CN108154369A - A kind of enterprise asset management based on block chain technology - Google Patents
A kind of enterprise asset management based on block chain technology Download PDFInfo
- Publication number
- CN108154369A CN108154369A CN201810103879.0A CN201810103879A CN108154369A CN 108154369 A CN108154369 A CN 108154369A CN 201810103879 A CN201810103879 A CN 201810103879A CN 108154369 A CN108154369 A CN 108154369A
- Authority
- CN
- China
- Prior art keywords
- layer
- app
- private
- chain
- application
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/06—Asset management; Financial planning or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- Economics (AREA)
- Marketing (AREA)
- Computer Security & Cryptography (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Human Resources & Organizations (AREA)
- Operations Research (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to a kind of enterprise asset management based on block chain technology, including public link layer, private link layer, access layer, authorization layer, backup layer and client.The loophole of the current personal wallet generally existing such as strick precaution external hackers, internal hacker, single maloperation is accomplished from principle.There are the security mechanisms such as locked, the system resetting of invasion simultaneously, ensure the high security of mathematic for business assets with this.
Description
Technical field
The present invention relates to application of the block chain technology in Corporate Asset Management field, it is related to a kind of based on block chain technology
Enterprise asset management.
Background technology
Block chain be one kind by safeguarding in many ways, with block chain structure store data, using cryptographic assurance transmission and access safety,
The consistent storage that can realize data, the technical system that can not be distorted, can not deny, therefore have become current financial technology
(Fin-Tech) major technique display form.A large amount of emerging projects based on block chain technology start to biography enterprise assets pipe
Reason field.Block chain technology has been not only to be present in IT technical fields, has been only the meter that fraction programmer understands and applies
Calculation machine technology, but started the spring tide for changing the world with new science and technology.
Though the Corporate Asset Management field of block chain has more the perspective and epoch derived from traditional asset securitization
Property, cost is on the one hand greatly saved, the one side right to use and usufruct can also digitize easily.Number on block chain
Assets are not needed to by really being weighed under line, and all data are all open can be looked into, cannot distort.
Invention content
In view of this, the present invention provides a kind of money of the enterprise based on block chain technology solved or part solves the above problems
Produce management system.
To achieve the effect that above-mentioned technical proposal, the technical scheme is that:Enterprise assets based on block chain technology
Management system, includes the following contents:
Public link layer, private link layer, access layer, authorization layer, backup layer and client;
Client includes private key APP, employee APP and management APP;Private key APP is mounted on the mobile phone of enterprise directors
On, the quantity of private key APP is at least 3, and particular number is customized by each enterprise self-determining;Employee APP is mounted on the hand of enterprise staff
On machine, for initiating transfer instructions;On the mobile phone for managing APP installation enterprises managers, for examining transfer instructions;
Access layer is connected respectively with public link layer, private link layer, employee APP, management APP;Authorization layer respectively with private link layer, public chain
Layer, private key APP are connected;Backup layer is connected with private key APP;
Public link layer is used to store the digital asset of each enterprise;
Backup layer is used to keyword carrying out physical backup;Keyword is the random number of arbitrary letter or number composition, is used
In generation private key;The holder of private key APP obtains private key after inputting keyword in respective private key APP simultaneously;Employee APP is sent out
It needs to obtain the access right of private key before acting application of transferring accounts;
Private link layer is used to approval process being saved in private chain;Each enterprises are deployed with private chain, enterprise assets pipe
Reason system builds private chain using ether mill;Enterprise can be with independent control on its private chain all nodes, by setting node parameter
To control each block maximum that can be packaged number of transaction, go out block time interval and participate in number of nodes;Private chain can be specified directly
Whether node has book keeping operation permission, and the node for permission of not keeping accounts then is used as backup node;Each node is equipped with an association
Program, association program are exactly ether mill DAPP, and association program is used to implement the interaction between private link layer and access layer and authorization layer;
Application that access layer is for building approval process, initiation is transferred accounts;Approval process defines application of transferring accounts and submits to management
The sequence of APP;
Authorization layer is used to authorize approval process, application of transferring accounts;
The course of work of enterprise asset management is:
Step 1:After the board of directors of enterprise formulates approval process, approval process is entered into access layer by managing APP and is obtained
Boxflow is uploaded to private chain by boxflow, access layer;
Step 2:The original state of boxflow is unauthorized, if boxflow needs to authorize, access layer is by boxflow
It is sent to authorization layer;Authorization layer initiate a new round ballot, voted by the node on private chain boxflow, obtain 51% with
The corresponding approval processes of boxflow of upper poll then authorize success, and successful approval process is authorized to be written into public chain;
Step 3:Employee APP, which can be got, to be authorized successful approval process and applies for corresponding private key;Employee APP will turn
After account application is entered into access layer, application of transferring accounts is initiated using the private key applied;The review process of application of transferring accounts is:Access layer
According to the regulation in approval process will transfer accounts application be sent to management APP audit, per one-level management APP to transfer accounts apply into
Row verification after be transferred to upper level management APP until top layer management APP be proved to be successful after obtain transbox and by its
Authorization layer is sent to, verification method is exactly to carry out Hash operation to application of transferring accounts using SHA256 algorithms and be put into hash signature
It transfers accounts in application;
Step 4:Transbox progress Hash operation is obtained transaction id and is uploaded to private chain by access layer, by private chain
Node vote, the transbox for obtaining more than 51% poll is sent to authorization layer;
Step 5:Authorization layer carries out two step cards to transbox;First step verification method is:Authorization layer utilizes
Public key in transbox is verified to signing using ECDSA algorithms;Second verification method be:Authorization layer deletes letter of transferring accounts
Temporary transbox is obtained after breath and signature and uploads to public chain, whether the public temporary transbox of chain verification is legal;Two steps are demonstrate,proved
By rear, public chain is carried out immediately and is transferred accounts.
The present invention useful achievement be:The present invention provides a kind of enterprise asset management based on block chain technology,
Including public link layer, private link layer, access layer, authorization layer, backup layer and client.Strick precaution external hackers, interior are accomplished from principle
The loophole of the current personal wallet generally existing such as portion hacker, single maloperation.There is the safety such as locked, the system resetting of invasion simultaneously
Mechanism ensures the high security of mathematic for business assets with this.
Specific embodiment
In order to which technical problems, technical solutions and advantages to be solved are more clearly understood, tie below
Embodiment is closed, the present invention will be described in detail.It should be noted that specific embodiment described herein is only explaining
The present invention is not intended to limit the present invention, and can be realized that the product of said function belongs to equivalent replacement and improvement, is all contained in this hair
Within bright protection domain.Specific method is as follows:
Embodiment:Example illustrates that the enterprise asset management structure based on block chain technology, as follows:
BOX systems include public link layer, private link layer, access layer, authorization layer, backup layer and client;
BOX systems can access all digital cash for supporting static signature;
Client includes private key APP, employee APP and management APP;Private key APP is mounted on the mobile phone of enterprise directors
On, the quantity of private key APP is at least 3, and particular number is customized by each enterprise self-determining;Employee APP is mounted on the hand of enterprise staff
On machine, for initiating transfer instructions;On the mobile phone for managing APP installation enterprises managers, for examining transfer instructions;
Access layer is connected respectively with public link layer, private link layer, employee APP, management APP;Authorization layer respectively with private link layer, public chain
Layer, private key APP are connected;Backup layer is connected with private key APP;
Public link layer is used to store the digital asset of each enterprise;
Backup layer is used to keyword carrying out physical backup;Keyword is the random number of arbitrary letter or number composition, is used
In generation private key;The holder of private key APP obtains private key after inputting keyword in respective private key APP simultaneously;Employee APP is sent out
It needs to obtain the access right of private key before acting application of transferring accounts;
Private link layer is used to approval process being saved in private chain;Each enterprises are deployed with private chain, and BOX systems use
Build private chain in ether mill;Enterprise can be with independent control on its private chain all nodes, controlled by setting node parameter each
Block maximum can be packaged number of transaction, goes out block time interval and participate in number of nodes;Private chain uses PoA (Proof of
Authority) common recognition mechanism, can directly specify whether node has book keeping operation permission, the node then conduct for permission of not keeping accounts
Backup node;Each node is equipped with an association program, and association program is exactly ether mill DAPP, and association program is used to implement private
Interaction between link layer and access layer and authorization layer;Private chain number of nodes is 2n+1 (n >=1);
Application that access layer is for building approval process, initiation is transferred accounts;Approval process defines application of transferring accounts and submits to management
The sequence of APP;
Authorization layer is used to authorize approval process, application of transferring accounts;
The course of work of enterprise asset management is:
Step 1:After the board of directors of enterprise formulates approval process, approval process is entered into access layer by managing APP and is obtained
Boxflow is uploaded to private chain by boxflow, access layer;
Step 2:The original state of boxflow is unauthorized, if boxflow needs to authorize, access layer is by boxflow
It is sent to authorization layer;Authorization layer initiate a new round ballot, voted by the node on private chain boxflow, obtain 51% with
The corresponding approval processes of boxflow of upper poll then authorize success, and successful approval process is authorized to be written into public chain;
Step 3:Employee APP, which can be got, to be authorized successful approval process and applies for corresponding private key;Employee APP will turn
After account application is entered into access layer, application of transferring accounts is initiated using the private key applied;The review process of application of transferring accounts is:Access layer
According to the regulation in approval process will transfer accounts application be sent to management APP audit, per one-level management APP to transfer accounts apply into
Row verification after be transferred to upper level management APP until top layer management APP be proved to be successful after obtain transbox and by its
Authorization layer is sent to, verification method is exactly to carry out Hash operation to application of transferring accounts using SHA256 algorithms and be put into hash signature
It transfers accounts in application;
Step 4:Transbox progress Hash operation is obtained transaction id and is uploaded to private chain by access layer, by private chain
Node vote, the transbox for obtaining more than 51% poll is sent to authorization layer;
Step 5:Authorization layer carries out two step cards to transbox;First step verification method is:Authorization layer utilizes
Public key in transbox is verified to signing using ECDSA algorithms;Second verification method be:Authorization layer deletes letter of transferring accounts
Temporary transbox is obtained after breath and signature and uploads to public chain, whether the public temporary transbox of chain verification is legal;Two steps are demonstrate,proved
By rear, public chain is carried out immediately and is transferred accounts.
The present invention useful achievement be:The present invention provides a kind of enterprise asset management based on block chain technology,
Including public link layer, private link layer, access layer, authorization layer, backup layer and client.Strick precaution external hackers, interior are accomplished from principle
The loophole of the current personal wallet generally existing such as portion hacker, single maloperation.There is the safety such as locked, the system resetting of invasion simultaneously
Mechanism ensures the high security of mathematic for business assets with this.
The foregoing is merely the preferred embodiments of the invention, are not limited to the claims of the present invention.
It is described above simultaneously, for those skilled in the technology concerned it would be appreciated that and implementing, therefore other are based on institute of the present invention
The equivalent change that disclosure is completed, should be included in the covering scope of the claims.
Claims (1)
1. a kind of enterprise asset management based on block chain technology, which is characterized in that including:Public link layer, private link layer, access
Layer, authorization layer, backup layer and client;
The client includes private key APP, employee APP and management APP;The private key APP is mounted on enterprise directors's
On mobile phone, the quantity of the private key APP is at least 3, and particular number is customized by each enterprise self-determining;The employee APP is mounted on
On the mobile phone of enterprise staff, for initiating transfer instructions;On the mobile phone of the management APP installation enterprises managers, for examining
The transfer instructions;
The access layer is connected respectively with the public link layer, the private link layer, the employee APP, the management APP;It is described to award
Power layer is connected respectively with the private link layer, the public link layer, the private key APP;The backup layer is connected with the private key APP;
The public affairs link layer is used to store the digital asset of each enterprise;
The backup layer is used to keyword carrying out physical backup;The keyword is the random of arbitrary letter or number composition
Number, for generating private key;After the holder of the private key APP inputs the keyword in the respective private key APP simultaneously
Obtain the private key;Employee APP initiation, which is transferred accounts, to be needed to obtain the access right of the private key before application;
The private link layer is used to approval process being saved in private chain;Each enterprises are deployed with the private chain, enterprise's money
Production management system builds the private chain using ether mill;Enterprise can be with independent control on its private chain all nodes, pass through setting
Node parameter come control each block maximum can be packaged number of transaction, go out block time interval and participate in number of nodes;The private chain
It can directly specify whether node has book keeping operation permission, backup node is then used as without the node of the book keeping operation permission;Each institute
It states node and is equipped with an association program, the association program is exactly ether mill DAPP, and the association program is used to implement described
Interaction between private link layer and the access layer and the authorization layer;
The access layer is for transferring accounts application described in building the approval process, initiating;The approval process defines described turn
The sequence of the management APP is submitted in account application;
The authorization layer is used to authorize the approval process, the application of transferring accounts;
The course of work of enterprise asset management is:
Step 1:After the board of directors of enterprise formulates the approval process, the approval process is entered by institute by the management APP
It states access layer and obtains boxflow, the boxflow is uploaded to the private chain by the access layer;The boxflow is with calculating
The approval process that the language that machine can identify is write;
Step 2:The original state of the boxflow is unauthorized, if the boxflow needs to authorize, the access layer
The boxflow is sent to the authorization layer;The authorization layer initiates new round ballot, by the node on the private chain to institute
It states boxflow to vote, the corresponding approval processes of boxflow for obtaining more than 51% poll then authorize success, authorize successfully
Approval process be written into public chain;
Step 3:The employee APP can get the successful approval process of the mandate and apply for corresponding private key;The member
After the application of transferring accounts is entered into the access layer by work APP, application of transferring accounts is initiated using the private key applied;It transfers accounts application
Review process is:The application of transferring accounts is sent to the management APP by the access layer according to the regulation in the approval process
It is audited, management APP is transferred to after being verified to the application of transferring accounts and APP is managed described in upper level described in per level-one
Until management APP is obtained after being proved to be successful described in top layer
Transbox, verification method are exactly to carry out Hash operation and by hash signature to the application of transferring accounts using SHA256 algorithms
It is put into the application of transferring accounts;The transbox is the application of transferring accounts for obtaining all management APP verifications;
Step 4:Transbox progress Hash operation is obtained transaction id and is uploaded to the private chain by the access layer,
It is voted by the node on the private chain, the transbox for obtaining more than 51% poll is sent to the authorization layer;
Step 5:The authorization layer carries out two step cards to the transbox;First step verification method is:The authorization layer profit
It is verified with the public key in the transbox to signing using ECDSA algorithms;Second verification method be:The authorization layer
Temporary transbox is obtained after deleting transfer information and signature and uploads to the public chain, and the public affairs chain verification is described temporary
Whether transbox is legal;After two steps are verified, public chain is carried out immediately and is transferred accounts.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810103879.0A CN108154369B (en) | 2018-02-02 | 2018-02-02 | Enterprise asset management system based on block chain technology |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810103879.0A CN108154369B (en) | 2018-02-02 | 2018-02-02 | Enterprise asset management system based on block chain technology |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108154369A true CN108154369A (en) | 2018-06-12 |
CN108154369B CN108154369B (en) | 2020-07-03 |
Family
ID=62459521
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810103879.0A Active CN108154369B (en) | 2018-02-02 | 2018-02-02 | Enterprise asset management system based on block chain technology |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108154369B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110310011A (en) * | 2019-05-31 | 2019-10-08 | 北京随信云链科技有限公司 | A kind of asset management system and its method based on block chain |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170154331A1 (en) * | 2015-11-30 | 2017-06-01 | ShapeShift | Systems and methods for improving security in blockchain-asset exchange |
CN106920169A (en) * | 2017-03-07 | 2017-07-04 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | A kind of digital ticket method of commerce and system based on block chain and digital cash |
CN107038639A (en) * | 2017-03-07 | 2017-08-11 | 杭州公链网络技术有限公司 | A kind of alliance's chain building method of compatible many Asset Type fast transactions |
CN107341402A (en) * | 2017-06-19 | 2017-11-10 | 上海策链信息科技有限公司 | A kind of program excutive method and device |
CN107633469A (en) * | 2017-08-18 | 2018-01-26 | 暨南大学 | A kind of scholarship management method and system based on block chain technology |
-
2018
- 2018-02-02 CN CN201810103879.0A patent/CN108154369B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170154331A1 (en) * | 2015-11-30 | 2017-06-01 | ShapeShift | Systems and methods for improving security in blockchain-asset exchange |
CN106920169A (en) * | 2017-03-07 | 2017-07-04 | 中钞信用卡产业发展有限公司北京智能卡技术研究院 | A kind of digital ticket method of commerce and system based on block chain and digital cash |
CN107038639A (en) * | 2017-03-07 | 2017-08-11 | 杭州公链网络技术有限公司 | A kind of alliance's chain building method of compatible many Asset Type fast transactions |
CN107341402A (en) * | 2017-06-19 | 2017-11-10 | 上海策链信息科技有限公司 | A kind of program excutive method and device |
CN107633469A (en) * | 2017-08-18 | 2018-01-26 | 暨南大学 | A kind of scholarship management method and system based on block chain technology |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110310011A (en) * | 2019-05-31 | 2019-10-08 | 北京随信云链科技有限公司 | A kind of asset management system and its method based on block chain |
CN110310011B (en) * | 2019-05-31 | 2024-01-26 | 北京随信云链科技有限公司 | Asset management system and method based on block chain |
Also Published As
Publication number | Publication date |
---|---|
CN108154369B (en) | 2020-07-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10887098B2 (en) | System for digital identity authentication and methods of use | |
US10829088B2 (en) | Identity management for implementing vehicle access and operation management | |
US8959595B2 (en) | Methods and systems for providing secure transactions | |
US11139984B2 (en) | Information processing system, devices and methods | |
DE69534490T2 (en) | METHOD FOR THE SAFE APPLICATION OF DIGITAL SIGNATURES IN A COMMERCIAL ENCRYPTION SYSTEM | |
US8832800B2 (en) | Method for producing an electro-biometric signature allowing legal interaction between and identification of persons | |
CN108270551B (en) | Security service construction system on block chain | |
CN101140648A (en) | Method for bank bill online authorisation and off line trading | |
DE102004025084A1 (en) | Personal authentication device and personal authentication system and personal authentication method | |
Patel et al. | DAuth: A decentralized web authentication system using Ethereum based blockchain | |
CN108197942A (en) | A kind of distributed intellect economy management system | |
Haveri et al. | Edublock: Securing educational documents using blockchain technology | |
CN1987938A (en) | Dynamic cipher method, system and dynamic cipher card | |
CN114969786A (en) | Block chain-based insurance function data processing method, node and system | |
CN114143319A (en) | Cash box control method and device based on Internet of things and edge calculation | |
Pali et al. | A comprehensive survey of aadhar and security issues | |
CN108154369A (en) | A kind of enterprise asset management based on block chain technology | |
KR102324155B1 (en) | Method and apparatus for autonomous guarantee verification for p2p loan service based on blockchain | |
Cavoukian et al. | Keynote paper: Biometric encryption: Technology for strong authentication, security and privacy | |
CN112181976A (en) | Small loan deposit certificate based on block chain | |
Rahat et al. | Blockchain based secured multipurpose identity (smid) management system for smart cities | |
DE102014204122A1 (en) | Electronic transaction procedure and computer system | |
CN107920053A (en) | Managing device and method based on Internet of Things | |
WO2005069524A1 (en) | Procedure and multi-key card to avoid internet fraud | |
Kashyap et al. | Immutable and Privacy Protected E-Certificate Repository on Blockchain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |