent others from spoofing identities. Once the uplink is completed, the person on the alliance chain can query the DID identifier and the DID document of the user, wherein two keys are set for the user in the DID document: one is a private key stored by the user and used for authentication signature in application, and the other is a public key managed by the system and used for binding a new public key to help the user to recover DID identity information of the individual when the private key of the user is lost.
The digital asset transaction management system 100 further comprises: at least one digital asset issuing platform 300, it being understood that digital asset issuing platform 300 refers to a platform that is entitled to issue digital assets, wherein digital asset issuing platform 300 also possesses its own DID identity information issued by a license plate holding organization that has digital asset transaction license plates. The DID identity information of the digital asset issuing platform 300 is signed by the card holding institution and only the DID identity information issued by the card holding institution is considered to be a regular issuing platform. For example, DID identity information issued by the card holding institution is identified as: the bid is xxx moe, where xxx denotes a card holding mechanism. If the digital asset issuing platform S submits company information in the card holding mechanism system, after auditing, DID identity information issued by the card holding mechanism can be obtained: and the fid is cnft, A. Where CNFT is a combinable non-homogenous token, the underlying protocol standard design allows any one NFT to bind other NFTs or FTs, and a user can implement the overall hierarchy and membership transfer owned by CNFT when transferring CNFT. It will be appreciated that because the digital asset issuing platform S is authenticated by the card holding institution, the digital asset issuing platform S may also issue DID identity information relating to the digital collection to the user who purchased the digital collection at the platform.
The digital asset transaction management system 100 further comprises: the digital asset trading platform 400, the digital asset trading platform 400 is associated with at least one digital asset issuing platform 300, the digital asset trading platform 400 being capable of trading and transferring digital assets issued by the associated digital asset issuing platform 300 as an exchange. The digital asset transaction platform 400 is similar to the digital asset issuing platform 300, and also has its own DID identity information, which is issued by a license plate holding organization that holds the license plate of the digital asset transaction. Because the digital asset trading platform 400 has been authenticated by the card holding institution, the digital asset trading platform 400 may conduct a trade of digital collections.
It will be appreciated that, whether the digital asset distribution platform 300 or the digital asset transaction platform 400, the physical carrier deployed may be a server or a server cluster, and the server may be an independent server, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, content delivery networks (Content Delivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms. The blockchain network may be any type of blockchain network. In practical applications, any of public chains, private chains, or alliance chains may be employed. The digital asset may include a unique encrypted token for representing a picture, video, audio, etc. asset.
The following describes a digital asset transaction management method applied to a digital asset transaction platform in an embodiment of the present invention.
Fig. 2 is an alternative flow chart of a digital asset transaction management method provided by an embodiment of the present invention, where the method of fig. 2 may include, but is not limited to, steps S110 to S140. It should be understood that the order of steps S110 to S140 in fig. 2 is not particularly limited, and the order of steps may be adjusted, or some steps may be reduced or added according to actual requirements.
Step S110: and acquiring transaction identity information of the first user.
In an embodiment, the first user is a user who wants to sell or transfer a digital asset to perform a transaction, where the digital asset transaction platform may be a software product with a corresponding function, the first user logs in to the software of the digital asset transaction platform by using its DID identity information, and the digital asset transaction platform obtains the transaction identity information of the first user, where the transaction identity information is an identity representation of the first user at the digital asset transaction platform, and is used for the first user to perform a transaction at the digital asset transaction platform.
It will be appreciated that because the digital asset trading platform has been accessed to the decentralised identity platform, the digital asset trading platform can generate corresponding trade identity information for the user, wherein the trade identity information is first decentralised avatar information generated by the digital asset trading platform for the first user on the blockchain using the decentralised identity platform.
In an embodiment, referring to fig. 3, a flowchart of a specific implementation of step S110 is shown in an embodiment, where step S110 of obtaining transaction identity information of a first user includes:
step S111: and acquiring real-name identity information of the first user.
In one embodiment, the real-name identity information of the first user, i.e., the third decentralised identity information generated by the decentralised identity platform on the blockchain from the real-name identity information of the first user, where the third decentralised identity information is the DID identity information of the first user.
Step S112: and inquiring whether the first user has transaction identity information on the digital asset transaction platform.
In an embodiment, after the first user logs in the digital asset transaction platform, it is required to determine whether the first user has been registered or transacted before, and if the first user has been registered or transacted in the digital asset transaction platform, the corresponding transaction identity information already exists in the database related to the identity information of the digital asset transaction platform.
In one embodiment, the digital asset that the first user wants to transact is purchased in a digital asset issuing platform, so that the first user has corresponding login identity information in the digital asset issuing platform, where the login identity information is denoted as first Tibetan identity information, and the digital asset issuing platform stores a correspondence between the first Tibetan identity information and the digital asset purchased by the first user. The digital asset issuing platform is connected to the off-center avatar platform, so that the digital asset issuing platform applies the off-center avatar platform to generate fourth off-center avatar information of the first user on the blockchain according to the identity information of the first user, and takes the fourth off-center identity information as the first Tibetan identity information. It can be understood that, because the identity information of the first collection information is also a kind of decentralised identity information, the first collection identity information includes a corresponding DID identifier and a DID document, the digital asset issuing platform stores the DID identifier in the blockchain network, sends the DID document to the first user for self-saving, and the DID document includes a private key generated by the digital asset issuing platform for the first user.
In an embodiment, since the digital asset issuing platform is associated with the digital asset transaction platform, the transaction identity information of the first user at the digital asset transaction platform has an associated correspondence with the first Tibetan identity information of the first user at the digital asset issuing platform.
Step S113: and if the transaction identity information exists, activating the transaction identity information.
In one embodiment, since the transaction identity information of the first user is already queried in the database related to the identity information of the digital asset transaction platform, the transaction identity information is activated for the subsequent transaction process, and activation may be understood as reading the existing transaction identity information from the database. In one embodiment, the first user first logs in the digital asset issuing platform to create the first Tibetan identity information, and then logs in the digital asset transaction platform, and the digital asset issuing platform may apply for creating the transaction identity information of the first user and associate the transaction identity information with the first Tibetan identity information before creating the first Tibetan identity information. At this time, since the transaction identity information already exists, only the transaction identity information needs to be activated.
Step S114: if the transaction identity information does not exist, the digital asset transaction platform checks the real-name identity information to the off-center avatar part platform, and after the checking is passed, the transaction identity information is generated.
In one embodiment, if the first user has transaction identity information that cannot be queried in the database associated with the identity information of the digital asset transaction platform, the transaction identity information needs to be created. In one embodiment, a first user logs in to the digital asset transaction platform first, then logs in to the digital asset issuing platform, when the transaction identity does not exist, the digital asset transaction platform accesses the decentralised avatar platform according to the received real-name identity information of the user, applies for the issuing mechanism to perform credibility checking on the real-name identity information of the first user, receives a checking result returned by the decentralised identity platform, and when the checking is passed, uses the decentralised identity information, which is generated by the decentralised identity platform for the first user and is associated with the digital asset transaction platform, on a blockchain. It can be appreciated that, because the transaction identity information is also a kind of de-centralized identity information, the transaction identity information includes a corresponding DID identifier and a DID document, and the digital asset transaction platform verifies the DID identifier in the blockchain network and sends the DID document to the first user for self-saving.
After the decentralised transaction identity information of the first user is obtained, the following steps are performed.
Step S120: a digital asset holding certificate and verifiable credentials uploaded by a first user are obtained.
In an embodiment, the first digital asset holding proof of the first user characterizes the first user holding the digital asset at the digital asset distribution platform, i.e., is used to prove which digital asset the first user holds at which digital asset distribution platform. The first user needs to upload his proof of possession at the digital asset trading platform to indicate the ownership of the digital asset that he is able to trade. In this embodiment, after the first user logs in the digital asset transaction platform, uploading the first digital asset holding certificate thereof, and signing the first digital asset holding certificate by using the private key in the DID document of the first Tibetan identity information in the digital asset issuing platform to obtain a verifiable certificate, wherein the certificate is the operation of the user, and the digital asset issuing platform encapsulates the digital asset holding certificate into the verifiable certificate after signing.
Step S130: and sending the trusted verification information to the digital asset issuing platform according to the transaction identity information and the verifiable certificate to carry out trusted verification so as to judge the verification state of the verifiable certificate.
In one embodiment, the digital asset transaction platform acts as a verifier, requiring verification of the received verifiable credentials to determine the trustworthiness of the first user and the digital asset holding certificate. Because the transaction identity information is associated with the first Tibetan identity information and the secret key in the verifiable certificate is associated with the first Tibetan identity information, after the digital asset transaction platform receives the verifiable certificate submitted by the first user, the first Tibetan identity information corresponding to the transaction identity information provided by the first user and signature information of the first digital asset holding certificate are used as feasible verification information and sent to the digital asset issuing platform for trusted verification, so that the certificate is ensured to be submitted by the first user and not to be tampered.
The digital asset issuing platform judges whether a key of the verifiable certificate is a key of the first user based on the first Tibetan identity information according to the first Tibetan identity information, and generates a verification state, wherein the verification state comprises: trusted and untrusted states, the trusted state representing: the verifiable credential is trusted, and the untrusted state represents: the verifiable credential is not authentic and the digital asset issuing platform returns the verification status to the digital asset transaction platform.
In one embodiment, the real-name identity information generated by the user on the decentralization platform may log into the digital asset transaction platform, and then the digital asset transaction platform generates transaction identity information for the user, where the transaction identity information is generated based on the real-name identity information of the user, and it may be understood that the real-name identity information is a main DID identity and the transaction identity information is a sub DID identity thereof.
In an embodiment, real-name identity information generated by the user on the decentralization platform can also log into the digital asset issuing platform, and the digital asset issuing platform generates Tibetan identity information for the user, wherein the Tibetan identity information is generated based on the real-name identity information of the user. It is understood that the real name identity information is the main DID identity and the Tibetan identity information is its sub DID identity, and that the Tibetan identity information is associated with the transaction identity information.
Step S140: and when the verification state is a trusted state and the transfer identity information of the second user is obtained, obtaining a transfer instruction, and transferring the target digital asset to the second user according to the transfer instruction and the first digital asset holding certificate.
In one embodiment, the second user is the exporter of the first user for the digital asset transaction, i.e., the first user transfers or transfers the own digital asset transaction to the second user. The transfer instruction is used to characterize a target digital asset selected by the first user, i.e., the first user expects to transfer out the digital asset for the transaction.
In one embodiment, the identity of the transferring party input by the first user is divided into two main types, wherein the first type is second transaction identity information of the transferring party on a digital asset transaction platform, and the second type is second Tibetan identity information of the transferring party on a certain digital asset issuing platform. It will be appreciated that the second transaction identity information, which is similar to the transaction identity information of the first user, is the off-center avatar information registered by the second user on the digital asset transaction platform. The second Tibetan identity information is similar to the first Tibetan identity information of the first user, and is decentralised avatar information registered by the second user on the digital asset issuing platform.
It can be understood that the first user inputs the transfer-in identity information by means of input or drop-down frame selection, if the input second transaction identity information on the digital asset transaction platform is the transfer-in identity information is the DID identity information stored on the digital asset transaction platform, and if the transfer-in party is the second Tibetan identity information of a certain digital asset issuing platform, the transfer-in identity information is the DID identity information stored on the digital asset issuing platform.
In an embodiment, the transfer identity information is second transaction identity information of a second user on the digital asset transaction platform, referring to fig. 4, which is a flowchart showing a specific implementation of step S140, in this embodiment, the step S140 of transferring the target digital asset to the second user according to the transfer instruction and the first digital asset holding certificate includes:
Step S141: and when the verification state is a trusted state, inquiring the first digital asset holding certificate in the blockchain to obtain a first user display page.
In an embodiment, after the digital asset transaction platform passes the verification, according to a first digital asset holding certificate submitted by a first user, inquiring digital asset information of the first user on the digital asset issuing platform on the blockchain, and displaying the inquired digital asset information on a display interface of the first user on the digital asset transaction platform, wherein the display interface of the first user is a first user display page, and is mainly used for displaying the digital asset of the first user. It is to be appreciated that the first user display interface can be a plurality of interfaces, such as different interfaces for different digital asset distribution platforms.
It will be appreciated that if a first user owns a plurality of digital assets on a plurality of digital asset distribution platforms, the above process may be repeated with all digital assets held by the first user on each digital asset distribution platform displayed on the first user display interface. The plurality of digital asset issuing platforms herein are associated with a digital asset transaction platform, forming a coalition chain. The first user may transact or transfer the held digital asset on the coalition chain.
Step S142: and responding to the transfer instruction, checking the transfer identity information at the off-center avatar platform, and generating a transfer display page of the second user after the checking is passed.
In one embodiment, the digital asset transaction platform accesses the decentralized identity platform to check the identity information of the transfer-in input by the first user in the blockchain, wherein the purpose of the check is to confirm whether the identity of the transfer-in party is trusted, and if so, the check passes. And after the verification is passed, generating a display interface of the second user for the second user, wherein the display interface is a transfer-in display page of the second user, and the transfer-in display page is a digital asset display page of the second user on the digital asset transaction platform.
Step S143: acquiring a transaction signature of a first user, checking the transaction signature, and executing digital asset transfer operation after the check is passed: deleting the target digital asset at the first user display interface and displaying the target digital asset in the transfer-to-display page.
In an embodiment, after confirming the transaction identity information of both sides of the transaction, entering a transaction confirmation interface, in the transaction confirmation interface, inputting a secret key in a DID document of a digital asset transaction platform by a first user to conduct transaction signature, checking the transaction signature after the first user conducts the transaction signature, judging whether the signature is the signature conducted by the user, and executing digital asset transfer operation after the user is proved to operate by the user if the check is passed. The first step of the digital asset transferring operation is to delete the target digital asset in the first user display interface of the first user on the display interface of the digital asset transaction platform, and add the display target digital asset in the transfer-in display page of the second user, namely, transfer the target digital asset from the first user to the second user from the display interface.
Step S144: transmitting a transfer instruction to the digital asset issuing platform to cause the digital asset issuing platform to perform a holding proof update operation in accordance with the transfer instruction: deleting the target digital asset in the digital asset holding certificate of the first user and adding the target digital asset in the second digital asset holding certificate of the second user.
In one embodiment, step S143 transfers the target digital asset from the first user to the second user from the display interface, and the purpose of step S144 is to transfer the target digital asset from the first user to the second user from the digital asset distribution platform using the transfer instruction. The digital asset issuing platform executes a holding certificate updating operation according to the transfer instruction: deleting the target digital asset in the digital asset holding certificate of the first user and adding the target digital asset in the second digital asset holding certificate of the second user.
When the above-mentioned operation of updating the holding certificate is performed, since the digital asset is issued by a specific digital asset issuing platform, it is first required to determine whether the second user has the corresponding second Tibetan identity information in the digital asset issuing platform, if not, the second user creates the decentralized second Tibetan identity information in the digital asset issuing platform, and if so, the creation is not required.
It can be seen that if the first user inputs the second transaction identity information of the second user on the digital asset transaction platform, the digital asset transaction platform firstly transfers the digital asset on the display interfaces of the two on the platform, and then accesses the digital asset issuing platform where the target digital asset is located to transfer the digital asset holding certificate.
In an embodiment, the transfer-in identity information is second Tibetan identity information of the digital asset issuing platform, referring to fig. 5, which is a flowchart showing a specific implementation of step S140 in an embodiment, in this embodiment, the step S140 of transferring the target digital asset to the second user according to the transfer instruction and the first digital asset holding certificate further includes:
step S145: and responding to the transfer instruction, and checking the transfer identity information at the off-center avatar platform.
In one embodiment, the digital asset transaction platform accesses the decentralized identity platform to check the identity information of the transfer-in input by the first user in the blockchain, wherein the purpose of the check is to confirm whether the identity of the transfer-in party is trusted, and if so, the check passes.
Step S146: and after the verification is passed, transmitting a transfer instruction and transfer identity information to the digital asset issuing platform.
Step S147: and acquiring a first digital asset holding certificate updated by the digital asset issuing platform after responding to the transfer instruction and transferring the identity information and a second digital asset holding certificate of the second user.
In one embodiment, after confirming the transaction identity information of both parties of the transaction, entering a transaction confirmation interface, and at the transaction confirmation interface, first transmitting a transfer instruction and transfer identity information to a digital asset issuing platform for transferring the target digital asset from the first user to the second user from the digital asset issuing platform.
In this embodiment, after the digital asset issuing platform obtains the transfer instruction and the transfer identity information, the digital asset issuing platform updates the first digital asset holding certificate of the first user and the second digital asset holding certificate of the second user, specifically: deleting the target digital asset in the first digital asset holding certificate and adding the target digital asset in the second digital asset holding certificate of the second user.
When the above-mentioned operation of updating the holding certificate is performed, since the digital asset is issued by a specific digital asset issuing platform, it is first required to determine whether the second user has the corresponding second Tibetan identity information in the digital asset issuing platform, if not, the second user creates the decentralized second Tibetan identity information in the digital asset issuing platform, and if so, the creation is not required.
Step S148: querying a blockchain for a first digital asset holding proof to obtain a first user display page, and generating a second user transfer-in display page.
Step S149: deleting the target digital asset at the first user display interface and displaying the target digital asset in the transfer-to-display page.
In one embodiment, the steps S146-S147 described above transfer the target digital asset from the first user to the second user from the digital asset distribution platform, and the purpose of steps S148-S149 is to transfer the target digital asset from the first user to the second user from the display interface. The turning display page is a digital asset display page of the second user. The method mainly comprises the steps of deleting target digital assets in a first user display interface of a first user on a display interface of a digital asset transaction platform, and adding display target digital assets in a transfer-in display page of a second user, namely transferring the target digital assets from the first user to the second user from the display interface.
It can be seen that if the first user inputs the second Tibetan identity information of the second user on the digital asset issuing platform, the digital asset transaction platform firstly sends the second participation identity information to the digital asset issuing platform to transfer the digital asset holding certificate, and then the digital asset is transferred on the display interface of the digital asset issuing platform.
In the above embodiment, the transaction process of the first user transferring the target digital asset to the second user is implemented by performing the transaction transfer operation on the presentation interface and the transaction transfer operation on the digital asset issuing platform.
It will be appreciated that both the digital asset transfer operation and the result of the execution of the hold proof update operation in the above steps need to be chained to ensure non-tamper-evident performance of the result. The specific uplink process is as follows: digital asset transfer proofs exist in blockchains, where the digital asset transfer proofs are used to characterize: the target digital asset is transferred by the first user to the second user. Wherein the digital asset transfer attestation includes at least one of: transaction identity information of a first user, transfer operation time, transfer identity information of a second user, a target digital asset, a digital asset transaction platform, a digital asset issuing platform and the like.
The digital asset transaction platform in the above embodiment transfers digital assets by using the decentralized transaction identity information of the first user and the decentralized transfer identity information of the second user, where the decentralized identity information is generated by the trusted decentralized identity platform according to the real identity information of the user. The digital asset transaction platform utilizes the decentralization identity platform to carry out user identity verification, and cannot acquire the real identity information of the user, so that the user can independently control the digital identity information in the digital asset transaction process, the leakage of excessive identity privacy is avoided, and the safety of the user identity information can be ensured in the digital asset transaction process.
The following describes a digital asset transaction management method applied to a digital asset issuing platform in an embodiment of the present invention.
Fig. 6 is an alternative flow chart of a digital asset transaction management method provided by an embodiment of the present invention, and the method of fig. 6 may include, but is not limited to, steps S210 to S250. It should be understood that the order of steps S210 to S250 in fig. 6 is not particularly limited, and the order of steps may be adjusted, or some steps may be reduced or increased according to actual requirements.
Step S210: and acquiring real-name identity information of the first user.
In one embodiment, the real-name identity information of the first user is third decentralized identity information generated on the blockchain by the decentralized identity platform, and the real-name identity information includes a DID identifier and a DID document.
Step S220: and checking the off-center avatar platform according to the real-name identity information, and generating first Tibetan identity information of the first user based on the real-name identity information after the checking is passed.
In one embodiment, the digital asset issuing platform applies to the decentralised avatar platform for generating the first Tibetan identity information of the first user on the blockchain according to the real-name identity information of the first user. The real-name identity information is third decentralised identity information generated by the decentralised identity platform access issuing institution.
Step S230: asset purchase information of a first user is obtained.
In one embodiment, the digital asset and corresponding purchase price are displayed in the digital asset distribution platform, and the first user may select digital assets to purchase in the digital asset distribution platform based on the purchase demand, such purchase demand and payment information forming asset purchase information for the first user, such that the asset purchase information is used to characterize the first user selected digital asset.
Step S240: a digital asset holding proof and issue private key of the first user is generated in response to the asset purchase information and the first Tibetan identity information.
In one embodiment, the digital asset issuing platform generates a first digital asset holding certificate for the first user from the asset purchase information and the first Tibetan identity information of the first user, the first digital asset holding certificate being documented: first Tibetan identity information and digital asset purchase information, where purchase information includes, but is not limited to: digital asset number, work name, collection picture, issuer, issue time, etc. In this embodiment, since the first collection information identity information is decentralised avatar information, the first collection information identity information includes a corresponding DID identifier and a DID document, the digital asset issuing platform stores the DID identifier in a blockchain network, sends the DID document to the first user for self-saving, and the DID document includes a private key generated by the digital asset issuing platform for the first user, that is, an issuing private key. The issuing private key is used to sign the digital asset holding certificate to obtain a verifiable certificate, which represents that the user himself signs the digital asset holding certificate.
It will be appreciated that the user's purchase information and digital asset holding certificate are stored in the blockchain network for later verification. After the digital asset holding certificate is generated, the user can download and store the digital asset holding certificate in a mobile phone or local equipment, so that the digital asset holding certificate is convenient for subsequent use.
Step S250: and after receiving the trusted verification information sent by the digital asset transaction platform, generating a verification state of the verifiable certificate and sending the verification state to the digital asset transaction platform so that the first user transfers the digital asset to the second user at the digital asset transaction platform.
In an embodiment, in combination with step S140 of the foregoing embodiment, the digital asset transaction platform may send the trusted verification information, the digital asset issuing platform verifies the received viable verification information to generate a verification status of the verifiable credential, and then sends the verification status to the digital asset transaction platform to perform a transaction process, so that the first user transfers the digital asset to the second user at the digital asset transaction platform.
As in the above embodiment, the transfer-in identity information of the second user includes: the second transaction identity information of the digital asset transaction platform or the second Tibetan identity information of the digital asset issuing platform.
In one embodiment, referring to fig. 7, the steps further include:
step S710: and receiving a transfer instruction.
Step S720: and acquiring second Tibetan identity information of the second user according to the transfer instruction.
Step S730: and acquiring a second digital asset holding certificate of the second user according to the second Tibetan identity information.
Step S740: in response to the transfer instruction, the target digital asset is deleted in the first digital asset holding certificate and the target digital asset is added in the second digital asset holding certificate.
In one embodiment, the transfer instruction is sent by the digital asset trading platform to the digital asset issuing platform for characterizing the transfer of the target digital asset by the first user to the second user. Specific: deleting the target digital asset in the digital asset holding certificate of the first user and adding the target digital asset in the second digital asset holding certificate of the second user.
In one embodiment, the second Tibetan identity information of the associated second user is determined according to the transfer-in identity information. Because the digital asset is issued by a specific digital asset issuing platform, whether the second user has corresponding second Tibetan identity information in the digital asset issuing platform needs to be judged first, if the second user does not have the corresponding second Tibetan identity information, the second user is created with the decentralised second Tibetan identity information in the digital asset issuing platform, and if the second user does not have the decentralised second Tibetan identity information, the second user does not need to be created.
As can be seen from the above, the digital asset issuing platform in the above embodiment uses the decentralized transaction identity information of the first user and the decentralized transfer identity information of the second user to realize the transfer of the digital asset, so that the security of the user identity information can be ensured in the process of carrying out the digital asset transaction.
In one embodiment, referring to the digital asset transaction management system of FIG. 1, the digital asset transaction process comprises:
the digital asset issuing platform 300 is communicatively coupled to the off-center avatar platform 200; the method comprises the steps of acquiring real-name identity information of a first user, checking the center-going identity platform 200 according to the real-name identity information, generating first Tibetan identity information of the first user based on the real-name identity information after the checking is passed, and generating digital asset holding certificate and an issuing private key of the first user by utilizing the first Tibetan identity information and the asset purchase information in response to asset purchase information of the first user, wherein the issuing private key is used for signing the digital asset holding certificate to obtain verifiable credentials.
The digital asset trading platform 400 is communicatively coupled to the off-center avatar platform 200 and to the at least one digital asset issuing platform 300; the method comprises the steps of obtaining transaction identity information of a first user, a digital asset holding certificate and a verifiable certificate, and carrying out trusted verification on a digital asset issuing platform according to the transaction identity information and the verifiable certificate to obtain the verification state of the verifiable certificate. When the verification state is a trusted state and transfer-in identity information of the second user is obtained, the digital asset transaction platform 400 is configured to obtain a transfer instruction and transfer the target digital asset to the second user according to the transfer instruction and the first digital asset holding certificate.
The digital asset issuance platform 300 is further configured to update the first digital asset holding certificate of the first user and the second digital asset holding certificate of the second user according to the transfer instructions.
In one embodiment, referring to FIG. 8, a digital asset structure is based on user perspective. The specific application scene is as follows: the decentralised identity platform is digital identity software in the figure, the digital asset transaction platform is exchange software, and different digital asset issuing platforms all have respective issuing platform software.
Fig. 8 shows real-name identity information of the user, which is obtained by the digital identity software for n users, namely real-name DID1, real-name DID2, …, and real-name DIDn. The user may be the first user or the second user. The method comprises the steps that a first user u1 is assumed to register real identity information of the first user u1 through digital identity software to obtain digital real-name DID1, wherein the identity information can be identity card information, the digital identity software is accessed to an issuing mechanism to obtain third decentralised identity information of the first user u1 generated by the issuing mechanism, and the third decentralised identity information is recorded as the real-name DID1.
Suppose that the transaction identity information obtained by the n users in the digital asset transaction platform is: transaction DIDt1, transaction DIDt2, … and transaction DIDtn, and if the user is a second user, the transaction identity information is transfer identity information. The transaction identity information of the first user u1 is the transaction DID1.
Assuming that N digital asset distribution platforms exist to form a coalition chain, each digital asset distribution platform corresponds to a respective blockchain system, the digital asset distribution platforms are respectively: issue platform a, issue platforms B, …, issue platform N. Assuming that the n users hold a digital asset on each digital asset issuing platform, each digital asset issuing platform contains n pieces of corresponding Tibetan identity information, which is marked as Tibetan DIDs, and each Tibetan DID corresponds to a verifiable credential of a digital asset holding certificate. Referring to fig. 9, the release platform a includes n users' Tibetan identity information and verifiable credentials, which are respectively: tibetan DIDa1- - -NFTa1, tibetan DIDa2- - -NFTa2, …, tibetan DIDan- - -NFTan; the release platform B correspondingly contains Tibetan identity information and verifiable credentials of n users, and the Tibetan identity information and the verifiable credentials are respectively: tibetan DIDb1- - -NFTb1, tibetan DIDb2- - -NFTb2, …, tibetan DIDbn- - -NFTbn; … Tibetan identity information and verifiable credentials corresponding to N users are stored in the issuing platform N, and are respectively: tibetan DiDn1- - -NFTn1, tibetan DiDn2- - -NFTn2, …, tibetan DiDnn- - -NFTnn.
The digital asset transaction process is described below by way of one specific embodiment.
Assume in one embodiment that: the first user u1 is a digital collection fan who purchases digital assets at a plurality of digital asset distribution platforms. The digital asset issuing platforms are authenticated, digital asset holding certificates can be provided for users, the users can upload the digital asset holding certificates to the digital asset transaction platform, and after the digital asset transaction platform passes the verification, the digital asset held by the users is inquired and displayed on the blockchain. Meanwhile, the first user u1 can transfer the held digital asset to the second user u2 in the digital asset transaction platform, so that cross-chain sharing and transferring are realized.
First, a first user u1 logs in exchange software by using a real name DID1, the exchange software accesses digital identity software to verify the real name DID1 of the first user u1, and after verification, transaction identity information of the first user u1 is obtained: DIDt1, after passing the verification, enters a "digital asset" page of exchange software, and the first user can see the digital asset he owns in his first user display interface.
Assume that the first Tibetan identity information of the first user u1 on the issuing platform a is: DIDa1, and hold digital collection NFT1 and NFT2, first user u1 is at issue platform B's first Tibetan identity information is: DIDb1 and holds digital collection NFT3. Then, as shown in fig. 9, the first user display interface includes: issue platform A-DIDa 1-NFT 1, issue platform A-DIDa 1-NFT 2, and issue platform B-DIDb 1-NFT 3. The first digital asset holding certificate issued by the first user u1 by the issuing platform a contains the certification information of the digital collection NFT1 and NFT2, and the first digital asset holding certificate issued by the first user u1 by the issuing platform B contains the certification information of the digital collection NFT3. The second transaction identity information of the second user u2 at the digital asset transaction platform is DIDt2, the second Tibetan identity information of the second user at the issuing platform A is DIDa2, the second Tibetan identity information of the second user at the issuing platform B is DIDb2, and at the moment, the first user u1 wants to transfer the NFT2 and the NFT3 to the second user u2.
In the above embodiment, the first user u1 selects the NFT2 and the NFT3 as the target digital assets to transfer, and generates the corresponding transfer instruction, for example, the first user display interface may be clicked, where the NFT2 and the NFT3 are selected, the transfer interface is entered, then the "transfer transaction" is clicked, the transfer identity information of the second user is entered in the input box, where the "enter second transaction identity information" or the "enter second Tibetan identity information" may be selected, and the two choices correspond to different transaction interfaces.
If the first user u1 inputs the second transaction identity information DIDt2, the digital asset transaction platform firstly verifies whether the DIDt2 is credible, if so, the next step of transaction confirmation is executed, in a transaction confirmation interface, the first user u1 inputs a DID document key of the DIDt1 in the digital asset transaction platform, signature is checked by the digital asset transaction platform by utilizing the key signature, and after the signature of the user is confirmed, transfer operation is executed.
Firstly, transferring digital assets on display interfaces of the digital asset transaction platform, specifically:
deleting NFT2 and NFT3 on a first user display page (e.g., query page, digital asset page, etc.) corresponding to DIDt1 of first user u 1; and adding NFT2 and NFT3 on the display page corresponding to the DIDt2 of the second user u 2.
Then accessing an issuing platform A and an issuing platform B where the target digital asset is located to transfer the digital asset holding certificate, specifically:
1) Judging whether the second user u2 has corresponding second Tibetan identity information DIDa2 in the issuing platform A, and if the second user u2 does not have the corresponding second Tibetan identity information DIDa2, creating the decentralised second Tibetan identity information DIDa2 for the second user u2 in the issuing platform A.
2) NFT2 is transferred from under the DIDa1 account of first user u1 to under the DIDa2 account of second user u 2.
3) The first digital asset holding certificate of the first user u1 in the distribution platform a is changed, the NFT2 is deleted, and only the NFT1 is displayed.
4) Judging whether the second user u2 has corresponding second Tibetan identity information DIDb2 in the issuing platform B, and if not, creating the decentralised second Tibetan identity information DIDb2 for the second user u2 in the issuing platform B.
5) NFT3 is transferred from under the DIDb1 account of the first user u1 to under the DIDb2 account of the second user u 2.
6) The first digital asset holding certificate of the first user u1 in the distribution platform B is changed, and the NFT3 is deleted.
7) The second user u2 changes the second digital holding certificate in the issuing platform a, adds the display of the NFT2, and changes the second digital holding certificate in the issuing platform B, adds the display of the NFT3.
If the first user u1 inputs the second Tibetan identity information DIDa2, the digital asset transaction platform firstly verifies whether the DIDa2 is credible, if so, the next step of transaction confirmation is executed, in a transaction confirmation interface, the first user u1 inputs a DID document key of the DIDt1 in the digital asset transaction platform, signature is checked by the digital asset transaction platform by utilizing the key signature, and after the signature of the user is confirmed, the transfer operation is executed.
Firstly, an issuing platform A and an issuing platform B where a target digital asset is located are accessed to transfer digital asset holding evidence, and the method specifically comprises the following steps:
1) Judging whether the second user u2 has corresponding second Tibetan identity information DIDa2 in the issuing platform A, and if the second user u2 does not have the corresponding second Tibetan identity information DIDa2, creating the decentralised second Tibetan identity information DIDa2 for the second user u2 in the issuing platform A.
2) NFT2 is transferred from under the DIDa1 account of first user u1 to under the DIDa2 account of second user u 2.
3) The first digital asset holding certificate of the first user u1 in the distribution platform a is changed, the NFT2 is deleted, and only the NFT1 is displayed.
4) Judging whether the second user u2 has corresponding second Tibetan identity information DIDb2 in the issuing platform B, and if not, creating the decentralised second Tibetan identity information DIDb2 for the second user u2 in the issuing platform B.
