CN113064899B - Method and device for storing asset securities type general evidence transaction certificates and electronic equipment - Google Patents

Method and device for storing asset securities type general evidence transaction certificates and electronic equipment Download PDF

Info

Publication number
CN113064899B
CN113064899B CN202110366267.2A CN202110366267A CN113064899B CN 113064899 B CN113064899 B CN 113064899B CN 202110366267 A CN202110366267 A CN 202110366267A CN 113064899 B CN113064899 B CN 113064899B
Authority
CN
China
Prior art keywords
hash value
chain
credential data
data
storing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110366267.2A
Other languages
Chinese (zh)
Other versions
CN113064899A (en
Inventor
张�诚
朱国君
张勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Rzxt Technology Development Co ltd
Original Assignee
Beijing Rzxt Technology Development Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Rzxt Technology Development Co ltd filed Critical Beijing Rzxt Technology Development Co ltd
Priority to CN202110366267.2A priority Critical patent/CN113064899B/en
Publication of CN113064899A publication Critical patent/CN113064899A/en
Application granted granted Critical
Publication of CN113064899B publication Critical patent/CN113064899B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2219Large Object storage; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Data Mining & Analysis (AREA)
  • Computer Hardware Design (AREA)
  • General Health & Medical Sciences (AREA)
  • Accounting & Taxation (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • Marketing (AREA)
  • Computing Systems (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Economics (AREA)
  • Development Economics (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a method and a device for storing asset securities type general evidence transaction certificates and electronic equipment. The method comprises the following steps: reading asset securities type general evidence transaction credential data on a chain by using an under-chain node, and calculating a hash value of the credential data; the credential data and its hash value are stored at the under-chain node while the hash value of the credential data is stored on an on-chain contract. The method has the advantages that the asset type securities type general evidence transaction certificates with huge data quantity are stored in the nodes under the chain of the prophetic machine, so that the problems that the storage space of a public chain is small and inextensible, and the storage requirement of the asset type securities type general evidence certificates is not met; meanwhile, by storing the hash value of the certificate on the on-chain contract, the problem that the certificate stored in the public chain is exposed to all anonymous users and cannot protect investors is solved, and meanwhile the possibility that the hash value of the certificate stored in the node under the chain is tampered is avoided.

Description

Method and device for storing asset securities type general evidence transaction certificates and electronic equipment
Technical Field
The invention relates to the technical field of blockchains, in particular to a method and a device for storing asset securities type general evidence transaction certificates and electronic equipment.
Background
Currently, in blockchain technology, certificates can be circulated as virtual currency to complete related transactions. In the process of the trading, each node on the chain authenticates the asset securities type through certificate trade according to the certificates, and the corresponding certificates are stored in the blockchain.
With the continuous development of blockchain technology, more and more types of certificates are involved in the asset securities, so that the required on-chain storage space is also larger and larger. However, the public chain has small and inextensible storage space, and cannot meet the requirement of preserving the asset securities type general certificate, and the certificates stored in the public chain can be exposed to all anonymous users, so that the supervision requirement of protecting investors cannot be met. Therefore, there is an urgent need to develop a new technology to meet the storage requirement of the securities-type general evidence-passing trade certificates.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides the following technical scheme.
The invention provides a method for storing asset securities type general evidence transaction certificates, which is applied to a predictor and comprises the following steps:
reading asset securities type general evidence transaction credential data on a chain by using an under-chain node, and calculating a hash value of the credential data;
storing the credential data and a hash value thereof at the under-chain node;
the hash value of the credential data is stored on an on-chain contract.
Preferably, the calculating the hash value of the credential data includes:
time stamping the credential data;
respectively calculating hash values corresponding to the credential data of the same time stamp;
generating a tree structure by using the obtained hash value;
and traversing the credential data of different time stamps to generate a plurality of tree structures.
Preferably, the generating the tree structure using the obtained hash value includes:
taking hash values corresponding to the credential data of the same time stamp as leaf nodes;
grouping the leaf nodes, calculating the hash value of each group of leaf nodes, and taking the hash value as an intermediate node;
grouping the intermediate nodes, calculating the hash value of each group of intermediate nodes until a hash value is obtained, and taking the hash value as a root node.
Preferably, the storing the credential data and the hash value thereof at the under-chain node comprises: the credential data and tree structure are stored at the under-chain node.
Preferably, the storing the hash value of the credential data on an on-chain contract includes: the hash value on the root node is stored on an on-chain contract.
Preferably, the storing the hash value of the credential data on an on-chain contract includes:
asymmetrically encrypting the hash value of the credential data by using the node under the chain to generate encrypted data;
the encrypted data is stored on an on-link contract.
Preferably, the encrypting the hash value of the credential data by using the node under the chain includes:
and if the number of the hash values of the credential data reaches a threshold value, carrying out asymmetric encryption on the hash values of the credential data of the batch together to generate encrypted data.
In another aspect, the present invention provides a device for storing asset securities type general evidence transaction credentials, the device being arranged in a predictor, comprising:
the certificate reading module is used for reading the asset type securities type general certificate transaction certificate data on the chain by using the nodes below the chain;
the hash value calculation module is used for calculating the hash value of the credential data by using the node under the chain;
a first data storage module for storing the credential data and its hash value at the under-chain node;
and the second data storage module is used for storing the hash value of the credential data on an on-chain contract.
A third aspect of the present invention provides a memory storing a plurality of instructions for implementing the method described above.
A fourth aspect of the invention provides an electronic device comprising a processor and a memory coupled to the processor, the memory storing a plurality of instructions loadable and executable by the processor to enable the processor to perform the method as described above.
The beneficial effects of the invention are as follows: the invention provides a method, a device and an electronic device for storing asset securities type pass-through transaction certificates, which are characterized in that in a prophetic machine, under-chain nodes are utilized to read asset securities type pass-through transaction certificate data on a chain, and hash values of the certificate data are calculated; the credential data and its hash value are stored at the under-chain node while the hash value of the credential data is stored on an on-chain contract. The method has the advantages that the asset type securities type general evidence transaction certificates with huge data quantity are stored in the nodes under the chain of the prophetic machine, so that the problems that the storage space of a public chain is small and inextensible, and the storage requirement of the asset type securities type general evidence certificates is not met; meanwhile, by storing the hash value of the certificate on the on-chain contract, the problem that the certificate stored in the public chain is exposed to all anonymous users and cannot protect investors is solved, and meanwhile the possibility that the hash value of the certificate stored in the node under the chain is tampered is avoided.
Drawings
FIG. 1 is a flow chart of a method for storing an asset-based securities-type general evidence transaction certificate according to the present invention;
FIG. 2 is a schematic diagram of a storage device for an asset securities type general evidence transaction certificate according to the present invention.
Detailed Description
In order to better understand the above technical solutions, the following detailed description will be given with reference to the accompanying drawings and specific embodiments.
The method provided by the invention can be implemented in a terminal environment, and the terminal can comprise one or more of the following components: processor, memory and display screen. Wherein the memory stores at least one instruction that is loaded and executed by the processor to implement the method described in the embodiments below.
The processor may include one or more processing cores. The processor connects various parts within the overall terminal using various interfaces and lines, performs various functions of the terminal and processes data by executing or executing instructions, programs, code sets, or instruction sets stored in the memory, and invoking data stored in the memory.
The Memory may include random access Memory (Random Access Memory, RAM) or Read-Only Memory (ROM). The memory may be used to store instructions, programs, code, sets of codes, or instructions.
The display screen is used for displaying a user interface of each application program.
In addition, it will be appreciated by those skilled in the art that the structure of the terminal described above is not limiting and that the terminal may include more or fewer components, or may combine certain components, or a different arrangement of components. For example, the terminal further includes components such as a radio frequency circuit, an input unit, a sensor, an audio circuit, a power supply, and the like, which are not described herein.
Example 1
As shown in fig. 1, an embodiment of the present invention provides a method for storing an asset-based securities-type general-purpose trading certificate, where the method is applied to a prophetic machine, and includes:
s101, reading asset securities type general evidence transaction credential data on a chain by using an under-chain node, and calculating a hash value of the credential data;
s102, storing the credential data and the hash value thereof in the under-chain node;
s103, storing the hash value of the credential data on an on-chain contract.
The prophetic agent is a unidirectional digital agent that can find and verify real world data and submit information in an encrypted manner to the smart contract. The predictor is an intermediate layer that connects the blockchain securely to the under-chain system, which can connect to various under-chain environments such as data providers, web APIs, enterprise backend, cloud service providers, internet of things devices, electronic signatures, payment systems, and other blockchains.
In the invention, the transaction data on the chain is stored in the huge storage space of the nodes under the chain by utilizing the predictor, so that the problem that the storage space on the chain is small and the storage of a large amount of transaction data cannot be met is solved.
Step S101 is executed, in which, for the asset securities type general-purpose transaction completed on the public chain, the credential data can be read by the node under the chain at any time. Because the general certificate transaction is frequent and large in quantity, in order to avoid the calculation pressure caused by reading the certificate in real time, the certificate data can be read regularly according to a preset time interval.
After acquiring the credential data, the node under the chain calculates the hash value of the credential data according to the following method:
time stamping the credential data;
calculating hash values of all credential data of the same timestamp;
generating a tree structure by using the obtained hash value;
traversing credential data of different timestamps to generate multiple tree structures
And calculating the hash value of the credential data by using a preset hash algorithm.
The time stamp can be added according to the time when the under-chain node reads the on-chain credential data, the time stamp can be added according to the completion time of the asset securities type general evidence transaction, and other modes can be adopted for adding the time stamp.
Because the number of certificates is very large, no matter what way is adopted to timestamp the certificate data, a plurality of certificate data belonging to the same timestamp exist, and for each certificate data of the same timestamp, the corresponding hash value is calculated respectively, that is, each certificate data has a corresponding hash value.
In order to facilitate the storage and inquiry, the hash values of a plurality of credential data with the same timestamp are generated into a tree structure.
Thus, by traversing the credential data of different timestamps, multiple tree structures are generated.
In a preferred embodiment of the present invention, the generating the tree structure using the obtained hash value includes:
taking hash values corresponding to the credential data of the same time stamp as leaf nodes;
grouping the leaf nodes, calculating the hash value of each group of leaf nodes, and taking the hash value as an intermediate node;
grouping the intermediate nodes, calculating the hash value of each group of intermediate nodes until a hash value is obtained, and taking the hash value as a root node.
When the two leaf nodes are grouped, the two hash values on the two leaf nodes are used as data, the corresponding hash values are calculated, and the hash values are used as intermediate nodes. The intermediate node may comprise multiple layers. In practical application, if the certificates with the same time stamp are more, the leaf nodes are more, and the obtained first-layer intermediate nodes are more. Grouping the first layer intermediate nodes two by two and calculating the hash value of each group, obtaining a second layer intermediate node, and so on, until the last layer intermediate node is only two, calculating the hash value of the combination of the two intermediate nodes, and obtaining only one, namely the root node. If the number of the credential data with the same time stamp is only two, after the corresponding hash values are calculated, the leaf nodes are grouped in pairs and the combined hash value is calculated, so that only one hash value is obtained, and the root node is the root node, and no intermediate node exists at the moment. In practical applications, this is hardly the case.
When executing step S101, any one hash value calculation may be completed by using conventional technical means in the art, including calculation of hash values on leaf nodes, calculation of hash values on intermediate nodes, and calculation of hash values on root nodes.
Step S102 is executed, if the under-link node generates a tree structure from hash values of certificates of the same timestamp for convenience of storage and query, the prophetic machine may directly store the certificate data and the generated plurality of tree structures in the under-link node when storing both the certificate data and the hash values thereof in the under-link node.
Step S103 is performed, if the under-link node generates a tree structure from hash values of certificates of the same timestamp for convenience of storage and query, the hash value on the root node may be stored on the on-link contract when the hash value of the certificate data is stored on the on-link contract by the predictor.
When inquiring a certain certificate, the user on the chain can inquire in the tree structure of the node under the chain according to the root node stored on the contract on the chain, and can verify whether the hash value corresponding to the certificate data stored in the node under the chain and the corresponding certificate data are accurate or not according to the root node stored on the contract on the chain, so that the certificate data stored on the node under the chain is ensured not to be artificially tampered, and the method can be used for verifying the security type certificate-passing transaction on the chain.
In order to ensure that the hash value is not tampered by people when the under-chain node sends the hash value to the on-chain contract, the pre-speaking machine utilizes the under-chain node to carry out asymmetric encryption on the hash value of the credential data to generate encrypted data, and then sends the encrypted data to the chain and stores the encrypted data on the chain.
The node under the chain can generate a pair of public key and private key, the private key is used for encrypting the hash value of the credential data, the public key is sent to the chain and broadcasted, and the user on the chain can decrypt the encrypted data by using the public key, so that the security of the obtained hash value is ensured.
In a preferred embodiment of the present invention, when the prophetic machine encrypts the hash value of the credential data using the under-chain node, the prophetic machine may first determine the number of hash values of the credential data, and if the number of hash values of the credential data reaches a threshold, asymmetrically encrypt the hash values of the batch of credential data together to generate an encrypted data. Therefore, the times of sending data to the on-link contract by the off-link node can be reduced, the security of data storage is further enhanced, and the possibility of being tampered by people in the data sending process is reduced.
By adopting the method provided by the invention, the asset securities type general evidence transaction certificate with huge data volume can be stored in the under-chain node of the prophetic machine, so that the problems that the storage space of a public chain is small and inextensible, and the storage requirement of the asset securities type general evidence certificate is not met; meanwhile, by storing the hash value of the certificate on the on-chain contract, the problem that the certificate stored in the public chain is exposed to all anonymous users and cannot protect investors is solved, and meanwhile the possibility that the hash value of the certificate stored in the node under the chain is tampered is avoided.
Example two
As shown in fig. 2, another aspect of the present invention further includes a functional module architecture that is completely consistent with the foregoing method flow, that is, the embodiment of the present invention further provides a device for storing an asset security type universal transaction credential, where the device is set in a predictor, and includes:
a credential reading module 201, configured to read, by using an off-chain node, asset-based securities-type general-purpose transaction credential data on a chain;
a hash value calculation module 202, configured to calculate a hash value of the credential data by using an off-link node;
a first data storage module 203 for storing the credential data and its hash value at the under-chain node;
a second data storage module 204 for storing hash values of the credential data on an on-chain contract.
The hash value calculation module is specifically configured to:
time stamping the credential data;
respectively calculating hash values corresponding to the credential data of the same time stamp;
generating a tree structure by using the obtained hash value;
and traversing the credential data of different time stamps to generate a plurality of tree structures.
Wherein the generating the tree structure by using the obtained hash value comprises:
taking hash values corresponding to the credential data of the same time stamp as leaf nodes;
grouping the leaf nodes, calculating the hash value of each group of leaf nodes, and taking the hash value as an intermediate node;
grouping the intermediate nodes, calculating the hash value of each group of intermediate nodes until a hash value is obtained, and taking the hash value as a root node.
Further, in the first data storage module, the credential data and tree structure are stored at the under-chain node.
Further, in the second data storage module, the hash value on the root node is stored on an on-chain contract.
The second data storage module is specifically configured to: asymmetrically encrypting the hash value of the credential data by using the node under the chain to generate encrypted data;
the encrypted data is stored on an on-link contract.
Further, encrypting the hash value of the credential data with the off-chain node, generating the encrypted data includes:
and if the number of the hash values of the credential data reaches a threshold value, carrying out asymmetric encryption on the hash values of the credential data of the batch together to generate encrypted data.
The device may be implemented by the method for storing the asset securities type general evidence transaction certificates provided in the first embodiment, and the specific implementation method may be described in the first embodiment, which is not described herein.
The invention also provides a memory storing a plurality of instructions for implementing the method according to embodiment one.
The invention also provides an electronic device comprising a processor and a memory coupled to the processor, the memory storing a plurality of instructions loadable and executable by the processor to enable the processor to perform the method of embodiment one.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention. It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (10)

1. The method for storing the asset securities type general evidence transaction certificates is characterized by being applied to a prophetic machine and comprising the following steps of:
reading asset securities type general evidence transaction credential data on a chain by using an under-chain node, and calculating a hash value of the credential data;
storing the credential data and a hash value thereof at the under-chain node;
the hash value of the credential data is stored on an on-chain contract.
2. The method of claim 1, wherein the computing a hash value of the credential data comprises:
time stamping the credential data;
respectively calculating hash values corresponding to the credential data of the same time stamp;
generating a tree structure by using the obtained hash value;
and traversing the credential data of different time stamps to generate a plurality of tree structures.
3. The method for storing the asset-based security type universal transaction certificate as claimed in claim 2, wherein said generating a tree structure using the obtained hash value comprises:
taking hash values corresponding to the credential data of the same time stamp as leaf nodes;
grouping the leaf nodes, calculating the hash value of each group of leaf nodes, and taking the hash value as an intermediate node;
grouping the intermediate nodes, calculating the hash value of each group of intermediate nodes until a hash value is obtained, and taking the hash value as a root node.
4. A method of storing an asset-based security type passable transaction credential as defined in claim 3 wherein said storing said credential data and its hash value at said under-chain node comprises: the credential data and tree structure are stored at the under-chain node.
5. A method of storing an asset-based security type passable transaction credential as defined in claim 3 wherein said storing a hash value of said credential data on an on-chain contract comprises: the hash value on the root node is stored on an on-chain contract.
6. The method of claim 1, wherein storing the hash value of the credential data on an on-chain contract comprises:
asymmetrically encrypting the hash value of the credential data by using the node under the chain to generate encrypted data;
the encrypted data is stored on an on-link contract.
7. The method of claim 6, wherein encrypting the hash value of the credential data using the in-chain node, the generating encrypted data comprises:
and if the number of the hash values of the credential data reaches a threshold value, carrying out asymmetric encryption on the hash values of the credential data of the batch together to generate encrypted data.
8. A device for storing asset-based securities-type general-purpose trading credentials, the device being arranged in a predictor and comprising:
the certificate reading module is used for reading the asset type securities type general certificate transaction certificate data on the chain by using the nodes below the chain;
the hash value calculation module is used for calculating the hash value of the credential data by using the node under the chain;
a first data storage module for storing the credential data and its hash value at the under-chain node;
and the second data storage module is used for storing the hash value of the credential data on an on-chain contract.
9. A memory, characterized in that a plurality of instructions for implementing the method according to any of claims 1-7 are stored.
10. An electronic device comprising a processor and a memory coupled to the processor, the memory storing a plurality of instructions that are loadable and executable by the processor to enable the processor to perform the method of any one of claims 1-7.
CN202110366267.2A 2021-04-06 2021-04-06 Method and device for storing asset securities type general evidence transaction certificates and electronic equipment Active CN113064899B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110366267.2A CN113064899B (en) 2021-04-06 2021-04-06 Method and device for storing asset securities type general evidence transaction certificates and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110366267.2A CN113064899B (en) 2021-04-06 2021-04-06 Method and device for storing asset securities type general evidence transaction certificates and electronic equipment

Publications (2)

Publication Number Publication Date
CN113064899A CN113064899A (en) 2021-07-02
CN113064899B true CN113064899B (en) 2023-09-29

Family

ID=76565791

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110366267.2A Active CN113064899B (en) 2021-04-06 2021-04-06 Method and device for storing asset securities type general evidence transaction certificates and electronic equipment

Country Status (1)

Country Link
CN (1) CN113064899B (en)

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Blockchain Based PKI and Certificates Management in Mobile Networks;Junzhi Yan等;《2020 IEEE 19th International Conference on Trust,Security and Privacy in Computing and Communications》;1764-1770 *
改进的无证书签名方案及其在票据管理中的应用研究;周庆;中国优秀硕士学位论文全文数据库 (信息科技辑);第2020年卷(第03期);I136-217 *

Also Published As

Publication number Publication date
CN113064899A (en) 2021-07-02

Similar Documents

Publication Publication Date Title
CN108681853B (en) Logistics information transmission method, system and device based on block chain
US11388009B2 (en) Token management system and token management method
CN110046996B (en) Data processing method and device
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
CN109495592B (en) Data collaboration method and electronic equipment
Han et al. A survey on blockchain-based integrity auditing for cloud data
US20210263907A1 (en) Documenting timestamps within a blockchain
WO2020051710A1 (en) System and process for managing digitized security tokens
CN112202554B (en) Information processing method, device and equipment for generating key based on attribute of information
US20220303141A1 (en) Methods and systems for introducing self-contained intent functionality into decentralized computer networks
CN113704775B (en) Service processing method and related device based on distributed digital identity
CN111049806B (en) Joint authority control method and device, electronic equipment and storage medium
CN112600830B (en) Service data processing method and device, electronic equipment and storage medium
CN112202779B (en) Block chain based information encryption method, device, equipment and medium
US20220052921A1 (en) Methods and systems for introducing self-contained intent functionality into decentralized computer networks
CN111950032A (en) Block chain-based data storage method, terminal device and storage medium
CN112165383B (en) Encryption method, device, equipment and medium based on shared root key
CN111861462B (en) Financial product transaction method and device based on blockchain
CN113064899B (en) Method and device for storing asset securities type general evidence transaction certificates and electronic equipment
CN113536384B (en) Block chain-based private data mapping method, block chain-based private data mapping device, block chain-based private data mapping medium and electronic equipment
CN114896611A (en) Data processing method, processor and machine readable storage medium
CN110781523B (en) Method and apparatus for processing information
CN115375303A (en) Calling method and device of intelligent contract, computer readable medium and electronic equipment
CN110766407A (en) Transaction verification method, accounting node and medium based on block chain
CN116975936B (en) Finance qualification proving method and finance qualification verifying method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant