Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Credit authorization method for digital assets

A technology of digital assets and assets, applied in the field of information security, to achieve the effect of authentically verifying fraudulent behaviors and eliminating fraudulent behaviors

Active Publication Date: 2021-03-12
江苏大周基业智能科技有限公司
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, the security issues in the credit authorization process and the traceability of digital assets after multiple credit authorizations need to be resolved urgently

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Credit authorization method for digital assets
  • Credit authorization method for digital assets
  • Credit authorization method for digital assets

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0030] The technical solution of the present invention will be further elaborated below in conjunction with the description of the drawings and specific embodiments.

[0031] Firstly, the relevant parties involved in the method of the present invention are defined.

[0032] The present invention defines the relevant parties of the method as follows:

[0033] 1. Related parties of digital assets

[0034] Let A represent the owner group (or collection) of digital assets with data correlation, which is identified by a sequence / matrix, and A[i] is the owner of the i-th inherited digital asset. Then in the present invention, A[i], i∈[1, 2, 3, ... P-1]) is the collection of all digital assets of the i-th owner, and i is incremental data, generating i=0 of the original data, and the successor of the digital asset who inherits the data and may process the data is i+1. P is the number of all owners who form the digital asset process.

[0035] The credit authorization conditions are...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a credit granting authorization method for digital assets, which comprises the following steps that: enabling a digital asset owner to digitally sign the digital assets and confirms a successor and an inheritance condition; when the successor meets the inheritance condition, encrypting the acquired digital assets by using a public key of the successor to form an encrypteddata packet, and sending a public credit request to a public credit party; and the public trust party performs timestamp service on the encrypted data packet and generates a public trust identification code and a public trust verification code, and the digital asset owner verifies the public trust verification code to complete credit granting authorization. Authority, transferability, traceabilityand trusted identity recognition between any nodes of the topological structure space of the digital assets can be achieved, and therefore fidelity verification of the digital assets is achieved, andvarious spoofing behaviors are eradicated.

Description

technical field [0001] The invention belongs to the technical field of information security, and in particular relates to a credit authorization method for digital assets. Background technique [0002] Digital assets refer to various account numbers / passwords, electronic documents, tables, data, relationship tables, etc. owned by the owners of digital assets, which store electronic information data representing a certain meaning in real or virtual life in electronic physical carriers. middle. The inheritance and transfer of credit authorization of digital assets refers to the process in which the owner of digital assets determines who can accept the credit authorizer and the credit, the scope of authorization, and the transfer of some assets or all assets, and assumes responsibility for the results of the set credit authorization. The security issues in the credit authorization process and the traceability of digital assets after multiple credit authorizations need to be re...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/60G06F21/62G06F21/64
CPCG06F21/602G06F21/6245G06F21/64
Inventor 顾峻
Owner 江苏大周基业智能科技有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products