Search

CN-116108414-B - Digital asset authority control method and system based on authorization code and authorization tree

CN116108414BCN 116108414 BCN116108414 BCN 116108414BCN-116108414-B

Abstract

The invention provides a digital asset authority control method and a digital asset authority control system based on an authorization code and an authorization tree, which utilize a tree structure to generate different branch structures according to different requirements, so as to divide use authorities, verify authorization token authorities by calling an authorization code use method in an intelligent contract, use corresponding digital assets by a next node if the authorization code of the next node is within the authority range of the authorization token, end an authorization period if the authorization code is not within the authority range of the authorization token, check whether to terminate the authorization, and end the authorization period if the authorization is terminated. The invention ensures that the data is used in a standardized way while the data using method is various and the using scene is rich.

Inventors

  • MIN XINPING
  • ZHENG YONGQING
  • YI LI
  • YANG CHUNYAN
  • WANG MINXIA
  • JIN ZHENYU

Assignees

  • 山大地纬软件股份有限公司

Dates

Publication Date
20260508
Application Date
20230216

Claims (9)

  1. 1. A digital asset authority control method based on authorization codes and authorization trees is characterized by comprising the following steps: generating an authorization token based on the intelligent contract, and storing an authorization code corresponding to the authorization token in the digital asset object; transmitting the authorization code to the next node; verifying authority of an authorization token by calling an authorization code using method in the intelligent contract, and if the authorization code of the next-level node is within the authority range of the authorization token, using a corresponding digital asset by the next-level node; Checking whether the authorization is terminated, if the authorization is terminated, ending the authorization period, if the authorization is not terminated, judging whether to re-authorize, if the authorization is re-authorized, generating a corresponding authorization token, and if the authorization is not re-authorized, checking the authorization token authority by calling an authorization code using method in the intelligent contract; when the authorization is terminated, the next-level node authority is retracted, and the authorization period is ended; before digital asset is used, checking the number of times the authorization code is used and the number of times the authorization token is used, checking the authorization of the authorization token and the use process of the authorization operation type and the effective time, calling an authorization code use method in the intelligent contract before the child node is used, checking the authorization code and the authorization token authorization, recovering the authorized authorization by the intelligent contract when the effective time is found to be overtime and exceeds the range of the operation authorization and the use number of times, deleting the branches of the authorization tree from top to bottom, deleting all child nodes in the tree structure when the father node is recovered to be authorized, and recovering the use authorization of the digital asset by all nodes on the branches; The authorization code is transmitted between nodes using the digital asset, and the structure of the authorization tree is formed by continuously performing sub-authorization between the nodes.
  2. 2. A digital asset rights control method based on an authorization code and an authorization tree as recited in claim 1, wherein the authorization token is generated by invoking an authorization method in a smart contract upon initiation of an authorization action.
  3. 3. A digital asset rights control method based on an authorization code and an authorization tree as claimed in claim 1 or 2, wherein the authorization token comprises an authorization code, a recipient address, a parent node, a child node, a token creator and the contents of the granted rights.
  4. 4. The digital asset rights control method based on an authorization code and an authorization tree according to claim 1, wherein the authorization code is generated by a hash value of a transaction, a receiver and an asset ID through an intelligent contract; the authorization code is stored as an identification of the authorization token in a digital asset object in a state library.
  5. 5. The method of claim 1, wherein each node is a parent node or/and a child node, the parent node is used for initiating a transaction to transmit the digital asset to the child node/the next node, and the child node/the next node needs to verify the authorization code with the attribute in the authorization token of the parent node and can perform secondary authorization to transfer the corresponding digital asset use permission to the next node when using the digital asset.
  6. 6. The method for controlling the authority of a digital asset based on an authorization code and an authorization tree according to claim 1, wherein the authority of the child node/next node is not more than the authority range of the parent node's authorization token when the child node/next node is secondarily authorized.
  7. 7. A digital asset rights control system based on an authorization code and an authorization tree, comprising: A node configured to generate an authorization token through an intelligent contract based on the transacted digital asset, store an authorization code corresponding to the authorization token in a digital asset state library, and transmit the authorization code to a next node; The authorization verification module is configured to verify the authority of the authorization token by calling an authorization code using method in the intelligent contract, and if the authorization code of the next-level node is within the authority range of the authorization token, the next-level node uses the corresponding digital asset; The authorization verification module is configured to check whether the father node terminates the authorization, if the authorization is terminated, the authorization period is ended, if the authorization is not terminated, whether the authorization is performed again is judged, if the authorization is performed again, the generated authorization token is received again, and if the authorization is not performed again, the authorization token authority is verified again by calling an authorization code using method in the intelligent contract; The authorization termination module is configured to withdraw the next-level node permission when the authorization is terminated, and the authorization period is ended; before digital asset is used, checking the number of times the authorization code is used and the number of times the authorization token is used, checking the authorization of the authorization token and the use process of the authorization operation type and the effective time, calling an authorization code use method in the intelligent contract before the child node is used, checking the authorization code and the authorization token authorization, recovering the authorized authorization by the intelligent contract when the effective time is found to be overtime and exceeds the range of the operation authorization and the use number of times, deleting the branches of the authorization tree from top to bottom, deleting all child nodes in the tree structure when the father node is recovered to be authorized, and recovering the use authorization of the digital asset by all nodes on the branches; The authorization code is transmitted between nodes using the digital asset, and the structure of the authorization tree is formed by continuously performing sub-authorization between the nodes.
  8. 8. A computer readable storage medium, characterized in that a plurality of instructions are stored, which instructions are adapted to be loaded by a processor of a terminal device and to perform the steps of the method of any of claims 1-6.
  9. 9. A terminal device comprising a processor for implementing instructions and a computer-readable storage medium for storing instructions adapted to be loaded by the processor and to perform the steps of the method according to any one of claims 1-6.

Description

Digital asset authority control method and system based on authorization code and authorization tree Technical Field The invention belongs to the technical field of blockchains, and relates to a digital asset authority control method and system based on authorization codes and authorization trees. Background The statements in this section merely provide background information related to the present disclosure and may not necessarily constitute prior art. Digital asset impersonation and theft refer to the fact that the digital asset is used under the condition that the digital asset is not authorized by the rights party, so that higher requirements are put on the accuracy, privacy, safety, knowledge rights of the rights party and the like of the digital asset by the public and society, but the existing solution based on the blockchain technology only plays a role in recording, and cannot guarantee that the digital asset which is not authorized by the rights party is used and cannot guarantee the controllable management of the digital asset by the rights party. The rights of the rights party to control the digital asset is a challenge to be solved in terms of the security privacy of the digital asset and the interests of the rights party itself, and how to ensure that the digital asset is used within the rights granted by the rights party. Digital asset authorization for business purposes is accompanied by the risk of infringement of the privacy rights of the user, which rights and interests of the equity may be compromised if the act of using the digital asset by the party after authorization cannot be managed from a technical level. The control of the digital asset by the rights and the range of the digital asset can be enhanced by adopting a safe and reliable authorization mode and setting the use rights and the range of the digital asset during authorization, but the prior solution based on the blockchain technology only takes the blockchain as a database, and simply stores the license authorization record in the distributed ledger, so that the controllable management of the rights of the digital asset from the bottom layer of the blockchain is not realized, only the retrospective traceability can be realized, and the management and the control can not be carried out in advance and in advance. Disclosure of Invention In order to solve the problems, the invention provides a digital asset authority control method and a digital asset authority control system based on an authorization code and an authorization tree, which realize controllable management of authorized digital assets from a blockchain bottom layer, can realize the knowledge of the use condition of an authority after the digital assets are authorized, and can control and manage. According to some embodiments, the present invention employs the following technical solutions: A digital asset authority control method based on authorization codes and authorization trees comprises the following steps: generating an authorization token based on the intelligent contract, and storing an authorization code corresponding to the authorization token in the digital asset object; transmitting the authorization code to the next node; verifying authority of an authorization token by calling an authorization code using method in the intelligent contract, and if the authorization code of the next-level node is within the authority range of the authorization token, using a corresponding digital asset by the next-level node; Checking whether the authorization is terminated, if the authorization is terminated, ending the authorization period, if the authorization is not terminated, judging whether to re-authorize, if the authorization is re-authorized, generating a corresponding authorization token, and if the authorization is not re-authorized, checking the authorization token authority by calling an authorization code using method in the intelligent contract; and when the authorization is terminated, the next-level node authority is retracted, and the authorization period is ended. Alternatively, the authorization token is generated by invoking an authorization method in the smart contract upon initiation of an authorization action. As an alternative embodiment, the authorization token includes content including an authorization code, a recipient address, a parent node, a child node, a token creator, and granted rights. Alternatively, the authorization code is generated from the hash value of the transaction, the recipient, and the asset ID via a smart contract. Alternatively, the authorization code is stored as an identification of the authorization token in a digital asset object in a state library. As an alternative embodiment, before using the digital asset, it is checked whether the number of times the authorization code has been used is within the limited number of times the authorization token has been used, and the type of operation and validity time of the