[go: up one dir, main page]

TWI702552B - System for creating digital identities and processing digital assets authorization and transaction using distributed ledger technology - Google Patents

System for creating digital identities and processing digital assets authorization and transaction using distributed ledger technology Download PDF

Info

Publication number
TWI702552B
TWI702552B TW107137731A TW107137731A TWI702552B TW I702552 B TWI702552 B TW I702552B TW 107137731 A TW107137731 A TW 107137731A TW 107137731 A TW107137731 A TW 107137731A TW I702552 B TWI702552 B TW I702552B
Authority
TW
Taiwan
Prior art keywords
digital
node device
digital asset
asset
transfer
Prior art date
Application number
TW107137731A
Other languages
Chinese (zh)
Other versions
TW202016832A (en
Inventor
林貫文
Original Assignee
林貫文
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 林貫文 filed Critical 林貫文
Priority to TW107137731A priority Critical patent/TWI702552B/en
Publication of TW202016832A publication Critical patent/TW202016832A/en
Application granted granted Critical
Publication of TWI702552B publication Critical patent/TWI702552B/en

Links

Images

Landscapes

  • Storage Device Security (AREA)

Abstract

A system for creating digital identities and processing digital assets authorization and transaction using distributed ledger technology is provided. The system includes multiple node devices. Each node device can directly or indirectly communicate with other node devices through the network to send and receive data to form a blockchain architecture. It also includes an ID management module, a digital asset management module, a digital asset authorization transaction module and a data storage module. The invention utilizes distributed ledger technology and directed acyclic graph technology in blockchain to effectively combine IoT devices, providing transaction and authorization services to establish digital identity and conduct digital asset. It is really necessary for human life.

Description

以分散式帳本技術建立數位身分及進行數位資產授權與轉移的系統System for establishing digital identity and authorizing and transferring digital assets with distributed ledger technology

本發明為一種建立數位身分及進行數位資產授權與轉移的系統,特別是利用分散式帳本的一種建立數位身分及進行數位資產轉移授權的系統,可應用於物聯網設備及各式數位資產之授權與轉移。 The present invention is a system for establishing digital identities and authorizing and transferring digital assets, especially a system for establishing digital identities and authorizing digital asset transfers using a distributed ledger, which can be applied to Internet of Things equipment and various digital assets. Authorization and transfer.

隨著5G架構的陸續佈建,物聯網(Internet Of Things)時代即將展開。在萬物相連(具有可以特定規範相互溝通,以取得必要資訊並完成特定任務)的場景中,人們的實體活動甚至是思想脈絡,可以從資料產生與資訊流向判讀。在網路世界裡,物聯網設備除了可以自我產生有意義的數據外,也可以產生跟人類社會活動相牽連的資訊,比如帶有個資識別的數位身份。這些資訊可能是屬於人類社會中某種法律授與的權利,或者是在使用上牽涉其他實體物權而變相形成的財產權,而後者實質上是一種數位化的資產。是故,這些數位資產會因市場變化而有進行轉移與授權的需求。一個可能的場景會是某甲擁有一台電動車,需要藉由某乙的充電裝置充電,某甲的車在將其用戶個資提 供給某乙的授權條件下,可以直接取得接收該充電裝置提供10度電的服務。在現今的電動車充電轉移過程中,人們需要以金錢作為媒介,透過特定的銀行伺服器來完成金錢支付後才能進行相關服務。人們可能很難想像非實體的數位資產可以代替金錢使用,更難理解這轉移可直接透過物聯網設備進行的。然而,這樣的應用場景在不遠的將來是舉目可見的。 With the continuous deployment of 5G architecture, the Internet Of Things era is about to unfold. In the scenario where everything is connected (with specific norms that can communicate with each other to obtain necessary information and complete specific tasks), people's physical activities and even thoughts can be interpreted from data generation and information flow. In the online world, in addition to self-generating meaningful data, IoT devices can also generate information related to human social activities, such as digital identities with personal identification. This information may be a right granted by a certain law in human society, or it may be a disguised property right that involves other physical property rights in use, and the latter is essentially a digital asset. Therefore, these digital assets will need to be transferred and authorized due to market changes. A possible scenario is that a certain person A owns an electric car and needs to be charged by a certain person B’s charging device. A certain person A’s car is charging its users’ personal data. Under the authorization condition of supplying certain person B, you can directly obtain the service of receiving 10 kilowatt-hours of electricity from the charging device. In the current electric vehicle charging transfer process, people need to use money as a medium to complete the money payment through a specific bank server before they can perform related services. It may be difficult to imagine that non-physical digital assets can be used in place of money, and it is even harder to understand that this transfer can be done directly through IoT devices. However, such application scenarios will be visible in the near future.

另外,一種蓬勃發展的應用是區塊鏈。由點對點網路技術架構發展而來,加上使用虛擬幣來激發網路節點進行協作,從而形成分散式帳本以完成網路上的各種點對點轉移,區塊鏈的應用不只能在網路上儲存不可被修改的資料,其衍伸的虛擬貨幣,更有替代實體貨幣成為進行物件轉移的媒介。在目前看來,成熟的區塊鏈技術已有與前述物聯網技術合作,以創建下一個世代的轉移平台。也就是說,兩者的合流可以滿足前述應用場景的需求。一個正在發展中的轉移平台就是埃歐塔(IOTA)。 In addition, a booming application is blockchain. Developed from the peer-to-peer network technology architecture, coupled with the use of virtual currency to stimulate network nodes to collaborate, thereby forming a distributed ledger to complete various peer-to-peer transfers on the network. The application of blockchain can not only be stored on the network. The modified data, the virtual currency that it has developed, has replaced the physical currency as a medium for transferring objects. At present, mature blockchain technology has already cooperated with the aforementioned IoT technology to create a transfer platform for the next generation. In other words, the combination of the two can meet the requirements of the aforementioned application scenarios. One transfer platform under development is IOTA.

由以上的說明可知,雖然「區塊鏈+物聯網」的技術方案方興未艾,但許多特定領域的應用尚未發展成熟。比較鮮明的例子是建立數位身分及進行數位資產授權與轉移,實需技術人員戮力開發以臻完備。這也是本發明提出的根本原因。 It can be seen from the above description that although the "blockchain + Internet of Things" technical solutions are in the ascendant, many applications in specific fields have not yet matured. A clear example is the establishment of digital identities and the authorization and transfer of digital assets, which actually require technical personnel to work hard to achieve completeness. This is also the fundamental reason proposed by the present invention.

本段文字提取和編譯本發明的某些特點。其它特點將被揭露於後續段落中。其目的在涵蓋附加的申請專利範圍之精神和範圍中,各式的修改和類似的排列。 This paragraph extracts and compiles certain features of the present invention. Other features will be revealed in subsequent paragraphs. Its purpose is to cover the spirit and scope of the additional patent application, various modifications and similar arrangements.

為了滿足以上需求,本發明提出一種以分散式帳本技術建立數位身分及進行數位資產授權與轉移的系統。該系統包含了複數個節點設備,每 一節點設備可透過網路與其它節點設備直接或間接聯通,以收發數據並形成一區塊鏈架構,其特徵在於:每一節點設備包含:一,識別代號(Identification,ID)管理模組,用以生成綁定一實體ID的數位ID,及將該數位ID發送到各節點設備;一數位資產管理模組,用以接收或生成一數位資產、將該數位資產歸戶至一數位ID,及將該數位ID的數位資產歸戶關係發送到各節點設備;一數位資產授權轉移模組,用以對任一數位ID設定一轉移權限、對於符合該轉移權限的特定數位ID進行指定數位資產的變換或定時授權存取,及將指定數位資產的交換或定時授權存取的結果發送到各節點設備;及一資料儲存模組,用以儲存及在滿足轉移權限下提供全部或部分由各節點設備發送的數位ID、數位ID的數位資產歸戶關係,及指定數位資產的交換或定時授權存取的結果。其中數位ID藉由一生成演算而獲得。 In order to meet the above requirements, the present invention proposes a system for establishing digital identities and authorizing and transferring digital assets using distributed ledger technology. The system contains multiple node devices, each A node device can directly or indirectly communicate with other node devices through the network to send and receive data and form a blockchain architecture. It is characterized in that: each node device includes: 1. Identification code (ID) management module, Used to generate a digital ID bound to an entity ID, and send the digital ID to each node device; a digital asset management module, used to receive or generate a digital asset, and assign the digital asset to a digital ID, And send the digital asset return relationship of the digital ID to each node device; a digital asset authorization transfer module used to set a transfer authority for any digital ID, and specify the digital asset for a specific digital ID that meets the transfer authority The conversion or time authorized access, and the results of the exchange of designated digital assets or time authorized access are sent to each node device; and a data storage module to store and provide all or part of the The digital ID sent by the node device, the digital asset ownership relationship of the digital ID, and the result of the exchange of the designated digital asset or the access authorized by time. The digital ID is obtained by a generating calculation.

最好,該生成演算可為對一數位資產進行哈希運算、產生唯一性的網址(Uniform Resource Locator,URL),或將一實體ID進行哈希運算。 Preferably, the generation calculation can be a hash calculation of a digital asset, a unique URL (Uniform Resource Locator, URL), or a hash calculation of an entity ID.

最好,該實體ID可為特定機關為證實特定人之身分所核發、網路平台為區分用戶身分及權限而註冊生成、節點設備的通用唯一識別碼(Universally Unique Identifier,UUID),或對實體物品認證文件進行加密而形成之網域位置或亂碼。 Preferably, the entity ID can be issued by a specific agency to verify the identity of a specific person, the network platform is registered and generated to distinguish user identities and permissions, the universally unique identifier (UUID) of the node device, or the entity The domain location or garbled code formed by encrypting the item authentication file.

最好,任一數位資產可藉由與特定數位ID串接,或與已與特定數位ID串接之其它數位資產串接而完成歸戶。 Preferably, any digital asset can be returned by concatenating it with a specific digital ID or with other digital assets that have been concatenated with a specific digital ID.

最好,該些數位資產中可包含一個以上之非其所歸戶數位ID的數位ID。 Preferably, the digital assets may include more than one digital ID other than the digital ID of the household to which they belong.

最好,該轉移權限可為具有或不具有某特定數位資產。 Preferably, the transfer authority can be with or without a certain digital asset.

最好,該區塊鏈架構可符合IOTA、Ethereum或Bitcoin分散式帳本運作規範。 Preferably, the blockchain architecture can comply with IOTA, Ethereum or Bitcoin decentralized ledger operation specifications.

最好,該數位資產可包含用戶數位行為足跡、身份資格證明或實體資產證明。 Preferably, the digital asset may include the user's digital behavior footprint, identity certification, or physical asset certification.

如前所述,本發明利用區塊鏈中的分散式帳本技術,有效結合物聯網設備,本系統可提供了建立數位身分及進行數位資產轉移授權服務,實為人類生活必須。 As mentioned above, the present invention utilizes the distributed ledger technology in the blockchain and effectively combines the Internet of Things devices. The system can provide services for establishing digital identities and authorizing the transfer of digital assets, which is actually necessary for human life.

111:ID管理模組 111: ID management module

112:數位資產管理模組 112: Digital Asset Management Module

113:數位資產授權轉移模組 113: Digital Asset Authorization Transfer Module

114:資料儲存模組 114: Data Storage Module

110:第一節點設備 110: The first node device

120:第二節點設備 120: second node device

130:第三節點設備 130: third node device

140:第四節點設備 140: The fourth node device

圖1為依照本發明的實施例的以分散式帳本技術建立數位身分及進行數位資產授權與轉移的系統的架構說明圖;圖2繪示數位資產的歸戶態樣。 FIG. 1 is a diagram illustrating the architecture of a system for establishing digital identities and authorizing and transferring digital assets by using distributed ledger technology according to an embodiment of the present invention; FIG. 2 shows the state of account return of digital assets.

以下結合圖式對本發明作進一步詳細說明。 The present invention will be further described in detail below in conjunction with the drawings.

請見圖1,該圖為依照本發明的實施例的以分散式帳本技術建立數位身分及進行數位資產授權與轉移的系統(以下簡稱本系統)的架構說明圖。該系統由許多的節點設備所建構。依照規模的大小,節點設備的數量至少是數十個,可以達到百萬以上。每一節點設備可透過網路與其它節點設備直接或間接聯通,以收發數據並形成一區塊鏈架構。為了簡化說明,本實施例及後續的應用例以四個節點設備(一第一節點設備110、一第二節點設備120、一第三節點設備130及一第四節點設備140)為代表來說明。而上述的區塊鏈架構,可以是現行各種以分散式帳本技術於網路上進行區塊資料儲存,使其內容具有難以竄改的特性的各種區塊鏈底層架構。比如,區塊鏈架構可符合 IOTA、Ethereum或Bitcoin分散式帳本運作規範。無論是否要在本系統上發放虛擬幣以維繫帳本、驗證轉移和鼓勵記帳,在相應的帳本運作環境中,適當的對每個節點設備加上協作的模組,就可以達到建立數位身分及進行數位資產授權與轉移的目的。 Please refer to Fig. 1, which is an illustrative diagram of the architecture of a system for establishing digital identities and performing digital asset authorization and transfer (hereinafter referred to as the system) using distributed ledger technology according to an embodiment of the present invention. The system is constructed by many node devices. According to the size of the scale, the number of node devices is at least dozens, and can reach more than one million. Each node device can directly or indirectly communicate with other node devices through the network to send and receive data and form a blockchain architecture. To simplify the description, this embodiment and subsequent application examples take four node devices (a first node device 110, a second node device 120, a third node device 130, and a fourth node device 140) as representatives. . The above-mentioned block chain architecture can be various current block chain underlying architectures that use distributed ledger technology to store block data on the network to make the content difficult to tamper with. For example, the blockchain architecture can meet IOTA, Ethereum or Bitcoin distributed ledger operation specifications. Regardless of whether you want to issue virtual currency on this system to maintain accounts, verify transfers, and encourage accounting, in the corresponding accounting operating environment, appropriately adding cooperative modules to each node device can achieve the establishment of digital identity And the purpose of authorization and transfer of digital assets.

依照本發明,每一個節點設備可以具有不同的態樣及功能,比如監控影像(網路攝影機)、提供照明(智能路燈)、販售商品或服務(自動販賣機)、提供網路服務(網路分享器)、取得環境有關數據(溫溼度偵測儀)、提供資料存取服務(網路附加儲存(Network Attached Storage,NAS)儲存裝置),或提供網路平台服務(伺服器)。每一個節點設備都有各自的中央處理器、記憶體、儲存裝置(比如嵌入式多媒體卡(Embedded Multi Media Card,EMMC)、硬碟、固態硬碟或磁碟陣列)、輸出入裝置等。這些硬體未繪示於圖1中,然其為一般性馮紐曼架構的電子產品的必要元件,相關領域的技術人員應了解。此外,本發明的每一節點設備都需要有各自的網路通訊界面,無論其以有線或無線方式聯網,連接固網或行動網路。以下所介紹關於本發明的各個模組,為每一節點設備利用或配合現有的硬體而運行的技術要件。因此,它們可以是軟體,包含了特定的程式碼與資料物件,而在作業系統下運行於至少一部份的硬體架構中(比如程式碼與相關資料檔案儲存於儲存裝置中,在作業系統的運作下暫存於記憶體,而為中央處理器動態的調用執行)。另一方面,該些模組也可以是特製硬體,比如特殊應用積體電路(Application-specific integrated circuit,ASIC)或外接卡,用以執行該些模組所賦予的作用。更有甚者,這些技術要件可以是部分是軟體、部分是硬體,依照產品設計人員的需求而有效整合,都在本專利所主張的技術範圍內。但必須強調的是, 這些模組會因為節點設備指定的功能不同而可能有不同的「規模」,比如本發明的節點設備可分為記錄所有資料及區塊的全節點設備及記錄部分資料及區塊的輕節點設備,各自的資料儲存模組所占用的硬體資源及設定功能也會有差異。 According to the present invention, each node device can have different aspects and functions, such as monitoring images (web cameras), providing lighting (smart street lights), selling goods or services (vending machines), and providing network services (web Access sharing device), obtain environmental data (temperature and humidity detector), provide data access services (Network Attached Storage (NAS) storage devices), or provide network platform services (server). Each node device has its own central processing unit, memory, storage device (such as Embedded Multi Media Card (EMMC ) , hard disk, solid state disk or disk array), I/O device, etc. These hardwares are not shown in FIG. 1, but they are necessary components of general von Neumann-based electronic products, and those skilled in the relevant fields should understand. In addition, each node device of the present invention needs to have its own network communication interface, regardless of whether it is connected to a fixed network or a mobile network in a wired or wireless manner. The following introduces the technical requirements for each module of the present invention to utilize or cooperate with the existing hardware for each node device. Therefore, they can be software, including specific code and data objects, and run in at least part of the hardware framework under the operating system (such as the code and related data files stored in the storage device, in the operating system The operation is temporarily stored in the memory, and is dynamically called and executed by the central processing unit). On the other hand, the modules may also be special hardware, such as application-specific integrated circuits (ASIC) or external cards, to perform the functions assigned by the modules. What's more, these technical requirements can be part of software and part of hardware, and they can be effectively integrated according to the needs of product designers, and they are all within the technical scope of this patent. However, it must be emphasized that these modules may have different "scales" because of the different functions specified by the node device. For example, the node device of the present invention can be divided into a full node device that records all data and blocks, and a partial data record. The hardware resources and configuration functions occupied by the respective data storage modules of the light node devices of the block are also different.

每一節點設備包含了一ID管理模組、一數位資產管理模組、一數位資產授權轉移模組與一資料儲存模組。為了方便說明,本發明以第一節點設備110中的ID管理模組111、數位資產管理模組112、數位資產授權轉移模組113與資料儲存模組114為例子,對每個模組的功能與互動方式進行陳述。如前述,每個模組可能會因為其所屬節點設備的硬體限制或設定身分(全節點或輕節點),而有不同的工作負擔,但每一個相同的模組的核心功能是一樣的。 Each node device includes an ID management module, a digital asset management module, a digital asset authorization transfer module, and a data storage module. For the convenience of description, the present invention takes the ID management module 111, the digital asset management module 112, the digital asset authorization transfer module 113, and the data storage module 114 in the first node device 110 as examples. The function of each module is Make presentations with interactive methods. As mentioned above, each module may have different workloads due to the hardware limitations of the node device to which it belongs or its configuration (full node or light node), but the core functions of each identical module are the same.

ID管理模組111的功能是生成綁定一實體ID的數位ID,及將該數位ID發送到各節點設備。數位ID是本發明的核心。數位ID的形式可以是一連串無意義的英文與數字混搭的明碼,也可以是一個沒有實體對應的統一資源定位符(Uniform Resource Locator,URL),其所表彰的是一個對應的實體ID。數位ID不重複,每一個數位ID具有唯一性。而實體ID本身可以是屬於人的,比如個人的身分證字號、銀行帳戶號碼、擁有的手機門號、網路平台帳號等;也可以是屬於物的,比如機身序號、通用唯一識別碼(UUID)、手機基地台單元識別碼(Cell ID),甚至是產品履歷(或是其掃描檔的加密後數據)。也就是說,實體ID可以是特定機關為證實特定人之身分所核發的、網路平台為區分用戶身分及權限而註冊生成的,或對實體物品認證文件進行加密而形成之網域位置或亂碼。這些實體ID重複與否並不影響本系統的運作,因 為系統的運作是依照數位ID而定。但數位ID再生成後一定要綁定一個實體ID,否則系統的各個節點設備無法接受。 The function of the ID management module 111 is to generate a digital ID bound to an entity ID, and send the digital ID to each node device. Digital ID is the core of the invention. The form of the digital ID can be a series of meaningless English and digital mashups, or it can be a Uniform Resource Locator (URL) that has no physical correspondence, and it commends a corresponding entity ID. The digital ID is not repeated, and each digital ID is unique. The entity ID itself can belong to a person, such as a personal ID number, bank account number, mobile phone number, network platform account number, etc.; it can also belong to a thing, such as a body serial number, a universal unique identification code ( UUID), cell phone base station unit identification code (Cell ID), and even product history (or the encrypted data of its scanned file). In other words, the entity ID can be issued by a specific agency to verify the identity of a specific person, a network platform is registered to distinguish user identities and permissions, or a network domain location or garbled code formed by encrypting the entity item authentication file . The duplication of these entity IDs does not affect the operation of this system, because The operation of the system is determined by the digital ID. However, after the digital ID is regenerated, it must be bound to an entity ID, otherwise the nodes of the system cannot accept it.

數位ID是藉由一生成演算而獲得,生成演算有許多種,比如但不限於對一數位資產進行哈希運算以獲得一哈希值、產生唯一性的URL,或將一實體ID進行哈希運算以獲得一哈希值。舉例來說,系統各節點設備的ID管理模組可設定在接受申請新的數位ID生成時,將當下的時間戳加上該節點設備所在位置的萬國碼(Unicode)進行安全雜湊演算法-512(Secure Hash Algorithm-512,SHA-512)運算。或者,依照申請順序,設定每個數位ID為一個特定位數不斷遞增的URL。甚至,可以對任何實體ID值接進行信息摘要4(Message-Digest 4,MD4)運算。這些做法,都可以確定數位ID的唯一性。 The digital ID is obtained by a generating calculation. There are many kinds of generating calculations, such as but not limited to hashing a digital asset to obtain a hash value, generating a unique URL, or hashing an entity ID Operate to obtain a hash value. For example, the ID management module of each node device in the system can be set to add the current timestamp to the universal code (Unicode) of the location of the node device to perform a secure hash algorithm when accepting an application for new digital ID generation. (Secure Hash Algorithm-512, SHA-512) operation. Or, according to the order of application, set each digital ID to a URL with a specific number of digits continuously increasing. Furthermore, it is possible to perform Message-Digest 4 (MD4) operations on any entity ID value. These practices can determine the uniqueness of the digital ID.

數位資產管理模組112可用以接收或生成一數位資產、將該數位資產歸戶至一數位ID,及將該數位ID的數位資產歸戶關係發送到各節點設備。在本發明中,數位資產可以是本系統所能取得的任何數位化資訊;本質上是證明實體的身分、特性、歸屬關係,或運作紀錄的數據,更可以是本系統使用者所產生的數據,無論其是否有無特殊意義。型態上,數位資產可以是明文、檔案、結構性資料,或者前者的加密結果。數位資產管理模組112的生成數位資產意味其可接受使用者操作而輸入數據,或是透過節點設備的其它模組來取得數據,比如透過加速規來取得移動數據。關於數位資產歸戶的意思,數位資產管理模組112可將任一數位資產藉由與特定數位ID串接,或與已與特定數位ID串接之其它數位資產串接而完成歸戶。為了對此有較佳的理解,請見圖2,該圖繪示數位資產的歸戶態樣。圖2中的各個數位資產與數位ID皆已經加密成密文,其下方的中文說明原本的資料態樣。在本例中,資料以 「%%%%」串接,並進而連接歸戶的資料。型態上,這很像區塊鏈。然而實際上,這種設定只是將相關資料與以連接成一個新的資料(可以是個檔案);其它方式,比如利用關聯性資料庫,也可達成相同的效果,只是比較麻煩。在這些資料的開端,是數位ID+綁定的實體ID(個人),比如一個用戶在本系統中申請了一個綁定他身分證號的數位ID。在運作過程中,他去某購物平台申請了使用帳號與密碼(身分認證),數位資產管理模組112將該加密的身分認證歸戶到數位ID下,也就是「將任一數位資產藉由與特定數位ID串接」。接著,該用戶在該平台上買了一個網路攝影機,前述平台發了一個數位化的購買商品證明,數位資產管理模組112再度將這筆數位資產歸戶。由於購買商品證明不是直接串接在數位ID下,也就是所謂的「與已與特定數位ID串接之其它數位資產串接」。數位資產的歸戶方式有以上兩種。再接著,由於有了購買商品證明,用戶可以為該網路攝影機在本系統中建立數位ID,進而可以成為本系統中的一個節點設備。此時的數位資產為另一個數位ID,後者包含了綁定的實體ID,比如網路攝影機的Mac Address。換句話說,數位資產中可包含一個以上之非其所歸戶數位ID的數位ID。在本例子的最後,該網路攝影機運行提所蒐集的資料也可以成為一個數位資產,繼續歸戶在個人的數位ID下。然而,網路攝影機的監視錄影檔可能很大,不必要完整記載在歸戶資料中,只要將檔名、時間戳以及網路攝影機的Mac Address記錄下來,便可以有效追蹤了。其它由網路攝影機或該用戶所蒐集或創建的數據可以陸續進行歸戶。 The digital asset management module 112 can be used to receive or generate a digital asset, assign the digital asset to a digital ID, and send the digital asset assignment relationship of the digital ID to each node device. In the present invention, digital assets can be any digital information that can be obtained by the system; in essence, it is data that proves the identity, characteristics, attribution, or operation records of an entity, and can even be data generated by users of the system , Regardless of whether it has a special meaning or not. In terms of type, digital assets can be plaintext, files, structured data, or the encrypted result of the former. The generation of digital assets by the digital asset management module 112 means that it can accept user operations to input data, or obtain data through other modules of the node device, such as obtaining mobile data through accelerometers. Regarding the meaning of digital asset return, the digital asset management module 112 can complete the return of any digital asset by connecting it with a specific digital ID or with other digital assets that have been connected with a specific digital ID. In order to have a better understanding of this, please refer to Figure 2, which shows the status of the return of digital assets. Each digital asset and digital ID in Figure 2 have been encrypted into ciphertext, and the Chinese below it shows the original data state. In this example, the data is "%%%%" is concatenated and then connected to the home data. In form, this is very similar to a blockchain. However, in fact, this setting only connects the relevant data to a new data (which can be a file); other methods, such as using a relational database, can also achieve the same effect, but it is more troublesome. At the beginning of these materials, it is a digital ID + a bound entity ID (personal). For example, a user applies for a digital ID bound to his ID number in the system. During the operation, he went to a shopping platform to apply for an account and password (identity authentication). The digital asset management module 112 assigned the encrypted identity authentication to the digital ID, that is, "use any digital asset with Connect with a specific digital ID". Then, the user bought a webcam on the platform, the aforementioned platform issued a digital purchase certificate, and the digital asset management module 112 returned the digital asset to the account again. Since the proof of purchase is not directly connected to the digital ID, it is so-called "connected to other digital assets that have been connected to a specific digital ID." There are two ways to return digital assets. Then, because of the purchase certificate, the user can create a digital ID for the network camera in the system, and then it can become a node device in the system. The digital asset at this time is another digital ID, which contains the bound entity ID, such as the Mac Address of the network camera. In other words, the digital asset may contain more than one digital ID that is not the digital ID of the household to which it belongs. At the end of this example, the data collected by the network camera can also become a digital asset, and continue to be accounted under the personal digital ID. However, the surveillance video file of a webcam may be very large, and it is not necessary to record it completely in the home data. As long as the file name, timestamp, and Mac Address of the webcam are recorded, it can be effectively tracked. Other data collected or created by the webcam or the user can be returned to the account one after another.

數位資產授權轉移模組113用以對任一數位ID設定一轉移權限、對於符合該轉移權限的特定數位ID進行指定數位資產的變換或定時授權存取,及將指定數位資產的交換或定時授權存取的結果發送到各節點設備。這 裡,轉移權限指的是具有或不具有某特定數位資產。比如,第一節點設備110是一個香菸自動販賣機,第二節點設備120是一個智慧型手機,由一個具有第一數位ID的用戶操作,以連線向香菸自動販賣機買菸。買菸有年齡限制,故香菸自動販賣機會向系統中有儲存該第一數位ID及歸戶資料的全節點設備或是該智慧型手機調取有證明該用戶年齡的證據(數位資產)。只有具有這種被限定用來證明一數位ID擁有者年紀的證據,且其滿足一定的年齡限制的數位資產才有資格買菸,就是一種以「具有某特定數位資產」設定轉移權限。反之,如果不具有某特定數位資產的轉移權限可以是該香菸自動販賣機設定找尋轉移不良紀錄的數位資產。如果一個第二數位ID歸戶了一筆以上拖欠信用卡費用計錄的數位資產,那使用該第二數位ID的擁有者就不能向香菸自動販賣進行轉移。數位資產授權轉移模組113是負責數位資產在特定的數位ID間進行交換作業的技術要件。數位資產可以分為永久性的交換(轉移)或暫時性的授權存取。一個永久性交換的例子如第三節點設備130與第四節點設備140都是本系統中的電腦,擁有虛擬幣的第三數位ID的擁有者,透過第三節點設備130將100單位的虛擬貨幣移轉給擁有虛擬幣的第四數位ID的擁有者,而後者可用第四節點設備140來確認轉移。兩台電腦中的一台可以將第三數位ID歸戶的虛擬貨幣錢包減100,並將第三數位ID歸戶的虛擬貨幣錢包加100,即完成了轉移。暫時性的授權存取的例子如第三節點設備130是一家數位足跡管理公司的伺服器,有許多用戶在瀏覽網頁的資料數據,而第四節點設備140是一家行銷公司,要某族群客戶的網路使用者習慣(數位足跡)。因此,該行銷公司的員工便可透過一銀行轉帳伺服器,將特定的金額匯給數位足跡管理公司,而擁有一定時間,比如一周,存取數位足跡管理公司的第五數位ID下歸戶所 特定的數位足跡。時間到了,第五數位ID下的數位資產沒有變動。在以往,透過入口網站等網路平台,用戶的數位足跡是免費讓大公司蒐集而產生有效的商業行為。然而,在本系統的操作下,這種數據(數位資產)可以不再是免費,可由第三方或當事人決定依價格而授權使用。最後,數位資產授權轉移模組113將指定數位資產的交換或定時授權存取的結果發送到各節點設備,這個動作是將數據以區塊鏈的記帳方式儲存其它節點設備中,如果是全節點設備就會接受,其它的節點設備得看其設定運作方式。 The digital asset authorization transfer module 113 is used to set a transfer authority to any digital ID, to perform the conversion or time authorization access to the specified digital asset for the specific digital ID that meets the transfer authority, and to authorize the exchange or time authorization of the specified digital asset The result of the access is sent to each node device. This Here, the transfer authority refers to the possession or absence of a certain digital asset. For example, the first node device 110 is a cigarette vending machine, and the second node device 120 is a smart phone, which is operated by a user with a first digital ID to buy cigarettes from the cigarette vending machine through a connection. There is an age limit for buying cigarettes, so the automatic cigarette vending machine can obtain evidence (digital assets) that proves the age of the user from a full-node device in the system that stores the first digital ID and return information or the smartphone. Only those digital assets that are restricted to prove the age of a digital ID owner and meet a certain age limit are eligible to buy cigarettes, which is a way to set the transfer authority with "a certain digital asset". Conversely, if you do not have the authority to transfer a specific digital asset, the cigarette vending machine can be set to search for digital assets with bad transfer records. If a second digital ID returns to the account more than one digital asset that is in arrears with credit card fees, the owner using the second digital ID cannot transfer to cigarette vending. The digital asset authorization transfer module 113 is a technical element responsible for the exchange of digital assets between specific digital IDs. Digital assets can be divided into permanent exchange (transfer) or temporary authorized access. An example of permanent exchange is that the third node device 130 and the fourth node device 140 are both computers in the system, and the owner of the third digital ID of the virtual currency can transfer 100 units of virtual currency through the third node device 130 Transfer to the owner who owns the fourth digital ID of the virtual currency, and the latter can use the fourth node device 140 to confirm the transfer. One of the two computers can subtract 100 from the virtual currency wallet with the third digital ID, and add 100 to the virtual currency wallet with the third digital ID to complete the transfer. An example of temporary authorized access is for example, the third node device 130 is a server of a digital footprint management company, and there are many users browsing the data data of the web, and the fourth node device 140 is a marketing company that requires a certain group of customers Internet user habits (digital footprint). Therefore, employees of the marketing company can transfer a specific amount to the digital footprint management company through a bank transfer server, and have a certain period of time, such as a week, to access the digital footprint management company’s fifth digital ID. Specific digital footprint. The time has come, and the digital assets under the fifth digital ID have not changed. In the past, through online platforms such as portals, users' digital footprints were collected for free by large companies to generate effective business activities. However, under the operation of this system, this kind of data (digital assets) can no longer be free, and can be authorized by a third party or party to decide based on the price. Finally, the digital asset authorization transfer module 113 sends the result of the designated digital asset exchange or time authorized access to each node device. This action is to store the data in other node devices in the form of blockchain accounting, if it is a full node The device will accept it, and other node devices will depend on its set operation mode.

資料儲存模組114用以儲存及在滿足轉移權限下提供全部或部分由各節點設備發送的數位ID、數位ID的數位資產歸戶關係,及指定數位資產的交換或定時授權存取的結果。也就是說,當該節點設備是全節點設備時,儲存「全部」由各節點設備發送的數位ID、數位ID的數位資產歸戶關係,及指定數位資產的交換或定時授權存取的結果;而當該節點設備是輕節點設備時,儲存「部分」由各節點設備發送的數位ID、數位ID的數位資產歸戶關係,及指定數位資產的交換或定時授權存取的結果。 The data storage module 114 is used to store and provide all or part of the digital ID, digital ID sent by each node device, and the result of the designated digital asset exchange or time authorized access under the condition that the transfer authority is satisfied. That is to say, when the node device is a full node device, it stores "all" the digital ID and the digital asset ownership relationship of the digital ID sent by each node device, and the result of the exchange of designated digital assets or the result of time authorized access; When the node device is a light node device, it stores the "part" of the digital ID and the digital asset ownership relationship sent by each node device, as well as the result of the exchange of designated digital assets or the result of time authorized access.

這裡,利用其它幾個操作例子來進一步說明本系統。 Here, use several other operating examples to further illustrate the system.

比如,第六數位ID的擁有者擁有一顆鑽石,他可將該鑽石的出售證明或發票的加密電子檔製成數位資產,歸戶到第六數位ID下。當他想賣鑽石給朋友時,只要雙方將買賣金額與鑽石過戶後,將該數位資產由第六數位ID轉移到該朋友所擁有的第七數位ID下,本系統所有的節點設備便可隨時提出該筆轉移的證據。甚至,銀樓可以透過一台設備(如伺服器)加入本系統,查看該證明鑽石所有權易手的數位資產,來確定該朋友拿來轉賣的鑽石是否是盜取的,以保實體轉移安全。 For example, if the owner of the sixth-digit ID owns a diamond, he can turn the encrypted electronic file of the sales certificate or invoice of the diamond into a digital asset and return it to the sixth-digit ID. When he wants to sell a diamond to a friend, as long as the two parties transfer the transaction amount to the diamond and transfer the digital asset from the sixth digital ID to the seventh digital ID owned by the friend, all the node devices in this system can be at any time Present evidence of the transfer. In addition, Yinlou can join the system through a device (such as a server) to check the digital asset that proves the ownership of the diamond to change hands to determine whether the diamond resold by the friend is stolen, so as to ensure the security of the physical transfer.

又如某位用戶甲在購買了一台個人電腦(如第一節點設備110)後,將該個人電腦聯上本系統,作為新的節點設備。用戶甲為一法人,使用它的公司大小章圖印作為身分資料,購買證明發票(寫有其公司名與相關個資)掃描本的加密檔案作為數位資產,歸戶在該公司所屬的第八數位ID下。這資料除了會存在個人電腦外,同時儲存在系統專用伺服器(比如第三節點設備130)及一入口網站伺服器叢集(比如第四節點設備140)中。作為節點設備,個人電腦可以供任何人在對方允許的條件下,訪問系統中的各節點設備。另一位用戶乙在購買了一台智慧型手機(比如第二節點設備120)後,將該智慧型手機聯上系統,作為另一新增節點設備。用戶乙為一自然人,具有一第九數位ID。當個人電腦超過公司的使用年限,而用戶乙想要買一台同款的個人電腦時,本系統可以做為轉移的平台與證明。其作法是用戶乙與用戶甲談好,匯一筆金額到用戶甲的指定帳戶並將收據製成數位資產,由智慧型手機發出數位資產轉移,同時用戶甲將個人電腦的數位資產歸戶到用戶乙的第九數位ID下;如有需要,可同時附上資產轉讓證明的另一數位資產。用戶甲與用戶乙的數位資產轉移完成後,其數位資產轉移的紀錄除分別紀錄於個人電腦及智慧型手機270中,並同步儲存於系統專用伺服器及入口網站伺服器叢集中。當用戶乙要去向用戶甲拿個人電腦來使用時,用戶甲必須履行,因為所有的轉移資料都寫在節點設備中,可以調用為解決民事糾紛的證據。這是一種以數位資產進行實體資產轉移的應用。 Another example is that after a user A purchases a personal computer (such as the first node device 110), he connects the personal computer to the system as a new node device. User A is a legal person and uses its company's seal and seal as identification information, and the encrypted file of the scanned copy of the purchase certificate invoice (with its company name and related personal information) is used as a digital asset, and the account belongs to the company's eighth Under the digital ID. In addition to the personal computer, this data is also stored in the system dedicated server (such as the third node device 130) and a portal server cluster (such as the fourth node device 140). As a node device, a personal computer can allow anyone to access each node device in the system with the permission of the other party. Another user B, after purchasing a smart phone (such as the second node device 120), connects the smart phone to the system as another new node device. User B is a natural person with a ninth digit ID. When the personal computer exceeds the company's service life, and user B wants to buy a personal computer of the same model, this system can be used as a platform and proof of transfer. The method is that User B negotiates with User A, transfers an amount to User A’s designated account and converts the receipt into a digital asset. The smartphone sends the digital asset transfer, and User A returns the digital assets of the personal computer to the user. Under the ninth digital ID of B; if necessary, another digital asset with the asset transfer certificate can be attached at the same time. After the digital asset transfer of user A and user B is completed, the records of their digital asset transfer are recorded in the personal computer and smart phone 270 respectively, and simultaneously stored in the system dedicated server and the portal server cluster. When user B wants to use a personal computer from user A, user A must do so, because all the transferred data are written in the node device, which can be used as evidence for resolving civil disputes. This is an application that uses digital assets to transfer physical assets.

另一個例子是若第一節點設備110為一個Wi-Fi分享器,其帳號密碼是用戶丙的數位資產,已儲存於Wi-Fi分享器與系統專用伺服器(比如第二節點設備120)中。用戶丙另外購買了一台網路監視器(比如第三節點設備 130),依據購買證明的紀錄,比如發票,來建立網路監視器的數位ID。網路監視器需透過Wi-Fi分享器聯網,透過系統中驗證同是用戶丙的資產,歸戶於第十數位ID。在數位資產授權後,網路監視器250可直接取得Wi-Fi分享器240的權限聯網,無須透過轉移網路監視器的模式,以手動或其它遠端設定的方式將Wi-Fi分享器的密碼輸入網路監視器中。可行的是,用戶丙若過世,想要將他所有的節點設備與數位資產交由其兒子繼承,只要將他對所有實體財產的繼承證明,比如遺書與見證人證明文件,的數位資產,移轉歸戶到其兒子的第十一數位ID,其相關實體的所有權可以很輕易又安全地完成移轉。 Another example is if the first node device 110 is a Wi-Fi sharing device, and its account password is the digital asset of user C, which has been stored in the Wi-Fi sharing device and the system dedicated server (such as the second node device 120) . User C bought another network monitor (such as the third node device 130), based on the record of the proof of purchase, such as the invoice, to create the digital ID of the network monitor. The network monitor needs to connect to the Internet through a Wi-Fi sharer, and verify that it is the same user C’s asset in the system, which is assigned to the tenth digital ID. After the digital asset is authorized, the network monitor 250 can directly obtain the permission of the Wi-Fi sharer 240 to connect to the Internet. There is no need to transfer the mode of the network monitor to manually or other remote settings. The password is entered in the network monitor. It is feasible that if the user passes away and wants to hand over all his node equipment and digital assets to his son to inherit, he only needs to transfer all his physical property inheritance certificates, such as suicide notes and witness documents, and digital assets. The transfer of ownership to the eleventh digit ID of the transferred household to his son can be easily and safely completed.

再一個例子是用戶丁擁有一台電動車(如第一節點設備110),需藉由一智能充電樁(如第二節點設備120)充電。用戶丁的電動車可在加入系統後,在某個由智能充電樁設定的授權條件下,將用戶丁的某個數位資產轉移給智能充電樁(不一定透過智能充電樁,可能經由其它節點設備),換得一段時間內可以來充10度電的服務。上述的授權條件可也依照用戶間的實際需求而設定來取得授權,比如某種社交關係鏈結、使用費用、時間、位置資訊、物件距離...等等。但其前提是都需要為本系統中的數位資產。 Another example is that the user D owns an electric vehicle (such as the first node device 110) and needs to be charged by a smart charging pile (such as the second node device 120). After joining the system, user D’s electric vehicle can transfer a certain digital asset of user D to the smart charging pile under certain authorization conditions set by the smart charging pile (not necessarily through the smart charging pile, but may be through other node equipment ), in exchange for a service that can charge 10 kWh within a period of time. The above authorization conditions can also be set according to actual needs between users to obtain authorization, such as a certain social relationship link, usage fee, time, location information, object distance... etc. But the premise is that all need to be digital assets in the system.

雖然本發明已以實施例揭露如上,然其並非用以限定本發明,任何所屬技術領域中具有通常知識者,在不脫離本創作之精神和範圍內,當可作些許之更動與潤飾,因此本發明之保護範圍當視後附之申請專利範圍所界定者為準。 Although the present invention has been disclosed in the above embodiments, it is not intended to limit the present invention. Anyone with ordinary knowledge in the relevant technical field can make some changes and modifications without departing from the spirit and scope of this creation. Therefore, The scope of protection of the present invention shall be subject to those defined by the attached patent scope.

111:ID管理模組 111: ID management module

112:數位資產管理模組 112: Digital Asset Management Module

113:數位資產授權轉移模組 113: Digital Asset Authorization Transfer Module

114:資料儲存模組 114: Data Storage Module

110:第一節點設備 110: The first node device

120:第二節點設備 120: second node device

130:第三節點設備 130: third node device

140:第四節點設備 140: The fourth node device

Claims (7)

一種以分散式帳本技術建立數位身分及進行數位資產授權與轉移的系統,包含了複數個節點設備,每一節點設備可透過網路與其它節點設備直接或間接聯通,以收發數據並形成一區塊鏈架構,其特徵在於:每一節點設備包含:一ID管理模組,用以生成綁定一實體ID的數位ID,及將該數位ID發送到各節點設備;一數位資產管理模組,用以接收或生成一數位資產、將該數位資產歸戶至一數位ID,及將該數位ID的數位資產歸戶關係發送到各節點設備;一數位資產授權轉移模組,用以對任一數位ID設定一轉移權限、對於符合該轉移權限的特定數位ID進行指定數位資產的變換或定時授權存取,及將指定數位資產的交換或定時授權存取的結果發送到各節點設備;及一資料儲存模組,用以儲存及在滿足轉移權限下提供全部或部分由各節點設備發送的數位ID、數位ID的數位資產歸戶關係,及指定數位資產的交換或定時授權存取的結果,其中數位ID藉由對一數位資產進行哈希運算、產生唯一性的URL,或將一實體ID進行哈希運算而獲得;任一數位資產藉由與特定數位ID串接,或與已與特定數位ID串接之其它數位資產串接而完成歸戶。 A system that uses distributed ledger technology to establish digital identities and authorize and transfer digital assets. It includes multiple node devices. Each node device can directly or indirectly communicate with other node devices through the network to send and receive data and form a unit. The blockchain architecture is characterized in that: each node device includes: an ID management module for generating a digital ID bound to a physical ID, and sending the digital ID to each node device; a digital asset management module , Used to receive or generate a digital asset, return the digital asset to a digital ID, and send the digital asset return relationship of the digital ID to each node device; a digital asset authorization transfer module for any A digital ID sets a transfer authority, performs conversion of designated digital assets or time authorization access to a specific digital ID that meets the transfer authorization, and sends the results of the exchange of designated digital assets or time authorization access to each node device; and A data storage module used to store and provide all or part of the digital ID and digital ID sent by each node device under the account of the digital asset ownership relationship, and the result of the exchange of designated digital assets or the result of time authorized access , Where the digital ID is obtained by hashing a digital asset, generating a unique URL, or hashing a physical ID; any digital asset is obtained by concatenating with a specific digital ID, or with Other digital assets connected with a specific digital ID are connected to complete the return. 如申請專利範圍第1項所述之系統,其中當對一數位資產進行哈希運算時,ID管理模組將當下的時間戳加上該節點設備所在位置的萬國碼進行SHA-512運算;當產生唯一性的URL時,ID管理模組依照申請順序設定每個數 位ID為一個特定位數不斷遞增的URL;當將一實體ID進行哈希運算時,ID管理模組對任何實體ID值進行MD4運算。 For example, in the system described in item 1 of the scope of patent application, when a digital asset is hashed, the ID management module adds the current timestamp to the universal code of the node device to perform SHA-512 operation; When generating a unique URL, the ID management module sets each number in the order of application The bit ID is a URL with an increasing number of specific digits; when an entity ID is hashed, the ID management module performs MD4 operation on any entity ID value. 如申請專利範圍第1項所述之系統,其中該實體ID為特定機關為證實特定人之身分所核發、網路平台為區分用戶身分及權限而註冊生成或對實體物品認證文件進行加密而形成之網域位置或亂碼。 For example, the system described in item 1 of the scope of patent application, wherein the entity ID is issued by a specific agency to verify the identity of a specific person, and the network platform is registered to generate or encrypt the physical item authentication document to distinguish the user's identity and authority. The domain location or garbled characters. 如申請專利範圍第1項所述之系統,其中該些數位資產中包含一個以上之非其所歸戶數位ID的數位ID。 For the system described in item 1 of the scope of patent application, the digital assets contain more than one digital ID that is not the digital ID of the household to which they belong. 如申請專利範圍第1項所述之系統,其中該轉移權限為具有或不具有某特定數位資產。 For example, the system described in item 1 of the scope of patent application, wherein the transfer authority is with or without a certain digital asset. 如申請專利範圍第1項所述之系統,其中該區塊鏈架構符合IOTA、Ethereum或Bitcoin分散式帳本運作規範。 Such as the system described in item 1 of the scope of patent application, where the blockchain architecture complies with IOTA, Ethereum or Bitcoin distributed ledger operation specifications. 如申請專利範圍第1項所述之系統,其中該數位資產包含用戶數位行為足跡、身份資格證明或實體資產證明。For example, in the system described in item 1 of the scope of patent application, the digital asset includes the user's digital behavior footprint, identity certificate or physical asset certificate.
TW107137731A 2018-10-25 2018-10-25 System for creating digital identities and processing digital assets authorization and transaction using distributed ledger technology TWI702552B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
TW107137731A TWI702552B (en) 2018-10-25 2018-10-25 System for creating digital identities and processing digital assets authorization and transaction using distributed ledger technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
TW107137731A TWI702552B (en) 2018-10-25 2018-10-25 System for creating digital identities and processing digital assets authorization and transaction using distributed ledger technology

Publications (2)

Publication Number Publication Date
TW202016832A TW202016832A (en) 2020-05-01
TWI702552B true TWI702552B (en) 2020-08-21

Family

ID=71895617

Family Applications (1)

Application Number Title Priority Date Filing Date
TW107137731A TWI702552B (en) 2018-10-25 2018-10-25 System for creating digital identities and processing digital assets authorization and transaction using distributed ledger technology

Country Status (1)

Country Link
TW (1) TWI702552B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105959307A (en) * 2016-06-30 2016-09-21 中国科学院计算技术研究所 Existence certification and authentication service method and system based on block chain technology
US9635000B1 (en) * 2016-05-25 2017-04-25 Sead Muftic Blockchain identity management system based on public identities ledger
CN108306887A (en) * 2018-02-05 2018-07-20 徐正伟 Internet of Things safety based on block chain protects system with data-privacy
TWI632507B (en) * 2017-06-03 2018-08-11 蔡政育 Product traceability code outputting system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9635000B1 (en) * 2016-05-25 2017-04-25 Sead Muftic Blockchain identity management system based on public identities ledger
CN105959307A (en) * 2016-06-30 2016-09-21 中国科学院计算技术研究所 Existence certification and authentication service method and system based on block chain technology
TWI632507B (en) * 2017-06-03 2018-08-11 蔡政育 Product traceability code outputting system
CN108306887A (en) * 2018-02-05 2018-07-20 徐正伟 Internet of Things safety based on block chain protects system with data-privacy

Also Published As

Publication number Publication date
TW202016832A (en) 2020-05-01

Similar Documents

Publication Publication Date Title
Yu et al. Blockchain-based solutions to security and privacy issues in the internet of things
CN112132198B (en) Data processing method, device and system and server
CN109544331B (en) Supply chain financial application method and device based on block chain, terminal equipment and storage medium
EP2695354B1 (en) Method and system for authenticating entities by means of terminals
CN109074434A (en) Method and system for verifying ownership of digital assets using distributed hash tables and point-to-point distributed ledgers
KR20180114942A (en) Method and system for protecting computer software using distributed hash tables and block chains
CN111723060B (en) Blacklist data sharing method and system based on blockchain
CN105989295A (en) Data system and method
CN108650328A (en) The block catenary system of data information record and storage in a kind of cloud service platform
CN115811412B (en) Communication method and device, SIM card, electronic equipment and terminal equipment
Xu et al. PPM: a provenance-provided data sharing model for open banking via blockchain
Kwame et al. V-chain: A blockchain-based car lease platform
CN110599342A (en) Block chain-based identity information authorization method and device
Zhao et al. Blockchain-Enabled Digital Rights Management for Museum-Digital Property Rights.
Huang et al. Building private blockchains over public blockchains (PoP) an attribute-based access control approach
Sun et al. FADSF: A Data Sharing Model for Intelligent Connected Vehicles Based on Blockchain Technology.
CN113704712B (en) Identity authentication method, device, system and electronic device
CN110365730A (en) Air quality information sharing method and device
TWI702552B (en) System for creating digital identities and processing digital assets authorization and transaction using distributed ledger technology
Pérez‐Solà et al. BArt: Trading digital contents through digital assets
CN108711095A (en) A kind of shared resource system and method based on block chain technology
CN115186291A (en) Block chain-based vehicle information processing method and related equipment
CN102833239A (en) Method for implementing nesting protection of client account information based on network identity
CN117910031B (en) Data query method, device, non-volatile storage medium and electronic device
CN118585991B (en) Data processing method, device, equipment and storage medium