WO2019200765A1 - 基于分布式技术实现数字资产在映射链上的映射系统及相应方法 - Google Patents

基于分布式技术实现数字资产在映射链上的映射系统及相应方法 Download PDF

Info

Publication number
WO2019200765A1
WO2019200765A1 PCT/CN2018/096215 CN2018096215W WO2019200765A1 WO 2019200765 A1 WO2019200765 A1 WO 2019200765A1 CN 2018096215 W CN2018096215 W CN 2018096215W WO 2019200765 A1 WO2019200765 A1 WO 2019200765A1
Authority
WO
WIPO (PCT)
Prior art keywords
digital asset
chain
mapping
transaction
distributed
Prior art date
Application number
PCT/CN2018/096215
Other languages
English (en)
French (fr)
Inventor
钱德君
何曌君
许国昌
蒋斌
罗希
Original Assignee
上海分赋信息科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 上海分赋信息科技有限公司 filed Critical 上海分赋信息科技有限公司
Priority to US17/047,818 priority Critical patent/US20210142318A1/en
Publication of WO2019200765A1 publication Critical patent/WO2019200765A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • G06Q20/0658Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash e-cash managed locally
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/085Secret sharing or secret splitting, e.g. threshold schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees

Definitions

  • the present invention relates to the field of distributed technologies, and in particular, to the field of blockchain technology, and specifically to a mapping system and a corresponding method for implementing digital assets on a mapping chain based on distributed technologies.
  • the blockchain is essentially a decentralized database, like a shared ledger, which records the transaction information of all encrypted digital assets.
  • the blockchain has decentralization, openness, anonymity and Can not be tampered and other characteristics.
  • the control of encrypted digital assets is embodied as private key control.
  • the essence of the private key is a random number.
  • the private key algorithm of the bitcoin is to run a SHA256 hash algorithm on the random number to generate a 256-bit random number. Add the version number in front, add the compression flag and the additional check code (after two SHA-256 operations, take the first four bytes of the hash result twice), and then perform Base58 encoding on it to get the WIF.
  • the private key in the (Wallet import Format) format.
  • the public key is generated by the private key via the secp256k1 elliptic curve algorithm, and the bitcoin address is generated by the public key via a hash function (RPIEMD+SHA).
  • the object of the present invention is to overcome the above disadvantages of the prior art, and to provide a mapping system and a corresponding method for realizing digital assets on a mapping chain based on distributed technology capable of cross-chain mapping.
  • mapping system and corresponding method for realizing digital assets on a mapping chain based on distributed technology of the present invention have the following components:
  • the mapping system for implementing digital assets on a mapping chain based on distributed technology includes a mapping chain and at least two public chains, and the mapping chain generates a private key of the fragment based on the distributed technology.
  • the distributed custody of each fragment private key is completed, and the cross-chain communication between the at least two public chains is completed by locking and unlocking the digital assets in the at least two public chains.
  • the main feature of the method for implementing the locking control of digital assets based on the above system is that the method comprises the following steps:
  • mapping chain described in (A2) generates a private key of the fragment based on the distributed technology, and completes distributed storage of the private keys of the fragments;
  • the smart contract After confirming that the control of the digital asset is successfully transferred, the smart contract updates the account status of the mapping chain to complete the locking and mapping of the digital asset.
  • the mapping chain In the step (A2) of the method for implementing the lock control of the digital asset, the mapping chain generates a private key of the slice based on the distributed key generation protocol DKG, and distributed storage of each fragment private key.
  • the distributed storage of the fragmented private keys is specifically:
  • Each fragment private key is separately stored in each node of the mapping chain.
  • the step (A3) of the method for implementing the lock control of the digital asset comprises the following steps:
  • mapping chain (A31) generates a locked address of the public chain based on each fragment private key
  • Each node of the mapping chain (A33) passes the query interface to confirm the control of the digital asset of the completed transaction after confirming that the transaction of the digital asset is confirmed on the public chain.
  • each node in the mapping chain respectively receives transaction broadcast information generated based on the triggered smart contract, and completes the transaction of the digital asset when the transaction signature of each node reaches a threshold of the transaction signature;
  • mapping chain described in (B3) releases control of the digital assets that have completed the transaction
  • the smart contract After confirming that the control right of the digital asset for the completed transaction is successfully released, the smart contract updates the account status of the mapping chain to complete the unlocking of the digital asset and the release of the mapping.
  • the method further includes:
  • the triggered smart contract checks the full amount of the digital asset of the public chain, and locks the digital asset to be unlocked in the public chain when the digital asset reaches the digital asset to be unlocked in full. And generate transaction broadcast information generated based on the triggered smart contract.
  • the transaction broadcast information of the method for implementing unlock control of a digital asset includes a transaction destination address and a transaction signature.
  • the step (B3) of the method for implementing the unlocking control of the digital asset is specifically:
  • Each node of the mapping chain through the query interface, releases the control of the digital asset that has completed the transaction after confirming that the transaction of the digital asset is confirmed on the public chain.
