Summary of the invention
The processing method for being designed to provide a kind of digital asset, device and the electronic equipment of the application, to solve numberWord assets claim the lower technical problem of accuracy of result.
A kind of processing method of digital asset provided by the invention, comprising:
First digital asset ownership person's information with digital signature that first terminal is sent is received, and to the digital signatureIt is verified;
If the digital signature authentication passes through, confirm that the first digital asset ownership person's information is real name information;
The identity of second terminal is authenticated according to the real name information, obtains identity authentication result, described second eventuallyThe terminal of application is claimed for the first digital asset of transmission in end;
If the identity authentication result is to pass through, the first digital asset is sent to the second terminal.
Further, the encryption code key of the digital signature is the private key of the first terminal;
It is described that the digital signature is verified, comprising:
The digital signature is verified by public key encryption algorithm using the public key of the first terminal.
Further, further includes:
If the identity authentication result is not pass through, the prompt information of identity mistake is sent to the second terminal.
It is further, described that first digital asset is sent to after the second terminal, further includes:
The state of having claimed is set by the state of first digital asset.
Further, confirmation the first digital asset ownership person's information is after real name information, further includes:
The real name information is stored in block chain network.
Further, further includes:
Multiple digital assets are identified, are not claimed the second digital asset of state;
The recommended information of second digital asset is sent to and the matched third terminal of the second digital asset.
Further, described that multiple digital assets are identified, after the second digital asset for not claimed state,Further include:
It is set as the state of second digital asset to claim publicity state.
A kind of processing unit of digital asset provided by the invention, comprising:
Authentication module, for receiving first digital asset ownership person's information with digital signature of first terminal transmission, andThe digital signature is verified;
Confirmation module, for confirming the first digital asset ownership person's information when the digital signature authentication passes throughFor real name information;
Authentication module obtains authentication knot for authenticating according to the real name information to the identity of second terminalFruit, the second terminal are the terminal for sending the first digital asset and claiming application;
Sending module, for the identity authentication result be by when, the first digital asset is sent to described secondTerminal.
A kind of electronic equipment provided by the invention, including memory, processor, being stored in the memory can be describedThe step of computer program run on processor, the processor realizes above-mentioned method when executing the computer program.
A kind of computer-readable medium of non-volatile program code that can be performed with processor provided by the invention, instituteStating program code makes the processor execute above-mentioned method.
In the present solution, since the first digital asset ownership person's information received is attached to digital signature, by being signed to numberName is verified, and just the authenticity of the digital signature can be verified using public key encryption algorithm, to judge to receiveTo the first digital asset ownership person information with the digital signature whether be true ownership person's information, therefore, if shouldDigital signature is verified, and can confirm that the first digital asset ownership person's information is true and reliable real name information, withConvenient for when the first digital asset is claimed in second terminal application, can be carried out using identity of the real name information to second terminal canFirst digital asset is just sent to second terminal if identity authentication result is to pass through by the authentication leaned on, to guarantee according to bodyPart authentication result correctly handles the first digital asset, and preventing non-first digital asset, really ownership person has claimed theOne digital asset, has ensured the safety of digital asset during claiming, to promote the accuracy that digital asset claims result.
Specific embodiment
Technical solution of the present invention is clearly and completely described below in conjunction with embodiment, it is clear that described realityApplying example is a part of the embodiment of the present invention, instead of all the embodiments.Based on the embodiments of the present invention, the common skill in this fieldArt personnel every other embodiment obtained without making creative work belongs to the model that the present invention protectsIt encloses.
The feature and exemplary embodiment of various aspects of the invention is described more fully below.In following detailed descriptionIn, many details are proposed, in order to provide complete understanding of the present invention.But to those skilled in the artIt will be apparent that the present invention can be implemented in the case where not needing some details in these details.Below to implementationThe description of example is used for the purpose of providing by showing example of the invention and better understanding of the invention.The present invention never limitsIn any concrete configuration set forth below and algorithm, but cover under the premise of without departing from the spirit of the present invention element,Any modification, replacement and the improvement of component and algorithm.In the the accompanying drawings and the following description, well known structure and skill is not shownArt is unnecessary fuzzy to avoid causing the present invention.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phaseMutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
In addition, the term " includes " being previously mentioned in description of the invention and " having " and their any deformation, it is intended thatIt is to cover and non-exclusive includes.Such as the process, method, system, product or equipment for containing a series of steps or units do not haveIt is defined in listed step or unit, but optionally further comprising the step of other are not listed or unit, or optionallyIt further include the other step or units intrinsic for these process, methods, product or equipment.
Currently, ownership person's identity of digital asset is difficult to confirm, this just causes when user claims a certain digital asset, difficultWith verify claim the digital asset user whether be the digital asset real ownership person, so that digital asset be made to claim resultAccuracy it is lower, be based on this, a kind of processing method of digital asset, device and electronics provided by the embodiments of the present application are setIt is standby, it can solve the lower technical problem of accuracy that digital asset existing in the prior art claims result.
For the processing convenient for understanding the present embodiment, first to a kind of digital asset disclosed in the embodiment of the present applicationMethod, apparatus and electronic equipment describe in detail.
A kind of processing method of digital asset provided by the embodiments of the present application, as shown in Figure 1, comprising:
S11: first digital asset ownership person's information with digital signature that first terminal is sent is received, and to digital signatureIt is verified.
Wherein, digital signature is also known as public key digital signature, is a kind of similar common physical signature write on paper, stillThe technology in public key encryption field has been used to realize, the method for identifying digital information.A set of digital signature usually defines two kindsComplementary operation, one is used to sign, another is for verifying.In other words, digital signature is exactly the sender of only informationOthers the number of segment word string that can not forge that could be generated, this number of segment word string are also that send information to the sender of information true simultaneouslyOne valid certificates of reality.Digital signature is the application of non-symetric key cryptography Yu digital digest technology.
S12: judging whether digital signature authentication passes through, if so, carrying out step S13.
In this step, judge whether the first digital asset ownership person information is the true of information by verifying the digital signatureReal sender, to verify the case where others forges first digital asset ownership person's information, therefore, digital signature is to informationOne valid certificates of sender's transmission information authenticity.
S13: first digital asset ownership person's information of confirmation is real name information.
If digital signature authentication passes through, it can confirm that the first digital asset ownership person's information is true and reliable realityName information.
S14: it is authenticated according to identity of the real name information to second terminal, obtains identity authentication result.
Wherein, second terminal is the terminal for sending the first digital asset and claiming application.First is claimed in second terminal applicationWhen digital asset, reliable authentication can be carried out using identity of the real name information in step S13 to second terminal.
S15: judge whether identity authentication result is to pass through, if so, carrying out step S16.
S16: the first digital asset is sent to second terminal.
If identity authentication result is to pass through, the first digital asset is just sent to second terminal, to guarantee according to identityAuthentication result correctly handles the first digital asset, and preventing non-first digital asset, really ownership person has claimed firstDigital asset, has ensured the safety of digital asset during claiming, to promote the accuracy that digital asset claims result.
Therefore, in the present embodiment, in order to solve user identity authentication, using number authentication, system user makesUsed time needs to carry out real-name authentication, the real name information after user authentication, after handling by system, by information preservation to block chainIn network, when user authentication, is verified, and only verifies the authenticity that successfully just can prove that user identity.
It should be noted that needing to solve there are two problem, one is recognizing for user identity in the claiming of digital assetCard, one is to claim management to digital asset.As shown in Fig. 2, the certification of identity and right can be carried out after logging in system by userThe management of digital asset, such as search for and claim assets etc..
In order to which more accurately verifying digital signature, the encryption code key of digital signature are the private key of first terminal;This implementationIn example, above-mentioned the step of verifying to digital signature (in step S11) be may comprise steps of:
Digital signature is verified by public key encryption algorithm using the public key of first terminal.
As shown in figure 3, the signature private key that user identity proves, only user oneself save, other people have no way of finding out about it,This is also the reason of can carrying out digital identification authentication.
By using private key signature technology, it was demonstrated that the true identity of digital asset claimant prevents the forgery of user identity,It ensures that digital asset is not claimed the loss for leading to assets arbitrarily by other people, while also achieving and the assets claimed are carried out effectivelyTracking.
It, can be the following steps are included: if authentication knot in the present embodiment for the ease of the user of timely notification errorFruit is not pass through, then the prompt information of identity mistake is sent to second terminal.
Therefore, the user of second terminal can know in time itself be not the digital asset ownership person's information, can not recognizeThe digital asset is received, claims application process to avoid second terminal progress is unnecessary.
For the ease of the management of the digital asset to different conditions, the state of digital asset may include: to have claimed;This realityIt applies in example, can also include following step after above-mentioned the step of first digital asset is sent to second terminal (i.e. step S16)It is rapid: to set the state of having claimed for the state of the first digital asset.
As shown in figure 4, after the approval, the state of system records user claimed application and change the digital asset.Such asAfter fruit objection does not occur at the appointed time, which will return user to own, and by assets registration and preservation into block chain network,In order to effective management of the digital asset to various different conditions.
Real name information is tampered in order to prevent, is confirming the step of first digital asset ownership person's information is real name informationIt, can be the following steps are included: real name information be stored in block chain network after (i.e. step S13).
As shown in figure 3, the real name information of signature is uploaded to system by user carries out authentication, after system is verified,Identity information is saved in block chain network, so that information be prevented to be tampered.
In order to effectively be managed digital asset, the state of digital asset may include: not claim;The present embodimentIn, can with the following steps are included:
(1) multiple digital assets are identified, is not claimed the second digital asset of state.
(2) recommended information of the second digital asset is sent to and the matched third terminal of the second digital asset.
Illustratively, digital asset management platform can be searched for from internet imports such as article digital asset, or logicalIt crosses and subscribes to the agreement with cooperative institution, the digital asset in cooperative institution is imported into digital asset management platform.Digital asset pipePlatform can identify the digital asset that do not claim relevant to user's possibility, and matched digital asset is notified user, in order toUser can learn the digital asset that can be claimed in time, improve the Discussing Convenience that digital asset claims process.
In order to carry out significantly more efficient management to digital asset, the state of digital asset may include: to claim publicity.To moreAfter the step of a digital asset is identified, is not claimed the second digital asset of state, can with the following steps are included:The state of the second digital asset is set to claim publicity state.
As shown in figure 4, also may search for the digital asset for claiming publicity state, i.e., in platform after user logs on to systemThe digital asset that do not claim.When user has found the digital asset for having oneself, Yong Huke in the digital asset for claiming publicity stateTo submit the application of claiming of digital asset to system, the digital asset that system audit user submits proves information and identity information.Consequently facilitating user quickly and easily finds the digital asset to be obtained.
For the prior art, in the period of current digital Age is fast-developing, generated in every field and sceneDigitalized data is more and more, and is getting faster, these digitized data can be referred to as digital asset, wherein for example literaryChapter, digitized house property, vehicle, check, dividend income etc. eventually belong to some entity, and entity can provide credentials tableBright digital asset returns it all.But currently when claiming these digital assets, none generally acknowledges that reliable system can mentionFor the proof of identification of entity, claiming for digital asset is caused to encounter practical difficulty.
By carrying out ciphering signature verifying using block chain network, solve digital asset claims overall process.Nowadays areaBlock chain network is exactly the trustable network that all nodes hold partial data, the ciphering signature mechanism based on public and private key, fromAnd solve the trust problem of the whole network, the whole network believed characteristic based on block chain, can be solved digital asset claim in encounterProblem.
In the present embodiment, the complete solution party of block chain Technology design is based on for the overall process of claiming of digital assetCase.Block chain is the distributed network that ciphering signature verifying is carried out based on public private key pair data, and claiming for digital asset is to not havingThere is the digital asset of owner to carry out the process of Signature Confirmation, it is thereby achieved that the digital asset based on block chain technology was claimedJourney.
