CN110096905B - Method and device for encrypting trusted assets by adopting block chain technology and electronic equipment - Google Patents

Method and device for encrypting trusted assets by adopting block chain technology and electronic equipment Download PDF

Info

Publication number
CN110096905B
CN110096905B CN201910352067.4A CN201910352067A CN110096905B CN 110096905 B CN110096905 B CN 110096905B CN 201910352067 A CN201910352067 A CN 201910352067A CN 110096905 B CN110096905 B CN 110096905B
Authority
CN
China
Prior art keywords
asset
transaction
escrow
party
hosting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910352067.4A
Other languages
Chinese (zh)
Other versions
CN110096905A (en
Inventor
万涔涔
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Rivtower Technology Co Ltd
Original Assignee
Cryptape Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Cryptape Co ltd filed Critical Cryptape Co ltd
Priority to CN201910352067.4A priority Critical patent/CN110096905B/en
Publication of CN110096905A publication Critical patent/CN110096905A/en
Application granted granted Critical
Publication of CN110096905B publication Critical patent/CN110096905B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Development Economics (AREA)
  • Physics & Mathematics (AREA)
  • Technology Law (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Human Resources & Organizations (AREA)
  • Operations Research (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Compositions Of Macromolecular Compounds (AREA)

Abstract

The invention discloses a method, a device, electronic equipment and a computer-readable storage medium for encrypting trusted assets by adopting a block chain technology. The method comprises the following steps of selecting or creating a block chain supporting intelligent contracts as an asset hosting chain; the method comprises the following steps of asset escrow registration, wherein an entrusting party uses a private key signature to generate an escrow transaction on an encrypted asset chain and broadcasts the escrow transaction; and asset transaction, wherein the asset hosting contract matches the hosted assets according to a hosting strategy set by the entrusting party and generates and broadcasts two proposed transactions on the asset hosting chain, the two proposed transactions are used for realizing encrypted asset replacement in different entrusting party accounts, the corresponding entrusting party signs the proposed transactions and broadcasts on the asset hosting chain, and after receiving the two proposed transactions signed by the entrusting party, the asset hosting contract attaches the signatures of the entrusted parties respectively and broadcasts on the corresponding encrypted asset chains.

Description

Method and device for encrypting trusted assets by adopting block chain technology and electronic equipment
Technical Field
The invention belongs to the technical field of block chains, and particularly relates to a method and a device for encrypting trusted assets by adopting a block chain technology, electronic equipment and a computer-readable storage medium.
Background
The trust system originates from a legal concept of the English-American law, which means that a principal transfers property rights to a trustee, and the trustee manages or punishs trust properties for beneficiaries or for specific purposes according to the provisions of trust documents and gives profits of the managed or punishment properties to the beneficiaries. After the second war, the trust system has been approved and adopted by many continental legislative countries with the advantages of great flexibility and practicability, for example, japan and korea have successively established their trust laws. China also issued the "Ministry of people's republic of China" in 2001.
The trust system is an important component of modern financial system, and is also a modern enterprise system, such as system cornerstone of limited liability, company, limited partnership and fund. It can be said that there is no trust, and there is no active market economy. With the explosion of encrypted assets today, more and more individuals and organizations tend to hold and operate encrypted assets.
Based on the background and the demand, the formation of a market for encrypted trusted assets by adopting a block chain technology is promoted. In particular, some people wish to hold encrypted assets, but do not bear the burden of managing private keys; some people want to entrust others to engage in investment and transaction business of encrypted assets, but want to fully know each record of investment and reliable accounting basis; some people wish to be entrusted with others engaging in investment and trading business, but undertake limited liability for protection, and so on.
Disclosure of Invention
In view of the above, the present invention is directed to a method, apparatus, electronic device and computer-readable storage medium for encrypting a trusted asset using a blockchain technique, which can achieve independent, flexible, integrity, reliability and completeness property of entrustment of the trusted asset.
In order to solve the technical problems, the invention adopts the following technical scheme:
in a first aspect, an embodiment of the present application provides a method for encrypting asset hosting by using a blockchain technique, including the following steps:
selecting or creating a block chain supporting intelligent contracts as an asset hosting chain, wherein the asset hosting chain is provided with SPV contracts and asset hosting contracts used for processing the intelligent hosting of the assets, the SPV contracts are used for tracking encrypted assets, storing block head histories of the encrypted asset chains and providing SPV verification services;
the method comprises the following steps of asset escrow registration, wherein an entrusting party uses a private key signature to generate an escrow transaction on an encrypted asset chain and broadcasts the escrow transaction; the asset hosting contract processes the hosting transaction and invokes a corresponding SPV contract for validation; if the verification is passed, adding the escrow transaction into an escrow asset list of the trusting party account, and if the verification is not passed, the escrow transaction fails to be registered;
the assets are traded, the asset hosting contracts are matched with the hosted assets according to the hosting strategies set by the entrusting party, and generates and broadcasts two proposed transactions over the asset hosting chain, the two proposed transactions being used to implement the encrypted asset permutations in different principal accounts, the corresponding entrusting party signs the proposed transaction and broadcasts the signed proposal transaction on the asset hosting chain, the asset hosting contract respectively attaches the signatures of the entrusted parties after receiving the two proposed transactions signed by the entrusting party, and broadcast on the corresponding encrypted asset chain, the proposed transaction is added into the escrow asset list of the corresponding consignor account by the asset escrow contract after being confirmed by the belonging encrypted asset chain, and removing the traded escrow transaction from the escrow asset list, wherein if the asset escrow contract does not keep up with two proposed transactions signed by the principal within a certain time, the asset transaction will fail.
In a possible design of the first aspect, the escrow transaction is set using a UTXO model, and a lock script of the UTXO to be escrowed for the transaction should satisfy the following condition: before the set height is not reached, the UTXO can be spent by any two parties of the entrusting party, the entrusted party or the monitoring party for signature confirmation; after the set altitude is reached, the client's signature can cost the UTXO.
Correspondingly, the proposed transaction is set by using a UTXO model, the transaction input of the proposed transaction points to the corresponding UTXO corresponding to the managed transaction, and the locking script output by the transaction meets the following conditions: the UTXO can be spent only by signature confirmation of any two parties of an entrusting party, a trustee or a supervising party of the transaction opponent before the set height is not reached, and the UTXO can be spent by signature of the entrusting party of the transaction opponent after the set height is reached.
In another possible design of the first aspect, the escrow transaction is set by using an Account model, the escrow amount of the escrow transaction is to be frozen, and the transaction freezing of the encrypted asset needs to satisfy the following conditions: the balance of the account of the entrusting party is not less than the total amount of the funds in the frozen state, and any two parties of the entrusting party, the entrusted party or the supervising party can unfreeze and spend the funds which are not more than the amount of the escrow before the set height is not reached; after a certain height is reached, the corresponding escrow funds frozen by the user principal account are thawed.
Correspondingly, the proposed transaction is set by adopting an Account model, the transaction input amount is the escrow amount of the corresponding escrow transaction, the escrow amount output by the transaction is frozen, and the transaction freezing of the encrypted asset needs to meet the following conditions: before the set height is not reached, any two parties of the trustee, the trustee or the supervisor of the counterparty carry out signature confirmation to unfreeze and spend funds which are not higher than the escrow amount of the counterparty; after reaching a certain height, the corresponding escrow funds frozen by the counterparty are thawed.
In one possible design of the first aspect, contracts, maintained by a third party, that record the latest exchange rates of various encrypted assets are further deployed on the asset hosting chain.
In a second aspect, an embodiment of the present application provides an apparatus for encrypting asset hosting using a blockchain technique, including:
the system comprises a selecting or creating module, a verification module and a verification module, wherein the selecting or creating module is used for selecting or creating a block chain supporting intelligent contracts as an asset hosting chain, and SPV contracts and asset hosting contracts used for processing the intelligent hosting of assets are deployed on the asset hosting chain, wherein the SPV contracts are used for tracking encrypted assets, storing block head histories of the encrypted asset chains and providing SPV verification services;
the asset escrow registration module is used for generating an escrow transaction by using a private key signature on the encrypted asset chain by a trusting party and broadcasting the escrow transaction; the asset hosting contract processes the hosting transaction and invokes a corresponding SPV contract for validation; if the verification is passed, adding the escrow transaction into an escrow asset list of the trusting party account, and if the verification is not passed, the escrow transaction fails to be registered;
an asset transaction module for an asset hosting contract to match a hosted asset according to a hosting policy set by a principal, and generates and broadcasts two proposed transactions over the asset hosting chain, the two proposed transactions being used to implement the encrypted asset permutations in different principal accounts, the corresponding entrusting party signs the proposed transaction and broadcasts the signed proposal transaction on the asset hosting chain, the asset hosting contract respectively attaches the signatures of the entrusted parties after receiving two proposed transactions signed by the entrusting party, and broadcast on the corresponding encrypted asset chain, the proposed transaction is added into the escrow asset list of the corresponding trusting party account by the asset escrow contract after being confirmed by the belonging encrypted asset chain, and removing the traded escrow transaction from the escrow asset list, wherein if the asset escrow contract does not have two proposed transactions signed by the principal in good agreement within a certain time, the two proposed transactions are invalid.
In one possible design of the second aspect, the managed transaction is set by using a UTXO model, and a lock script of the UTXO managed transaction should satisfy the following condition: before the set height is not reached, the UTXO can be spent only by signature confirmation of any two parties of the entrusting party, the entrusted party or the monitoring party; after the set altitude is reached, the client's signature can cost the UTXO.
Correspondingly, the proposed transaction is set by using a UTXO model, the transaction input of the proposed transaction points to the UTXO corresponding to the managed transaction, and the locking script output by the transaction meets the following conditions: the UTXO can be spent only by signature confirmation of any two parties of an entrusting party, a trustee or a supervising party of the transaction opponent before the set height is not reached, and the UTXO can be spent by signature of the entrusting party of the transaction opponent after the set height is reached.
In another possible design of the second aspect, the escrow transaction is set by using an Account model, an escrow amount of the escrow transaction is frozen, and the transaction freezing of the encrypted asset needs to satisfy the following conditions: the balance of the account of the entrusting party is not less than the total amount of the funds in the frozen state, and any two parties of the entrusting party, the entrusted party or the supervising party can unfreeze and spend the funds which are not more than the amount of the escrow before the set height is not reached; after reaching a certain height, the corresponding escrow funds frozen by the escrow account are thawed.
Correspondingly, the proposed transaction is set by adopting an Account model, the transaction input amount is the escrow amount of the corresponding escrow transaction, the escrow amount output by the transaction is frozen, and the transaction freezing of the encrypted asset needs to meet the following conditions: before the set height is not reached, any two parties of the trustee, the trustee or the supervisor of the counterparty carry out signature confirmation to unfreeze and spend funds which are not higher than the escrow amount of the counterparty; after reaching a certain height, the corresponding escrow funds frozen by the counterparty are thawed.
In one possible design of the second aspect, contracts, maintained by third parties, that record the latest exchange rates of various encrypted assets are further deployed on the asset hosting chain.
In a third aspect, an embodiment of the present application provides an electronic device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the computer program is executed by the processor to perform the above method for encrypting asset hosting by using a block chain technique.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program is executed by a processor to implement the method for encrypting asset hosting by using a block chain technique described above.
The invention has the following beneficial effects:
(1) the method has independence, realizes management of encrypted assets on a block chain, and is not independently controlled by a client, a beneficiary and any other third party;
(2) the method has flexibility, and under the mechanism, the block chain can simultaneously hold various encrypted assets with different types, including homogeneous and heterogeneous encrypted assets;
(3) the system has integrity, can completely record the processes of mutual conversion and transaction of various encrypted assets and expenditure of each charge, complete most of automatic accounting and bookkeeping activities of operation, maintain the integrity of the trusting encrypted assets and provide a basis for tax payment;
(4) the system has reliability, can accept and execute the transaction and payment instruction of the trustee which accords with the content agreed in advance, and refuses to execute the transaction and payment instruction of the trustee which does not accord with the content agreed in advance;
(5) the system has completeness, can perform intelligent contract operation so as to provide support for a plurality of necessary decisions, such as conditional automatic clearing execution, extraction of management fees and transaction related fees and the like; and the related intelligent contract operation of liability and guarantee can be supported.
Drawings
FIG. 1 is a schematic flow chart diagram of a method for encrypting a trusted asset using blockchain techniques according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of an electronic device according to an embodiment of the invention;
fig. 3 is a schematic diagram of an apparatus for encrypting a trusted asset using a blockchain technique according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1, an embodiment of the present invention discloses a method for encrypting a trusted asset by using a block chain technique, including the following steps:
and S10, selecting or creating a blockchain supporting the intelligent contract as an asset hosting chain, wherein the asset hosting chain is deployed with an SPV (simple Payment Verification) contract and an asset hosting contract for processing the asset intelligent hosting, and the SPV contract is used for tracking the encrypted asset, storing the blockhead history of the encrypted asset chain and providing SPV Verification service.
According to step S10, the asset hosting chain set by the blockchain technology may be used to host encrypted assets on various encrypted asset chains through an asset hosting contract, and the tracking and verification of the encrypted hosted assets may be realized through an SPV contract, so as to ensure the security and the historical transaction traceability of the hosted assets.
In other application examples, contracts which are maintained by a third party and record the latest exchange rate of various encrypted assets can be further deployed on the asset hosting chain. The asset hosting contract selects the exchange rate contract maintained by the third party as an accounting basis and can be used for accounting the digital assets of the consignor.
S20, the asset hosting registration, the entrusting party uses the private key signature to generate a hosting transaction on the encrypted asset chain, and broadcasts the hosting transaction; the asset hosting contract processes the hosting transaction and calls a corresponding SPV contract for verification; if the verification is passed, the escrow transaction is added to an escrow asset list of the principal account, and if the verification is not passed, the escrow transaction fails to register.
The asset escrow registration is a process that an entrusting party registers an asset to be transacted on an encrypted asset chain, generates an escrow transaction and adds the escrow transaction to an escrow asset list of an account of the entrusting party. Before asset hosting registration, the entrusting party should have a registered account number on the asset hosting contract, and if the registered account number is not available, the account number needs to be registered first.
After asset hosting registration, the asset hosting dating makes transaction matches according to the hosted asset lists registered by different consignor accounts. Proceeding to S30, the asset is traded, the asset hosting contract matches the hosted asset according to a hosting policy set by the principal, and two proposed transactions are generated and broadcast on the asset hosting chain, the two proposed transactions being used to implement encrypted asset replacement in different principal accounts, the corresponding entrusting party signs the proposed transaction and broadcasts on the asset hosting chain, the asset hosting chain attaches the signature of the entrusted party after receiving two proposed transactions signed by the entrusting party, and broadcast on the corresponding encrypted asset chain, the proposed transaction is added into the escrow asset list of the corresponding trusting party account by the asset escrow contract after being confirmed by the belonging encrypted asset chain, and removing the traded escrow transaction from the escrow asset list, wherein if the asset escrow contract does not have two proposed transactions signed by the principal in good agreement within a certain time, the two proposed transactions are invalid.
In step S30, the asset hosting contract tracks the hosting policies preset by each consignor, the accounting price is not lower than a certain proportion when trading and exchanging assets, the asset management fee is based on the performance rating rate, and after matching the hosting trades meeting the hosting policies, the asset management fee timely generates and broadcasts suggested trades on the hosting asset chain, so that the hosting trades meeting the requirements can be efficiently transacted. A common signature of the entrusting party and the entrusted party is required during the transaction because the entrusted party has the advising and partial signing rights to operate the entrusted asset but cannot have ownership of the entrusted asset, whereas if only the entrusted party's signature allows the transaction to be effected, the entrusting party's asset operation is not controllable. Of course, it will be understood by those skilled in the art that it may also be a common signature of one neutral supervisor trusted by both the trusted party and the trusted party.
In the implementation process of the current block chain technology, there are two record storage manners, i.e., an un-spent Transaction Output (UTXO) mode and an Account mode, so that in the specific application example of the present invention, the managed Transaction and the proposed Transaction respectively adopt the UTXO model and the Account model, which are described in detail below.
In one specific application example of the present application, in the UXTO mode, in step S20, the managed transaction is set by using the UTXO model, and the lock script of the UTXO to be managed transaction should satisfy the following conditions: before the set height is not reached, the UTXO can be spent only by signature confirmation of any two parties of the entrusting party, the entrusted party or the monitoring party; after the set altitude is reached, the client's signature can cost the UTXO. In step S30, the proposed transaction is also set using the UTXO model, the transaction input of which points to the corresponding UTXO corresponding to the escrow transaction, and the lock script output by the transaction should satisfy the following conditions: the UTXO can be spent only by signature confirmation of any two parties of an entrusting party, a trustee or a supervising party of the transaction opponent before the set height is not reached, and the UTXO can be spent by signature of the entrusting party of the transaction opponent after the set height is reached. The reason for setting the height limit is that the escrow essentially refers the principal to give the principal the management right of the funds to the consignee for a period of time, and the setting of the period of time corresponds to the setting of the height in the block chain (before the expiration height), and the consignee has the right to manage the funds.
In another specific application example of the present application, in the Account mode, in step S20, the escrow transaction is set by using an Account model, the escrow amount of the escrow transaction is frozen, and the transaction freezing of the encrypted asset needs to satisfy the following conditions: the balance of the account of the entrusting party is not less than the total amount of the funds in the frozen state, and any two parties of the entrusting party, the entrusted party or the supervising party can unfreeze and spend the funds which are not more than the amount of the escrow before the set height is not reached; after reaching a certain height, the corresponding escrow funds frozen by the escrow account are thawed. In step S30, the proposed transaction is set using Account model, the transaction input amount is the escrow amount of the corresponding escrow transaction, the escrow amount output by the transaction is frozen, and the transaction freezing of the encrypted asset needs to satisfy the following conditions: before the set height is not reached, any two parties of the trustee, the trustee or the supervisor of the counterparty carry out signature confirmation to unfreeze and spend funds which are not higher than the escrow amount of the counterparty; after reaching a certain height, the corresponding escrow funds frozen by the counterparty are thawed.
The electronic device of the embodiment of the present invention is described in detail below with reference to fig. 2. On a hardware level, the electronic device includes a processor, and optionally an internal bus, a network interface, and a memory. The Memory may include a Memory, such as a Random-Access Memory (RAM), and may further include a Non-Volatile Memory (NVM), such as at least one disk Memory. Of course, the electronic device may also include hardware required for other services.
The processor, the network interface, and the memory may be interconnected by an internal bus, which may be an Industry Standard Architecture (ISA) bus, a Peripheral Component Interconnect (PCI) bus, an Extended ISA (EISA) bus, or the like. Wherein the bus can be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one double-headed arrow is shown in FIG. 2, but this does not represent only one bus or one type of bus.
The memory for storing the program, in particular, the program may include program code including computer operating instructions, the memory may include memory and non-volatile storage, and provide instructions and data to the processor.
The processor reads the corresponding computer program from the nonvolatile memory into the memory and then runs the computer program to form the content recommendation device on a logic level. And the processor is used for executing the program stored in the memory and is specifically used for executing the method operation executed when the server is taken as an execution main body.
The method for encrypting a trusted asset using block chain technology as described above in the embodiment of the present invention illustrated in fig. 1 may be applied to or implemented by a processor. The processor may be an integrated circuit chip having signal processing capabilities. In implementation, the steps of the above method may be performed by integrated logic circuits of hardware in a processor or instructions in the form of software. The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), etc., and may also be a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, a discrete Gate or transistor logic device, or a discrete hardware component. The various methods, steps and logic blocks disclosed in embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. The steps of the method disclosed in connection with the embodiments of the present invention may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in a decoder. The software module may be located in ram, flash memory, rom, prom, or eprom, registers, etc. storage media as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps of the method in combination with hardware of the processor.
Of course, the electronic device in the embodiment of the present specification does not exclude other implementations, such as a logic device or a combination of software and hardware, besides a software implementation, that is, the execution subject of the following processing flow is not limited to each logic unit, and may be hardware or a logic device.
Embodiments of the present invention also provide a computer-readable storage medium storing one or more programs that, when executed by an electronic device including a plurality of application programs, cause the electronic device to perform operations comprising:
selecting or creating a block chain supporting intelligent contracts as an asset hosting chain, wherein the asset hosting chain is provided with SPV contracts and asset hosting contracts used for processing the intelligent hosting of the assets, the SPV contracts are used for tracking encrypted assets, storing block head histories of the encrypted asset chains and providing SPV verification services;
the method comprises the following steps of asset escrow registration, wherein an entrusting party uses a private key signature to generate an escrow transaction on an encrypted asset chain and broadcasts the escrow transaction; the asset hosting contract processes the hosting transaction and invokes a corresponding SPV contract for validation; if the verification is passed, adding the escrow transaction into an escrow asset list of the trusting party account, and if the verification is not passed, the escrow transaction fails to be registered;
asset trading, wherein an asset hosting contract matches a hosted asset according to a hosting policy set by a principal and generates and broadcasts two proposed trades on an asset hosting chain, the two proposed trades being used to implement encrypted asset replacement in different principal accounts, the corresponding entrusting party signs the proposed transaction and broadcasts on the asset hosting chain, the asset hosting chain attaches the signature of the entrusted party after receiving two proposed transactions signed by the entrusting party, and broadcast on the corresponding encrypted asset chain, the proposed transaction is added into the escrow asset list of the corresponding trusting party account by the asset escrow contract after being confirmed by the belonging encrypted asset chain, and removing the traded escrow transaction from the escrow asset list, wherein if the asset escrow contract does not have two proposed transactions signed by the principal in good agreement within a certain time, the two proposed transactions are invalid.
The computer-readable storage medium may be a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk.
Referring to fig. 3, a schematic structural diagram of an apparatus 10 for encrypting a trusted asset using blockchain technology according to another embodiment of the present invention is shown, which includes a selection or creation module 101, an asset hosting registration module 102 and an asset transaction module 103, corresponding to an embodiment of the method of the present invention.
The selection or creation module 101 is configured to select or create a blockchain supporting intelligent contracts as an asset hosting chain, on which SPV contracts and asset hosting contracts for handling intelligent hosting of assets are deployed, wherein the SPV contracts are used for tracking encrypted assets, storing blockhead histories of the encrypted asset chains, and providing SPV verification services.
According to the selection or creation module 101, the asset hosting chain set by using the blockchain technology can host encrypted assets on various encrypted asset chains through the asset hosting contract, and the tracking and verification of the encrypted hosted assets are realized through the SPV contract, so that the security and the historical transaction traceability of the hosted assets are ensured.
In other application examples, contracts which are maintained by a third party and record the latest exchange rate of various encrypted assets can be further deployed on the asset hosting chain. The asset hosting contract selects the exchange rate contract maintained by the third party as an accounting basis and can be used for accounting the digital assets of the consignor.
The asset hosting registration module 102 is used for the entrusting party to generate a hosting transaction on the encrypted asset chain by using a private key signature and broadcast the hosting transaction; the asset hosting contract processes the hosting transaction and invokes a corresponding SPV contract for validation; if the verification is passed, the escrow transaction is added to an escrow asset list of the principal account, and if the verification is not passed, the escrow transaction fails to register.
The asset escrow registration is a process that an entrusting party registers an asset to be transacted on an encrypted asset chain, generates an escrow transaction and adds the escrow transaction to an escrow asset list of an account of the entrusting party. Before asset hosting registration, the entrusting party should have a registered account number on the asset hosting contract, and if the registered account number is not available, the account number needs to be registered first.
After asset hosting registration, the asset hosting dating makes transaction matches according to the hosted asset lists registered by different consignor accounts. Entering into the asset transaction module 103 for processing, the asset hosting contract matches the hosted asset according to the hosting policy set by the principal, and two proposed transactions are generated and broadcast on the asset hosting chain, the two proposed transactions being used to implement encrypted asset replacement in different principal accounts, the corresponding entrusting party signs the proposed transaction and broadcasts on the asset hosting chain, the asset hosting chain attaches the signature of the entrusted party after receiving two proposed transactions signed by the entrusting party, and broadcast on the corresponding encrypted asset chain, the proposed transaction is added into the escrow asset list of the corresponding trusting party account by the asset escrow contract after being confirmed by the belonging encrypted asset chain, and removing the traded escrow transaction from the escrow asset list, wherein if the asset escrow contract does not have two proposed transactions signed by the principal in good agreement within a certain time, the two proposed transactions are invalid.
An asset transaction module 103 for an asset hosting contract matching a hosted asset according to a hosting policy set by a principal, and generates and broadcasts two proposed transactions over the asset hosting chain, the two proposed transactions being used to implement the encrypted asset permutations in different principal accounts, the corresponding entrusting party signs the proposed transaction and broadcasts on the asset hosting chain, the asset hosting chain attaches the signature of the entrusted party after receiving two proposed transactions signed by the entrusting party, and broadcast on the corresponding encrypted asset chain, the proposed transaction is added into the escrow asset list of the corresponding trusting party account by the asset escrow contract after being confirmed by the belonging encrypted asset chain, and removing the traded escrow transaction from the escrow asset list, wherein if the asset escrow contract does not have two proposed transactions signed by the principal in good agreement within a certain time, the two proposed transactions are invalid.
In the asset transaction module, an asset hosting contract tracks a hosting strategy preset by each consignor, the accounting price is not lower than a certain proportion during asset transaction and interchange, the asset management fee is matched with the hosting transaction which is set according to the hosting strategy according to the grading rate of performance and the like for each consignor, and then the suggested transaction is generated and broadcast on a hosting asset chain in time, so that the hosting transaction which is set according to the requirement can be efficiently transacted. A common signature of the entrusting party and the entrusted party is required during the transaction because the entrusted party has the advising and partial signing rights to operate the entrusted asset but cannot have ownership of the entrusted asset, whereas if only the entrusted party's signature allows the transaction to be effected, the entrusting party's asset operation is not controllable. Of course, it will be understood by those skilled in the art that it may also be a common signature of one neutral supervisor trusted by both the trusted party and the trusted party.
In the implementation process of the current block chain technology, there are two record storage manners, i.e., an un-spent Transaction Output (UTXO) mode and an Account mode, so that in the specific application example of the present invention, the managed Transaction and the proposed Transaction respectively adopt the UTXO model and the Account model, which are described in detail below.
In one specific application example of the present application, in the UXTO mode, in the asset hosting registration module 102, the hosted transaction is set by using the UTXO model, and the lock script of the UTXO to be hosted transaction should satisfy the following conditions: before the set height is not reached, the UTXO can be spent only by signature confirmation of any two parties of the entrusting party, the entrusted party or the monitoring party; after the set altitude is reached, the client's signature can cost the UTXO. Correspondingly, in the asset transaction module 103, the proposed transaction is also set by using the UTXO model, the transaction input of the proposed transaction points to the corresponding UTXO corresponding to the managed transaction, and the lock script output by the transaction should satisfy the following conditions: the UTXO can be spent only by signature confirmation of any two parties of an entrusting party, a trustee or a supervising party of the transaction opponent before the set height is not reached, and the UTXO can be spent by signature of the entrusting party of the transaction opponent after the set height is reached. The reason for setting the height limit is that the escrow essentially refers the principal to give the principal the management right of the funds to the consignee for a period of time, and the setting of the period of time corresponds to the setting of the height in the block chain (before the expiration height), and the consignee has the right to manage the funds.
In another specific application example of the present application, in the Account mode, in the asset escrow registration module 102, the escrow transaction is set by the Account model, the escrow amount of the escrow transaction is frozen, and the transaction freezing of the encrypted asset needs to satisfy the following conditions: the balance of the account of the entrusting party is not less than the total amount of the funds in the frozen state, and any two parties of the entrusting party, the entrusted party or the supervising party can unfreeze and spend the funds which are not more than the amount of the escrow before the set height is not reached; after reaching a certain height, the corresponding escrow funds frozen by the escrow account are thawed. Correspondingly, in the asset transaction module 103, the proposed transaction is set by using an Account model, the transaction input amount is the escrow amount of the corresponding escrow transaction, the escrow amount output by the transaction is frozen, and the transaction freezing of the encrypted asset needs to satisfy the following conditions: before the set height is not reached, any two parties of the trustee, the trustee or the supervisor of the counterparty carry out signature confirmation to unfreeze and spend funds which are not higher than the escrow amount of the counterparty; after reaching a certain height, the corresponding escrow funds frozen by the counterparty are thawed.
It is to be understood that the exemplary embodiments described herein are illustrative and not restrictive. Although one or more embodiments of the present invention have been described with reference to the accompanying drawings, it will be understood by those of ordinary skill in the art that various changes in form and details may be made therein without departing from the spirit and scope of the present invention as defined by the following claims.

Claims (10)

1. A method for encrypting asset hosting using blockchain techniques, comprising the steps of:
selecting or creating a block chain supporting intelligent contracts as an asset hosting chain, wherein the asset hosting chain is provided with SPV contracts and asset hosting contracts used for processing the intelligent hosting of the assets, the SPV contracts are used for tracking encrypted assets, storing block head histories of the encrypted asset chains and providing SPV verification services;
the method comprises the following steps of asset escrow registration, wherein an entrusting party uses a private key signature to generate an escrow transaction on an encrypted asset chain and broadcasts the escrow transaction; the asset hosting contract processes the hosting transaction and invokes a corresponding SPV contract for validation; if the verification is passed, adding the escrow transaction into an escrow asset list of the trusting party account, and if the verification is not passed, the escrow transaction fails to be registered;
asset transaction, the asset hosting contract matches the hosted asset according to the hosting strategy set by the entrusting party, and generates and broadcasts two proposed transactions on the asset hosting chain, the two proposed transactions are used for realizing encrypted asset replacement in different entrusting party accounts, the corresponding entrusting party signs the proposed transactions and broadcasts on the asset hosting chain, the asset hosting contract attaches the signatures of the entrusted parties respectively after receiving the two proposed transactions signed by the entrusting party and broadcasts on the corresponding encrypted asset chain, the proposed transactions are added into the hosted asset list of the corresponding entrusting party account by the asset hosting contract after being confirmed by the belonging encrypted asset chain, and removes the traded hosted transaction from the hosted asset list, if the asset hosting contract does not collect the two proposed transactions signed by the entrusting party within a certain time, the two proposed transactions are invalid,
the managed transaction is set by adopting a UTXO model, and a locking script of the UTXO of the managed transaction meets the following conditions: before the set height is not reached, the UTXO can be spent only by signature confirmation of any two parties of the entrusting party, the entrusted party or the monitoring party; after reaching the set height, the signature of the client can cost the UTXO,
or the escrow transaction is set by adopting an Account model, the escrow amount of the escrow transaction is frozen, and the transaction freezing requirement of the encrypted asset meets the following conditions: the balance of the account of the entrusting party is not less than the total amount of the funds in the frozen state, and any two parties of the entrusting party, the entrusted party or the supervising party can unfreeze and spend the funds which are not more than the amount of the escrow before the set height is not reached; after reaching the set height, the corresponding escrow funds frozen by the escrow account are thawed.
2. The method of claim 1, wherein when the proposed transaction is set using a UTXO model, with its transaction input pointing to the UTXO corresponding to the hosted transaction, the lock script for the transaction output should satisfy the following condition: the UTXO can be spent only by signature confirmation of any two parties of an entrusting party, a trustee or a supervising party of the transaction opponent before the set height is not reached, and the UTXO can be spent by signature of the entrusting party of the transaction opponent after the set height is reached.
3. The method for encrypting asset escrow by using blockchain technology according to claim 1, wherein when the proposed transaction is set by the Account model, the transaction input amount is the escrow amount of the corresponding escrow transaction, the escrow amount of the transaction output is frozen, and the transaction freezing of the encrypted asset satisfies the following conditions: before the set height is not reached, any two parties of the trustee, the trustee or the supervisor of the counterparty carry out signature confirmation to unfreeze and spend funds which are not higher than the escrow amount of the counterparty; after reaching the set height, the corresponding escrow funds frozen by the counterparty are thawed.
4. A method for encrypted asset hosting using blockchain techniques according to any one of claims 1 to 3 wherein contracts maintained by third parties recording the latest exchange rates of various encrypted assets are further deployed on the asset hosting chain.
5. An apparatus for encrypting asset hosting using blockchain techniques, comprising:
the system comprises a selecting or creating module, a verification module and a verification module, wherein the selecting or creating module is used for selecting or creating a block chain supporting intelligent contracts as an asset hosting chain, and SPV contracts and asset hosting contracts used for processing the intelligent hosting of assets are deployed on the asset hosting chain, wherein the SPV contracts are used for tracking encrypted assets, storing block head histories of the encrypted asset chains and providing SPV verification services;
the asset escrow registration module is used for generating an escrow transaction by using a private key signature on the encrypted asset chain by a trusting party and broadcasting the escrow transaction; the asset hosting contract processes the hosting transaction and invokes a corresponding SPV contract for validation; if the verification is passed, adding the escrow transaction into an escrow asset list of the trusting party account, and if the verification is not passed, the escrow transaction fails to be registered;
an asset transaction module, which is used for matching the escrow assets according to the escrow strategy set by the entrusting party and generating and broadcasting two suggestion transactions on the asset escrow chain, wherein the two suggestion transactions are used for realizing encrypted asset replacement in different entrusting party accounts, the corresponding entrusting party signs the suggestion transactions and broadcasts on the asset escrow chain, the asset escrow contract respectively attaches the signatures of the entrusted parties after receiving the two suggestion transactions signed by the entrusting party and broadcasts on the corresponding encrypted asset chains, the suggestion transactions are added into the escrow asset list of the corresponding entrusting party account by the asset escrow contract after being confirmed by the belonged encrypted asset chains and remove the transacted escrow transaction from the escrow asset list, and if the asset contract does not simultaneously receive the two suggestion transactions signed by the entrusting party within a certain time, the two suggestion transactions are invalid,
the managed transaction is set by adopting a UTXO model, and a locking script of the UTXO of the managed transaction meets the following conditions: before the set height is not reached, the UTXO can be spent only by signature confirmation of any two parties of the entrusting party, the entrusted party or the monitoring party; after reaching the set height, the signature of the client can cost the UTXO,
or the escrow transaction is set by adopting an Account model, the escrow amount of the escrow transaction is frozen, and the transaction freezing requirement of the encrypted asset meets the following conditions: the balance of the account of the entrusting party is not less than the total amount of the funds in the frozen state, and any two parties of the entrusting party, the entrusted party or the supervising party can unfreeze and spend the funds which are not more than the amount of the escrow before the set height is not reached; after reaching the set height, the corresponding escrow funds frozen by the escrow account are thawed.
6. The apparatus for encrypting asset escrow using blockchain techniques according to claim 5, wherein when the proposed transaction is set using the UTXO model, its transaction input points to the UTXO corresponding to the escrow transaction, and the lock script for the transaction output should satisfy the following condition: the UTXO can be spent only by signature confirmation of any two parties of an entrusting party, a trustee or a supervising party of the transaction opponent before the set height is not reached, and the UTXO can be spent by signature of the entrusting party of the transaction opponent after the set height is reached.
7. The apparatus for encrypting asset escrow according to claim 5, wherein when the proposed transaction is set according to the Account model, the transaction input amount is the escrow amount of the corresponding escrow transaction, the escrow amount of the transaction output is frozen, and the transaction freezing of the encrypted asset satisfies the following condition: before the set height is not reached, any two parties of the trustee, the trustee or the supervisor of the counterparty carry out signature confirmation to unfreeze and spend funds which are not higher than the escrow amount of the counterparty; after reaching the set height, the corresponding escrow funds frozen by the counterparty are thawed.
8. The apparatus for encrypting asset hosting according to the blockchain technology of any one of claims 5 to 7, wherein contracts which are maintained by a third party and record the latest exchange rates of various encrypted assets are further deployed on the asset hosting chain.
9. An electronic device comprising a memory, a processor, and a computer program stored on the memory and executable on the processor, the computer program being executable by the processor to perform the method of encrypting asset escrow using blockchain techniques of any one of claims 1 to 4.
10. A computer-readable storage medium having stored thereon a computer program for execution by a processor to perform a method of encrypting asset hosting using blockchain techniques according to any one of claims 1 to 4.
CN201910352067.4A 2019-04-28 2019-04-28 Method and device for encrypting trusted assets by adopting block chain technology and electronic equipment Active CN110096905B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910352067.4A CN110096905B (en) 2019-04-28 2019-04-28 Method and device for encrypting trusted assets by adopting block chain technology and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910352067.4A CN110096905B (en) 2019-04-28 2019-04-28 Method and device for encrypting trusted assets by adopting block chain technology and electronic equipment

Publications (2)

Publication Number Publication Date
CN110096905A CN110096905A (en) 2019-08-06
CN110096905B true CN110096905B (en) 2021-10-01

Family

ID=67446283

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910352067.4A Active CN110096905B (en) 2019-04-28 2019-04-28 Method and device for encrypting trusted assets by adopting block chain technology and electronic equipment

Country Status (1)

Country Link
CN (1) CN110096905B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110535639A (en) * 2019-08-20 2019-12-03 深圳市网心科技有限公司 Block chain assets disposition method and relevant device based on more asset models
CN110599340A (en) * 2019-09-19 2019-12-20 姚忠凯 Token method, system and wallet based on alliance chain
CN111539723A (en) * 2020-04-14 2020-08-14 浙江浙燃能源有限公司 Block chain transaction recording method, equipment, block chain node and computer medium
TWI788660B (en) * 2020-04-27 2023-01-01 彰化商業銀行股份有限公司 Caring trust system based on blockchain and method thereof
CN112581131B (en) * 2020-05-15 2022-08-19 支付宝(杭州)信息技术有限公司 Asset transfer method, device, equipment and system
CN111861429A (en) * 2020-06-30 2020-10-30 上海佩俪信息科技有限公司 Block chain transaction mining work fee entrusting method and down-chain repeater
CN113011982A (en) * 2021-04-13 2021-06-22 深圳前海移联科技有限公司 Asset side hiding method and system based on block chain and electronic equipment

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529946A (en) * 2016-11-01 2017-03-22 北京金股链科技有限公司 Method for realizing user identity digitalization based on block chain
CN108830727A (en) * 2018-06-01 2018-11-16 杭州复杂美科技有限公司 A kind of block chain assets trustship method
CN109461075A (en) * 2018-10-09 2019-03-12 哈希(武汉)网络科技有限公司 A kind of block catenary system
CN109493024A (en) * 2018-09-29 2019-03-19 杭州复杂美科技有限公司 Digital asset trustship method, equipment and storage medium
CN109508564A (en) * 2018-12-20 2019-03-22 姚前 A kind of digital asset storage system and method based on block chain
CN109658246A (en) * 2018-12-20 2019-04-19 姚前 By the system and method that assets are issued as digital asset on chain under the chain of trustship registration
CN109685664A (en) * 2018-12-20 2019-04-26 姚前 One kind being based on the associated digital asset real name register system of assets mandatory system

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9436923B1 (en) * 2015-02-26 2016-09-06 Skuchain, Inc. Tracking unitization occurring in a supply chain

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106529946A (en) * 2016-11-01 2017-03-22 北京金股链科技有限公司 Method for realizing user identity digitalization based on block chain
CN108830727A (en) * 2018-06-01 2018-11-16 杭州复杂美科技有限公司 A kind of block chain assets trustship method
CN109493024A (en) * 2018-09-29 2019-03-19 杭州复杂美科技有限公司 Digital asset trustship method, equipment and storage medium
CN109461075A (en) * 2018-10-09 2019-03-12 哈希(武汉)网络科技有限公司 A kind of block catenary system
CN109508564A (en) * 2018-12-20 2019-03-22 姚前 A kind of digital asset storage system and method based on block chain
CN109658246A (en) * 2018-12-20 2019-04-19 姚前 By the system and method that assets are issued as digital asset on chain under the chain of trustship registration
CN109685664A (en) * 2018-12-20 2019-04-26 姚前 One kind being based on the associated digital asset real name register system of assets mandatory system

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
《区块链技术在资产托管业务的运用初探》;张异;《中国银行业》;20180831;第28-29页 *

Also Published As

Publication number Publication date
CN110096905A (en) 2019-08-06

Similar Documents

Publication Publication Date Title
CN110096905B (en) Method and device for encrypting trusted assets by adopting block chain technology and electronic equipment
US20230129822A1 (en) Resource transfer system
Hartmann et al. Applying blockchain to the Australian carbon market
US20200250752A1 (en) Systems, methods, and program products for issuing, managing, valuing and trading digital asset tokens backed by a value bank comprising the residual value of a portfolio of ground leases
US20180285971A1 (en) Management of consumer debt collection using a blockchain and machine learning
US20180089760A1 (en) System and method of providing a multi-asset rebalancing mechanism
US20180218176A1 (en) System and method of creating an asset based automated secure agreement
US20180253702A1 (en) Blockchain solutions for financial services and other transactions-based industries
CN111133463A (en) Intelligent contract execution using distributed coordination
CN111183445A (en) Method and apparatus for automatic commitment and settlement of digital assets
US11995468B2 (en) Transfer costs in a resource transfer system
WO2018204548A1 (en) Ledger management systems and methods
US11386415B2 (en) Hold condition in a resource transfer system
CN110738575A (en) Guarantee financing method and device based on block chain architecture
CN115456773A (en) Payment control method, device, equipment and medium based on block chain
GB2578168A (en) Computer-implemented method and system for digital signing of transactions
CN111986025A (en) Loan transaction processing method and system based on block chain
Mooradian et al. Servicer Contracts and the Design of Mortgage‐Backed Security Pools
EP3360107A1 (en) Temporary consensus networks in a resource transfer system
CN112116482A (en) Financing data processing method and device based on block chain
CN111539724A (en) Electronic commercial acceptance bill financing method and device based on block chain architecture
CN110766403A (en) Data processing device and method based on block chain and storage medium
CN110348835A (en) A kind of fictitious assets transfer method, device, server and storage medium
CN112991054B (en) Electric futures contract design method based on block chain
US20200226629A1 (en) Trading platform system and method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
EE01 Entry into force of recordation of patent licensing contract

Application publication date: 20190806

Assignee: Hangzhou Xita Technology Co.,Ltd.

Assignor: CRYPTAPE Co.,Ltd.

Contract record no.: X2021980015760

Denomination of invention: Method, device and electronic equipment for encrypting trust assets using blockchain Technology

Granted publication date: 20211001

License type: Common License

Record date: 20211229

EE01 Entry into force of recordation of patent licensing contract
TR01 Transfer of patent right

Effective date of registration: 20231218

Address after: 10/F, Guotou Building, No. 398 Shaoxing Road, Gongshu District, Hangzhou City, Zhejiang Province, 310000

Patentee after: Hangzhou Xita Technology Co.,Ltd.

Address before: 310000 No. 1301 and 1302, 13 / F, tower a, Huaxing Times Plaza, No. 478, Wensan Road, Xihu District, Hangzhou City, Zhejiang Province

Patentee before: CRYPTAPE Co.,Ltd.

TR01 Transfer of patent right