CN108288158A - A kind of storage method based on block chain technology, computer readable storage medium - Google Patents

A kind of storage method based on block chain technology, computer readable storage medium Download PDF

Info

Publication number
CN108288158A
CN108288158A CN201810085549.3A CN201810085549A CN108288158A CN 108288158 A CN108288158 A CN 108288158A CN 201810085549 A CN201810085549 A CN 201810085549A CN 108288158 A CN108288158 A CN 108288158A
Authority
CN
China
Prior art keywords
block chain
account
natural person
incidence relation
intelligent contract
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201810085549.3A
Other languages
Chinese (zh)
Inventor
张天
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201810085549.3A priority Critical patent/CN108288158A/en
Publication of CN108288158A publication Critical patent/CN108288158A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to block chain technical field of memory more particularly to a kind of storage method based on block chain technology, server, computer readable storage medium, storage method of the one of which based on block chain technology to include:It establishes digital life unit and verifies the mapping relations between account;The incidence relation between the verification account is updated based on the mapping relations, the incidence relation between the verification account is updated based on mapping relations, its object is to establish an incidence relation to match with the account to each account, if the key of some verification account is lost, it can be based on incidence relation and/or mapping relations are verified and read the verification account, it may be based on incidence relation and/or mapping relations and directly update data information between the account and associated account again, it will not occur to lead to the loss of data because key is lost or damages, improve the convenience that block chain technology uses.

Description

A kind of storage method based on block chain technology, computer readable storage medium
Technical field
The present invention relates to block chain technical field of memory more particularly to a kind of storage method based on block chain technology, clothes Business device, computer readable storage medium.
Background technology
Account book information data based on block chain is substantially voluntarily taken care of the account number of the account book by the holder of account book Information, the private key corresponding to usual account digital information do elliptic curve digital signature algorithm to form public key, and public key is by breathing out Uncommon transformation generates string number along with check code, typically one 33 or 34 be Base58 code characters, such as: 16UwLL9Rise7QfpqBuNnkofHmBQ7WMTJVm was to try to reduce the length of account using the reason of Base58 code characters Degree, the English alphabet and number of capital and small letter, (confusing digital 0, capitalization O is held in removing, capitalization I and small letter i) is used for table Registration word, this account become the address of account book, and user receives the fund that other people send, or sends fund to other people, all needs This address is used, in addition, the holder of account book also needs to hold private key corresponding with public key, private key could obtain the account book The information of record or the fund stored in the transaction account, usual private key are that the holder of account book uniquely takes care of, once private key It loses, then has no idea to obtain private key by way of " resetting ", and then the fund that can not also merchandise in account book, in order to carry The private key safety of high account book holder, some account holders can back up private key file in other equipment, and such as USB flash disk moves Alternate device, is then stored in safe place by dynamic hard disk etc., in the state of encountering private key loss or file corruption, is passed through Backup private key realizes the recovery of data, but in the case where backup file can not also be known, then the acquisition of private key is still difficult It is heavy.In addition it for the succession of digital asset after dieing other than natural person, is at a complete loss as to what to do at this stage, natural person surprisingly dies subsequent Hold the relationship that people verifies oneself and natural person in block chain, this can lead to the permanent disappearance of digital asset, serious infringement after Hold the legitimate rights and interests of people.
In addition, the management for natural relationship, is mainly managed by household register organ at this stage, but obtain relationship at This is very high, such as " prove that your mother be your mother " this kind of wonderful work " proof " occurs, natural relationship is stored in decentralization On credit carrier block chain, it may make that proof, verification, reading, execution of this kind of relationship etc. are more convenient, efficient, reduction management, Verification, the cost executed.
Invention content
In view of the above-mentioned problems, an embodiment of the present invention provides a kind of storage methods based on block chain technology, it is intended to improve The safety of data storage and validity.
In a first aspect, the present invention provides a kind of storage method based on block chain technology, wherein:Including,
It establishes digital life unit and verifies the mapping relations between account;
The incidence relation between the verification account is updated based on the mapping relations.
Preferably, the above-mentioned storage method based on block chain technology, wherein:Further include,
It is formed based on the incidence relation or updates intelligent contract, and intelligent contract is deployed on block chain and forms the whole network Common recognition.
Preferably, the above-mentioned storage method based on block chain technology, wherein:Further include,
Trigger event is received and verified, the intelligent contract to match with the trigger event is executed.
Preferably, the above-mentioned storage method based on block chain technology, wherein:Receive and verify trigger event, execute with The intelligent contract that the trigger event matches specifically includes,
Trigger event is received and verified, the intelligent contract to match with the trigger event is executed according to priority.
Preferably, the above-mentioned storage method based on block chain technology, wherein:Further include,
Establishment instruction input by user is received, the intelligent contract is formed according to establishment instruction, and the intelligence is set The priority of energy contract, and intelligent contract is deployed on block chain and forms the whole network common recognition.
Preferably, the above-mentioned storage method based on block chain technology, wherein:The incidence relation includes that unidirectional authentication is closed Connection relationship and bi-directional verification incidence relation.
On the other hand, the present invention provides a kind of server again, wherein the server includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors so that one or more of processing Device realizes any of the above-described storage method based on block chain technology.
On the other hand, the present invention provides a kind of computer readable storage medium again, is stored thereon with computer program, In, any storage method based on block chain technology among the above is realized when which is executed by processor.
In the present invention, the incidence relation between the verification account is updated based on mapping relations, it will be originally mutually independent Verification account does integration processing, its object is to establish an incidence relation to match with the account to each account, if certain The key (including at least private key) of one verification account is lost, and can be based on incidence relation or mapping relations are verified and read this Account is verified, incidence relation is may be based on and directly updates data information between the account and associated account, Bu Huifa again It is raw to lead to the loss of data because key is lost or damages, improve the convenience that block chain technology uses.Additionally by association The logically management of relationship can complete the textual and/or code of the documents such as information, contract, statement and deliver and verify, The documents such as information, contract, the statement delivered by block chain can reach the intelligent pressureization of execution, and have and can not usurp The attribute changed, can better attributes such as the gifting, legate of managing digital assets or other assets, trust, succession.
Description of the drawings
Fig. 1 is a kind of flow chart of storage method based on block chain technology in the embodiment of the present invention one;
Fig. 2 is a kind of flow chart of storage method based on block chain technology in the embodiment of the present invention two;
Fig. 3 is a kind of flow chart of storage method based on block chain technology in the embodiment of the present invention three;
Fig. 4 is a kind of flow chart of storage method based on block chain technology in the embodiment of the present invention three.
Specific implementation mode
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limitation of the invention.It also should be noted that in order to just Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
Embodiment one
Fig. 1 is a kind of flow chart of storage method based on block chain technology in the embodiment of the present invention one, the present embodiment It is applicable to the situation of the storage of arbitrary electronic data.This method can be executed by independent storage device device, can also be configured It is applied in server.As shown in Figure 1, this method can be applied to newly-built block chain, can also be applied to established Block chain, specifically includes:
Step S110, it establishes digital life unit and verifies the mapping relations between account;Wherein, digital life can also claim It is the new life form created with electronic medias such as computers for silication life, is with natural life feature or behavior Digital display circuit, identity information, the biological characteristic letter corresponding to the digital life source are included at least in the digital life unit Breath.The verification account includes at least the identity information of account creator, social data.
Schematically, natural person A is respectively provided with digital life unit and verification account, and wherein digital life unit describes Having the name of A, age, household register information, unique identities verification number, biological information, (such as blood group, human leucocyte are anti- The medical datas such as original, fingerprint, DNA fingerprint) etc., verification account includes at least name, unique identities verification number, social relationships number According to (such as credits data, A liability data, As debtor of the A as the industrial and commercial data of legal representative, A as creditor Family's relatives' data as kinsfolk), in the present embodiment, pass through the name and/or displacement authentication number of natural person A It establishes digital life unit and verifies the mapping relations between device.
Step S120, the incidence relation between the verification account, wherein incidence relation are updated based on the mapping relations Including at least logical relation or correlation.Further, Hash processing can be done to updated logical relation forms a Kazakhstan Uncommon value is preserved, correlation can be net type data model, star data model or tree-like data model, herein not Do concrete restriction.In addition, Hash processing can be done for each incidence relation, or crucial verification account does Hash processing.
Schematically, the foundation of above-mentioned incidence relation needs confirmation and the logic identification of both sides' account, including and is not limited only to: For example, natural person A is natural person mother C, is confirmed by natural person A and natural person C both sides and establish mother and daughter relationship, natural person B with from Right people C both sides confirm that the request for establishing mother and daughter relationship is published on block chain and can be rejected again, and relationship can not be established;For another example Natural person D is natural person E husbands, is confirmed with natural person E both sides by natural person D and is formed a relation of husband and wife, true without both sides in relationship In the case of vertical contact, natural person D confirms with natural person F both sides applies for that the request to form a relation of husband and wife will be rejected, relationship without Method is established.
Schematically, in incidence relation, for the negative logic of relationship.
Natural person A, B, C are respectively provided with digital life unit and verification account, the wherein society of natural person A and natural person B Relationship is set membership, and natural person A is the biology father of natural person B, and natural person B is the biology children of natural person A, natural The social relationships of people C and natural person B are debtor-creditor relationship, and natural person C is the creditor of natural person B, and natural person B is natural person The debtor of C negates then the family's relatives' data to be established between natural person C and natural person B based on mapping relations, certainly nature The family's relatives' data to be established between people A and natural person B, then further, when a certain dependent event is triggered, natural person The data information of natural person A can be read in B.
Schematically, by taking debtor-creditor relationship in correlation as an example.
Natural person D is the creditor of natural person E, and natural person E is the debtor of natural person D, and natural person F is natural person D's Creditor, natural person D are the debtor of natural person F, then establish the relationship phase between natural person D, natural person E, natural person F respectively Mutual relation, further, in the state that a certain correlation is triggered, natural person E can establish the credit and debt between natural person F Relationship.
Step S130, it is based on the incidence relation to be formed or update intelligent contract, and intelligent contract is deployed in block chain Upper formation the whole network common recognition.Before the intelligent contract of deployment, it can be formulated with the logic flow of the relevant all clauses of contract At the logic flow of the clause in the intelligence contract can be established based on the legal relation in incidence relation, or according to being based on Other relationships in incidence relation are established, other relationships can be that contractual relation, administrative relation etc. are established, and not do specific limit herein System.For having created the intelligent contract of completion, user can be based on existing intelligent contract and interact, and interbehavior can be tight Lattice abide by established logic, and based on the cryptological technique of block chain, interbehavior can be verified strictly, to ensure intelligent contract It can be smoothed out according to the rule of formulation, to prevent violations.For the intelligent contract newly formed, by intelligently closing Founder about is based on the corresponding intelligent contract of dependency rule deployment, after the completion of waiting for that intelligent contract is created, for user and contract Between be used interchangeably.
For example, by taking the intelligent contract of update as an example, the social relationships of natural person A and natural person B are set membership, natural person A For the biology father of natural person B, natural person B is the biology children of natural person A, the social relationships of natural person A and natural person G For debtor-creditor relationship, natural person G is the creditor of natural person A, and natural person A is the debtor of natural person G, therefore, in intelligence In contract, renewable natural person A and natural person B establishes the contract of an inheritance, and natural person A and natural person G establishes a credits The contract of debition.
For forming intelligent contract, natural person A creates an intelligent contract, and natural person A is according to the corresponding rule of legal provisions Then or other Rulemakings intelligent contract accordingly, intelligent contract includes the conjunction that natural person A and natural person B establish an inheritance About, natural person A and natural person G establish the contract of a debtor-creditor relationship, and receive other of subsequent user addition and meet accordingly The contract to lay down a regulation.
In the present invention, the incidence relation between the verification account is updated based on mapping relations, and intelligent contract is disposed The whole network common recognition is formed on block chain, mutually independent verification account originally is done into integration processing, its object is to each account An incidence relation to match with the account is established at family, if the key (including at least private key) of some verification account is lost It loses, the verification account can be verified and read based on incidence relation, may be based on incidence relation and directly update the account and phase again Data information between interlock account will not occur to lead to the loss of data because key is lost or damages, improve block chain The convenience that technology uses.Additionally by the logically management of incidence relation, the documents such as information, contract, statement can be completed Textual and/or code to deliver and verify, the documents such as information, contract, statement for being delivered by block chain, which can be reached, to be held Capable intelligent pressureizations, and there is the attribute that can not be distorted, can better managing digital assets or other assets give With the attributes such as, bequeath, trust, succession.
Embodiment two
Above-described embodiment one can be established various between digital life unit and verification account and between verification account Relationship, user can be to avoid that can not read or operation demonstration account, as a result, still based on above-mentioned relation due to the loss because of key Can only so there is the holder of account to can be read or operation demonstration account, but the holder of account be in it is clouded in mind or other In the case that odjective cause cannot read account, the verification account of the holder then can not be still activated.Based on this, such as Fig. 2 Shown, the present invention provides a kind of storage method based on block chain technology again, specifically:
Step S210, it establishes digital life unit and verifies the mapping relations between account;Wherein, digital life can also claim It is the new life form created with electronic medias such as computers for silication life, is with natural life feature or behavior Digital display circuit, identity information, the biological characteristic letter corresponding to the digital life source are included at least in the digital life unit Breath.The verification account includes at least the identity information of account creator, social data.
Step S220, the incidence relation between the verification account, wherein incidence relation are updated based on the mapping relations Including at least logical relation or correlation.Further, Hash processing can be done to updated logical relation forms a Kazakhstan Uncommon value is preserved, correlation can be net type data model, star data model or tree-like data model, herein not Do concrete restriction.In addition, Hash processing can be done for each incidence relation, or crucial verification account does Hash processing.
As further preferred embodiment, the incidence relation includes that unidirectional authentication incidence relation is associated with bi-directional verification Relationship.
Unidirectional authentication incidence relation need to have natural sex, stability, for example, the relationship between parent and child, Ci Zhongguan System can be unidirectional authentication incidence relation, can increase by a verification procedures for unidirectional authentication incidence relation, arbitrary nature cannot occur There is the incidence relation between " two biology fathers " in people;Or it is the unidirectional authentication formed based on folk prescription legal relation Incidence relation, i.e., the act in-the-law for only wanting the declaration of will of one party that can set up, such as make a will, abandon after The power of holding spreads pin agency by agreement, is posthumously admitted as no right to act as agent, not conditional to grant.
Bi-directional verification incidence relation is not required to natural sex or stability, the pass that can be substantially generated based on both sides' legal relation Connection relationship, such as debtor-creditor relationship confirm it when the debtor-creditor relationship of one intelligent contract of creditor's publication through debtor The debtor-creditor relationship of intelligent contract can be established afterwards.
Step S230, it is based on the incidence relation to be formed or update intelligent contract, and intelligent contract is deployed in block chain Upper formation the whole network common recognition.Intelligent contract can be established based on the legal relation in incidence relation, or according to based on incidence relation In other relationships establish, other relationships can be that contractual relation, administrative relation etc. are established, and be not particularly limited herein.
Step S240, reception and trigger event is verified, executes the intelligent contract to match with the trigger event.Example If the social relationships of natural person A and natural person G are debtor-creditor relationship, natural person G is the creditor of natural person A, and natural person A is The debtor of natural person G, after the refund operation that natural person A is executed, which can be defined as trigger event, receive And verify in the state that the trigger event is true, first obtain with the matched intelligent contract of the trigger event, obtained in intelligent contract The social relationships for cancelling natural person A and natural person G after taking are debtor-creditor relationship.
Embodiment three
Above-described embodiment two solves to be in clouded in mind in the holder of account or other odjective causes cannot read account In the case of, the technical issues of verification account of the holder then can not be still activated, the method solved is when triggering Between be verified as it is true in the state of, execute the intelligent contract to match with the trigger event, but such technical solution There are still a technical problems, i.e., in the state of at least two to match with the triggered time the intelligent contract, intelligent contract without Method is orderly executed.
Based on this technical problem, this implementation increases prioritization techniques feature, and priority can be set by the rule of intelligent contract It is fixed, can also there be user's sets itself.There are at least two modes on the setting opportunity of priority, and a kind of mode is:By intelligent contract quilt It is set based on respective rule by founder after establishment, i.e., first sets the priority between intelligent contract participation system, then base In the corresponding participant's relationship of the priority match.Enumerate a specific implementation mode:
As shown in figure 3, the present invention provides a kind of storage method based on block chain technology again, specifically:
Step S310, establishment instruction and/or modification instruction input by user are received, instructs and/or repaiies according to the establishment Change the priority of the instruction setting intelligent contract, and intelligent contract is deployed on block chain and forms the whole network common recognition.
Step S320, it establishes digital life unit and verifies the mapping relations between account;Wherein, digital life can also claim It is the new life form created with electronic medias such as computers for silication life, is with natural life feature or behavior Digital display circuit, identity information, the biological characteristic letter corresponding to the digital life source are included at least in the digital life unit Breath.The verification account includes at least the identity information of account creator, social data.
Step S320, the incidence relation between the verification account, wherein incidence relation are updated based on the mapping relations Including at least logical relation or correlation.Further, Hash processing can be done to updated logical relation forms a Kazakhstan Uncommon value is preserved, correlation can be net type data model, star data model or tree-like data model, herein not Do concrete restriction.In addition, Hash processing can be done for each incidence relation, or crucial verification account does Hash processing.
Step S340, it is based on the incidence relation to be formed or update intelligent contract, and intelligent contract is deployed in block chain Upper formation the whole network common recognition.Intelligent contract can be established based on the legal relation in incidence relation, or according to based on incidence relation In other relationships establish, other relationships can be that contractual relation, administrative relation etc. are established, and be not particularly limited herein.
Step S350, reception and trigger event is verified, is executed according to priority described in matching with the trigger event Intelligent contract.
Schematically, the intelligent contract to match with trigger event includes at least two relational contracts, first determines and closes Priority relationship between about, such as when at least two contract relations belong to the contract of different legal relationship, such as credits debt Business relational contracts, inheritance contract, then the priority of debtor-creditor relationship contract is higher than the priority of inheritance contract, example Such as when at least two contract relations belong to the contract of same legal relation, for example three contract relations belong to credit and debt pass It is contract, then the execution priority of debtor-creditor relationship contract can be set.Enumerate the priority executive mode between a kind of contract Specific implementation mode:The social relationships of natural person A and natural person G are debtor-creditor relationship, and natural person G is the credits of natural person A People, natural person A are the debtor of natural person G, and the social relationships of natural person A and natural person B are set membership, and natural person A is certainly The biology father of right people B, natural person B is the biology children of natural person A, damned after death incident occurs for natural person A The event of dying can be to be defined as trigger event, in the state that it is true to verify the triggering leave of absence, with the matched intelligence of the trigger event Contract includes inheritance contract and debtor-creditor relationship contract, at this point, debtor-creditor relationship contract is preferentially executed, in credits debt Business relational contracts execute after being cancelled and inherit contract.
Another way is:The incidence relation between intelligence contract participant is first set, then is set based on the incidence relation The priority with the matched intelligent contract of the incidence relation is set, a specific implementation mode is enumerated:As shown in Figure 4:
Step S410, it establishes digital life unit and verifies the mapping relations between account;Wherein, digital life can also claim It is the new life form created with electronic medias such as computers for silication life, is with natural life feature or behavior Digital display circuit, identity information, the biological characteristic letter corresponding to the digital life source are included at least in the digital life unit Breath.The verification account includes at least the identity information of account creator, social data.
Step S420, the incidence relation between the verification account, wherein incidence relation are updated based on the mapping relations Including at least logical relation or correlation.Further, Hash processing can be done to updated logical relation forms a Kazakhstan Uncommon value is preserved, correlation can be net type data model, star data model or tree-like data model, herein not Do concrete restriction.In addition, Hash processing can be done for each incidence relation, or crucial verification account does Hash processing.
As further preferred embodiment, the incidence relation includes that unidirectional authentication incidence relation is associated with bi-directional verification Relationship.
Unidirectional authentication incidence relation need to have natural sex, stability, for example, the relationship between parent and child, Ci Zhongguan System can be unidirectional authentication incidence relation, can increase by a verification procedures for unidirectional authentication incidence relation, arbitrary nature cannot occur There is the incidence relation between " two biology fathers " in people;Or it is the unidirectional authentication formed based on folk prescription legal relation Incidence relation, i.e., the act in-the-law for only wanting the declaration of will of one party that can set up, such as make a will, abandon after The power of holding spreads pin agency by agreement, is posthumously admitted as no right to act as agent, not conditional to grant.
Bi-directional verification incidence relation is not required to natural sex or stability, the pass that can be substantially generated based on both sides' legal relation Connection relationship, such as debtor-creditor relationship confirm it when the debtor-creditor relationship of one intelligent contract of creditor's publication through debtor The debtor-creditor relationship of intelligent contract can be established afterwards.
Step S430, it is based on the incidence relation and forms or update intelligent contract.Intelligent contract can be based in incidence relation Legal relation establish, or according to based in incidence relation other relationships establish, other relationships can be contractual relation, row Political affairs relationship etc. is established, and is not particularly limited herein.
Step S440, the priority of the intelligent contract is set, and intelligent contract is deployed on block chain and forms the whole network Common recognition.
Step S450, reception and trigger event is verified, executes the intelligent contract to match with the trigger event.Example If the social relationships of natural person A and natural person G are debtor-creditor relationship, natural person G is the creditor of natural person A, and natural person A is The debtor of natural person G, after the refund operation that natural person A is executed, which can be defined as trigger event, receive And verify in the state that the trigger event is true, first obtain with the matched intelligent contract of the trigger event, obtained in intelligent contract The social relationships for cancelling natural person A and natural person G after taking are debtor-creditor relationship.
Schematically, the intelligent contract to match with trigger event is a kind of relational contracts, is related in the relationship contract And there is preferential execution relationship.The social relationships of natural person A and natural person B, B1 are father and son, and natural person A is the life of natural person B, B1 Object father, natural person B, B1 are the biology children of natural person A, there is the conjunction of inheritance first between natural person A and natural person B About, the second contract of inheritance, the priority of the second contract of inheritance are closed higher than succession between natural person A and natural person B1 It is the first contract, after death incident occurs for natural person A, which can be to be defined as trigger event, be touched verifying this Be an inheritance contract with the matched intelligent contract of the trigger event in the state that the hair leave of absence is true, at this point, it is preferential execute from So the second contract of inheritance between people A and natural person B1 waits for that the inheritance second between natural person A and natural person B1 is closed After being about performed, and then execute the first contract of inheritance between natural person A and natural person B.
It should be noted that:It, can after waiting for that the second contract of inheritance between natural person A and natural person B1 is performed The first contract of inheritance between natural person A and natural person B is directly executed, is then waited between natural person A and natural person B1 After the first contract of inheritance between the second contract of inheritance, natural person A and natural person B is all executed, cancel certainly So about inheritance contract between people A and natural person B, B1.The succession between natural person A and natural person B1 can also first be cancelled The second contract of relationship, and set the priority of the first contract of inheritance between natural person A and natural person B to highest, so The first contract of inheritance between natural person A and natural person B is executed afterwards, waits for the inheritance between natural person A and natural person B After first contract is performed, cancel natural person A and natural person B between the first contract of inheritance.
It should be noted that:Above two mode can be used alone, can also two ways be used in mixed way, do not do and have herein Body limits.In addition, for the priority of sets itself, user can be arranged or change in any moment, be not specifically limited herein.
Example IV
On the other hand, the present invention provides a kind of server again, wherein the server includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors so that one or more of processing Device realizes any of the above-described storage method based on block chain technology.
The embodiment of the present invention provides a kind of server again, is stored thereon with computer program, which is held by processor When row realize the embodiment of the present invention provided one as described in the storage method based on block chain technology.
Certainly, a kind of computer readable storage medium that the embodiment of the present invention is provided, the computer program stored thereon The method operation being not limited to the described above, can also be performed the phase in the character recognition method that any embodiment of the present invention is provided Close operation.
The arbitrary of one or more computer-readable media may be used in the computer storage media of the embodiment of the present invention Combination.Computer-readable medium can be computer-readable signal media or computer readable storage medium.It is computer-readable Storage medium for example may be-but not limited to-the system of electricity, magnetic, optical, electromagnetic, infrared ray or semiconductor, device or Device, or the arbitrary above combination.The more specific example (non exhaustive list) of computer readable storage medium includes:Tool There are one or the electrical connection of multiple conducting wires, portable computer diskette, hard disk, random access memory (RAM), read-only memory (ROM), erasable programmable read only memory (EPROM or flash memory), optical fiber, portable compact disc read-only memory (CD- ROM), light storage device, magnetic memory device or above-mentioned any appropriate combination.In this document, computer-readable storage Medium, which can be any, includes or the tangible medium of storage program, which can be commanded execution system, device or device Using or it is in connection.
Computer-readable signal media may include in a base band or as the data-signal that a carrier wave part is propagated, Wherein carry computer-readable program code.Diversified forms may be used in the data-signal of this propagation, including but unlimited In electromagnetic signal, optical signal or above-mentioned any appropriate combination.Computer-readable signal media can also be that computer can Any computer-readable medium other than storage medium is read, which can send, propagates or transmit and be used for By instruction execution system, device either device use or program in connection.
The program code for including on computer-readable medium can transmit with any suitable medium, including --- but it is unlimited In wireless, electric wire, optical cable, RF etc. or above-mentioned any appropriate combination.
It can be write with one or more programming languages or combinations thereof for executing the computer that operates of the present invention Program code, described program design language include object oriented program language-such as Java, Smalltalk, C++, Further include conventional procedural programming language-such as " C " language or similar programming language.Program code can be with It fully executes, partly execute on the user computer on the user computer, being executed as an independent software package, portion Divide and partly executes or executed on a remote computer or server completely on the remote computer on the user computer. Be related in the situation of remote computer, remote computer can pass through the network of any kind --- including LAN (LAN) or Wide area network (WAN)-be connected to subscriber computer, or, it may be connected to outer computer (such as carried using Internet service It is connected by internet for quotient).
Note that above are only presently preferred embodiments of the present invention and institute's application technology principle.It will be appreciated by those skilled in the art that The present invention is not limited to specific embodiments described here, can carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out to the present invention by above example It is described in further detail, but the present invention is not limited only to above example, without departing from the inventive concept, also May include other more equivalent embodiments, and the scope of the present invention is determined by scope of the appended claims.

Claims (8)

1. a kind of storage method based on block chain technology, it is characterised in that:Including,
It establishes digital life unit and verifies the mapping relations between account;
The incidence relation between the verification account is updated based on the mapping relations.
2. the storage method according to claim 1 based on block chain technology, it is characterised in that:Further include,
Intelligent contract is formed or updated based on the incidence relation, and intelligent contract is deployed in formation the whole network on block chain and is total to Know.
3. the storage method according to claim 2 based on block chain technology, it is characterised in that:Further include,
Trigger event is received and verified, the intelligent contract to match with the trigger event is executed.
4. the storage method according to claim 2 based on block chain technology, it is characterised in that:It receives and verifies triggering thing Part executes the intelligent contract to match with the trigger event and specifically includes:
Trigger event is received and verified, the intelligent contract to match with the trigger event is executed according to priority.
5. the storage method according to claim 4 based on block chain technology, which is characterized in that further include:
Establishment instruction input by user is received, the intelligent contract is formed according to establishment instruction, and the intelligence is set and is closed Priority about, and intelligent contract is deployed on block chain and forms the whole network common recognition.
6. the storage method according to claim 2 based on block chain technology, it is characterised in that:The incidence relation includes Unidirectional authentication incidence relation and bi-directional verification incidence relation.
7. a kind of server, which is characterized in that the server includes:
One or more processors;
Storage device, for storing one or more programs;
When one or more of programs are executed by one or more of processors so that one or more of processors are real The now storage method based on block chain technology as described in any in claim 1-6.
8. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is held by processor The storage method based on block chain technology as described in any in claim 1-6 is realized when row.
CN201810085549.3A 2018-01-29 2018-01-29 A kind of storage method based on block chain technology, computer readable storage medium Pending CN108288158A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810085549.3A CN108288158A (en) 2018-01-29 2018-01-29 A kind of storage method based on block chain technology, computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810085549.3A CN108288158A (en) 2018-01-29 2018-01-29 A kind of storage method based on block chain technology, computer readable storage medium

Publications (1)

Publication Number Publication Date
CN108288158A true CN108288158A (en) 2018-07-17

Family

ID=62835927

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810085549.3A Pending CN108288158A (en) 2018-01-29 2018-01-29 A kind of storage method based on block chain technology, computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108288158A (en)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063084A (en) * 2018-07-24 2018-12-21 安徽问法信息技术有限公司 A kind of testament digital asset automatic execution method based on block chain intelligence contract
CN109377358A (en) * 2018-08-09 2019-02-22 杭州复杂美科技有限公司 A kind of assets method for retrieving, equipment and storage medium
CN109472572A (en) * 2018-11-21 2019-03-15 北京蓝石环球区块链科技有限公司 Contract deployment and transaction based on the more subchains of block chain main chain adduction row
CN109685664A (en) * 2018-12-20 2019-04-26 姚前 One kind being based on the associated digital asset real name register system of assets mandatory system
CN110532790A (en) * 2019-08-23 2019-12-03 江苏大周基业智能科技有限公司 The credit authorization method of digital asset
CN111079199A (en) * 2020-03-23 2020-04-28 杭州有数金融信息服务有限公司 Enterprise credit data screenshot tamper-proofing method based on block chain technology
WO2020035089A3 (en) * 2019-11-08 2020-09-10 Alipay (Hangzhou) Information Technology Co., Ltd. System and method for blockchain-based decentralized application development
CN113077254A (en) * 2019-03-29 2021-07-06 创新先进技术有限公司 Method and apparatus for resetting blockchain account key based on biometrics
CN113498592A (en) * 2019-02-20 2021-10-12 马里兰怡安风险服务有限公司 Digital property authentication and management system
US11163775B2 (en) 2019-11-08 2021-11-02 Alipay (Hangzhou) Information Technology Co., Ltd. System and method for implementing a blockchain-based decentralized application

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170178127A1 (en) * 2015-12-18 2017-06-22 International Business Machines Corporation Proxy system mediated legacy transactions using multi-tenant transaction database
CN107066893A (en) * 2017-02-28 2017-08-18 腾讯科技(深圳)有限公司 The treating method and apparatus of accounts information in block chain
CN107194778A (en) * 2017-05-25 2017-09-22 金立彦 Equipment leasing method and system based on block chain
CN107248074A (en) * 2017-03-29 2017-10-13 阿里巴巴集团控股有限公司 A kind of method for processing business and equipment based on block chain
CN107292735A (en) * 2017-05-27 2017-10-24 唐盛(北京)物联技术有限公司 A kind of mortgage finance method and system based on block chain technology
CN107301536A (en) * 2017-06-12 2017-10-27 腾讯科技(深圳)有限公司 Resource transfers method and device
CN107609876A (en) * 2017-08-18 2018-01-19 北京云知科技有限公司 A kind of method and system for recovering block chain assets

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170178127A1 (en) * 2015-12-18 2017-06-22 International Business Machines Corporation Proxy system mediated legacy transactions using multi-tenant transaction database
CN107066893A (en) * 2017-02-28 2017-08-18 腾讯科技(深圳)有限公司 The treating method and apparatus of accounts information in block chain
CN107248074A (en) * 2017-03-29 2017-10-13 阿里巴巴集团控股有限公司 A kind of method for processing business and equipment based on block chain
CN107194778A (en) * 2017-05-25 2017-09-22 金立彦 Equipment leasing method and system based on block chain
CN107292735A (en) * 2017-05-27 2017-10-24 唐盛(北京)物联技术有限公司 A kind of mortgage finance method and system based on block chain technology
CN107301536A (en) * 2017-06-12 2017-10-27 腾讯科技(深圳)有限公司 Resource transfers method and device
CN107609876A (en) * 2017-08-18 2018-01-19 北京云知科技有限公司 A kind of method and system for recovering block chain assets

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109063084A (en) * 2018-07-24 2018-12-21 安徽问法信息技术有限公司 A kind of testament digital asset automatic execution method based on block chain intelligence contract
CN109377358A (en) * 2018-08-09 2019-02-22 杭州复杂美科技有限公司 A kind of assets method for retrieving, equipment and storage medium
CN109472572B (en) * 2018-11-21 2021-08-03 北京蓝石环球区块链科技有限公司 Contract system based on block chain main chain and parallel multiple sub-chains
CN109472572A (en) * 2018-11-21 2019-03-15 北京蓝石环球区块链科技有限公司 Contract deployment and transaction based on the more subchains of block chain main chain adduction row
CN109685664A (en) * 2018-12-20 2019-04-26 姚前 One kind being based on the associated digital asset real name register system of assets mandatory system
CN113498592A (en) * 2019-02-20 2021-10-12 马里兰怡安风险服务有限公司 Digital property authentication and management system
CN113498592B (en) * 2019-02-20 2023-12-08 马里兰怡安风险服务有限公司 Method and system for digital property authentication and management
CN113077254A (en) * 2019-03-29 2021-07-06 创新先进技术有限公司 Method and apparatus for resetting blockchain account key based on biometrics
CN110532790B (en) * 2019-08-23 2021-03-12 江苏大周基业智能科技有限公司 Credit authorization method for digital assets
CN110532790A (en) * 2019-08-23 2019-12-03 江苏大周基业智能科技有限公司 The credit authorization method of digital asset
WO2020035089A3 (en) * 2019-11-08 2020-09-10 Alipay (Hangzhou) Information Technology Co., Ltd. System and method for blockchain-based decentralized application development
US11086621B2 (en) 2019-11-08 2021-08-10 Alipay (Hangzhou) Information Technology Co., Ltd. System and method for blockchain-based decentralized application development
US11163775B2 (en) 2019-11-08 2021-11-02 Alipay (Hangzhou) Information Technology Co., Ltd. System and method for implementing a blockchain-based decentralized application
US11429617B2 (en) 2019-11-08 2022-08-30 Alipay (Hangzhou) Information Technology Co., Ltd. System and method for blockchain-based data synchronization
CN111079199A (en) * 2020-03-23 2020-04-28 杭州有数金融信息服务有限公司 Enterprise credit data screenshot tamper-proofing method based on block chain technology

Similar Documents

Publication Publication Date Title
CN108288158A (en) A kind of storage method based on block chain technology, computer readable storage medium
JP7493571B2 (en) Trustless Deterministic State Machine
KR20210106532A (en) Computer-implemented systems and methods for controlling or enforcing the performance of transmissions made via blockchain.
Davies Enhanced scalability and privacy for blockchain data using Merklized transactions
Ying et al. Jailbreak Vision Language Models via Bi-Modal Adversarial Prompt
US11842314B1 (en) Apparatus for a smart activity assignment for a user and a creator and method of use
Mears The rise and rise of ID as a Service
TWI844486B (en) Method, system, and non-transitory computer-readable storage medium in trustless deterministic state machine
US11836692B1 (en) Apparatus and methods for executing a transaction protocol for rights to non-fungible tokens (NFTs)
TWI669665B (en) Rule based method and system for singing process
Ang On the lives not worth starting: a defence of the veil argument against the non-identity problem
CN116431910A (en) Biological feature utilization method, equipment and storage medium based on authoring terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20180717