CN109255610A - A kind of value assessment method of fictitious assets under internet block chain environment - Google Patents

A kind of value assessment method of fictitious assets under internet block chain environment Download PDF

Info

Publication number
CN109255610A
CN109255610A CN201811121715.7A CN201811121715A CN109255610A CN 109255610 A CN109255610 A CN 109255610A CN 201811121715 A CN201811121715 A CN 201811121715A CN 109255610 A CN109255610 A CN 109255610A
Authority
CN
China
Prior art keywords
module
account book
fictitious assets
super account
certificate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201811121715.7A
Other languages
Chinese (zh)
Inventor
石帅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Individual
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN201811121715.7A priority Critical patent/CN109255610A/en
Publication of CN109255610A publication Critical patent/CN109255610A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3672Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes initialising or reloading thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/10Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
    • G06Q20/102Bill distribution or payments
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication

Landscapes

  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention belongs to internet electric business brand names assessment techniques, and in particular to a kind of value assessment method with electric business brand names under the internet block chain environment for dividing account and purchase function of raising funds.Block catenary system includes terminal module, the super account book administration module of core processing module, the different alliance's chains of composition in the method for the present invention, client software too development module, including client software too development module authentication and inquiry request are proposed to super account book administration module, super account book administration module judges client software too development module identity according to the level-one certification certificate in authentication and inquiry request.The present invention is capable of the true value of the evaluation electric business brand names object of objective, data all simultaneously are only calculated and are stored in core processing module, calculated result is determined by the scale amounts of terminal module completely, avoids interference of the human factor to assessment result.

Description

A kind of value assessment method of fictitious assets under internet block chain environment
Technical field
The invention belongs to internet virtual asset evaluation technology, and in particular to a kind of with dividing account and purchase function of raising funds The value assessment method of fictitious assets under internet block chain environment.
Background technique
Internet is born initial stage, and the use of many Internet resources is free state, until beginning of this century network economy foam After vanishing, some service items on network are gradually included in by major network operator when seeking network operation profit model Charge, many operators are created by modes such as exploitation, producing and selling, transfers to Internet resources with powerful profit energy The network virtual assets of power, such as the network ideal money, network property, network paid service form " virtual network transaction " " reality transaction off the net " two markets.The generation of network virtual assets changes the structure of accounting asset element, makes accounting core It calculates in the environment of network economy, has novel Accounting Content, Accounting Model, accounting method, especially for the invisible money of enterprise Production provides new Accounting Content.
Network virtual assets are controlled by enterprise or individual, can have network expected from income with monetary measurement Economic resources.It is the new network intangible asset for existing or being stored on internet except it is independently of enterprise's legacy asset.Mesh Come to see, network virtual assets can be divided into three categories: the first kind is the network ideal money, and that most represent is the Q of Tencent Coin, it has had the feature of network trading general " currency ", can buy many network virtual articles with Q coin, it might even be possible to purchase Buy the product for generally requiring and being paid with real money, such as antivirus software.Second class is network object, and most representative is game Object, these objects, the marked price on network, the trade market of scale have preliminarily formed.Third class is network Paid service, such as domain name service, charge e-mail, cyberspace service, network information right to use service, and these are paid Service is also marked price.It is contemplated that the following Internet resources for also having more more potentiality can be opened continuously Come, trades.Market based on network virtual transaction in assets is an emerging market, have huge potentiality and Development space.Network virtual assets are the same also like traditional commodities, and specially founding in major website has inquiry prefecture, and many articles are bright Code marked price, can be by network void like currency or real money free transaction.
Network virtual assets have caused the concern of accounting theory and practice worker more and more, and many people are to network Certain specific manifestation forms of fictitious assets carry out value assessment research, such as to domain name value assessment, E-mail address value of charging Assessment etc. proposes some assessment principle and method, but such research is not very scattered, comprehensive, and few people provide network virtual The value assessment of production is comprehensively summarized, to network virtual assets (such as network virtual article, the network void of other display forms Intending currency, network, other are paid information service) without enough attention, this is because other network virtual assets are also in formation In, assets form and value characteristic need people and fully understand understanding.The quasi- value assessment to network virtual assets of the present invention It proposes mailbox method, and solves the problems, such as the value assessment of representative network virtual asset item.
Summary of the invention
It is capable of having the function of point account and raising funds for objective evaluation fictitious assets value the purpose of the present invention is to provide a kind of Internet block chain environment under fictitious assets value assessment method.
The object of the present invention is achieved like this:
A kind of value assessment method of fictitious assets under internet block chain environment, block catenary system includes core processing mould Terminal module, the super account book administration module (Fabric CA module) of block, the different alliance's chains of composition, client software tool is opened (Software Development Kit) module is sent out, is included the following steps:
(1) client software too development module proposes authentication and inquiry request to super account book administration module, surpasses Grade account book administration module judges client software too development mould according to the level-one certification certificate in authentication and inquiry request Block identity then passes through after authenticating if the client software too development module of this block chain authorization to client software tool Development module provides public spoon and enters step (2);Otherwise, super account book administration module enters suspend mode;
(2) according to the address in public spoon, all terminal modules into block chain propose void to client software too development module The credit evaluation request and value assessment of quasi- assets object (ideal money, mailbox, domain names, network property, network service) Request;
(3) terminal module requests to extract fictitious assets object after identifying public spoon according to credit evaluation request and value assessment All data carry out credit scoring and value scoring, and credit scoring and value score data are reported and submitted to core processing module;
(4) core processing module integrates the credit scoring of all terminal modules and value score data to obtain final comment Estimate weight;
(5) core processing module estimates the turnover of fictitious assets object according to assessment weight, while according to different alliances The real property Backup Data of terminal module under chain is allocated to turnover and independent point account, and will divide account information data point It is not sent to the client software too development module for proposing assessment request and proposes simple transaction scheme and fund-raising purchase-transaction Scheme;
(6) propose the client software too development module of assessment request according to the core processing module adjustment transaction received Scheme is reported and submitted to core processing module, and scheme is reported and submitted into region chain all terminal modules to wait terminal mould by core processing module Block responds and executes simple transaction scheme or fund-raising purchase-transaction scheme.
The generation method of the level-one certification certificate of the client software too development module includes the following steps: core Processing module sends four table composition level-ones to the database of client software too development module and authenticates certificate, is user respectively Table, login certificate table, certificate of fair table and channel table;User's table record user basic information, including when user's registration ID and Password, registration type, token token, institutional affiliation and registion time;Login certificate table records client software too development The corresponding relationship of module and user, including certificate ID, User ID, the CA of the certificate authority, CertPubKey and current certificate State (whether oneself is through expired);Certificate of fair table stores All Activity certificate in system, to guarantee that the transaction that user uses is demonstrate,proved Book is to forge.Including certificate ID, the CA of the certificate authority, (whether oneself passes through the state of CertPubKey and current certificate Phase), unlike certificate of fair table and login certificate table, it does not include information of User ID, and database is avoided to lead by attack It applies family information leakage;Channel table records the specific information about firms in each channel, it includes channel ID, Channels user, channel wound Build the time.
The super account book administration module includes a super account book supervision client and a super account book supervision clothes Business end, super account book administration module are supplied to the public spoon of client software too development module, comprising: super account book policing services End initialization (generation of CA root certificate);The starting service of super account book policing services end receives level-one and authenticates certificate information;Super account This supervision client requests to register to super account book policing services end;Client is supervised to super account book in super account book policing services end End returns to the certificate of registration;Super account book, which supervises client, requests register node to super account book policing services end;Super account book prison Pipe server-side supervises client return node registration information result to super account book;Super account book supervises client to super account book Request registered nodes in policing services end;Super account book policing services end generates signed data, is stored in client software too development The database of module;Super account book policing services end returns to enrollment results to client;Super account book supervision client and super Account book policing services end is communicated using network request, and super account book supervision client, which is responsible for sending to server-side, requests, and is surpassed Grade account book policing services end receives and processes the request from super account book supervision client, and returns to super account book supervision visitor The corresponding response bag in family end;In client software too development module logging request, super account book supervision client sends visitor The ID and password of family end software tool development module registration, super account book policing services end receive and parse through the request, and generating should The corresponding public spoon of client software too development module;In client software too development module request public affairs spoon, client is soft Part too development module needs to provide the identity ID of oneself, and super account book supervision client replaces user to be issued super account book Corresponding identity ID is extracted at policing services end, super account book policing services end from the token token of user's table, and in database It is middle to inquire corresponding public spoon and return to client software too development module.
The fictitious assets object information (including prediction credit worthiness, prediction loss late, average loss rate, norm Loss, variation risk etc.) it is stored in the database or self contained data base of core processing module, the credit scoring is commented Estimate and includes the following steps:
(3.1) prediction credit worthiness M (x, the x of fictitious assets object are assessedi'):
Wherein m terminal module is x to the prediction loss late of fictitious assets objecti', (1,2,3 ... m), and x is virtual by i ∈ The average loss rate in field described in assets object;
(3.2) norm for assessing average loss rate object loses A (x, xi'):
(3.3) variation risk E (x, the x of fictitious assets object are assessedi'):
Var is venture worth;
(3.4) fictitious assets object weight coefficient R (x, x really are calculatedi'):
(3.5) true credit value, that is, credit scoring D of fictitious assets object is assessed:
The credit scoring of fictitious assets object, the smaller fictitious assets for illustrating transaction of credit scoring are assessed by the size of D The risk factor of object is higher.
The fictitious assets object is stored in the database or self contained data base of core processing module, the valence Value scoring appraisal procedure include:
(4.1) evaluated fictitious assets object and the financial index Y of obligee are inquiredn, n=1,2,3, wherein Y1To be commented Estimate the liquidity ratio of fictitious assets object, Y2For the turnover of total assets for being evaluated fictitious assets object obligee, Y1It is evaluated The object net profit on sales rate of the patentee of fictitious assets object;
(4.2) the regulation coefficient S of evaluated fictitious assets object financial index is calculatedi
S1=(Y1-q1)/q1;S2=(Y2-q2)/q2;S3=(Y3-q3)/q3
q1It is Y1Ratio regulation coefficient;q2It is Y2Ratio regulation coefficient;q3It is Y3Ratio regulation coefficient;
(4.3) the weighting regulation coefficient Q of evaluated fictitious assets object is calculated:
Q=1+S1Y1+S2Y2+S3Y3
(4.4) the average value W for transferring the value of the industry where fictitious assets object obtains evaluated fictitious assets object Value multiplier T,
T=WQ;
(4.5) all terminal modules are transferred to the assessed value z of the value of evaluated fictitious assets objecti, calculate virtual money Produce the value scoring B of object:
The value scoring of fictitious assets object, the smaller fictitious assets for illustrating transaction of value scoring are assessed by the size of B The risk factor of object is higher.
The assessment weight Ψ of the fictitious assets object are as follows:
Ψ=W+D (W-B);
The core processing module estimates the turnover of fictitious assets object according to assessment weight are as follows:
The independent point account specifically includes:
(5.1) the available property volume f of the terminal module under different alliance's chain j is inquiredL, j;L is under same alliance's chain Terminal module label, l=1,2,3 ... n, n≤m,
(5.2) it calculates each node under alliance's chain and divides account volume Fl:
(5.3) F that core processing module will calculatelIt is respectively sent to corresponding terminal module.
The method of the terminal module response fund-raising purchase scheme are as follows:
(6.1) numbering the terminal module in alliance's chain one by one is 1,2,3 ... n;It is begun to respond to from No. 1 terminal module, such as Fruit No. 1 terminal module response, as agrees to fund-raising purchase scheme, otherwise to disagree fund-raising purchase scheme;
(6.2) statistics agrees to the terminal module number a of fund-raising purchase and disagrees the terminal module number b of fund-raising purchase, distich In alliance's chain all terminal modules re-start number i.e. agree to fund-raising purchase terminal module number be 1,2,3 ... a;Disagree collection The terminal module number of money purchase is b, b+1, b+2 ... n;
(6.2) readjust fund-raising purchase scheme, at this time divide account volume adjust are as follows:
(6.3) F that will be recalculated tolIt is respectively sent to the corresponding terminal module for agreeing to fund-raising purchase;
(6.4) core processing module inquiry agrees to whether the terminal module of fund-raising purchase agrees to new independent point account scheme; Purchase of raising funds if all terminal modules respond core processing module terminates, by corresponding point of account volume from the terminal module of response It draws in account and pays fictitious assets owner;It is re-execute the steps if thering is terminal module not respond core processing module (6.2)。
The beneficial effects of the present invention are: the present invention is capable of the true value of the evaluation fictitious assets object of objective, Data all simultaneously are only calculated and are stored in core processing module, and calculated result is completely by the scale number of terminal module Amount determines, avoids interference of the human factor to assessment result.Furthermore each terminal module is merely able to individually receive information, can not Global information is obtained, secret protection scheme is more perfect.The function of point account and fund-raising purchase is provided simultaneously, and terminal module is existed The problems such as alliance's chain is further divided into block chain convenient for linking up connection and solving single node financial difficulty.
Detailed description of the invention
Fig. 1 is flow diagram of the invention;
Fig. 2 is that functional flow diagram is bought in present invention fund-raising.
Specific embodiment
The present invention is described further with reference to the accompanying drawing.
Block chain technology has the characteristics that " decentralization " and " going trustization ", can not depend on third party's trust authority and exist Point-to-point credible value delivery is established between strange node, being different from traditional mode has boundless application prospect, is recognized For be lead information interconnected network to value internet change key technology.In financial industry, bank and financial institution wish benefit With block chain technological transformation traditional financial system, data maintenance cost is reduced.Transparence, the data of block catenary system can not distort Etc. features, be completely suitable for reference management, qualifications, business associate etc..In addition to this, block chain is in Internet of Things, text Changing amusement, social management, communication etc. can also be widely applied.Block chain is divided into publicly-owned chain, privately owned chain and alliance's chain.To all People it is open be publicly-owned chain, for it is independent it is personal and entity be privately owned chain, what is fallen between is alliance's chain.Publicly-owned chain is A kind of completely new distributed basis framework and calculation paradigm are calculated using orderly linked data structure storing data using common recognition Method more new data ensures data safety using cryptological technique, and the distributed account book that it is constructed in systems cannot be tampered And forgery, an authentic data library is safeguarded according to common recognition mechanism collective, meanwhile, each node in system is owned by account book, and Dynamically it is consistent.Each node of alliance's chain usually has corresponding physical mechanism tissue, by that could add after authorization Enter and exit network, each organization forms the relevant alliance of interests, the common health operating for safeguarding block chain.
As shown in Figure 1, system includes sequence core processing module, terminal module, super account book administration module, client is soft Part too development module, the system by the data maintenance of traditional block chain interior joint and common recognition service isolation, common recognition service from Peer node disjoint is new module ordering service, which is sorted the transaction in block using common recognition algorithm, Ensure that the block data in each channel is consistent, guarantees that the data of each account book in the channel are identical.Terminal module is responsible for chain code Execution, account book, state-maintenance etc. consume the task of system performance very much, are the important components of the system.Super account book prison Tube module provides the tasks such as registration, the certificate authority of system interior joint, and the system is made to become the block catenary system having permission, enhancing Security of system.Application module is present in application layer, is the interface of system external, and enterprise-level application passes through client software tool Development module is operated with the local key pair system.The present invention is by sending client software too development module end The access control based on account book is realized in the transformation for motion data packet of trading.Fictitious assets is believed under a kind of block chain proposed by the present invention With value assessment method, block catenary system includes core processing module, the terminal module of the different alliance's chains of composition, super account book prison Tube module, client software too development (Software Development Kit) module, system evaluation include the following steps:
(1) client software too development module proposes authentication and inquiry request to super account book administration module, surpasses Grade account book administration module judges client software too development mould according to the level-one certification certificate in authentication and inquiry request Block identity then passes through after authenticating if the client software too development module of this block chain authorization to client software tool Development module provides public spoon and enters step (2);Otherwise, super account book administration module enters suspend mode;(2) client software tool According to the address in public spoon, all terminal modules into block chain propose the credit evaluation requests of fictitious assets objects to development module It is requested with value assessment;(3) terminal module requests to extract virtual money according to credit evaluation request and value assessment after identifying public spoon All data for producing object carry out credit scoring and value scoring, and credit scoring and value score data are reported and submitted to core Manage module;(4) core processing module integrates the credit scoring of all terminal modules and value score data to obtain final comment Estimate weight;(5) core processing module estimates the turnover of fictitious assets object according to assessment weight, while according to different alliance's chains Under the property Backup Data of terminal module turnover is allocated and independent point account, and a point account information data is sent respectively To the client software too development module for proposing assessment request and propose simple transaction scheme and fund-raising purchase-transaction scheme; (6) propose that the client software too development module of assessment request is reported and submitted according to the core processing module adjustment trading scheme received To core processing module, scheme is reported and submitted into region chain all terminal modules to wait terminal module response simultaneously by core processing module Execute simple transaction scheme or fund-raising purchase-transaction scheme.This programme is capable of the true of the evaluation fictitious assets object of objective Value, while all data are only calculated and are stored in core processing module, calculated result is completely by terminal module Scale amounts determine, avoid interference of the human factor to assessment result.Furthermore each terminal module is merely able to individually receive letter Breath, can not obtain global information, secret protection scheme is more perfect.The function of point account and fund-raising purchase is provided simultaneously, it will be whole The problems such as end module is further divided into alliance's chain in block chain convenient for linking up connection and solving single node financial difficulty.It is described Alliance's chain be the block chain open to specific organization, all alliance's chain links are whole block chain together.
In order to further ensure the network security of client software too development module, we have proposed a kind of new level-ones The generation method of certificate is authenticated, this method can guarantee that the real-time of certificate can not tamper.The client software work The generation method of the level-one certification certificate of tool development module includes the following steps: that core processing module is opened to client software tool The database for sending out module sends four tables composition level-ones and authenticates certificates, be respectively user's table, login certificate table, certificate of fair table with And channel table;User's table records user basic information, including ID and password when user's registration, registration type, token token, institute Belong to mechanism and registion time;Login certificate table records the corresponding relationship of client software too development module and user, including The state of certificate ID, User ID, the CA of the certificate authority, CertPubKey and current certificate (whether oneself is through expired);Transaction card Book table stores All Activity certificate in system, to guarantee that the certificate of fair that user uses is to forge.Including certificate ID, the card The state (whether oneself is through expired) of the CA that book is issued, CertPubKey and current certificate, certificate of fair table and login certificate table are not With it does not include the information of User ID, and database is avoided to cause user information to be revealed by attack;Channel table record is each The specific information about firms in channel, it includes channel ID, Channels user, channel creation time.
Furthermore correspond to level-one and authenticate certificate, we provide a kind of generation method of public key, match with level-one certification certificate Close the security attribute that can further promote terminal module and client.The super account book administration module includes one super Account book supervision client and a super account book policing services end, super account book administration module are supplied to client software tool and open Send out the public spoon of module, comprising: super account book policing services end initializes (generation of CA root certificate);It opens at super account book policing services end Dynamic service receives level-one and authenticates certificate information;Super account book supervises client requests to register to super account book policing services end;It is super Grade account book policing services end returns to the certificate of registration to super account book supervision client;Super account book supervises client to super account book Request register node in policing services end;Client return node registration information is supervised to super account book in super account book policing services end As a result;Super account book, which supervises client, requests registered nodes to super account book policing services end;Super account book policing services end is raw At signed data, it is stored in the database of client software too development module;Super account book policing services end is returned to client Enrollment results;Super account book supervision client and super account book policing services end are communicated using network request, super account book Supervision client, which is responsible for sending to server-side, requests, and super account book policing services end, which is received and processed, supervises visitor from super account book The request at family end, and return to the super account book supervision corresponding response bag of client;It is stepped in client software too development module In record request, super account book supervision client sends the ID and password of client software too development Module registers, super account book Policing services end receives and parses through the request, generates the corresponding public spoon of the client software too development module;It is soft in client When part too development module request public affairs spoon, client software too development module needs to provide the identity ID of oneself, super account book Supervision client replaces user to be issued super account book policing services end, and super account book policing services end is from user's table Corresponding identity ID is extracted in token token, and is inquired corresponding public spoon in the database and returned to client software work Has development module.
The present invention furthermore presents the database or only that the fictitious assets object is stored in core processing module In vertical database, the following steps of the assessment of credit scoring:
(3.1) prediction credit worthiness M (x, the x of fictitious assets object are assessedi'):
Wherein m terminal module is x to the prediction loss late of fictitious assets objecti', (1,2,3 ... m), and x is virtual by i ∈ The average loss rate in field described in assets object;
(3.2) norm for assessing fictitious assets object loses A (x, xi'):
(3.3) variation risk E (x, the x of fictitious assets object are assessedi'):
Var is venture worth;
(3.4) fictitious assets object weight coefficient R (x, x really are calculatedi'):
(3.5) true credit value, that is, credit scoring D of fictitious assets object is assessed:
The credit scoring of fictitious assets object, the smaller fictitious assets for illustrating transaction of credit scoring are assessed by the size of D The risk factor of object is higher.
Above-mentioned steps propose a kind of new fictitious assets credit scoring standard, the standards of grading introduce norm loss and Loss risk, being capable of the more effective more credit value of objective appraisal object.
In addition, the fictitious assets object is stored in the database or self contained data base of core processing module, institute That states, which is worth the appraisal procedure of scoring, includes:
(4.1) evaluated fictitious assets object and the financial index Y of obligee are inquiredn, n=1,2,3, wherein Y1To be commented Estimate the liquidity ratio of fictitious assets object, Y2For the turnover of total assets for being evaluated fictitious assets object obligee, Y1It is evaluated The object net profit on sales rate of the patentee of fictitious assets object;
(4.2) the regulation coefficient S of evaluated fictitious assets object financial index is calculatedi
S1=(Y1-q1)/q1;S2=(Y2-q2)/q2;S3=(Y3-q3)/q3
q1It is Y1Ratio regulation coefficient;q2It is Y2Ratio regulation coefficient;q3It is Y3Ratio regulation coefficient;
(4.3) the weighting regulation coefficient Q of evaluated fictitious assets object is calculated:
Q=1+S1Y1+S2Y2+S3Y3
(4.4) the average value W for transferring the patent value of the industry where fictitious assets object obtains evaluated fictitious assets The value multiplier T of object,
T=WQ;
(4.5) all terminal modules are transferred to the assessed value z of the value of evaluated fictitious assets objecti, calculate virtual money Produce the value scoring B of object:
The value scoring of fictitious assets object, the smaller fictitious assets for illustrating transaction of value scoring are assessed by the size of B The risk factor of object is higher.By credit value and value separate, by fictitious assets object evaluation and object belonging to right The index of correlation of people links together, and is conducive to the assessment confidence level for further improving present aspect.
The assessment weight Ψ of the fictitious assets object are as follows:
Ψ=W+D (W-B).
The core processing module estimates the turnover of fictitious assets object according to assessment weight are as follows:
The present invention assesses the potential value of fictitious assets object by confidence interval method combination credit rating, breaches tradition Estimation method measures the bottleneck of value of rights only with funds amount.
The independent point account specifically includes:
(5.1) the available property volume f of the terminal module under different alliance's chain j is inquiredL, j;L is under same alliance's chain Terminal module label, l=1,2,3 ... n, n≤m,
(5.2) it calculates each node under alliance's chain and divides account volume Fl:
(5.3) F that core processing module will calculatelIt is respectively sent to corresponding terminal module.
The function of the independent point account is calculated by core processing module to be supplied to node itself and needs the book amount born, The effective protection information of other nodes, has been provided simultaneously with cloud computing and assesses a point function for account volume in real time.
The method of the terminal module response fund-raising purchase scheme are as follows:
(6.1) numbering the terminal module in alliance's chain one by one is 1,2,3 ... n;It is begun to respond to from No. 1 terminal module, such as Fruit No. 1 terminal module response, as agrees to fund-raising purchase scheme, otherwise to disagree fund-raising purchase scheme;
(6.2) statistics agrees to the terminal module number a of fund-raising purchase and disagrees the terminal module number b of fund-raising purchase, distich In alliance's chain all terminal modules re-start number i.e. agree to fund-raising purchase terminal module number be 1,2,3 ... a;Disagree collection The terminal module number of money purchase is b, b+1, b+2 ... n;
(6.2) readjust fund-raising purchase scheme, at this time divide account volume adjust are as follows:
(6.3) F that will be recalculated tolIt is respectively sent to the corresponding terminal module for agreeing to fund-raising purchase;
(6.4) core processing module inquiry agrees to whether the terminal module of fund-raising purchase agrees to new independent point account scheme; Purchase of raising funds if all terminal modules respond core processing module terminates, by corresponding point of account volume from the terminal module of response It draws in account and pays fictitious assets owner;It is re-execute the steps if thering is terminal module not respond core processing module (6.2)。
This fund-raising purchase scheme carries out node type fund-raising purchase using cloud endless form, mentions for alliance's chain trade virtual assets A new prediction scheme is supplied, the member of alliance's chain can rationally share trading dividend according to investment amount, novel and can have Effect solves the problems, such as that patent transaction audient face is small.
The above method integrally combines, system and effectively to propose a kind of confidence level high, it is empty under the high block chain of serious forgiveness The method of quasi- assets credit value assessment.Here it must be noted that other unaccounted technologies that the present invention provides are because all It is techniques known, title or function according to the present invention, those skilled in the art can find related note The document of load, therefore be not described further.The technical means disclosed in the embodiments of the present invention is not limited only to above embodiment institute Disclosed technological means, also includes technical solutions formed by any combination of the above technical features.

Claims (9)

1. fictitious assets credit worthiness evaluation method under a kind of block chain, block catenary system includes core processing module, forms not Terminal module, super account book administration module with alliance's chain, client software too development, which is characterized in that including walking as follows It is rapid:
(1) client software too development module proposes authentication and inquiry request, super account to super account book administration module This administration module judges client software too development module body according to the level-one certification certificate in authentication and inquiry request Part, if the client software too development module of this block chain authorization, then pass through after authenticating to client software too development Module provides public spoon and enters step (2);Otherwise, super account book administration module enters suspend mode;
(2) according to the address in public spoon, all terminal modules into block chain propose virtual money to client software too development module Produce the credit evaluation request and value assessment request of object;
(3) terminal module requests to extract all of fictitious assets object according to credit evaluation request and value assessment after identifying public spoon Data carry out credit scoring and value scoring, and credit scoring and value score data are reported and submitted to core processing module;
(4) core processing module integrates the credit scoring of all terminal modules and value score data to obtain final appraisal right Value;
(5) core processing module estimates the turnover of fictitious assets object according to assessment weight, while according under different alliance's chains The real property Backup Data of terminal module turnover is allocated and independent point account, and a point account information data is sent out respectively It gives the client software too development module for proposing assessment request and proposes simple transaction scheme and fund-raising purchase-transaction scheme;
(6) propose that the client software too development module of assessment request adjusts trading scheme according to the core processing module received It reports and submits to core processing module, scheme is reported and submitted into region chain all terminal modules that terminal module is waited to ring by core processing module It should and execute simple transaction scheme or fund-raising purchase-transaction scheme.
2. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, it is characterised in that: described The generation method of first class certificate of client software too development include the following steps: core processing module to client software The database of too development module sends four table composition level-ones and authenticates certificate, is user's table, login certificate table, transaction card respectively Book table and channel table;User's table records user basic information, including ID and password when user's registration, registration type, and token is enabled Board, institutional affiliation and registion time;Login certificate table records the corresponding relationship of client software too development module and user, Including certificate ID, User ID, the CA of the certificate authority, the state of CertPubKey and current certificate;Certificate of fair table stores All Activity certificate in system, to guarantee that the certificate of fair that user uses is to forge.Including certificate ID, the certificate authority Unlike CA, the state of CertPubKey and current certificate, certificate of fair table and login certificate table, it does not include User ID Information avoids database from causing user information to be revealed by attack;Channel table records the specific information about firms in each channel, it is wrapped Include channel ID, Channels user, channel creation time.
3. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, it is characterised in that: described Super account book administration module include a super account book supervision client and a super account book policing services end, super account book Administration module is supplied to the public spoon of client software too development module, comprising: the initialization of super account book policing services end;It is super The starting service of account book policing services end receives level-one and authenticates certificate information;Super account book supervises client and supervises clothes to super account book The request registration of business end;Super account book policing services end returns to the certificate of registration to super account book supervision client;Super account book supervision Client requests register node to super account book policing services end;Client is supervised to super account book in super account book policing services end Return node registration information result;Super account book, which supervises client, requests registered nodes to super account book policing services end;It is super Account book policing services end generates signed data, is stored in the database of client software too development module;Super account book supervision clothes Business end returns to enrollment results to client;Super account book supervision client and super account book policing services end using network request into Row communication, super account book supervision client, which is responsible for sending to server-side, requests, and super account book policing services end, which receives and processes, to be come From the request of super account book supervision client, and return to the super account book supervision corresponding response bag of client;It is soft in client In part too development module logging request, super account book supervision client sends the ID of client software too development Module registers And password, super account book policing services end receive and parse through the request, and it is corresponding to generate the client software too development module Public spoon;In client software too development module request public affairs spoon, client software too development module need to provide oneself Identity ID, super account book supervision client replace user to be issued super account book policing services end, super account book policing services Corresponding identity ID is extracted at end from the token token of user's table, and is inquired corresponding public spoon in the database and returned to Client software too development module.
4. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, which is characterized in that described Fictitious assets object be stored in the database or self contained data base of core processing module, the assessment of the credit scoring Include the following steps:
(3.1) prediction credit worthiness M (x, the x of fictitious assets object are assessedi'):
Wherein m terminal module is x to the prediction loss late of fictitious assets objecti', (1,2,3 ... m), and x is fictitious assets visitor by i ∈ The average loss rate in field described in body;
(3.2) norm for assessing fictitious assets object loses A (x, xi'):
(3.3) variation risk E (x, the x of fictitious assets object are assessedi'):
Var is venture worth;
(3.4) fictitious assets object weight coefficient R (x, x really are calculatedi'):
(3.5) true credit value, that is, credit scoring D of fictitious assets object is assessed:
The credit scoring of fictitious assets object, the smaller fictitious assets object for illustrating transaction of credit scoring are assessed by the size of D Risk factor it is higher.
5. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, which is characterized in that described Fictitious assets object be stored in the database or self contained data base of core processing module, the assessment of the described value scoring Step includes:
(4.1) evaluated fictitious assets object and the financial index Y of obligee are inquiredn, n=1,2,3, wherein Y1For evaluated void The liquidity ratio of quasi- assets object, Y2For the turnover of total assets for being evaluated fictitious assets object obligee, Y1It is evaluated virtual The object net profit on sales rate of the patentee of assets object;
(4.2) the regulation coefficient S of evaluated fictitious assets object financial index is calculatedi
S1=(Y1-q1)/q1;S2=(Y2-q2)/q2;S3=(Y3-q3)/q3
q1It is Y1Ratio regulation coefficient;q2It is Y2Ratio regulation coefficient;q3It is Y3Ratio regulation coefficient;
(4.3) the weighting regulation coefficient Q of evaluated fictitious assets object is calculated:
Q=1+S1Y1+S2Y2+S3Y3
(4.4) the average value W for transferring the patent value of the industry where fictitious assets object obtains evaluated fictitious assets object Value multiplier T,
T=WQ;
(4.5) all terminal modules are transferred to the assessed value z of the value of evaluated fictitious assets objecti, calculate fictitious assets object Value score B:
The value scoring of fictitious assets object, the smaller fictitious assets object for illustrating transaction of value scoring are assessed by the size of B Risk factor it is higher.
6. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, it is characterised in that: described Fictitious assets object assessment weight Ψ are as follows:
Ψ=W+D (W-B).
7. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, which is characterized in that described Core processing module according to assessment weight estimation fictitious assets object turnover are as follows:
8. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, which is characterized in that described An independent point account specifically include:
(5.1) the available property volume f of the terminal module under different alliance's chain j is inquiredl,j;L is the end under same alliance's chain The label of end module, l=1,2,3 ... n, n≤m,
(5.2) it calculates each node under alliance's chain and divides account volume Fl:
(5.3) F that core processing module will calculatelIt is respectively sent to corresponding terminal module.
9. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, which is characterized in that described Terminal module response fund-raising purchase scheme method are as follows:
(6.1) numbering the terminal module in alliance's chain one by one is 1,2,3 ... n;It is begun to respond to from No. 1 terminal module, if No. 1 Terminal module response as agrees to fund-raising purchase scheme, otherwise to disagree fund-raising purchase scheme;
(6.2) statistics agrees to the terminal module number a of fund-raising purchase and disagrees the terminal module number b of fund-raising purchase, to alliance's chain In all terminal modules re-start number i.e. agree to fund-raising purchase terminal module number be 1,2,3 ... a;Disagree fund-raising purchase The terminal module number bought is b, b+1, b+2 ... n;
(6.2) readjust fund-raising purchase scheme, at this time divide account volume adjust are as follows:
(6.3) F that will be recalculated tolIt is respectively sent to the corresponding terminal module for agreeing to fund-raising purchase;
(6.4) core processing module inquiry agrees to whether the terminal module of fund-raising purchase agrees to new independent point account scheme;If institute There is the purchase of then raising funds of terminal module response core processing module to terminate, by corresponding point of account volume from the account of the terminal module of response In draw walk and pay fictitious assets owner;It is re-execute the steps if thering is terminal module not respond core processing module (6.2)。
CN201811121715.7A 2018-09-26 2018-09-26 A kind of value assessment method of fictitious assets under internet block chain environment Withdrawn CN109255610A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811121715.7A CN109255610A (en) 2018-09-26 2018-09-26 A kind of value assessment method of fictitious assets under internet block chain environment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811121715.7A CN109255610A (en) 2018-09-26 2018-09-26 A kind of value assessment method of fictitious assets under internet block chain environment

Publications (1)

Publication Number Publication Date
CN109255610A true CN109255610A (en) 2019-01-22

Family

ID=65047075

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811121715.7A Withdrawn CN109255610A (en) 2018-09-26 2018-09-26 A kind of value assessment method of fictitious assets under internet block chain environment

Country Status (1)

Country Link
CN (1) CN109255610A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555682A (en) * 2019-09-10 2019-12-10 苏州阿尔山数字科技有限公司 multi-channel implementation method based on alliance chain
CN110941668A (en) * 2019-11-08 2020-03-31 中国电子科技网络信息安全有限公司 Block chain-based unified identity management and authentication method
CN111046078A (en) * 2019-11-11 2020-04-21 北京海益同展信息科技有限公司 Block chain-based credit investigation query method and device and electronic equipment
CN112068962A (en) * 2020-09-14 2020-12-11 江苏赞奇科技股份有限公司 Cloud rendering resource exchange method based on deep learning
CN112910085A (en) * 2021-01-18 2021-06-04 国网福建省电力有限公司 Power utilization acquisition method based on low-voltage grid type block chain
CN114723200A (en) * 2021-01-05 2022-07-08 中国移动通信有限公司研究院 Data value evaluation method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104252674A (en) * 2014-09-04 2014-12-31 天津大学 Elliptic curve cipher-based self-authentication mechanism mobile phone trading method
CN106097073A (en) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 A kind of block chain gives the method for the numeral exclusive ID of account trading process
CN107085807A (en) * 2017-04-19 2017-08-22 迅鳐成都科技有限公司 A kind of data assets method of commerce based on block chain

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104252674A (en) * 2014-09-04 2014-12-31 天津大学 Elliptic curve cipher-based self-authentication mechanism mobile phone trading method
CN106097073A (en) * 2016-06-20 2016-11-09 深圳市淘淘谷信息技术有限公司 A kind of block chain gives the method for the numeral exclusive ID of account trading process
CN107085807A (en) * 2017-04-19 2017-08-22 迅鳐成都科技有限公司 A kind of data assets method of commerce based on block chain

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110555682A (en) * 2019-09-10 2019-12-10 苏州阿尔山数字科技有限公司 multi-channel implementation method based on alliance chain
CN110555682B (en) * 2019-09-10 2023-04-07 苏州阿尔山数字科技有限公司 Multi-channel implementation method based on alliance chain
CN110941668A (en) * 2019-11-08 2020-03-31 中国电子科技网络信息安全有限公司 Block chain-based unified identity management and authentication method
CN110941668B (en) * 2019-11-08 2022-09-16 中国电子科技网络信息安全有限公司 Block chain-based unified identity management and authentication method
CN111046078A (en) * 2019-11-11 2020-04-21 北京海益同展信息科技有限公司 Block chain-based credit investigation query method and device and electronic equipment
CN111046078B (en) * 2019-11-11 2023-09-05 京东科技信息技术有限公司 Credit investigation method and device based on block chain and electronic equipment
CN112068962A (en) * 2020-09-14 2020-12-11 江苏赞奇科技股份有限公司 Cloud rendering resource exchange method based on deep learning
CN114723200A (en) * 2021-01-05 2022-07-08 中国移动通信有限公司研究院 Data value evaluation method and device
CN112910085A (en) * 2021-01-18 2021-06-04 国网福建省电力有限公司 Power utilization acquisition method based on low-voltage grid type block chain
CN112910085B (en) * 2021-01-18 2023-01-31 国网福建省电力有限公司 Power utilization acquisition method based on low-voltage grid type block chain

Similar Documents

Publication Publication Date Title
CN109255610A (en) A kind of value assessment method of fictitious assets under internet block chain environment
ur Rehman et al. Trust in blockchain cryptocurrency ecosystem
CN109242487A (en) A kind of value assessment method of internet block chain environment lower network domain name
CN108764993A (en) A kind of store promotional system based on block chain
Thakker et al. Blockchain for diamond industry: Opportunities and challenges
ElMessiry et al. Dual Token Blockchain Economy Framework: The Garment Use Case
Adesola et al. Impact of information and communications technology on Nigerian banks operations: A study of United Bank for Africa (UBA) Plc
WO2021075057A1 (en) Digital currency operation system and operation method using fully homological encryption scheme
CN107093142A (en) Legal tender bond and assets management method in a kind of Quantum Chain
Hu et al. Cross‐Border E‐Commerce Business Model Based on Big Data and Blockchain
Abuselidze et al. The gravity of cryptocurrency and prospects in a post-pandemic economy
Nami E-banking: Issues and challenges
CN110956345A (en) Value evaluation method for electronic commerce and enterprise brands in Internet block chain environment
Boyko et al. Patterns of financial crimes using cryptocurrencies
Sofyan et al. The Strategy of Rural Bank in the Face of the Industrial Era 4.0
Ekong et al. Does cryptocurrency transactions benefit ICT businesses in Uyo metropolis: Evidence from a field survey
Su Analysis of Cryptocurrency and Its Combination with Quantitative Transactions
Marecki et al. Cryptocurrency market of bitcoin and payment acceptability in E-commerce
Canepa et al. NFTs and Crypto Art Marketplaces: New Risks for Investors and Financial Markets?
Mendes-Da-Silva Introduction: The Context of Financial Innovations
Nakatani et al. Crypto-currencies: from the fetishism of Gold to Hayek Gold
Tartan A Blockchain-Based Welfare Distribution Model for Digital Inclusivity
Yuqing et al. The Research on Online Consumer Finance Innovation Drives by Financial Technology
Wei Cryptocurrency: Using Dark Markets to Shine Light on the Propriety of Regulation
Howell et al. Open-Source or Open-Slather? Governing Blockchain Applications as Common-Pool Resources

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication
WW01 Invention patent application withdrawn after publication

Application publication date: 20190122