  • mapping system and corresponding method for realizing digital assets on the mapping chain based on the distributed technology in the invention are adopted, and the mapping method of different digital assets is supported, so that different currencies can be mapped to one mapping chain in a more innovative manner. And without any changes to the public chain, so that these tokens can achieve multi-currency smart contracts on the same chain, greatly improving the interoperability of value Internet, and become the infrastructure of encryption finance.
  • the mapping process is to establish a distributed blockchain for controlling token control by securely controlling the token private keys on various blockchains in a distributed manner. It is like a “highway” on the value of the Internet, enabling easy transfer of value between various tokens and multi-currency smart contracts for encrypted financial services.
  • FIG. 1 is a schematic diagram of a main flow of a method for locking a digital asset on a mapping chain based on a distributed technology according to the present invention.
  • FIG. 2 is a schematic diagram of distributed storage of a fragmented private key in the present invention.
  • the mapping system implements a mapping system of digital assets on a mapping chain based on a distributed technology, wherein the system includes a mapping chain and at least two public chains, and the mapping chain generates a private key of the fragment based on a distributed technology and completes each Distributed storage of the fragmented private key, and completion of cross-chain communication between the at least two public chains by locking and unlocking the digital assets in the at least two public chains, notably, in the present invention
  • the nature of the mapping chain is the public chain, which is used to map assets of other mainstream public chains, so it is called "mapping chain".
  • the method for implementing the locking control of digital assets based on the above system (refer to FIG. 1), the main feature is that the method comprises the following steps:
  • mapping chain described in (A2) generates a private key of the fragment based on the distributed technology, and completes distributed storage of the private keys of the fragments;
  • the smart contract After confirming that the control of the digital asset is successfully transferred, the smart contract updates the account status of the mapping chain to complete the locking and mapping of the digital asset.
  • the mapping chain In the step (A2) of the method for implementing the locking control of the digital asset, the mapping chain generates a private key for generating a fragment based on a distributed key generation protocol DKG (Distributed Key Generation), and a private key for each fragmented private key. Distributed storage.
  • DKG Distributed Key Generation
  • Each fragment private key is separately stored in each node of the mapping chain.
  • the step (A3) of the method for implementing the lock control of the digital asset comprises the following steps:
  • mapping chain (A31) generates a locked address of the public chain based on each fragment private key
  • Each node of the mapping chain (A33) passes the query interface to confirm the control of the digital asset of the completed transaction after confirming that the transaction of the digital asset is confirmed on the public chain.
  • each node in the mapping chain respectively receives transaction broadcast information generated based on the triggered smart contract, and completes the transaction of the digital asset when the transaction signature of each node reaches a threshold of the transaction signature;
  • mapping chain described in (B3) releases control of the digital assets that have completed the transaction
  • the smart contract After confirming that the control right of the digital asset for the completed transaction is successfully released, the smart contract updates the account status of the mapping chain to complete the unlocking of the digital asset and the release of the mapping.
  • the method further includes:
  • the triggered smart contract checks the full amount of the digital asset of the public chain, and locks the digital asset to be unlocked in the public chain when the digital asset reaches the digital asset to be unlocked in full. And generate transaction broadcast information generated based on the triggered smart contract.
  • the transaction broadcast information of the method for implementing unlock control of a digital asset includes a transaction destination address and a transaction signature.
  • the step (B3) of the method for implementing the unlocking control of the digital asset is specifically:
  • Each node of the mapping chain through the query interface, releases the control of the digital asset that has completed the transaction after confirming that the transaction of the digital asset is confirmed on the public chain.
  • the public chain in the locking and unlocking process of the present invention can further implement the mapping system of the digital asset on the mapping chain by using the distributed technology of the present invention as long as the address is the requirement of the private key control. Ground, mapping of digital assets is possible.
  • the distributed technology based on the distributed technology of the present invention implements two steps of locking in and unlocking in the mapping system of the public blockchain, and in the case of lock in, How to ensure the effective generation of private keys, non-disclosure during the process of storage and use is a key issue to securely and reliably implement digital asset lock in. If the private key is stored completely in one place, there will be a private key leak due to a node attack or malicious node collection. Therefore, in order to ensure the security of the private key, the private key is chosen to be fragmented and handed over to different nodes ( Figure 2).
  • the distributed generation of the private key is performed distributedly by multiple nodes on the mapping chain. Each node only generates and stores a part of the private key, and no private key fragmentation is transmitted and assembled between each other. In this process, the number of fragments is determined according to the algorithm of key fragmentation, and a virtual node group is formed according to this quantity to generate a private key. In order to ensure that the distributed custody key is always available, the node number generation algorithm of the node group will ensure that there are enough nodes to be offline at the same time with a very small probability.
  • the shards are randomly generated by the nodes in the group according to the determined shard length and finally form the value of the shard according to the established consensus mechanism.
  • the node When a transaction requiring signature verification is broadcast, the node can verify it according to its saved private key fragment. After the verification is successful, the node signs and broadcasts the verification result. In this process, the transmission content is irreversible, and therefore, it is impossible to reverse the key or private key fragmentation by any content of the broadcast.
  • the node collects the result of each node's signature by broadcasting while completing the private key fragmentation verification. When the number of signatures of a transaction reaches the threshold, the transaction is considered valid.
  • the bitcoin (corresponding to the public chain in the present invention) and the Fusion chain (corresponding to the mapping chain in the present invention, the nature of which is also a public chain) is taken as an example to map the bitcoin to the Fusion chain.
  • the user's experience of initiating a lock in request to the wallet is similar in operation to the experience of an existing wallet transfer.
  • the specific implementation steps are as follows:
  • the request operation triggers a smart contract of lock in the Fusion chain, and the smart contract organizes the initialization of the private key.
  • the so-called initialization of the private key is to generate the private key of the fragment in a distributed manner and complete the distributed storage of the private keys of each fragment.
  • the initialization is completed and a lock address is generated.
  • the lock address is an address on the bitcoin chain, and user A initiates a transfer to the address.
  • the user initiates the transfer operation to broadcast the lock in the Fusion chain via the interface, and the node on the Fusion chain checks the completion of the transfer.
  • the node on the Fusion chain After receiving the transaction broadcast, the node on the Fusion chain queries whether the transaction is confirmed on the bitcoin chain through a third-party interface.
  • the consensus results show that the 10 BTCs are successfully transferred to the address generated by lock in, which means that the distributed control management handover is successful.
  • the smart contract After confirming the successful handover of the control, the smart contract completes the status update of User A's account on the Fusion chain.
  • the lock in record is packed by the node into the block on the Fusion chain.
  • user A's 10 BTC lock in requests are completed.
  • lock out is also initiated in the wallet by calling the relevant program interface. It is similar to the user experience in transferring money with a wallet.
  • the implementation process of lock out is as follows:
  • User A operates in the wallet to initiate a 10 BTC transfer transaction to an out-of-chain bitcoin address, which is considered to be a user-initiated lock out request.
  • the transaction triggers a smart contract with lock out on the Fusion chain.
  • the contract first checks the asset status of User A on the Fusion chain. When the transfer conditions are met, the status of 10 Bitcoins in User A's Fusion Chain account is locked and a A transfer transaction with a destination address and a user signature.
  • the nodes on the Fusion chain receive the transaction instructions, start to calculate and compare according to the saved key fragments, and compare the successful nodes to sign and broadcast the results.
  • Each node collects signatures at the same time.
  • the transaction signature reaches t/m, (t ⁇ m) threshold threshold requirement, t/m is generally 2/3, and the transaction is sent by the node to the bitcoin main chain to realize to user A. Transfer the 10 BTC transactions at the specified address.
  • the node on the Fusion chain will check whether the transaction is confirmed on the Bitcoin main chain through the interface corresponding to Bitcoin. After the consensus reaches the result of the transaction confirmation, User A's 10 BTCs will be removed from the distributed control management.
  • the smart contract synchronously updates the status of the user's account on the FUSION, and deducts the locked 10 BTC mappings to complete the release and destruction of the mapping. At the same time, the lock out record is packed into the block of the FUSION.
  • the status update of the main chain account balance can reflect the completion of lock in or lock out.
  • the process of accounting actually issues or reclaims the tokens of the same amount of digital assets from the main chain to the user account, thus completing or unmapping the mapping of the digital assets to the main chain.
  • mapping system and corresponding method for realizing different digital assets in the public blockchain based on the distributed technology in the invention are adopted, and the mapping method of different digital assets is supported, so that different currencies can be mapped to one mapping in a more innovative manner.
  • these tokens can achieve multi-currency smart contracts on the same chain, greatly improving the interoperability of value Internet and becoming the infrastructure of encryption finance.
  • the mapping process is to establish a distributed blockchain for controlling token control by securely controlling the token private keys on various blockchains in a distributed manner. It is like a “highway” on the value of the Internet, enabling easy transfer of value between various tokens and multi-currency smart contracts for encrypted financial services.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Technology Law (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Storage Device Security (AREA)

Abstract

本发明涉及一种基于分布式技术实现数字资产在映射链上的映射系统及相应方法,其中该系统包括映射链和至少两个公有链,所述映射链基于分布式技术生成分片的私钥并完成对各分片私钥的分布式保管,以及通过对所述至少两个公有链中数字资产的锁定和解锁,完成所述至少两个公有链之间的跨链通信。采用了该发明中的基于分布式技术实现数字资产在映射链上的映射系统及相应方法,支持不同数字资产的映射方法以一种更加创新的方式让不同币种都能映射到一条映射链上,并且无需上述至少两个公有链做任何改动,从而可以使这些代币在同一条链上实现多币种智能合约,极大的提高价值互联网的互通性,并成为加密金融的基础设施。

Description

基于分布式技术实现数字资产在映射链上的映射系统及相应方法
相关申请的交叉引用
本申请主张2018年4月16日提交的申请号为201810339305.3的中国发明专利申请的优先权,其内容通过引用的方式并入本申请中。
技术领域
本发明涉及分布式技术领域,尤其涉及区块链技术领域,具体是指一种基于分布式技术实现数字资产在映射链上的映射系统及相应方法。
背景技术
区块链本质上是一个去中心化的数据库,就像一个共享账本,记录所有的加密数字资产的交易信息,作为比特币的底层技术,区块链具有去中心化、开放性、匿名性和不可篡改等特点。
加密数字资产的控制权体现为私钥控制权。以比特币举例,私钥的本质是一个随机数,比特币的私钥算法为对随机数运行SHA256哈希算法生成256位随机数。在前面加上版本号,后面添加压缩标志和附加校验码(经过2次SHA-256运算,取两次哈希结果的前四字节),然后再对其进行Base58编码,就可以得到WIF(Wallet import Format)格式的私钥。公钥由私钥经过secp256k1椭圆曲线算法生成,比特币地址由公钥经过哈希函数(RPIEMD+SHA)生成。
目前,不管加密数字资产在个人或交易所手里,其私钥都完整的存储于一个中心化单点。这个单点可能是用户自己,也可能是提供钱包的第三方或者是中心化的交易所等等。因此,私钥的泄露、被盗取以及第三方恶意侵占等种种安全性问题在加密数字资产领域频繁发生,尤其是加密数字资产交易所屡次出现严重的数字资产被窃事件,造成用户数字资产的巨大损失。
同时,比特币、以太坊等主流区块链网络如同一个个孤岛,相互之间无法直接通信,用户所持有的不同区块链加密数字资产也无法直接兑换,这极大的制约了区块链的应用。
发明内容
本发明的目的是克服了上述现有技术的缺点,提供了一种能够跨链映射的基于分布式技 术实现数字资产在映射链上的映射系统及相应方法。
为了实现上述目的,本发明的基于分布式技术实现数字资产在映射链上的映射系统及相应方法具有如下构成:
该基于分布式技术实现数字资产在映射链上的映射系统,其主要特点是,所述的系统包括映射链和至少两个公有链,所述映射链基于分布式技术生成分片的私钥并完成对各分片私钥的分布式保管,以及通过对所述至少两个公有链中数字资产的锁定和解锁,完成所述至少两个公有链之间的跨链通信。
该基于上述系统实现数字资产的锁定控制的方法,其主要特点是,所述的方法包括以下步骤:
(A1)发送锁定一公有链的数字资产请求,并触发所述映射链上用于锁定所述数字资产的智能合约;
(A2)所述的映射链基于分布式技术生成分片的私钥,以及完成对各分片私钥的分布式保管;
(A3)所述的公有链将所述数字资产的控制权移交至所述的映射链,以实现所述数字资产的分布式管理;
(A4)确认所述数字资产的控制权移交成功后,所述的智能合约对所述映射链的账户状态进行更新,以完成所述对所述数字资产的锁定及映射。
该实现数字资产的锁定控制的方法的步骤(A2)中,所述的映射链基于分布式密钥生成协议DKG生成分片的私钥,以及对各分片私钥的分布式保管。
该实现数字资产的锁定控制的方法中,所述的各分片私钥的分布式保管具体为:
将各分片私钥分别保存于所述映射链的各个节点。
该实现数字资产的锁定控制的方法的步骤(A3)包括以下步骤:
(A31)所述的映射链基于各分片私钥生成所述公有链的一锁定地址;
(A32)将所述的数字资产转入所述的锁定地址中,并向所述的映射链发起转入所述数字资产的交易广播;
(A33)所述的映射链的各个节点通过查询接口在确认所述数字资产的交易在所述的公有链上得到确认后,移交关于已完成交易的数字资产的控制权。
该基于上述系统实现数字资产的解锁控制的方法,其主要特点是,所述的方法包括以下步骤:
(B1)发起解锁一公有链的数字资产请求,以触发所述映射链上用于解锁所述数字资产的智能合约;
(B2)所述映射链中的各个节点分别接收基于已触发的智能合约生成的交易广播信息,并在所述各个节点的交易签名达到交易签名的门限值时完成所述数字资产的交易;
(B3)所述的映射链解除关于已完成交易的数字资产的控制权;
(B4)确认所述关于已完成交易的数字资产的控制权解除成功后,所述的智能合约对所述映射链的账户状态进行更新,以完成对所述数字资产的解锁及映射的解除。
该实现数字资产的解锁控制的方法的步骤(B2)之前,还包括:
(B20)所述已触发的智能合约检查所述公有链的数字资产全额,并在所述的数字资产全额达到需解锁的数字资产时,锁定所述公有链中需解锁的数字资产,并生成基于已触发的智能合约生成的交易广播信息。
该实现数字资产的解锁控制的方法的交易广播信息包括交易目标地址和交易签名。
该实现数字资产的解锁控制的方法的步骤(B3)具体为:
所述映射链的各个节点通过查询接口在确认所述数字资产的交易在所述的公有链上得到确认后,解除关于已完成交易的数字资产的控制权。
采用了该发明中的基于分布式技术实现数字资产在映射链上的映射系统及相应方法,支持不同数字资产的映射方法以一种更加创新的方式让不同币种都能映射到一条映射链上,并且无需任何公有链做任何改动,从而可以使这些代币在同一条链上实现多币种智能合约,极大的提高价值互联网的互通性,并成为加密金融的基础设施。同时映射的过程是通过以分布式的方式安全地控制各种区块链上的代币私钥,从而建立一个分布式的管理代币控制权的区块链。它就像价值互联网上的“高速公路”,能够轻松实现各种代币之间的价值转移及面向加密金融服务的多币种智能合约。
附图说明
图1为本发明的基于分布式技术实现数字资产在映射链上的锁定方法的主要流程示意图。
图2为本发明中将分片私钥进行分布式保管的示意图。
具体实施方式
为了能够更清楚地描述本发明的技术内容,下面结合具体实施例来进行进一步的描述。
该基于分布式技术实现数字资产在映射链上的映射系统,其中,所述的系统包括映射链和至少两个公有链,所述映射链基于分布式技术生成分片的私钥并完成对各分片私钥的分布式保管,以及通过对所述至少两个公有链中数字资产的锁定和解锁,完成所述至少两个公有链之间的跨链通信,值得注意的是,本发明中的映射链性质为公有链,其用于映射其他主流公有链的资产,故称“映射链”。
该基于上述系统实现数字资产的锁定控制的方法(参阅图1),其主要特点是,所述的方法包括以下步骤:
(A1)发送锁定一公有链的数字资产请求,并触发所述映射链上用于锁定所述数字资产的智能合约;
(A2)所述的映射链基于分布式技术生成分片的私钥,以及完成对各分片私钥的分布式保管;
(A3)所述的公有链将所述数字资产的控制权移交至所述的映射链,以实现所述数字资产的分布式管理;
(A4)确认所述数字资产的控制权移交成功后,所述的智能合约对所述映射链的账户状态进行更新,以完成所述对所述数字资产的锁定及映射。
该实现数字资产的锁定控制的方法的步骤(A2)中,所述的映射链基于分布式密钥生成协议DKG(Distributed Key Generation)生成生成分片的私钥,以及对各分片私钥的分布式保管。
该实现数字资产的锁定控制的方法的分片私钥的分布式保管具体为(参阅图2):
将各分片私钥分别保存于所述映射链的各个节点。
该实现数字资产的锁定控制的方法的步骤(A3)包括以下步骤:
(A31)所述的映射链基于各分片私钥生成所述公有链的一锁定地址;
(A32)将所述的数字资产转入所述的锁定地址中,并向所述的映射链发起转入所述数字资产的交易广播;
(A33)所述的映射链的各个节点通过查询接口在确认所述数字资产的交易在所述的公有链上得到确认后,移交关于已完成交易的数字资产的控制权。
该基于上述系统实现数字资产的解锁控制的方法,其主要特点是,所述的方法包括以下步骤:
(B1)发起解锁一公有链的数字资产请求,以触发所述映射链上用于解锁所述数字资产 的智能合约;
(B2)所述映射链中的各个节点分别接收基于已触发的智能合约生成的交易广播信息,并在所述各个节点的交易签名达到交易签名的门限值时完成所述数字资产的交易;
(B3)所述的映射链解除关于已完成交易的数字资产的控制权;
(B4)确认所述关于已完成交易的数字资产的控制权解除成功后,所述的智能合约对所述映射链的账户状态进行更新,以完成对所述数字资产的解锁及映射的解除。
该实现数字资产的解锁控制的方法的步骤(B2)之前,还包括:
(B20)所述已触发的智能合约检查所述公有链的数字资产全额,并在所述的数字资产全额达到需解锁的数字资产时,锁定所述公有链中需解锁的数字资产,并生成基于已触发的智能合约生成的交易广播信息。
该实现数字资产的解锁控制的方法的交易广播信息包括交易目标地址和交易签名。
该实现数字资产的解锁控制的方法的步骤(B3)具体为:
所述映射链的各个节点通过查询接口在确认所述数字资产的交易在所述的公有链上得到确认后,解除关于已完成交易的数字资产的控制权。
优选地,本发明的锁定和解锁过程中的公有链只要满足其地址为私钥控制的要求,均可采用本发明的基于分布式技术实现数字资产在映射链上的映射系统进行进一步操作,优选地,可进行数字资产的映射。
在一具体实施方式中,本发明的基于分布式技术实现数字资产在公有区块链的映射系统中,将进行锁定(lock in)和解锁(lock out)两个步骤,而在lock in时,如何确保私钥的有效生成,保管和使用的过程中不泄露,是安全可靠地实现数字资产lock in的关键性问题。如果私钥完整的存储在一个地方,将会因为节点攻击或者恶意节点收集出现私钥泄露的情况。因此为了确保私钥的安全,选择将私钥分片并交由不同的节点保管(图2)。
本发明提出的技术方案的关键点如下:
(1)私钥的分布式生成