A kind of processing unit of digital asset provided by the embodiments of the present application, comprising:
Authentication module, for receiving first digital asset ownership person's information with digital signature of first terminal transmission, andDigital signature is verified;
Confirmation module, for when digital signature authentication passes through, confirming first digital asset ownership person's information for real name letterBreath;
Authentication module obtains identity authentication result for authenticating according to identity of the real name information to second terminal, andTwo terminals are the terminal for sending the first digital asset and claiming application;
Sending module, for identity authentication result be by when, the first digital asset is sent to second terminal.
The processing unit of digital asset provided by the embodiments of the present application, the processing with digital asset provided by the above embodimentMethod technical characteristic having the same reaches identical technical effect so also can solve identical technical problem.
A kind of electronic equipment provided by the embodiments of the present application, as shown in figure 5, electronic equipment 4 includes memory 41, processor42, the computer program that can be run on the processor is stored in the memory, the processor executes the calculatingThe step of realizing method provided by the above embodiment when machine program.
Referring to Fig. 5, electronic equipment further include: bus 43 and communication interface 44, processor 42, communication interface 44 and memory41 are connected by bus 43;Processor 42 is for executing the executable module stored in memory 41, such as computer program.
Wherein, memory 41 may include high-speed random access memory (RAM, Random Access Memory),It may further include nonvolatile memory (non-volatile memory), for example, at least a magnetic disk storage.By at leastOne communication interface 44 (can be wired or wireless) realizes the communication between the system network element and at least one other network elementConnection, can be used internet, wide area network, local network, Metropolitan Area Network (MAN) etc..
Bus 43 can be isa bus, pci bus or eisa bus etc..The bus can be divided into address bus, dataBus, control bus etc..Only to be indicated with a four-headed arrow convenient for indicating, in Fig. 5, it is not intended that an only bus orA type of bus.
Wherein, memory 41 is for storing program, and the processor 42 executes the journey after receiving and executing instructionSequence, method performed by the device that the process that aforementioned the application any embodiment discloses defines can be applied in processor 42,Or it is realized by processor 42.
Processor 42 may be a kind of IC chip, the processing capacity with signal.During realization, above-mentioned sideEach step of method can be completed by the integrated logic circuit of the hardware in processor 42 or the instruction of software form.Above-mentionedProcessor 42 can be general processor, including central processing unit (Central Processing Unit, abbreviation CPU), networkProcessor (Network Processor, abbreviation NP) etc.;It can also be digital signal processor (Digital SignalProcessing, abbreviation DSP), specific integrated circuit (Application Specific Integrated Circuit, referred to asASIC), ready-made programmable gate array (Field-Programmable Gate Array, abbreviation FPGA) or other are programmableLogical device, discrete gate or transistor logic, discrete hardware components.It may be implemented or execute in the embodiment of the present applicationDisclosed each method, step and logic diagram.General processor can be microprocessor or the processor is also possible to appointWhat conventional processor etc..The step of method in conjunction with disclosed in the embodiment of the present application, can be embodied directly in hardware decoding processingDevice executes completion, or in decoding processor hardware and software module combination execute completion.Software module can be located atMachine memory, flash memory, read-only memory, programmable read only memory or electrically erasable programmable memory, register etc. are originallyIn the storage medium of field maturation.The storage medium is located at memory 41, and processor 42 reads the information in memory 41, in conjunction withIts hardware completes the step of above method.
It is provided by the embodiments of the present application it is a kind of with processor can be performed non-volatile program code it is computer-readableMedium, said program code make the processor execute method provided by the above embodiment.
The computer-readable medium of the non-volatile program code provided by the embodiments of the present application that can be performed with processor,With processing method, device and the electronic equipment technical characteristic having the same of digital asset provided by the above embodiment, soAlso it can solve identical technical problem, reach identical technical effect.
Finally, it should be noted that the above embodiments are only used to illustrate the technical solution of the present invention., rather than its limitations;To the greatest extentPipe present invention has been described in detail with reference to the aforementioned embodiments, those skilled in the art should understand that: its according toSo be possible to modify the technical solutions described in the foregoing embodiments, or to some or all of the technical features intoRow equivalent replacement;And these are modified or replaceed, various embodiments of the present invention technology that it does not separate the essence of the corresponding technical solutionThe range of scheme.