CN112100142A - Block chain-based digital asset processing method and system - Google Patents
Block chain-based digital asset processing method and system Download PDFInfo
- Publication number
- CN112100142A CN112100142A CN202010816998.8A CN202010816998A CN112100142A CN 112100142 A CN112100142 A CN 112100142A CN 202010816998 A CN202010816998 A CN 202010816998A CN 112100142 A CN112100142 A CN 112100142A
- Authority
- CN
- China
- Prior art keywords
- file
- uplink
- user
- digital asset
- data
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000003672 processing method Methods 0.000 title claims abstract description 29
- 238000012545 processing Methods 0.000 claims abstract description 36
- 230000009467 reduction Effects 0.000 claims abstract description 26
- 238000012795 verification Methods 0.000 claims description 30
- 238000000034 method Methods 0.000 claims description 20
- 230000006835 compression Effects 0.000 claims description 14
- 238000007906 compression Methods 0.000 claims description 11
- 238000004590 computer program Methods 0.000 claims description 8
- 230000004048 modification Effects 0.000 abstract description 4
- 238000012986 modification Methods 0.000 abstract description 4
- 238000010586 diagram Methods 0.000 description 10
- 230000006872 improvement Effects 0.000 description 6
- 230000008569 process Effects 0.000 description 5
- 230000008859 change Effects 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000013507 mapping Methods 0.000 description 2
- 230000001360 synchronised effect Effects 0.000 description 2
- 230000009466 transformation Effects 0.000 description 2
- RWSOTUBLDIXVET-UHFFFAOYSA-N Dihydrogen sulfide Chemical compound S RWSOTUBLDIXVET-UHFFFAOYSA-N 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000007115 recruitment Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/17—Details of further file system functions
- G06F16/174—Redundancy elimination performed by the file system
- G06F16/1744—Redundancy elimination performed by the file system using compression, e.g. sparse files
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/10—File systems; File servers
- G06F16/18—File system types
- G06F16/182—Distributed file systems
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6218—Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
- G06F21/6245—Protecting personal data, e.g. for financial or medical purposes
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3263—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Databases & Information Systems (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Data Mining & Analysis (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Medical Informatics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a block chain-based digital asset processing method and a block chain-based digital asset processing system, which are used for receiving a uplink request from a first user and uploading a file type digital asset, wherein the file type digital asset at least comprises one of the following file types: patents, certificates, works, documents, and resumes; performing data dimension reduction processing on the received file-type digital assets to generate uplink data; and calling a private key corresponding to the first user to encrypt the uplink data to generate signature data according to the uplink request, and uplink the signature data. Once the file-type digital assets are linked up, the modification difficulty is extremely high, and a buyer in the file-type digital asset transaction can confirm whether the file-type digital assets are tampered or not by comparing the file-type digital assets provided by the seller with the file-type digital assets stored on the blockchain, so that the buyer can conveniently verify the reliability of the file-type digital assets.
Description
Technical Field
The invention relates to the technical field of block chains, in particular to a digital asset processing method and system based on a block chain.
Background
Digital assets refer to non-monetary assets owned or controlled by a business or person, in the form of electronic data, held in daily activities for sale or in the process of production. Particularly for the file type digital assets, the file type digital assets are convenient to store, copy and edit in the form of electronic data, and the file type digital assets are greatly convenient to spread and trade.
However, due to the electronic data characteristics of the file-type digital assets, the file-type digital assets are easily maliciously edited and tampered in the transmission process, a buyer performing file-type digital asset transaction cannot be sure whether the file-type digital assets are maliciously edited and tampered, the transaction expectation of the file-type digital assets is reduced under the condition that the authenticity of the file-type digital assets cannot be confirmed, and the popularization and the use of the file-type digital assets are influenced.
Disclosure of Invention
The invention aims to solve at least one technical problem in the prior art, provides a block chain-based digital asset processing method and system, and solves the technical problem that whether a file type digital asset is tampered or not cannot be confirmed in a transaction process.
In a first aspect, an embodiment of the present invention provides a method for processing digital assets based on a blockchain, where the method includes:
receiving a uplink request from a first user and an uploaded file-class digital asset, the file-class digital asset comprising at least one of the following file types: patents, certificates, works, documents, and resumes;
performing data dimension reduction processing on the received file-type digital assets to generate uplink data;
and calling a private key corresponding to the first user to encrypt the uplink data to generate signature data according to the uplink request, and uplink the signature data.
As a further improvement, the performing data dimension reduction processing on the received file-type digital asset to generate uplink data specifically includes:
performing file compression on the received file type digital assets to generate a compressed file, and using the compressed file as uplink data; or
And carrying out hash operation on the received file digital assets to generate a hash value, and using the hash value as uplink data.
As a further improvement, the step of calling a private key corresponding to the first user to encrypt the uplink data to generate signature data according to the uplink request specifically includes:
verifying a uplink password input by a first user and carried in the uplink request;
when the uplink password passes the verification, calling a private key corresponding to the first user to encrypt the uplink data to generate signature data; wherein the private key is pre-assigned to the first user.
As a further improvement, the method further comprises:
when a truth verification request from a second user is received, the matched file type digital assets, the storage address of the matched file type digital assets and the public key of the matched first user are obtained according to the truth verification request and are sent to the second user, so that the second user can take down the matched signature data from the block chain according to the received storage address, decrypt the signature data according to the received public key to obtain matched uplink data, and compare a hash value obtained by carrying out hash operation on the received file type digital assets with the matched uplink data to confirm whether the file type digital assets are tampered.
In a second aspect, an embodiment of the present invention provides a block chain-based digital asset processing system, where the system includes:
a receiving module, configured to receive a uplink request from a first user and an uploaded file-class digital asset, where the file-class digital asset includes at least one of the following file types: patents, certificates, works, documents, and resumes;
the data dimension reduction module is used for carrying out data dimension reduction processing on the received file-type digital assets to generate uplink data;
and the uplink module is used for calling a private key corresponding to the first user to encrypt the uplink data to generate signature data according to the uplink request, and uplink the signature data.
As a further improvement, the data dimension reduction module is further configured to:
performing file compression on the received file type digital assets to generate a compressed file, and using the compressed file as uplink data; or
And carrying out hash operation on the received file digital assets to generate a hash value, and using the hash value as uplink data.
As a further improvement, the uplink module is further configured to:
verifying a uplink password input by a first user and carried in the uplink request; when the uplink password passes the verification, calling a private key corresponding to the first user to encrypt the uplink data to generate signature data; wherein the private key is pre-assigned to the first user.
As a further improvement, the system further comprises:
the authenticity verification module is used for acquiring the matched file type digital assets, the storage addresses of the matched file type digital assets and the public keys of the matched first users according to the authenticity verification request and sending the acquired public keys to the second users when the authenticity verification request from the second user is received, so that the second users can take down the matched signature data from the block chain according to the received storage addresses, decrypt the signature data according to the received public keys to acquire the matched uplink data, and compare the hash value acquired by carrying out hash operation on the received file type digital assets with the matched uplink data to confirm whether the file type digital assets are tampered.
In a third aspect, embodiments of the present invention provide a computer-readable storage medium storing computer-executable instructions for causing a computer to perform the method for blockchain-based digital asset processing according to any one of the embodiments of the first aspect of the present invention.
In a fourth aspect, an embodiment of the present invention provides an electronic device, including: memory, a processor and a computer program stored on the memory and executable on the processor, the processor when executing the program implementing a method of blockchain based digital asset processing according to any of the embodiments of the first aspect of the present invention.
Has the advantages that: the block chain based digital asset processing method and system receive a uplink request from a first user and an uploaded file type digital asset, wherein the file type digital asset at least comprises one of the following file types: patents, certificates, works, documents, and resumes; performing data dimension reduction processing on the received file-type digital assets to generate uplink data; and calling a private key corresponding to the first user to encrypt the uplink data to generate signature data according to the uplink request, and uplink the signature data. The method and the system have the advantages that:
1. the files such as patents, certificates, works, documents, resumes and the like are stored on the block chain as the file-type digital assets, and the block chain has the characteristics of tamper resistance and traceability, so that once the files are uploaded to the block chain, the modification difficulty is extremely high, the cost of file-type digital asset counterfeiting is increased, and the safety performance of the file-type digital assets is improved.
2. Once the file-type digital assets are linked up, the modification difficulty is extremely high, and a buyer in the file-type digital asset transaction can confirm whether the file-type digital assets are tampered or not by comparing the file-type digital assets provided by the seller with the file-type digital assets stored on the blockchain, so that the buyer can conveniently verify the reliability of the file-type digital assets.
3. Due to the fact that the file-type digital assets are linked up after data dimension reduction processing, occupation of block chain storage resources is reduced, and time consumed by broadcast verification of uplink data among all nodes of the block chain is saved.
4. Because the block files on the block chain are public and transparent, the private key of the first user is utilized to encrypt the uplink data to generate signature data, and then the signature data is uploaded to the block chain, so that the privacy of the files uploaded to the block chain can be guaranteed.
Additional aspects and advantages of the invention will be set forth in part in the description which follows and, in part, will be obvious from the description, or may be learned by practice of the invention.
Drawings
The invention is further described below with reference to the accompanying drawings and examples;
FIG. 1 is a block chain-based digital asset processing method application environment diagram in one embodiment.
FIG. 2 is a flow diagram of a blockchain-based digital asset processing method in one embodiment.
FIG. 3 is a flow chart illustrating the process of encrypting the uplink data to generate signature data according to an embodiment.
Fig. 4 is a diagram of an application environment of a blockchain-based digital asset processing method in another embodiment.
Fig. 5 is a flow diagram of a blockchain-based digital asset processing method in another embodiment.
Fig. 6 is a block diagram of a blockchain-based digital asset processing system in another embodiment.
FIG. 7 is a block diagram of a computer device in one embodiment.
Detailed Description
Reference will now be made in detail to the present preferred embodiments of the present invention, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to like elements throughout.
FIG. 1 is a block chain-based digital asset processing method application environment diagram in one embodiment. Referring to fig. 1, the block chain-based digital asset processing method is applied to a block chain-based digital asset processing system. The blockchain-based digital asset processing system includes a terminal 110 and a server 120. The terminal 110 and the server 120 are connected through a network. The terminal 110 may specifically be a desktop terminal 110 or a mobile terminal 110, and the mobile terminal 110 may specifically be at least one of a mobile phone, a tablet computer, a notebook computer, and the like. The server 120 may be implemented as a stand-alone server 120 or as a server cluster of multiple servers 120.
Hereinafter, the block chain based digital asset processing method provided by the embodiment of the present invention will be described and explained in detail through several specific embodiments.
In one embodiment, as shown in FIG. 2, a blockchain based digital asset processing method is provided. The embodiment is mainly illustrated by applying the method to computer equipment. The computer device may specifically be the server 120 in fig. 1 described above.
Referring to fig. 2, the block chain-based digital asset processing method specifically includes the following steps:
s102: the server 120 receives a uplink request from the first user and uploaded file-like digital assets, the file-like digital assets including at least one of the following file types: patents, certificates, works, documents, and resumes.
Specifically, a first user operates on a first client 1101 to send a cochain request and a file-like digital asset to the server 120 via the first client 1101. The uplink request carries a uplink password that is input by the first user on the first client 1101 and matches the private key allocated to the first user by the server 120.
S104: the server 120 performs data dimension reduction on the received file-like digital assets to generate uplink data.
It can be understood that, since the file-type digital assets are linked up after the data dimension reduction processing, the occupation of the storage resources of the block chain is reduced, and the time consumed by the broadcast verification of the uplink data among the nodes of the block chain is saved.
Specifically, the data dimension reduction processing can adopt the following two preferred embodiments:
in one embodiment, the received file-class digital assets are subjected to file compression to generate a compressed file, and the compressed file is used as uplink data. The compressed file is compressed by the compression software, and the compression principle is to compress the binary code of the file, reduce the adjacent 0,1 code, such as 000000, and change it into 60 writes 60 to reduce the space of the file. The basic principle of compressing a file is to search repeated bytes in the file, establish a dictionary file with the same bytes, and express the dictionary file by using a code, for example, several places in the file have the same word, the people's republic of China, and express the word by using a code and write the word into the dictionary file, so that the aim of reducing the file can be achieved. Common compression software is winzip, winrar, etc.
In another embodiment, the received file-class digital asset is hashed to generate a hash value, and the hash value is used as uplink data. The Hash operation is to use a Hash algorithm (Hash algorithm) to convert an input of an arbitrary length into an output of a fixed length through the Hash algorithm, and the output is a Hash value. This transformation is a kind of compression mapping, i.e. the space of hash values is usually much smaller than the space of inputs, different inputs may hash to the same output, so it is not possible to determine a unique input value from a hash value. In short, it is a function of compressing a message of an arbitrary length to a message digest of a certain fixed length.
S106: the server 120 invokes a private key corresponding to the first user to encrypt the uplink data to generate signature data according to the uplink request, and uplink the signature data.
It can be understood that, since the blockchain file is publicly transparent, privacy of the file uploaded to the blockchain can be ensured by encrypting the uplink data to generate signature data and uploading the signature data to the blockchain by using the private key of the first user.
In this embodiment, once the file-type digital asset is linked, the modification difficulty is extremely high, and a buyer in a file-type digital asset transaction can confirm whether the file-type digital asset is tampered by comparing the file-type digital asset provided by the seller with the file-type digital asset stored on the blockchain, so that the buyer can conveniently verify the reliability of the file-type digital asset.
Referring to fig. 3, in an embodiment, invoking a private key corresponding to the first user to encrypt uplink data to generate signature data according to the uplink request includes the following steps:
s1031: and verifying the uplink password input by the first user and carried in the uplink request.
S1032: when the uplink password passes the verification, calling a private key corresponding to the first user to encrypt the uplink data to generate signature data; wherein the private key is pre-assigned to the first user.
Specifically, when a first user registers an account on the digital asset processing system based on the block chain through the first client 1101, the server 120 assigns a secret key to the first user, where the secret key includes a private key and a public key used for pairing, and requests the first user to set a uplink password, associates the uplink password set by the first user with the private key, and when the first user requests to uplink a file-type digital asset, requests that the first user must provide the associated uplink password to ensure authenticity and security of the identity of the first user.
Referring to fig. 4, a diagram of an application environment of a block chain based digital asset processing method in another embodiment is shown. The terminal 110 includes a first client 1101 and a second client 1102, and the first client 1101 and the second client 1102 are respectively connected to the server 120 through a network.
In an application scenario of the present invention, the blockchain-based digital asset processing system is a software platform running on the server 120, and is configured to store and manage the file-type digital asset, and upload the file-type digital asset to the blockchain according to a user instruction; the first user is a seller of the file-class digital assets, and is responsible for generating the file-class digital assets and uploading the file-class digital assets to the block chain-based digital asset processing system by operating the first client 1101; the second user is a buyer of the file-like digital asset and the second user communicates with the server 120 by operating the second client 1102 indicating that it has a need to trade the file-like digital asset with the first user.
Referring to fig. 4 and 5, in an embodiment, the method for processing digital assets based on a blockchain specifically includes the following steps:
s202: the server 120 receives a uplink request from the first user and uploaded file-like digital assets, the file-like digital assets including at least one of the following file types: patents, certificates, works, documents, and resumes.
Specifically, a first user operates on a first client 1101 to send a cochain request and a file-like digital asset to the server 120 via the first client 1101. The uplink request carries a uplink password that is input by the first user on the first client 1101 and matches the private key allocated to the first user by the server 120.
S204: the server 120 performs data dimension reduction on the received file-like digital assets to generate uplink data.
It can be understood that, since the file-type digital assets are linked up after the data dimension reduction processing, the occupation of the storage resources of the block chain is reduced, and the time consumed by the broadcast verification of the uplink data among the nodes of the block chain is saved.
Specifically, the data dimension reduction processing can adopt the following two preferred embodiments:
in one embodiment, the received file-class digital assets are subjected to file compression to generate a compressed file, and the compressed file is used as uplink data. The compression principle is to compress the binary code of the file, reduce the adjacent 0,1 code, such as 000000, and change it into 60 writes 60 to reduce the space of the file. The basic principle of compressing a file is to search repeated bytes in the file, establish a dictionary file with the same bytes, and express the dictionary file by using a code, for example, several places in the file have the same word, the people's republic of China, and express the word by using a code and write the word into the dictionary file, so that the aim of reducing the file can be achieved. Common compression software is winzip, winrar, etc.
In another embodiment, the received file-class digital asset is hashed to generate a hash value, and the hash value is used as uplink data. The Hash operation is to use a Hash algorithm (Hash algorithm) to convert an input of an arbitrary length into an output of a fixed length through the Hash algorithm, and the output is a Hash value. This transformation is a kind of compression mapping, i.e. the space of hash values is usually much smaller than the space of inputs, different inputs may hash to the same output, so it is not possible to determine a unique input value from a hash value. In short, it is a function of compressing a message of an arbitrary length to a message digest of a certain fixed length.
S206: the server 120 invokes a private key corresponding to the first user to encrypt the uplink data to generate signature data according to the uplink request, and uplink the signature data.
It can be understood that, since the blockchain file is publicly transparent, privacy of the file uploaded to the blockchain can be ensured by encrypting the uplink data to generate signature data and uploading the signature data to the blockchain by using the private key of the first user.
S208: when a authenticity verification request from a second user is received, the matched file type digital asset, the storage address of the matched file type digital asset and the public key of the matched first user are obtained according to the authenticity verification request and are sent to the second user, so that the second user can take down the matched signature data from the block chain according to the received storage address, decrypt the signature data according to the received public key to obtain matched uplink data, and compare the hash value obtained by carrying out hash operation on the received file type digital asset with the matched uplink data to confirm whether the file type digital asset is tampered.
It is understood that when the second user needs to transact a certain document-type digital asset with the first user, for example, the document-type digital asset is a resume of a job seeker, the second user is a recruiter, the first user is a job seeker, and the resume of the first user is kept by the server 120. The second user operates the second client 1102 to send a authenticity verification request to the server 120, the authenticity verification request includes identity information of a job seeker, the server 120 obtains a file type digital asset matched with the job seeker, a storage address of the file type digital asset on the blockchain and a public key associated with the job seeker from a database of the server 120 according to the identity information of the job seeker in the authenticity verification request, and sends the file type digital asset matched with the job seeker, the storage address of the file type digital asset on the blockchain and the public key associated with the job seeker to the second user. And the recruitment company serving as the second user takes down the matched signature data from the blockchain according to the received storage address, decrypts the signature data according to the received public key to obtain matched uplink data, and compares a hash value obtained by carrying out hash operation on the received file-type digital asset with the matched uplink data to confirm whether the file-type digital asset is tampered.
It can be understood that, in this embodiment, although the file-type digital asset is maintained in the database of the server 120, and the file-type digital asset taken by the recruiting company is also a version stored in the database of the server 120, since the uplink data of the original version of the file-type digital asset (i.e., the resume) is stored on the blockchain in an encrypted manner, the recruiting company can confirm whether the resume is maliciously tampered by comparing the uplink data with the hash value of the file-type digital asset received from the server 120, thereby improving the credibility of the file-type digital asset.
As shown in fig. 6, in one embodiment, a blockchain based digital asset processing system is provided that runs on a server 120. Referring to fig. 6, the block chain-based digital asset processing system includes: a receiving module 301, a data dimension reduction module 302, and an uplink module 303.
A receiving module 301, configured to receive a uplink request from a first user and an uploaded file-like digital asset, where the file-like digital asset includes at least one of the following file types: patents, certificates, works, documents, and resumes;
a data dimension reduction module 302, configured to perform data dimension reduction processing on the received file-type digital asset to generate uplink data;
the uplink module 303 is configured to invoke a private key corresponding to the first user to encrypt the uplink data to generate signature data according to the uplink request, and uplink the signature data.
In some embodiments, data dimension reduction module 302 is further to:
performing file compression on the received file type digital assets to generate a compressed file, and using the compressed file as uplink data; or
And carrying out hash operation on the received file type digital assets to generate a hash value, and using the hash value as uplink data.
In some embodiments, the uplink module 303 is further configured to:
verifying a uplink password input by a first user and carried in the uplink request; when the uplink password passes the verification, calling a private key corresponding to the first user to encrypt the uplink data to generate signature data; wherein the private key is pre-assigned to the first user.
In some embodiments, the system further comprises:
the authenticity verification module 304 is configured to, when receiving an authenticity verification request from a second user, obtain the matched file-type digital asset, the storage address of the matched file-type digital asset, and the public key of the matched first user according to the authenticity verification request, and send the obtained result to the second user, so that the second user can take down the matched signature data from the blockchain according to the received storage address, decrypt the signature data according to the received public key to obtain matched uplink data, and compare a hash value obtained by performing hash operation on the received file-type digital asset with the matched uplink data to determine whether the file-type digital asset is tampered.
It should be noted that, since the embodiment of the digital asset processing system based on the blockchain and the embodiment of the method are based on the same inventive concept, the system embodiment is not described herein again.
FIG. 7 is a diagram illustrating an internal structure of a computer device in one embodiment. The computer device may specifically be the terminal 110 (or the server 120) in fig. 1, or the first client 1101, the second client 1102 or the server 120 in fig. 4. As shown in fig. 7, the computer apparatus includes a processor, a memory, a network interface, an input device, and a display screen connected through a system bus. Wherein the memory includes a non-volatile storage medium and an internal memory. The non-volatile storage medium of the computer device stores an operating system and may also store a computer program that, when executed by the processor, causes the processor to implement a blockchain-based digital asset processing method. The internal memory may also have stored therein a computer program that, when executed by the processor, causes the processor to perform a blockchain-based digital asset processing method. Those skilled in the art will appreciate that the architecture shown in fig. 7 is merely a block diagram of some of the structures associated with the inventive arrangements and is not intended to limit the computing devices to which the inventive arrangements may be applied, as a particular computing device may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, the blockchain-based digital asset processing system provided herein may be implemented in the form of a computer program that is executable on a computer device such as that shown in fig. 7. The memory of the computer device may store various program modules constituting the block chain-based digital asset processing system, such as a receiving module 301, a data dimension reduction module 302, an uplink module 303, and an authentication module 304 shown in fig. 6. The computer program of each program module causes the processor to execute the steps of the block chain based digital asset processing method of each embodiment of the present application described in the present specification.
For example, the computer apparatus shown in fig. 7 may perform the steps of receiving a uplink request from a first user and uploading a file-like digital asset via a receiving module 301 in a blockchain-based digital asset processing system as shown in fig. 6, the file-like digital asset including at least one of the following file types: patents, certificates, works, documents, and resumes; the data dimension reduction module 302 executes a step of performing data dimension reduction processing on the received file-type digital assets to generate uplink data; the uplink module 303 executes a step of calling a private key corresponding to the first user to encrypt uplink data to generate signature data according to the uplink request, and uplink the signature data; the authenticity verification module 304 performs the step of acquiring the matched file-class digital asset, the saving address of the matched file-class digital asset and the public key of the matched first user according to the authenticity verification request and sending the acquired file-class digital asset, the saving address of the matched file-class digital asset and the public key of the matched first user to the second user when receiving the authenticity verification request from the second user.
In one embodiment, there is provided an electronic device including: a memory, a processor and a computer program stored on the memory and executable on the processor, the processor when executing the program performing the steps of the above blockchain based digital asset processing method. The steps of the blockchain-based digital asset processing method herein may be steps in the blockchain-based digital asset processing methods of the various embodiments described above.
In one embodiment, a computer-readable storage medium is provided, having stored thereon computer-executable instructions for causing a computer to perform the steps of the above-described blockchain-based digital asset processing method. The steps of the blockchain-based digital asset processing method herein may be steps in the blockchain-based digital asset processing methods of the various embodiments described above.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware related to instructions of a computer program, and the program can be stored in a non-volatile computer readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRA), Rambus Direct RAM (RDRA), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
Claims (10)
1. A blockchain-based digital asset processing method, the method comprising:
receiving a uplink request from a first user and an uploaded file-class digital asset, the file-class digital asset comprising at least one of the following file types: patents, certificates, works, documents, and resumes;
performing data dimension reduction processing on the received file-type digital assets to generate uplink data;
and calling a private key corresponding to the first user to encrypt the uplink data to generate signature data according to the uplink request, and uplink the signature data.
2. The method according to claim 1, wherein the performing data dimension reduction on the received file-type digital asset to generate uplink data comprises:
performing file compression on the received file type digital assets to generate a compressed file, and using the compressed file as uplink data; or
And carrying out hash operation on the received file digital assets to generate a hash value, and using the hash value as uplink data.
3. The method of claim 1, wherein the invoking a private key corresponding to the first user to encrypt the uplink data to generate signature data according to the uplink request comprises:
verifying a uplink password input by a first user and carried in the uplink request;
when the uplink password passes the verification, calling a private key corresponding to the first user to encrypt the uplink data to generate signature data; wherein the private key is pre-assigned to the first user.
4. The blockchain-based digital asset processing method according to claim 1, wherein the method further comprises:
when a truth verification request from a second user is received, the matched file type digital assets, the storage address of the matched file type digital assets and the public key of the matched first user are obtained according to the truth verification request and are sent to the second user, so that the second user can take down the matched signature data from the block chain according to the received storage address, decrypt the signature data according to the received public key to obtain matched uplink data, and compare a hash value obtained by carrying out hash operation on the received file type digital assets with the matched uplink data to confirm whether the file type digital assets are tampered.
5. A blockchain-based digital asset processing system, the system comprising:
a receiving module, configured to receive a uplink request from a first user and an uploaded file-class digital asset, where the file-class digital asset includes at least one of the following file types: patents, certificates, works, documents, and resumes;
the data dimension reduction module is used for carrying out data dimension reduction processing on the received file-type digital assets to generate uplink data;
and the uplink module is used for calling a private key corresponding to the first user to encrypt the uplink data to generate signature data according to the uplink request, and uplink the signature data.
6. The blockchain-based digital asset processing system of claim 5, wherein the data dimension reduction module is further configured to:
performing file compression on the received file type digital assets to generate a compressed file, and using the compressed file as uplink data; or
And carrying out hash operation on the received file digital assets to generate a hash value, and using the hash value as uplink data.
7. The blockchain-based digital asset processing system of claim 5, wherein the uplink module is further configured to:
verifying a uplink password input by a first user and carried in the uplink request; when the uplink password passes the verification, calling a private key corresponding to the first user to encrypt the uplink data to generate signature data; wherein the private key is pre-assigned to the first user.
8. The blockchain-based digital asset processing system of claim 5, wherein the system further comprises:
the authenticity verification module is used for acquiring the matched file type digital assets, the storage addresses of the matched file type digital assets and the public keys of the matched first users according to the authenticity verification request and sending the acquired public keys to the second users when the authenticity verification request from the second user is received, so that the second users can take down the matched signature data from the block chain according to the received storage addresses, decrypt the signature data according to the received public keys to acquire the matched uplink data, and compare the hash value acquired by carrying out hash operation on the received file type digital assets with the matched uplink data to confirm whether the file type digital assets are tampered.
9. A computer-readable storage medium storing computer-executable instructions for causing a computer to perform the blockchain-based digital asset processing method according to any one of claims 1 to 4.
10. An electronic device, comprising: memory, processor and computer program stored on the memory and executable on the processor, characterized in that the processor implements the blockchain-based digital asset processing method according to any one of claims 1 to 4 when executing the program.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010816998.8A CN112100142A (en) | 2020-08-13 | 2020-08-13 | Block chain-based digital asset processing method and system |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010816998.8A CN112100142A (en) | 2020-08-13 | 2020-08-13 | Block chain-based digital asset processing method and system |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112100142A true CN112100142A (en) | 2020-12-18 |
Family
ID=73753694
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010816998.8A Pending CN112100142A (en) | 2020-08-13 | 2020-08-13 | Block chain-based digital asset processing method and system |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112100142A (en) |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112966237A (en) * | 2021-03-09 | 2021-06-15 | 安徽超清科技股份有限公司 | Block chain-based digital asset processing method |
CN113076527A (en) * | 2021-04-19 | 2021-07-06 | 支付宝(杭州)信息技术有限公司 | Block chain-based digital asset processing method and device |
CN116137570A (en) * | 2023-04-13 | 2023-05-19 | 北京百度网讯科技有限公司 | Digital collection processing method, device, equipment and storage medium based on blockchain |
CN116760528A (en) * | 2023-08-21 | 2023-09-15 | 成都乐超人科技有限公司 | Multiparty asset delivery method and device based on multi-key homomorphic sharing |
CN116980179A (en) * | 2023-06-19 | 2023-10-31 | 广州粤建三和软件股份有限公司 | Data asset data security application method and device and data asset management system |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160330027A1 (en) * | 2015-05-05 | 2016-11-10 | ShoCard, Inc. | Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices |
WO2018032377A1 (en) * | 2016-08-13 | 2018-02-22 | 深圳市樊溪电子有限公司 | Read-only security file storage system for block chain, and method thereof |
KR20180030971A (en) * | 2018-03-07 | 2018-03-27 | 유비벨록스(주) | Photographing apparatus for generating digital image which can be verified by block-chain, digital image generating method using the same, and method for verifying image generated by the same |
CN107888375A (en) * | 2017-11-08 | 2018-04-06 | 深圳市携网科技有限公司 | A kind of electronic evidence safety system and method based on block chain technology |
KR101841568B1 (en) * | 2017-04-27 | 2018-05-04 | 주식회사 코인플러그 | Method for issuing, using, refunding, settling and revocating electric voucher using updated status of balance database by respective blocks in blockchain, and server using the same |
CN109741056A (en) * | 2018-12-26 | 2019-05-10 | 中国银联股份有限公司 | A kind of method and device that electronic certificate uploads |
-
2020
- 2020-08-13 CN CN202010816998.8A patent/CN112100142A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20160330027A1 (en) * | 2015-05-05 | 2016-11-10 | ShoCard, Inc. | Identity Management Service Using A Blockchain Providing Certifying Transactions Between Devices |
WO2018032377A1 (en) * | 2016-08-13 | 2018-02-22 | 深圳市樊溪电子有限公司 | Read-only security file storage system for block chain, and method thereof |
KR101841568B1 (en) * | 2017-04-27 | 2018-05-04 | 주식회사 코인플러그 | Method for issuing, using, refunding, settling and revocating electric voucher using updated status of balance database by respective blocks in blockchain, and server using the same |
CN107888375A (en) * | 2017-11-08 | 2018-04-06 | 深圳市携网科技有限公司 | A kind of electronic evidence safety system and method based on block chain technology |
KR20180030971A (en) * | 2018-03-07 | 2018-03-27 | 유비벨록스(주) | Photographing apparatus for generating digital image which can be verified by block-chain, digital image generating method using the same, and method for verifying image generated by the same |
CN109741056A (en) * | 2018-12-26 | 2019-05-10 | 中国银联股份有限公司 | A kind of method and device that electronic certificate uploads |
Cited By (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112966237A (en) * | 2021-03-09 | 2021-06-15 | 安徽超清科技股份有限公司 | Block chain-based digital asset processing method |
CN113076527A (en) * | 2021-04-19 | 2021-07-06 | 支付宝(杭州)信息技术有限公司 | Block chain-based digital asset processing method and device |
CN116137570A (en) * | 2023-04-13 | 2023-05-19 | 北京百度网讯科技有限公司 | Digital collection processing method, device, equipment and storage medium based on blockchain |
CN116980179A (en) * | 2023-06-19 | 2023-10-31 | 广州粤建三和软件股份有限公司 | Data asset data security application method and device and data asset management system |
CN116980179B (en) * | 2023-06-19 | 2024-07-09 | 广州粤建三和软件股份有限公司 | Secure application method and device for data asset data, data asset management system and computer readable storage medium |
CN116760528A (en) * | 2023-08-21 | 2023-09-15 | 成都乐超人科技有限公司 | Multiparty asset delivery method and device based on multi-key homomorphic sharing |
CN116760528B (en) * | 2023-08-21 | 2023-10-27 | 成都乐超人科技有限公司 | Multiparty asset delivery method and device based on multi-key homomorphic sharing |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN112100142A (en) | Block chain-based digital asset processing method and system | |
CN108540459B (en) | Data storage method, device, system, electronic equipment and computer readable medium | |
WO2021003980A1 (en) | Blacklist sharing method and apparatus, computer device and storage medium | |
CN112822255B (en) | Block chain-based mail processing method, mail sending end, receiving end and equipment | |
CN110750810A (en) | Data desensitization method and device, computer equipment and storage medium | |
CN109741016B (en) | Electronic contract signing method, electronic contract signing device, computer equipment and storage medium | |
CN110942382A (en) | Electronic contract generating method and device, computer equipment and storage medium | |
CN111541545A (en) | Storage certificate package generation method and device, computer equipment and storage medium | |
CN110223075B (en) | Identity authentication method and device, computer equipment and storage medium | |
WO2020140626A1 (en) | Salt-based data possession verification method and terminal device | |
CN111294203A (en) | Information transmission method | |
CN114238874A (en) | Digital signature verification method and device, computer equipment and storage medium | |
CN109347865B (en) | User data authentication and evidence storage method and system based on block chain technology | |
CN114615031A (en) | File storage method and device, electronic equipment and storage medium | |
CN110598475B (en) | Work attribute information acquisition method and device based on block chain and computer equipment | |
CN115659378A (en) | Case record information evidence storing method and related equipment | |
CN116610754A (en) | Digital certificate storage method, device, system and medium | |
CN110597820A (en) | Block chain based information processing method and device, storage medium and equipment | |
CN115085934A (en) | Contract management method based on block chain and combined key and related equipment | |
CN111143399B (en) | Data processing method, device, storage medium and computer equipment | |
CN109871698B (en) | Data processing method, data processing device, computer equipment and storage medium | |
CN108390758B (en) | User password processing method and device and internal control security monitoring system | |
CN117574425A (en) | Data desensitization method, system, storage medium and device for database | |
CN111639354A (en) | Data encryption method and device, data decryption method and device, and electronic equipment | |
CN111652720A (en) | Cloud evidence obtaining method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20201218 |