Unlock instant, AI-driven research and patent intelligence for your innovation.

Cross-chain asset security management method, computer equipment and storage medium

A security management and asset technology, applied in the blockchain field, can solve problems such as defrauding assets4, and achieve the effect of avoiding theft of private keys and reducing security risks

Active Publication Date: 2021-07-30
HANGZHOU FUZAMEI TECH CO LTD
View PDF13 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The defect of the above scheme is that the private key of the relay is used when the network is connected. When the private key is stolen, the user who stole the private key can lie about the block chain B when the block chain B has not burned assets3 Burned assets3 to defraud assets4

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-chain asset security management method, computer equipment and storage medium
  • Cross-chain asset security management method, computer equipment and storage medium
  • Cross-chain asset security management method, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The application will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain related inventions, rather than to limit the invention. It should also be noted that, for ease of description, only parts related to the invention are shown in the drawings.

[0028] It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The present application will be described in detail below with reference to the accompanying drawings and embodiments.

[0029] figure 1 It is a flowchart of a cross-chain asset security management method provided by an embodiment of the present invention.

[0030] like figure 1 As shown, in this embodiment, the present invention provides a cross-chain asset security management method suitable for blockchain nodes...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cross-chain asset security management method, computer equipment and a storage medium. The method comprises the following steps: executing a first cross-chain asset transfer transaction, transferring to-be-transferred assets into a contract and locking the to-be-transferred assets, and detecting whether the total amount of the assets locked by the contract is greater than a first threshold: if so, unlocking second assets and transferring the second assets to an asset supervision account; executing a first asset supplementary transaction, and transferring a third asset in the asset supervision account into a contract and locking the third asset after multi-signature verification succeeds; executing a first cross-chain asset transfer transaction, and when the amount of a fourth asset to be transferred is greater than the total amount of the assets, recording an asset extraction failure record in a state of to-be-extracted again in the contract; executing a second asset supplementary transaction, and transferring a fifth asset in the asset supervision account into a contract and locking the fifth asset after multi-signature verification succeeds; and executing the first asset extraction transaction, unlocking the fourth asset, transferring the fourth asset to the corresponding user, and modifying the recorded state to be extracted. According to the invention, the security risk of cross-chain contract asset locking is reduced.

Description

technical field [0001] This application relates to the technical field of blockchain, and specifically relates to a cross-chain asset security management method, computer equipment and storage media. Background technique [0002] In various existing blockchain systems, a typical cross-chain asset transfer scheme lies in: [0003] When user A wants to transfer several assets assets1 on blockchain A to blockchain B: [0004] The cross-chain contract of blockchain A locks assets1; [0005] The relay relay transmits the information of blockchain A locking assets1 to blockchain B by sending transactions, and blockchain B issues assets2 representing the same asset type and amount as assets1 to user A; [0006] When user A sends a transaction to blockchain B to request assets3 to be transferred back to blockchain A, blockchain B burns assets3; [0007] The relay relay transmits the information of blockchain B burning assets3 to blockchain A by sending a transaction, and the cros...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/06G06Q20/38G06Q20/40G06Q40/04
CPCG06Q20/065G06Q20/3825G06Q20/389G06Q20/4016G06Q40/04
Inventor 何正军何聿王志文吴思进
Owner HANGZHOU FUZAMEI TECH CO LTD