Cross-link pass exchange method based on permission and computer readable medium

A chain exchange and token technology, applied in the information field, can solve the problems of not realizing cross-chain asset transfer, inability to realize cross-chain contracts, and no collection attributes.

Active Publication Date: 2019-02-26
上海幼鸢网络科技有限公司
View PDF11 Cites 9 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although hash locking realizes the exchange of cross-chain assets, it does not realize the transfer of cross-chain assets, let alone realize such cross-chain contracts, so its application scenarios are relatively limited
[0007] To sum up, there is no clear and unified exchange standard for cross-chain exchange
Moreover, it can be seen that the above cross-chain methods are all for tokens without collection attributes, and there is no cross-chain exchange method for collection attribute tokens

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-link pass exchange method based on permission and computer readable medium
  • Cross-link pass exchange method based on permission and computer readable medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0033] The preferred embodiments of the present invention will be described in detail below with reference to the accompanying drawings to further illustrate the present invention.

[0034] First, combine figure 1 A permission-based cross-chain token exchange method according to an embodiment of the present invention is described.

[0035] figure 1 It is a method flowchart illustrating a permission-based cross-chain token exchange method according to an embodiment of the present invention. The basic authority of the token includes public data and authorization data, and the status identifier of the token data includes three states: normal, exchanged, and disabled. The default is the normal state. Further, when the third token is exchanged back to the first When the fourth token is exchanged back to the second chain, the original authorization information of the third token or the fourth token can be retrieved. In this embodiment, the basic information identity number of the...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a cross-link pass exchange method based on permission, which comprises the following steps: a first chain updates the state mark of a first pass; the first chain submits an exchange application to a second chain; the second chain actively locks the second pass; the first chain sends the information allowed to be exchanged by the first pass to the second chain in packets; thesecond chain verifies the packet information and generates the information of the first pass on the second chain to generate a third pass; when the third pass is generated and the state thereof is set to the cross-chain exchange state, the second chain packs the information of the second pass and sends the packed information to the first chain, and the first chain generates a fourth pass; the first chain and the second chain update the state of the fourth pass and the third pass, respectively, to normal. The cross-link pass exchange of the invention does not need to rely on a third party, a side chain or other means. Under the circumstance of guaranteeing the privacy of authorized data, the cross-link data pass transfer is completed perfectly.

Description

technical field [0001] The present invention relates to the field of information technology, and in particular, to a permission-based cross-chain token exchange method and a computer-readable medium. Background technique [0002] With the continuous development of blockchain technology, the current blockchain ecology has long separated from the single-chain information island model, forming an ecological environment with multiple economies and multiple chains. There are constantly new chains being born, and the exchange between chains has become the primary problem to be solved urgently. [0003] At present, the practice of cross-chain exchange can be roughly divided into three categories, but there are various defects, which are briefly described as follows: [0004] 1. Notary Schemes: In Notary Schemes, a trusted party or group is used to declare to Chain X that an event has occurred on Chain Y, or to determine that the statement is correct. These groups can either liste...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06G06Q40/04
CPCG06Q40/04H04L63/08H04L63/123
Inventor 邓琦任拴平沈仕侃邱敏
Owner 上海幼鸢网络科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products