5) NFT3 is transferred from under the DIDb1 account of the first user u1 to under the DIDb2 account of the second user u 2.
6) The first digital asset holding certificate of the first user u1 in the distribution platform B is changed, and the NFT3 is deleted.
7) The second user u2 changes the second digital holding certificate in the issuing platform a, adds the display of the NFT2, and changes the second digital holding certificate in the issuing platform B, adds the display of the NFT3.
And transferring the digital asset on the display interfaces of the digital asset transaction platform, wherein the transfer of the digital asset is specifically as follows:
deleting NFT2 and NFT3 on a first user display page (e.g., query page, digital asset page, etc.) corresponding to DIDt1 of first user u 1; and adding NFT2 and NFT3 on the display page corresponding to the DIDt2 of the second user u 2.
After the transfer process is finished, the execution result is chained so as to facilitate subsequent inquiry and ensure the non-tamper property of the execution result. The specific uplink process is as follows: digital asset transfer proofs exist in blockchains, where the digital asset transfer proofs are used to characterize: the target digital asset is transferred by the first user to the second user. Wherein the digital asset transfer attestation includes at least one of: transaction identity information of a first user, transfer operation time, transfer identity information of a second user, a target digital asset, a digital asset transaction platform, a digital asset issuing platform and the like.
The DID identity information and verifiable credentials during digital asset transactions are exemplified below by another embodiment.
Referring to fig. 10, the digital asset issuing platform and the digital asset transaction platform are connected to an off-center avatar platform, and may be accessed by means of a software development kit (Software Development Kit, SDK), applet, software program Application or business system. The decentralization identity platform is connected with a blockchain, and the blockchain achieves the functions of encrypting and storing data and encrypting and storing credentials.
The user registers with the decentralised avatar platform to obtain real name identity information, for example, in fig. 10, the DID identifier in the real name identity information is: did ID ddd, public key: # key-1/# key-2.
FIG. 10
To illustrate contents in the DID document of the real-name identity information, the contents include:
the issuer is demonstrated: some issuing organization
Name: xxx
Identification card number: 1234
Number of mobile phone: 134xxxx
The owner: ddd
The digital asset issuing platform registers with the decentralised avatar platform to obtain Tibetan identity information of the user, for example, in fig. 10, the DID identifier in the Tibetan identity information is: did, nfta, ddd, public key: the digital asset issuing platform issues digital asset holding certificates to users through the blockchain.
An example of a digital asset-holding certificate is shown in fig. 10, where the digital asset-holding certificate includes:
the issuer is demonstrated: issuing platform A
Work name: xxx
Digital asset ID:1234
Collection picture: xxx. Jpg
The issuer: xxx
Release time: 2000.1.1
The owner: ddd
The digital asset transaction platform registers with the off-center avatar platform to obtain transaction identity information of the user, for example, in fig. 10, a DID identifier in the transaction identity information is: the public key is as follows: simultaneously, a user acquires encrypted data and corresponding digital asset holding evidence through a blockchain to generate a verifiable certificate, the verifiable certificate is sent to a digital asset transaction platform, digital asset transfer operation is executed after verification of the digital asset transaction platform is passed, and the verifiable certificate is generated: digital asset transfer attestation of the user.
It will be appreciated that the first user and the second user in the above embodiments are merely distinguished for convenience of description, and the above embodiments do not limit the users by using the first and the second, for example, the first user in the digital asset distribution platform may be merely the holder of the digital asset, and does not limit the transaction that must be performed.
In the traditional identity authentication mode, users need to register different account numbers when logging in different websites, and each website grasps the identity information of the user. Because the account numbers are too many, users often do not remember account numbers and passwords, and the generation right, the data ownership and the data income of the account numbers are all on the platform side, so that the problems of involuntary controllability of identity, privacy disclosure, poor portability and the like are brought. The identity authentication method represented by single sign-on is developed, so that the problems are alleviated to a certain extent, but the problem is not solved at all. Such as payment treasures or WeChat authorizations, as a third party account to log into a platform. After the user logs in other websites through authorization, the third party platform can collect the user information again to form an own identity system. While a single sign-on provider is at risk for controlling the digital identity of the user. Therefore, the distribution of decentralization is an identity authentication mode, and the decentralization identity platform is independent of a central identity provider, and has the characteristics of autonomous and controllable identity, privacy safety, portability and the like. The user can authorize to log in different platforms or websites through unified identity authentication, and repeated registration of application account numbers is avoided. According to the technical scheme provided by the embodiment of the application, based on the real-name identity information, the transaction identity information of the digital asset transaction platform and the Tibetan identity information of the digital asset issuing platform are issued, the user identity verification is performed by utilizing the decentralization identity platform, and the digital asset transaction platform and the digital asset issuing platform cannot directly acquire the real identity information of the user, so that the user can independently control the digital identity information in the digital asset transaction process, the leakage of excessive identity privacy is avoided, and the safety of the user identity information in the digital asset transaction process is ensured. And meanwhile, unified account login is realized, and complicated account registration and management are omitted. The account assets on the chains can be uniformly managed based on the decentralised avatar information, and the cross-platform digital asset transfer between accounts can be realized without inter-application settlement, so that the inter-chain asset sharing and transfer are convenient.
The embodiment of the invention also provides electronic equipment, which comprises:
at least one memory;
at least one processor;
at least one program;
the program is stored in the memory and the processor executes the at least one program to implement the digital asset transaction management method of the present invention as described above. The electronic equipment can be any intelligent terminal including a mobile phone, a tablet personal computer, a personal digital assistant (Personal Digital Assistant, PDA for short), a vehicle-mounted computer and the like.
Referring to fig. 11, fig. 11 illustrates a hardware structure of an electronic device according to another embodiment, the electronic device includes:
the processor 1101 may be implemented by a general purpose CPU (central processing unit), a microprocessor, an application specific integrated circuit (ApplicationSpecificIntegratedCircuit, ASIC), or one or more integrated circuits, etc. for executing related programs to implement the technical solution provided by the embodiments of the present invention;
the memory 1102 may be implemented in the form of a ROM (read only memory), a static storage device, a dynamic storage device, or a RAM (random access memory). Memory 1102 may store an operating system and other application programs, and when the technical solutions provided by the embodiments of the present disclosure are implemented in software or firmware, relevant program codes are stored in memory 1102 and invoked by processor 1101 to perform the digital asset transaction management method of the embodiments of the present disclosure;
An input/output interface 1103 for implementing information input and output;
the communication interface 1104 is configured to implement communication interaction between the device and other devices, and may implement communication in a wired manner (e.g. USB, network cable, etc.), or may implement communication in a wireless manner (e.g. mobile network, WIFI, bluetooth, etc.); and
bus 1105 transmits information between the various components of the device (e.g., processor 1101, memory 1102, input/output interface 1103, and communication interface 1104);
wherein the processor 1101, memory 1102, input/output interface 1103 and communication interface 1104 enable communication connection therebetween within the device via bus 1105.
The embodiment of the application also provides a storage medium, which is a computer readable storage medium, and the storage medium stores a computer program, and the computer program realizes the digital asset transaction management method when being executed by a processor.
The memory, as a non-transitory computer readable storage medium, may be used to store non-transitory software programs as well as non-transitory computer executable programs. In addition, the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory optionally includes memory remotely located relative to the processor, the remote memory being connectable to the processor through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The digital asset transaction management method, the digital asset transaction management device, the electronic equipment and the storage medium provided by the embodiment of the application utilize the decentralised transaction identity information of the first user and the decentralised transfer identity information of the second user to transfer the digital asset, and the decentralised identity information is generated by a trusted decentralised identity platform according to the real identity information of the user. The digital asset transaction platform utilizes the decentralization identity platform to carry out user identity verification, and cannot acquire the real identity information of the user, so that the user can independently control the digital identity information in the digital asset transaction process, the leakage of excessive identity privacy is avoided, and the safety of the user identity information can be ensured in the digital asset transaction process.
The embodiments described in the embodiments of the present application are for more clearly describing the technical solutions of the embodiments of the present application, and do not constitute a limitation on the technical solutions provided by the embodiments of the present application, and those skilled in the art can know that, with the evolution of technology and the appearance of new application scenarios, the technical solutions provided by the embodiments of the present application are equally applicable to similar technical problems.
It will be appreciated by persons skilled in the art that the embodiments of the application are not limited by the illustrations, and that more or fewer steps than those shown may be included, or certain steps may be combined, or different steps may be included.
The above described apparatus embodiments are merely illustrative, wherein the units illustrated as separate components may or may not be physically separate, i.e. may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
Those of ordinary skill in the art will appreciate that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof.
The terms "first," "second," "third," "fourth," and the like in the description of the application and in the above figures, if any, are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the application described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that in the present application, "at least one (item)" means one or more, and "a plurality" means two or more. "and/or" for describing the association relationship of the association object, the representation may have three relationships, for example, "a and/or B" may represent: only a, only B and both a and B are present, wherein a, B may be singular or plural. The character "/" generally indicates that the context-dependent object is an "or" relationship. "at least one of" or the like means any combination of these items, including any combination of single item(s) or plural items(s). For example, at least one (one) of a, b or c may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the above-described division of units is merely a logical function division, and there may be another division manner in actual implementation, for example, a plurality of units or components may be combined or may be integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, which may be in electrical, mechanical or other form.
The units described above as separate components may or may not be physically separate, and components shown as units may or may not be physical units, may be located in one place, or may be distributed over a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be embodied in essence or a part contributing to the prior art or all or part of the technical solution in the form of a software product stored in a storage medium, including multiple instructions to cause a computer device (which may be a personal computer, a server, or a network device, etc.) to perform all or part of the steps of the method of the various embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing a program.
The preferred embodiments of the present application have been described above with reference to the accompanying drawings, and are not thereby limiting the scope of the claims of the embodiments of the present application. Any modifications, equivalent substitutions and improvements made by those skilled in the art without departing from the scope and spirit of the embodiments of the present application shall fall within the scope of the claims of the embodiments of the present application.

Claims (10)

1. A digital asset transaction management method, characterized by being applied to a digital asset transaction platform, wherein the digital asset transaction platform is associated with at least one digital asset issuing platform; the method comprises the following steps:
acquiring transaction identity information of a first user, wherein the transaction identity information is first decentralised avatar information generated by the digital asset transaction platform on a blockchain for the first user by utilizing a decentralised identity platform;
acquiring a first digital asset holding certificate and a verifiable credential uploaded by the first user; the verifiable certificate is obtained by signing the first digital asset holding certificate, and the first digital asset holding certificate characterizes the first user to hold a digital asset on the digital asset issuing platform;
sending trusted verification information to the digital asset issuing platform according to the transaction identity information and the verifiable certificate to carry out trusted verification so as to judge the verification state of the verifiable certificate;
When the verification state is a trusted state and transfer identity information of a second user is obtained, a transfer instruction is obtained, and a target digital asset is transferred to the second user according to the transfer instruction and the first digital asset holding certificate; the transfer instruction is to characterize the target digital asset selected by the first user.
2. The digital asset transaction management method of claim 1, wherein the obtaining transaction identity information of the first user comprises:
acquiring real-name identity information of a first user, wherein the real-name identity information is third decentralised avatar information generated on the blockchain by a decentralised avatar platform;
inquiring whether the first user has the transaction identity information on the digital asset transaction platform, wherein the transaction identity information is associated with first Tibetan identity information, and the first Tibetan identity information is fourth decentralised avatar information generated by the digital asset issuing platform on a blockchain;
if the transaction identity information exists, activating the transaction identity information;
and if the transaction identity information does not exist, the digital asset transaction platform checks the real-name identity information with the off-center avatar part platform, and after the checking is passed, the transaction identity information is generated.
3. The digital asset transaction management method according to claim 2, wherein the transfer-in identity information is second transaction identity information of the second user at the digital asset transaction platform; when the verification state is a trusted state and transfer identity information of a second user is obtained, a transfer instruction is obtained, and a target digital asset is transferred to the second user according to the transfer instruction and the first digital asset holding certificate, including:
when the verification state is a trusted state, inquiring the first digital asset holding certificate in a blockchain to obtain a first user display page, wherein the first user display page is used for displaying the digital asset of the first user;
responding to the transfer instruction, checking the transfer identity information at the off-center avatar platform, and generating a transfer display page of the second user after the checking is passed; the transfer-in display page is a digital asset display page of the second user;
acquiring a transaction signature of the first user, checking the transaction signature, and executing digital asset transfer operation after the check is passed: deleting the target digital asset on the first user display interface and displaying the target digital asset on the transfer-in display page;
Transmitting the transfer instruction to the digital asset issuing platform so that the digital asset issuing platform performs a holding certificate updating operation according to the transfer instruction: deleting the target digital asset in the digital asset holding certificate of the first user and adding the target digital asset in the second digital asset holding certificate of the second user.
4. The digital asset transaction management method according to claim 2, wherein the transfer-in identity information is second Tibetan identity information of the second user on the digital asset issuing platform; when the verification state is a trusted state and transfer identity information of a second user is obtained, a transfer instruction is obtained, and a target digital asset is transferred to the second user according to the transfer instruction and the first digital asset holding certificate, including:
responding to the transfer instruction, and checking the identity information of the transfer in the off-center avatar platform;
when the verification is passed, the transfer instruction and the transfer identity information are sent to the digital asset issuing platform;
acquiring the first digital asset holding certificate and the second digital asset holding certificate of the second user updated by the digital asset issuing platform after responding to the transfer instruction and the transfer identity information; deleting the target digital asset from the first digital asset holding certificate, and adding the target digital asset to the second digital asset holding certificate of the second user;
Querying the first digital asset holding certificate in a blockchain to obtain a first user display page, and generating a transfer-in display page of the second user; the transfer-in display page is a digital asset display page of the second user;
and not displaying the target digital asset on the first user display interface, and displaying the target digital asset on the transfer-in display page.
5. A digital asset transaction management method according to any of claims 3 or 4, characterised in that the method further comprises: presence of a digital asset transfer proof in a blockchain, the digital asset transfer proof being used to characterize the transfer of the target digital asset by the first user to the second user; the digital asset transfer attestation includes at least one of: the transaction identity information of the first user, transfer operation time, the transfer-in identity information of the second user, the target digital asset, the digital asset transaction platform and the digital asset issuing platform.
6. The digital asset transaction management method is characterized by being applied to a digital asset issuing platform, wherein the digital asset issuing platform is associated with a digital asset transaction platform; the method comprises the following steps:
Acquiring real-name identity information of a first user, wherein the real-name identity information is third decentralised avatar information generated on a blockchain by a decentralised identity platform;
checking the decentralized identity platform according to the real-name identity information, and generating first Tibetan identity information of the first user based on the real-name identity information after the checking is passed;
acquiring asset purchase information of the first user, wherein the asset purchase information is used for representing digital assets selected by the first user;
generating a first digital asset holding certificate and issuing private key for the first user in response to the asset purchase information and the first Tibetan identity information; the issuing private key is used for signing the first digital asset holding certificate to obtain a verifiable certificate;
and after receiving the trusted verification information sent by the digital asset transaction platform, generating a verification state of the verifiable certificate and sending the verification state to the digital asset transaction platform, so that the first user transfers the digital asset to the second user on the basis of the identity information in the digital asset transaction platform.
7. The digital asset transaction management method of claim 6, further comprising:
Receiving a transfer instruction characterizing transfer of the target digital asset by the first user to the second user;
acquiring second Tibetan identity information of the second user according to the transfer instruction;
acquiring a second digital asset holding certificate of the second user according to the second Tibetan identity information;
in response to the transfer instruction, deleting the target digital asset in the first digital asset holding certificate and adding the target digital asset in the second digital asset holding certificate.
8. A digital asset transaction management system, comprising:
an off-center avatar platform;
the digital asset issuing platform is in communication connection with the off-center avatar platform; the digital asset identification system comprises a centralized identity platform, a first digital asset holding certificate and an issuing private key, wherein the centralized identity platform is used for acquiring real-name identity information of a first user, checking the real-name identity information of the first user, generating first Tibetan identity information of the first user based on the real-name identity information after the checking is passed, and generating a first digital asset holding certificate and the issuing private key of the first user by utilizing the first Tibetan identity information and the asset purchase information in response to asset purchase information of the first user; the issuing private key is used for signing the first digital asset holding certificate to obtain a verifiable certificate;
A digital asset transaction platform in communication with the de-centralized identity platform and the first digital asset issuing platform; the digital asset transaction platform is used for acquiring transaction identity information of a first user, a first digital asset holding certificate and a verifiable certificate, wherein the verifiable certificate is obtained by signing the first digital asset holding certificate, and the digital asset transaction platform is also used for carrying out trusted verification on the digital asset issuing platform according to the transaction identity information and the verifiable certificate to obtain the verification state of the verifiable certificate;
when the verification state is a trusted state, and transfer-in identity information of a second user is obtained, the digital asset transaction platform is used for obtaining a transfer instruction, transferring a target digital asset to the second user according to the transfer instruction and the first digital asset holding certificate, and the digital asset issuing platform is used for updating the first digital asset holding certificate of the first user and the second digital asset holding certificate of the second user according to the transfer instruction.
9. An electronic device comprising a memory storing a computer program and a processor that when executing the computer program implements the digital asset transaction management method of any of claims 1 to 7.
10. A computer readable storage medium storing a computer program, wherein the computer program when executed by a processor implements the digital asset transaction management method of any of claims 1 to 7.
CN202310145114.4A 2023-02-17 2023-02-17 Digital asset transaction management method, system, device and storage medium Pending CN117094723A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310145114.4A CN117094723A (en) 2023-02-17 2023-02-17 Digital asset transaction management method, system, device and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310145114.4A CN117094723A (en) 2023-02-17 2023-02-17 Digital asset transaction management method, system, device and storage medium

Publications (1)

Publication Number Publication Date
CN117094723A true CN117094723A (en) 2023-11-21

Family

ID=88774015

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310145114.4A Pending CN117094723A (en) 2023-02-17 2023-02-17 Digital asset transaction management method, system, device and storage medium

Country Status (1)

Country Link
CN (1) CN117094723A (en)

Similar Documents

Publication Publication Date Title
AU2021206913B2 (en) Systems and methods for distributed data sharing with asynchronous third-party attestation
US12021992B2 (en) System and method for authenticating user identity
CN107180350B (en) Method, device and system for multi-party sharing transaction metadata based on block chain
CN110599213B (en) Article management method and device based on blockchain network and electronic equipment
US10402784B2 (en) Dynamic notary system
CN110098932B (en) Electronic document signing method based on safe electronic notarization technology
US8752203B2 (en) System for managing computer data security through portable data access security tokens
US20050235153A1 (en) Digital signature assurance system, method, program and apparatus
CN111327426B (en) Data sharing method and related device, equipment and system
CN110728494A (en) Real estate service handling method, real estate property information system and real estate property information device
KR102166690B1 (en) Management server and method of digital signature for electronic document
CN108881121A (en) A kind of P2P credit based on mobile Internet mutually sees system and method
CN112801778A (en) Federated bad asset blockchain
CN111931230A (en) Data authorization method and device, storage medium and electronic device
CN112948866A (en) Data processing method, device and equipment and readable storage medium
CN111934881A (en) Data right confirming method and device, storage medium and electronic device
CN116894727A (en) Data processing method and device based on block chain and related equipment
CN117094723A (en) Digital asset transaction management method, system, device and storage medium
WO2024021785A1 (en) Digital entity processing method and apparatus, device, medium, and program product
CN113807845B (en) Real estate transaction system based on blockchain and implementation method thereof
US20240202711A1 (en) Decentralized incentive system for validating transactions to blockchain miners
CN115967495A (en) Public service application management method and device based on block chain
KR20230137766A (en) Method for Issuing Non-Fungible Token of Certificate-Based Rights
KR20230137768A (en) Method for Saftey Issuing Non-Fungible Token of Certificate-Based Rights
CN116980136A (en) Interface processing method, device, equipment, storage medium and product of intelligent contract

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination