CN113064899B - Method and device for storing asset securities type general evidence transaction certificates and electronic equipment - Google Patents
Method and device for storing asset securities type general evidence transaction certificates and electronic equipment Download PDFInfo
- Publication number
- CN113064899B CN113064899B CN202110366267.2A CN202110366267A CN113064899B CN 113064899 B CN113064899 B CN 113064899B CN 202110366267 A CN202110366267 A CN 202110366267A CN 113064899 B CN113064899 B CN 113064899B
- Authority
- CN
- China
- Prior art keywords
- hash value
- chain
- credential data
- data
- storing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2219—Large Object storage; Management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Databases & Information Systems (AREA)
- Software Systems (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Data Mining & Analysis (AREA)
- Computer Hardware Design (AREA)
- General Health & Medical Sciences (AREA)
- Accounting & Taxation (AREA)
- Bioethics (AREA)
- Health & Medical Sciences (AREA)
- Marketing (AREA)
- Computing Systems (AREA)
- General Business, Economics & Management (AREA)
- Technology Law (AREA)
- Strategic Management (AREA)
- Economics (AREA)
- Development Economics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method and a device for storing asset securities type general evidence transaction certificates and electronic equipment. The method comprises the following steps: reading asset securities type general evidence transaction credential data on a chain by using an under-chain node, and calculating a hash value of the credential data; the credential data and its hash value are stored at the under-chain node while the hash value of the credential data is stored on an on-chain contract. The method has the advantages that the asset type securities type general evidence transaction certificates with huge data quantity are stored in the nodes under the chain of the prophetic machine, so that the problems that the storage space of a public chain is small and inextensible, and the storage requirement of the asset type securities type general evidence certificates is not met; meanwhile, by storing the hash value of the certificate on the on-chain contract, the problem that the certificate stored in the public chain is exposed to all anonymous users and cannot protect investors is solved, and meanwhile the possibility that the hash value of the certificate stored in the node under the chain is tampered is avoided.
Description
Technical Field
The invention relates to the technical field of blockchains, in particular to a method and a device for storing asset securities type general evidence transaction certificates and electronic equipment.
Background
Currently, in blockchain technology, certificates can be circulated as virtual currency to complete related transactions. In the process of the trading, each node on the chain authenticates the asset securities type through certificate trade according to the certificates, and the corresponding certificates are stored in the blockchain.
With the continuous development of blockchain technology, more and more types of certificates are involved in the asset securities, so that the required on-chain storage space is also larger and larger. However, the public chain has small and inextensible storage space, and cannot meet the requirement of preserving the asset securities type general certificate, and the certificates stored in the public chain can be exposed to all anonymous users, so that the supervision requirement of protecting investors cannot be met. Therefore, there is an urgent need to develop a new technology to meet the storage requirement of the securities-type general evidence-passing trade certificates.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides the following technical scheme.
The invention provides a method for storing asset securities type general evidence transaction certificates, which is applied to a predictor and comprises the following steps:
reading asset securities type general evidence transaction credential data on a chain by using an under-chain node, and calculating a hash value of the credential data;
storing the credential data and a hash value thereof at the under-chain node;
the hash value of the credential data is stored on an on-chain contract.
Preferably, the calculating the hash value of the credential data includes:
time stamping the credential data;
respectively calculating hash values corresponding to the credential data of the same time stamp;
generating a tree structure by using the obtained hash value;
and traversing the credential data of different time stamps to generate a plurality of tree structures.
Preferably, the generating the tree structure using the obtained hash value includes:
taking hash values corresponding to the credential data of the same time stamp as leaf nodes;
grouping the leaf nodes, calculating the hash value of each group of leaf nodes, and taking the hash value as an intermediate node;
grouping the intermediate nodes, calculating the hash value of each group of intermediate nodes until a hash value is obtained, and taking the hash value as a root node.
Preferably, the storing the credential data and the hash value thereof at the under-chain node comprises: the credential data and tree structure are stored at the under-chain node.
Preferably, the storing the hash value of the credential data on an on-chain contract includes: the hash value on the root node is stored on an on-chain contract.
Preferably, the storing the hash value of the credential data on an on-chain contract includes:
asymmetrically encrypting the hash value of the credential data by using the node under the chain to generate encrypted data;
the encrypted data is stored on an on-link contract.
Preferably, the encrypting the hash value of the credential data by using the node under the chain includes:
and if the number of the hash values of the credential data reaches a threshold value, carrying out asymmetric encryption on the hash values of the credential data of the batch together to generate encrypted data.
In another aspect, the present invention provides a device for storing asset securities type general evidence transaction credentials, the device being arranged in a predictor, comprising:
the certificate reading module is used for reading the asset type securities type general certificate transaction certificate data on the chain by using the nodes below the chain;
the hash value calculation module is used for calculating the hash value of the credential data by using the node under the chain;
a first data storage module for storing the credential data and its hash value at the under-chain node;
and the second data storage module is used for storing the hash value of the credential data on an on-chain contract.
A third aspect of the present invention provides a memory storing a plurality of instructions for implementing the method described above.
A fourth aspect of the invention provides an electronic device comprising a processor and a memory coupled to the processor, the memory storing a plurality of instructions loadable and executable by the processor to enable the processor to perform the method as described above.
The beneficial effects of the invention are as follows: the invention provides a method, a device and an electronic device for storing asset securities type pass-through transaction certificates, which are characterized in that in a prophetic machine, under-chain nodes are utilized to read asset securities type pass-through transaction certificate data on a chain, and hash values of the certificate data are calculated; the credential data and its hash value are stored at the under-chain node while the hash value of the credential data is stored on an on-chain contract. The method has the advantages that the asset type securities type general evidence transaction certificates with huge data quantity are stored in the nodes under the chain of the prophetic machine, so that the problems that the storage space of a public chain is small and inextensible, and the storage requirement of the asset type securities type general evidence certificates is not met; meanwhile, by storing the hash value of the certificate on the on-chain contract, the problem that the certificate stored in the public chain is exposed to all anonymous users and cannot protect investors is solved, and meanwhile the possibility that the hash value of the certificate stored in the node under the chain is tampered is avoided.
Drawings
FIG. 1 is a flow chart of a method for storing an asset-based securities-type general evidence transaction certificate according to the present invention;
FIG. 2 is a schematic diagram of a storage device for an asset securities type general evidence transaction certificate according to the present invention.
Detailed Description
In order to better understand the above technical solutions, the following detailed description will be given with reference to the accompanying drawings and specific embodiments.
The method provided by the invention can be implemented in a terminal environment, and the terminal can comprise one or more of the following components: processor, memory and display screen. Wherein the memory stores at least one instruction that is loaded and executed by the processor to implement the method described in the embodiments below.
The processor may include one or more processing cores. The processor connects various parts within the overall terminal using various interfaces and lines, performs various functions of the terminal and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory, and invoking data stored in the memory.
The Memory may include random access Memory (Random Access Memory, RAM) or Read-Only Memory (ROM). The memory may be used to store instructions, programs, code, sets of codes, or instructions.
The display screen is used for displaying a user interface of each application program.
In addition, it will be appreciated by those skilled in the art that the structure of the terminal described above is not limiting and that the terminal may include more or fewer components, or may combine certain components, or a different arrangement of components. For example, the terminal further includes components such as a radio frequency circuit, an input unit, a sensor, an audio circuit, a power supply, and the like, which are not described herein.
Example 1
As shown in fig. 1, an embodiment of the present invention provides a method for storing an asset-based securities-type general-purpose trading certificate, where the method is applied to a prophetic machine, and includes:
s101, reading asset securities type general evidence transaction credential data on a chain by using an under-chain node, and calculating a hash value of the credential data;
s102, storing the credential data and the hash value thereof in the under-chain node;
s103, storing the hash value of the credential data on an on-chain contract.
The prophetic agent is a unidirectional digital agent that can find and verify real world data and submit information in an encrypted manner to the smart contract. The predictor is an intermediate layer that connects the blockchain securely to the under-chain system, which can connect to various under-chain environments such as data providers, web APIs, enterprise backend, cloud service providers, internet of things devices, electronic signatures, payment systems, and other blockchains.
In the invention, the transaction data on the chain is stored in the huge storage space of the nodes under the chain by utilizing the predictor, so that the problem that the storage space on the chain is small and the storage of a large amount of transaction data cannot be met is solved.
Step S101 is executed, in which, for the asset securities type general-purpose transaction completed on the public chain, the credential data can be read by the node under the chain at any time. Because the general certificate transaction is frequent and large in quantity, in order to avoid the calculation pressure caused by reading the certificate in real time, the certificate data can be read regularly according to a preset time interval.
After acquiring the credential data, the node under the chain calculates the hash value of the credential data according to the following method:
time stamping the credential data;
calculating hash values of all credential data of the same timestamp;
generating a tree structure by using the obtained hash value;
traversing credential data of different timestamps to generate multiple tree structures
And calculating the hash value of the credential data by using a preset hash algorithm.
The time stamp can be added according to the time when the under-chain node reads the on-chain credential data, the time stamp can be added according to the completion time of the asset securities type general evidence transaction, and other modes can be adopted for adding the time stamp.
Because the number of certificates is very large, no matter what way is adopted to timestamp the certificate data, a plurality of certificate data belonging to the same timestamp exist, and for each certificate data of the same timestamp, the corresponding hash value is calculated respectively, that is, each certificate data has a corresponding hash value.
In order to facilitate the storage and inquiry, the hash values of a plurality of credential data with the same timestamp are generated into a tree structure.
Thus, by traversing the credential data of different timestamps, multiple tree structures are generated.
In a preferred embodiment of the present invention, the generating the tree structure using the obtained hash value includes:
taking hash values corresponding to the credential data of the same time stamp as leaf nodes;
grouping the leaf nodes, calculating the hash value of each group of leaf nodes, and taking the hash value as an intermediate node;
grouping the intermediate nodes, calculating the hash value of each group of intermediate nodes until a hash value is obtained, and taking the hash value as a root node.
When the two leaf nodes are grouped, the two hash values on the two leaf nodes are used as data, the corresponding hash values are calculated, and the hash values are used as intermediate nodes. The intermediate node may comprise multiple layers. In practical application, if the certificates with the same time stamp are more, the leaf nodes are more, and the obtained first-layer intermediate nodes are more. Grouping the first layer intermediate nodes two by two and calculating the hash value of each group, obtaining a second layer intermediate node, and so on, until the last layer intermediate node is only two, calculating the hash value of the combination of the two intermediate nodes, and obtaining only one, namely the root node. If the number of the credential data with the same time stamp is only two, after the corresponding hash values are calculated, the leaf nodes are grouped in pairs and the combined hash value is calculated, so that only one hash value is obtained, and the root node is the root node, and no intermediate node exists at the moment. In practical applications, this is hardly the case.
When executing step S101, any one hash value calculation may be completed by using conventional technical means in the art, including calculation of hash values on leaf nodes, calculation of hash values on intermediate nodes, and calculation of hash values on root nodes.
Step S102 is executed, if the under-link node generates a tree structure from hash values of certificates of the same timestamp for convenience of storage and query, the prophetic machine may directly store the certificate data and the generated plurality of tree structures in the under-link node when storing both the certificate data and the hash values thereof in the under-link node.
Step S103 is performed, if the under-link node generates a tree structure from hash values of certificates of the same timestamp for convenience of storage and query, the hash value on the root node may be stored on the on-link contract when the hash value of the certificate data is stored on the on-link contract by the predictor.
When inquiring a certain certificate, the user on the chain can inquire in the tree structure of the node under the chain according to the root node stored on the contract on the chain, and can verify whether the hash value corresponding to the certificate data stored in the node under the chain and the corresponding certificate data are accurate or not according to the root node stored on the contract on the chain, so that the certificate data stored on the node under the chain is ensured not to be artificially tampered, and the method can be used for verifying the security type certificate-passing transaction on the chain.
In order to ensure that the hash value is not tampered by people when the under-chain node sends the hash value to the on-chain contract, the pre-speaking machine utilizes the under-chain node to carry out asymmetric encryption on the hash value of the credential data to generate encrypted data, and then sends the encrypted data to the chain and stores the encrypted data on the chain.
The node under the chain can generate a pair of public key and private key, the private key is used for encrypting the hash value of the credential data, the public key is sent to the chain and broadcasted, and the user on the chain can decrypt the encrypted data by using the public key, so that the security of the obtained hash value is ensured.
In a preferred embodiment of the present invention, when the prophetic machine encrypts the hash value of the credential data using the under-chain node, the prophetic machine may first determine the number of hash values of the credential data, and if the number of hash values of the credential data reaches a threshold, asymmetrically encrypt the hash values of the batch of credential data together to generate an encrypted data. Therefore, the times of sending data to the on-link contract by the off-link node can be reduced, the security of data storage is further enhanced, and the possibility of being tampered by people in the data sending process is reduced.
By adopting the method provided by the invention, the asset securities type general evidence transaction certificate with huge data volume can be stored in the under-chain node of the prophetic machine, so that the problems that the storage space of a public chain is small and inextensible, and the storage requirement of the asset securities type general evidence certificate is not met; meanwhile, by storing the hash value of the certificate on the on-chain contract, the problem that the certificate stored in the public chain is exposed to all anonymous users and cannot protect investors is solved, and meanwhile the possibility that the hash value of the certificate stored in the node under the chain is tampered is avoided.
Example two
As shown in fig. 2, another aspect of the present invention further includes a functional module architecture that is completely consistent with the foregoing method flow, that is, the embodiment of the present invention further provides a device for storing an asset security type universal transaction credential, where the device is set in a predictor, and includes:
a credential reading module 201, configured to read, by using an off-chain node, asset-based securities-type general-purpose transaction credential data on a chain;
a hash value calculation module 202, configured to calculate a hash value of the credential data by using an off-link node;
a first data storage module 203 for storing the credential data and its hash value at the under-chain node;
a second data storage module 204 for storing hash values of the credential data on an on-chain contract.
The hash value calculation module is specifically configured to:
time stamping the credential data;
respectively calculating hash values corresponding to the credential data of the same time stamp;
generating a tree structure by using the obtained hash value;
and traversing the credential data of different time stamps to generate a plurality of tree structures.
Wherein the generating the tree structure by using the obtained hash value comprises:
taking hash values corresponding to the credential data of the same time stamp as leaf nodes;
grouping the leaf nodes, calculating the hash value of each group of leaf nodes, and taking the hash value as an intermediate node;
grouping the intermediate nodes, calculating the hash value of each group of intermediate nodes until a hash value is obtained, and taking the hash value as a root node.
Further, in the first data storage module, the credential data and tree structure are stored at the under-chain node.
Further, in the second data storage module, the hash value on the root node is stored on an on-chain contract.
The second data storage module is specifically configured to: asymmetrically encrypting the hash value of the credential data by using the node under the chain to generate encrypted data;
the encrypted data is stored on an on-link contract.
Further, encrypting the hash value of the credential data with the off-chain node, generating the encrypted data includes:
and if the number of the hash values of the credential data reaches a threshold value, carrying out asymmetric encryption on the hash values of the credential data of the batch together to generate encrypted data.
The device may be implemented by the method for storing the asset securities type general evidence transaction certificates provided in the first embodiment, and the specific implementation method may be described in the first embodiment, which is not described herein.
The invention also provides a memory storing a plurality of instructions for implementing the method according to embodiment one.
The invention also provides an electronic device comprising a processor and a memory coupled to the processor, the memory storing a plurality of instructions loadable and executable by the processor to enable the processor to perform the method of embodiment one.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention. It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.
Claims (10)
1. The method for storing the asset securities type general evidence transaction certificates is characterized by being applied to a prophetic machine and comprising the following steps of:
reading asset securities type general evidence transaction credential data on a chain by using an under-chain node, and calculating a hash value of the credential data;
storing the credential data and a hash value thereof at the under-chain node;
the hash value of the credential data is stored on an on-chain contract.
2. The method of claim 1, wherein the computing a hash value of the credential data comprises:
time stamping the credential data;
respectively calculating hash values corresponding to the credential data of the same time stamp;
generating a tree structure by using the obtained hash value;
and traversing the credential data of different time stamps to generate a plurality of tree structures.
3. The method for storing the asset-based security type universal transaction certificate as claimed in claim 2, wherein said generating a tree structure using the obtained hash value comprises:
taking hash values corresponding to the credential data of the same time stamp as leaf nodes;
grouping the leaf nodes, calculating the hash value of each group of leaf nodes, and taking the hash value as an intermediate node;
grouping the intermediate nodes, calculating the hash value of each group of intermediate nodes until a hash value is obtained, and taking the hash value as a root node.
4. A method of storing an asset-based security type passable transaction credential as defined in claim 3 wherein said storing said credential data and its hash value at said under-chain node comprises: the credential data and tree structure are stored at the under-chain node.
5. A method of storing an asset-based security type passable transaction credential as defined in claim 3 wherein said storing a hash value of said credential data on an on-chain contract comprises: the hash value on the root node is stored on an on-chain contract.
6. The method of claim 1, wherein storing the hash value of the credential data on an on-chain contract comprises:
asymmetrically encrypting the hash value of the credential data by using the node under the chain to generate encrypted data;
the encrypted data is stored on an on-link contract.
7. The method of claim 6, wherein encrypting the hash value of the credential data using the in-chain node, the generating encrypted data comprises:
and if the number of the hash values of the credential data reaches a threshold value, carrying out asymmetric encryption on the hash values of the credential data of the batch together to generate encrypted data.
8. A device for storing asset-based securities-type general-purpose trading credentials, the device being arranged in a predictor and comprising:
the certificate reading module is used for reading the asset type securities type general certificate transaction certificate data on the chain by using the nodes below the chain;
the hash value calculation module is used for calculating the hash value of the credential data by using the node under the chain;
a first data storage module for storing the credential data and its hash value at the under-chain node;
and the second data storage module is used for storing the hash value of the credential data on an on-chain contract.
9. A memory, characterized in that a plurality of instructions for implementing the method according to any of claims 1-7 are stored.
10. An electronic device comprising a processor and a memory coupled to the processor, the memory storing a plurality of instructions that are loadable and executable by the processor to enable the processor to perform the method of any one of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110366267.2A CN113064899B (en) | 2021-04-06 | 2021-04-06 | Method and device for storing asset securities type general evidence transaction certificates and electronic equipment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110366267.2A CN113064899B (en) | 2021-04-06 | 2021-04-06 | Method and device for storing asset securities type general evidence transaction certificates and electronic equipment |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113064899A CN113064899A (en) | 2021-07-02 |
CN113064899B true CN113064899B (en) | 2023-09-29 |
Family
ID=76565791
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110366267.2A Active CN113064899B (en) | 2021-04-06 | 2021-04-06 | Method and device for storing asset securities type general evidence transaction certificates and electronic equipment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113064899B (en) |
-
2021
- 2021-04-06 CN CN202110366267.2A patent/CN113064899B/en active Active
Non-Patent Citations (2)
Title |
---|
Blockchain Based PKI and Certificates Management in Mobile Networks;Junzhi Yan等;《2020 IEEE 19th International Conference on Trust,Security and Privacy in Computing and Communications》;1764-1770 * |
改进的无证书签名方案及其在票据管理中的应用研究;周庆;中国优秀硕士学位论文全文数据库 (信息科技辑);第2020年卷(第03期);I136-217 * |
Also Published As
Publication number | Publication date |
---|---|
CN113064899A (en) | 2021-07-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108681853B (en) | Logistics information transmission method, system and device based on block chain | |
US11388009B2 (en) | Token management system and token management method | |
CN110046996B (en) | Data processing method and device | |
CN108734028B (en) | Data management method based on block chain, block chain link point and storage medium | |
CN109495592B (en) | Data collaboration method and electronic equipment | |
Han et al. | A survey on blockchain-based integrity auditing for cloud data | |
US20210263907A1 (en) | Documenting timestamps within a blockchain | |
WO2020051710A1 (en) | System and process for managing digitized security tokens | |
CN112202554B (en) | Information processing method, device and equipment for generating key based on attribute of information | |
US20220303141A1 (en) | Methods and systems for introducing self-contained intent functionality into decentralized computer networks | |
CN113704775B (en) | Service processing method and related device based on distributed digital identity | |
CN111049806B (en) | Joint authority control method and device, electronic equipment and storage medium | |
CN112600830B (en) | Service data processing method and device, electronic equipment and storage medium | |
CN112202779B (en) | Block chain based information encryption method, device, equipment and medium | |
US20220052921A1 (en) | Methods and systems for introducing self-contained intent functionality into decentralized computer networks | |
CN111950032A (en) | Block chain-based data storage method, terminal device and storage medium | |
CN112165383B (en) | Encryption method, device, equipment and medium based on shared root key | |
CN111861462B (en) | Financial product transaction method and device based on blockchain | |
CN113064899B (en) | Method and device for storing asset securities type general evidence transaction certificates and electronic equipment | |
CN113536384B (en) | Block chain-based private data mapping method, block chain-based private data mapping device, block chain-based private data mapping medium and electronic equipment | |
CN114896611A (en) | Data processing method, processor and machine readable storage medium | |
CN110781523B (en) | Method and apparatus for processing information | |
CN115375303A (en) | Calling method and device of intelligent contract, computer readable medium and electronic equipment | |
CN110766407A (en) | Transaction verification method, accounting node and medium based on block chain | |
CN116975936B (en) | Finance qualification proving method and finance qualification verifying method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |