Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Digital asset management method capable of realizing anonymous transaction

A technology of digital assets and management methods, applied in digital data processing, digital data protection, instruments, etc., can solve problems such as inability to distinguish user account information from user usage data, personal sensitive data leakage, etc., and achieve high computing power requirements, The effect of low concurrency and low scalability

Pending Publication Date: 2022-03-22
上海旺链信息科技有限公司
View PDF0 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] To this end, the embodiment of the present invention provides a digital asset management method that can realize anonymous transactions, so as to solve the problem of personal sensitive data leakage caused by the inability to distinguish user account information and user usage data in the prior art

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital asset management method capable of realizing anonymous transaction
  • Digital asset management method capable of realizing anonymous transaction
  • Digital asset management method capable of realizing anonymous transaction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0065] Embodiment 1: A digital asset management method that can realize anonymous transactions, such as figure 1 and figure 2 shown, including the following steps: including the following steps:

[0066] Obtain the asset owner registration request, and when receiving the asset owner's registration request, obtain a unique seed and store it in the asset owner's wallet;

[0067] Using the unique seed to derive two key pairs, the two key pairs are the user signature key pair and the user transaction key pair;

[0068] Obtain a digital asset registration request, generate digital asset information, and use the user transaction key pair and random key pair to generate a symmetric key;

[0069] Encrypting the digital asset information with the symmetric key and the user signature key pair to generate first verifiable information and first encrypted information;

[0070] Casting the digital asset information into the first NFT, generating the first transaction information and upl...

Embodiment 2

[0146] Embodiment 2: A digital asset management device that can realize anonymous transactions, including

[0147] User registration module: obtains the registration request of the asset owner, and when receiving the registration request of the asset owner, obtains a unique seed and stores it in the wallet of the asset owner; derives two key pairs from the unique seed , the two described key pairs are respectively the user signature key pair and the user transaction key pair;

[0148] Digital asset registration and verification module: obtain digital asset registration request, and generate digital asset information, use the user transaction key pair and random key pair to generate a symmetric key; use the symmetric key and the user signature key Encrypting the digital asset information to generate first verifiable information and first encrypted information; casting the digital asset information into the first NFT, generating the first transaction information and upload...

Embodiment 3

[0151] Embodiment 3: An electronic device for digital asset management that can realize anonymous transactions, comprising: a memory and a processor, the processor and the memory communicate with each other through a bus; The program instructions executed by the processor can be invoked by the processor to execute the method described in any one of Embodiment 1.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The embodiment of the invention discloses a digital asset management method capable of realizing anonymous transaction, and the method comprises the steps: packaging digital assets into digital asset information through a secret key system and an encryption algorithm, packaging the digital asset information into encryption information and verification information, and carrying out the chain for evidence storage. The owner of the digital asset or the buyer of the digital asset can obtain the digital asset information by generating a symmetric encryption (decryption) key. And the encrypted information is used as a public key of each digital asset to replace a traditional user name and is used as an account identifier of the centralized service platform for collecting user use data. The unique code of the digital asset packaged in the digital asset information serves as a private key of the digital asset, the ownership of the digital asset can be verified, and the ownership of the digital asset can be relieved through logout of the unique code of the digital asset. And the uplink information is not directly associated with the key pair of the user, so that the reality of the user and the privacy of the network identity are guaranteed.

Description

technical field [0001] The embodiments of the present invention relate to the technical field of digital asset management, in particular to a digital asset management method that can realize anonymous transactions. Background technique [0002] With the popularization of the Internet, especially the mobile Internet, the production, processing, circulation and utilization of data has not only developed into a huge industry, but also subversively changed the way people produce, live and consume, and promoted profound changes in various fields. The digital economy where data is the means of production came into being. In contrast to the booming digital economy and digital assets, the boundaries of people's daily life have expanded from the offline physical world to the online space, leading to issues such as digital security and digital divide, especially the large number of users collected by digital assets and Internet companies. How data should be owned and managed has arou...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6218
Inventor 于中阳梅雪
Owner 上海旺链信息科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products