Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Block chain technology-based storage method and computer readable storage medium

A block chain technology technology, applied in the field of computer-readable storage media, servers, and storage methods based on block chain technology, can solve problems such as obtaining private keys, difficulty in obtaining private keys, and inability to trade account funds, etc., to achieve good results Effect of management and improvement of convenience

Inactive Publication Date: 2018-07-17
张天
View PDF7 Cites 17 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] Based on the ledger information data of the block chain, basically the holder of the ledger keeps the account digital information of the ledger. Usually, the private key corresponding to the account digital information uses an elliptic curve digital signature algorithm to form a public key, and the public key is hashed. A string of numbers is generated by transforming and adding a checksum, usually a 33- or 34-bit Base58 encoded character, for example: 16UwLL9Rise7QfpqBuNnkofHmBQ7WMTJVm, the reason for using Base58 encoded characters is to minimize the length of the account, and put uppercase and lowercase English letters And numbers (except for confusing numbers 0, uppercase O, uppercase I, and lowercase i) are used to represent numbers. This account becomes the address of the ledger, and users need to use it to accept funds from others or send funds to others. This address, in addition, the holder of the ledger also needs to hold the private key corresponding to the public key. The private key can obtain the information recorded in the ledger or trade the funds stored in the account. Usually the private key is the only one held by the ledger. Once the private key is lost, there is no way to obtain the private key by "resetting", and then the funds in the ledger cannot be traded. In order to improve the security of the private key of the ledger, some account holders will The private key file is backed up on other devices, such as U disk, mobile hard disk, etc., and then the backup device is stored in a safe place. When the private key is lost or the file is damaged, the data can be recovered by backing up the private key, but In the case that the backup file is also unavailable, it is still difficult to obtain the private key
In addition, for the inheritance of digital assets after the death of a natural person, there is no way at this stage. After the accidental death of a natural person, the heir will verify the relationship between himself and the natural person in the blockchain, which will lead to the permanent disappearance of the digital asset and seriously infringe on the heir’s rights. legal rights

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Block chain technology-based storage method and computer readable storage medium
  • Block chain technology-based storage method and computer readable storage medium
  • Block chain technology-based storage method and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0029] figure 1 It is a flowchart of a storage method based on blockchain technology in Embodiment 1 of the present invention. This embodiment is applicable to the storage of any electronic data. The method can be executed by an independent storage device, and can also be configured in a server for application. Such as figure 1 As shown, the method can be applied to new blockchains as well as established blockchains, including:

[0030] Step S110, establishing a mapping relationship between digital life units and verification accounts; digital life can also be called siliconized life, which is a new life form created by electronic media such as computers, and is a digital life with natural life characteristics or behaviors. system, the digital life unit at least includes identity information and biometric information corresponding to the digital life source. The verification account includes at least identity information and social data of the account creator.

[0031] Sch...

Embodiment 2

[0043] The first embodiment above can establish various relationships between the digital life unit and the verification account, and between the verification accounts. Based on the above relationship, the user can avoid being unable to read or operate the verification account due to the loss of the key. The result is still Only the account holder can read or operate the verification account, but if the account holder is insane or unable to read the account for other objective reasons, the verification account of the holder still cannot be verified. enabled. Based on this, if figure 2 As shown, the present invention further provides a storage method based on block chain technology, specifically:

[0044] Step S210, establishing a mapping relationship between digital life units and verification accounts; digital life can also be called siliconized life, which is a new life form created by electronic media such as computers, and is a digital life with natural life characterist...

Embodiment 3

[0052] The second embodiment above solves the technical problem that the account holder's verification account cannot be activated when the account holder is insane or unable to read the account due to other objective reasons. The solution is to trigger When the time is verified as true, execute the smart contract that matches the trigger event, but there is still a technical problem in this technical solution, that is, the states of at least two smart contracts that match the trigger time Under this circumstance, smart contracts cannot be executed in an orderly manner.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of block chain storage, and in particular to a block chain technology-based storage method, a server and computer readable storage medium. The block chaintechnology-based storage method comprises the following steps of: establishing a mapping relationship between digital life units and verification accounts; and updating association relationships between the verification accounts on the basis of the mapping relationship. The step of updating the association relationships between the verification accounts aims at establishing association relationships matched with the accounts for the accounts; and if a secret key of a certain verification account is lost, the verification account can be verified and read on the basis of the association relationship and / or the mapping relationship, and data information between the account and associated accounts can be directly re-updated on the basis of the association relationship and / or the mapping relationship, so that data loss is not caused by secret key loss, and the using convenience of the block chain technology is improved.

Description

technical field [0001] The present invention relates to the technical field of blockchain storage, in particular to a storage method, server, and computer-readable storage medium based on blockchain technology. Background technique [0002] Based on the ledger information data of the block chain, basically the holder of the ledger keeps the account digital information of the ledger. Usually, the private key corresponding to the account digital information uses an elliptic curve digital signature algorithm to form a public key, and the public key is hashed. A string of numbers is generated by transforming and adding a checksum, usually a 33- or 34-bit Base58 encoded character, for example: 16UwLL9Rise7QfpqBuNnkofHmBQ7WMTJVm, the reason for using Base58 encoded characters is to minimize the length of the account, and put uppercase and lowercase English letters And numbers (except for confusing numbers 0, uppercase O, uppercase I, and lowercase i) are used to represent numbers....

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06Q20/38G06Q20/40
CPCG06Q20/3829G06Q20/4014
Inventor 张天
Owner 张天
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products