Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the individual features of the embodiments can be combined with one another without conflict.
Example 1
Referring to fig. 1, fig. 1 is a schematic diagram of a block chain-based virtual credential method according to an embodiment of the present invention, which includes the following steps:
step S100, receiving a transfer application for transferring a first number of virtual certificates from a user node in a first block chain to a receiver node in a second block chain;
specifically, the first number may be any number, the virtual voucher may be a virtual share issued by an issuer, the user is an issuer of the virtual share in this embodiment, and the receiver is a buyer purchasing the virtual share in this embodiment, for example, the issuer issues one hundred thousand virtual shares, that is, the issuer issues one hundred thousand virtual vouchers on the blockchain, and the buyer purchases ten thousand of the one hundred thousand virtual vouchers issued by the issuer.
In some embodiments, the virtual credentials may be digital information transferable over the blockchain, often corresponding to some real-world entity. The virtual credential may be held by a party, such as a user, an issuer, or the like, through an account address or a smart contract address. The account address may be an account on a blockchain network. The account address is usually in the form of some variation of the public key of some asymmetric key. Only the private key corresponding to the account address is held to obtain the authority to operate the account. The intelligent contract address may be a virtual account to which the intelligent contract corresponds. Unlike a common account address, an intelligent contract address does not have a corresponding operation private key, which is defined by contract code which account addresses may have operation rights.
Step S110, responding to the received circulation application, calling an intelligent contract program of a protocol between the first block chain and the second block chain;
in particular, an intelligent contract program may be a set of numerically defined commitments, including agreements on which contract participants may execute such commitments. An intelligent contract may be a piece of program code on a blockchain that specifies the right and obligation of the contract-related person and the terms of the action. Contract associates confirm smart contracts, pay for virtual credentials that the contracts may require, invoke functions specified by the smart contracts, etc. by sending blockchain transactions.
Step S120, based on the called intelligent contract program, converting the equivalence of the virtual voucher of the first quantity into the common data of the second quantity;
specifically, the common data may be any form of virtual digital currency, or may be a share percentage of the seller, and the second amount is exchanged with the first amount in a predetermined ratio.
In some embodiments, ten thousand virtual vouchers are converted equally to 20% shares of the issuer; and converting the equivalent of ten thousand virtual certificates into one hundred thousand BTCs and the like.
In step S130, a record of the reduced first number of virtual credentials is written in the first virtual credential database of the user node, and a record of the increased second number of general data is written in the second virtual credential database of the receiver node.
In particular, the first virtual voucher database can be used for storing virtual voucher asset records and/or records of legal general data of the consumer node in the first blockchain. The second virtual voucher database can be used to store a record of virtual voucher assets and/or a record of legal general data of the consumer node in the first blockchain.
After the virtual voucher appears, it may be registered on different blockchains, such as a digital ticket blockchain and a digital options blockchain. The user may have virtual voucher assets, such as digital currency, virtual shares, etc., all on different blockchains.
After the virtual certificate flows from the first block chain to the second block chain, if the price of the stock of the issuer changes, the proportion of the virtual certificate flowing to the second block chain is unchanged, and the proportion of the virtual certificate converted into legal currency changes along with the change of the stock of the issuer;
for example, 24 days 5 and 24 months in 2020, ten thousand of virtual certificates issued by the issuer a with a price of renminbi of 100 ten thousand yuan account for 10% of the shares of the issuer a, and the ten thousand of virtual certificates are transferred to the buyer B, and at this time, the buyer B holds 10% of the shares of the issuer a, namely, ten thousand of virtual certificates with a price of renminbi of 100 ten thousand yuan;
in the year 2020, 6, 2, the stock price of the issuer a rises by 10%, and the price value of ten thousand virtual certificates held by the buyer B from the issuer a also rises immediately; that is, the purchaser B holds ten thousand virtual vouchers of 110 ten thousand valuable rmb at this time, but the share ratio is kept 10%.
However, if the virtual credentials cannot circulate across the chain, the assets of the user are scattered and cannot be integrated. Therefore, the virtual certificate assets to be circulated are converted into equivalent general data, then records for reducing the first quantity of the virtual certificate assets are written into the first virtual certificate database of the user node, and records for increasing the second quantity of the general data are written into the second virtual certificate database of the receiver node, so that the total quantity is kept unchanged in the circulation process of the virtual certificate assets in different block chains, the circulation loss is prevented, the circulation process of the virtual certificate assets across the block chains can be tracked and supervised at any time by an authoritative supervisor, the rapid circulation is ensured, and the problems of false participation and the like are prevented.
Example 2
Referring to fig. 2, fig. 2 is a detailed step diagram of a block chain-based virtual credential method according to an embodiment of the present invention, which is shown as follows:
step S200, according to the valuation amount in the first block chain and the total virtual stock price preset for sale in the first block chain, the virtual voucher is butted with the valuation amount and the total virtual stock price according to a preset exchange proportion;
specifically, the first blockchain may be a blockchain library where the virtual share issuer is located, the total virtual share price preset for sale in the first blockchain may be set according to a total percentage, and the preset exchange ratio may be a ratio of exchanging the virtual shares set by the issuer for the virtual certificate.
In some embodiments, the virtual share issuer evaluates to 500 ten thousand virtual shares in the first blockchain library, the total virtual shares sold in the first blockchain are preset to be 500 ten thousand, and the preset exchange ratio is 1:1,500 ten thousand virtual shares correspond to 500 ten thousand virtual certificates.
Step S210, the issued virtual voucher is in butt joint with legal currency according to a preset proportion, and the transaction is carried out through the virtual voucher;
specifically, the preset ratio may be a ratio set by an issuer, and the legal money may be legal money circulated in the market.
In some embodiments, the 1 virtual voucher may be redeemed for 700RMB, the 1 virtual voucher may be redeemed for 100USD, etc., and the issuer conducts a transaction with the purchaser via the virtual voucher.
Step S220, receiving a flow application for flowing a first number of virtual credentials from a user node in a first blockchain to a receiver node in a second blockchain;
specifically, the first number may be any number, the virtual voucher may be a virtual share issued by an issuer, the user is an issuer of the virtual share in this embodiment, and the receiver is a buyer purchasing the virtual share in this embodiment, for example, the issuer issues one hundred thousand virtual shares, that is, the issuer issues one hundred thousand virtual vouchers on the blockchain, and the buyer purchases ten thousand of the one hundred thousand virtual vouchers issued by the issuer.
In some embodiments, the virtual credentials may be digital information transferable over the blockchain, often corresponding to some real-world entity. The virtual credential may be held by a party, such as a user, an issuer, or the like, through an account address or a smart contract address. The account address may be an account on a blockchain network. The account address is usually in the form of some variation of the public key of some asymmetric key. Only the private key corresponding to the account address is held to obtain the authority to operate the account. The intelligent contract address may be a virtual account to which the intelligent contract corresponds. Unlike a common account address, an intelligent contract address does not have a corresponding operation private key, which is defined by contract code which account addresses may have operation rights.
Step S230, in response to the received transfer application, invoking an intelligent contract program of a protocol between the first blockchain and the second blockchain;
in particular, an intelligent contract program may be a set of numerically defined commitments, including agreements on which contract participants may execute such commitments. An intelligent contract may be a piece of program code on a blockchain that specifies the right and obligation of the contract-related person and the terms of the action. Contract associates confirm smart contracts, pay for virtual credentials that the contracts may require, invoke functions specified by the smart contracts, etc. by sending blockchain transactions.
Step S240, receiving a creation application of creating general data equivalent to the first quantity of virtual certificate assets from a user node;
step S250, responding to the received establishment application, and verifying the received establishment application;
step S260, converting the payment preparation virtual voucher assets equivalent to the first amount of virtual voucher assets into a second amount of general data;
step S270, storing a second amount of general data into a payment preparation database;
step S280, performing digital signature on a second amount of general data so that nodes in the first block chain and/or the second block chain perform consensus verification on the digital signature, and when the digital signature is judged to be valid and the digital signature is judged to be signed by supervision, passing the consensus verification;
in some embodiments, a creation request is received from a consumer node to create common data equivalent to a first number of virtual voucher assets; verifying the received creation application in response to the received creation application; after the creation application passes verification, converting the payment preparation virtual certificate assets equivalent to the first amount of virtual certificate assets into a second amount of general data; storing the second amount of the generic data in a payment preparation database.
For example, the user, in the business bank case, first applies for the virtual certificate to the supervisor, and after the application is passed, the user deducts the virtual share of the supervisor, and converts the virtual share into the virtual certificate. The monitoring party uniformly issues the virtual certificates through the virtual certificate center system, and the virtual certificates are stored in the center system in an encrypted character string mode after being issued. The issuing action can embody the authority of the supervisor by digitally signing the necessary information of the digital currency ID, the amount, the user and the like by a private key of the supervisor.
In some embodiments, based on the above embodiments, the method for virtual credential asset circulation across block chains may further include: digitally signing the second amount of generic data for: nodes in the first blockchain and/or the second blockchain perform consensus verification on the digital signature, and when the digital signature is determined to be valid and the digital signature is determined to be signed by the supervision, the consensus verification is passed.
For example, each node in the first and second blockchains may be provided with a consensus verification unit, or some nodes may not be provided as required. The consensus verification unit can be used for verifying the digital signature of the cross-chain circulation on the blockchain, and the blockchain node packs the transaction into the blockchain only if the cross-chain operation sent by the monitoring party is confirmed after the digital signature is verified.
Specifically, after receiving a new block, a participating node, namely a read-only node verifies whether the cross-link transaction in the new block has a legal digital signature of a supervisor, and if the digital signature is confirmed to be valid, the block is confirmed; and the participating nodes, namely the accounting nodes, verify whether the new cross-link transaction is carried with a legal digital signature of the supervisor or not after receiving the new cross-link transaction, and package the transaction into a new block and broadcast the transaction to the whole network if the digital signature is confirmed to be valid.
In some embodiments, creating the application includes at least one of: an ID of the virtual credential asset to be created, the first number, and identity information of the user node.
Step S290, verifying the received circulation application based on the called intelligent contract;
specifically, the common data may be any form of virtual digital currency, or may be a share percentage of the seller, and the second amount is exchanged with the first amount in a predetermined ratio.
In some embodiments, ten thousand virtual vouchers are converted equally to 20% shares of the issuer; and converting the equivalent of ten thousand virtual certificates into one hundred thousand BTCs and the like.
Step S300, after the circulation application passes verification, equivalence of the virtual certificates of the first quantity is converted into universal data of the second quantity;
step S310, receiving a transfer application from a user node for transferring a first number of digital assets from the user node in the first blockchain to a transfer party node in the first blockchain;
step S320, verifying the received transfer application;
step S330, after the transfer application passes the verification, writing a record of reducing the first number of virtual certificates into a first virtual certificate database of the user node, and writing a record of increasing the second number of general data into a second virtual certificate database of the transfer party node;
step S340, based on the called intelligent contract program, converting the equivalence of the virtual voucher of the first quantity into the common data of the second quantity.
In some embodiments, a roll-out application is received from the consumer node to roll out a second amount of generic data from the first virtual credential database to the payment preparation database; verifying the received roll-out application; and after the roll-out application passes the verification, writing a record of the general data with the reduced second quantity into the first virtual certificate database, and writing a payment preparation virtual certificate with the value of the general data with the increased second quantity into the payment preparation database.
For example, the user may apply to the supervisor to retrieve the virtual voucher when the user is no longer using the virtual voucher. The monitoring party destroys the virtual certificate of the user in the central system and increases the amount of the reserve payment for the virtual certificate.
In some embodiments, on the basis of the foregoing embodiments, the method for virtual credential flow across block chains may further include: and deploying an intelligent contract program on the block chain to be streamed in advance, wherein the intelligent contract program is used for defining at least one operation of creation, transfer-in, transfer, circulation and transfer-out of the virtual certificate on the block chain to be streamed.
In some embodiments, on the basis of the foregoing embodiments, the method for virtual credential flow across block chains may further include: setting an account address of a monitoring party for an intelligent contract program in advance; and after passing the verification of the transfer-in application or the transfer-out application, calling the intelligent contract program.
Therefore, the embodiment can issue, inject, circulate, propose and back the virtual voucher through the digital currency centralized issuing system, keep the total data amount unchanged and avoid loss.
Step S350, writing a record of the reduced first number of virtual credentials in the first virtual credential database of the user node, and writing a record of the increased second number of general data in the second virtual credential database of the receiver node.
In particular, the first virtual voucher database can be used for storing virtual voucher asset records and/or records of legal general data of the consumer node in the first blockchain. The second virtual voucher database can be used to store a record of virtual voucher assets and/or a record of legal general data of the consumer node in the first blockchain.
After the virtual voucher appears, it may be registered on different blockchains, such as a digital ticket blockchain and a digital options blockchain. The user may have virtual voucher assets, such as digital currency, virtual shares, etc., all on different blockchains.
However, if the virtual credentials cannot circulate across the chain, the assets of the user are scattered and cannot be integrated. Therefore, the virtual certificate assets to be circulated are converted into equivalent general data, then records for reducing the first quantity of the virtual certificate assets are written into the first virtual certificate database of the user node, and records for increasing the second quantity of the general data are written into the second virtual certificate database of the receiver node, so that the total quantity is kept unchanged in the circulation process of the virtual certificate assets in different block chains, the circulation loss is prevented, the circulation process of the virtual certificate assets across the block chains can be tracked and supervised at any time by an authoritative supervisor, the rapid circulation is ensured, and the problems of false participation and the like are prevented.
Example 3
Referring to fig. 3, fig. 3 is a schematic diagram of a virtual voucher system module based on a block chain according to an embodiment of the present invention, which is shown as follows:
a receivingmodule 10, configured to receive a flow application for flowing a first number of virtual credentials from a user node in a first blockchain to a receiver node in a second blockchain;
aresponse module 20, configured to invoke an intelligent contract program of a protocol between the first blockchain and the second blockchain in response to the received streaming application;
aconversion module 30, configured to convert the equivalence of the first amount of virtual credentials into a second amount of general data based on the invoked intelligent contract program;
awriting module 40 for writing a record of the reduced first number of virtual credentials in a first virtual credential database of the user node and a record of the increased second number of general data in a second virtual credential database of the receiver node.
Also included are a memory, a processor, and a communication interface, which are electrically connected, directly or indirectly, to each other to enable transmission or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The memory may be used to store software programs and modules, and the processor may execute various functional applications and data processing by executing the software programs and modules stored in the memory. The communication interface may be used for communicating signaling or data with other node devices.
The Memory may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like.
The processor may be an integrated circuit chip having signal processing capabilities. The Processor may be a general-purpose Processor including a Central Processing Unit (CPU), a Network Processor (NP), etc.; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
It will be appreciated that the configuration shown in fig. 3 is merely illustrative and may include more or fewer components than shown in fig. 3, or have a different configuration than shown in fig. 3. The components shown in fig. 3 may be implemented in hardware, software, or a combination thereof.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative, and for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In summary, the block chain-based virtual certificate method and system provided by the embodiments of the present application can fully utilize the block chain intelligent contract technology, and the fund flow of the primary transaction platform and the secondary transaction platform is completed by the block chain technology, and in this process, no trader participates in the virtual certificate, and has the characteristics of centralized issuer, non-anonymity, and variable total amount, and the virtual certificate can be used to prove the virtual shares of different companies, circulate on the platform, and sell to investors.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.