Unlock instant, AI-driven research and patent intelligence for your innovation.

Cross-chain asset security management method, computer equipment and storage medium

A security management and asset technology, applied in the blockchain field, can solve problems such as defrauding assets4, and achieve the effect of avoiding theft of private keys and reducing security risks

Active Publication Date: 2022-07-19
HANGZHOU FUZAMEI TECH CO LTD
View PDF13 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The defect of the above scheme is that the private key of the relay is used when the network is connected. When the private key is stolen, the user who stole the private key can lie about the block chain B when the block chain B has not burned assets3 Burned assets3 to defraud assets4

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cross-chain asset security management method, computer equipment and storage medium
  • Cross-chain asset security management method, computer equipment and storage medium
  • Cross-chain asset security management method, computer equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0027] The present application will be further described in detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are only used to explain the related invention, but not to limit the invention. In addition, it should be noted that, for the convenience of description, only the parts related to the invention are shown in the drawings.

[0028] It should be noted that the embodiments in the present application and the features of the embodiments may be combined with each other in the case of no conflict. The present application will be described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.

[0029] figure 1 This is a flowchart of a cross-chain asset security management method provided by an embodiment of the present invention.

[0030] like figure 1 As shown, in this embodiment, the present invention provides a cross-chain asset se...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a cross-chain asset security management method, computer equipment and storage medium. The method includes: executing a first cross-chain asset transfer transaction, transferring the assets to be transferred into a contract and locking them, and detecting whether the total amount of assets locked in the contract is greater than or equal to First threshold: Yes, unlock the second asset and transfer it to the asset supervision account; execute the first asset supplement transaction, transfer the third asset in the asset supervision account into the contract and lock it after the multi-signature verification is successful; execute the first asset In the cross-chain asset transfer transaction, when the amount of the fourth asset to be transferred back is greater than the total amount of assets, the status of the asset to be re-extracted will be recorded in the contract as the failure to extract the asset; the second asset supplement transaction is executed, after the multi-signature verification is successful Transfer the fifth asset in the asset supervision account into the contract and lock it; execute the first asset withdrawal transaction, unlock the fourth asset and transfer it to the corresponding user, and change the record status to withdrawn. The present invention reduces the security risk of assets locked by cross-chain contracts.

Description

technical field [0001] The present application relates to the field of blockchain technology, in particular to a cross-chain asset security management method, computer equipment and storage medium. Background technique [0002] In the existing various blockchain systems, a typical cross-chain asset transfer scheme is: [0003] When user A wants to transfer several assets1 on blockchain A to blockchain B: [0004] The cross-chain contract of blockchain A locks assets1; [0005] The relay relay transmits the information that blockchain A locks assets1 to blockchain B by sending a transaction, and blockchain B issues assets2 representing the same asset type and amount as assets1 to user A; [0006] When user A sends a transaction to blockchain B to request to transfer assets3 back to blockchain A, blockchain B burns assets3; [0007] The relay relay transmits the information of blockchain B burning assets3 to blockchain A by sending a transaction. The cross-chain contract of...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06Q20/06G06Q20/38G06Q20/40G06Q40/04
CPCG06Q20/065G06Q20/3825G06Q20/389G06Q20/4016G06Q40/04
Inventor 何正军何聿王志文吴思进
Owner HANGZHOU FUZAMEI TECH CO LTD