CN109255610A - A kind of value assessment method of fictitious assets under internet block chain environment - Google Patents
A kind of value assessment method of fictitious assets under internet block chain environment Download PDFInfo
- Publication number
- CN109255610A CN109255610A CN201811121715.7A CN201811121715A CN109255610A CN 109255610 A CN109255610 A CN 109255610A CN 201811121715 A CN201811121715 A CN 201811121715A CN 109255610 A CN109255610 A CN 109255610A
- Authority
- CN
- China
- Prior art keywords
- module
- account book
- fictitious assets
- super account
- certificate
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Withdrawn
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3672—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes initialising or reloading thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/08—Payment architectures
- G06Q20/10—Payment architectures specially adapted for electronic funds transfer [EFT] systems; specially adapted for home banking systems
- G06Q20/102—Bill distribution or payments
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3674—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Finance (AREA)
- Engineering & Computer Science (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention belongs to internet electric business brand names assessment techniques, and in particular to a kind of value assessment method with electric business brand names under the internet block chain environment for dividing account and purchase function of raising funds.Block catenary system includes terminal module, the super account book administration module of core processing module, the different alliance's chains of composition in the method for the present invention, client software too development module, including client software too development module authentication and inquiry request are proposed to super account book administration module, super account book administration module judges client software too development module identity according to the level-one certification certificate in authentication and inquiry request.The present invention is capable of the true value of the evaluation electric business brand names object of objective, data all simultaneously are only calculated and are stored in core processing module, calculated result is determined by the scale amounts of terminal module completely, avoids interference of the human factor to assessment result.
Description
Technical field
The invention belongs to internet virtual asset evaluation technology, and in particular to a kind of with dividing account and purchase function of raising funds
The value assessment method of fictitious assets under internet block chain environment.
Background technique
Internet is born initial stage, and the use of many Internet resources is free state, until beginning of this century network economy foam
After vanishing, some service items on network are gradually included in by major network operator when seeking network operation profit model
Charge, many operators are created by modes such as exploitation, producing and selling, transfers to Internet resources with powerful profit energy
The network virtual assets of power, such as the network ideal money, network property, network paid service form " virtual network transaction "
" reality transaction off the net " two markets.The generation of network virtual assets changes the structure of accounting asset element, makes accounting core
It calculates in the environment of network economy, has novel Accounting Content, Accounting Model, accounting method, especially for the invisible money of enterprise
Production provides new Accounting Content.
Network virtual assets are controlled by enterprise or individual, can have network expected from income with monetary measurement
Economic resources.It is the new network intangible asset for existing or being stored on internet except it is independently of enterprise's legacy asset.Mesh
Come to see, network virtual assets can be divided into three categories: the first kind is the network ideal money, and that most represent is the Q of Tencent
Coin, it has had the feature of network trading general " currency ", can buy many network virtual articles with Q coin, it might even be possible to purchase
Buy the product for generally requiring and being paid with real money, such as antivirus software.Second class is network object, and most representative is game
Object, these objects, the marked price on network, the trade market of scale have preliminarily formed.Third class is network
Paid service, such as domain name service, charge e-mail, cyberspace service, network information right to use service, and these are paid
Service is also marked price.It is contemplated that the following Internet resources for also having more more potentiality can be opened continuously
Come, trades.Market based on network virtual transaction in assets is an emerging market, have huge potentiality and
Development space.Network virtual assets are the same also like traditional commodities, and specially founding in major website has inquiry prefecture, and many articles are bright
Code marked price, can be by network void like currency or real money free transaction.
Network virtual assets have caused the concern of accounting theory and practice worker more and more, and many people are to network
Certain specific manifestation forms of fictitious assets carry out value assessment research, such as to domain name value assessment, E-mail address value of charging
Assessment etc. proposes some assessment principle and method, but such research is not very scattered, comprehensive, and few people provide network virtual
The value assessment of production is comprehensively summarized, to network virtual assets (such as network virtual article, the network void of other display forms
Intending currency, network, other are paid information service) without enough attention, this is because other network virtual assets are also in formation
In, assets form and value characteristic need people and fully understand understanding.The quasi- value assessment to network virtual assets of the present invention
It proposes mailbox method, and solves the problems, such as the value assessment of representative network virtual asset item.
Summary of the invention
It is capable of having the function of point account and raising funds for objective evaluation fictitious assets value the purpose of the present invention is to provide a kind of
Internet block chain environment under fictitious assets value assessment method.
The object of the present invention is achieved like this:
A kind of value assessment method of fictitious assets under internet block chain environment, block catenary system includes core processing mould
Terminal module, the super account book administration module (Fabric CA module) of block, the different alliance's chains of composition, client software tool is opened
(Software Development Kit) module is sent out, is included the following steps:
(1) client software too development module proposes authentication and inquiry request to super account book administration module, surpasses
Grade account book administration module judges client software too development mould according to the level-one certification certificate in authentication and inquiry request
Block identity then passes through after authenticating if the client software too development module of this block chain authorization to client software tool
Development module provides public spoon and enters step (2);Otherwise, super account book administration module enters suspend mode;
(2) according to the address in public spoon, all terminal modules into block chain propose void to client software too development module
The credit evaluation request and value assessment of quasi- assets object (ideal money, mailbox, domain names, network property, network service)
Request;
(3) terminal module requests to extract fictitious assets object after identifying public spoon according to credit evaluation request and value assessment
All data carry out credit scoring and value scoring, and credit scoring and value score data are reported and submitted to core processing module;
(4) core processing module integrates the credit scoring of all terminal modules and value score data to obtain final comment
Estimate weight;
(5) core processing module estimates the turnover of fictitious assets object according to assessment weight, while according to different alliances
The real property Backup Data of terminal module under chain is allocated to turnover and independent point account, and will divide account information data point
It is not sent to the client software too development module for proposing assessment request and proposes simple transaction scheme and fund-raising purchase-transaction
Scheme;
(6) propose the client software too development module of assessment request according to the core processing module adjustment transaction received
Scheme is reported and submitted to core processing module, and scheme is reported and submitted into region chain all terminal modules to wait terminal mould by core processing module
Block responds and executes simple transaction scheme or fund-raising purchase-transaction scheme.
The generation method of the level-one certification certificate of the client software too development module includes the following steps: core
Processing module sends four table composition level-ones to the database of client software too development module and authenticates certificate, is user respectively
Table, login certificate table, certificate of fair table and channel table;User's table record user basic information, including when user's registration ID and
Password, registration type, token token, institutional affiliation and registion time;Login certificate table records client software too development
The corresponding relationship of module and user, including certificate ID, User ID, the CA of the certificate authority, CertPubKey and current certificate
State (whether oneself is through expired);Certificate of fair table stores All Activity certificate in system, to guarantee that the transaction that user uses is demonstrate,proved
Book is to forge.Including certificate ID, the CA of the certificate authority, (whether oneself passes through the state of CertPubKey and current certificate
Phase), unlike certificate of fair table and login certificate table, it does not include information of User ID, and database is avoided to lead by attack
It applies family information leakage;Channel table records the specific information about firms in each channel, it includes channel ID, Channels user, channel wound
Build the time.
The super account book administration module includes a super account book supervision client and a super account book supervision clothes
Business end, super account book administration module are supplied to the public spoon of client software too development module, comprising: super account book policing services
End initialization (generation of CA root certificate);The starting service of super account book policing services end receives level-one and authenticates certificate information;Super account
This supervision client requests to register to super account book policing services end;Client is supervised to super account book in super account book policing services end
End returns to the certificate of registration;Super account book, which supervises client, requests register node to super account book policing services end;Super account book prison
Pipe server-side supervises client return node registration information result to super account book;Super account book supervises client to super account book
Request registered nodes in policing services end;Super account book policing services end generates signed data, is stored in client software too development
The database of module;Super account book policing services end returns to enrollment results to client;Super account book supervision client and super
Account book policing services end is communicated using network request, and super account book supervision client, which is responsible for sending to server-side, requests, and is surpassed
Grade account book policing services end receives and processes the request from super account book supervision client, and returns to super account book supervision visitor
The corresponding response bag in family end;In client software too development module logging request, super account book supervision client sends visitor
The ID and password of family end software tool development module registration, super account book policing services end receive and parse through the request, and generating should
The corresponding public spoon of client software too development module;In client software too development module request public affairs spoon, client is soft
Part too development module needs to provide the identity ID of oneself, and super account book supervision client replaces user to be issued super account book
Corresponding identity ID is extracted at policing services end, super account book policing services end from the token token of user's table, and in database
It is middle to inquire corresponding public spoon and return to client software too development module.
The fictitious assets object information (including prediction credit worthiness, prediction loss late, average loss rate, norm
Loss, variation risk etc.) it is stored in the database or self contained data base of core processing module, the credit scoring is commented
Estimate and includes the following steps:
(3.1) prediction credit worthiness M (x, the x of fictitious assets object are assessedi'):
Wherein m terminal module is x to the prediction loss late of fictitious assets objecti', (1,2,3 ... m), and x is virtual by i ∈
The average loss rate in field described in assets object;
(3.2) norm for assessing average loss rate object loses A (x, xi'):
(3.3) variation risk E (x, the x of fictitious assets object are assessedi'):
Var is venture worth;
(3.4) fictitious assets object weight coefficient R (x, x really are calculatedi'):
(3.5) true credit value, that is, credit scoring D of fictitious assets object is assessed:
The credit scoring of fictitious assets object, the smaller fictitious assets for illustrating transaction of credit scoring are assessed by the size of D
The risk factor of object is higher.
The fictitious assets object is stored in the database or self contained data base of core processing module, the valence
Value scoring appraisal procedure include:
(4.1) evaluated fictitious assets object and the financial index Y of obligee are inquiredn, n=1,2,3, wherein Y1To be commented
Estimate the liquidity ratio of fictitious assets object, Y2For the turnover of total assets for being evaluated fictitious assets object obligee, Y1It is evaluated
The object net profit on sales rate of the patentee of fictitious assets object;
(4.2) the regulation coefficient S of evaluated fictitious assets object financial index is calculatedi;
S1=(Y1-q1)/q1;S2=(Y2-q2)/q2;S3=(Y3-q3)/q3;
q1It is Y1Ratio regulation coefficient;q2It is Y2Ratio regulation coefficient;q3It is Y3Ratio regulation coefficient;
(4.3) the weighting regulation coefficient Q of evaluated fictitious assets object is calculated:
Q=1+S1Y1+S2Y2+S3Y3;
(4.4) the average value W for transferring the value of the industry where fictitious assets object obtains evaluated fictitious assets object
Value multiplier T,
T=WQ;
(4.5) all terminal modules are transferred to the assessed value z of the value of evaluated fictitious assets objecti, calculate virtual money
Produce the value scoring B of object:
The value scoring of fictitious assets object, the smaller fictitious assets for illustrating transaction of value scoring are assessed by the size of B
The risk factor of object is higher.
The assessment weight Ψ of the fictitious assets object are as follows:
Ψ=W+D (W-B);
The core processing module estimates the turnover of fictitious assets object according to assessment weight are as follows:
The independent point account specifically includes:
(5.1) the available property volume f of the terminal module under different alliance's chain j is inquiredL, j;L is under same alliance's chain
Terminal module label, l=1,2,3 ... n, n≤m,
(5.2) it calculates each node under alliance's chain and divides account volume Fl:
(5.3) F that core processing module will calculatelIt is respectively sent to corresponding terminal module.
The method of the terminal module response fund-raising purchase scheme are as follows:
(6.1) numbering the terminal module in alliance's chain one by one is 1,2,3 ... n;It is begun to respond to from No. 1 terminal module, such as
Fruit No. 1 terminal module response, as agrees to fund-raising purchase scheme, otherwise to disagree fund-raising purchase scheme;
(6.2) statistics agrees to the terminal module number a of fund-raising purchase and disagrees the terminal module number b of fund-raising purchase, distich
In alliance's chain all terminal modules re-start number i.e. agree to fund-raising purchase terminal module number be 1,2,3 ... a;Disagree collection
The terminal module number of money purchase is b, b+1, b+2 ... n;
(6.2) readjust fund-raising purchase scheme, at this time divide account volume adjust are as follows:
(6.3) F that will be recalculated tolIt is respectively sent to the corresponding terminal module for agreeing to fund-raising purchase;
(6.4) core processing module inquiry agrees to whether the terminal module of fund-raising purchase agrees to new independent point account scheme;
Purchase of raising funds if all terminal modules respond core processing module terminates, by corresponding point of account volume from the terminal module of response
It draws in account and pays fictitious assets owner;It is re-execute the steps if thering is terminal module not respond core processing module
(6.2)。
The beneficial effects of the present invention are: the present invention is capable of the true value of the evaluation fictitious assets object of objective,
Data all simultaneously are only calculated and are stored in core processing module, and calculated result is completely by the scale number of terminal module
Amount determines, avoids interference of the human factor to assessment result.Furthermore each terminal module is merely able to individually receive information, can not
Global information is obtained, secret protection scheme is more perfect.The function of point account and fund-raising purchase is provided simultaneously, and terminal module is existed
The problems such as alliance's chain is further divided into block chain convenient for linking up connection and solving single node financial difficulty.
Detailed description of the invention
Fig. 1 is flow diagram of the invention;
Fig. 2 is that functional flow diagram is bought in present invention fund-raising.
Specific embodiment
The present invention is described further with reference to the accompanying drawing.
Block chain technology has the characteristics that " decentralization " and " going trustization ", can not depend on third party's trust authority and exist
Point-to-point credible value delivery is established between strange node, being different from traditional mode has boundless application prospect, is recognized
For be lead information interconnected network to value internet change key technology.In financial industry, bank and financial institution wish benefit
With block chain technological transformation traditional financial system, data maintenance cost is reduced.Transparence, the data of block catenary system can not distort
Etc. features, be completely suitable for reference management, qualifications, business associate etc..In addition to this, block chain is in Internet of Things, text
Changing amusement, social management, communication etc. can also be widely applied.Block chain is divided into publicly-owned chain, privately owned chain and alliance's chain.To all
People it is open be publicly-owned chain, for it is independent it is personal and entity be privately owned chain, what is fallen between is alliance's chain.Publicly-owned chain is
A kind of completely new distributed basis framework and calculation paradigm are calculated using orderly linked data structure storing data using common recognition
Method more new data ensures data safety using cryptological technique, and the distributed account book that it is constructed in systems cannot be tampered
And forgery, an authentic data library is safeguarded according to common recognition mechanism collective, meanwhile, each node in system is owned by account book, and
Dynamically it is consistent.Each node of alliance's chain usually has corresponding physical mechanism tissue, by that could add after authorization
Enter and exit network, each organization forms the relevant alliance of interests, the common health operating for safeguarding block chain.
As shown in Figure 1, system includes sequence core processing module, terminal module, super account book administration module, client is soft
Part too development module, the system by the data maintenance of traditional block chain interior joint and common recognition service isolation, common recognition service from
Peer node disjoint is new module ordering service, which is sorted the transaction in block using common recognition algorithm,
Ensure that the block data in each channel is consistent, guarantees that the data of each account book in the channel are identical.Terminal module is responsible for chain code
Execution, account book, state-maintenance etc. consume the task of system performance very much, are the important components of the system.Super account book prison
Tube module provides the tasks such as registration, the certificate authority of system interior joint, and the system is made to become the block catenary system having permission, enhancing
Security of system.Application module is present in application layer, is the interface of system external, and enterprise-level application passes through client software tool
Development module is operated with the local key pair system.The present invention is by sending client software too development module end
The access control based on account book is realized in the transformation for motion data packet of trading.Fictitious assets is believed under a kind of block chain proposed by the present invention
With value assessment method, block catenary system includes core processing module, the terminal module of the different alliance's chains of composition, super account book prison
Tube module, client software too development (Software Development Kit) module, system evaluation include the following steps:
(1) client software too development module proposes authentication and inquiry request to super account book administration module, surpasses
Grade account book administration module judges client software too development mould according to the level-one certification certificate in authentication and inquiry request
Block identity then passes through after authenticating if the client software too development module of this block chain authorization to client software tool
Development module provides public spoon and enters step (2);Otherwise, super account book administration module enters suspend mode;(2) client software tool
According to the address in public spoon, all terminal modules into block chain propose the credit evaluation requests of fictitious assets objects to development module
It is requested with value assessment;(3) terminal module requests to extract virtual money according to credit evaluation request and value assessment after identifying public spoon
All data for producing object carry out credit scoring and value scoring, and credit scoring and value score data are reported and submitted to core
Manage module;(4) core processing module integrates the credit scoring of all terminal modules and value score data to obtain final comment
Estimate weight;(5) core processing module estimates the turnover of fictitious assets object according to assessment weight, while according to different alliance's chains
Under the property Backup Data of terminal module turnover is allocated and independent point account, and a point account information data is sent respectively
To the client software too development module for proposing assessment request and propose simple transaction scheme and fund-raising purchase-transaction scheme;
(6) propose that the client software too development module of assessment request is reported and submitted according to the core processing module adjustment trading scheme received
To core processing module, scheme is reported and submitted into region chain all terminal modules to wait terminal module response simultaneously by core processing module
Execute simple transaction scheme or fund-raising purchase-transaction scheme.This programme is capable of the true of the evaluation fictitious assets object of objective
Value, while all data are only calculated and are stored in core processing module, calculated result is completely by terminal module
Scale amounts determine, avoid interference of the human factor to assessment result.Furthermore each terminal module is merely able to individually receive letter
Breath, can not obtain global information, secret protection scheme is more perfect.The function of point account and fund-raising purchase is provided simultaneously, it will be whole
The problems such as end module is further divided into alliance's chain in block chain convenient for linking up connection and solving single node financial difficulty.It is described
Alliance's chain be the block chain open to specific organization, all alliance's chain links are whole block chain together.
In order to further ensure the network security of client software too development module, we have proposed a kind of new level-ones
The generation method of certificate is authenticated, this method can guarantee that the real-time of certificate can not tamper.The client software work
The generation method of the level-one certification certificate of tool development module includes the following steps: that core processing module is opened to client software tool
The database for sending out module sends four tables composition level-ones and authenticates certificates, be respectively user's table, login certificate table, certificate of fair table with
And channel table;User's table records user basic information, including ID and password when user's registration, registration type, token token, institute
Belong to mechanism and registion time;Login certificate table records the corresponding relationship of client software too development module and user, including
The state of certificate ID, User ID, the CA of the certificate authority, CertPubKey and current certificate (whether oneself is through expired);Transaction card
Book table stores All Activity certificate in system, to guarantee that the certificate of fair that user uses is to forge.Including certificate ID, the card
The state (whether oneself is through expired) of the CA that book is issued, CertPubKey and current certificate, certificate of fair table and login certificate table are not
With it does not include the information of User ID, and database is avoided to cause user information to be revealed by attack;Channel table record is each
The specific information about firms in channel, it includes channel ID, Channels user, channel creation time.
Furthermore correspond to level-one and authenticate certificate, we provide a kind of generation method of public key, match with level-one certification certificate
Close the security attribute that can further promote terminal module and client.The super account book administration module includes one super
Account book supervision client and a super account book policing services end, super account book administration module are supplied to client software tool and open
Send out the public spoon of module, comprising: super account book policing services end initializes (generation of CA root certificate);It opens at super account book policing services end
Dynamic service receives level-one and authenticates certificate information;Super account book supervises client requests to register to super account book policing services end;It is super
Grade account book policing services end returns to the certificate of registration to super account book supervision client;Super account book supervises client to super account book
Request register node in policing services end;Client return node registration information is supervised to super account book in super account book policing services end
As a result;Super account book, which supervises client, requests registered nodes to super account book policing services end;Super account book policing services end is raw
At signed data, it is stored in the database of client software too development module;Super account book policing services end is returned to client
Enrollment results;Super account book supervision client and super account book policing services end are communicated using network request, super account book
Supervision client, which is responsible for sending to server-side, requests, and super account book policing services end, which is received and processed, supervises visitor from super account book
The request at family end, and return to the super account book supervision corresponding response bag of client;It is stepped in client software too development module
In record request, super account book supervision client sends the ID and password of client software too development Module registers, super account book
Policing services end receives and parses through the request, generates the corresponding public spoon of the client software too development module;It is soft in client
When part too development module request public affairs spoon, client software too development module needs to provide the identity ID of oneself, super account book
Supervision client replaces user to be issued super account book policing services end, and super account book policing services end is from user's table
Corresponding identity ID is extracted in token token, and is inquired corresponding public spoon in the database and returned to client software work
Has development module.
The present invention furthermore presents the database or only that the fictitious assets object is stored in core processing module
In vertical database, the following steps of the assessment of credit scoring:
(3.1) prediction credit worthiness M (x, the x of fictitious assets object are assessedi'):
Wherein m terminal module is x to the prediction loss late of fictitious assets objecti', (1,2,3 ... m), and x is virtual by i ∈
The average loss rate in field described in assets object;
(3.2) norm for assessing fictitious assets object loses A (x, xi'):
(3.3) variation risk E (x, the x of fictitious assets object are assessedi'):
Var is venture worth;
(3.4) fictitious assets object weight coefficient R (x, x really are calculatedi'):
(3.5) true credit value, that is, credit scoring D of fictitious assets object is assessed:
The credit scoring of fictitious assets object, the smaller fictitious assets for illustrating transaction of credit scoring are assessed by the size of D
The risk factor of object is higher.
Above-mentioned steps propose a kind of new fictitious assets credit scoring standard, the standards of grading introduce norm loss and
Loss risk, being capable of the more effective more credit value of objective appraisal object.
In addition, the fictitious assets object is stored in the database or self contained data base of core processing module, institute
That states, which is worth the appraisal procedure of scoring, includes:
(4.1) evaluated fictitious assets object and the financial index Y of obligee are inquiredn, n=1,2,3, wherein Y1To be commented
Estimate the liquidity ratio of fictitious assets object, Y2For the turnover of total assets for being evaluated fictitious assets object obligee, Y1It is evaluated
The object net profit on sales rate of the patentee of fictitious assets object;
(4.2) the regulation coefficient S of evaluated fictitious assets object financial index is calculatedi;
S1=(Y1-q1)/q1;S2=(Y2-q2)/q2;S3=(Y3-q3)/q3;
q1It is Y1Ratio regulation coefficient;q2It is Y2Ratio regulation coefficient;q3It is Y3Ratio regulation coefficient;
(4.3) the weighting regulation coefficient Q of evaluated fictitious assets object is calculated:
Q=1+S1Y1+S2Y2+S3Y3;
(4.4) the average value W for transferring the patent value of the industry where fictitious assets object obtains evaluated fictitious assets
The value multiplier T of object,
T=WQ;
(4.5) all terminal modules are transferred to the assessed value z of the value of evaluated fictitious assets objecti, calculate virtual money
Produce the value scoring B of object:
The value scoring of fictitious assets object, the smaller fictitious assets for illustrating transaction of value scoring are assessed by the size of B
The risk factor of object is higher.By credit value and value separate, by fictitious assets object evaluation and object belonging to right
The index of correlation of people links together, and is conducive to the assessment confidence level for further improving present aspect.
The assessment weight Ψ of the fictitious assets object are as follows:
Ψ=W+D (W-B).
The core processing module estimates the turnover of fictitious assets object according to assessment weight are as follows:
The present invention assesses the potential value of fictitious assets object by confidence interval method combination credit rating, breaches tradition
Estimation method measures the bottleneck of value of rights only with funds amount.
The independent point account specifically includes:
(5.1) the available property volume f of the terminal module under different alliance's chain j is inquiredL, j;L is under same alliance's chain
Terminal module label, l=1,2,3 ... n, n≤m,
(5.2) it calculates each node under alliance's chain and divides account volume Fl:
(5.3) F that core processing module will calculatelIt is respectively sent to corresponding terminal module.
The function of the independent point account is calculated by core processing module to be supplied to node itself and needs the book amount born,
The effective protection information of other nodes, has been provided simultaneously with cloud computing and assesses a point function for account volume in real time.
The method of the terminal module response fund-raising purchase scheme are as follows:
(6.1) numbering the terminal module in alliance's chain one by one is 1,2,3 ... n;It is begun to respond to from No. 1 terminal module, such as
Fruit No. 1 terminal module response, as agrees to fund-raising purchase scheme, otherwise to disagree fund-raising purchase scheme;
(6.2) statistics agrees to the terminal module number a of fund-raising purchase and disagrees the terminal module number b of fund-raising purchase, distich
In alliance's chain all terminal modules re-start number i.e. agree to fund-raising purchase terminal module number be 1,2,3 ... a;Disagree collection
The terminal module number of money purchase is b, b+1, b+2 ... n;
(6.2) readjust fund-raising purchase scheme, at this time divide account volume adjust are as follows:
(6.3) F that will be recalculated tolIt is respectively sent to the corresponding terminal module for agreeing to fund-raising purchase;
(6.4) core processing module inquiry agrees to whether the terminal module of fund-raising purchase agrees to new independent point account scheme;
Purchase of raising funds if all terminal modules respond core processing module terminates, by corresponding point of account volume from the terminal module of response
It draws in account and pays fictitious assets owner;It is re-execute the steps if thering is terminal module not respond core processing module
(6.2)。
This fund-raising purchase scheme carries out node type fund-raising purchase using cloud endless form, mentions for alliance's chain trade virtual assets
A new prediction scheme is supplied, the member of alliance's chain can rationally share trading dividend according to investment amount, novel and can have
Effect solves the problems, such as that patent transaction audient face is small.
The above method integrally combines, system and effectively to propose a kind of confidence level high, it is empty under the high block chain of serious forgiveness
The method of quasi- assets credit value assessment.Here it must be noted that other unaccounted technologies that the present invention provides are because all
It is techniques known, title or function according to the present invention, those skilled in the art can find related note
The document of load, therefore be not described further.The technical means disclosed in the embodiments of the present invention is not limited only to above embodiment institute
Disclosed technological means, also includes technical solutions formed by any combination of the above technical features.
Claims (9)
1. fictitious assets credit worthiness evaluation method under a kind of block chain, block catenary system includes core processing module, forms not
Terminal module, super account book administration module with alliance's chain, client software too development, which is characterized in that including walking as follows
It is rapid:
(1) client software too development module proposes authentication and inquiry request, super account to super account book administration module
This administration module judges client software too development module body according to the level-one certification certificate in authentication and inquiry request
Part, if the client software too development module of this block chain authorization, then pass through after authenticating to client software too development
Module provides public spoon and enters step (2);Otherwise, super account book administration module enters suspend mode;
(2) according to the address in public spoon, all terminal modules into block chain propose virtual money to client software too development module
Produce the credit evaluation request and value assessment request of object;
(3) terminal module requests to extract all of fictitious assets object according to credit evaluation request and value assessment after identifying public spoon
Data carry out credit scoring and value scoring, and credit scoring and value score data are reported and submitted to core processing module;
(4) core processing module integrates the credit scoring of all terminal modules and value score data to obtain final appraisal right
Value;
(5) core processing module estimates the turnover of fictitious assets object according to assessment weight, while according under different alliance's chains
The real property Backup Data of terminal module turnover is allocated and independent point account, and a point account information data is sent out respectively
It gives the client software too development module for proposing assessment request and proposes simple transaction scheme and fund-raising purchase-transaction scheme;
(6) propose that the client software too development module of assessment request adjusts trading scheme according to the core processing module received
It reports and submits to core processing module, scheme is reported and submitted into region chain all terminal modules that terminal module is waited to ring by core processing module
It should and execute simple transaction scheme or fund-raising purchase-transaction scheme.
2. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, it is characterised in that: described
The generation method of first class certificate of client software too development include the following steps: core processing module to client software
The database of too development module sends four table composition level-ones and authenticates certificate, is user's table, login certificate table, transaction card respectively
Book table and channel table;User's table records user basic information, including ID and password when user's registration, registration type, and token is enabled
Board, institutional affiliation and registion time;Login certificate table records the corresponding relationship of client software too development module and user,
Including certificate ID, User ID, the CA of the certificate authority, the state of CertPubKey and current certificate;Certificate of fair table stores
All Activity certificate in system, to guarantee that the certificate of fair that user uses is to forge.Including certificate ID, the certificate authority
Unlike CA, the state of CertPubKey and current certificate, certificate of fair table and login certificate table, it does not include User ID
Information avoids database from causing user information to be revealed by attack;Channel table records the specific information about firms in each channel, it is wrapped
Include channel ID, Channels user, channel creation time.
3. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, it is characterised in that: described
Super account book administration module include a super account book supervision client and a super account book policing services end, super account book
Administration module is supplied to the public spoon of client software too development module, comprising: the initialization of super account book policing services end;It is super
The starting service of account book policing services end receives level-one and authenticates certificate information;Super account book supervises client and supervises clothes to super account book
The request registration of business end;Super account book policing services end returns to the certificate of registration to super account book supervision client;Super account book supervision
Client requests register node to super account book policing services end;Client is supervised to super account book in super account book policing services end
Return node registration information result;Super account book, which supervises client, requests registered nodes to super account book policing services end;It is super
Account book policing services end generates signed data, is stored in the database of client software too development module;Super account book supervision clothes
Business end returns to enrollment results to client;Super account book supervision client and super account book policing services end using network request into
Row communication, super account book supervision client, which is responsible for sending to server-side, requests, and super account book policing services end, which receives and processes, to be come
From the request of super account book supervision client, and return to the super account book supervision corresponding response bag of client;It is soft in client
In part too development module logging request, super account book supervision client sends the ID of client software too development Module registers
And password, super account book policing services end receive and parse through the request, and it is corresponding to generate the client software too development module
Public spoon;In client software too development module request public affairs spoon, client software too development module need to provide oneself
Identity ID, super account book supervision client replace user to be issued super account book policing services end, super account book policing services
Corresponding identity ID is extracted at end from the token token of user's table, and is inquired corresponding public spoon in the database and returned to
Client software too development module.
4. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, which is characterized in that described
Fictitious assets object be stored in the database or self contained data base of core processing module, the assessment of the credit scoring
Include the following steps:
(3.1) prediction credit worthiness M (x, the x of fictitious assets object are assessedi'):
Wherein m terminal module is x to the prediction loss late of fictitious assets objecti', (1,2,3 ... m), and x is fictitious assets visitor by i ∈
The average loss rate in field described in body;
(3.2) norm for assessing fictitious assets object loses A (x, xi'):
(3.3) variation risk E (x, the x of fictitious assets object are assessedi'):
Var is venture worth;
(3.4) fictitious assets object weight coefficient R (x, x really are calculatedi'):
(3.5) true credit value, that is, credit scoring D of fictitious assets object is assessed:
The credit scoring of fictitious assets object, the smaller fictitious assets object for illustrating transaction of credit scoring are assessed by the size of D
Risk factor it is higher.
5. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, which is characterized in that described
Fictitious assets object be stored in the database or self contained data base of core processing module, the assessment of the described value scoring
Step includes:
(4.1) evaluated fictitious assets object and the financial index Y of obligee are inquiredn, n=1,2,3, wherein Y1For evaluated void
The liquidity ratio of quasi- assets object, Y2For the turnover of total assets for being evaluated fictitious assets object obligee, Y1It is evaluated virtual
The object net profit on sales rate of the patentee of assets object;
(4.2) the regulation coefficient S of evaluated fictitious assets object financial index is calculatedi;
S1=(Y1-q1)/q1;S2=(Y2-q2)/q2;S3=(Y3-q3)/q3;
q1It is Y1Ratio regulation coefficient;q2It is Y2Ratio regulation coefficient;q3It is Y3Ratio regulation coefficient;
(4.3) the weighting regulation coefficient Q of evaluated fictitious assets object is calculated:
Q=1+S1Y1+S2Y2+S3Y3;
(4.4) the average value W for transferring the patent value of the industry where fictitious assets object obtains evaluated fictitious assets object
Value multiplier T,
T=WQ;
(4.5) all terminal modules are transferred to the assessed value z of the value of evaluated fictitious assets objecti, calculate fictitious assets object
Value score B:
The value scoring of fictitious assets object, the smaller fictitious assets object for illustrating transaction of value scoring are assessed by the size of B
Risk factor it is higher.
6. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, it is characterised in that: described
Fictitious assets object assessment weight Ψ are as follows:
Ψ=W+D (W-B).
7. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, which is characterized in that described
Core processing module according to assessment weight estimation fictitious assets object turnover are as follows:
8. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, which is characterized in that described
An independent point account specifically include:
(5.1) the available property volume f of the terminal module under different alliance's chain j is inquiredl,j;L is the end under same alliance's chain
The label of end module, l=1,2,3 ... n, n≤m,
(5.2) it calculates each node under alliance's chain and divides account volume Fl:
(5.3) F that core processing module will calculatelIt is respectively sent to corresponding terminal module.
9. fictitious assets credit worthiness evaluation method under a kind of block chain according to claim 1, which is characterized in that described
Terminal module response fund-raising purchase scheme method are as follows:
(6.1) numbering the terminal module in alliance's chain one by one is 1,2,3 ... n;It is begun to respond to from No. 1 terminal module, if No. 1
Terminal module response as agrees to fund-raising purchase scheme, otherwise to disagree fund-raising purchase scheme;
(6.2) statistics agrees to the terminal module number a of fund-raising purchase and disagrees the terminal module number b of fund-raising purchase, to alliance's chain
In all terminal modules re-start number i.e. agree to fund-raising purchase terminal module number be 1,2,3 ... a;Disagree fund-raising purchase
The terminal module number bought is b, b+1, b+2 ... n;
(6.2) readjust fund-raising purchase scheme, at this time divide account volume adjust are as follows:
(6.3) F that will be recalculated tolIt is respectively sent to the corresponding terminal module for agreeing to fund-raising purchase;
(6.4) core processing module inquiry agrees to whether the terminal module of fund-raising purchase agrees to new independent point account scheme;If institute
There is the purchase of then raising funds of terminal module response core processing module to terminate, by corresponding point of account volume from the account of the terminal module of response
In draw walk and pay fictitious assets owner;It is re-execute the steps if thering is terminal module not respond core processing module
(6.2)。
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811121715.7A CN109255610A (en) | 2018-09-26 | 2018-09-26 | A kind of value assessment method of fictitious assets under internet block chain environment |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811121715.7A CN109255610A (en) | 2018-09-26 | 2018-09-26 | A kind of value assessment method of fictitious assets under internet block chain environment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109255610A true CN109255610A (en) | 2019-01-22 |
Family
ID=65047075
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811121715.7A Withdrawn CN109255610A (en) | 2018-09-26 | 2018-09-26 | A kind of value assessment method of fictitious assets under internet block chain environment |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109255610A (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110555682A (en) * | 2019-09-10 | 2019-12-10 | 苏州阿尔山数字科技有限公司 | multi-channel implementation method based on alliance chain |
CN110941668A (en) * | 2019-11-08 | 2020-03-31 | 中国电子科技网络信息安全有限公司 | Block chain-based unified identity management and authentication method |
CN111046078A (en) * | 2019-11-11 | 2020-04-21 | 北京海益同展信息科技有限公司 | Block chain-based credit investigation query method and device and electronic equipment |
CN112068962A (en) * | 2020-09-14 | 2020-12-11 | 江苏赞奇科技股份有限公司 | Cloud rendering resource exchange method based on deep learning |
CN112910085A (en) * | 2021-01-18 | 2021-06-04 | 国网福建省电力有限公司 | Power utilization acquisition method based on low-voltage grid type block chain |
CN114723200A (en) * | 2021-01-05 | 2022-07-08 | 中国移动通信有限公司研究院 | Data value evaluation method and device |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104252674A (en) * | 2014-09-04 | 2014-12-31 | 天津大学 | Elliptic curve cipher-based self-authentication mechanism mobile phone trading method |
CN106097073A (en) * | 2016-06-20 | 2016-11-09 | 深圳市淘淘谷信息技术有限公司 | A kind of block chain gives the method for the numeral exclusive ID of account trading process |
CN107085807A (en) * | 2017-04-19 | 2017-08-22 | 迅鳐成都科技有限公司 | A kind of data assets method of commerce based on block chain |
-
2018
- 2018-09-26 CN CN201811121715.7A patent/CN109255610A/en not_active Withdrawn
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104252674A (en) * | 2014-09-04 | 2014-12-31 | 天津大学 | Elliptic curve cipher-based self-authentication mechanism mobile phone trading method |
CN106097073A (en) * | 2016-06-20 | 2016-11-09 | 深圳市淘淘谷信息技术有限公司 | A kind of block chain gives the method for the numeral exclusive ID of account trading process |
CN107085807A (en) * | 2017-04-19 | 2017-08-22 | 迅鳐成都科技有限公司 | A kind of data assets method of commerce based on block chain |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110555682A (en) * | 2019-09-10 | 2019-12-10 | 苏州阿尔山数字科技有限公司 | multi-channel implementation method based on alliance chain |
CN110555682B (en) * | 2019-09-10 | 2023-04-07 | 苏州阿尔山数字科技有限公司 | Multi-channel implementation method based on alliance chain |
CN110941668A (en) * | 2019-11-08 | 2020-03-31 | 中国电子科技网络信息安全有限公司 | Block chain-based unified identity management and authentication method |
CN110941668B (en) * | 2019-11-08 | 2022-09-16 | 中国电子科技网络信息安全有限公司 | Block chain-based unified identity management and authentication method |
CN111046078A (en) * | 2019-11-11 | 2020-04-21 | 北京海益同展信息科技有限公司 | Block chain-based credit investigation query method and device and electronic equipment |
CN111046078B (en) * | 2019-11-11 | 2023-09-05 | 京东科技信息技术有限公司 | Credit investigation method and device based on block chain and electronic equipment |
CN112068962A (en) * | 2020-09-14 | 2020-12-11 | 江苏赞奇科技股份有限公司 | Cloud rendering resource exchange method based on deep learning |
CN114723200A (en) * | 2021-01-05 | 2022-07-08 | 中国移动通信有限公司研究院 | Data value evaluation method and device |
CN112910085A (en) * | 2021-01-18 | 2021-06-04 | 国网福建省电力有限公司 | Power utilization acquisition method based on low-voltage grid type block chain |
CN112910085B (en) * | 2021-01-18 | 2023-01-31 | 国网福建省电力有限公司 | Power utilization acquisition method based on low-voltage grid type block chain |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109255610A (en) | A kind of value assessment method of fictitious assets under internet block chain environment | |
ur Rehman et al. | Trust in blockchain cryptocurrency ecosystem | |
CN109242487A (en) | A kind of value assessment method of internet block chain environment lower network domain name | |
CN108764993A (en) | A kind of store promotional system based on block chain | |
Thakker et al. | Blockchain for diamond industry: Opportunities and challenges | |
ElMessiry et al. | Dual Token Blockchain Economy Framework: The Garment Use Case | |
Adesola et al. | Impact of information and communications technology on Nigerian banks operations: A study of United Bank for Africa (UBA) Plc | |
WO2021075057A1 (en) | Digital currency operation system and operation method using fully homological encryption scheme | |
CN107093142A (en) | Legal tender bond and assets management method in a kind of Quantum Chain | |
Hu et al. | Cross‐Border E‐Commerce Business Model Based on Big Data and Blockchain | |
Abuselidze et al. | The gravity of cryptocurrency and prospects in a post-pandemic economy | |
Nami | E-banking: Issues and challenges | |
CN110956345A (en) | Value evaluation method for electronic commerce and enterprise brands in Internet block chain environment | |
Boyko et al. | Patterns of financial crimes using cryptocurrencies | |
Sofyan et al. | The Strategy of Rural Bank in the Face of the Industrial Era 4.0 | |
Ekong et al. | Does cryptocurrency transactions benefit ICT businesses in Uyo metropolis: Evidence from a field survey | |
Su | Analysis of Cryptocurrency and Its Combination with Quantitative Transactions | |
Marecki et al. | Cryptocurrency market of bitcoin and payment acceptability in E-commerce | |
Canepa et al. | NFTs and Crypto Art Marketplaces: New Risks for Investors and Financial Markets? | |
Mendes-Da-Silva | Introduction: The Context of Financial Innovations | |
Nakatani et al. | Crypto-currencies: from the fetishism of Gold to Hayek Gold | |
Tartan | A Blockchain-Based Welfare Distribution Model for Digital Inclusivity | |
Yuqing et al. | The Research on Online Consumer Finance Innovation Drives by Financial Technology | |
Wei | Cryptocurrency: Using Dark Markets to Shine Light on the Propriety of Regulation | |
Howell et al. | Open-Source or Open-Slather? Governing Blockchain Applications as Common-Pool Resources |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WW01 | Invention patent application withdrawn after publication | ||
WW01 | Invention patent application withdrawn after publication |
Application publication date: 20190122 |