私钥的分布式生成,是通过映射链上多个节点分布式地开展完成的,每个节点只生成并保存私钥的一部分,彼此之间并不发生私钥分片的传递和组装。这个过程中,会根据密钥分片的算法确定分片的数量,按照这个数量形成虚拟的节点组进行私钥的生成。为了保证分布式保管的密钥一直处于可用状态,节点组的节点数量的生成算法将确保有足够多节点同时不在线的概率在一个极小的范围之内。分片按照确定的分片长度由组中节点独立随机生成并依 照既定的共识机制最终形成分片的值。
(2)解锁过程中的交易签名
当一笔需要签名验证的交易被广播出来,节点可以根据自己保存的私钥分片进行验证。验证成功后,节点对其验证结果签名并广播出去。这个过程中,传输内容是不可逆的,因此,无法通过广播的任何内容反推出密钥或者私钥分片。
(3)签名确认
节点在完成私钥分片验证的同时,通过广播收集各节点签名的结果,当一笔交易的签名数量达到门限值时,该交易就被认为有效。
在一具体实施方式中,以比特币(相当于本发明中的公有链)和Fusion链(相当于本发明中的映射链,其性质也为公有链)为例介绍将比特币映射至Fusion链上的过程:
当用户A发起一笔10个比特币(BTC)的lock in。用户将使用钱包作为交互界面。这个钱包具有目前多币种钱包的很多功能,但它同时拥有对不同数字资产lock in和管理的功能。此外,钱包中还会有基于公有链上第三方所开发的各种金融服务,可以供用户在完成lock in之后方便地参与。
其中,lock in的实现过程如下:
用户向钱包发起lock in请求的体验在操作上与现有钱包转账的体验类似。具体的实现步骤如下:
(1)发起lock in请求
用户A通过在钱包中调用lock in的程序接口,向Fusion链发起10个BTC的lock in请求。
(2)分布式私钥生成
请求操作触发Fusion链上lock in的智能合约,由该智能合约组织私钥的初始化。所谓私钥的初始化,就是采用分布式的方式生成分片的私钥并完成对各分片私钥的分布式保管。
(3)移交控制权给分布式管理
初始化完成并生成锁定地址,锁定地址为比特币链上的一个地址,由用户A发起向该地址的转账。用户发起转账的操作经由接口在Fusion链上广播本次lock in,由Fusion链上的节点检查转账完成的情况。
Fusion链上的节点收到交易广播后,通过第三方接口查询该笔交易是否在比特币链上得到确认。通过共识结果显示这10个BTC顺利转入lock in所生成的地址,即视为分布式控制 权管理移交成功。
(4)数字资产映射
在确认控制权移交成功之后,,智能合约完成用户A在Fusion链上账户的状态更新。该笔lock in记录由节点打包记录到Fusion链上的块中。至此,用户A的10个BTC的lock in请求完成。
同样的,用户lock out的请求也是在钱包中通过调用相关程序接口发起的。在用户体验上与用钱包进行对外转账类似。lock out的实现过程如下:
(1)发起lock out请求
用户A在钱包中操作向一个链外比特币地址发起10个BTC的转账交易,即视为用户发起lock out请求。
(2)检查、锁定和生成交易
该交易触发Fusion链上lock out的智能合约,合约首先将检查用户A在Fusion链上的资产状况,满足转账条件时,锁定用户A在Fusion链账户中的10个比特币的状态,并生成一笔带有目标地址和用户签名的转账交易。
(3)门限签名
Fusion链上的节点接收到交易指令,开始根据各自保存的密钥分片进行计算和比对,比对成功的节点将结果签名并进行广播。各节点同时收集签名,当交易签名达到t/m,(t≤m)门限阈值的要求时,一般取t/m为2/3,该交易由节点发送至比特币主链,实现向用户A指定的地址转账10个BTC的交易。
(4)解除分布式控制权管理
Fusion链上的节点会通过比特币对应的接口,查询该交易是否在比特币主链上得到确认。当共识得出交易确认的结果后,用户A的10个BTC将从分布式控制权管理中解除掉。
(5)解除数字资产映射并销毁
智能合约同步更新用户在FUSION上账户的状态,通过扣减被锁定的10个BTC映射,完成映射的解除和销毁。同时,该lock out记录打包记录到FUSION的区块中。
至此,用户本次lock out请求完成。
最终,分布式控制权移交完成之后,主链账户余额状态更新可以体现lock in或者lock out完成。记账的过程实际上由主链向用户账户发放或者收回等量数字资产的记账代币,如此就完成了数字资产到主链上的映射或从其上解除映射。
采用了该发明中的基于分布式技术实现不同数字资产在公有区块链的映射系统及相应方法,支持不同数字资产的映射方法以一种更加创新的方式让不同币种都能映射到一条映射链上,并且无需任何公有链做任何改动,从而可以使这些代币在同一条链上实现多币种智能合约,极大的提高价值互联网的互通性,并成为加密金融的基础设施。同时映射的过程是通过以分布式的方式安全地控制各种区块链上的代币私钥,从而建立一个分布式的管理代币控制权的区块链。它就像价值互联网上的“高速公路”,能够轻松实现各种代币之间的价值转移及面向加密金融服务的多币种智能合约。
在此说明书中,本发明已参照其特定的实施例作了描述。但是,很显然仍可以作出各种修改和变换而不背离本发明的精神和范围。因此,说明书和附图应被认为是说明性的而非限制性的。

Claims (9)

  1. 一种基于分布式技术实现数字资产在映射链上的映射系统,其特征在于,所述的系统包括映射链和至少两个公有链,所述映射链基于分布式技术生成分片的私钥并完成对各分片私钥的分布式保管,以及通过对所述至少两个公有链中数字资产的锁定和解锁,完成所述至少两个公有链之间的跨链通信。
  2. 一种基于权利要求1所述的系统实现数字资产的锁定控制的方法,其特征在于,所述的方法包括以下步骤:
    (A1)发送锁定一公有链的数字资产请求,并触发所述映射链上用于锁定所述数字资产的智能合约;
    (A2)所述的映射链基于分布式技术生成分片的私钥,以及完成对各分片私钥的分布式保管;
    (A3)所述的公有链将所述数字资产的控制权移交至所述的映射链,以实现所述数字资产的分布式管理;
    (A4)确认所述数字资产的控制权移交成功后,所述的智能合约对所述映射链的账户状态进行更新,以完成所述对所述数字资产的锁定及映射。
  3. 根据权利要求2所述的实现数字资产的锁定控制的方法,其特征在于,所述的步骤(A2)中,所述的映射链基于分布式密钥生成协议DKG生成分片的私钥,以及对各分片私钥的分布式保管。
  4. 根据权利要求3所述的实现数字资产的锁定控制的方法,其特征在于,所述的各分片私钥的分布式保管具体为:
    将各分片私钥分别保存于所述映射链的各个节点。
  5. 根据权利要求4所述的实现数字资产的锁定控制的方法,其特征在于,所述的步骤(A3)包括以下步骤:
    (A31)所述的映射链基于各分片私钥生成所述公有链的一锁定地址;
    (A32)将所述的数字资产转入所述的锁定地址中,并向所述的映射链发起转入所述数字资产的交易广播;
    (A33)所述的映射链的各个节点通过查询接口在确认所述数字资产的交易在所述的公有链上得到确认后,移交关于已完成交易的数字资产的控制权。
  6. 一种基于权利要求1所述的系统实现数字资产的解锁控制的方法,其特征在于,所述 的方法包括以下步骤:
    (B1)发起解锁一公有链的数字资产请求,以触发所述映射链上用于解锁所述数字资产的智能合约;
    (B2)所述映射链中的各个节点分别接收基于已触发的智能合约生成的交易广播信息,并在所述各个节点的交易签名达到交易签名的门限值时完成所述数字资产的交易;
    (B3)所述的映射链解除关于已完成交易的数字资产的控制权;
    (B4)确认所述关于已完成交易的数字资产的控制权解除成功后,所述的智能合约对所述映射链的账户状态进行更新,以完成对所述数字资产的解锁及映射的解除。
  7. 根据权利要求6所述的实现数字资产的解锁控制的方法,其特征在于,所述的步骤(B2)之前,还包括:
    (B20)所述已触发的智能合约检查所述公有链的数字资产全额,并在所述的数字资产全额达到需解锁的数字资产时,锁定所述公有链中需解锁的数字资产,并生成基于已触发的智能合约生成的交易广播信息。
  8. 根据权利要求7所述的实现数字资产的解锁控制的方法,其特征在于,所述的交易广播信息包括交易目标地址和交易签名。
  9. 根据权利要求6所述的实现数字资产的解锁控制的方法,其特征在于,所述的步骤(B3)具体为:
    所述映射链的各个节点通过查询接口在确认所述数字资产的交易在所述的公有链上得到确认后,解除关于已完成交易的数字资产的控制权。
PCT/CN2018/096215 2018-04-16 2018-07-19 基于分布式技术实现数字资产在映射链上的映射系统及相应方法 WO2019200765A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/047,818 US20210142318A1 (en) 2018-04-16 2018-07-19 Mapping system and corresponding method to realize digital assets on the mapping chain based on distributed technology

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201810339305.3 2018-04-16
CN201810339305.3A CN108629583A (zh) 2018-04-16 2018-04-16 基于分布式技术实现数字资产在映射链上的映射系统及相应方法

Publications (1)

Publication Number Publication Date
WO2019200765A1 true WO2019200765A1 (zh) 2019-10-24

Family

ID=63705327

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2018/096215 WO2019200765A1 (zh) 2018-04-16 2018-07-19 基于分布式技术实现数字资产在映射链上的映射系统及相应方法

Country Status (3)

Country Link
US (1) US20210142318A1 (zh)
CN (1) CN108629583A (zh)
WO (1) WO2019200765A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112784306A (zh) * 2021-02-01 2021-05-11 杭州链网科技有限公司 一种基于密钥分片多签的跨链托管方法及系统

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110084597A (zh) * 2019-04-22 2019-08-02 北京永恒纪元科技有限公司 一种新型去中心化托管平台的账户安全系统及其运行方法
US11251966B2 (en) 2019-06-28 2022-02-15 Advanced New Technologies Co., Ltd. Sending cross-chain authenticatable messages
CN112003703B (zh) 2019-06-28 2023-08-22 创新先进技术有限公司 一种跨链发送可认证消息的方法和装置
US11356282B2 (en) * 2019-06-28 2022-06-07 Advanced New Technologies Co., Ltd. Sending cross-chain authenticatable messages
US11228452B2 (en) * 2019-09-16 2022-01-18 Cisco Technology, Inc. Distributed certificate authority
CN110599340A (zh) * 2019-09-19 2019-12-20 姚忠凯 一种基于联盟链的代币方法、系统及钱包
CN110633965B (zh) * 2019-09-20 2022-03-15 张嘉荣 点对点的资产映射和数字资产交易的方法及系统
CN111355576B (zh) * 2020-02-24 2021-12-24 联想(北京)有限公司 数据处理方法和计算机系统
CN111464536B (zh) * 2020-03-31 2022-06-07 中国联合网络通信集团有限公司 一种区块链跨链方法及装置
US11645424B2 (en) * 2020-04-27 2023-05-09 International Business Machines Corporation Integrity verification in cloud key-value stores
CN112908440A (zh) * 2021-02-07 2021-06-04 深圳万海思数字医疗有限公司 健康管理数据共享方法、装置及远程医疗平台
CN117726446B (zh) * 2024-02-07 2024-04-26 北京邮电大学 可监管数字资产跨链交易方法、系统及设备

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110167003A1 (en) * 2010-01-07 2011-07-07 Microsoft Corporation Maintaining privacy during personalized content delivery
CN106533698A (zh) * 2016-12-15 2017-03-22 北京三未信安科技发展有限公司 一种基于rsa的分布式门限签名方法与系统
CN106961336A (zh) * 2017-04-18 2017-07-18 北京百旺信安科技有限公司 一种基于sm2算法的密钥分量托管方法和系统
CN107038639A (zh) * 2017-03-07 2017-08-11 杭州公链网络技术有限公司 一种兼容多资产类型快速交易的联盟链构建方法
CN107888385A (zh) * 2017-12-27 2018-04-06 数安时代科技股份有限公司 Rsa模数生成方法、rsa密钥生成方法、计算机设备及介质
CN108200052A (zh) * 2017-12-29 2018-06-22 北京握奇智能科技有限公司 基于移动终端的数字签名方法、装置以及移动终端

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012034237A1 (en) * 2010-09-16 2012-03-22 Evan V Chrapko Systems and methods for providing virtual currencies
CN106022917A (zh) * 2016-05-08 2016-10-12 杭州复杂美科技有限公司 区块链撮合交易所方案
JP6888295B2 (ja) * 2016-12-26 2021-06-16 富士通株式会社 プログラム、情報処理装置、および情報処理方法
EP4386609A3 (en) * 2017-04-11 2024-08-28 nChain Licensing AG Secure transfer between blockchains
CN106899698B (zh) * 2017-04-11 2020-12-18 张铮文 一种区块链之间的跨链互操作方法
CN107230056B (zh) * 2017-06-28 2021-02-26 无锡井通网络科技有限公司 一种基于区块链合约的快速交易系统
CN107679857B (zh) * 2017-10-10 2021-04-27 马晶瑶 区块链的跨链交易方法和存储介质
US20190251199A1 (en) * 2018-02-14 2019-08-15 Ivan Klianev Transactions Across Blockchain Networks

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110167003A1 (en) * 2010-01-07 2011-07-07 Microsoft Corporation Maintaining privacy during personalized content delivery
CN106533698A (zh) * 2016-12-15 2017-03-22 北京三未信安科技发展有限公司 一种基于rsa的分布式门限签名方法与系统
CN107038639A (zh) * 2017-03-07 2017-08-11 杭州公链网络技术有限公司 一种兼容多资产类型快速交易的联盟链构建方法
CN106961336A (zh) * 2017-04-18 2017-07-18 北京百旺信安科技有限公司 一种基于sm2算法的密钥分量托管方法和系统
CN107888385A (zh) * 2017-12-27 2018-04-06 数安时代科技股份有限公司 Rsa模数生成方法、rsa密钥生成方法、计算机设备及介质
CN108200052A (zh) * 2017-12-29 2018-06-22 北京握奇智能科技有限公司 基于移动终端的数字签名方法、装置以及移动终端

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112784306A (zh) * 2021-02-01 2021-05-11 杭州链网科技有限公司 一种基于密钥分片多签的跨链托管方法及系统
CN112784306B (zh) * 2021-02-01 2023-01-31 杭州链网科技有限公司 一种基于密钥分片多签的跨链托管方法及系统

Also Published As

Publication number Publication date
CN108629583A (zh) 2018-10-09
US20210142318A1 (en) 2021-05-13

Similar Documents

Publication Publication Date Title
WO2019200765A1 (zh) 基于分布式技术实现数字资产在映射链上的映射系统及相应方法
CN108924092B (zh) 基于区块链的可公开仲裁分布式云存储方法及系统
TWI636411B (zh) 對非區塊鏈節點提供交易不可否認性之系統及其方法
CN108667612B (zh) 一种基于区块链的信任服务架构及方法
CN109314643B (zh) 事务处理装置以及事务处理方法
CN109219940B (zh) 私有节点以及私有节点中的处理方法
US20200005282A1 (en) Wallet recovery method
WO2021008453A1 (zh) 一种基于标识认证的区块链离线交易方法和系统
US20200127813A1 (en) Method and system for creating a user identity
WO2019232880A1 (zh) 一种基于生物特征标记认证的区块链安全交易方法及装置
US20200145373A1 (en) System for blockchain based domain name and ip number register
CN109981675B (zh) 一种数字身份认证和属性加密的身份信息保护方法
US5968177A (en) Method and apparatus for processing administration of a secured community
US20170344983A1 (en) BIXCoin: A Secure Peer-to-Peer Payment System Based on the Public Payments Ledger
CN111144881A (zh) 对资产转移数据的选择性访问
KR20220088507A (ko) 분산 거래 전파 및 검증 시스템
KR20180115779A (ko) 디지털 콘텐츠를 제어 및 배포하기 위한 블록체인 구현 방법
CN111754343B (zh) 隐私保护的死锁解除
WO2020051710A1 (en) System and process for managing digitized security tokens
CN112801778B (zh) 联盟式不良资产区块链系统
Lan et al. Horizon: A gas-efficient, trustless bridge for cross-chain transactions
JP6532581B1 (ja) 仮想通貨管理システム、仮想通貨管理方法及び仮想通貨管理プログラム
CN113360861A (zh) 一种面向抵押贷款的基于中继器跨链的去中心化身份方法
JP2022051652A (ja) デジタル資産データパケットの信頼性検証システム
CN117769707A (zh) 用于在电子交易系统中传输令牌的方法和交易系统

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 18915600

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 18915600

Country of ref document: EP

Kind code of ref document: A1