CN108154369A - A kind of enterprise asset management based on block chain technology - Google Patents

A kind of enterprise asset management based on block chain technology Download PDF

Info

Publication number
CN108154369A
CN108154369A CN201810103879.0A CN201810103879A CN108154369A CN 108154369 A CN108154369 A CN 108154369A CN 201810103879 A CN201810103879 A CN 201810103879A CN 108154369 A CN108154369 A CN 108154369A
Authority
CN
China
Prior art keywords
layer
app
private
chain
application
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810103879.0A
Other languages
Chinese (zh)
Other versions
CN108154369B (en
Inventor
尚维斯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Two Sec Technology Co Ltd
Original Assignee
Shanghai Two Sec Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Two Sec Technology Co Ltd filed Critical Shanghai Two Sec Technology Co Ltd
Priority to CN201810103879.0A priority Critical patent/CN108154369B/en
Publication of CN108154369A publication Critical patent/CN108154369A/en
Application granted granted Critical
Publication of CN108154369B publication Critical patent/CN108154369B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Computer Security & Cryptography (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to a kind of enterprise asset management based on block chain technology, including public link layer, private link layer, access layer, authorization layer, backup layer and client.The loophole of the current personal wallet generally existing such as strick precaution external hackers, internal hacker, single maloperation is accomplished from principle.There are the security mechanisms such as locked, the system resetting of invasion simultaneously, ensure the high security of mathematic for business assets with this.

Description

A kind of enterprise asset management based on block chain technology
Technical field
The present invention relates to application of the block chain technology in Corporate Asset Management field, it is related to a kind of based on block chain technology Enterprise asset management.
Background technology
Block chain be one kind by safeguarding in many ways, with block chain structure store data, using cryptographic assurance transmission and access safety, The consistent storage that can realize data, the technical system that can not be distorted, can not deny, therefore have become current financial technology (Fin-Tech) major technique display form.A large amount of emerging projects based on block chain technology start to biography enterprise assets pipe Reason field.Block chain technology has been not only to be present in IT technical fields, has been only the meter that fraction programmer understands and applies Calculation machine technology, but started the spring tide for changing the world with new science and technology.
Though the Corporate Asset Management field of block chain has more the perspective and epoch derived from traditional asset securitization Property, cost is on the one hand greatly saved, the one side right to use and usufruct can also digitize easily.Number on block chain Assets are not needed to by really being weighed under line, and all data are all open can be looked into, cannot distort.
Invention content
In view of this, the present invention provides a kind of money of the enterprise based on block chain technology solved or part solves the above problems Produce management system.
To achieve the effect that above-mentioned technical proposal, the technical scheme is that:Enterprise assets based on block chain technology Management system, includes the following contents:
Public link layer, private link layer, access layer, authorization layer, backup layer and client;
Client includes private key APP, employee APP and management APP;Private key APP is mounted on the mobile phone of enterprise directors On, the quantity of private key APP is at least 3, and particular number is customized by each enterprise self-determining;Employee APP is mounted on the hand of enterprise staff On machine, for initiating transfer instructions;On the mobile phone for managing APP installation enterprises managers, for examining transfer instructions;
Access layer is connected respectively with public link layer, private link layer, employee APP, management APP;Authorization layer respectively with private link layer, public chain Layer, private key APP are connected;Backup layer is connected with private key APP;
Public link layer is used to store the digital asset of each enterprise;
Backup layer is used to keyword carrying out physical backup;Keyword is the random number of arbitrary letter or number composition, is used In generation private key;The holder of private key APP obtains private key after inputting keyword in respective private key APP simultaneously;Employee APP is sent out It needs to obtain the access right of private key before acting application of transferring accounts;
Private link layer is used to approval process being saved in private chain;Each enterprises are deployed with private chain, enterprise assets pipe Reason system builds private chain using ether mill;Enterprise can be with independent control on its private chain all nodes, by setting node parameter To control each block maximum that can be packaged number of transaction, go out block time interval and participate in number of nodes;Private chain can be specified directly Whether node has book keeping operation permission, and the node for permission of not keeping accounts then is used as backup node;Each node is equipped with an association Program, association program are exactly ether mill DAPP, and association program is used to implement the interaction between private link layer and access layer and authorization layer;
Application that access layer is for building approval process, initiation is transferred accounts;Approval process defines application of transferring accounts and submits to management The sequence of APP;
Authorization layer is used to authorize approval process, application of transferring accounts;
The course of work of enterprise asset management is:
Step 1:After the board of directors of enterprise formulates approval process, approval process is entered into access layer by managing APP and is obtained Boxflow is uploaded to private chain by boxflow, access layer;
Step 2:The original state of boxflow is unauthorized, if boxflow needs to authorize, access layer is by boxflow It is sent to authorization layer;Authorization layer initiate a new round ballot, voted by the node on private chain boxflow, obtain 51% with The corresponding approval processes of boxflow of upper poll then authorize success, and successful approval process is authorized to be written into public chain;
Step 3:Employee APP, which can be got, to be authorized successful approval process and applies for corresponding private key;Employee APP will turn After account application is entered into access layer, application of transferring accounts is initiated using the private key applied;The review process of application of transferring accounts is:Access layer According to the regulation in approval process will transfer accounts application be sent to management APP audit, per one-level management APP to transfer accounts apply into Row verification after be transferred to upper level management APP until top layer management APP be proved to be successful after obtain transbox and by its Authorization layer is sent to, verification method is exactly to carry out Hash operation to application of transferring accounts using SHA256 algorithms and be put into hash signature It transfers accounts in application;
Step 4:Transbox progress Hash operation is obtained transaction id and is uploaded to private chain by access layer, by private chain Node vote, the transbox for obtaining more than 51% poll is sent to authorization layer;
Step 5:Authorization layer carries out two step cards to transbox;First step verification method is:Authorization layer utilizes Public key in transbox is verified to signing using ECDSA algorithms;Second verification method be:Authorization layer deletes letter of transferring accounts Temporary transbox is obtained after breath and signature and uploads to public chain, whether the public temporary transbox of chain verification is legal;Two steps are demonstrate,proved By rear, public chain is carried out immediately and is transferred accounts.
The present invention useful achievement be:The present invention provides a kind of enterprise asset management based on block chain technology, Including public link layer, private link layer, access layer, authorization layer, backup layer and client.Strick precaution external hackers, interior are accomplished from principle The loophole of the current personal wallet generally existing such as portion hacker, single maloperation.There is the safety such as locked, the system resetting of invasion simultaneously Mechanism ensures the high security of mathematic for business assets with this.
Specific embodiment
In order to which technical problems, technical solutions and advantages to be solved are more clearly understood, tie below Embodiment is closed, the present invention will be described in detail.It should be noted that specific embodiment described herein is only explaining The present invention is not intended to limit the present invention, and can be realized that the product of said function belongs to equivalent replacement and improvement, is all contained in this hair Within bright protection domain.Specific method is as follows:
Embodiment:Example illustrates that the enterprise asset management structure based on block chain technology, as follows:
BOX systems include public link layer, private link layer, access layer, authorization layer, backup layer and client;
BOX systems can access all digital cash for supporting static signature;
Client includes private key APP, employee APP and management APP;Private key APP is mounted on the mobile phone of enterprise directors On, the quantity of private key APP is at least 3, and particular number is customized by each enterprise self-determining;Employee APP is mounted on the hand of enterprise staff On machine, for initiating transfer instructions;On the mobile phone for managing APP installation enterprises managers, for examining transfer instructions;
Access layer is connected respectively with public link layer, private link layer, employee APP, management APP;Authorization layer respectively with private link layer, public chain Layer, private key APP are connected;Backup layer is connected with private key APP;
Public link layer is used to store the digital asset of each enterprise;
Backup layer is used to keyword carrying out physical backup;Keyword is the random number of arbitrary letter or number composition, is used In generation private key;The holder of private key APP obtains private key after inputting keyword in respective private key APP simultaneously;Employee APP is sent out It needs to obtain the access right of private key before acting application of transferring accounts;
Private link layer is used to approval process being saved in private chain;Each enterprises are deployed with private chain, and BOX systems use Build private chain in ether mill;Enterprise can be with independent control on its private chain all nodes, controlled by setting node parameter each Block maximum can be packaged number of transaction, goes out block time interval and participate in number of nodes;Private chain uses PoA (Proof of Authority) common recognition mechanism, can directly specify whether node has book keeping operation permission, the node then conduct for permission of not keeping accounts Backup node;Each node is equipped with an association program, and association program is exactly ether mill DAPP, and association program is used to implement private Interaction between link layer and access layer and authorization layer;Private chain number of nodes is 2n+1 (n >=1);
Application that access layer is for building approval process, initiation is transferred accounts;Approval process defines application of transferring accounts and submits to management The sequence of APP;
Authorization layer is used to authorize approval process, application of transferring accounts;
The course of work of enterprise asset management is:
Step 1:After the board of directors of enterprise formulates approval process, approval process is entered into access layer by managing APP and is obtained Boxflow is uploaded to private chain by boxflow, access layer;
Step 2:The original state of boxflow is unauthorized, if boxflow needs to authorize, access layer is by boxflow It is sent to authorization layer;Authorization layer initiate a new round ballot, voted by the node on private chain boxflow, obtain 51% with The corresponding approval processes of boxflow of upper poll then authorize success, and successful approval process is authorized to be written into public chain;
Step 3:Employee APP, which can be got, to be authorized successful approval process and applies for corresponding private key;Employee APP will turn After account application is entered into access layer, application of transferring accounts is initiated using the private key applied;The review process of application of transferring accounts is:Access layer According to the regulation in approval process will transfer accounts application be sent to management APP audit, per one-level management APP to transfer accounts apply into Row verification after be transferred to upper level management APP until top layer management APP be proved to be successful after obtain transbox and by its Authorization layer is sent to, verification method is exactly to carry out Hash operation to application of transferring accounts using SHA256 algorithms and be put into hash signature It transfers accounts in application;
Step 4:Transbox progress Hash operation is obtained transaction id and is uploaded to private chain by access layer, by private chain Node vote, the transbox for obtaining more than 51% poll is sent to authorization layer;
Step 5:Authorization layer carries out two step cards to transbox;First step verification method is:Authorization layer utilizes Public key in transbox is verified to signing using ECDSA algorithms;Second verification method be:Authorization layer deletes letter of transferring accounts Temporary transbox is obtained after breath and signature and uploads to public chain, whether the public temporary transbox of chain verification is legal;Two steps are demonstrate,proved By rear, public chain is carried out immediately and is transferred accounts.
The present invention useful achievement be:The present invention provides a kind of enterprise asset management based on block chain technology, Including public link layer, private link layer, access layer, authorization layer, backup layer and client.Strick precaution external hackers, interior are accomplished from principle The loophole of the current personal wallet generally existing such as portion hacker, single maloperation.There is the safety such as locked, the system resetting of invasion simultaneously Mechanism ensures the high security of mathematic for business assets with this.
The foregoing is merely the preferred embodiments of the invention, are not limited to the claims of the present invention. It is described above simultaneously, for those skilled in the technology concerned it would be appreciated that and implementing, therefore other are based on institute of the present invention The equivalent change that disclosure is completed, should be included in the covering scope of the claims.

Claims (1)

1. a kind of enterprise asset management based on block chain technology, which is characterized in that including:Public link layer, private link layer, access Layer, authorization layer, backup layer and client;
The client includes private key APP, employee APP and management APP;The private key APP is mounted on enterprise directors's On mobile phone, the quantity of the private key APP is at least 3, and particular number is customized by each enterprise self-determining;The employee APP is mounted on On the mobile phone of enterprise staff, for initiating transfer instructions;On the mobile phone of the management APP installation enterprises managers, for examining The transfer instructions;
The access layer is connected respectively with the public link layer, the private link layer, the employee APP, the management APP;It is described to award Power layer is connected respectively with the private link layer, the public link layer, the private key APP;The backup layer is connected with the private key APP;
The public affairs link layer is used to store the digital asset of each enterprise;
The backup layer is used to keyword carrying out physical backup;The keyword is the random of arbitrary letter or number composition Number, for generating private key;After the holder of the private key APP inputs the keyword in the respective private key APP simultaneously Obtain the private key;Employee APP initiation, which is transferred accounts, to be needed to obtain the access right of the private key before application;
The private link layer is used to approval process being saved in private chain;Each enterprises are deployed with the private chain, enterprise's money Production management system builds the private chain using ether mill;Enterprise can be with independent control on its private chain all nodes, pass through setting Node parameter come control each block maximum can be packaged number of transaction, go out block time interval and participate in number of nodes;The private chain It can directly specify whether node has book keeping operation permission, backup node is then used as without the node of the book keeping operation permission;Each institute It states node and is equipped with an association program, the association program is exactly ether mill DAPP, and the association program is used to implement described Interaction between private link layer and the access layer and the authorization layer;
The access layer is for transferring accounts application described in building the approval process, initiating;The approval process defines described turn The sequence of the management APP is submitted in account application;
The authorization layer is used to authorize the approval process, the application of transferring accounts;
The course of work of enterprise asset management is:
Step 1:After the board of directors of enterprise formulates the approval process, the approval process is entered by institute by the management APP It states access layer and obtains boxflow, the boxflow is uploaded to the private chain by the access layer;The boxflow is with calculating The approval process that the language that machine can identify is write;
Step 2:The original state of the boxflow is unauthorized, if the boxflow needs to authorize, the access layer The boxflow is sent to the authorization layer;The authorization layer initiates new round ballot, by the node on the private chain to institute It states boxflow to vote, the corresponding approval processes of boxflow for obtaining more than 51% poll then authorize success, authorize successfully Approval process be written into public chain;
Step 3:The employee APP can get the successful approval process of the mandate and apply for corresponding private key;The member After the application of transferring accounts is entered into the access layer by work APP, application of transferring accounts is initiated using the private key applied;It transfers accounts application Review process is:The application of transferring accounts is sent to the management APP by the access layer according to the regulation in the approval process It is audited, management APP is transferred to after being verified to the application of transferring accounts and APP is managed described in upper level described in per level-one Until management APP is obtained after being proved to be successful described in top layer
Transbox, verification method are exactly to carry out Hash operation and by hash signature to the application of transferring accounts using SHA256 algorithms It is put into the application of transferring accounts;The transbox is the application of transferring accounts for obtaining all management APP verifications;
Step 4:Transbox progress Hash operation is obtained transaction id and is uploaded to the private chain by the access layer, It is voted by the node on the private chain, the transbox for obtaining more than 51% poll is sent to the authorization layer;
Step 5:The authorization layer carries out two step cards to the transbox;First step verification method is:The authorization layer profit It is verified with the public key in the transbox to signing using ECDSA algorithms;Second verification method be:The authorization layer Temporary transbox is obtained after deleting transfer information and signature and uploads to the public chain, and the public affairs chain verification is described temporary Whether transbox is legal;After two steps are verified, public chain is carried out immediately and is transferred accounts.
CN201810103879.0A 2018-02-02 2018-02-02 Enterprise asset management system based on block chain technology Active CN108154369B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810103879.0A CN108154369B (en) 2018-02-02 2018-02-02 Enterprise asset management system based on block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810103879.0A CN108154369B (en) 2018-02-02 2018-02-02 Enterprise asset management system based on block chain technology

Publications (2)

Publication Number Publication Date
CN108154369A true CN108154369A (en) 2018-06-12
CN108154369B CN108154369B (en) 2020-07-03

Family

ID=62459521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810103879.0A Active CN108154369B (en) 2018-02-02 2018-02-02 Enterprise asset management system based on block chain technology

Country Status (1)

Country Link
CN (1) CN108154369B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110310011A (en) * 2019-05-31 2019-10-08 北京随信云链科技有限公司 A kind of asset management system and its method based on block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170154331A1 (en) * 2015-11-30 2017-06-01 ShapeShift Systems and methods for improving security in blockchain-asset exchange
CN106920169A (en) * 2017-03-07 2017-07-04 中钞信用卡产业发展有限公司北京智能卡技术研究院 A kind of digital ticket method of commerce and system based on block chain and digital cash
CN107038639A (en) * 2017-03-07 2017-08-11 杭州公链网络技术有限公司 A kind of alliance's chain building method of compatible many Asset Type fast transactions
CN107341402A (en) * 2017-06-19 2017-11-10 上海策链信息科技有限公司 A kind of program excutive method and device
CN107633469A (en) * 2017-08-18 2018-01-26 暨南大学 A kind of scholarship management method and system based on block chain technology

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170154331A1 (en) * 2015-11-30 2017-06-01 ShapeShift Systems and methods for improving security in blockchain-asset exchange
CN106920169A (en) * 2017-03-07 2017-07-04 中钞信用卡产业发展有限公司北京智能卡技术研究院 A kind of digital ticket method of commerce and system based on block chain and digital cash
CN107038639A (en) * 2017-03-07 2017-08-11 杭州公链网络技术有限公司 A kind of alliance's chain building method of compatible many Asset Type fast transactions
CN107341402A (en) * 2017-06-19 2017-11-10 上海策链信息科技有限公司 A kind of program excutive method and device
CN107633469A (en) * 2017-08-18 2018-01-26 暨南大学 A kind of scholarship management method and system based on block chain technology

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110310011A (en) * 2019-05-31 2019-10-08 北京随信云链科技有限公司 A kind of asset management system and its method based on block chain
CN110310011B (en) * 2019-05-31 2024-01-26 北京随信云链科技有限公司 Asset management system and method based on block chain

Also Published As

Publication number Publication date
CN108154369B (en) 2020-07-03

Similar Documents

Publication Publication Date Title
US10887098B2 (en) System for digital identity authentication and methods of use
US10829088B2 (en) Identity management for implementing vehicle access and operation management
US8959595B2 (en) Methods and systems for providing secure transactions
US11139984B2 (en) Information processing system, devices and methods
DE69534490T2 (en) METHOD FOR THE SAFE APPLICATION OF DIGITAL SIGNATURES IN A COMMERCIAL ENCRYPTION SYSTEM
US8832800B2 (en) Method for producing an electro-biometric signature allowing legal interaction between and identification of persons
CN108270551B (en) Security service construction system on block chain
CN101140648A (en) Method for bank bill online authorisation and off line trading
DE102004025084A1 (en) Personal authentication device and personal authentication system and personal authentication method
Patel et al. DAuth: A decentralized web authentication system using Ethereum based blockchain
CN108197942A (en) A kind of distributed intellect economy management system
Haveri et al. Edublock: Securing educational documents using blockchain technology
CN1987938A (en) Dynamic cipher method, system and dynamic cipher card
CN114969786A (en) Block chain-based insurance function data processing method, node and system
CN114143319A (en) Cash box control method and device based on Internet of things and edge calculation
Pali et al. A comprehensive survey of aadhar and security issues
CN108154369A (en) A kind of enterprise asset management based on block chain technology
KR102324155B1 (en) Method and apparatus for autonomous guarantee verification for p2p loan service based on blockchain
Cavoukian et al. Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy
CN112181976A (en) Small loan deposit certificate based on block chain
Rahat et al. Blockchain based secured multipurpose identity (smid) management system for smart cities
DE102014204122A1 (en) Electronic transaction procedure and computer system
CN107920053A (en) Managing device and method based on Internet of Things
WO2005069524A1 (en) Procedure and multi-key card to avoid internet fraud
Kashyap et al. Immutable and Privacy Protected E-Certificate Repository on Blockchain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant