HK40008495B - Method and related apparatus for processing information in inheritance transfer of digital asset certificate - Google Patents
Method and related apparatus for processing information in inheritance transfer of digital asset certificate Download PDFInfo
- Publication number
- HK40008495B HK40008495B HK19132332.8A HK19132332A HK40008495B HK 40008495 B HK40008495 B HK 40008495B HK 19132332 A HK19132332 A HK 19132332A HK 40008495 B HK40008495 B HK 40008495B
- Authority
- HK
- Hong Kong
- Prior art keywords
- node
- personal security
- security kernel
- heir
- digital asset
- Prior art date
Links
Description
技术领域Technical Field
本公开涉及用户身份信息技术领域,具体涉及一种数字资产凭证继承转移中的信息处理方法、司法机构节点和计算机程序介质。The present disclosure relates to the field of user identity information technology, and in particular to an information processing method, a judicial institution node, and a computer program medium in the inheritance and transfer of digital asset certificates.
背景技术Background Art
在现实生活中,资产转移往往是依据实物资产凭证进行。随着互联网的普及,越来越多的数字资产凭证以更快的速度在互联网上流转。例如,人们在购买理财产品时,由于实时性很高,交易所已经不再缺省提供实物凭证。资产的保存和转移往往需要登录不同的资产发行网站或者交易网站,个人用户难以对越来越多的数字资产凭证进行集中管理。而且,这些数字资产凭证很容易随着用户的生命周期结束(如离世)而丢失。例如,用户离世后,其资产不被人所知,导致继承人无法依法继承或者找回资产凭证。典型的例子是,因QuadrigaCX交易所创始人意外病故,导致价值约1.47亿美元的数字货币无法取出的事件。In real life, asset transfers are often based on physical asset certificates. With the increasing popularity of the internet, an increasing number of digital asset certificates are circulating online at an ever-increasing rate. For example, when people purchase financial products, exchanges no longer provide physical certificates by default due to the high real-time nature of transactions. Saving and transferring assets often requires logging into various asset issuance or trading websites, making it difficult for individual users to centrally manage a growing number of digital asset certificates. Furthermore, these digital asset certificates can be easily lost at the end of a user's lifecycle (e.g., through death). For example, after a user's death, their assets become unknown, making it impossible for heirs to inherit or recover the certificates according to law. A typical example is the unexpected illness of the founder of the QuadrigaCX exchange, which resulted in the inability to withdraw approximately $147 million worth of digital currency.
现有技术中,缺少一种信息处理技术,能够对用户的数字资产凭证进行统一的管理,使得即使在用户生命周期结束时,相关的与其身份有关的数字资产凭证仍然能顺利转接。The existing technology lacks an information processing technology that can uniformly manage users' digital asset certificates, so that even at the end of the user's life cycle, the relevant digital asset certificates related to their identity can still be smoothly transferred.
发明内容Summary of the Invention
本公开的一个目的在于提出一种信息处理技术,能够对用户的数字资产凭证进行统一的维护,使得即使在用户生命周期结束时,相关的数字资产凭证仍然能自动安全转移到继承人。One purpose of the present disclosure is to propose an information processing technology that can uniformly maintain a user's digital asset credentials so that even at the end of the user's life cycle, the relevant digital asset credentials can still be automatically and securely transferred to the heir.
根据本公开实施例的一方面,公开了一种数字资产凭证继承转移中的信息处理方法,所述方法由司法机构节点执行,所述方法包括:According to one aspect of an embodiment of the present disclosure, a method for processing information in the inheritance and transfer of digital asset certificates is disclosed. The method is executed by a judicial institution node, and the method includes:
确定用户的生命周期结束;Determine the end of the user's lifecycle;
获取用户的遗嘱,所述遗嘱包括用户个人安全内核节点的标识、各继承人个人安全内核节点的标识、各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名、所述遗嘱用司法机构节点公钥进行的签名;Obtaining the user's will, which includes the identifier of the user's personal security kernel node, the identifier of each heir's personal security kernel node, the signature of each digital asset certificate using the public key of the corresponding heir's personal security kernel node, and the signature of the will using the public key of the judicial institution's node;
如果对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥进行签名验证成功,触发向所述遗嘱中的各继承人个人安全内核节点的标识的继承人个人安全内核节点,发送所述遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,以便所述继承人个人安全内核节点对该签名,用所述继承人个人安全内核节点的私钥解密,得到数字资产凭证的摘要,根据得到的数字资产凭证的摘要,得到继承的数字资产凭证。If the will is signed with the public key of the judicial institution node and the signature verification is successful with the private key of the judicial institution node, it triggers the heir's personal security kernel node identified by each heir in the will to send the signature of each digital asset certificate in the will with the public key of the corresponding heir's personal security kernel node, so that the heir's personal security kernel node decrypts the signature with the private key of the heir's personal security kernel node to obtain the summary of the digital asset certificate, and obtains the inherited digital asset certificate based on the obtained summary of the digital asset certificate.
根据本公开实施例的一方面,公开了一种司法机构节点,包括:According to one aspect of an embodiment of the present disclosure, a judicial institution node is disclosed, including:
生命周期结束确定单元,用于确定用户的生命周期结束;A lifecycle end determination unit, used to determine the end of a user's lifecycle;
遗嘱获取单元,用于获取用户的遗嘱,所述遗嘱包括用户个人安全内核节点的标识、各继承人个人安全内核节点的标识、各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名、所述遗嘱用司法机构节点公钥进行的签名;A will acquisition unit, configured to acquire a user's will, the will including the identifier of the user's personal security kernel node, the identifier of each heir's personal security kernel node, the signature of each digital asset certificate using the public key of the corresponding heir's personal security kernel node, and the signature of the will using the public key of the judicial institution's node;
数字资产凭证签名发送单元,用于如果对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥进行签名验证成功,触发向所述遗嘱中的各继承人个人安全内核节点的标识的继承人个人安全内核节点,发送所述遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,以便所述继承人个人安全内核节点对该签名,用所述继承人个人安全内核节点的私钥解密,得到数字资产凭证的摘要,根据得到的数字资产凭证的摘要,得到继承的数字资产凭证。The digital asset certificate signature sending unit is used to trigger the heir's personal security kernel node identified by each heir's personal security kernel node in the will to send the signature of each digital asset certificate in the will using the public key of the corresponding heir's personal security kernel node if the signature of the will using the public key of the judicial institution node is successfully verified using the private key of the judicial institution node, so that the heir's personal security kernel node can decrypt the signature using the private key of the heir's personal security kernel node to obtain the summary of the digital asset certificate, and obtain the inherited digital asset certificate based on the obtained summary of the digital asset certificate.
根据本公开实施例的一方面,公开了一种司法机构节点,包括:存储器,存储有计算机可读指令;处理器,读取存储器存储的计算机可读指令,以执行如上所述的方法。According to one aspect of an embodiment of the present disclosure, a judicial institution node is disclosed, including: a memory storing computer-readable instructions; and a processor reading the computer-readable instructions stored in the memory to execute the method described above.
根据本公开实施例的一方面,公开了一种计算机程序介质,其上存储有计算机可读指令,当所述计算机可读指令被计算机的处理器执行时,使计算机执行如上所述的方法。According to one aspect of an embodiment of the present disclosure, a computer program medium is disclosed, on which computer-readable instructions are stored. When the computer-readable instructions are executed by a processor of a computer, the computer is caused to execute the method described above.
本公开实施例中,用户的数字资产凭证维护在用户的个人安全内核节点中。继承人也有继承人个人安全内核节点,维护继承人的数字资产凭证。用户在生命周期期间会立有遗嘱,遗嘱中包括各继承人个人安全内核节点的标识,还有各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名、所述遗嘱用司法机构节点公钥进行的签名。当司法机构节点确定用户生命周期结束后,获取用户的遗嘱,用自己的私钥对遗嘱中用司法机构节点公钥进行的签名进行验证。如果验证成功,说明自己就是用户生前指定执行继承首先的司法机构节点。然后,司法机构节点触发把遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名发给相应继承人个人安全内核节点,只有真正的继承人个人安全内核节点采用继承人个人安全内核节点的私钥,能够解开该签名,获得继承的数字资产凭证。整个继承过程由机器自动执行,且由用司法机构节点公钥对遗嘱进行的签名来保证执行继承手续的第三方司法机构节点的可靠性,通过将数字资产凭证用继承人个人安全内核节点的公钥签名来保证只有真正的继承人才能解签名,保证继承过程中数字资产凭证的安全性,使得即使在用户生命周期结束时,相关的数字资产凭证仍然能自动安全转移到继承人。In the disclosed embodiment, a user's digital asset certificates are maintained in their personal security kernel node. Heirs also have their own personal security kernel node, which maintains their digital asset certificates. During their lifecycle, users may create a will. The will includes the identifier of each heir's personal security kernel node, as well as a signature of each digital asset certificate using the public key of the corresponding heir's personal security kernel node, and the signature of the will using the public key of the judicial authority node. When the judicial authority node determines that the user's lifecycle has ended, it obtains the user's will and verifies the signature in the will using the judicial authority node's public key using its own private key. If the verification is successful, it indicates that it is the judicial authority node designated by the user to execute the inheritance. The judicial authority node then triggers the transmission of the signatures of each digital asset certificate in the will using the public key of the corresponding heir's personal security kernel node to the corresponding heir's personal security kernel node. Only the true heir's personal security kernel node, using the heir's personal security kernel node's private key, can decrypt the signatures and obtain the inherited digital asset certificates. The entire inheritance process is automatically executed by the machine, and the reliability of the third-party judicial institution node that executes the inheritance procedures is guaranteed by signing the will with the public key of the judicial institution node. By signing the digital asset certificate with the public key of the heir's personal security kernel node, it is ensured that only the real heir can decrypt the signature, ensuring the security of the digital asset certificate during the inheritance process. Even at the end of the user's life cycle, the relevant digital asset certificate can still be automatically and securely transferred to the heir.
本公开的其他特性和优点将通过下面的详细描述变得显然,或部分地通过本公开的实践而习得。Other features and advantages of the present disclosure will become apparent from the following detailed description, or may be learned in part by practice of the present disclosure.
应当理解的是,以上的一般描述和后文的细节描述仅是示例性的,并不能限制本公开。It should be understood that the foregoing general description and the following detailed description are exemplary only and are not restrictive of the present disclosure.
附图说明BRIEF DESCRIPTION OF THE DRAWINGS
通过参照附图详细描述其示例实施例,本公开的上述和其它目标、特征及优点将变得更加显而易见。The above and other objects, features and advantages of the present disclosure will become more apparent by describing in detail example embodiments thereof with reference to the attached drawings.
图1A-B示出了根据本公开一个实施例的数字资产凭证继承转移中的信息处理方法应用的系统构架图,其中,图1A是简略的系统构架图,图1B是在图1A的基础上对个人安全内核节点细化后的系统构架图。Figures 1A-B show a system architecture diagram of the application of the information processing method in the inheritance and transfer of digital asset certificates according to an embodiment of the present disclosure, wherein Figure 1A is a simplified system architecture diagram, and Figure 1B is a system architecture diagram after refining the personal security kernel node based on Figure 1A.
图2A-K示出了根据本公开一个实施例的数字资产凭证继承转移中的信息处理方法应用在用户离世后数字资产凭证继承的应用场景下的界面图。2A-K illustrate interface diagrams of an information processing method for digital asset certificate inheritance and transfer according to an embodiment of the present disclosure, applied in an application scenario of digital asset certificate inheritance after a user passes away.
图3示出了根据本公开一个实施例的数字资产凭证继承转移中的信息处理方法的流程图。FIG3 shows a flowchart of a method for processing information in the inheritance and transfer of digital asset certificates according to an embodiment of the present disclosure.
图4示出了根据本公开一个实施例的验证遗嘱中用司法机构节点公钥对遗嘱进行的签名的具体流程图。FIG4 shows a specific flow chart of verifying the signature of a will using the public key of a judicial institution node according to an embodiment of the present disclosure.
图5示出了根据本公开一个实施例的数字资产凭证继承转移中的信息处理方法的流程图。FIG5 shows a flowchart of a method for processing information in inheritance and transfer of digital asset certificates according to an embodiment of the present disclosure.
图6示出了根据本公开一个实施例的遗嘱的生成过程流程图。FIG6 shows a flow chart of a process for generating a will according to an embodiment of the present disclosure.
图7示出了根据本公开一个实施例的遗嘱的更新过程流程图。FIG7 shows a flow chart of a will updating process according to an embodiment of the present disclosure.
图8示出了根据本公开一个实施例的遗嘱的更新过程流程图。FIG8 shows a flow chart of a will update process according to an embodiment of the present disclosure.
图9示出了根据本公开一个实施例的司法机构节点的框图。FIG9 shows a block diagram of a judicial institution node according to one embodiment of the present disclosure.
图10示出了根据本公开一个实施例的司法机构节点的硬件图。FIG10 shows a hardware diagram of a judicial institution node according to one embodiment of the present disclosure.
具体实施方式DETAILED DESCRIPTION
现在将参考附图更全面地描述示例实施方式。然而,示例实施方式能够以多种形式实施,且不应被理解为限于在此阐述的范例;相反,提供这些示例实施方式使得本公开的描述将更加全面和完整,并将示例实施方式的构思全面地传达给本领域的技术人员。附图仅为本公开的示意性图解,并非一定是按比例绘制。图中相同的附图标记表示相同或类似的部分,因而将省略对它们的重复描述。Example embodiments will now be described more fully with reference to the accompanying drawings. However, example embodiments can be implemented in a variety of forms and should not be construed as limited to the examples set forth herein; rather, these example embodiments are provided so that the description of this disclosure will be more comprehensive and complete, and will fully convey the concepts of the example embodiments to those skilled in the art. The accompanying drawings are merely schematic illustrations of the present disclosure and are not necessarily drawn to scale. Identical reference numerals in the figures indicate identical or similar parts, and thus repeated descriptions thereof will be omitted.
此外,所描述的特征、结构或特性可以以任何合适的方式结合在一个或更多示例实施方式中。在下面的描述中,提供许多具体细节从而给出对本公开的示例实施方式的充分理解。然而,本领域技术人员将意识到,可以实践本公开的技术方案而省略所述特定细节中的一个或更多,或者可以采用其它的方法、组元、步骤等。在其它情况下,不详细示出或描述公知结构、方法、实现或者操作以避免喧宾夺主而使得本公开的各方面变得模糊。In addition, the described features, structures or characteristics can be combined in any suitable manner in one or more example embodiments. In the following description, many specific details are provided to provide a full understanding of the example embodiments of the present disclosure. However, those skilled in the art will appreciate that the technical solutions of the present disclosure can be practiced while omitting one or more of the specific details, or other methods, components, steps, etc. can be adopted. In other cases, well-known structures, methods, implementations or operations are not shown or described in detail to avoid obscuring various aspects of the present disclosure.
附图中所示的一些方框图是功能实体,不一定必须与物理或逻辑上独立的实体相对应。可以采用软件形式来实现这些功能实体,或在一个或多个硬件模块或集成电路中实现这些功能实体,或在不同网络和/或处理器装置和/或微控制器装置中实现这些功能实体。Some of the blocks shown in the accompanying drawings are functional entities that do not necessarily correspond to physically or logically independent entities. These functional entities may be implemented in software, in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
下面先参照图1A-1B描述一下本公开实施例的数字资产凭证继承转移中的信息处理方法所应用的体系构架。The following first describes the system architecture used in the information processing method for digital asset certificate inheritance and transfer in an embodiment of the present disclosure with reference to Figures 1A-1B.
如图1A所示的体系构架包括个人安全内核节点107、依赖方节点109、依赖方资格证明方节点100、业务级用户身份凭证证明方节点104、法定用户身份凭证证明方节点105、社交操作系统级用户身份凭证证明方节点106、依赖方业务员终端108、司法机构节点145、调查节点146。上述所有节点都是区块链网络中的一个区块链节点,其在本公开实施例过程中产生的各种数据都可以记录到区块链,也可以从区块链获取数据。The system architecture shown in FIG1A includes a personal security kernel node 107, a relying party node 109, a relying party qualification certifier node 100, a business-level user identity credential certifier node 104, a legal user identity credential certifier node 105, a social operating system-level user identity credential certifier node 106, a relying party business operator terminal 108, a judicial institution node 145, and an investigation node 146. All of the above nodes are blockchain nodes in the blockchain network, and various data generated by them during the process of the embodiments of the present disclosure can be recorded in the blockchain, and data can also be obtained from the blockchain.
个人安全内核节点107是一个保存用户的数字资产凭证的安全核心。每个用户有一个对应的个人安全内核节点107。它是管理用户数字资产凭证的核心节点。数字资产凭证是以数字化存证形式存在的资产,如电子存储的理财产品。数字资产凭证往往是用户与依赖方节点109履行某一业务后依赖方节点109对用户负有的义务。例如,电子理财产品,是用户履行了购买后作为理财公司的依赖方节点109对用户负有的支付利息和返还本金的义务的体现。The personal security kernel node 107 is a secure core that stores a user's digital asset credentials. Each user has a corresponding personal security kernel node 107. It is the core node for managing the user's digital asset credentials. Digital asset credentials are assets that exist in the form of digital evidence, such as electronically stored financial products. Digital asset credentials often represent obligations owed by the relying party node 109 to the user after the user and the relying party node 109 have completed a transaction. For example, an electronic financial product represents the obligation of the relying party node 109, acting as a financial company, to pay interest and return principal after the user has fulfilled the purchase.
如图1B所示,个人安全内核节点107可以包括个人安全内核节点客户端115和个人安全内核节点服务器116。个人安全内核节点客户端115是在用户终端上安装的、用于用户身份资产管理的客户端,个人安全内核节点服务器116是与个人安全内核节点客户端115配合进行用户身份资产管理的服务器。As shown in Figure 1B, the personal security kernel node 107 may include a personal security kernel node client 115 and a personal security kernel node server 116. The personal security kernel node client 115 is a client installed on the user terminal for user identity asset management, and the personal security kernel node server 116 is a server that cooperates with the personal security kernel node client 115 to perform user identity asset management.
依赖方节点109是指用户的业务履行所要依赖的一方的节点,一般是依赖的一方的服务器节点。例如,在购买理财产品业务中,用户要依赖理财公司来完成购买,理财公司的服务器就是理财产品购买业务中的依赖方节点109。The relying party node 109 is the node of the party that the user relies on to fulfill the service, and is generally the server node of the relying party. For example, when purchasing a financial product, the user relies on the financial company to complete the purchase. The server of the financial company is the relying party node 109 in the financial product purchase service.
依赖方业务员终端108是指依赖方与用户具体业务履行时进行业务履行操作的业务员所用的终端。例如,在理财产品购买业务中,具体与用户进行理财产品购买对接的柜台人员用的终端就是依赖方业务员终端108。法定用户身份凭证证明方节点105是用户法定身份注册的节点。它用来在业务履行前证明用户的身份合法。然后,才能履行业务,从而获得与依赖方节点履行业务产生的数字资产凭证。业务级用户身份凭证证明方节点104是指曾经与用户履行过业务的平台服务器。由于该平台曾经与用户履行过业务,对用户的身份进行过验证。在对身份认证确信等级要求不太高的情况下,这样的平台可以起到一个间接验证用户身份的作用。社交操作系统级用户身份凭证证明方节点191是为用户提供身份证明的社交操作系统级平台服务器。这些平台具备较强的数据安全保护能力,并具备普遍服务能力,例如微信平台服务器、Facebook平台服务器。可以认为这样的业务提供方提供了一个行业内普遍使用的社交操作系统,鉴于这类操作系统级的身份鉴别不仅仅是以某个中心化预先发行的静态法定身份凭证为身份核验的依据,而是结合采用了多维的基于社交圈以及用户活动状态确认的非中心化身份核验体系,以避免中心化发行的静态身份核验组件丢失后的身份冒用风险。所以在业务履行前对用户身份的核验确信等级更高,社交操作系统用于身份核验的确信等级评价与社交操作系统承载的用户数目,应用(例如小程序应用)和内容等相关。由于该部分不是本公开重点关注的内容,不在此详述。依赖方资格证明方节点100是指对依赖方是否有权限要求用户提供用户身份凭证的资格进行认证的终端。在业务履行前,用户的身份需要经法定用户身份凭证证明方节点105,或业务级用户身份凭证证明方节点104,或社交操作系统级用户身份凭证证明方节点191证明,而依赖方资格需要经依赖方资格证明方节点100。它们都是履行业务从而形成电子理财产品等数字资产凭证之前用到的节点,与本公开实施例不直接相关,故不赘述。The relying party salesperson terminal 108 refers to the terminal used by the salesperson performing specific business operations with the user during the transaction. For example, in the financial product purchase business, the terminal used by the counter staff who specifically interacts with the user to purchase the financial product is the relying party salesperson terminal 108. The legal user identity credential certifier node 105 is the node for registering the user's legal identity. It is used to verify the user's identity before the transaction is performed. Only then can the transaction be performed, thereby obtaining the digital asset certificate generated by the transaction with the relying party node. The business-level user identity credential certifier node 104 refers to a platform server that has previously performed business with the user. Because this platform has previously performed business with the user, the user's identity has been verified. If the identity authentication assurance level requirement is not too high, such a platform can serve as an indirect verification of the user's identity. The social operating system-level user identity credential certifier node 191 is a social operating system-level platform server that provides identity verification for users. These platforms have strong data security protection capabilities and provide universal service capabilities, such as WeChat platform servers and Facebook platform servers. It can be considered that such a service provider provides a social operating system that is widely used in the industry. Given that this type of operating system-level identity authentication is not based solely on a centralized, pre-issued static legal identity credential as the basis for identity verification, but rather incorporates a multi-dimensional, decentralized identity verification system based on social circles and user activity status confirmation to avoid the risk of identity fraud after the loss of the centralized, static identity verification component. Therefore, the user's identity verification confidence level before the service is performed is higher. The confidence level evaluation used by the social operating system for identity verification is related to the number of users, applications (such as mini-program applications), and content hosted by the social operating system. Since this part is not the focus of this disclosure, it will not be discussed in detail here. The relying party qualification certifier node 100 refers to the terminal that authenticates whether the relying party has the authority to request the user to provide user identity credentials. Before the service is performed, the user's identity needs to be verified by the legal user identity credential certifier node 105, or the service-level user identity credential certifier node 104, or the social operating system-level user identity credential certifier node 191, and the relying party's qualifications need to be verified by the relying party qualification certifier node 100. They are all nodes used before performing business to form digital asset certificates such as electronic financial products. They are not directly related to the embodiments of this disclosure and will not be described in detail.
司法机构节点145是司法机构(例如法院)用来对遗嘱进行执行处理的终端,例如法院处理遗嘱业务的服务器。The judicial institution node 145 is a terminal used by a judicial institution (such as a court) to execute a will, such as a server used by the court to handle will business.
调查节点146是司法机构(例如法院)委托的调查继承中的信息的单位的处理终端,如法院的调查委员会的终端。The investigation node 146 is a processing terminal of a unit entrusted by a judicial institution (eg, a court) to investigate the information in inheritance, such as a terminal of an investigation committee of the court.
下面结合图2A-K描述根据本公开实施例的数字资产凭证继承转移中的信息处理方法应用在用户离世后数字资产凭证继承应用场景下的界面图。2A-K , the following describes the interface diagrams of the information processing method in the inheritance and transfer of digital asset certificates according to the embodiments of the present disclosure applied in the digital asset certificate inheritance application scenario after the user's death.
图2A示出了个人安全内核节点(Persk)116关联的用户终端显示的功能选择界面图。如前所述,个人安全内核节点116是维护用户的数字资产凭证的设备,可以体现为用户终端中的一个客户端,或用户终端的一个芯片,或植入人体或贴在皮肤表面的金属贴片、芯片或者其他具备存储和计算能力的单元。当个人安全内核节点116为用户终端中的一个客户端,或用户终端的一个芯片或者其他具备存储和计算能力的单元时,个人安全内核节点116关联的用户终端是指安装有其的用户终端。当个人安全内核节点116为植入人体或贴在皮肤表面的金属贴片、芯片或者其他具备存储和计算能力的单元时,个人安全内核节点116关联的用户终端是指与该金属贴片、芯片或者其他具备存储和计算能力的单元通信并显示其中存储的数字资产凭证的终端。FIG2A shows a function selection interface diagram displayed by a user terminal associated with a personal security kernel node (Persk) 116. As previously mentioned, the personal security kernel node 116 is a device that maintains a user's digital asset credentials and can be embodied as a client in the user terminal, or a chip in the user terminal, or a metal patch, chip, or other unit with storage and computing capabilities implanted in the human body or attached to the skin surface. When the personal security kernel node 116 is a client in the user terminal, or a chip in the user terminal, or other unit with storage and computing capabilities, the user terminal associated with the personal security kernel node 116 refers to the user terminal on which it is installed. When the personal security kernel node 116 is a metal patch, chip, or other unit with storage and computing capabilities implanted in the human body or attached to the skin surface, the user terminal associated with the personal security kernel node 116 refers to the terminal that communicates with the metal patch, chip, or other unit with storage and computing capabilities and displays the digital asset credentials stored therein.
当用户的生命周期未结束之前,用户可以在图2A所示的界面选择“设立遗嘱”功能选项,进入如图2B所示的界面。Before the end of the user's life cycle, the user can select the "Create a Will" function option in the interface shown in FIG2A to enter the interface shown in FIG2B.
在图2B的界面上,罗列了用户的所有数字资产凭证或者各种数字资产凭证类型,让用户去填写用户希望其每一项数字资产凭证或者每一数字资产凭证类型的继承人,并填写执行遗嘱的司法机构。执行遗嘱的司法机构的的作用是启动并见证该数字资产凭证在用户生命周期结束后向指定的继承人转移的过程,起到公信的作用。The interface in Figure 2B lists all of the user's digital asset certificates or various types of digital asset certificates, allowing the user to enter the desired heirs for each digital asset certificate or each type of digital asset certificate, as well as the judicial authority for will execution. The role of the judicial authority for will execution is to initiate and witness the transfer of the digital asset certificate to the designated heir after the user's lifecycle, thus providing a public trust.
当用户在图2B的界面上针对每一项数字资产凭证填写完继承人和见证的司法机构后,如图2C所示,开始获取继承人、指定的司法机构的公钥。继承人的公钥是为了保证用户生命周期结束后给继承人的数字资产凭证的安全性。司法机构的公钥是为了对执行遗嘱的第三方司法机构是否是用户真正想要的司法机构进行验证,提高遗嘱的保密性。由于用户的遗嘱用司法机构的公钥进行签名,只有真正的司法机构,才能解签名,通过验证,进行后续程序。After the user completes the heir and witnessing judicial institution for each digital asset certificate on the interface shown in Figure 2B, the public keys of the heir and designated judicial institution will be retrieved, as shown in Figure 2C. The heir's public key ensures the security of the digital asset certificate issued to the heir after the user's lifecycle. The judicial institution's public key verifies that the third-party judicial institution executing the will is the one the user intended, enhancing the confidentiality of the will. Since the user's will is signed with the judicial institution's public key, only the authentic judicial institution can decrypt the signature, verify it, and proceed with subsequent procedures.
获得继承人的公钥后,用继承人的公钥对其对应的数字资产凭证进行签名。将用户Persk标识、继承人Persk标识、用继承人的公钥对数字资产凭证进行的签名放到遗嘱中。获得司法机构的公钥后,用司法机构公钥对当前遗嘱内容进行签名,将该签名也放入遗嘱中。此时遗嘱的内容如图2D所示,包括用户Persk标识、继承人Persk标识、用各继承人的公钥对相应数字资产凭证进行的签名、用司法机构公钥生成的遗嘱签名。各继承人的公钥对相应数字资产凭证进行的签名只有继承人自己用私钥才能解开,保证继承中数字资产凭证传递的安全性。用司法机构公钥生成的遗嘱签名只有用用户指定的司法机构的私钥才能通过验证,保证继承过程的可信性。After obtaining the heir's public key, the corresponding digital asset certificate is signed with the heir's public key. The user's Persk ID, the heir's Persk ID, and the signature of the digital asset certificate using the heir's public key are placed in the will. After obtaining the judicial institution's public key, the current will content is signed with the judicial institution's public key and this signature is also placed in the will. The contents of the will at this point are shown in Figure 2D, including the user's Persk ID, the heir's Persk ID, the signature of the corresponding digital asset certificate using each heir's public key, and the will signature generated using the judicial institution's public key. The signature of the corresponding digital asset certificate using each heir's public key can only be decrypted by the heir's private key, ensuring the security of the digital asset certificate transmission during inheritance. The will signature generated using the judicial institution's public key can only be verified using the judicial institution's private key specified by the user, ensuring the credibility of the inheritance process.
然后,如图2E所示,将生成的遗嘱记录到区块链上。Then, as shown in Figure 2E, the generated will is recorded on the blockchain.
图2F-K不再是用户终端的界面图,而是司法机构节点的界面图。用户在离世之前,在加入区块链网络时与区块链网络运营商签立智能合约。图1A-B的每个节点都作为一个区块链网络节点,能够获取到该智能合约。该智能合约中,用户指定离世后的继承程序发起人、证明人。Figures 2F-K are no longer user terminal interfaces, but rather interfaces for judicial institutions. Before a user passes away, they sign a smart contract with the blockchain network operator when joining the network. Each node in Figures 1A-B acts as a blockchain network node and has access to this smart contract. In this smart contract, the user designates the initiator and witness of the post-death inheritance process.
当接收到用户A的亲友B发出的、对用户A已经离世的启动请求时,显示图2F所示的界面。如果B恰恰是用户智能合约中指定的继承程序发起人,则开始继承验证程序,即将智能合约中指定的证明人C、D、E发出用户A离世确认请求,要求确认用户A是否真的离世,如图2G所示。When a request is received from a friend or relative of user A, B, to confirm that user A has passed away, the interface shown in Figure 2F is displayed. If B is the designated successor in the user's smart contract, the succession verification process begins. This involves the designated witnesses, C, D, and E, in the smart contract sending a request to confirm that user A has passed away, as shown in Figure 2G.
如果从证明人C、D、E都接到用户A已经离世的应答,确定用户A离世,开始继承程序,如图2H所示。If responses are received from witnesses C, D, and E indicating that user A has passed away, it is determined that user A has passed away, and the inheritance procedure begins, as shown in FIG2H .
当司法机构节点的工作人员在图2H的界面上选择“确认”后,进入图2I所示的界面,从区块链上找到带有用户A的Persk标识的遗嘱。由于区块链上的遗嘱包括用户Persk标识、继承人Persk标识、用各继承人的公钥对相应数字资产凭证进行的签名、用司法机构公钥生成的遗嘱签名,因此可以找到该遗嘱。然后,司法机构对遗嘱中的用司法机构公钥生成的遗嘱进行签名验证,如图2J所示。After the judicial authority node staff selects "Confirm" on the interface shown in Figure 2H, they enter the interface shown in Figure 2I and find the will on the blockchain that contains User A's Persk ID. Because the will on the blockchain includes the user's Persk ID, the heir's Persk ID, the signature of the corresponding digital asset certificate using each heir's public key, and the will signature generated using the judicial authority's public key, the will can be found. The judicial authority then verifies the signature generated using the judicial authority's public key, as shown in Figure 2J.
如果签名验证成功,将遗嘱中用各继承人的公钥对相应数字资产凭证进行的签名取出,向遗嘱中对应继承人Persk标识的Persk发送,如图2K所示。继承人Persk收到后,用继承人私钥解签名,得到数字资产凭证的摘要,凭该摘要获得数字资产凭证。如果不是真正的继承人,没有继承人私钥,无法用该私钥解签名,也就得不到继承的数字资产凭证。If the signature verification is successful, the signature of the corresponding digital asset certificate using each heir's public key in the will is extracted and sent to the Persk identified by the heir Persk in the will, as shown in Figure 2K. After receiving it, the heir Persk uses the heir's private key to decrypt the signature and obtain the summary of the digital asset certificate. With this summary, the digital asset certificate is obtained. If the heir is not the true heir and does not have the heir's private key, it cannot be used to decrypt the signature and the inherited digital asset certificate cannot be obtained.
上述只是围绕用户离世后的数字资产凭证继承的应用场景展开描述,在用户失踪等其他应用场景中过程类似。The above only describes the application scenario of digital asset certificate inheritance after the user's death. The process is similar in other application scenarios such as user disappearance.
根据本公开的一个实施例,提供了一种数字资产凭证继承转移中的信息处理方法。数字资产凭证是以数字化形式存在的资产凭证,如电子理财产品单。数字资产凭证继承转移是指用户生命周期结束后用户的数字资产凭证转移到对应的继承人。生命周期是指用户从出生到离世或宣告失踪的期间,生命周期结束包括离世和宣告失踪。所述方法由司法机构节点执行。According to one embodiment of the present disclosure, a method for processing information during the inheritance and transfer of digital asset certificates is provided. A digital asset certificate is an asset certificate in digitized form, such as an electronic financial product certificate. This inheritance and transfer refers to the transfer of a user's digital asset certificate to a corresponding heir after the end of the user's lifecycle. A lifecycle refers to the period from birth to death or declaration of disappearance, with the end of the lifecycle including death and declaration of disappearance. The method is executed by a judicial institution node.
如图3所示,所述方法包括:As shown in FIG3 , the method includes:
步骤210、确定用户的生命周期结束;Step 210: Determine that the user's life cycle has ended;
步骤220、获取用户的遗嘱,所述遗嘱包括用户个人安全内核节点的标识、各继承人个人安全内核节点的标识、各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名、所述遗嘱用司法机构节点公钥进行的签名;Step 220: Obtain the user's will, which includes the identifier of the user's personal security kernel node, the identifier of each heir's personal security kernel node, the signature of each digital asset certificate using the public key of the corresponding heir's personal security kernel node, and the signature of the will using the public key of the judicial institution's node.
步骤230、如果对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥进行签名验证成功,触发向所述遗嘱中的各继承人个人安全内核节点的标识的继承人个人安全内核节点,发送所述遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,以便所述继承人个人安全内核节点对该签名,用所述继承人个人安全内核节点的私钥解密,得到数字资产凭证的摘要,根据得到的数字资产凭证的摘要,得到继承的数字资产凭证。Step 230: If the will is signed with the public key of the judicial institution node and the signature verification is successful with the private key of the judicial institution node, the heir's personal security kernel node identified by each heir in the will is triggered to send the signature of each digital asset certificate in the will with the public key of the corresponding heir's personal security kernel node, so that the heir's personal security kernel node decrypts the signature with the private key of the heir's personal security kernel node to obtain the summary of the digital asset certificate, and obtains the inherited digital asset certificate based on the summary of the obtained digital asset certificate.
下面对以上步骤详细描述。The above steps are described in detail below.
在步骤210,确定用户的生命周期结束。In step 210, it is determined that the user's life cycle has ended.
确定用户的生命周期结束可以采取官方发起的方式,也可以采用民间发起的方式,也可以采用官方和民间共同确认的方式。The end of a user's life cycle can be determined through official initiation, private initiation, or a method of joint official and private confirmation.
在官方发起的方式中,步骤210包括:In the officially initiated approach, step 210 includes:
响应于来自调查节点146的生命周期结束通知,确定用户的生命周期结束。In response to the lifecycle end notification from the investigation node 146 , it is determined that the user's lifecycle has ended.
调查节点是司法机构委托的调查遗嘱继承中的各种情况的机构的终端。例如,司法机构是法院的情况下,调查节点146是法院设立的调查委员会的终端。当有人在法院报案用户离世或失踪后,法院委托调查委员会的人员调查该用户的社交关系,作出用户是否真正离世或应当被宣告失踪的判断,在调查节点146由该人员根据该判断结果作出生成生命周期结束通知,发送给司法机构节点145。生命周期结束通知是宣告用户已经离世或宣告失踪的消息。The investigation node is the terminal of an institution commissioned by the judicial authority to investigate various circumstances surrounding wills and inheritances. For example, if the judicial authority is a court, investigation node 146 is the terminal of the court's investigation committee. When a user's death or disappearance is reported to the court, the court commissions personnel from the investigation committee to investigate the user's social relationships and determine whether the user is truly deceased or should be declared missing. Based on this determination, the personnel at investigation node 146 generate an end-of-life notification and send it to judicial authority node 145. This end-of-life notification declares the user's death or disappearance.
该实施例的好处是,生命周期结束通知是由调查节点146的相关人员实际调查情况后得到的,比较全面,误差小。The advantage of this embodiment is that the lifecycle end notification is obtained by the relevant personnel of the investigation node 146 after actual investigation, which is relatively comprehensive and has a small error.
在民间发起的方式中,步骤210包括:In the civilian-initiated approach, step 210 includes:
接收到启动节点的启动请求;Receive a startup request from a startup node;
通过社交操作系统平台,向多个证明方节点发送用户生命周期结束确认消息;Send a user lifecycle end confirmation message to multiple proving nodes via the social operating system platform;
如果所述多个证明方节点的应答满足预定条件,则确定用户的个人安全内核节点的生命周期结束。If the responses of the plurality of prover nodes satisfy a predetermined condition, it is determined that the lifecycle of the user's personal security kernel node ends.
启动节点是对遗嘱继承程序进行启动的终端。The startup node is the terminal that starts the testamentary inheritance procedure.
在一个实施例中,启动节点用户是任何终端(包括法院终端等),即只要有人启动,就开启继承过程。In one embodiment, the initiating node user is any terminal (including a court terminal, etc.), that is, the inheritance process is started as long as someone starts it.
在另一个实施例中,启动节点是用户通讯录中的用户终端。也就是说,只有用户认识的人才能开启继承程序,避免假报案和无关骚扰。由于用户离世或失踪后,其个人安全内核节点客户端很可能也找不到,但用户的通讯录可以存储在个人安全内核节点服务器,从个人安全内核节点服务器中可以获取用户通讯录。In another embodiment, the initiating node is a user terminal in the user's address book. This means that only people known to the user can initiate the inheritance process, preventing false reports and irrelevant harassment. Since the user's personal security kernel node client may be lost after death or disappearance, the user's address book can be stored on a personal security kernel node server and retrieved from the server.
在另一个实施例中,启动节点是用户在生命周期期间在智能合约中指定的启动节点。例如,用户在生命周期期间,可以在智能合约指定一个启动节点标识,如某朋友的终端标识。该智能合约可以与用户个人安全内核节点标识对应,保存在所有区块链节点,也可以保存在区块链上。启动请求中含有用户个人安全内核节点标识,司法机构节点145可以从该启动请求中获得用户个人安全内核节点标识,从本地或者区块链上找到与该用户个人安全内核节点标识对应的智能合约,从而获取其中的启动节点标识。如果该标识是启动请求的发出者的标识,则开启继承过程。该实施例提高了开启继承的安全性。In another embodiment, the startup node is the startup node specified by the user in the smart contract during the life cycle. For example, during the life cycle, the user can specify a startup node identifier in the smart contract, such as a friend's terminal identifier. The smart contract can correspond to the user's personal security kernel node identifier and be stored in all blockchain nodes or on the blockchain. The startup request contains the user's personal security kernel node identifier. The judicial agency node 145 can obtain the user's personal security kernel node identifier from the startup request, find the smart contract corresponding to the user's personal security kernel node identifier locally or on the blockchain, and thus obtain the startup node identifier therein. If the identifier is the identifier of the issuer of the startup request, the inheritance process is started. This embodiment improves the security of enabling inheritance.
在一个实施例中,智能合约是通过如下过程生成的:In one embodiment, a smart contract is generated through the following process:
显示智能合约模板列表;Display the list of smart contract templates;
响应于用户从智能合约模板列表选择智能合约模板并在选择的智能合约模板中填写内容,将填写的内容整合到智能合约模板中,为用户生成智能合约。In response to a user selecting a smart contract template from the smart contract template list and filling in content in the selected smart contract template, the filled-in content is integrated into the smart contract template to generate a smart contract for the user.
也就是说,系统内为用户提供多种智能合约模板,在模板中有一部分用户需要填写的内容。用户可以通过例如勾选的方式在列表中选择一个智能合约模板,并在模板中需要填写内容的位置填写内容。将用户填写的内容整合到选择的智能合约模板中,生成智能合约。In other words, the system provides users with multiple smart contract templates, each of which requires users to fill in certain fields. Users can select a smart contract template from a list, for example by checking a box, and then fill in the required fields within the template. The user's fields are then integrated into the selected smart contract template to generate the smart contract.
社交操作系统平台是指为用户提供身份证明、比一般应用服务完全平台具备更强的数据安全保护能力和普遍服务能力的平台,例如微信平台服务器、Facebook平台服务器。由于在该平台注册了大量用户,因此,可以通过该平台向多个证明方节点发送继承程序启动确认请求消息。继承程序启动确认请求是指要求确认用户是否离世或失踪,以便决定是否开启继承程序的请求。Social operating system platforms, such as WeChat and Facebook platforms, provide user identity verification and offer stronger data security and universal service capabilities than standard application service platforms. Due to the large number of registered users on these platforms, they can send succession procedure confirmation requests to multiple proving nodes. A succession procedure confirmation request is a request to confirm whether a user has passed away or is missing, in order to determine whether to initiate the succession procedure.
在一个实施例中,所述多个证明方节点从用户通讯录中随机选出。用户通讯录如上所述,可以从个人安全内核节点服务器中获取。该实施例中好处是,由于通讯录都是用户认识的人,从中随机选出,避免用户勾结一些好友作弊的风险。In one embodiment, the multiple proving nodes are randomly selected from the user's address book. As described above, the user's address book can be obtained from the personal security kernel node server. The advantage of this embodiment is that since the address book contains people the user knows, the random selection reduces the risk of the user colluding with some friends to cheat.
在一个实施例中,所述多个证明方节点标识由用户在用户生命周期期间指定,并与上述启动节点一样,记录在智能合约中。智能合约与用户个人安全内核节点标识对应,存储在每个区块链节点上,或者存储在区块链上。司法机构节点从启动请求中获得用户个人安全内核节点标识,在本地或区块链上查找到对应的智能合约,从智能合约中找到多个证明方节点标识,通过社交操作系统平台,向多个证明方节点发送用户生命周期结束确认消息。该实施例提高了用户选择遗嘱执行过程的灵活性。In one embodiment, the multiple proving node identifiers are specified by the user during their lifecycle and, like the initiation node described above, are recorded in a smart contract. The smart contract corresponds to the user's personal secure kernel node identifier and is stored on each blockchain node or on the blockchain itself. The judicial authority node obtains the user's personal secure kernel node identifier from the initiation request, locates the corresponding smart contract locally or on the blockchain, retrieves the multiple proving node identifiers from the smart contract, and sends a user lifecycle end confirmation message to the multiple proving node identifiers via the social operating system platform. This embodiment increases the flexibility of the user's choice of the will execution process.
这里的预定条件是指预先设定、多个证明方节点的应答应满足的条件。在一个实施例中,预定条件是,所述多个证明方节点的应答都是确认用户生命周期结束的应答。在一个实施例中,预定条件是,所述多个证明方节点中预定比例以上的应答都是确认用户生命周期结束的应答。The predetermined condition here refers to a pre-set condition that must be satisfied by the responses of the multiple proving nodes. In one embodiment, the predetermined condition is that all responses from the multiple proving nodes confirm the end of the user lifecycle. In another embodiment, the predetermined condition is that at least a predetermined proportion of the responses from the multiple proving nodes confirm the end of the user lifecycle.
该民间发起的方式的优点是自动通过机器节点执行,自动化程度高,且避免政府审批调查的冗长耗时。The advantage of this privately initiated approach is that it is automatically executed through machine nodes, has a high degree of automation, and avoids lengthy and time-consuming government approval and investigation.
在官方和民间共同确认的方式中,所述如果所述多个证明方节点的应答满足预定条件,则确定用户的个人安全内核节点的生命周期结束,包括:In the official and private joint confirmation method, if the responses of the multiple proving nodes meet a predetermined condition, determining that the lifecycle of the user's personal security kernel node has ended includes:
如果所述多个证明方节点的应答满足预定条件,且接收到来自调查节点的生命周期结束通知,则确定用户的个人安全内核节点的生命周期结束。If the responses of the plurality of prover nodes satisfy predetermined conditions and a lifecycle end notification is received from the investigation node, it is determined that the lifecycle of the user's personal security kernel node has ended.
也就是说,仅多个证明方节点的应答满足预定条件是不够的,还需要官方也给出了生命周期结束通知,两个条件都满足,才能确定用户的个人安全内核节点的生命周期结束。该实施例提高了确定用户的个人安全内核节点的生命周期结束的安全性。In other words, it's not enough for multiple proving node responses to meet the predefined conditions. Officials must also provide an end-of-lifecycle notification. Only when both conditions are met can the end of the lifecycle of a user's personal secure kernel node be determined. This embodiment improves the security of determining the end of the lifecycle of a user's personal secure kernel node.
在步骤220中,获取用户的遗嘱,所述遗嘱包括用户个人安全内核节点的标识、各继承人个人安全内核节点的标识、各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名、所述遗嘱用司法机构节点公钥进行的签名。In step 220, the user's will is obtained, which includes the identifier of the user's personal security kernel node, the identifier of each heir's personal security kernel node, the signature of each digital asset certificate using the public key of the corresponding heir's personal security kernel node, and the signature of the will using the public key of the judicial institution node.
在一个实施例中,获取用户的遗嘱包括:获取与用户的个人安全内核节点的标识对应的用户的遗嘱。也就是说,可以按照用户的个人安全内核节点的标识,获取对应的用户的遗嘱。In one embodiment, obtaining the user's will includes obtaining the user's will corresponding to the identifier of the user's personal security kernel node. In other words, the corresponding user's will can be obtained according to the identifier of the user's personal security kernel node.
用户个人安全内核节点的标识是将用户个人安全内核节点区别于其它人的个人安全内核节点的标记,它可以由字母、数字、符号等及其组合表示。遗嘱中记录用户个人安全内核节点的标识,是为了当用户生命周期结束后,根据该标识找到对应的遗嘱(包含该标识的遗嘱)。The identifier of a user's personal secure kernel node distinguishes it from other personal secure kernel nodes. It can be represented by letters, numbers, symbols, or a combination thereof. The identifier of a user's personal secure kernel node is recorded in a will so that after the user's lifecycle ends, the corresponding will (the will containing the identifier) can be found based on the identifier.
各继承人个人安全内核节点的标识是针对用户的数字资产凭证,用户指定继承的人的个人安全内核节点的标识,是将该继承人个人安全内核节点区别于其它人的个人安全内核节点的标记。遗嘱中,针对每一项数字资产凭证,可以有不同的继承人个人安全内核节点的标识。Each heir's personal secure kernel node identifier is specific to the user's digital asset certificate. The identifier of the individual designated by the user distinguishes that individual's secure kernel node from that of others. In a will, each digital asset certificate can have a different identifier for the individual's secure kernel node.
各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名是指,针对用户的各数字资产凭证,根据预定摘要算法生成摘要,用对应继承人个人安全内核节点的公钥对摘要加密得到的结果。直接传递数字资产凭证,被第三方截获,可以从中方便地取走数字资产凭证。由于签名是先生成摘要,再由对应继承人个人安全内核节点的公钥加密得到的,没有继承人个人安全内核节点的公钥是无法解签名的,提高了继承中数字资产凭证转移的安全性。Each digital asset certificate is signed using the public key of the corresponding heir's personal secure kernel node. This involves generating a digest for each user's digital asset certificate using a predetermined digest algorithm and encrypting the digest using the public key of the corresponding heir's personal secure kernel node. Directly transmitting a digital asset certificate can be easily intercepted by a third party, allowing them to easily steal the digital asset certificate. Because the signature is generated by first generating a digest and then encrypting it using the public key of the corresponding heir's personal secure kernel node, it cannot be decrypted without the public key of the heir's personal secure kernel node, enhancing the security of digital asset certificate transfer during inheritance.
所述遗嘱用司法机构节点公钥进行的签名,是指用司法机构节点公钥对遗嘱当前内容进行的签名,包括对遗嘱当前内容按照预定摘要算法生成摘要、和用司法机构节点公钥对摘要加密。它具有验证执行遗嘱的司法机构节点是否是用户指定的司法机构节点的作用,因为如果执行遗嘱的司法机构节点不是用户指定的司法机构节点,它不具有司法机构节点私钥,无法对签名验证成功。它保证了继承中司法机构节点的可信度,提高继承程序的安全性。The signature of a will using the judicial institution node's public key refers to the signing of the will's current contents using the judicial institution node's public key. This involves generating a digest of the will's current contents using a predetermined digest algorithm and encrypting the digest using the judicial institution node's public key. This function verifies that the judicial institution node executing the will is the user-specified judicial institution node. If the executing judicial institution node is not the user-specified judicial institution node, it lacks the judicial institution node's private key and cannot successfully verify the signature. This ensures the credibility of the judicial institution node during inheritance and enhances the security of the inheritance process.
在遗嘱生成之后,可以记录到区块链上,也可以存储在用户的个人安全内核节点服务器。这是因为,用户生命周期结束后,很可能个人安全内核节点客户端也随着用户终端的丢失而丢失,遗嘱也可能消亡,将其存储在区块链上或个人安全内核节点服务器上,可以在用户生命周期结束后找回遗嘱。After a will is created, it can be recorded on the blockchain or stored on the user's personal secure kernel node server. This is because after the user's lifecycle ends, it is likely that the personal secure kernel node client will also be lost along with the user's terminal, and the will may also disappear. Storing it on the blockchain or on the personal secure kernel node server allows the will to be retrieved after the user's lifecycle ends.
在遗嘱上链存储的实施例中,步骤220包括:从区块链上获取含有用户的个人安全内核节点的标识的遗嘱,作为与用户的个人安全内核节点的标识对应的用户的遗嘱,其中所述遗嘱生成后记录到该区块链上。In an embodiment of chain storage of a will, step 220 includes: obtaining a will containing the identifier of the user's personal security kernel node from the blockchain as the user's will corresponding to the identifier of the user's personal security kernel node, wherein the will is recorded on the blockchain after generation.
如上所述,所述遗嘱包括用户个人安全内核节点的标识、各继承人个人安全内核节点的标识、各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名、所述遗嘱用司法机构节点公钥进行的签名。由于启动请求中包含用户个人安全内核节点的标识,司法机构节点可以查找区块链上包含该标识的遗嘱,该遗嘱就是与用户的个人安全内核节点的标识对应的用户的遗嘱。As described above, the will includes the identifier of the user's personal secure kernel node, the identifiers of each heir's personal secure kernel node, signatures of each digital asset certificate using the public key of the heir's personal secure kernel node, and the signature of the will using the public key of the judicial authority node. Because the activation request includes the identifier of the user's personal secure kernel node, the judicial authority node can search the blockchain for a will containing this identifier, and this will be the will of the user corresponding to the identifier of the user's personal secure kernel node.
在一个实施例中,遗嘱还包括头信息。该头信息中包含遗嘱特征字和遗嘱长度。从区块链上获取含有用户的个人安全内核节点的标识的遗嘱,包括:In one embodiment, the will also includes header information. The header information includes the will signature and the will length. The will containing the identifier of the user's personal security kernel node is obtained from the blockchain, including:
在区块链中识别到带有遗嘱特征字的头信息之后,按照头信息中的遗嘱长度识别遗嘱所关联的数据区块;After identifying the header information with the will signature in the blockchain, the data block associated with the will is identified according to the will length in the header information;
在识别出的数据区块中,确定是否含有用户的个人安全内核节点的标识,如含有,则识别出的数据区块构成含有用户的个人安全内核节点的标识的遗嘱。In the identified data block, it is determined whether the identifier of the user's personal security kernel node is contained. If so, the identified data block constitutes a will containing the identifier of the user's personal security kernel node.
头信息是指遗嘱作为数据区块记录到区块链上后,每个数据区块的区块头信息。每个数据区块还有区块体,其中记录遗嘱中的内容。遗嘱可能包括多个数据区块。如上所述,遗嘱包括用户个人安全内核节点的标识、各继承人个人安全内核节点的标识、各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名、所述遗嘱用司法机构节点公钥进行的签名,其中不同继承人个人安全内核节点的标识、和相应不同的数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名可能记载在不同数据区块中。Header information refers to the block header information of each data block after the will is recorded as a data block on the blockchain. Each data block also has a block body, which records the contents of the will. A will may include multiple data blocks. As mentioned above, a will includes the identifier of the user's personal secure kernel node, the identifiers of each heir's personal secure kernel node, the signature of each digital asset certificate using the public key of the corresponding heir's personal secure kernel node, and the signature of the will using the public key of the judicial authority node. The identifiers of different heirs' personal secure kernel nodes and the signatures of different digital asset certificates using the public keys of their corresponding heirs' personal secure kernel nodes may be recorded in different data blocks.
遗嘱特征字是表示区块链上的数据区块是关于遗嘱的数据区块的标志。没有该遗嘱特征字,代表该数据区块记录的不是遗嘱。有该遗嘱特征字,代表该数据区块记录的是遗嘱。由于区块链上记录各种数据区块,有一些数据区块与遗嘱完全无关,为了缩小搜索范围,在存放遗嘱的数据区块的区块头中设置遗嘱特征字。在区块链上找到该遗嘱特征字,认为包含该遗嘱特征字的数据区块是遗嘱数据区块。The Will keyword is a flag that indicates a data block on the blockchain is a will. If the Will keyword is absent, the data block does not record a will. If the Will keyword is present, it indicates that the data block does record a will. Because the blockchain records a variety of data blocks, some of which have nothing to do with wills, to narrow the search scope, the Will keyword is set in the block header of data blocks containing wills. If the Will keyword is found on the blockchain, the data block containing the Will keyword is considered a will data block.
遗嘱长度是表明遗嘱占用了区块链上连续数据区块的数量的标志。例如,遗嘱长度为7,代表在区块链上,从当前数据区块开始数7个数据区块,这些数据区块都是遗嘱关联的数据区块。The will length is a symbol that indicates the number of consecutive data blocks on the blockchain that the will occupies. For example, a will length of 7 means that on the blockchain, 7 data blocks, counting from the current data block, are all data blocks associated with the will.
因此,在区块链中识别到带有遗嘱特征字的头信息之后,可以按照头信息中的遗嘱长度识别遗嘱所关联的数据区块,然后在这些数据区块范围内确定是否含有用户的个人安全内核节点的标识。这样做的好处是,相比于在整个区块链上搜索含有用户的个人安全内核节点的标识的数据区块,大大减小了搜索范围,提高了搜索效率。Therefore, after identifying the header information containing the will signature in the blockchain, the data blocks associated with the will can be identified based on the will length in the header information. Then, the identification of the user's personal secure kernel node identifier can be determined within these data blocks. The advantage of this is that compared to searching the entire blockchain for data blocks containing the user's personal secure kernel node identifier, the search scope is greatly reduced, improving search efficiency.
如果确定在这些连续的数据区块范围内含有用户的个人安全内核节点的标识,该连续的数据区块范围(该遗嘱长度指示的数量的连续数据区块)构成含有用户的个人安全内核节点的标识的遗嘱。If it is determined that the identifier of the user's personal security kernel node is contained within these continuous data block ranges, the continuous data block ranges (the number of continuous data blocks indicated by the will length) constitute a will containing the identifier of the user's personal security kernel node.
在遗嘱存储在个人安全内核节点服务器的实施例中,所述个人安全内核节点包括个人安全内核节点客户端和个人安全内核节点服务器。步骤220包括:从用户的个人安全内核节点的标识对应的个人安全内核节点服务器,获取遗嘱,作为与用户的个人安全内核节点的标识对应的用户的遗嘱,其中所述遗嘱由个人安全内核节点客户端生成后存储在个人安全内核节点服务器。In an embodiment where the will is stored on a personal security kernel node server, the personal security kernel node includes a personal security kernel node client and a personal security kernel node server. Step 220 includes: obtaining the will from the personal security kernel node server corresponding to the identifier of the user's personal security kernel node as the will of the user corresponding to the identifier of the user's personal security kernel node, wherein the will is generated by the personal security kernel node client and stored on the personal security kernel node server.
个人安全内核节点客户端生成遗嘱后,将其存储在个人安全内核节点服务器,该个人安全内核节点客户端和个人安全内核节点服务器具有同一个人安全内核节点标识。在启动请求中含有用户的个人安全内核节点的标识。这样,可以找到与该标识对应的个人安全内核节点服务器,从其获得遗嘱。After the personal security kernel node client generates a will, it stores it on the personal security kernel node server. The personal security kernel node client and the personal security kernel node server have the same personal security kernel node identifier. The startup request contains the identifier of the user's personal security kernel node. This allows the personal security kernel node server corresponding to this identifier to be found and the will retrieved from it.
在步骤230中,如果对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥进行签名验证成功,触发向所述遗嘱中的各继承人个人安全内核节点的标识的继承人个人安全内核节点,发送所述遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,以便所述继承人个人安全内核节点对该签名,用所述继承人个人安全内核节点的私钥解密,得到数字资产凭证的摘要,根据得到的数字资产凭证的摘要,得到继承的数字资产凭证。In step 230, if the will is signed with the public key of the judicial institution node and the signature verification is successful with the private key of the judicial institution node, the heir's personal security kernel node identified by each heir in the will is triggered to send the signature of each digital asset certificate in the will with the public key of the corresponding heir's personal security kernel node, so that the heir's personal security kernel node decrypts the signature with the private key of the heir's personal security kernel node to obtain the summary of the digital asset certificate, and obtains the inherited digital asset certificate based on the obtained summary of the digital asset certificate.
获取到遗嘱后,司法机构节点不应立即开始执行继承过程。因为如果自己并不是用户指定的司法机构节点,其不是无权执行后续的继承程序的。因此,要对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥进行签名验证。After receiving a will, the Judicial Authority Node should not immediately initiate the inheritance process. This is because if it is not the user-designated Judicial Authority Node, it is not authorized to execute the subsequent inheritance procedures. Therefore, the will must be signed with the Judicial Authority Node's public key and the signature verified with the Judicial Authority Node's private key.
在一个实施例中,所述遗嘱还包括指定的执行该遗嘱的司法机构节点标识。如图2B所示,用户在界面上指定执行该遗嘱的司法机构节点标识,从而在图2D的遗嘱中含有该标识。In one embodiment, the will also includes a node identifier of a designated judicial institution for executing the will. As shown in FIG2B , the user specifies the node identifier of the judicial institution for executing the will on the interface, thereby including the identifier in the will of FIG2D .
在该实施例中,如图4所示,所述对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥进行签名验证成功,包括:In this embodiment, as shown in FIG4 , the signature of the will using the public key of the judicial institution node and the successful signature verification using the private key of the judicial institution node include:
步骤310、获取遗嘱中指定的执行该遗嘱的司法机构节点标识;Step 310: Obtain the node identifier of the judicial institution designated in the will to execute the will;
步骤320、如果遗嘱中指定的执行该遗嘱的司法机构节点标识是当前执行所述方法的司法机构节点的标识,对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥进行签名验证成功。Step 320: If the identifier of the judicial institution node designated in the will to execute the will is the identifier of the judicial institution node currently executing the method, the signature of the will using the judicial institution node public key is successfully verified using the judicial institution node private key.
由于遗嘱中具有指定的执行该遗嘱的司法机构节点标识,因此,可以从遗嘱中获取该标识。由于司法机构节点本地存储着自己的标识,其将获取的标识与本地存储的自己的标识进行比对,如果一致,则用司法机构节点私钥,对遗嘱中的所述遗嘱用司法机构节点公钥进行的签名进行验证。Because the will contains the identifier of the judicial institution node designated to execute it, this identifier can be obtained from the will. Since the judicial institution node locally stores its own identifier, it compares the obtained identifier with its own locally stored identifier. If they match, it uses the judicial institution node's private key to verify the signature in the will, which was signed with the judicial institution node's public key.
该实施例的好处是,综合司法机构节点标识和比较和用司法机构节点公钥生成的签名的验证两项,来进行司法机构节点的权限验证,比单纯检验签名,更能提高司法机构节点权限验证的准确性。The advantage of this embodiment is that it performs authority verification of the judicial agency node by integrating the judicial agency node identification and comparison and the verification of the signature generated by the judicial agency node public key, which can improve the accuracy of judicial agency node authority verification more than simply checking the signature.
在一个实施例中,步骤320包括:In one embodiment, step 320 includes:
如果遗嘱中指定的执行该遗嘱的司法机构节点标识是当前执行所述方法的司法机构节点的标识,对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥解密,得到解密后产生的遗嘱摘要;If the identifier of the judicial institution node designated in the will for executing the will is the identifier of the judicial institution node currently executing the method, the will signed with the judicial institution node's public key is decrypted with the judicial institution node's private key to obtain a decrypted will summary;
生成所述遗嘱的摘要;Produce an abstract of said will;
如果解密后产生的遗嘱摘要与生成的遗嘱的摘要一致,则确定对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥进行签名验证成功。If the will summary produced after decryption is consistent with the summary of the generated will, it is determined that the signature of the will using the public key of the judicial institution node and the signature verification using the private key of the judicial institution node are successful.
由于生成遗嘱签名是包括对遗嘱内容按照预定摘要算法(例如哈希算法)生成摘要、和对摘要用司法机构节点公钥加密的过程,验证签名时遵循相反的过程。首先用司法机构节点私钥对签名解密,得到遗嘱内容的摘要。然后,再按照生成签名时同样的摘要算法,生成所述遗嘱的摘要。由于在生成遗嘱签名时,遗嘱中还没有放入签名,生成遗嘱签名基于的是遗嘱中除遗嘱签名之外的内容,因此,在一个实施例中,生成所述遗嘱的摘要包括:Since generating a will signature involves generating a digest of the will content using a predetermined digest algorithm (e.g., a hash algorithm) and encrypting the digest using the public key of the judicial authority node, the reverse process is followed when verifying the signature. First, the signature is decrypted using the private key of the judicial authority node to obtain a digest of the will content. Then, the digest of the will is generated using the same digest algorithm used when generating the signature. Since the will has not yet been signed when the will signature is generated, the generation of the will signature is based on the content of the will other than the will signature. Therefore, in one embodiment, generating the digest of the will includes:
将遗嘱中的所述遗嘱用司法机构节点公钥进行的签名去除;Remove the signature of the will from the will using the public key of the judicial authority node;
对去除所述签名后的遗嘱应用生成所述遗嘱时同样的预定摘要算法,生成遗嘱的摘要。The same predetermined digest algorithm as that used when generating the will is applied to the will after the signature is removed to generate a digest of the will.
也就是说,它要遵循生成遗嘱的签名时对生成摘要相同的过程,先将将遗嘱中的所述遗嘱用司法机构节点公钥进行的签名去除,因为在生成遗嘱的签名时并没有对包含该签名的遗嘱生成摘要再加密,而是在没有包含该签名之前对遗嘱的内容生成摘要然后加密。另外,在司法机构节点还要保存与用户的个人安全内核节点中同样的预定摘要算法。这样,对去除所述签名后的遗嘱应用该预定摘要算法,生成的摘要与生成遗嘱签名时的摘要才具有一致的比对基础。In other words, it follows the same digest generation process as when generating the signature of a will. First, the signature of the will, signed with the judicial authority node's public key, is removed. This is because when generating the signature of the will, the digest of the will containing the signature is not generated and then encrypted. Instead, the digest of the will's contents is generated and then encrypted before the signature is included. Furthermore, the judicial authority node must store the same predetermined digest algorithm as that in the user's personal security kernel node. This way, when the predetermined digest algorithm is applied to the will after the signature is removed, the generated digest is consistent with the digest generated when the signature was generated.
对去除所述签名后的遗嘱应用该预定摘要算法后,将解密后产生的遗嘱摘要与生成的遗嘱的摘要比对,如果二者一致,则签名验证成功,认为当前执行遗嘱的司法机构节点就是用户指定的司法机构节点。这时,就可以触发向所述遗嘱中的各继承人个人安全内核节点的标识的继承人个人安全内核节点,发送所述遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名。After applying the predetermined digest algorithm to the will after the signature has been removed, the decrypted digest of the will is compared with the digest of the generated will. If the two are consistent, the signature verification is successful, and the judicial institution node currently executing the will is deemed to be the judicial institution node specified by the user. At this point, the signature of each digital asset certificate in the will, signed using the public key of the corresponding heir's personal security kernel node, can be triggered to be sent to the heir's personal security kernel node identified by the heir's personal security kernel node in the will.
触发的含义是可以有司法机构节点自己完成,也可以指定另一其它节点完成,也可以启动区块链网络中的智能合约,由智能合约自动分配节点完成。The meaning of triggering is that the judicial institution node can complete it by itself, or another node can be designated to complete it, or a smart contract in the blockchain network can be initiated and automatically assigned a node to complete it.
上述过程中,发送的是各数字资产凭证的签名而不是数字资产凭证本身,是因为第三方节点即使截获,也没有继承人个人安全内核节点的私钥,无法解签名,因而无法获得继承的数字资产凭证,提高继承中数字资产凭证的安全性。In the above process, what is sent is the signature of each digital asset certificate rather than the digital asset certificate itself. This is because even if a third-party node intercepts it, it does not have the private key of the heir's personal security kernel node and cannot decrypt the signature, and therefore cannot obtain the inherited digital asset certificate, thereby improving the security of the inherited digital asset certificate.
由于对数字资产凭证用继承人个人安全内核节点的公钥签名包含对数字资产凭证根据预定摘要算法生成摘要,并对摘要用继承人个人安全内核节点的公钥加密的过程,解签名的过程也分为两步。首先,继承人个人安全内核节点对该签名,用所述继承人个人安全内核节点的私钥解密,得到数字资产凭证的摘要。然后,根据得到的数字资产凭证的摘要,得到继承的数字资产凭证。Because signing a digital asset certificate with the public key of the heir's personal security kernel node involves generating a digest of the digital asset certificate using a predetermined digest algorithm and encrypting the digest with the public key of the heir's personal security kernel node, the decryption process is also a two-step process. First, the heir's personal security kernel node decrypts the signature using its private key to obtain the digest of the digital asset certificate. Then, based on the obtained digest of the digital asset certificate, the inherited digital asset certificate is obtained.
根据得到的数字资产凭证的摘要,得到继承的数字资产凭证有多种实施方式。There are multiple implementation methods for obtaining the inherited digital asset certificate based on the digest of the obtained digital asset certificate.
在一个实施例中,所述根据得到的数字资产凭证的摘要,得到继承的数字资产凭证,包括:从区块链上获取与得到的数字资产凭证的摘要对应的数字资产凭证,其中,数字资产凭证生成后,与该数字资产凭证的摘要对应存储在区块链上。In one embodiment, obtaining the inherited digital asset certificate based on the obtained summary of the digital asset certificate includes: obtaining a digital asset certificate corresponding to the summary of the obtained digital asset certificate from the blockchain, wherein, after the digital asset certificate is generated, it is stored on the blockchain corresponding to the summary of the digital asset certificate.
该实施例遵循着数字资产凭证生成后立即上链的模式。用户个人安全内核节点与业务依赖方节点(例如理财公司终端)履行业务(例如签订购买理财产品的合同)后,生成与业务依赖方节点之间的数字资产凭证(例如理财产品单)。生成数字资产凭证后,立即根据预定摘要算法,生成该数字资产凭证的摘要,将该摘要与该数字资产凭证对应存储在区块链上。这样,从区块链上可以直接查询到得到的数字资产凭证的摘要对应的数字资产凭证。This embodiment follows a model where digital asset certificates are uploaded to the blockchain immediately after generation. After the user's personal security kernel node and the business-relying party node (e.g., a financial company terminal) perform a transaction (e.g., sign a contract to purchase a financial product), a digital asset certificate (e.g., a financial product order) is generated between the user and the business-relying party node. Immediately after the digital asset certificate is generated, a digest of the digital asset certificate is generated according to a predetermined digest algorithm. This digest is then stored on the blockchain in correspondence with the digital asset certificate. This allows direct querying of the digital asset certificate corresponding to the digest of the obtained digital asset certificate from the blockchain.
在一个实施例中,个人安全内核节点包括个人安全内核节点客户端、和个人安全内核节点服务器。所述根据得到的数字资产凭证的摘要,得到继承的数字资产凭证,包括:从个人安全内核节点服务器获取与得到的数字资产凭证的摘要对应的数字资产凭证,其中,数字资产凭证由个人安全内核节点客户端生成后,与该数字资产凭证的摘要对应存储在个人安全内核节点服务器上。In one embodiment, a personal security kernel node includes a personal security kernel node client and a personal security kernel node server. Obtaining an inherited digital asset certificate based on a digest of the obtained digital asset certificate includes: obtaining, from the personal security kernel node server, a digital asset certificate corresponding to the digest of the obtained digital asset certificate, wherein the digital asset certificate, after being generated by the personal security kernel node client, is stored on the personal security kernel node server in correspondence with the digest of the digital asset certificate.
该实施例中,个人安全内核节点客户端与业务依赖方节点生成数字资产凭证后,根据预定摘要算法,生成该数字资产凭证的摘要,将该摘要与该数字资产凭证对应存储在个人安全内核节点服务器上。这样,从个人安全内核节点服务器可以直接查询到得到的数字资产凭证的摘要对应的数字资产凭证。In this embodiment, after the personal security kernel node client and the service-relying party node generate a digital asset certificate, they generate a digest of the digital asset certificate using a predetermined digest algorithm. This digest, along with the digital asset certificate, is stored on the personal security kernel node server. This allows the personal security kernel node server to directly query the digital asset certificate corresponding to the generated digital asset certificate digest.
在一个实施例中,所述遗嘱中还包括各数字资产凭证的业务依赖方节点标识。所述触发向所述遗嘱中的各继承人个人安全内核节点的标识的继承人个人安全内核节点,发送所述遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,包括:触发向所述遗嘱中的各继承人个人安全内核节点的标识的继承人个人安全内核节点,发送所述遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名、以及各数字资产凭证的业务依赖方节点标识。所述根据得到的数字资产凭证的摘要,得到继承的数字资产凭证,包括:In one embodiment, the will also includes the business dependent node identifier of each digital asset certificate. The triggering of sending the signature of each digital asset certificate in the will using the public key of the corresponding heir's personal security kernel node to the heir's personal security kernel node identifier of each heir in the will includes: triggering the sending of the signature of each digital asset certificate in the will using the public key of the corresponding heir's personal security kernel node and the business dependent node identifier of each digital asset certificate to the heir's personal security kernel node identifier of each heir in the will. The obtaining of the inherited digital asset certificate based on the obtained summary of the digital asset certificate includes:
向数字资产凭证的业务依赖方节点标识的业务依赖方节点发送得到的数字资产凭证的摘要;Sending the obtained summary of the digital asset certificate to the business relying party node identified by the business relying party node of the digital asset certificate;
从所述业务依赖方节点接收与所述数字资产凭证的摘要对应的数字资产凭证。A digital asset certificate corresponding to the digest of the digital asset certificate is received from the business relying party node.
数字资产凭证都是用户个人安全内核节点与一个业务依赖方节点履行业务形成的,形成数字资产凭证后该数字资产凭证和该数字资产凭证的摘要在该业务依赖方节点备份保存。因此,可以从该业务依赖方节点,凭数据资产凭证的摘要,调回相应数字资产凭证。为了向业务依赖方节点请求,遗嘱中要包含该业务依赖方节点的标识,它可以在生成遗嘱时根据数字资产凭证中含有的业务依赖方节点标识生成(业务依赖方节点标识是数字资产凭证的重要字段,没有该字段无法兑现该数字资产)。向继承人个人安全内核节点发送数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名时,将该业务依赖方节点标识也同时发送。这样,继承人个人安全内核节点就可以向数字资产凭证的业务依赖方节点标识的业务依赖方节点发送得到的数字资产凭证的摘要。在业务依赖方节点,数字资产凭证与其摘要对应存储,这样,从所述业务依赖方节点就可以接收到与所述数字资产凭证的摘要对应的数字资产凭证。Digital asset certificates are generated by the user's personal security kernel node and a business-relying party node during the execution of a business transaction. After the digital asset certificate is generated, the digital asset certificate and its summary are backed up and stored at the business-relying party node. Therefore, the corresponding digital asset certificate can be retrieved from the business-relying party node using the summary of the digital asset certificate. To request the business-relying party node, the will must include the business-relying party node's identifier. This identifier can be generated based on the business-relying party node identifier contained in the digital asset certificate when the will is generated (the business-relying party node identifier is a key field in the digital asset certificate; without it, the digital asset cannot be redeemed). When the digital asset certificate, signed with the public key of the heir's personal security kernel node, is sent to the heir's personal security kernel node, the business-relying party node identifier is also sent simultaneously. The heir's personal security kernel node can then send the obtained digital asset certificate summary to the business-relying party node identified by the digital asset certificate. The business-relying party node stores the digital asset certificate and its summary in correspondence, allowing the business-relying party node to receive the digital asset certificate corresponding to the summary of the digital asset certificate.
在一个实施例中,所述继承的数字资产凭证中包含数字资产凭证依赖的业务依赖方节点标识,以便所述继承人个人安全内核节点与该业务依赖方节点标识的业务依赖方节点,根据继承的数字资产凭证,生成继承人节点与该业务依赖方节点之间的更新后数字资产凭证。In one embodiment, the inherited digital asset certificate includes the business-relying party node identifier on which the digital asset certificate depends, so that the heir's personal security kernel node and the business-relying party node identified by the business-relying party node generate an updated digital asset certificate between the heir node and the business-relying party node based on the inherited digital asset certificate.
也就是说,虽然在步骤230中,继承人个人安全内核节点得到了继承的数字资产凭证,但该数字资产凭证仅是用户个人安全内核节点与依赖方节点形成的,并非继承人个人安全内核节点与依赖方节点形成的,因此,继承人个人安全内核节点要与依赖方节点形成更新后数字资产凭证。That is to say, although in step 230, the heir's personal security kernel node obtains the inherited digital asset certificate, the digital asset certificate is only formed by the user's personal security kernel node and the relying party node, not by the heir's personal security kernel node and the relying party node. Therefore, the heir's personal security kernel node must form an updated digital asset certificate with the relying party node.
在一个实施例中,所述与该业务依赖方节点标识的业务依赖方节点,根据继承的数字资产凭证,生成继承人节点与该业务依赖方节点之间的更新后数字资产凭证包括由继承人个人安全内核节点执行的以下过程:In one embodiment, the business relying party node identified by the business relying party node generates, based on the inherited digital asset certificate, an updated digital asset certificate between the successor node and the business relying party node, including the following process performed by the successor's personal security kernel node:
向该业务依赖方节点标识的业务依赖方节点,发送继承的数字资产凭证和继承人个人安全内核节点标识,以便所述业务依赖方节点根据继承的数字资产凭证和继承人个人安全内核节点标识,生成更新后数字资产凭证;Sending the inherited digital asset certificate and the heir's personal security kernel node identifier to the business relying party node identified by the business relying party node, so that the business relying party node generates an updated digital asset certificate based on the inherited digital asset certificate and the heir's personal security kernel node identifier;
接收所述业务依赖方节点发送的更新后数字资产凭证。Receive the updated digital asset certificate sent by the business relying party node.
由于更新后数字资产凭证中的依赖方节点义务与继承的数字资产凭证的依赖方节点义务完全一致,只不过当事人由用户个人安全内核节点和业务依赖方节点变成了依赖方个人安全内核节点和业务依赖方节点,因此,可以将继承数字资产凭证内容中仅将当事人信息由用户个人安全内核节点标识和业务依赖方节点标识变成了依赖方个人安全内核节点标识和业务依赖方节点标识,得到更新后数字资产凭证,向继承人个人安全内核节点发送。Since the obligations of the relying party node in the updated digital asset certificate are exactly the same as those of the inherited digital asset certificate, except that the parties have changed from the user's personal security kernel node and the business relying party node to the relying party's personal security kernel node and the business relying party node, it is possible to change only the party information in the inherited digital asset certificate content from the user's personal security kernel node identifier and the business relying party node identifier to the relying party's personal security kernel node identifier and the business relying party node identifier, obtain the updated digital asset certificate, and send it to the heir's personal security kernel node.
该实施例的好处是,通过便捷的程序,转换继承的数字资产凭证,提高更新数字资产凭证的效率。The benefit of this embodiment is that it converts inherited digital asset certificates through a convenient procedure, thereby improving the efficiency of updating digital asset certificates.
另外,经过上述过程,完成整个继承过程,可以将所述用户的个人安全内核节点设置为终止状态。将所述用户的个人安全内核节点设置为终止状态可以是由智能合约分配节点自动进行的。另外,也可以不在完成上述过程后立即将所述用户的个人安全内核节点设置为终止状态。用户的个人安全内核节点除了在继承中使用,还可能在一些其它的程序中用到。因此,可能除了继承之外,还要等到其它相关程序完成,让所述用户的个人安全内核节点变为终止状态。Furthermore, after the above process completes the entire inheritance process, the user's personal security kernel node can be set to a terminated state. Setting the user's personal security kernel node to a terminated state can be performed automatically by the smart contract allocation node. Furthermore, the user's personal security kernel node can be set to a terminated state at some point in time after the above process completes. Besides being used in inheritance, the user's personal security kernel node may also be used in other programs. Therefore, in addition to inheritance, it may be necessary to wait until other related programs are completed before the user's personal security kernel node is set to a terminated state.
用户的个人安全内核节点具有未启用、启用、暂停、终止几种状态。当用户未出生之前,用户的个人安全内核节点相应地处于未启用状态。在用户出生后,经过家长的申请,使该个人安全内核节点处于启用状态。在过程中,如遇到挂失等事件,有可能需要将个人安全内核节点设置到暂停状态,暂停状态下不得对该个人安全内核节点进行操作,直到恢复位置。当用户生命周期结束后,经过上述流程,并完成了其它可能会用到用户的个人安全内核节点的流程后,可以将个人安全内核节点设置为终止状态。终止状态下,该个人安全内核节点被废止,永久不得对该个人安全内核节点进行访问。A user's personal security kernel node has several states: inactive, active, suspended, and terminated. Before the user is born, the user's personal security kernel node is inactive. After the user is born, upon parental approval, the node is enabled. During this time, in the event of a loss, the node may need to be reset to a suspended state. Operations on the node are prohibited until it is restored. At the end of the user's lifecycle, after completing the aforementioned process and any other processes that may require the node, the node can be reset to a terminated state. In the terminated state, the node is deactivated and permanently inaccessible.
另外,有时遗嘱中仅仅指定继承人是不够的,随着继承适用的法律不同,继承的效果可能有很大差别。例如,在某些国家的法律规定,继承交继承税,而另外一些国家的法律规定,继承不交继承税。在一个实施例中,在图2B的界面上,用户不仅指定各数字资产凭证对应的继承人个人安全内核节点标识、和执行遗嘱继承的司法机构节点的标识,还指定遗嘱的继承适用法律。这样,在图2D所示的遗嘱中,可能还包含该遗嘱的继承适用法律。Furthermore, sometimes simply specifying the heirs in a will is insufficient. The effects of inheritance can vary significantly depending on the laws governing inheritance. For example, the laws of some countries require inheritance to be subject to inheritance tax, while the laws of other countries do not. In one embodiment, in the interface of FIG2B , the user not only specifies the heir's personal security kernel node identifier corresponding to each digital asset certificate and the identifier of the judicial authority node that will execute the will, but also specifies the applicable laws governing inheritance. Thus, the will shown in FIG2D may also include the applicable laws governing inheritance.
在该实施例中,步骤230中,所述触发向所述遗嘱中的各继承人个人安全内核节点的标识的继承人个人安全内核节点,发送所述遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,包括:In this embodiment, in step 230, the triggering of sending the signature of each digital asset certificate in the will using the public key of the corresponding heir's personal security kernel node to the heir's personal security kernel node identified by each heir in the will includes:
触发向所述遗嘱中的各继承人个人安全内核节点的标识的继承人个人安全内核节点,发送所述遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名、和遗嘱的继承适用法律,以便所述继承人个人安全内核节点得到继承的数字资产凭证后,执行所述继承适用法律对应的进程。Trigger the heir's personal security kernel node identified by each heir in the will, and send the signature of each digital asset certificate in the will using the public key of the corresponding heir's personal security kernel node and the inheritance applicable law of the will, so that after the heir's personal security kernel node obtains the inherited digital asset certificate, it executes the process corresponding to the inheritance applicable law.
也就是说,由于遗嘱中还有继承适用法律,因此,触发向遗嘱中的数字资产凭证对应的继承人个人安全内核节点标识的继承人个人安全内核节点发送的就不仅仅是遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,还有遗嘱的继承适用法律。That is to say, since the will also contains the applicable law of inheritance, what triggers the sending of the heir's personal security kernel node identified by the heir's personal security kernel node corresponding to the digital asset certificate in the will is not only the signature of each digital asset certificate in the will using the public key of the corresponding heir's personal security kernel node, but also the applicable law of inheritance of the will.
每一种继承适用法律对应的继承进程可以事先编写好程序代码,存储在公共服务器上或各用户个人安全内核节点中。这样,在一个实施例中,执行所述继承适用法律对应的进程,包括由继承人个人安全内核节点执行的如下过程:根据接收到的继承适用法律,从公共服务器上或继承人个人安全内核节点中获取该继承适用法律对应的程序代码,并将继承的数字资产凭证输入该程序代码,从而执行所述继承适用法律对应的进程。The inheritance process corresponding to each applicable inheritance law can be pre-written in program code and stored on a public server or in each user's personal secure kernel node. Thus, in one embodiment, executing the process corresponding to the applicable inheritance law includes the following process performed by the heir's personal secure kernel node: based on the received applicable inheritance law, the program code corresponding to the applicable inheritance law is retrieved from the public server or the heir's personal secure kernel node, and the inherited digital asset certificate is input into the program code, thereby executing the process corresponding to the applicable inheritance law.
该实施例的好处是,使得继承能够按照用户指定的继承适用法律进行,提高继承的精细度。The benefit of this embodiment is that inheritance can be carried out in accordance with the applicable inheritance law specified by the user, thereby improving the precision of inheritance.
另外,不是所有用户都会在生命周期结束之前设立遗嘱。当用户在生命周期结束之前没有设立遗嘱时,相当于法定继承的情形。除了遗嘱继承的情形,在一个实施例中,还将法定继承的数据处理自动化,实现了自动化缺省遗嘱继承。Furthermore, not all users create a will before their lifecycle ends. When a user doesn't create a will before their lifecycle ends, it's equivalent to a statutory inheritance scenario. In addition to testamentary inheritance, one embodiment also automates the data processing for statutory inheritance, enabling automated default testamentary inheritance.
如图5所示,在一个实施例中,在步骤210之后,所述方法还包括:As shown in FIG5 , in one embodiment, after step 210, the method further includes:
步骤225、如果获取不到用户的遗嘱,根据所述用户的个人安全内核节点的身份,确定所述身份对应的法律;Step 225: If the user's will cannot be obtained, determine the law corresponding to the identity based on the identity of the user's personal security kernel node;
步骤235、获取所述用户的亲属关系;Step 235: Obtain the user's kinship relationship;
步骤245、获取用户的各数字资产凭证;Step 245: Obtain the user's digital asset certificates;
步骤255、针对获取的用户的每一个数字资产凭证,按照确定的法律和所述亲属关系,确定各数字资产凭证对应的继承人个人安全内核节点标识;Step 255: For each digital asset certificate of the user obtained, determine the personal security kernel node identifier of the heir corresponding to each digital asset certificate according to the determined law and the kinship relationship;
步骤265、获取确定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥;Step 265: Obtain the public key of the heir's personal security kernel node of the determined heir's personal security kernel node identifier;
步骤275、将用户的每一个数字资产凭证,用对应的继承人个人安全内核节点的公钥进行签名,并发送到对应的继承人个人安全内核节点,以便所述继承人个人安全内核节点对该签名,用所述继承人个人安全内核节点的私钥解密,得到数字资产凭证的摘要,根据得到的数字资产凭证的摘要,得到继承的数字资产凭证。Step 275: Sign each digital asset certificate of the user with the public key of the corresponding heir's personal security kernel node and send it to the corresponding heir's personal security kernel node, so that the heir's personal security kernel node can decrypt the signature with the private key of the heir's personal security kernel node to obtain the summary of the digital asset certificate. Based on the obtained summary of the digital asset certificate, the inherited digital asset certificate is obtained.
下面对这些步骤进行详细描述。These steps are described in detail below.
在步骤225中,如果获取不到用户的遗嘱,根据所述用户的个人安全内核节点的身份,确定所述身份对应的法律。In step 225, if the user's will cannot be obtained, the law corresponding to the identity is determined based on the identity of the user's personal security kernel node.
如果从区块链或者从用户个人安全内核节点服务器都获取不到用户的遗嘱,很可能用户没来不及设立遗嘱就生命周期结束了,此时需要启动法定继承,根据所述用户的个人安全内核节点的身份,确定所述身份对应的法律。If the user's will cannot be obtained from the blockchain or the user's personal security kernel node server, it is likely that the user's life cycle has ended before he or she has had time to establish a will. At this time, statutory inheritance needs to be initiated and the law corresponding to the identity of the user's personal security kernel node needs to be determined.
由于用户生命周期结束后,其个人安全内核节点客户端可能找不到,因此,在一个实施例中,要事先将用户的个人安全内核节点的身份存储在个人安全内核节点服务器。根据所述用户的个人安全内核节点的身份,确定所述身份对应的法律,包括:Since the user's personal security kernel node client may not be found after the user's lifecycle ends, in one embodiment, the identity of the user's personal security kernel node is stored in advance on the personal security kernel node server. Based on the identity of the user's personal security kernel node, the corresponding law is determined, including:
向启动请求中的用户的个人安全内核节点标识对应的个人安全内核节点服务器发送身份请求;Send an identity request to the personal security kernel node server corresponding to the personal security kernel node identifier of the user in the startup request;
从所述个人安全内核节点服务器接收用户的个人安全内核节点的身份;Receiving the identity of the user's personal security kernel node from the personal security kernel node server;
查找身份与法律对应关系表,确定所述身份对应的法律。Search the identity-law correspondence table to determine the law corresponding to the identity.
由于启动请求中具有用户的个人安全内核节点标识,它对应着唯一一组个人安全内核节点客户端及服务器,因此,可以向启动请求中的用户的个人安全内核节点标识对应的个人安全内核节点服务器发送身份请求。Since the startup request contains the user's personal security kernel node identifier, which corresponds to a unique set of personal security kernel node clients and servers, an identity request can be sent to the personal security kernel node server corresponding to the user's personal security kernel node identifier in the startup request.
用户的个人安全内核节点的身份是指用户的国籍、注册地区等。例如,用户是中国人,可能适用中国法律进行继承。用户是每个人,可能适用美国法律进行继承。The identity of a user's personal security kernel node refers to the user's nationality, registration region, etc. For example, if the user is Chinese, Chinese law may apply to inheritance. If the user is an individual, US law may apply to inheritance.
在预定服务器或每个个人安全内核节点中存储用户的个人安全内核节点的身份与继承适用法律的对应关系表,即身份与法律对应关系表。从该对应关系表,可以根据所述用户的个人安全内核节点的身份,确定所述身份对应的法律。A table of correspondences between the identity of a user's personal security kernel node and the applicable laws for inheritance, i.e., an identity-law correspondence table, is stored in a predetermined server or in each personal security kernel node. From this correspondence table, the law corresponding to the identity of the user's personal security kernel node can be determined based on the identity of the user's personal security kernel node.
在步骤235中,获取所述用户的亲属关系。In step 235, the user's kinship relationship is obtained.
在一个实施例中,用户的亲属关系列表存储在用户个人安全内核节点服务器中。因此,从该用户个人安全内核节点服务器中的用户的亲属关系列表,可以获取所述用户的亲属关系。In one embodiment, the user's kinship list is stored in the user's personal security kernel node server. Therefore, the user's kinship list in the user's personal security kernel node server can be used to obtain the user's kinship relationship.
在步骤245中,获取用户的各数字资产凭证。In step 245, the user's digital asset certificates are obtained.
在一个实施例中,用户的各数字资产凭证不仅存储在用户个人安全内核节点客户端中,还存储在用户个人安全内核节点服务器中。虽然用户个人安全内核节点客户端可能随着用户生命周期结束后无法找到,但可以按照启动请求中的用户个人安全内核节点,找到对应的用户个人安全内核节点服务器,从中获取用户的各数字资产凭证。In one embodiment, a user's digital asset credentials are stored not only on the user's personal secure kernel node client but also on the user's personal secure kernel node server. Although the user's personal secure kernel node client may become unavailable after the user's lifecycle ends, the corresponding personal secure kernel node server can be found based on the user's personal secure kernel node in the startup request, from which the user's digital asset credentials can be retrieved.
在步骤255中,针对获取的用户的每一个数字资产凭证,按照确定的法律和所述亲属关系,确定各数字资产凭证对应的继承人个人安全内核节点标识。In step 255, for each digital asset certificate of the user obtained, the personal security kernel node identifier of the heir corresponding to each digital asset certificate is determined according to the determined law and the kinship relationship.
在一个实施例中,在专门的服务器中或在每个个人安全内核节点中设置与各适用的法律对应的程序代码。将用户的各数字资产凭证和所述亲属关系输入该与确定的法律对应的程序代码,就得到按照该法律,各数字资产凭证对应的继承人个人安全内核节点标识。In one embodiment, program code corresponding to each applicable law is installed on a dedicated server or in each personal security kernel node. The user's digital asset credentials and the kinship relationship are input into the program code corresponding to the determined law, and the heir's personal security kernel node identifier corresponding to each digital asset credential is obtained according to the law.
在步骤265中,获取确定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥。In step 265 , the public key of the heir's personal security kernel node of the determined heir's personal security kernel node identifier is obtained.
在一个实施例中,获取继承人个人安全内核节点标识的继承人个人安全内核节点的公钥可以通过向区块链中专门的认证中心服务器(CA)请求实现。由于认证中心服务器(CA)是发放区块链节点公私钥的节点,可以从其请求任何区块链节点的公钥。In one embodiment, obtaining the public key of the heir's personal security kernel node, which identifies the heir's personal security kernel node, can be achieved by requesting a dedicated authentication center (CA) server in the blockchain. Since the authentication center (CA) server is the node that issues the public and private keys of blockchain nodes, the public key of any blockchain node can be requested from it.
在另一个实施例中,获取确定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥,包括:从区块链上获取与确定的继承人个人安全内核节点标识对应的继承人个人安全内核节点的公钥,其中,继承人个人安全内核节点的公钥由继承人个人安全内核节点生成,并与继承人个人安全内核节点的公钥标识对应记录在区块链上。In another embodiment, obtaining the public key of the heir's personal security kernel node with the determined heir's personal security kernel node identifier includes: obtaining the public key of the heir's personal security kernel node corresponding to the determined heir's personal security kernel node identifier from the blockchain, wherein the public key of the heir's personal security kernel node is generated by the heir's personal security kernel node and recorded on the blockchain corresponding to the public key identifier of the heir's personal security kernel node.
该实施例中,不是由认证中心服务器生成并存储公钥,而是各个个人安全内核节点并发布在区块链上。由于与个人安全内核节点标识对应记录在区块链上,在需要时可以凭个人安全内核节点标识在区块链上查找。In this embodiment, the public key is not generated and stored by the authentication center server, but by each individual security kernel node and published on the blockchain. Since the corresponding record of the individual security kernel node identifier is recorded on the blockchain, the individual security kernel node identifier can be used to search on the blockchain when needed.
在另一实施例中,获取确定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥,包括:In another embodiment, obtaining the public key of the heir's personal security kernel node of the determined heir's personal security kernel node identifier includes:
通过社交操作系统平台,向继承人好友个人安全内核节点发送公钥获取请求,所述公钥获取请求包括确定的继承人个人安全内核节点标识;Sending a public key acquisition request to the personal security kernel node of the heir's friend via the social operating system platform, wherein the public key acquisition request includes the determined personal security kernel node identifier of the heir;
从继承人好友个人安全内核节点,接收该继承人个人安全内核节点标识的继承人个人安全内核节点的公钥。Receive the public key of the heir's personal security kernel node identified by the heir's personal security kernel node from the heir's friend's personal security kernel node.
在社交操作系统平台上(例如微信),当两个用户互相加好友时,其中一个用户的公钥会发到另一个人的个人安全内核节点保存。而社交操作系统平台保存着所有互相加好友的人之间的好友关系。这样,通过社交操作系统平台,可以获取与该继承人个人安全内核节点标识具有好友关系的所有继承人个人安全内核节点标识列表,向该列表中任何一个个人安全内核节点标识的个人安全内核节点发送公钥获取请求,所述公钥获取请求包括确定的继承人个人安全内核节点标识。该个人安全内核节点返回该继承人个人安全内核节点标识的继承人个人安全内核节点的公钥。On a social operating system platform (such as WeChat), when two users add each other as friends, the public key of one user is sent to the other user's personal security kernel node for storage. The social operating system platform stores the friendship relationships between all users who have added each other as friends. In this way, through the social operating system platform, a list of all heir personal security kernel node identifiers that have a friendship relationship with the heir's personal security kernel node identifier can be obtained, and a public key acquisition request is sent to the personal security kernel node of any personal security kernel node identifier in the list, the public key acquisition request including the determined heir personal security kernel node identifier. The personal security kernel node returns the public key of the heir personal security kernel node identified by the heir personal security kernel node identifier.
在步骤275中,将用户的每一个数字资产凭证,用对应的继承人个人安全内核节点的公钥进行签名,并发送到对应的继承人个人安全内核节点,以便所述继承人个人安全内核节点对该签名,用所述继承人个人安全内核节点的私钥解密,得到数字资产凭证的摘要,根据得到的数字资产凭证的摘要,得到继承的数字资产凭证。In step 275, each digital asset certificate of the user is signed with the public key of the corresponding heir's personal security kernel node and sent to the corresponding heir's personal security kernel node, so that the heir's personal security kernel node decrypts the signature with the private key of the heir's personal security kernel node to obtain the summary of the digital asset certificate, and obtains the inherited digital asset certificate based on the obtained summary of the digital asset certificate.
该步骤与步骤230的区别仅在于,在步骤230中是按照遗嘱中数字资产凭证对应的继承人安全内核节点发送用对应的继承人个人安全内核节点的公钥进行的签名,而步骤275中,是按照法律推导出的数字资产凭证对应的继承人安全内核节点发送用对应的继承人个人安全内核节点的公钥进行签名。大体过程相同,故不赘述。The only difference between this step and step 230 is that, whereas in step 230, the heir's security kernel node corresponding to the digital asset certificate in the will sends a signature using the public key of the heir's personal security kernel node, in step 275, the heir's security kernel node corresponding to the legally derived digital asset certificate sends a signature using the public key of the heir's personal security kernel node. The general process is the same, so I won't repeat it here.
该实施例的好处是,实现了法定继承的自动化,且保证继承中的安全性。The advantage of this embodiment is that it realizes the automation of legal inheritance and ensures the security of inheritance.
如图6所示,在一个实施例中,所述遗嘱由用户的个人安全内核节点通过以下过程生成:As shown in FIG6 , in one embodiment, the will is generated by the user's personal security kernel node through the following process:
步骤410、对于用户的个人安全内核节点中的数字资产凭证,接收用户对该数字资产凭证的继承人个人安全内核节点标识的指定;Step 410: For the digital asset certificate in the user's personal security kernel node, receive the user's designation of the personal security kernel node identifier of the successor of the digital asset certificate;
步骤420、获取指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥;Step 420: Obtain the public key of the heir's personal security kernel node of the designated heir's personal security kernel node identifier;
步骤430、将每一个数字资产凭证,用相应获取的指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥进行签名,得到各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名;Step 430: Sign each digital asset certificate with the public key of the heir's personal security kernel node corresponding to the designated heir's personal security kernel node identifier, thereby obtaining a signature of each digital asset certificate with the public key of the corresponding heir's personal security kernel node.
步骤440、将用户个人安全内核节点的标识、各继承人个人安全内核节点的标识、各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名放入遗嘱中;Step 440: Place the user's personal security kernel node identifier, the identifiers of each heir's personal security kernel node, and the signatures of each digital asset certificate using the public key of the corresponding heir's personal security kernel node into the will;
步骤450、接收用户对执行该遗嘱的司法机构节点标识的指定;Step 450: Receive the user's designation of the node identifier of the judicial institution that will execute the will;
步骤460、获取所述司法机构节点标识的司法机构节点的公钥;Step 460: Obtain the public key of the judicial institution node identified by the judicial institution node;
步骤470、将所述遗嘱中的当前内容用获取的司法机构节点的公钥签名,放入所述遗嘱。Step 470: Sign the current content of the will with the obtained public key of the judicial institution node and put it into the will.
下面,对以上过程进行详细描述。The above process is described in detail below.
在步骤410中,对于用户的个人安全内核节点中的数字资产凭证,接收用户对该数字资产凭证的继承人个人安全内核节点标识的指定。In step 410 , for the digital asset certificate in the user's personal security kernel node, the user's designation of the personal security kernel node identifier of the heir of the digital asset certificate is received.
图2B示出了一个针对个人安全内核节点中的数字资产凭证,用户指定继承人个人安全内核节点标识的界面。实际上,步骤410可以通过分类指定或分项指定实现。图2B是分项指定的一个例子的界面。FIG2B shows an interface for a user to specify the identity of an heir's personal security kernel node for a digital asset certificate in a personal security kernel node. In practice, step 410 can be implemented by category designation or item designation. FIG2B is an example interface for item designation.
在分项指定的实施例中,步骤410包括:In the embodiment specified in the sub-item, step 410 includes:
显示用户的个人安全内核节点中的数字资产凭证列表;Displays a list of digital asset certificates in the user's personal secure kernel node;
针对数字资产凭证列表中的每个数字资产凭证,接收用户对该数字资产凭证的继承人个人安全内核节点标识的指定。For each digital asset certificate in the digital asset certificate list, a designation of a personal security kernel node identifier of an heir of the digital asset certificate by a user is received.
在该实施例中,图2B的界面上,向用户显示出包含用户的个人安全内核节点中的所有数字资产凭证的数字资产凭证列表。在列表中的每个数字资产凭证的下面,分别显示了指定对该数字资产凭证的继承人个人安全内核节点标识的下拉框。点击下拉框右部的箭头,下拉菜单弹出,显示了所有候选的继承人个人安全内核节点标识。所有候选的继承人个人安全内核节点标识可以从用户的个人安全内核节点中存储的用户通讯录中直接导出,也可以从用户的个人安全内核节点中存储的亲属关系列表中直接导出。当用户在下拉菜单中选择一个候选个人安全内核节点标识后,就认为指定了对该数字资产凭证的继承人个人安全内核节点标识。In this embodiment, the interface of FIG2B displays a list of digital asset certificates containing all digital asset certificates in the user's personal security kernel node. Below each digital asset certificate in the list, a drop-down box is displayed for specifying the personal security kernel node identifier of the heir to that digital asset certificate. Clicking the arrow on the right side of the drop-down box causes a drop-down menu to pop up, displaying all candidate heir personal security kernel node identifiers. All candidate heir personal security kernel node identifiers can be directly derived from the user's address book stored in the user's personal security kernel node, or directly derived from the kinship list stored in the user's personal security kernel node. When the user selects a candidate personal security kernel node identifier in the drop-down menu, the heir personal security kernel node identifier for that digital asset certificate is considered to have been specified.
该实施例的好处是便于用户针对每一项数字资产凭证分别指定相应继承人个人安全内核节点标识,提高遗嘱生成的精细度。The advantage of this embodiment is that it is convenient for users to specify the corresponding heir's personal security kernel node identifier for each digital asset certificate, thereby improving the precision of will generation.
在分类指定的实施例中,步骤410包括:In a classification-specified embodiment, step 410 includes:
显示用户的个人安全内核节点中的数字资产凭证类型列表;Displays a list of digital asset certificate types in the user's personal security kernel node;
针对数字资产凭证列表中的每个数字资产凭证类型,接收用户对该数字资产凭证类型的继承人个人安全内核节点标识的指定,其中,指定的继承人个人安全内核节点标识用于该数字资产凭证类型的每一个数字资产凭证。For each digital asset certificate type in the digital asset certificate list, a user designation of an heir personal security kernel node identifier for the digital asset certificate type is received, wherein the designated heir personal security kernel node identifier is used for each digital asset certificate of the digital asset certificate type.
该实施例的界面与图2B的不同之处在于,图2B的界面显示的是所有数字资产凭证的列表,该实施例的界面显示的是所有数字资产凭证类型(如理财产品单、保险产品单、股票交易单)的列表,这是因为通常用户希望针对同一种类型的数字资产凭证(理财产品单),指定同一个继承人继承。然后,针对数字资产凭证列表中的每个数字资产凭证类型,用户对该数字资产凭证类型的继承人个人安全内核节点标识进行指定。指定后,这种类型的所有数字资产凭证在继承时都由该指定的继承人个人安全内核节点继承。The interface of this embodiment differs from that of FIG. 2B in that the interface of FIG. 2B displays a list of all digital asset certificates, while the interface of this embodiment displays a list of all digital asset certificate types (such as financial product orders, insurance product orders, and stock trading orders). This is because users typically wish to designate the same heir to inherit the same type of digital asset certificate (financial product order). Then, for each digital asset certificate type in the digital asset certificate list, the user designates the heir's personal security kernel node identifier for that digital asset certificate type. After designation, all digital asset certificates of this type are inherited by the designated heir's personal security kernel node upon inheritance.
该实施例的好处是,针对通常用户希望针对同一种类型的数字资产凭证(理财产品单),指定同一个继承人继承的特点,提高遗嘱生成的效率。The advantage of this embodiment is that it improves the efficiency of will generation in view of the fact that users usually want to designate the same heir to inherit the same type of digital asset certificate (financial product certificate).
在步骤420中,获取指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥。In step 420 , the public key of the heir's personal security kernel node of the designated heir's personal security kernel node identifier is obtained.
如前所述,获取指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥可以向专门的认证中心服务器(CA)请求实现,也可以从区块链上获取,还可以通过社交操作系统平台,向继承人好友个人安全内核节点获取。由于前面已描述具体实现,这里为节约篇幅不再赘述。As previously mentioned, obtaining the public key of the heir's personal secure kernel node, which identifies the designated heir's personal secure kernel node, can be accomplished by requesting it from a dedicated certification authority (CA), obtaining it from the blockchain, or obtaining it from the heir's friends' personal secure kernel nodes through a social operating system platform. Since the specific implementation has been described previously, it will not be repeated here to save space.
在步骤430中,将每一个数字资产凭证,用相应获取的指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥进行签名,得到各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名。In step 430, each digital asset certificate is signed with the public key of the heir's personal security kernel node identified by the corresponding designated heir's personal security kernel node, so that each digital asset certificate is signed with the public key of the corresponding heir's personal security kernel node.
如前所述,将数字资产凭证用相应获取的指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥进行签名的过程,包括基于预定摘要算法对数字资产凭证生成摘要、和用相应获取的指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥对摘要加密的过程。As described above, the process of signing a digital asset certificate with the public key of the heir's personal security kernel node identified by the corresponding designated heir's personal security kernel node includes generating a digest for the digital asset certificate based on a predetermined digest algorithm, and encrypting the digest with the public key of the heir's personal security kernel node identified by the corresponding designated heir's personal security kernel node.
在步骤440中,将用户个人安全内核节点的标识、各继承人个人安全内核节点的标识、各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名放入遗嘱中。In step 440, the identifier of the user's personal security kernel node, the identifier of each heir's personal security kernel node, and the signature of each digital asset certificate using the public key of the corresponding heir's personal security kernel node are placed in the will.
将用户个人安全内核节点的标识放入遗嘱中是因为,在继承程序中要通过用户个人安全内核节点的标识找回遗嘱。将各继承人个人安全内核节点的标识、各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名放入遗嘱中,是因为在继承程序中需要向这些标识对应的继承人个人安全内核节点发送数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名。The user's personal secure kernel node identifier is included in the will because it is needed to retrieve the will during the inheritance process. The identifiers of each heir's personal secure kernel node and the signatures of each digital asset certificate using the public key of the corresponding heir's personal secure kernel node are included in the will because the inheritance process requires sending the digital asset certificate signed with the public key of the corresponding heir's personal secure kernel node to the heir's personal secure kernel node corresponding to these identifiers.
在步骤450中,接收用户对执行该遗嘱的司法机构节点标识的指定。In step 450, the user's designation of the node identifier of the judicial institution that will execute the will is received.
如图2B所示,用户可以在界面中的执行遗嘱的司法机构节点标识下拉框中进行指定。点击下拉框右部的箭头,下拉菜单弹出,显示了所有候选的司法机构节点标识。这些候选的司法机构节点标识是预先导入的。当用户在下拉菜单中选择一个候选司法机构节点标识后,就认为指定了执行该遗嘱的司法机构节点标识。As shown in Figure 2B, the user can specify the judicial authority node ID for executing the will in the drop-down box on the interface. Clicking the arrow to the right of the drop-down box will pop up a drop-down menu displaying all candidate judicial authority node IDs. These candidate judicial authority node IDs are pre-imported. Once the user selects a candidate judicial authority node ID in the drop-down menu, the judicial authority node ID for executing the will is designated.
在步骤460中,获取所述司法机构节点标识的司法机构节点的公钥。In step 460, the public key of the judicial institution node identified by the judicial institution node is obtained.
与步骤420类似,该步骤也可以向专门的认证中心服务器(CA)请求实现,也可以从区块链上获取,还可以通过社交操作系统平台,向继承人好友个人安全内核节点获取,故不赘述。Similar to step 420, this step can also be implemented by requesting a dedicated certification center server (CA), or obtained from the blockchain, or obtained from the personal security kernel node of the heir's friend through the social operating system platform, so it will not be repeated here.
在步骤470中,将所述遗嘱中的当前内容用获取的司法机构节点的公钥签名,放入所述遗嘱。In step 470, the current content in the will is signed with the obtained public key of the judicial institution node and placed into the will.
该签名放入遗嘱的意义如前所述,其在继承程序中可以用来验证执行继承程序的司法机构节点是否是用户真正想要的司法机构节点。如果执行继承程序的司法机构节点不是用户指定的司法机构节点,没有司法机构节点的私钥,无法签名验证成功。The significance of this signature in the will is as previously mentioned. It can be used during the inheritance process to verify whether the judicial authority node executing the inheritance process is the one the user intended. If the judicial authority node executing the inheritance process is not the one specified by the user, signature verification will fail without the judicial authority node's private key.
该实施例的好处是,通过快捷的方式,生成遗嘱,提高了遗嘱生成的效率。The advantage of this embodiment is that a will is generated in a quick manner, thereby improving the efficiency of will generation.
如前所述,遗嘱中除了包括用户个人安全内核节点的标识、各继承人个人安全内核节点的标识、各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名、所述遗嘱用司法机构节点公钥进行的签名之外,还可以包含指定的司法机构节点标识。在该实施例中,在步骤470之前,生成遗嘱的方法还包括:将指定的司法机构节点标识放入遗嘱中(未示)。As previously described, in addition to including the identifier of the user's personal security kernel node, the identifiers of each heir's personal security kernel node, the signature of each digital asset certificate using the public key of the corresponding heir's personal security kernel node, and the signature of the will using the judicial institution's node public key, the will may also include a designated judicial institution node identifier. In this embodiment, before step 470, the method for generating a will further includes: inserting the designated judicial institution node identifier into the will (not shown).
由于在步骤450中,已经接收了用户对执行遗嘱的司法机构节点标识的指定,因此,在本步骤中,可以将该标识放入遗嘱中。Since the user's designation of the node ID of the judicial institution that will execute the will has been received in step 450, the ID can be placed in the will in this step.
遗嘱在生成后,可以配置在不同的位置。如前所述,在步骤220中,获取用户的遗嘱时,可以从区块链上获取,也可以从用户个人安全内核节点服务器获取。实际上,也可以用用户个人安全内核节点客户端获取,只不过用户个人安全内核节点客户端非常容易随着用户生命周期结束变得找不到,因此,从区块链上或用户个人安全内核节点服务器获取更有保障。在一个实施例中,根据遗嘱配置的安全性要求,可以分成多种安全模式,每种模式安全性等级不同。After a will is generated, it can be configured in various locations. As previously mentioned, in step 220, when obtaining the user's will, it can be obtained from the blockchain or from the user's personal secure kernel node server. In practice, it can also be obtained using the user's personal secure kernel node client, but the user's personal secure kernel node client is very easy to lose as the user's lifecycle ends. Therefore, obtaining it from the blockchain or the user's personal secure kernel node server is more secure. In one embodiment, based on the security requirements of the will configuration, it can be divided into multiple security modes, each with different security levels.
在一个实施例中,所述遗嘱生成后通过以下过程配置:In one embodiment, the will is configured through the following process after it is generated:
显示安全模式列表,所述安全模式列表包括第一安全模式、第二安全模式、第三安全模式,其中,第一安全模式中,遗嘱存储在用户个人安全内核节点客户端中;第二安全模式中,遗嘱存储在用户个人安全内核节点客户端和服务器中;第三安全模式中,遗嘱存储在用户个人安全内核节点服务器中,并发布在区块链上;Display a security mode list, which includes a first security mode, a second security mode, and a third security mode. In the first security mode, the will is stored in the user's personal security kernel node client; in the second security mode, the will is stored in the user's personal security kernel node client and server; in the third security mode, the will is stored in the user's personal security kernel node server and published on the blockchain;
响应于用户在安全模式列表中选择第一安全模式,将所述遗嘱存储在用户个人安全内核节点客户端中;In response to the user selecting a first security mode in the security mode list, storing the will in the user's personal security kernel node client;
响应于用户在安全模式列表中选择第二安全模式,将遗嘱存储在用户个人安全内核节点客户端和服务器中;In response to the user selecting a second security mode in the security mode list, storing the will in the user's personal security kernel node client and server;
响应于用户在安全模式列表中选择第三安全模式,将遗嘱存储在用户个人安全内核节点服务器中,并发布在区块链上。In response to the user selecting the third security mode in the security mode list, the will is stored in the user's personal security kernel node server and published on the blockchain.
遗嘱的配置是指遗嘱生成后的保存和维护。安全模式是指对应于不同安全性等级的、存储遗嘱的方式。第一安全模式中,遗嘱存储在用户个人安全内核节点客户端中,这样,用户手机丢失后可能找不回数字资产凭证,安全程度最低。第二安全模式中,遗嘱存储在用户个人安全内核节点客户端和服务器中。这样,用户手机丢失仍可找回资产,安全程度其次。第三安全模式中,遗嘱存储在用户个人安全内核节点客户端和服务器中,并发布在区块链上。这样,在其中一处找不到,还可以在另外一处查找,安全程度最高。Will configuration refers to the storage and maintenance of a will after it's created. Security modes refer to different ways of storing a will, corresponding to different levels of security. In the first security mode, the will is stored on the user's personal secure kernel node client. This prevents the user from retrieving their digital asset certificates if their phone is lost, resulting in the lowest level of security. In the second security mode, the will is stored on both the user's personal secure kernel node client and the server. This allows for asset recovery even if the user's phone is lost, providing the second highest level of security. In the third security mode, the will is stored on both the user's personal secure kernel node client and the server, and published on the blockchain. This allows for easy retrieval if the will is lost in one location, providing the highest level of security.
另外,当用户在生命周期期间生成了遗嘱后,用户可能会继续生成数字资产凭证,如与依赖方节点形成新的数字资产凭证(如购入新的理财产品,产生新的理财产品单)。对于这些新的数字资产凭证,并没有指定对应的继承人个人安全内核节点标识,因此,在用户生命周期结束后,这些新的数字资产凭证不能根据遗嘱继承。因此,在用户生成遗嘱后,用户个人安全内核节点中数字资产凭证又增加的情况下,可以有让用户补充指定该数字资产凭证的继承人个人安全内核节点标识,和自动为用户指定该数字资产凭证的继承人个人安全内核节点标识两种实施方式。In addition, after a user generates a will during their lifecycle, they may continue to generate digital asset certificates, such as forming new digital asset certificates with a relying party node (e.g., purchasing a new financial product and generating a new financial product order). For these new digital asset certificates, no corresponding heir's personal secure kernel node identifier is specified. Therefore, after the user's lifecycle ends, these new digital asset certificates cannot be inherited according to the will. Therefore, if a user generates a will and additional digital asset certificates are added to the user's personal secure kernel node, two implementation methods can be used: allowing the user to additionally specify the heir's personal secure kernel node identifier for the digital asset certificate, or automatically specifying the heir's personal secure kernel node identifier for the digital asset certificate for the user.
在让用户补充指定该数字资产凭证的继承人个人安全内核节点标识的实施例中,如图7所示,所述遗嘱由用户的个人安全内核节点通过以下过程更新:In an embodiment where the user is asked to specify the personal security kernel node identifier of the heir of the digital asset certificate, as shown in FIG7 , the will is updated by the user's personal security kernel node through the following process:
步骤510、当所述用户的个人安全内核节点中增加数字资产凭证时,向用户显示指定该数字资产凭证的继承人个人安全内核节点标识的界面;Step 510: When a digital asset certificate is added to the user's personal security kernel node, an interface for specifying the personal security kernel node identifier of the heir of the digital asset certificate is displayed to the user;
步骤520、在所述界面上接收用户对该数字资产凭证的继承人个人安全内核节点标识的指定;Step 520: receiving, on the interface, a user's designation of a personal security kernel node identifier for an heir of the digital asset certificate;
步骤530、获取指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥;Step 530: Obtain the public key of the heir's personal security kernel node of the designated heir's personal security kernel node identifier;
步骤540、对增加的数字资产凭证,用相应获取的指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥进行签名,得到增加的数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名;Step 540: Sign the added digital asset certificate with the public key of the heir's personal security kernel node corresponding to the designated heir's personal security kernel node identifier, thereby obtaining a signature of the added digital asset certificate with the public key of the corresponding heir's personal security kernel node.
步骤550、将为增加的数字资产凭证指定的继承人个人安全内核节点标识、增加的数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,添加到遗嘱中;Step 550: Add the heir's personal security kernel node identifier specified for the added digital asset certificate and the signature of the added digital asset certificate using the public key of the corresponding heir's personal security kernel node to the will;
步骤560、将遗嘱中当前的用获取的司法机构节点的公钥的签名去掉;Step 560: Remove the current signature in the will using the obtained public key of the judicial institution node;
步骤570、将所述遗嘱中的当前内容用获取的司法机构节点的公钥签名,放入所述遗嘱。Step 570: Sign the current content in the will with the obtained public key of the judicial institution node and put it into the will.
下面对步骤510-570进行详细描述。Steps 510-570 are described in detail below.
在步骤510中,当所述用户的个人安全内核节点中增加数字资产凭证时,向用户显示指定该数字资产凭证的继承人个人安全内核节点标识的界面。In step 510, when a digital asset certificate is added to the user's personal security kernel node, an interface for specifying the personal security kernel node identifier of the heir of the digital asset certificate is displayed to the user.
在一个实施例中,用户的个人安全内核节点中具有检测模块,当有新的数字资产凭证写入个人安全内核节点(即用户个人安全内核节点与依赖方节点履行业务后产生凭据,即数字资产凭证,写入个人安全内核节点的个人资产保险箱中)时,检测模块会检测到这一情况,显示一个类似于图2B的界面,该界面中列出了增加的数字资产凭证,在下面有指定继承人个人安全内核节点的下拉框。点击右部的箭头,可以显示下拉菜单,下拉菜单有所有候选继承人个人安全内核节点标识的列表,让用户选择。In one embodiment, a user's personal security kernel node includes a detection module. When a new digital asset credential is written to the personal security kernel node (i.e., the user's personal security kernel node and the relying party node perform business and generate a credential, i.e., a digital asset credential, which is written to the personal asset safe of the personal security kernel node), the detection module detects this and displays an interface similar to FIG2B , which lists the added digital asset credential and a drop-down box below for specifying the heir's personal security kernel node. Clicking the arrow on the right displays a drop-down menu containing a list of all candidate heir personal security kernel node identifiers, allowing the user to select.
在步骤520中,在所述界面上接收用户对该数字资产凭证的继承人个人安全内核节点标识指定。In step 520, the user's designation of a personal security kernel node identifier of the heir of the digital asset certificate is received on the interface.
当用户在下拉菜单中选择一个继承人个人安全内核节点标识,就认为接收到了用户对该数字资产凭证的继承人个人安全内核节点标识的指定。When the user selects an heir's personal security kernel node identifier in the drop-down menu, it is considered that the user's designation of the heir's personal security kernel node identifier for the digital asset certificate has been received.
在步骤530中,获取指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥。In step 530 , the public key of the heir's personal security kernel node of the designated heir's personal security kernel node identifier is obtained.
与步骤420类似,该步骤也可以向专门的认证中心服务器(CA)请求实现,也可以从区块链上获取,还可以通过社交操作系统平台,向继承人好友个人安全内核节点获取,故不赘述。Similar to step 420, this step can also be implemented by requesting a dedicated certification center server (CA), or obtained from the blockchain, or obtained from the personal security kernel node of the heir's friend through the social operating system platform, so it will not be repeated here.
在步骤540中,对增加的数字资产凭证,用相应获取的指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥进行签名,得到增加的数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名。In step 540, the added digital asset certificate is signed with the public key of the heir's personal security kernel node identified by the corresponding designated heir's personal security kernel node, and the added digital asset certificate is signed with the public key of the corresponding heir's personal security kernel node.
该步骤与步骤430类似,包括按预定的摘要算法生成增加的数字资产凭证的摘要,并用相应获取的指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥对摘要加密的过程。This step is similar to step 430, and includes generating a digest of the added digital asset certificate according to a predetermined digest algorithm, and encrypting the digest with the public key of the heir's personal security kernel node identified by the corresponding designated heir's personal security kernel node.
在步骤550中,将为增加的数字资产凭证指定的继承人个人安全内核节点标识、增加的数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,添加到遗嘱中。In step 550, the heir's personal security kernel node identifier specified for the added digital asset certificate and the signature of the added digital asset certificate using the public key of the corresponding heir's personal security kernel node are added to the will.
该步骤与步骤440类似,只不过步骤550是仅对增加的数字资产凭证,执行将继承人个人安全内核节点标识和相应签名增加到遗嘱中,故不赘述。This step is similar to step 440, except that step 550 is only for the added digital asset certificate, and the heir's personal security kernel node identifier and corresponding signature are added to the will, so it is not repeated here.
在步骤560中,将遗嘱中当前的用获取的司法机构节点的公钥的签名去掉。In step 560, the current signature in the will using the obtained public key of the judicial institution node is removed.
由于在470中生成遗嘱用司法机构节点的公钥的签名时,是针对当时生成遗嘱时遗嘱中的当前内容进行的签名,在由于遗嘱当前内容增加了步骤550中添加的内容,导致签名继承有变化,因此,需要重新签名。但是遗嘱中该签名本身不是签名基础的一部分,在形成新的遗嘱用司法机构节点的公钥的签名时,首先要将该签名去掉,在此基础上,将所述遗嘱中的当前内容用获取的司法机构节点的公钥签名。这时的当前内容就包括了步骤550中添加的内容。When the will was signed with the judicial institution node's public key in step 470, the signature was applied to the current contents of the will at the time of creation. Since the content added in step 550 has been added to the current contents of the will, the signature inheritance has changed, and therefore a new signature is required. However, this signature in the will itself is not part of the signature basis. When signing the new will with the judicial institution node's public key, this signature must first be removed. Then, the current contents of the will are signed with the acquired judicial institution node's public key. At this point, the current contents include the content added in step 550.
在步骤570中,将所述遗嘱中的当前内容用获取的司法机构节点的公钥签名,放入所述遗嘱。In step 570, the current content in the will is signed with the obtained public key of the judicial institution node and placed into the will.
上述过程在遗嘱生成后用户的数字资产凭证增加的情况下,提供了一种简单易行的更新遗嘱的方式,避免了遗嘱中一些新增加的数字资产凭证将来可能没有继承人的问题。The above process provides a simple and easy way to update a will when the user's digital asset certificates increase after the will is generated, avoiding the problem that some newly added digital asset certificates in the will may have no heirs in the future.
在自动为新增加的数字资产凭证补充该数字资产凭证的继承人个人安全内核节点标识的情况下,在一个实施例中,如图8所示,所述遗嘱由用户的个人安全内核节点通过以下过程更新:In the case of automatically adding the personal security kernel node identifier of the heir of the newly added digital asset certificate to the digital asset certificate, in one embodiment, as shown in FIG8 , the will is updated by the user's personal security kernel node through the following process:
步骤510’、当所述用户的个人安全内核节点中增加数字资产凭证时,根据遗嘱中为已有的数字资产凭证指定的继承人个人安全内核节点标识,确定增加的数字资产凭证对应的继承人个人安全内核节点标识;Step 510': When a digital asset certificate is added to the user's personal security kernel node, the heir's personal security kernel node identifier corresponding to the added digital asset certificate is determined based on the heir's personal security kernel node identifier specified for the existing digital asset certificate in the will;
步骤520’、获取增加的数字资产凭证对应的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥;Step 520': Obtain the public key of the heir's personal security kernel node corresponding to the added digital asset certificate.
步骤530’、对增加的数字资产凭证,用相应获取的指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥进行签名,得到增加的数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名;Step 530': Sign the added digital asset certificate with the public key of the heir's personal security kernel node corresponding to the designated heir's personal security kernel node identifier, thereby obtaining a signature of the added digital asset certificate with the public key of the corresponding heir's personal security kernel node.
步骤540’、将为增加的数字资产凭证指定的继承人个人安全内核节点标识、增加的数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,添加到遗嘱中;Step 540': add the heir's personal security kernel node identifier specified for the added digital asset certificate and the signature of the added digital asset certificate using the public key of the corresponding heir's personal security kernel node to the will;
步骤550’、将遗嘱中当前的用获取的司法机构节点的公钥的签名去掉;Step 550': remove the current signature in the will using the obtained public key of the judicial institution node;
步骤560’、将所述遗嘱中的当前内容用获取的司法机构节点的公钥签名,放入所述遗嘱。Step 560': Sign the current content in the will with the obtained public key of the judicial institution node and put it into the will.
下面对上述步骤进行详细描述。The above steps are described in detail below.
在步骤510’中,当所述用户的个人安全内核节点中增加数字资产凭证时,根据遗嘱中为已有的数字资产凭证指定的继承人个人安全内核节点标识,确定增加的数字资产凭证对应的继承人个人安全内核节点标识。In step 510', when a digital asset certificate is added to the user's personal security kernel node, the heir's personal security kernel node identifier corresponding to the added digital asset certificate is determined based on the heir's personal security kernel node identifier specified for the existing digital asset certificate in the will.
判断所述用户的个人安全内核节点中增加数字资产凭证的方法与步骤510相同。The method for determining whether to add a digital asset certificate to the user's personal security kernel node is the same as step 510.
在一个实施例中,所述根据遗嘱中为已有的数字资产凭证指定的继承人个人安全内核节点标识,确定增加的数字资产凭证对应的继承人个人安全内核节点标识,包括:In one embodiment, determining the heir's personal security kernel node identifier corresponding to the added digital asset certificate based on the heir's personal security kernel node identifier specified in the will for the existing digital asset certificate includes:
获取增加的数字资产凭证的类型;Get the type of added digital asset certificate;
查找遗嘱中已为相同类型的数字资产凭证指定的继承人个人安全内核节点标识;Find the personal security kernel node identifier of the heir designated in the will for the same type of digital asset certificate;
如果遗嘱中已为相同类型的数字资产凭证指定的继承人个人安全内核节点标识一致,将遗嘱中已为相同类型的数字资产凭证指定的继承人个人安全内核节点标识确定为增加的数字资产凭证对应的继承人个人安全内核节点标识。If the personal security kernel node identifiers of the heirs specified in the will for the same type of digital asset certificates are consistent, the personal security kernel node identifiers of the heirs specified in the will for the same type of digital asset certificates will be determined as the personal security kernel node identifiers of the heirs corresponding to the added digital asset certificates.
由于数字资产凭证中含有数字资产凭证的类型字段,因此,从该数字资产凭证的类型字段可以获取增加的数字资产凭证的类型。Since the digital asset certificate contains a digital asset certificate type field, the type of the added digital asset certificate can be obtained from the type field of the digital asset certificate.
例如,增加的数字资产凭证的类型为理财产品,查找遗嘱中已为理财产品类型的数字资产凭证指定继承人个人安全内核节点标识。如果遗嘱中之前有5个理财产品类型的数字资产凭证,为这些数字资产凭证指定的继承人个人安全内核节点标识就有5个,但这5个可能是相同的继承人个人安全内核节点标识。即,遗嘱中已为相同类型的数字资产凭证指定的继承人个人安全内核节点标识一致,这时,用户很可能希望对于新增加的数字资产凭证也指定同样的继承人个人安全内核节点继承,因此,将遗嘱中已为相同类型的数字资产凭证指定的继承人个人安全内核节点标识确定为增加的数字资产凭证对应的继承人个人安全内核节点标识。For example, if the added digital asset certificate is a financial product, the heir's personal security kernel node identifier specified for the digital asset certificate of the financial product type in the will is searched. If the will previously contained five digital asset certificates of the financial product type, there would be five heir's personal security kernel node identifiers specified for these digital asset certificates. However, these five heir's personal security kernel node identifiers may be identical. In other words, the heir's personal security kernel node identifiers specified for the same type of digital asset certificates in the will are identical. In this case, the user likely wishes to specify the same heir's personal security kernel node for the newly added digital asset certificate. Therefore, the heir's personal security kernel node identifier specified for the same type of digital asset certificate in the will is determined as the heir's personal security kernel node identifier corresponding to the added digital asset certificate.
在一个实施例中,所述根据遗嘱中为已有的数字资产凭证指定的继承人个人安全内核节点标识,确定增加的数字资产凭证对应的继承人个人安全内核节点标识,还包括:In one embodiment, determining the heir's personal security kernel node identifier corresponding to the added digital asset certificate based on the heir's personal security kernel node identifier specified for the existing digital asset certificate in the will further includes:
如果遗嘱中已为相同类型的数字资产凭证指定的继承人个人安全内核节点标识不一致,将遗嘱中已为相同类型的数字资产凭证指定的多个继承人个人安全内核节点标识中最多的继承人个人安全内核节点标识,确定为增加的数字资产凭证对应的继承人个人安全内核节点标识。If the personal security kernel node identifiers of the heirs specified in the will for the same type of digital asset certificates are inconsistent, the personal security kernel node identifier of the heir with the largest number of personal security kernel node identifiers among the multiple personal security kernel node identifiers of the heirs specified in the will for the same type of digital asset certificates shall be determined as the personal security kernel node identifier of the heir corresponding to the added digital asset certificate.
例如,如果遗嘱中之前有5个理财产品类型的数字资产凭证,为这些数字资产凭证指定的继承人个人安全内核节点标识就有5个,其中3个是继承人个人安全内核节点A的标识,2个是继承人个人安全内核节点B的标识,这时两者多的一个,可能是用户更希望指定的,因此,自动将将遗嘱中已为相同类型的数字资产凭证指定的5个继承人个人安全内核节点标识中最多的继承人个人安全内核节点标识,即继承人个人安全内核节点A的标识,确定为增加的数字资产凭证对应的继承人个人安全内核节点标识。For example, if there are 5 digital asset certificates of the financial product type in the will, there are 5 personal security kernel node identifiers of the heirs specified for these digital asset certificates, 3 of which are the identifiers of the heir's personal security kernel node A and 2 are the identifiers of the heir's personal security kernel node B. At this time, the one with more of the two may be the one the user prefers to specify. Therefore, the heir's personal security kernel node identifier with the most of the 5 heir's personal security kernel node identifiers specified for the same type of digital asset certificates in the will, that is, the identifier of the heir's personal security kernel node A, is automatically determined as the heir's personal security kernel node identifier corresponding to the added digital asset certificate.
该实施例基于之前为相同类型的数字资产凭证指定的继承人个人安全内核节点标识,来确定为新增加的数字资产凭证指定的继承人个人安全内核节点标识,由于用户倾向于对于同类数字资产凭证,指定同一继承人个人安全内核节点,该实施例提高了自动指定继承人个人安全内核节点标识的准确性。This embodiment determines the heir personal security kernel node identifier specified for the newly added digital asset certificate based on the heir personal security kernel node identifier previously specified for the same type of digital asset certificate. Since users tend to specify the same heir personal security kernel node for the same type of digital asset certificate, this embodiment improves the accuracy of automatically specifying the heir personal security kernel node identifier.
另外,如果遗嘱中没有找到相同类型的数字资产凭证,则可以按照类似步骤510-520的方式,让用户手动选择希望增加的数字资产凭证对应的继承人个人安全内核节点标识。In addition, if the same type of digital asset certificate is not found in the will, the user can manually select the heir's personal security kernel node identifier corresponding to the digital asset certificate that he wishes to add in a manner similar to steps 510-520.
在一个实施例中,所述根据遗嘱中为已有的数字资产凭证指定的继承人个人安全内核节点标识,确定增加的数字资产凭证对应的继承人个人安全内核节点标识,包括:In one embodiment, determining the heir's personal security kernel node identifier corresponding to the added digital asset certificate based on the heir's personal security kernel node identifier specified in the will for the existing digital asset certificate includes:
获取增加的数字资产凭证的业务依赖方节点标识;Obtain the business relying party node identifier of the added digital asset certificate;
查找遗嘱中已为相同业务依赖方节点标识的数字资产凭证指定的继承人个人安全内核节点标识;Find the personal security kernel node ID of the heir specified in the will for the digital asset certificate with the same business relying party node ID;
如果遗嘱中已为相同业务依赖方节点标识的数字资产凭证指定的继承人个人安全内核节点标识一致,将遗嘱中已为相同业务依赖方节点标识的数字资产凭证指定的继承人个人安全内核节点标识确定为增加的数字资产凭证对应的继承人个人安全内核节点标识。If the personal security kernel node identifier of the heir specified in the will for the digital asset certificate with the same business dependent party node identifier is consistent, the personal security kernel node identifier of the heir specified in the will for the digital asset certificate with the same business dependent party node identifier shall be determined as the personal security kernel node identifier of the heir corresponding to the added digital asset certificate.
由于数字资产凭证中也含有业务依赖方节点标识字段,因此,从该依赖方节点标识字段可以获取增加的数字资产凭证的业务依赖方节点标识。Since the digital asset certificate also contains a business relying party node identification field, the business relying party node identification of the added digital asset certificate can be obtained from the relying party node identification field.
例如,增加的数字资产凭证是一个从理财公司A购买的理财产品,因此,业务依赖方节点标识是理财公司A的终端标识。查找遗嘱中为从理财公司A终端形成的数字资产凭证(例如理财产品等)指定的继承人个人安全内核节点标识有5个,但这5个可能是相同的继承人个人安全内核节点标识,这时就将该相同的继承人个人安全内核节点标识作为增加的数字资产凭证对应的继承人个人安全内核节点标识。For example, the added digital asset certificate is a financial product purchased from Financial Management Company A. Therefore, the business relying party node identifier is the terminal identifier of Financial Management Company A. Find five heir personal security kernel node identifiers specified in the will for digital asset certificates (such as financial products) generated from Financial Management Company A's terminal. However, these five heir personal security kernel node identifiers may be the same. In this case, the same heir personal security kernel node identifier is used as the heir personal security kernel node identifier corresponding to the added digital asset certificate.
在一个实施例中,所述根据遗嘱中为已有的数字资产凭证指定的继承人个人安全内核节点标识,确定增加的数字资产凭证对应的继承人个人安全内核节点标识,还包括:In one embodiment, determining the heir's personal security kernel node identifier corresponding to the added digital asset certificate based on the heir's personal security kernel node identifier specified for the existing digital asset certificate in the will further includes:
如果遗嘱中已为相同业务依赖方节点标识的数字资产凭证指定的继承人个人安全内核节点标识不一致,将遗嘱中已为相同业务依赖方节点标识的数字资产凭证指定的多个继承人个人安全内核节点标识中最多的继承人个人安全内核节点标识,确定为增加的数字资产凭证对应的继承人个人安全内核节点标识。If the personal security kernel node identifiers of the heirs specified in the will for the digital asset certificates with the same business dependent party node identifier are inconsistent, the personal security kernel node identifier of the heir with the largest number of personal security kernel node identifiers among the multiple personal security kernel node identifiers of the heirs specified in the will for the digital asset certificates with the same business dependent party node identifier shall be determined as the personal security kernel node identifier of the heir corresponding to the added digital asset certificate.
例如,如果遗嘱中之前有5个理财产品是从理财公司A购买的,为这些数字资产凭证指定的继承人个人安全内核节点标识就有5个,其中3个是继承人个人安全内核节点A的标识,2个是继承人个人安全内核节点B的标识,这时两者多的一个,可能是用户更希望指定的,因此,自动将将遗嘱中已为相同业务依赖方节点标识的数字资产凭证指定的5个继承人个人安全内核节点标识中最多的继承人个人安全内核节点标识,即继承人个人安全内核节点A的标识,确定为增加的数字资产凭证对应的继承人个人安全内核节点标识。For example, if there are 5 financial products purchased from financial management company A in the will, there are 5 heir personal security kernel node identifiers specified for these digital asset certificates, 3 of which are the identifiers of the heir personal security kernel node A and 2 are the identifiers of the heir personal security kernel node B. At this time, the one with more of the two may be the one the user prefers to specify. Therefore, the heir personal security kernel node identifier with the most of the 5 heir personal security kernel node identifiers specified for the digital asset certificates with the same business dependent party node identifier in the will, that is, the identifier of the heir personal security kernel node A, is automatically determined as the heir personal security kernel node identifier corresponding to the added digital asset certificate.
该实施例基于之前为相同业务依赖方节点标识的数字资产凭证指定的继承人个人安全内核节点标识,来确定为新增加的数字资产凭证指定的继承人个人安全内核节点标识,由于用户倾向于对于同一业务依赖方节点的数字资产凭证,指定同一继承人个人安全内核节点,该实施例提高了自动指定继承人个人安全内核节点标识的准确性。This embodiment determines the heir's personal security kernel node identifier specified for the newly added digital asset certificate based on the heir's personal security kernel node identifier previously specified for the digital asset certificate of the same business dependent party node identifier. Since users tend to specify the same heir's personal security kernel node for digital asset certificates of the same business dependent party node, this embodiment improves the accuracy of automatically specifying the heir's personal security kernel node identifier.
在步骤520’中,获取增加的数字资产凭证对应的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥。In step 520', the public key of the heir's personal security kernel node corresponding to the added digital asset certificate is obtained.
与步骤530类似,该步骤也可以向专门的认证中心服务器(CA)请求实现,也可以从区块链上获取,还可以通过社交操作系统平台,向继承人好友个人安全内核节点获取,故不赘述。Similar to step 530, this step can also be implemented by requesting a dedicated certification center server (CA), or obtained from the blockchain, or obtained from the personal security kernel node of the heir's friend through the social operating system platform, so it will not be repeated here.
在步骤530’中,对增加的数字资产凭证,用相应获取的指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥进行签名,得到增加的数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名。In step 530', the added digital asset certificate is signed with the public key of the heir's personal security kernel node identified by the corresponding designated heir's personal security kernel node, and the added digital asset certificate is signed with the public key of the corresponding heir's personal security kernel node.
该步骤与步骤540类似,故不赘述。This step is similar to step 540 and will not be described in detail.
在步骤540’中,将为增加的数字资产凭证指定的继承人个人安全内核节点标识、增加的数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,添加到遗嘱中。In step 540', the heir's personal security kernel node identifier specified for the added digital asset certificate and the signature of the added digital asset certificate using the public key of the corresponding heir's personal security kernel node are added to the will.
该步骤与步骤550类似,故不赘述。This step is similar to step 550 and will not be described in detail.
在步骤550’中,将遗嘱中当前的用获取的司法机构节点的公钥的签名去掉。In step 550', the current signature in the will using the obtained public key of the judicial institution node is removed.
该步骤与步骤560类似,故不赘述。This step is similar to step 560 and will not be described in detail.
在步骤560’中,将所述遗嘱中的当前内容用获取的司法机构节点的公钥签名,放入所述遗嘱。In step 560', the current content in the will is signed with the obtained public key of the judicial institution node and placed into the will.
该步骤与步骤570类似,故不赘述。This step is similar to step 570 and will not be described in detail.
该实施例实现了自动根据用户个人安全内核节点中已有的数字资产凭证,为新增加的数字资产凭证分配继承人个人安全内核节点标识,提高了遗嘱更新的自动化程度。This embodiment automatically allocates the heir's personal security kernel node identifier to the newly added digital asset certificate based on the existing digital asset certificate in the user's personal security kernel node, thereby improving the automation level of will updates.
另外,如果遗嘱中没有找到相同业务依赖方节点标识的数字资产凭证,则可以按照类似步骤510-520的方式,让用户手动选择希望增加的数字资产凭证对应的继承人个人安全内核节点标识。In addition, if the digital asset certificate with the same business dependent party node identifier is not found in the will, the user can manually select the heir's personal security kernel node identifier corresponding to the digital asset certificate that he wishes to add in a manner similar to steps 510-520.
如图9所示,根据一个实施例,还提供了一种司法机构节点,包括:As shown in FIG9 , according to one embodiment, a judicial institution node is further provided, including:
生命周期结束确定单元610,用于确定用户的生命周期结束;A lifecycle end determination unit 610 is used to determine the end of a user's lifecycle;
遗嘱获取单元620,用于获取用户的遗嘱,所述遗嘱包括用户个人安全内核节点的标识、各继承人个人安全内核节点的标识、各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名、所述遗嘱用司法机构节点公钥进行的签名;A will acquisition unit 620 is configured to acquire a user's will, which includes the identifier of the user's personal security kernel node, the identifiers of each heir's personal security kernel node, the signature of each digital asset certificate using the public key of the corresponding heir's personal security kernel node, and the signature of the will using the public key of the judicial institution's node.
第一数字资产凭证签名发送单元630,用于如果对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥进行签名验证成功,触发向所述遗嘱中的各继承人个人安全内核节点的标识的继承人个人安全内核节点,发送所述遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,以便所述继承人个人安全内核节点对该签名,用所述继承人个人安全内核节点的私钥解密,得到数字资产凭证的摘要,根据得到的数字资产凭证的摘要,得到继承的数字资产凭证。The first digital asset certificate signature sending unit 630 is used to trigger the heir's personal security kernel node identified by each heir's personal security kernel node in the will to send the signature of each digital asset certificate in the will using the public key of the corresponding heir's personal security kernel node if the signature of the will using the public key of the judicial institution node is successfully verified using the private key of the judicial institution node, so that the heir's personal security kernel node can decrypt the signature using the private key of the heir's personal security kernel node to obtain the summary of the digital asset certificate, and obtain the inherited digital asset certificate based on the obtained summary of the digital asset certificate.
在一个实施例中,所述生命周期结束确定单元610进一步用于:In one embodiment, the lifecycle end determination unit 610 is further configured to:
响应于来自调查节点的生命周期结束通知,确定用户的生命周期结束。In response to the lifecycle end notification from the investigation node, it is determined that the lifecycle of the user has ended.
在一个实施例中,所述生命周期结束确定单元610进一步用于:In one embodiment, the lifecycle end determination unit 610 is further configured to:
接收到启动节点的启动请求;Receive a startup request from a startup node;
通过社交操作系统平台,向多个证明方节点发送继承程序启动确认请求;Sending a confirmation request for starting the inheritance program to multiple proving party nodes via the social operating system platform;
如果所述多个证明方节点的应答满足预定条件,则确定用户的生命周期结束。If the responses of the plurality of prover nodes satisfy a predetermined condition, it is determined that the lifecycle of the user is ended.
在一个实施例中,所述如果所述多个证明方节点的应答满足预定条件,则确定用户的生命周期结束,包括:In one embodiment, if the responses of the plurality of proving nodes satisfy a predetermined condition, determining that the user lifecycle has ended includes:
如果所述多个证明方节点的应答满足预定条件,且接收到来自调查节点的生命周期结束通知,则确定用户的生命周期结束。If the responses of the plurality of prover nodes satisfy predetermined conditions and a lifecycle end notification is received from the investigating node, it is determined that the user's lifecycle has ended.
在一个实施例中,所述遗嘱还包括指定的执行该遗嘱的司法机构节点标识。所述对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥进行签名验证成功,包括:In one embodiment, the will also includes an identifier of a designated judicial institution node for executing the will. The signature of the will using the judicial institution node public key and the successful signature verification using the judicial institution node private key include:
获取遗嘱中指定的执行该遗嘱的司法机构节点标识;Obtain the node ID of the judicial institution designated in the will to execute the will;
如果遗嘱中指定的执行该遗嘱的司法机构节点标识是当前执行所述方法的司法机构节点的标识,对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥进行签名验证成功。If the identifier of the judicial institution node designated in the will to execute the will is the identifier of the judicial institution node currently executing the method, the signature of the will using the public key of the judicial institution node is successfully verified using the private key of the judicial institution node.
在一个实施例中,所述如果遗嘱中指定的执行该遗嘱的司法机构节点标识是当前执行所述方法的司法机构节点的标识,对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥进行签名验证成功,包括:In one embodiment, if the identifier of the judicial institution node designated in the will to execute the will is the identifier of the judicial institution node currently executing the method, the signature of the will using the judicial institution node public key is successfully verified using the judicial institution node private key, including:
如果遗嘱中指定的执行该遗嘱的司法机构节点标识是当前执行所述方法的司法机构节点的标识,对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥解密,得到解密后产生的遗嘱摘要;If the identifier of the judicial institution node designated in the will for executing the will is the identifier of the judicial institution node currently executing the method, the will signed with the judicial institution node's public key is decrypted with the judicial institution node's private key to obtain a decrypted will summary;
生成所述遗嘱的摘要;Produce an abstract of said will;
如果解密后产生的遗嘱摘要与生成的遗嘱的摘要一致,则确定对所述遗嘱用司法机构节点公钥进行的签名,用司法机构节点私钥进行签名验证成功。If the will summary produced after decryption is consistent with the summary of the generated will, it is determined that the signature of the will using the public key of the judicial institution node and the signature verification using the private key of the judicial institution node are successful.
在一个实施例中,所述继承的数字资产凭证中包含数字资产凭证依赖的业务依赖方节点标识,以便所述继承人个人安全内核节点与该业务依赖方节点标识的业务依赖方节点,根据继承的数字资产凭证,生成继承人节点与该业务依赖方节点之间的更新后数字资产凭证。In one embodiment, the inherited digital asset certificate includes the business-relying party node identifier on which the digital asset certificate depends, so that the heir's personal security kernel node and the business-relying party node identified by the business-relying party node generate an updated digital asset certificate between the heir node and the business-relying party node based on the inherited digital asset certificate.
在一个实施例中,所述遗嘱还包括所述遗嘱的继承适用法律,所述触发向所述遗嘱中的各继承人个人安全内核节点的标识的继承人个人安全内核节点,发送所述遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,包括:In one embodiment, the will further includes the applicable law of inheritance of the will, and the triggering of sending each digital asset certificate in the will, signed by the public key of the corresponding heir's personal security kernel node, to the heir's personal security kernel node identified by each heir in the will, includes:
触发向所述遗嘱中的各继承人个人安全内核节点的标识的继承人个人安全内核节点,发送所述遗嘱中各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名、和遗嘱的继承适用法律,以便所述继承人个人安全内核节点得到继承的数字资产凭证后,执行所述继承适用法律对应的进程。Trigger the heir's personal security kernel node identified by each heir in the will, and send the signature of each digital asset certificate in the will using the public key of the corresponding heir's personal security kernel node and the inheritance applicable law of the will, so that after the heir's personal security kernel node obtains the inherited digital asset certificate, it executes the process corresponding to the inheritance applicable law.
在一个实施例中,所述司法机构节点还包括:In one embodiment, the judicial institution node further includes:
身份对应法律确定单元,用于如果获取不到用户的遗嘱,根据所述用户的个人安全内核节点的身份,确定所述身份对应的法律;An identity-corresponding law determination unit, configured to determine the law corresponding to the identity based on the identity of the user's personal security kernel node if the user's will cannot be obtained;
亲属关系获取单元,用于获取所述用户的亲属关系;a kinship acquisition unit, configured to acquire the kinship of the user;
数字资产凭证获取单元,用于获取用户的各数字资产凭证;A digital asset certificate acquisition unit, used to acquire each digital asset certificate of the user;
继承人个人安全内核节点标识确定单元,用于针对获取的用户的每一个数字资产凭证,按照确定的法律和所述亲属关系,确定各数字资产凭证对应的继承人个人安全内核节点标识;An heir personal security kernel node identification determination unit is used to determine the heir personal security kernel node identification corresponding to each digital asset certificate obtained from the user in accordance with the determined law and the kinship relationship;
继承人个人安全内核节点公钥获取单元,用于获取确定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥;The heir personal security kernel node public key acquisition unit is used to obtain the public key of the heir personal security kernel node of the determined heir personal security kernel node identifier;
第二数字资产凭证签名发送单元,用于将用户的每一个数字资产凭证,用对应的继承人个人安全内核节点的公钥进行签名,并发送到对应的继承人个人安全内核节点,以便所述继承人个人安全内核节点对该签名,用所述继承人个人安全内核节点的私钥解密,得到数字资产凭证的摘要,根据得到的数字资产凭证的摘要,得到继承的数字资产凭证。The second digital asset certificate signature sending unit is used to sign each digital asset certificate of the user with the public key of the corresponding heir's personal security kernel node and send it to the corresponding heir's personal security kernel node, so that the heir's personal security kernel node can decrypt the signature with the private key of the heir's personal security kernel node to obtain the summary of the digital asset certificate, and obtain the inherited digital asset certificate based on the obtained summary of the digital asset certificate.
在一个实施例中,所述遗嘱由用户的个人安全内核节点通过以下过程生成:In one embodiment, the will is generated by the user's personal security kernel node through the following process:
对于用户的个人安全内核节点中的数字资产凭证,接收用户对该数字资产凭证的继承人个人安全内核节点标识的指定;For a digital asset certificate in a user's personal secure kernel node, receiving the user's designation of a personal secure kernel node identifier for the successor of the digital asset certificate;
获取指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥;Obtain the public key of the heir's personal security kernel node for the specified heir's personal security kernel node identifier;
将每一个数字资产凭证,用相应获取的指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥进行签名,得到各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名;Sign each digital asset certificate with the public key of the heir's personal security kernel node identified by the corresponding designated heir's personal security kernel node, to obtain a signature of each digital asset certificate with the public key of the corresponding heir's personal security kernel node;
将用户个人安全内核节点的标识、各继承人个人安全内核节点的标识、各数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名放入遗嘱中;Place the user's personal security kernel node identifier, each heir's personal security kernel node identifier, and each digital asset certificate signed with the public key of the corresponding heir's personal security kernel node into the will;
接收用户对执行该遗嘱的司法机构节点标识的指定;receiving the user's designation of a node identifier of a judicial institution for executing the will;
获取所述司法机构节点标识的司法机构节点的公钥;Obtaining a public key of the judicial institution node identified by the judicial institution node;
将所述遗嘱中的当前内容用获取的司法机构节点的公钥签名,放入所述遗嘱。The current content in the will is signed with the obtained public key of the judicial institution node and placed in the will.
在一个实施例中,在将所述遗嘱用获取的司法机构节点的公钥签名,放入所述遗嘱之前,所述的遗嘱的生成过程还包括:In one embodiment, before signing the will with the obtained public key of the judicial institution node and inserting it into the will, the will generation process further includes:
将指定的司法机构节点标识放入遗嘱中。Place the designated judicial authority node ID into the will.
在一个实施例中,所述遗嘱生成后通过以下过程配置:In one embodiment, the will is configured through the following process after it is generated:
显示安全模式列表,所述安全模式列表包括第一安全模式、第二安全模式、第三安全模式,其中,第一安全模式中,遗嘱存储在用户个人安全内核节点客户端中;第二安全模式中,遗嘱存储在用户个人安全内核节点客户端和服务器中;第三安全模式中,遗嘱存储在用户个人安全内核节点服务器中,并发布在区块链上;Display a security mode list, which includes a first security mode, a second security mode, and a third security mode. In the first security mode, the will is stored in the user's personal security kernel node client; in the second security mode, the will is stored in the user's personal security kernel node client and server; in the third security mode, the will is stored in the user's personal security kernel node server and published on the blockchain;
响应于用户在安全模式列表中选择第一安全模式,将所述遗嘱存储在用户个人安全内核节点客户端中;In response to the user selecting a first security mode in the security mode list, storing the will in the user's personal security kernel node client;
响应于用户在安全模式列表中选择第二安全模式,将遗嘱存储在用户个人安全内核节点客户端和服务器中;In response to the user selecting a second security mode in the security mode list, storing the will in the user's personal security kernel node client and server;
响应于用户在安全模式列表中选择第三安全模式,将遗嘱存储在用户个人安全内核节点服务器中,并发布在区块链上。In response to the user selecting the third security mode in the security mode list, the will is stored in the user's personal security kernel node server and published on the blockchain.
在一个实施例中,所述遗嘱由用户的个人安全内核节点通过以下过程更新:In one embodiment, the will is updated by the user's personal secure kernel node through the following process:
当所述用户的个人安全内核节点中增加数字资产凭证时,向用户显示指定该数字资产凭证的继承人个人安全内核节点标识的界面;When a digital asset certificate is added to the user's personal security kernel node, an interface for specifying the personal security kernel node identifier of the heir of the digital asset certificate is displayed to the user;
在所述界面上接收用户对该数字资产凭证的继承人个人安全内核节点标识的指定;Receiving, on the interface, a user's designation of a personal security kernel node identifier for an heir of the digital asset certificate;
获取指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥;Obtain the public key of the heir's personal security kernel node for the specified heir's personal security kernel node identifier;
对增加的数字资产凭证,用相应获取的指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥进行签名,得到增加的数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名;Sign the added digital asset certificate with the public key of the heir's personal security kernel node identified by the corresponding designated heir's personal security kernel node, to obtain the signature of the added digital asset certificate with the public key of the corresponding heir's personal security kernel node;
将为增加的数字资产凭证指定的继承人个人安全内核节点标识、增加的数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,添加到遗嘱中;Add the heir's personal security kernel node identifier specified for the added digital asset certificate and the signature of the added digital asset certificate using the public key of the corresponding heir's personal security kernel node to the will;
将遗嘱中当前的用获取的司法机构节点的公钥的签名去掉;Remove the current signature in the will using the obtained judicial authority node's public key;
将所述遗嘱中的当前内容用获取的司法机构节点的公钥签名,放入所述遗嘱。The current content in the will is signed with the obtained public key of the judicial institution node and placed in the will.
在一个实施例中,所述遗嘱由用户的个人安全内核节点通过以下过程更新:In one embodiment, the will is updated by the user's personal secure kernel node through the following process:
当所述用户的个人安全内核节点中增加数字资产凭证时,根据遗嘱中为已有的数字资产凭证指定的继承人个人安全内核节点标识,确定增加的数字资产凭证对应的继承人个人安全内核节点标识;When a digital asset certificate is added to the user's personal security kernel node, the personal security kernel node identifier of the heir corresponding to the added digital asset certificate is determined based on the personal security kernel node identifier of the heir specified for the existing digital asset certificate in the will;
获取增加的数字资产凭证对应的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥;Obtain the public key of the heir's personal security kernel node corresponding to the added digital asset certificate;
对增加的数字资产凭证,用相应获取的指定的继承人个人安全内核节点标识的继承人个人安全内核节点的公钥进行签名,得到增加的数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名;Sign the added digital asset certificate with the public key of the heir's personal security kernel node identified by the corresponding designated heir's personal security kernel node, to obtain the signature of the added digital asset certificate with the public key of the corresponding heir's personal security kernel node;
将为增加的数字资产凭证指定的继承人个人安全内核节点标识、增加的数字资产凭证用对应继承人个人安全内核节点的公钥进行的签名,添加到遗嘱中;Add the heir's personal security kernel node identifier specified for the added digital asset certificate and the signature of the added digital asset certificate using the public key of the corresponding heir's personal security kernel node to the will;
将遗嘱中当前的用获取的司法机构节点的公钥的签名去掉;Remove the current signature in the will using the obtained judicial authority node's public key;
将所述遗嘱中的当前内容用获取的司法机构节点的公钥签名,放入所述遗嘱。The current content in the will is signed with the obtained public key of the judicial institution node and placed in the will.
根据本公开实施例的数字资产凭证继承转移中的信息处理方法可以由图10的司法机构节点145实现。The information processing method in the inheritance transfer of digital asset certificates according to the embodiment of the present disclosure can be implemented by the judicial institution node 145 of Figure 10.
如图10所示,司法机构节点145以通用计算设备的形式表现。司法机构节点145的组件可以包括但不限于:上述至少一个处理单元810、上述至少一个存储单元820、连接不同系统组件(包括存储单元820和处理单元810)的总线830。As shown in Figure 10, judicial institution node 145 is implemented as a general-purpose computing device. Components of judicial institution node 145 may include, but are not limited to, the at least one processing unit 810 described above, the at least one storage unit 820 described above, and a bus 830 connecting various system components (including storage unit 820 and processing unit 810).
其中,所述存储单元存储有程序代码,所述程序代码可以被所述处理单元810执行,使得所述处理单元810执行本说明书上述示例性方法的描述部分中描述的根据本发明各种示例性实施方式的步骤。例如,所述处理单元810可以执行如图3中所示的各个步骤。The storage unit stores program code that can be executed by the processing unit 810, causing the processing unit 810 to perform the steps according to various exemplary embodiments of the present invention described in the description of the exemplary method above. For example, the processing unit 810 can perform the steps shown in Figure 3.
存储单元820可以包括易失性存储单元形式的可读介质,例如随机存取存储单元(RAM)8201和/或高速缓存存储单元8202,还可以进一步包括只读存储单元(ROM)8203。The storage unit 820 may include a readable medium in the form of a volatile storage unit, such as a random access memory unit (RAM) 8201 and/or a cache memory unit 8202 , and may further include a read-only memory unit (ROM) 8203 .
存储单元820还可以包括具有一组(至少一个)程序模块8205的程序/实用工具8204,这样的程序模块8205包括但不限于:社交操作系统、一个或者多个应用程序、其它程序模块以及程序数据,这些示例中的每一个或某种组合中可能包括网络环境的实现。The storage unit 820 may also include a program/utility 8204 having a set (at least one) of program modules 8205, such program modules 8205 including but not limited to: a social operating system, one or more application programs, other program modules, and program data, each of which or some combination may include an implementation of a network environment.
总线830可以为表示几类总线结构中的一种或多种,包括存储单元总线或者存储单元控制器、外围总线、图形加速端口、处理单元或者使用多种总线结构中的任意总线结构的局域总线。Bus 830 may represent one or more of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, a processing unit, or a local bus using any of a variety of bus architectures.
司法机构节点145也可以与一个或多个外部设备700(例如键盘、指向设备、蓝牙设备等)通信,还可与一个或者多个使得用户能与该司法机构节点145交互的设备通信,和/或与使得该司法机构节点145能与一个或多个其它计算设备进行通信的任何设备(例如路由器、调制解调器等等)通信。这种通信可以通过输入/输出(I/O)接口650进行。并且,司法机构节点145还可以通过网络适配器860与一个或者多个网络(例如局域网(LAN),广域网(WAN)和/或公共网络,例如因特网)通信。如图所示,网络适配器860通过总线830与司法机构节点145的其它模块通信。应当明白,尽管图中未示出,可以结合司法机构节点145使用其它硬件和/或软件模块,包括但不限于:微代码、设备驱动器、冗余处理单元、外部磁盘驱动阵列、RAID系统、磁带驱动器以及数据备份存储系统等。The judicial authority node 145 can also communicate with one or more external devices 700 (e.g., keyboards, pointing devices, Bluetooth devices, etc.), one or more devices that enable a user to interact with the judicial authority node 145, and/or any device that enables the judicial authority node 145 to communicate with one or more other computing devices (e.g., routers, modems, etc.). Such communication can occur via an input/output (I/O) interface 650. Furthermore, the judicial authority node 145 can communicate with one or more networks (e.g., a local area network (LAN), a wide area network (WAN), and/or a public network such as the Internet) via a network adapter 860. As shown, the network adapter 860 communicates with other modules of the judicial authority node 145 via a bus 830. It should be understood that, although not shown, other hardware and/or software modules can be used in conjunction with the judicial authority node 145, including but not limited to microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage systems.
通过以上的实施方式的描述,本领域的技术人员易于理解,这里描述的示例实施方式可以通过软件实现,也可以通过软件结合必要的硬件的方式来实现。因此,根据本公开实施方式的技术方案可以以软件产品的形式体现出来,该软件产品可以存储在一个非易失性存储介质(可以是CD-ROM,U盘,移动硬盘等)中或网络上,包括若干指令以使得一台计算设备(可以是个人计算机、服务器、终端装置、或者网络设备等)执行根据本公开实施方式的方法。Through the description of the above embodiments, it is easy for those skilled in the art to understand that the example embodiments described herein can be implemented by software or by combining software with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a USB flash drive, a mobile hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which can be a personal computer, a server, a terminal device, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
在本公开的示例性实施例中,还提供了一种计算机程序介质,其上存储有计算机可读指令,当所述计算机可读指令被计算机的处理器执行时,使计算机执行上述方法实施例部分描述的方法。In an exemplary embodiment of the present disclosure, a computer program medium is further provided, on which computer-readable instructions are stored. When the computer-readable instructions are executed by a processor of a computer, the computer is caused to execute the method described in the above method embodiment.
根据本公开的一个实施例,还提供了一种用于实现上述方法实施例中的方法的程序产品,其可以采用便携式紧凑盘只读存储器(CD-ROM)并包括程序代码,并可以在终端设备,例如个人电脑上运行。然而,本发明的程序产品不限于此,在本文件中,可读存储介质可以是任何包含或存储程序的有形介质,该程序可以被指令执行系统、装置或者器件使用或者与其结合使用。According to one embodiment of the present disclosure, a program product for implementing the method in the above method embodiment is also provided. The program product may be a portable compact disc read-only memory (CD-ROM) and include program code, and may be run on a terminal device, such as a personal computer. However, the program product of the present invention is not limited thereto. In this document, a readable storage medium may be any tangible medium containing or storing a program that can be used by or in conjunction with an instruction execution system, apparatus, or device.
所述程序产品可以采用一个或多个可读介质的任意组合。可读介质可以是可读信号介质或者可读存储介质。可读存储介质例如可以为但不限于电、磁、光、电磁、红外线、或半导体的系统、装置或器件,或者任意以上的组合。可读存储介质的更具体的例子(非穷举的列表)包括:具有一个或多个导线的电连接、便携式盘、硬盘、随机存取存储器(RAM)、只读存储器(ROM)、可擦式可编程只读存储器(EPROM或闪存)、光纤、便携式紧凑盘只读存储器(CD-ROM)、光存储器件、磁存储器件、或者上述的任意合适的组合。The program product may be implemented in any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. The readable storage medium may be, for example, but not limited to, an electrical, magnetic, optical, electromagnetic, infrared, or semiconductor system, device, or component, or any combination thereof. More specific examples (a non-exhaustive list) of readable storage media include: an electrical connection with one or more wires, a portable disk, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disk read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination thereof.
计算机可读信号介质可以包括在基带中或者作为载波一部分传播的数据信号,其中承载了可读程序代码。这种传播的数据信号可以采用多种形式,包括但不限于电磁信号、光信号或上述的任意合适的组合。可读信号介质还可以是可读存储介质以外的任何可读介质,该可读介质可以发送、传播或者传输用于由指令执行系统、装置或者器件使用或者与其结合使用的程序。A computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, which carries readable program code. Such propagated data signals may take a variety of forms, including but not limited to electromagnetic signals, optical signals, or any suitable combination thereof. A readable signal medium may also be any readable medium other than a readable storage medium that can transmit, propagate, or transfer a program for use by or in conjunction with an instruction execution system, apparatus, or device.
可读介质上包含的程序代码可以用任何适当的介质传输,包括但不限于无线、有线、光缆、RF等等,或者上述的任意合适的组合。The program code embodied on the readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
可以以一种或多种程序设计语言的任意组合来编写用于执行本发明操作的程序代码,所述程序设计语言包括面向对象的程序设计语言—诸如Java、C++等,还包括常规的过程式程序设计语言—诸如“C”语言或类似的程序设计语言。程序代码可以完全地在用户计算设备上执行、部分地在用户设备上执行、作为一个独立的软件包执行、部分在用户计算设备上部分在远程计算设备上执行、或者完全在远程计算设备或服务器上执行。在涉及远程计算设备的情形中,远程计算设备可以通过任意种类的网络,包括局域网(LAN)或广域网(WAN),连接到用户计算设备,或者,可以连接到外部计算设备(例如利用因特网服务提供商来通过因特网连接)。The program code for performing the operations of the present invention may be written in any combination of one or more programming languages, including object-oriented programming languages such as Java, C++, and the like, as well as conventional procedural programming languages such as "C" or similar programming languages. The program code may be executed entirely on the user computing device, partially on the user device, as a stand-alone software package, partially on the user computing device and partially on a remote computing device, or entirely on a remote computing device or server. In cases involving a remote computing device, the remote computing device may be connected to the user computing device via any type of network, including a local area network (LAN) or a wide area network (WAN), or may be connected to an external computing device (e.g., via the Internet using an Internet service provider).
应当注意,尽管在上文详细描述中提及了用于动作执行的设备的若干模块或者单元,但是这种划分并非强制性的。实际上,根据本公开的实施方式,上文描述的两个或更多模块或者单元的特征和功能可以在一个模块或者单元中具体化。反之,上文描述的一个模块或者单元的特征和功能可以进一步划分为由多个模块或者单元来具体化。It should be noted that although several modules or units of the device for action execution are mentioned in the detailed description above, this division is not mandatory. In fact, according to the embodiments of the present disclosure, the features and functions of two or more modules or units described above can be concretized in one module or unit. Conversely, the features and functions of one module or unit described above can be further divided into multiple modules or units to be concretized.
此外,尽管在附图中以特定顺序描述了本公开中方法的各个步骤,但是,这并非要求或者暗示必须按照该特定顺序来执行这些步骤,或是必须执行全部所示的步骤才能实现期望的结果。附加的或备选的,可以省略某些步骤,将多个步骤合并为一个步骤执行,以及/或者将一个步骤分解为多个步骤执行等。Furthermore, although the steps of the method of the present disclosure are described in a particular order in the accompanying drawings, this does not require or imply that the steps must be performed in this particular order, or that all steps shown must be performed to achieve the desired results. Additionally or alternatively, some steps may be omitted, multiple steps may be combined into one step, and/or one step may be decomposed into multiple steps.
通过以上的实施方式的描述,本领域的技术人员易于理解,这里描述的示例实施方式可以通过软件实现,也可以通过软件结合必要的硬件的方式来实现。因此,根据本公开实施方式的技术方案可以以软件产品的形式体现出来,该软件产品可以存储在一个非易失性存储介质(可以是CD-ROM,U盘,移动硬盘等)中或网络上,包括若干指令以使得一台计算设备(可以是个人计算机、服务器、移动终端、或者网络设备等)执行根据本公开实施方式的方法。Through the description of the above embodiments, it is easy for those skilled in the art to understand that the example embodiments described herein can be implemented by software or by combining software with necessary hardware. Therefore, the technical solution according to the embodiments of the present disclosure can be embodied in the form of a software product, which can be stored in a non-volatile storage medium (which can be a CD-ROM, a USB flash drive, a mobile hard disk, etc.) or on a network, and includes several instructions to enable a computing device (which can be a personal computer, a server, a mobile terminal, or a network device, etc.) to execute the method according to the embodiments of the present disclosure.
本领域技术人员在考虑说明书及实践这里公开的发明后,将容易想到本公开的其它实施方案。本申请旨在涵盖本公开的任何变型、用途或者适应性变化,这些变型、用途或者适应性变化遵循本公开的一般性原理并包括本公开未公开的本技术领域中的公知常识或惯用技术手段。说明书和实施例仅被视为示例性的,本公开的真正范围和精神由所附的权利要求指出。Those skilled in the art will readily appreciate other embodiments of the present disclosure after considering the specification and practicing the invention disclosed herein. This application is intended to cover any variations, uses, or adaptations of the present disclosure that follow the general principles of the present disclosure and include common knowledge or customary techniques in the art not disclosed herein. The description and examples are to be considered as exemplary only, with the true scope and spirit of the present disclosure being indicated by the appended claims.
Claims (15)
Publications (2)
| Publication Number | Publication Date |
|---|---|
| HK40008495A HK40008495A (en) | 2020-06-12 |
| HK40008495B true HK40008495B (en) | 2021-10-15 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US12022000B2 (en) | Method for information processing in digital asset certificate inheritance transfer, and related device | |
| US10705801B2 (en) | Data processing systems for identity validation of data subject access requests and related methods | |
| CN108573381B (en) | Data processing method and device | |
| WO2020063176A1 (en) | Method and device for user identity authentication in network | |
| TW202008290A (en) | Blockchain-based service rental methods and devices | |
| CN113537984A (en) | Blockchain-based content verification method and device, and electronic equipment | |
| EP4092984A1 (en) | Data processing method and apparatus, device and medium | |
| TWI629658B (en) | Know your customer (kyc) data sharing system based on smart contract on blockchain and method thereof | |
| CN109446259B (en) | Data processing method and device, processor and storage medium | |
| US12001522B1 (en) | Asset metadata oracle service for facilitating digital asset trading | |
| WO2020102760A1 (en) | System and method of authenticating conformity to specification using a distributed ledger | |
| KR20210090519A (en) | SLA-Based Sharing Economy Service with Smart Contract for Resource Integrity in the Internet of Things | |
| MD3883204T2 (en) | System and method for secure generation, exchange and management of a user identity data using a blockchain | |
| US20220271949A1 (en) | Guaranteed control method, information processing device, and storage medium | |
| CN111444416B (en) | Financial service popularization method, system and device | |
| CN117240605B (en) | Data transaction method, device, equipment and storage medium | |
| CN110599184A (en) | Method and device for network service account transaction, server and storage medium | |
| HK40008495B (en) | Method and related apparatus for processing information in inheritance transfer of digital asset certificate | |
| US11663590B2 (en) | Privacy-preserving assertion system and method | |
| WO2022208724A1 (en) | Verification method, control method, information processing device, and verification program | |
| HK40021016A (en) | Information processing method and related device in inheritance transfer of digital asset certificate | |
| HK40021016B (en) | Information processing method and related device in inheritance transfer of digital asset certificate | |
| HK40008495A (en) | Method and related apparatus for processing information in inheritance transfer of digital asset certificate | |
| JP2017162353A (en) | Personal data unauthorized use detection method, personal data provider server, program | |
| CN120729647A (en) | Oil and gas data asset processing method, server and system based on blockchain system |