CN112200637A - Financing lease transaction processing method and system based on block chain - Google Patents

Financing lease transaction processing method and system based on block chain Download PDF

Info

Publication number
CN112200637A
CN112200637A CN202011151924.3A CN202011151924A CN112200637A CN 112200637 A CN112200637 A CN 112200637A CN 202011151924 A CN202011151924 A CN 202011151924A CN 112200637 A CN112200637 A CN 112200637A
Authority
CN
China
Prior art keywords
data
level
trusted
rental
trusted data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011151924.3A
Other languages
Chinese (zh)
Inventor
费丽娜
吴莹强
张宇航
陈锐发
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202011151924.3A priority Critical patent/CN112200637A/en
Publication of CN112200637A publication Critical patent/CN112200637A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0645Rental transactions; Leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/06Asset management; Financial planning or analysis

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Development Economics (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Technology Law (AREA)
  • Operations Research (AREA)
  • Human Resources & Organizations (AREA)
  • Game Theory and Decision Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the specification provides a financing lease transaction processing method and system based on a block chain. The method comprises the following steps: obtaining first level trusted data for at least one rental device associated with a target financial asset; writing the first level trusted data of the at least one rental device to a blockchain; processing the first-level trusted data related to the target financial asset in the block chain to obtain second-level trusted data reflecting the operation state of the target financial asset, and writing the second-level trusted data into the block chain so as to be conveniently acquired by a financing party; the trusted data refers to data protected by at least one information security technology.

Description

Financing lease transaction processing method and system based on block chain
Technical Field
The present application relates to the field of blockchain technology, and in particular, to a method and system for processing a financing lease transaction based on a blockchain.
Background
Financing lease (finaciallease) is a non-banking form of finance. The method refers to that a financing party (a leasing party or a investing party, which can be an individual or an entity, such as a user, an enterprise, etc.) makes a supply contract with a third party (an equipment supplier) according to a request of a lessee (a leasing party or a financing requesting party, which can be an individual or an entity, such as a user, an enterprise, etc.), and the financing party purchases equipment selected by the lessee from the supplier according to the contract. Meanwhile, the financing party lessees subscribe a lease contract, the equipment is leased to the lessees, and a certain rent is collected from the lessees.
In a financing lease transaction, financial assets and their corresponding equipment data may be managed and monitored by a data service platform. In order to guarantee the effectiveness of asset supervision, the data of the data service platform needs to be authentic.
Therefore, there is a need for a method and system for block chain based financing lease transaction processing.
Disclosure of Invention
One aspect of the specification provides a method for block chain based financing lease transaction processing, performed by a device having a trusted execution environment, the method comprising: obtaining first level trusted data for at least one rental device associated with a target financial asset; writing the first level trusted data of the at least one rental device to a blockchain; processing the first-level trusted data related to the target financial asset in the block chain to obtain second-level trusted data reflecting the operation state of the target financial asset, and writing the second-level trusted data into the block chain so as to be conveniently acquired by a financing party; the trusted data refers to data protected by at least one information security technology.
Another aspect of the specification provides a method for monitoring equipment assets in a financing lease, the method comprising: acquiring first-level trusted data and a digital signature thereof from at least one leasing device; the digital signature is generated based on the first-level trusted data and a private key of corresponding leasing equipment; verifying the digital signature based on the first-level trusted data and a public key of the corresponding leasing equipment; acquiring the association relationship between the rental equipment and the financial assets; and collating the primary trusted data acquired at the at least one rental device to determine primary trusted data of the at least one rental device associated with each financial asset based on the association.
Another aspect of the specification provides a blockchain-based financing lease transaction system implemented by a device having a trusted execution environment, the system comprising: a first obtaining module: obtaining first level trusted data for at least one rental device associated with the target financial asset; a data writing module: for writing the first level trusted data for the at least one rental device to a blockchain; the first data processing module: processing the first-level trusted data related to the target financial asset in the block chain to obtain second-level trusted data reflecting the operation state of the target financial asset, and writing the second-level trusted data into the block chain so as to be conveniently acquired by a financing party; the trusted data refers to data protected by at least one information security technology.
Another aspect of the specification provides a system for monitoring equipment assets in a financing lease, the system comprising: a third obtaining module: the system comprises a first-level trusted data acquisition module, a first-level trusted data acquisition module and a first-level trusted data acquisition module, wherein the first-level trusted data acquisition module is used for acquiring first-level trusted data and a digital signature thereof from at least one leasing device; the digital signature is generated based on the first-level trusted data and a private key of corresponding leasing equipment; a second verification module: the server is used for verifying that the digital signature is verified based on the first-level credible data and the public key of the corresponding leasing equipment; a fourth obtaining module: the system comprises a database, a database and a server, wherein the database is used for storing the association relationship between the rental equipment and the financial assets; the second data processing module: and the system is used for collating the first-level credible data acquired at the at least one leasing device to determine the first-level credible data of the at least one leasing device related to each financial asset based on the association relationship.
Another aspect of the specification provides a system for block chain based financing lease transaction processing, comprising at least one storage medium and at least one processor, the at least one storage medium for storing computer instructions; the at least one processor is configured to execute the computer instructions to implement the method for monitoring equipment assets in the financing lease.
Another aspect of the present description provides an apparatus for equipment asset monitoring in a financing lease, comprising at least one storage medium and at least one processor, the at least one storage medium for storing computer instructions; the at least one processor is configured to execute the computer instructions to implement the method for monitoring equipment assets in the financing lease.
Drawings
The present description will be further explained by way of exemplary embodiments, which will be described in detail by way of the accompanying drawings. These embodiments are not intended to be limiting, and in these embodiments like numerals are used to indicate like structures, wherein:
FIG. 1 is a schematic diagram of an application scenario of a financing lease transaction processing system according to some embodiments of the present description;
FIG. 2 is an exemplary flow diagram of a method for block chain based financing lease transaction processing in accordance with some embodiments of the present description;
FIG. 3 is an exemplary flow diagram of a method for monitoring equipment assets in a financing lease according to some embodiments of the present description.
Detailed Description
In order to more clearly illustrate the technical solutions of the embodiments of the present disclosure, the drawings used in the description of the embodiments will be briefly described below. It is obvious that the drawings in the following description are only examples or embodiments of the present description, and that for a person skilled in the art, the present description can also be applied to other similar scenarios on the basis of these drawings without inventive effort. Unless otherwise apparent from the context, or otherwise indicated, like reference numbers in the figures refer to the same structure or operation.
It should be understood that "system", "device", "unit" and/or "module" as used in this specification is a method for distinguishing different components, elements, parts or assemblies at different levels. However, other words may be substituted by other expressions if they accomplish the same purpose.
As used in this specification and the appended claims, the terms "a," "an," "the," and/or "the" are not intended to be inclusive in the singular, but rather are intended to be inclusive in the plural, unless the context clearly dictates otherwise. In general, the terms "comprises" and "comprising" merely indicate that steps and elements are included which are explicitly identified, that the steps and elements do not form an exclusive list, and that a method or apparatus may include other steps or elements.
Flow charts are used in this description to illustrate operations performed by a system according to embodiments of the present description. It should be understood that the preceding or following operations are not necessarily performed in the exact order in which they are performed. Rather, the various steps may be processed in reverse order or simultaneously. Meanwhile, other operations may be added to the processes, or a certain step or several steps of operations may be removed from the processes.
FIG. 1 is a schematic diagram of an application scenario of a financing lease transaction processing system according to some embodiments of the present description.
Financing lease (financial lease) is a form of non-banking finance. The method refers to that a financing party (a lessor or a investor, which can be an individual or an entity, such as a user, an enterprise, etc.) makes a supply contract with a third party (a device supplier) according to a request of a lessee (a financing requester, which can be an individual or an entity, such as a user, an enterprise, etc.), and the financing party purchases a device selected by the lessee from the supplier according to the contract. Meanwhile, the financing party and the lessee subscribe a lease contract, the equipment is leased to the lessee, and a certain rent is collected from the lessee.
In a financing lease transaction, device data may be managed by a data service platform. For example, the data service platform may include a trusted IOT platform and an asset management platform, and the trusted IOT platform may obtain device data from a tenant and provide the device data to the asset management platform to implement in-credit asset administration. In order to ensure the effectiveness of asset supervision, it is required that data of the data service platform is authentic and trusted, that is, the device data acquired by the trusted IOT platform is authentic and trusted, and the data provided by the trusted IOT platform to the asset management platform is authentic and trusted.
As shown in fig. 1, an application scenario 100 of the financing lease transaction system may include a tenant 110, a data service platform 120, and a financer 130. Lessees 110 have leased equipment assets that include at least one leased equipment and financers 130 correspond to financial assets, each of which corresponds to an associated equipment asset. The financing lease transaction processing system can collect the device data and perform information technology safety protection (such as encryption and signature) on the device data through a Software Development Kit (SDK) built in the lease device. The data service platform 120 acquires the device data subjected to information technology security protection and performs trusted evidence storage. Specifically, the trusted IOT platform may obtain device data secured by information technology and perform data verification (e.g., signature verification). And the asset management platform acquires the equipment data from the trusted IOT platform and stores the equipment data into the block chain, and acquires the data from the block chain for processing to obtain second-level data reflecting the operation states and abnormal conditions of the equipment assets and the financial assets. The financier 130 may log in to the data service platform 120 or initiate a data query transaction to the blockchain to obtain trusted second level data to understand the operation of its financial assets.
Lessees 110 and financers 130 may be any individual or entity, such as a user, business, etc. The description is not limited in this regard.
The asset management platform may further include a device having a trusted execution environment that is in business interface with the trusted IOT platform and a blockchain network comprised of a plurality of blockchain linked points. More generally, in the blockchain, a blockchain link point may receive transactions uploaded (or broadcast) to the chain, call a corresponding smart contract to complete execution of the transaction, and write the transaction and the result of the transaction execution into the blockchain data. For example, a device having a trusted execution environment may obtain primary trusted data for at least one rental device associated with a target financial asset and initiate a data credentialing transaction request to a blockchain network, writing the primary trusted data to the blockchain data.
The consensus mechanism is an essential component of the normal operation of the blockchain network, and is used to ensure that the blockchain data stored by each node is consistent. A plurality of nodes may agree on operations to receive (input of corresponding code), generate (output of corresponding code or intermediate result), and/or perform by running a consensus protocol, and nodes participating in consensus may be referred to as consensus nodes. For example, for a plurality of transactions involved in a new block, each consensus node may agree on the order of execution of the plurality of transactions by running a consensus protocol.
Blockchain data (also referred to as on-chain data) may include writes of blockchain data, also referred to as uplinks, by common identification of blockchain data and state data (also referred to as global state or world state). Wherein the block data comprises continuously generated and time-sequentially linked blocks, and each common node can uplink a new block by running a common protocol. Consensus pass means that each consensus node can write the same new block to the blockchain data. For example only, in some embodiments, the condition that the consensus passes includes that more than a predetermined percentage (e.g., 2/3) of the consensus nodes agree to uplink the new block. The status data may include status variables associated with each account, such as the balance of an external account controlled by an individual, organization, or, as another example, the contract status of a contract account.
It should be noted that the blockchain has a public transparency characteristic, so that any node can obtain the transaction broadcasted in the blockchain network, and if the account data of the account checking party is put into the account checking transaction in a clear text form, there may be a risk of disclosure. In view of this, in some embodiments, transaction data (e.g., the first transaction stream) may be uploaded to the blockchain as ciphertext, and an authorized data user (e.g., a sponsor) may decrypt corresponding data obtained from the chain using a key provided by the data source.
In some embodiments, a tile link point may be a variety of computing devices, such as a laptop computer, desktop computer, server, and the like.
In some embodiments, a Trusted Execution Environment (TEE) is a secure area on a device's processor that can ensure the security of code and data loaded into the EnvironmentConfidentiality and integrity, thereby ensuring the trustworthiness of the verification results obtained by the device having the trusted execution environment. Exemplary trusted execution environments may include trusted execution environments based on Software Guard Extensions (SGX), Secure Encrypted Virtualization, or TrustZone technologies, among others. To be provided with
Figure BDA0002740549650000051
For example, the SGX of the company is protected by Enclave when a program is executed in a trusted execution environment, and the outside cannot tamper with data located in the Enclave or affect the execution process of the program.
A device with a trusted execution environment may prove to the tenant 110, financer 130, or blockchain network (hereinafter financer is exemplified) that the device has a trusted execution environment. In particular, the device may utilize a signature and verification service provided by the processor to prove whether the device includes a trusted execution environment. For example, by using
Figure BDA0002740549650000053
The signature and verification service attestation device provided includes an SGX.
In some embodiments, a virtual machine is embedded within the trusted execution environment of the device. A virtual machine refers to a complete computer system with complete hardware system functionality, which is emulated by software and runs in a completely isolated environment. In some embodiments, virtual machines may include, but are not limited to, an Etherhouse Virtual Machine (EVM), an EOS virtual Machine (WASM), a Bottos Virtual Machine (BVM), and a termite virtual Machine (Antshares VM), among others. The virtual machine may run intelligent contracts that implement the lease financing transaction logic. For example, the virtual machine may run an intelligent contract to process the first level trusted data to obtain second level trusted data, and store across the chain into the blockchain network.
In some embodiments, the trusted execution environment in the device may further certify that it has a virtual machine within it that can run the aforementioned intelligent contracts. In particular, the trusted execution environment may be invoked for computingAnd send the hash value of the script and code of the virtual machine to the financer 130 for verification. It is to be appreciated that financer 130 also has corresponding scripts and code for the virtual machine, and verification may be performed by comparing the hash values of the scripts and code for the local virtual machine to the hash values received from the trusted execution environment. In some embodiments, the trusted execution environment may also digitally sign the hash value of the script and code of the invoked virtual machine using its private key and send the digital signature to the financer 130. The financier 130 may send the digital signature to
Figure BDA0002740549650000052
And the verification server verifies the digital signature through the verification server so as to prove that the hash value comes from the authenticated trusted execution environment.
FIG. 2 is an exemplary flow diagram of a method for block chain based financing lease transaction processing, according to some embodiments of the present description.
In some embodiments, the blockchain-based financing lease transaction method 200 may be performed by a device having a trusted execution environment.
As shown in fig. 2, the block chain-based financing lease transaction method 200 may include:
at step 210, first level trusted data is obtained for at least one rental device associated with a target financial asset.
Specifically, the step 210 may be performed by the first obtaining module.
Financial Assets (Financial Assets) refer to the symmetry of physical Assets, being Assets owned by a unit or individual in the form of value. The financial asset may be an intangible right to claim physical assets, and may be a generic term for all financial instruments that can be traded in an organized financial market, with real prices and future valuations. Financial assets can provide their owners with current or future currency entry flows in market transactions. The target financial asset may correspond to one or more physical assets.
The target financial asset refers to a financial asset involved in or required to be monitored in a financing lease transaction, such as an investment of the sponsor A in the financing lease transaction, or a monetary value of a batch of lease equipment leased to a lessee by the sponsor A.
The renting equipment related to the target financial asset refers to equipment included in the physical asset corresponding to the target financial asset in a financing renting transaction, for example, in a financing renting business, an sponsor A takes out 20 ten thousand investment funds according to a request of a lessee to purchase a batch of equipment, and rents the batch of equipment to the lessee, and the batch of equipment is 20 ten thousand related renting equipment of the investment funds. In the financing lease transaction, the lease equipment may be any equipment available for transaction, such as garbage recycling equipment, sewage treatment equipment, air detection equipment, and the like, which is not limited in this embodiment.
The at least one rental device associated with the target financial asset may refer to one or more devices included in a physical asset corresponding to the target financial asset. In some embodiments, the plurality of rental devices related to the target financial asset may be a plurality of devices distributed in a centralized manner, or may also be a plurality of devices distributed in a decentralized manner, and the distribution manner of the devices is not limited in this embodiment.
The trusted data refers to data protected by at least one information security technology, and the information security technology can be information technologies capable of achieving data tamper resistance or authenticity verification, such as encryption, signature adding, processing in a trusted unit, and block chain tamper resistance. For example, the trusted data may be data obtained by public key encryption and private key signature, or may be data obtained by processing of the trusted data platform, or may be data on a blockchain obtained by writing to the blockchain.
The primary trusted data refers to the associated trusted data for at least one rental device associated with the target financial asset. For example, the device data is encrypted by a public key and signed by a private key to obtain corresponding first-level trusted data, or the device data is processed by a trusted platform to obtain corresponding first-level trusted data, or the device data is written into a block chain, and the device data stored in the block chain is the corresponding first-level trusted data. The device data (or first level trusted data) may include various data related to the device.
In some embodiments, the first level of trusted data includes at least one or more of the following: the device identification, the device location information, the device operational data, and heartbeat package information from the rental device.
The equipment identification refers to identification information which can represent the identity of the rental equipment, such as equipment brand, model, number (asset number), IMEI number and the like.
The device location information refers to location information of the rental device, and taking the garbage collection device as an example, the device location information may be a geographic location coordinate, a city street, a cell, and the like where the garbage collection device is placed.
The device operation data refers to data related to the operation of the device, and may include a device state, device operation data, and the like. Taking the garbage collection device as an example, the operation data of the device may include a device photo, a device release status, a device verification status, a device overflow weight of the current day, a device overflow number of the current day, a real-time garbage collection weight of the device, and the like.
The heartbeat packet of the rental equipment is a self-defined command word which informs the other side of the own state between the rental equipment and other terminals, systems or platforms, and is sent according to a certain time interval or preset time, so that whether the equipment normally operates can be judged. The heartbeat package information of the rental device can be the time (e.g., 2020/8/24-15:55) of receipt of the heartbeat package of the rental device, fields of the heartbeat package of the device, and other relevant information.
In some embodiments, a device having a trusted execution environment may obtain primary trusted data directly from a rental device or from a trusted IOT platform for at least one rental device related to a target financial asset. The trusted IOT platform is an IOT platform with a trusted execution environment, and can acquire first-level trusted data of the equipment, and check and sort the first-level trusted data so as to monitor equipment assets in financing lease. For more details of the trusted IOT platform implementing the obtaining of the first-level trusted data of the at least one rental device associated with the target financial asset, reference may be made to fig. 3 and its associated description, which are not repeated herein.
In order to perform information security technology protection on the device data, the rental device may correspond to a public key and a private key. The public key may be issued externally, such as by a trusted IOT platform or device with a trusted execution environment, while the private key is held by the rental device itself. The rental device can generate a digest of the device data based on a digest algorithm and encrypt the digest with a private key of the rental device to generate a digital signature, thereby protecting the security of the device data by signing. At this time, the device data or the device data together with its signature may be referred to as first-level trusted data. In order to further protect the security of the device data, a Software Development Kit (SDK) can be implanted in the rental device, and the SDK executes a signing process. Further, a Security Element (SE) can be implanted for the rental device, and the SDK for performing the signing is placed in the security element for execution. Data and code in the security unit are difficult to be tampered by outside maliciously.
In some embodiments, the device having a trusted execution environment obtaining primary trusted data for at least one rental device associated with the target financial asset may further comprise: acquiring a digital signature of the first-level trusted data; verifying the digital signature based on a public key of the corresponding rental device and the first level of trust data. After the digital signature is verified, the device with the trusted execution environment can uplink the first-level trusted data.
In some embodiments, the obtaining of the first level of trusted data for the rental device may be a real-time obtaining or a timed obtaining (e.g., daily or several hours apart), which is not limited by the present embodiment.
In some embodiments, after obtaining the first level of trusted data for the at least one rental device associated with the target financial asset, the first level of trusted data may be further subject to data inspection, cleaning, ranking, combining, data association (e.g., associating device data with a corresponding financial asset), and other data sorting.
Step 220, writing the first-level trusted data of the at least one rental device into a block chain.
Specifically, the step 220 may be performed by the data writing module.
In some embodiments, after obtaining the first level trusted data for the at least one rental device associated with the target financial asset, the device having the trusted execution environment may send a credentialing transaction to the blockchain as a user side of the blockchain, writing the first level trusted data for the at least one device to the blockchain.
Specifically, the device with the trusted execution environment may package first-level trusted data of at least one rental device into a deposit transaction and send the deposit transaction to the block chain, and after verifying the deposit transaction based on a consensus algorithm, a node in the block chain writes the received deposit transaction containing the first-level trusted data of at least one rental device into the block chain.
In some embodiments, consensus algorithms may include, but are not limited to: proof of Work (PoW), Proof of rights and interests (PoS), Proof of Authority (PoA), Byzantine Fault Tolerance (BFT), Practical Byzantine Fault Tolerance (PBFT), and Delegated Byzantine Fault Tolerance (DBFT), etc.
Further, the device with the trusted execution environment may store a corresponding address in the blockchain of the first level trusted data of the at least one rental device. In some embodiments, when a device with a trusted execution environment again receives the first level of trusted data for the same rental device, writing of the first level of trusted data for the rental device to the blockchain may continue directly based on the address at which the corresponding rental device stored the first level of trusted data in the blockchain. In some embodiments, the blockchain may further receive a data query transaction initiated by a user (e.g., a financial party, a device with a trusted execution environment) to the blockchain, and when the blockchain receives the data query transaction, the blockchain may perform query on data corresponding to the device based on an address corresponding to the device to be queried.
Further, the blockchain may write first-level trusted data for the at least one rental device to the uplink results of the blockchain back to the device having the trusted execution environment.
In some embodiments, a device having a trusted execution environment may digitally sign first level trusted data of at least one rental device to prove the origin of the data before packaging the first level trusted data into a credentialing transaction and sending to a blockchain. For a detailed description of the digital signature, reference may be made to step 210 and its related description, which are not repeated herein.
In some embodiments, the device with the trusted execution environment may also obtain the association of the rental device with the financial asset and write the association together into the blockchain as described above. For example, a device with a trusted execution environment may obtain the association from a financer or a tenant. The association relationship may be a field containing a financial asset number and an equipment number corresponding to the financial asset, or may be information data for recording the financial asset and rental equipment corresponding to the financial asset. In some embodiments, this step may be performed by the second acquisition module.
Through the embodiment, the equipment with the trusted execution environment can acquire the first-level trusted data of at least one leasing equipment related to the target financial asset, and simultaneously writes the first-level trusted data, the association relation between the equipment and the financial asset into the block chain for tamper-proof evidence storage, so that the equipment data is acquired in the trusted execution environment in the whole uplink process, and the real and trusted performance of the equipment data is realized.
Step 230, processing the first-level trusted data related to the target financial asset in the block chain to obtain second-level trusted data reflecting the operation state of the target financial asset, and writing the second-level trusted data into the block chain so as to be conveniently obtained by the financing party.
In particular, this step 230 may be performed by the first data processing module.
The second-level credible data refers to credible data obtained by processing the first-level credible data. The second level of trust data may reflect an operational status of the target financial asset. The second level of trusted data may include operational status data of at least one device associated with the target financial asset and may also include operational status data of the target financial asset.
In some embodiments, the second level of trusted data includes at least one or more of the following: device operational information associated with the target financial asset and device anomalies associated with the target financial asset.
Taking the garbage recycling device as an example, the acquired first-level trusted data includes geographic location coordinates of the device, device photos, device issuing states, device verification and cancellation states, device overflow weight of the current day, device overflow times of the current day, real-time garbage recycling weight of the device, and device heartbeat packet receiving time, and the first-level trusted data is subjected to processing such as sorting, statistics, state analysis, anomaly analysis, and the like, so as to obtain device number, all device issuing states, verification and cancellation states of all devices, average overflow weight and average turnover efficiency of a single device and/or all devices, abnormal proportion of the device, average duration of the abnormal device, and location distribution of all devices, which correspond to the target financial asset. The equipment abnormality can be judged based on the condition that the equipment receives the heartbeat packet, if the equipment does not have heartbeat packet information at a plurality of continuous time points or for a period of time, the equipment can be considered to be abnormal, and after the heartbeat packet information of the equipment is recovered to be normal, the equipment can be recovered to be normal. In some embodiments, the operation status data of the corresponding target financial asset may be determined according to the device operation status data, such as device operation information and device abnormal conditions, of the device. For example, a low equipment anomaly duty ratio and a high average turnover efficiency may determine that the target financial asset operation is excellent.
In some embodiments, obtaining the second-level trusted data may be performed by performing algorithm processing such as sorting, statistics, state analysis, and anomaly analysis on the first-level trusted data to obtain the second-level trusted data.
After obtaining the second-level trusted data, the device with the trusted execution environment can be used as a user side of the block chain, send a certificate storing transaction to the block chain, and write the second-level trusted data of at least one leasing device into the block chain. The method for writing the second-level trusted data into the block chain may refer to the method for writing the first-level trusted data into the block chain, and specific contents may refer to step 220 and related description thereof, which are not described herein again.
After the second-level trusted data is obtained and written into the block chain, trusted evidence storage of operation data of financial assets and equipment assets is further achieved. The financing party and the lessee can acquire the first-level credible data and the second-level credible data by initiating access to the block chain, so that the operation conditions of the target financial asset and the corresponding equipment asset can be effectively monitored. If a default situation (such as a device being maliciously replaced), financial asset and device asset risk situation (such as a large number of device anomalies, a large number of devices being underwritten) occurs, traceability and accountability can also be performed based on the trusted attestation flow of the device having the trusted execution environment. The system can play a good role in credit early warning and wind control on financing lease affairs.
In some embodiments, a device with a trusted execution environment may also prove to the financer and/or blockchain that the device has a trusted execution environment. This step can be implemented by the attestation module and more on attestation can be found from the related description of fig. 1. And will not be described in detail herein.
In some embodiments, a device with a trusted execution environment may pre-grant access to a financier and/or other user, and the financier with access may access an asset management platform or blockchain and obtain first level trusted data and/or second level trusted data.
FIG. 3 is an exemplary flow diagram of a method for monitoring equipment assets in a financing lease according to some embodiments of the present description.
The equipment assets refer to equipment which is leased to the financing party by the investor in the financing lease transaction, the equipment assets can comprise one or more lease equipment, and the equipment comprised by the equipment assets can respectively correspond to each financial asset.
In some embodiments, the device data may be collected through a terminal, a system, or a platform, and protected by an information security technology to obtain first-level trusted data of the device, so as to monitor device assets in the financing lease. For example, the first-level trusted data of the device may be acquired by the trusted IOT platform, and the first-level trusted data is verified and data-sorted, so that the first-level trusted data is acquired by an asset management platform (such as a device with a trusted execution environment), thereby monitoring device assets in financing lease.
As shown in FIG. 3, the method 300 for monitoring equipment assets in a financing lease may include:
step 310, acquiring first-level credible data and a digital signature thereof from at least one leasing device; the digital signature is generated based on the first-level trusted data and a private key of a device corresponding to the first-level trusted data.
In particular, this step 310 may be performed by a third obtaining module.
The rental device may obtain corresponding first-level trusted data and a digital signature under protection of an information security technology, and specific content of the digital signature may refer to step 210 and related description thereof, which is not described herein again. The digital signature may be generated based on the first level of trusted data (or device data) of the device and a corresponding private key to enable proof that the first level of trusted data is authentic and has not been tampered with.
In some embodiments, the digital signature may be generated in the secure element of the corresponding rental device based on the first level of trusted data and the private key. A Secure Element (SE) of the rental device provides functions such as Secure storage of private information, Secure execution of important programs, and the like, and may include internal components such as a CPU, RAM, ROM, encryption engine, sensors, and the like. The safety unit adopts a safety protocol to communicate with the outside, has independent execution environment and safety storage, and can realize tamper resistance on software and hardware. Specifically, the software can be tamper-proof through encryption, signature and other modes, and the hardware can be tamper-proof through a mode that the SE can be destructed through physical tampering.
Step 320, verifying the digital signature based on the first-level trusted data and the public key of the corresponding rental device.
In particular, this step 320 may be performed by the verification module.
After the first-level trusted data and the digital signature of the first-level trusted data of at least one leasing device are obtained, the digital signature is verified based on the first-level trusted data and the public key of the corresponding leasing device, and whether the first-level trusted data is authentic or not and whether the first-level trusted data is tampered or not can be verified. Specifically, the first-level trusted information may be used to generate a digest by the same digest algorithm as that used to generate the digital signature, and then the digital signature is decrypted by the public key corresponding to the rental device to obtain a plaintext digest.
Step 330, acquiring the association relationship between the rental equipment and the financial assets.
In particular, the step 330 may be performed by the fourth obtaining module.
As previously described, the financial asset may correspond to at least one rental device. The association relationship between the rental device and the financial asset can be represented as a field containing the financial asset number and the device number corresponding to the financial asset, and can also be represented as information data for recording the financial asset and the device corresponding to the financial asset.
In some embodiments, the association relationship between the device and the financial asset may be obtained by uploading by a user (e.g., an information aggregator or a tenant) or obtained from an asset management platform, or may be obtained by using related device data (e.g., a device number of the device and a corresponding asset number), and the obtaining manner is not limited in this embodiment.
Step 340, collating the first-level trusted data acquired at the at least one rental device to determine first-level trusted data of the at least one rental device associated with each financial asset based on the association relationship.
In particular, this step 340 may be performed by the second data processing module.
In some embodiments, collating the first level of trusted data obtained at the at least one rental device may include data inspection, cleansing, ranking, combining, data association (e.g., associating, packaging, etc. device data with a corresponding financial asset), and the like.
The first-level credible data of the at least one rental device related to each financial asset determined based on the incidence relation is first-level credible data obtained by taking the financial asset as a dimension and performing incidence organization on the first-level credible data of the at least one rental device. By means of the embodiment, recall of all device data associated with the target financial asset can be achieved. The consolidated data may be available to an asset management platform (e.g., a device having a trusted execution environment).
The embodiment of the specification also provides a financing lease transaction processing system based on the block chain.
In some embodiments, a block chain based financing lease transaction system may include a first acquisition module, a data write module, a first data processing module. In some embodiments, the block chain based financing lease transaction system may further comprise a second acquisition module, a certification module.
The first obtaining module may be configured to obtain first level trusted data for at least one rental device associated with the target financial asset. The trusted data refers to data protected by at least one information security technology. In some embodiments, the first level of trusted data includes at least one or more of: the device identification, the device location information, the device operational data, and heartbeat package information from the rental device. In some embodiments, the first obtaining module may be further configured to obtain a digital signature of the first level trusted data; the digital signature is generated based on the first-level trusted data and a private key of the corresponding leasing equipment; verifying the digital signature based on a public key of the corresponding rental device and the first level of trust data. In some embodiments, the first obtaining module may be further operable to obtain, from the trusted IOT platform, first level trusted data for at least one rental device associated with the target financial asset.
The data writing module may be to write the first level trusted data of the at least one rental device to a blockchain.
The first data processing module may be configured to process the first-level trusted data related to the target financial asset in the block chain, obtain second-level trusted data that reflects an operation state of the target financial asset, and write the second-level trusted data into the block chain, so that a financing party can obtain the second-level trusted data. In some embodiments, the second level of trusted data includes at least one or more of the following: rental equipment operation information associated with the target financial asset and rental equipment anomalies associated with the target financial asset.
The second acquisition module can be used for acquiring the association relationship between the rental equipment and the financial assets; and writing the incidence relation information into a block chain.
An attestation module may be used to attest to the financer and/or blockchain that the device has a trusted execution environment, and to attest that there is a virtual machine within the trusted execution environment that is capable of executing intelligent contracts used to implement financing lease transaction logic.
The embodiment of the specification also provides a system for monitoring the equipment assets in the financing lease.
In some embodiments, a system for monitoring equipment assets in a financing lease may include a third acquisition module, a verification module, a fourth acquisition module, and a second data processing module.
The third acquisition module can be used for acquiring the first-level credible data and the digital signature thereof from at least one leasing device; the digital signature is generated based on the first-level trusted data and a private key of the corresponding rental device.
A second verification module may be used to verify that the digital signature is verified based on the first level of trusted data and the public key of its corresponding rental device.
The fourth obtaining module can be used for obtaining the association relationship between the rental equipment and the financial assets.
The second data processing module may be configured to collate the primary trusted data obtained at the at least one rental device to determine primary trusted data for the at least one rental device associated with each financial asset based on the association.
In some embodiments, the first level of trusted data includes at least one or more of: the device identification, the device location information, the device operational data, and heartbeat package information from the rental device. In some embodiments, the digital signature is generated in the secure element of the corresponding rental device based on its primary trusted data and a private key.
It should be understood that the illustrated system and its modules may be implemented in a variety of ways. For example, in some embodiments, the system and its modules may be implemented in hardware, software, or a combination of software and hardware. Wherein the hardware portion may be implemented using dedicated logic; the software portions may be stored in a memory for execution by a suitable instruction execution system, such as a microprocessor or specially designed hardware. Those skilled in the art will appreciate that the methods and systems described above may be implemented using computer executable instructions and/or embodied in processor control code, such code being provided, for example, on a carrier medium such as a diskette, CD-or DVD-ROM, a programmable memory such as read-only memory (firmware), or a data carrier such as an optical or electronic signal carrier. The system and its modules of the present application may be implemented not only by hardware circuits such as very large scale integrated circuits or gate arrays, semiconductors such as logic chips, transistors, or programmable hardware devices such as field programmable gate arrays, programmable logic devices, etc., but also by software executed by various types of processors, for example, or by a combination of the above hardware circuits and software (e.g., firmware).
It should be noted that the above descriptions of the block chain-based financing lease transaction system, equipment asset monitoring system in financing lease and the modules thereof are only for convenience of description, and should not limit the present specification to the scope of the illustrated embodiments. It will be appreciated by those skilled in the art that, given the teachings of the present system, any combination of modules or sub-system configurations may be used to connect to other modules without departing from such teachings. For example, the first obtaining module, the data writing module, and the first data processing module may share one storage module, and each module may have its own storage module. Such variations are within the scope of the present application.
An embodiment of the present specification further provides an apparatus, which includes a processor, and the processor is configured to execute the foregoing method for processing a financing lease transaction based on a block chain. The financing lease transaction processing method based on the block chain can comprise the following steps: obtaining first level trusted data for at least one device associated with a target financial asset; writing the first level trusted data of the at least one device to a block chain; processing the first-level trusted data related to the target financial asset in the block chain to obtain second-level trusted data reflecting the operation state of the target financial asset, and writing the second-level trusted data into the block chain so as to be conveniently acquired by a financing party; the trusted data refers to data protected by at least one information security technology.
The embodiment of the specification also provides another device which comprises a processor, wherein the processor is used for executing the equipment asset monitoring method in the financing leasing. The equipment asset monitoring method in financing lease comprises the following steps: acquiring first-level trusted data and a digital signature thereof from at least one device; the digital signature is generated based on the first-level trusted data and a private key of a device corresponding to the first-level trusted data; verifying the digital signature based on the first-level trusted data and a public key of a device corresponding to the first-level trusted data; acquiring an association relation between equipment and financial assets; the first-level trusted data obtained at the at least one device is collated to determine first-level trusted data for the at least one device relating to each financial asset based on the incidence relation.
The beneficial effects that may be brought by the embodiments of the present description include, but are not limited to: (1) the truthfulness and the feasibility of the equipment data in the whole financing lease transaction flow are ensured by acquiring the first-level credible data from the equipment source data, writing the first-level credible data into the block chain for credible evidence storage and processing the evidence storage data of the block chain to obtain the operation state data, so that the effective monitoring on the operation state, the abnormal condition and the risk condition of the equipment assets and the financial assets is realized; (2) the first-level credible data of the equipment source is obtained through the credible IOT platform, the credible data of the credible IOT platform is obtained through the asset management platform and is stored and processed, and therefore the equipment assets and financial assets can be efficiently managed and monitored; (3) the financing party and the lessee can conveniently inquire and monitor the equipment assets and the financial assets through a data service platform consisting of the trusted IOT platform and the asset management platform, and the development of financing lease affairs is greatly facilitated. It is to be noted that different embodiments may produce different advantages, and in different embodiments, any one or combination of the above advantages may be produced, or any other advantages may be obtained.
Having thus described the basic concept, it will be apparent to those skilled in the art that the foregoing detailed disclosure is to be regarded as illustrative only and not as limiting the present specification. Various modifications, improvements and adaptations to the present description may occur to those skilled in the art, although not explicitly described herein. Such modifications, improvements and adaptations are proposed in the present specification and thus fall within the spirit and scope of the exemplary embodiments of the present specification.
Also, the description uses specific words to describe embodiments of the description. Reference throughout this specification to "one embodiment," "an embodiment," and/or "some embodiments" means that a particular feature, structure, or characteristic described in connection with at least one embodiment of the specification is included. Therefore, it is emphasized and should be appreciated that two or more references to "an embodiment" or "one embodiment" or "an alternative embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment. Furthermore, some features, structures, or characteristics of one or more embodiments of the specification may be combined as appropriate.
Moreover, those skilled in the art will appreciate that aspects of the present description may be illustrated and described in terms of several patentable species or situations, including any new and useful combination of processes, machines, manufacture, or materials, or any new and useful improvement thereof. Accordingly, aspects of this description may be performed entirely by hardware, entirely by software (including firmware, resident software, micro-code, etc.), or by a combination of hardware and software. The above hardware or software may be referred to as "data block," module, "" engine, "" unit, "" component, "or" system. Furthermore, aspects of the present description may be represented as a computer product, including computer readable program code, embodied in one or more computer readable media.
The computer storage medium may comprise a propagated data signal with the computer program code embodied therewith, for example, on baseband or as part of a carrier wave. The propagated signal may take any of a variety of forms, including electromagnetic, optical, etc., or any suitable combination. A computer storage medium may be any computer-readable medium that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code located on a computer storage medium may be propagated over any suitable medium, including radio, cable, fiber optic cable, RF, or the like, or any combination of the preceding.
Computer program code required for the operation of various portions of this specification may be written in any one or more programming languages, including an object oriented programming language such as Java, Scala, Smalltalk, Eiffel, JADE, Emerald, C + +, C #, VB.NET, Python, and the like, a conventional programming language such as C, Visual Basic, Fortran2003, Perl, COBOL2002, PHP, ABAP, a dynamic programming language such as Python, Ruby, and Groovy, or other programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or processing device. In the latter scenario, the remote computer may be connected to the user's computer through any network format, such as a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet), or in a cloud computing environment, or as a service, such as a software as a service (SaaS).
Additionally, the order in which the elements and sequences of the process are recited in the specification, the use of alphanumeric characters, or other designations, is not intended to limit the order in which the processes and methods of the specification occur, unless otherwise specified in the claims. While various presently contemplated embodiments of the invention have been discussed in the foregoing disclosure by way of example, it is to be understood that such detail is solely for that purpose and that the appended claims are not limited to the disclosed embodiments, but, on the contrary, are intended to cover all modifications and equivalent arrangements that are within the spirit and scope of the embodiments herein. For example, although the system components described above may be implemented by hardware devices, they may also be implemented by software-only solutions, such as installing the described system on an existing processing device or mobile device.
Similarly, it should be noted that in the preceding description of embodiments of the present specification, various features are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure aiding in the understanding of one or more of the embodiments. This method of disclosure, however, is not intended to imply that more features than are expressly recited in a claim. Indeed, the embodiments may be characterized as having less than all of the features of a single embodiment disclosed above.
Numerals describing the number of components, attributes, etc. are used in some embodiments, it being understood that such numerals used in the description of the embodiments are modified in some instances by the use of the modifier "about", "approximately" or "substantially". Unless otherwise indicated, "about", "approximately" or "substantially" indicates that the number allows a variation of ± 20%. Accordingly, in some embodiments, the numerical parameters used in the specification and claims are approximations that may vary depending upon the desired properties of the individual embodiments. In some embodiments, the numerical parameter should take into account the specified significant digits and employ a general digit preserving approach. Notwithstanding that the numerical ranges and parameters setting forth the broad scope of the range are approximations, in the specific examples, such numerical values are set forth as precisely as possible within the scope of the application.
For each patent, patent application publication, and other material, such as articles, books, specifications, publications, documents, etc., cited in this specification, the entire contents of each are hereby incorporated by reference into this specification. Except where the application history document does not conform to or conflict with the contents of the present specification, it is to be understood that the application history document, as used herein in the present specification or appended claims, is intended to define the broadest scope of the present specification (whether presently or later in the specification) rather than the broadest scope of the present specification. It is to be understood that the descriptions, definitions and/or uses of terms in the accompanying materials of this specification shall control if they are inconsistent or contrary to the descriptions and/or uses of terms in this specification.
Finally, it should be understood that the embodiments described herein are merely illustrative of the principles of the embodiments of the present disclosure. Other variations are also possible within the scope of the present description. Thus, by way of example, and not limitation, alternative configurations of the embodiments of the specification can be considered consistent with the teachings of the specification. Accordingly, the embodiments of the present description are not limited to only those embodiments explicitly described and depicted herein.

Claims (20)

1. A block chain based financing lease transaction processing method, performed by a device having a trusted execution environment, comprising:
obtaining first level trusted data for at least one rental device associated with a target financial asset;
writing the first level trusted data of the at least one rental device to a blockchain;
processing the first-level trusted data related to the target financial asset in the block chain to obtain second-level trusted data reflecting the operation state of the target financial asset, and writing the second-level trusted data into the block chain so as to be conveniently acquired by a financing party;
the trusted data refers to data protected by at least one information security technology.
2. The method of claim 1, the obtaining primary trusted data for at least one rental device associated with the target financial asset, further comprising:
acquiring a digital signature of the first-level trusted data; the digital signature is generated based on the first-level trusted data and a private key of corresponding leasing equipment;
verifying the digital signature based on a public key of the corresponding rental device and the first level of trust data.
3. The method of claim 1, the obtaining primary trusted data for at least one rental device associated with the target financial asset, comprising:
obtaining the first level of trusted data for the at least one rental device associated with a target financial asset from a trusted IOT platform.
4. The method of claim 1, further comprising:
acquiring the association relationship between the rental equipment and the financial assets;
and writing the incidence relation information into a block chain.
5. The method of claim 1, the first level of trust data comprising at least one or more of: the device identification, the device position information, the device operation data and the heartbeat package information from the rental device;
the second level of trusted data includes at least one or more of: rental equipment operation information associated with the target financial asset and rental equipment anomalies associated with the target financial asset.
6. The method of claim 1, further comprising: certifying to the financer and/or blockchain that the device with a trusted execution environment has a trusted execution environment, and certifying that the trusted execution environment has a virtual machine within that, the virtual machine capable of executing smart contracts for implementing financing lease transaction logic.
7. A method for monitoring equipment assets in financing leasing comprises the following steps:
acquiring first-level trusted data and a digital signature thereof from at least one leasing device; the digital signature is generated based on the first-level trusted data and a private key of corresponding leasing equipment;
verifying the digital signature based on the first-level trusted data and a public key of the corresponding leasing equipment;
acquiring the association relationship between the rental equipment and the financial assets;
and collating the primary trusted data acquired at the at least one rental device to determine primary trusted data of the at least one rental device associated with each financial asset based on the association.
8. The method of claim 7, the first level of trust data comprising at least one or more of:
the device identification, the device location information, the device operational data, and heartbeat package information from the rental device.
9. The method of claim 7, the digital signature being generated in a secure element of the corresponding rental device based on the primary trusted data and a private key thereof.
10. A blockchain-based financing lease transaction system implemented by a device having a trusted execution environment, comprising:
a first obtaining module: obtaining first level trusted data for at least one rental device associated with the target financial asset;
a data writing module: for writing the first level trusted data for the at least one rental device to a blockchain;
the first data processing module: the system comprises a block chain, a financing party and a data processing module, wherein the block chain is used for processing the first-level credible data related to a target financial asset in the block chain, obtaining second-level credible data reflecting the operation state of the target financial asset, and writing the second-level credible data into the block chain so as to be conveniently obtained by the financing party;
the trusted data refers to data protected by at least one information security technology.
11. The system of claim 10, the first acquisition module further to:
acquiring a digital signature of the first-level trusted data; the digital signature is generated based on the first-level trusted data and a private key of corresponding leasing equipment;
verifying the digital signature based on a public key of the corresponding rental device and the first level of trust data.
12. The system of claim 10, the first acquisition module further to:
obtaining the first level of trusted data for the at least one rental device associated with a target financial asset from a trusted IOT platform.
13. The system of claim 10, further comprising a second acquisition module to:
acquiring the association relationship between the rental equipment and the financial assets;
and writing the incidence relation information into a block chain.
14. The system of claim 10, the first level of trustworthy data comprising at least one or more of: the device identification, the device position information, the device operation data and the heartbeat package information from the rental device;
the second level of trusted data includes at least one or more of: rental equipment operation information associated with the target financial asset and rental equipment anomalies associated with the target financial asset.
15. The system of claim 10, further comprising an attestation module to:
certifying to the financer and/or blockchain that the device with a trusted execution environment has a trusted execution environment, and certifying that the trusted execution environment has a virtual machine within that, the virtual machine capable of executing smart contracts for implementing financing lease transaction logic.
16. A system for monitoring equipment assets in a financing lease, comprising:
a third obtaining module: the system comprises a first-level trusted data acquisition module, a first-level trusted data acquisition module and a first-level trusted data acquisition module, wherein the first-level trusted data acquisition module is used for acquiring first-level trusted data and a digital signature thereof from at least one leasing device; the digital signature is generated based on the first-level trusted data and a private key of corresponding leasing equipment;
a verification module: the server is used for verifying that the digital signature is verified based on the first-level credible data and the public key of the corresponding leasing equipment;
a fourth obtaining module: the system comprises a database, a database and a server, wherein the database is used for storing the association relationship between the rental equipment and the financial assets;
the second data processing module: and the system is used for collating the first-level credible data acquired at the at least one leasing device to determine the first-level credible data of the at least one leasing device related to each financial asset based on the association relationship.
17. The system of claim 16, the first level of trust data comprising at least one or more of:
the device identification, the device location information, the device operational data, and heartbeat package information from the rental device.
18. The system of claim 16, the digital signature being generated in a secure element of the corresponding rental device based on the primary trusted data and a private key thereof.
19. A block chain based financing lease transaction apparatus comprising at least one storage medium and at least one processor, the at least one storage medium for storing computer instructions; the at least one processor is configured to execute the computer instructions to implement the method of any of claims 1-6.
20. An apparatus for monitoring equipment assets in a financing lease, comprising at least one storage medium and at least one processor, the at least one storage medium for storing computer instructions; the at least one processor is configured to execute the computer instructions to implement the method of any of claims 7-9.
CN202011151924.3A 2020-10-23 2020-10-23 Financing lease transaction processing method and system based on block chain Pending CN112200637A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011151924.3A CN112200637A (en) 2020-10-23 2020-10-23 Financing lease transaction processing method and system based on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011151924.3A CN112200637A (en) 2020-10-23 2020-10-23 Financing lease transaction processing method and system based on block chain

Publications (1)

Publication Number Publication Date
CN112200637A true CN112200637A (en) 2021-01-08

Family

ID=74011289

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011151924.3A Pending CN112200637A (en) 2020-10-23 2020-10-23 Financing lease transaction processing method and system based on block chain

Country Status (1)

Country Link
CN (1) CN112200637A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112988835A (en) * 2021-03-04 2021-06-18 支付宝(杭州)信息技术有限公司 Financing leasing equipment control method, system and device based on block chain
CN113010861A (en) * 2021-03-16 2021-06-22 支付宝(杭州)信息技术有限公司 Identity verification method and system in financing transaction based on block chain

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105247558A (en) * 2013-09-25 2016-01-13 株式会社日立系统 Procured funds management system and procured funds management method
CN107194778A (en) * 2017-05-25 2017-09-22 金立彦 Equipment leasing method and system based on block chain
CN109947848A (en) * 2019-01-30 2019-06-28 阿里巴巴集团控股有限公司 Card method and apparatus are deposited based on block chain
CN110322207A (en) * 2018-03-28 2019-10-11 中思博安科技(北京)有限公司 A kind of construction method and device of the intellectual capital management platform based on block chain
US20200005388A1 (en) * 2018-06-28 2020-01-02 International Business Machines Corporation Rental asset processing for blockchain
CN111090888A (en) * 2020-03-18 2020-05-01 支付宝(杭州)信息技术有限公司 Contract verification method and device
CN111127168A (en) * 2019-12-27 2020-05-08 国网上海市电力公司 Photovoltaic financing leasing method and system based on block chain and storage medium
US20200184548A1 (en) * 2018-12-07 2020-06-11 Honeywell International Inc. Systems and methods for leasing equipment or facilities using blockchain technology

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105247558A (en) * 2013-09-25 2016-01-13 株式会社日立系统 Procured funds management system and procured funds management method
CN107194778A (en) * 2017-05-25 2017-09-22 金立彦 Equipment leasing method and system based on block chain
CN110322207A (en) * 2018-03-28 2019-10-11 中思博安科技(北京)有限公司 A kind of construction method and device of the intellectual capital management platform based on block chain
US20200005388A1 (en) * 2018-06-28 2020-01-02 International Business Machines Corporation Rental asset processing for blockchain
US20200184548A1 (en) * 2018-12-07 2020-06-11 Honeywell International Inc. Systems and methods for leasing equipment or facilities using blockchain technology
CN109947848A (en) * 2019-01-30 2019-06-28 阿里巴巴集团控股有限公司 Card method and apparatus are deposited based on block chain
CN111127168A (en) * 2019-12-27 2020-05-08 国网上海市电力公司 Photovoltaic financing leasing method and system based on block chain and storage medium
CN111090888A (en) * 2020-03-18 2020-05-01 支付宝(杭州)信息技术有限公司 Contract verification method and device

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
周凯: "我国互联网融资租赁业务模式研究研究", 《财政金融》 *
杨汀: "物联网技术在融资租赁业的应用", 《中国流通经济》 *
王定祥: "区块链技术与信托租赁业融合发展机制", 《金融论坛》 *
王晓磊: "供应链金融模式与风险控制研究", 《中国优秀硕士学位论文全文数据库 (经济与管理科学辑)》 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112988835A (en) * 2021-03-04 2021-06-18 支付宝(杭州)信息技术有限公司 Financing leasing equipment control method, system and device based on block chain
CN113010861A (en) * 2021-03-16 2021-06-22 支付宝(杭州)信息技术有限公司 Identity verification method and system in financing transaction based on block chain

Similar Documents

Publication Publication Date Title
Asante et al. Distributed ledger technologies in supply chain security management: A comprehensive survey
US10789068B2 (en) System and method for verifying sequence of instructions of software
US11693979B2 (en) Dynamic permission assignment and enforcement for transport process
US20170046709A1 (en) Product tracking and control system
CN110569658B (en) User information processing method and device based on blockchain network, electronic equipment and storage medium
WO2020143312A1 (en) Data saving and querying method, apparatus, computer system and readable storage medium
US10771239B2 (en) Biometric threat intelligence processing for blockchains
WO2020169126A2 (en) Managing user authorizations for blockchain-based custom clearance services
AU2021231439A1 (en) Storage and communication environment for cryptographic tags
CN111868725B (en) Processing import customs clearance data based on blockchain
WO2020169123A2 (en) Blockchain-based smart contract pools
US10956204B1 (en) Free-riding node identification for blockchain
CN111460525B (en) Block chain-based data processing method, device and storage medium
US20220027803A1 (en) Sustainable tokens for supply chain with privacy preserving protocol
EP3841507A2 (en) User management of blockchain-based custom clearance service platform
CN111414434B (en) Block chain-based data transaction management network, transaction device and storage medium
US20220329436A1 (en) Token-based identity validation via blockchain
CN112200637A (en) Financing lease transaction processing method and system based on block chain
Campanile et al. Privacy regulations challenges on data-centric and iot systems: A case study for smart vehicles.
US20230092436A1 (en) Framework for demaraction of digital assets
CN112437133A (en) Data credible processing method and system based on block chain
Itani et al. Reputation as a service: A system for ranking service providers in cloud systems
CN112702410B (en) Evaluation system, method and related equipment based on blockchain network
CN113129017B (en) Information sharing method, device and equipment
Yi et al. CCUBI: A cross‐chain based premium competition scheme with privacy preservation for usage‐based insurance

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20210108

RJ01 Rejection of invention patent application after publication