CN114549194A - Right asset management service platform based on block chain and implementation method thereof - Google Patents

Right asset management service platform based on block chain and implementation method thereof Download PDF

Info

Publication number
CN114549194A
CN114549194A CN202111647128.3A CN202111647128A CN114549194A CN 114549194 A CN114549194 A CN 114549194A CN 202111647128 A CN202111647128 A CN 202111647128A CN 114549194 A CN114549194 A CN 114549194A
Authority
CN
China
Prior art keywords
asset
certificate
rule
rights
assets
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111647128.3A
Other languages
Chinese (zh)
Inventor
吕雯
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Tiancheng Tonglian Technology Co ltd
Original Assignee
Beijing Tiancheng Tonglian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Tiancheng Tonglian Technology Co ltd filed Critical Beijing Tiancheng Tonglian Technology Co ltd
Priority to CN202111647128.3A priority Critical patent/CN114549194A/en
Publication of CN114549194A publication Critical patent/CN114549194A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/219Managing data history or versioning
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services; Handling legal documents
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/0823Network architectures or network communication protocols for network security for authentication of entities using certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • H04L63/205Network architectures or network communication protocols for network security for managing network security; network security policies in general involving negotiation or determination of the one or more network security mechanisms to be used, e.g. by negotiation between the client and the server or between peers or by selection according to the capabilities of the entities involved
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1095Replication or mirroring of data, e.g. scheduling or transport for data synchronisation between network nodes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/12Protocols specially adapted for proprietary or special-purpose networking environments, e.g. medical networks, sensor networks, networks in vehicles or remote metering networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3263Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements
    • H04L9/3268Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving certificates, e.g. public key certificate [PKC] or attribute certificate [AC]; Public key infrastructure [PKI] arrangements using certificate validation, registration, distribution or revocation, e.g. certificate revocation list [CRL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/46Secure multiparty computation, e.g. millionaire problem
    • H04L2209/463Electronic voting
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Abstract

The invention discloses a block chain-based right asset management service platform and an implementation method thereof, wherein the platform comprises a data layer, a service layer and a display layer; the business layer is respectively connected with the data layer and the display layer; the service layer is used for managing the right asset transaction service of the platform; the display layer is used for displaying the rights asset management interface. The data layer comprises a management node, a peer-to-peer computing node, a distributed database, a data consensus node and a data encapsulation node; the peer computing nodes are used for caching files to participate in consensus, and the management node is used for organizing block packaging, generating asset certificates and matching transactions and broadcasting the completed transactions to other nodes. The invention provides a foundation for digitalization of the right assets by carrying out certification on the physical assets, improves credibility and circulation efficiency, realizes right confirmation, circulation and tracing of the right assets, guarantees the rights and interests of the right assets, and solves the inherent defects of difficult valuation of the right assets and opaque information.

Description

Right asset management service platform based on block chain and implementation method thereof
Technical Field
The invention relates to the technical field of block chains, in particular to a block chain-based right asset management service platform and an implementation method thereof.
Background
Rights assets, i.e., abstract assets resulting from contractual or other legal rights to a fixed or valuable asset, may be somewhat less transferable or separable from enterprise or other rights and obligations, but also have value to the owner, transferable and adjustable by their underlying asset deal or other contractual action. The right assets have a definite owner or controller, are an aggregate of rights that are expected to bring economic benefits, and belong to the category of assets. With the development of the internet and the market economy, the requirements of rights confirmation and regular rights confirmation of the rights assets appear, and the potential market requirements on the trading of the rights assets are rapidly developed.
The BlockChain (BlockChain) is also called as a distributed ledger technology, and is a technology which is based on five parts of a P2P network, cryptography, a consensus mechanism, an intelligent contract and distributed data storage and has the characteristics of decentralization, information non-tampering, multi-node deployment, openness, privacy protection and the like. The TOKEN (TOKEN) is a digital rights certificate operating on the basis of a block chain, is a mapping of digital rights of things in the real world, and has the value and right equivalent to the things, and also has the characteristics of authenticity, tamper resistance, privacy protection and the like. The true reliability of the certificate is ensured on the basis of cryptography. The first benefit brought by the certification of the right assets is the negotiability, the decentralized confirmation of the right asset circulation is realized, the confirmation of the transaction and the issuance are decoupled, meanwhile, the circulation barrier among industries is opened, a point-to-point transaction network is formed, and the transaction is greatly driven.
The traditional asset management framework has many disadvantages:
first, there is no management platform or system for clearly defining the rights assets in the market, and the traditional asset management platform is applied to physical assets and fails to mine the rights attribute value. The right assets and the target assets are not easy to peel off and difficult to evaluate, the power action boundary and the power action change are difficult to measure, the occurrence and circulation are not facilitated, and the innovation enthusiasm of property owners is also struck;
secondly, the method is limited by a centralized mode, the safety and reliability of data cannot be guaranteed, repeated mortgage is easy to realize, the data is opaque, and the financial risk is high; the information after asset digitization is easy to be tampered, the infringement is stolen, the right maintaining cost is high, the process is long, difficulty is caused for tracing the historical information, and the efficiency is low, so that how to guarantee the rights and the effectiveness of the right asset is an important problem to be solved at present;
finally, the data base of the assets is derived from the on-site inspection and off-site inspection supervision and submission of the financial institution, reflecting the past rather than current operating conditions of the financial institution. The development of information technology makes financial product innovation increasingly complicated, and the association degree and the product connectivity among financial institutions increase, which puts higher requirements on information sharing and cross risk monitoring among cross departments.
For example, patent application document CN202010038125.9 discloses an intangible asset management service platform based on a block chain, which comprises a data layer, a service layer and a display layer, wherein the service layer is connected with the data layer and the display layer respectively; the data layer comprises a TiDB node, a Fabric node and an IPFS node which are respectively used for caching a database, data on a management chain and data outside the management chain; the service layer comprises a certificate online authentication subsystem and a certificate generation tool, wherein the certificate online authentication subsystem is used for online authentication and management, processing requests related to the property rights of the intangible assets of the platform, monitoring the requests through a controller module, calling intangible asset property right services, requesting data and returning the data to the front end, and the certificate generation tool is used for generating a certificate; the display layer is used for interface display and comprises an intangible asset management interface, an intangible asset property right authentication interface and a certificate generation interface. Although the scheme can realize management of intangible assets, the scheme does not manage the right assets, and the rule version of the right assets is not taken as a core processing object when the asset management is carried out, so that the value circulation of the right assets cannot be accurately confirmed and evaluated.
Also, for example, patent application No. cn202010177433.x discloses an asset information management method and apparatus based on a blockchain, where the blockchain stores a target asset account corresponding to a target asset, the method including: constructing a business information entry transaction aiming at a target asset account, wherein the business information entry transaction comprises identification information of the target asset account and business information related to the target asset; sending the business information input transaction to the blockchain, so that node equipment of the blockchain calls the asset business information input logic in the intelligent contract, and writing the business information corresponding to the target asset into an account body of the target asset account; and calling service information auditing logic in the intelligent contract, executing auditing on the target service information based on the target service information and the target auditing rule, and writing an auditing result into the target asset account. Although the scheme can also perform asset information management based on the blockchain technology, the identity authentication and information verification comparison are not performed on the user in the asset management process, so that the scheme is to be improved in terms of data security.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides an authorized asset management service platform based on a block chain and an implementation method thereof, which realize the affirmation, circulation and tracing of authorized assets, ensure the rights and interests of the authorized assets and simultaneously overcome the problems that in the prior art, the assets are easy to be subjected to repeated mortgage, data are not transparent, financial risks are high, on-line flow is complicated, the period is long, node flow is not transparent, data cannot be shared between mechanisms, the assets are not easy to split, the valuation of the mortgage assets is inaccurate, the valuation is not easy to be reappeared and the like.
The purpose of the invention is realized by the following technical scheme:
a block chain-based right asset management service platform comprises a data layer, a business layer and a display layer, wherein the business layer is respectively connected with the data layer and the display layer; the data layer comprises a management node, a peer-to-peer computing node, a distributed database, a data consensus node and a data encapsulation node; the peer-to-peer computing nodes are used for caching files to participate in consensus, and the management node is used for organizing block packaging, generating asset evidence and matching transaction and broadcasting the completed transaction to the peer-to-peer computing nodes in the network; the distributed database is used for storing basic information of the rights assets, storing accounts and transaction data and ensuring the safety of the accounts and the transactions; the data consensus node is used for realizing the consistency of the transaction of the network nodes of the whole network and the data by utilizing a consensus algorithm; the data packaging node is used for packaging data in the processes of issuing, pricing and income distribution of asset certificates and destroying related intelligent contracts, algorithms and script programs; the service layer is used for managing the right asset transaction service of the platform; the display layer is used for displaying the rights asset management interface.
The business layer comprises a certificate online authentication subsystem, a certificate generation tool, an authorization transfer module, a third-party institution evaluation entrance and a certification-passing investor transaction module; the certificate online authentication subsystem is used for online authentication and management, processing requests related to property rights of assets of the platform, monitoring the requests through the controller module, calling asset property right services, requesting data and returning the data to the front end; the certificate generating tool is used for obtaining user information from the client, encrypting the right assets according to the provided private key and finally generating a certificate; the authorization transfer module is used for the certification issuing party to perform authorization transfer information interaction with the certification investor; the third-party institution evaluation entrance is used for the third-party institution to release the basic information of the entitlement assets; and the evidence-passing investor transaction module is used for carrying out the transaction transfer of asset evidence-passing among evidence-passing investors.
The display layer comprises an asset management interface, an asset property right authentication interface, a right item interface, a certificate generation interface, a certificate issuing interface, a certificate circulation interface and a certificate cashing interface; the data change on the interface in the presentation layer is processed by dispatches to operate the distribution module and notify the state management module.
Further, the block chain-based right asset management service platform further comprises a certificate tool and a wallet which are connected with the business layer, wherein the wallet is used for managing authorized user information, a signature tool and a data encryption key.
The block chain-based right asset management service platform comprises a registration module, a system login entry and a corresponding system login account, wherein the registration module is used for providing a system registration entry for a financing party, a financial institution and an authentication institution and generating a block chain wallet account.
The right asset management service platform based on the block chain is further provided with an information security guarantee system and a flexible supervision audit system. The information security guarantee system is used for carrying out risk identification and security detection in the platform operation process, carrying out security response on the found potential safety hazards and threat attack behaviors, generating a security defense strategy and carrying out security recovery. The flexible supervision auditing system is used for realizing data tamper resistance, record backtracking, and whole-network broadcasting and encryption of data.
An implementation method of an entitlement asset management service platform based on a block chain is used for implementing the entitlement asset management service platform based on the block chain, and comprises the following steps: the method comprises the following steps of asset registration, certificate generation, certificate verification and right asset comparison, right asset authentication, right asset rule management, right item tracing and right asset certification issuing; the management of the right asset rule specifically comprises the following steps:
e1, initial entitlement rule settings: the controller of the entitlement asset selects the registered entitlement asset in the asset list thereof, inputs an initial entitlement contract attribute attached to the asset, the initial entitlement contract attribute comprising the percentage of the entitlement, the scope of action and the validation condition, and submits the registered entitlement asset and the initial entitlement contract attribute to the blockchain;
e2, relevant rights party confirmation: relevant stakeholders sharing the right assets commonly log in to enter a platform, a right asset rule to be confirmed is selected from personal backlogs, the confirmed proportion progress is checked, the appointed rule item is checked, confirmation is carried out after no mistake is found, and meanwhile, the confirmation action is carried out to link up and store evidence according to the operation time;
e3, initiating an entitlement rule change: the controller of the rights asset exercises the right according to the original right rule, initiates a change proposal to the right rule item, inputs a newly added right rule term or deletes or modifies the original right rule term, and asks a consistent actor sharing the rights asset to make a resolution;
e4, consensus actor vote: the consignor of each right asset votes for the rule change items submitted by the asset controller according to the wishes of all parties, and if the total number of the change items agrees to reach or exceed the minimum proportion agreed in the original rule, the new asset rule takes effect;
e5, rights rule version update: after the new asset rule takes effect, all right asset rule items are changed into the latest description, and the right asset and the rules thereof form a new version according to the voting effect time and are recorded in the block chain distributed account book;
e6, rights rule version tracing: and sequentially displaying the rights asset version and the rule version according to the changed time attribute through the block chain, and tracing the version change condition and checking whether the rule change is in compliance by an inquirer.
The asset registration specifically comprises the steps of:
a1, the asset controller user enters the asset registration interface through the platform entrance, inputs the user name and carries out identity authentication;
a2, if passing the identity authentication, inputting the specific content of the registered right asset, wherein the content comprises the asset target, ownership, right item, obligation and asset certification material;
a3, carrying out asset right confirmation through registration, confirming the responsibility main body of the subsequent asset transaction through the platform, and carrying out the whole network broadcast by the management node after the assets are registered on the blockchain;
a 4. if the asset is shared by several principals, the investor must submit an asset rights rule document and be confirmed by all the conforming actors except the investor before they can be confirmed by the platform.
The certificate generation specifically comprises the following steps:
b1, the user enters a certificate generating interface through a certificate tool, inputs a user name and performs wallet authentication;
b2, if the wallet is authenticated, entering and submitting the asset rights file path; if the authentication fails, inputting a private key file path of the user, and then inputting an asset authority file path and submitting;
b3, carrying out block chain encryption on the asset right file to generate a corresponding unique hash value;
b4, encrypting rsa the hash value and the user private key to generate a user signature;
b5, generating a block format file by the user signature, the hash and the time stamp, writing the file into a specified path, and feeding back the result on the interface.
Comparing the certificate of authenticity with the rights asset specifically comprises the steps of:
c1, inputting a file path and a certificate path in the verification interface and starting verification;
c2, carrying out block chain encryption on the software to generate a hash, analyzing the certificate file and acquiring a hash value;
c3, comparing the two hash values to judge whether the assets are original rights assets marked by the certificate.
The process of authenticating a rights asset includes the sub-steps of:
d1, checking the identity authority of the user wallet to obtain the authority of accessing the block chain;
d2, selecting the type of authentication by the user with access right, wherein the type of authentication comprises the authentication of a new right asset and the updating of the version of the right asset with the existing right rule;
d3, uploading the information of the authentication by the right asset owner, if the type selected by the right asset owner is the version for updating the existing right asset, keeping the information of the last version;
d4, uploading the certificate to the network by the right asset owner, acquiring the content to generate a hash address, and uploading a submission authentication form;
d5, the back end acquires the public key and then acquires the certificate file and analyzes the certificate file through the returned hash value to acquire the digital signature;
d6, decrypting the digital signature by the public key, comparing the hash value of the digital signature with the returned hash value, judging whether the hash value is consistent with the returned hash value, intercepting if the hash value is inconsistent with the returned hash value, finally storing the information of the right asset into the block chain network, generating the id number of the right asset, and storing all the registration information and the right rule onto the block chain together through the intelligent contract.
The rights item tracing specifically comprises the following steps:
f1, initiating entitlement item: according to the asset right relation body with the qualified rules, voting can be initiated in a manner of submitting the rights items, and the proposed items are voted, so that the voting condition meeting the agreement of the asset rules is met, namely the items take effect;
f2, vote resolution: the consignee of each right asset votes for the right items submitted by the asset controller according to the wishes of all parties, and if the total number of the agreed changes reaches or exceeds the minimum proportion agreed in the original rule, the item application is passed;
f3, item determination: the method comprises the following steps that the items of rights submitted by an asset controller are divided into items related to asset ownership and irrelevant items, and whether the item content relates to ownership proportion change needs to be judged specifically;
f4, transaction execution: the method comprises the following steps that (1) when the situation that an identical actor increases or decreases the holding is involved, if an investor who conducts asset transfer or change purchases through an investment relation and protocol mode, the change of shares which indirectly own the right reaches the previous specified proportion, the investor becomes the identical actor of the asset, and if the change exceeds the control right proportion agreed by the original rule, the investor becomes the asset controller;
f5, event tracking and tracing: according to the time attribute of the event process, the right events are sequentially displayed, and an inquirer can trace the voting condition of the events and check whether the rules are met.
The certification asset certification issuing specifically comprises the following steps:
g 1: acquiring data of assets to be mortared, identifying whether the assets to be mortared are mortgaged or not, if the assets to be mortgaged are verified to be not mortgaged, initiating a value evaluation item voting request, and carrying out item voting on the assets to be mortgaged by an actor;
g 2: if the assets to be mortgage are not mortgaged, applying for the financial institution to evaluate the value of the assets to be mortgage, wherein the asset evaluation mainly comprises the following contents: the method comprises the following steps that the time limit structure, the property of the asset, the risk coefficient of the asset, the principal fund and the operation profit of the asset are formed, and the contents form the basic information of the asset and link up the evaluation value;
g 3: the financial institution acquires a certification issuing request submitted by a financing party and an asset certification file for mortgage, verifies the asset certification file and firstly checks whether the asset certification file is valid; secondly, checking whether the value of the asset file is matched with the issuing amount in the certificate passing issuing request or not, if the asset file is in the valid period and the value of the asset is matched with the certificate passing amount in the issuing request, passing the verification, otherwise, failing to pass the verification; if the verification is passed, issuing an asset pass certificate to the financing party, and receiving an asset certificate file original;
g 4: asset card holding events include transfer, cash, dividend, transfer, buyback, and logoff.
The method for realizing the right asset management service platform based on the block chain further comprises an asset evidence circulation process, and the process specifically comprises the following steps:
h1, splitting the asset evidence, using part of the quota to send a transaction request to different transaction parties after splitting, and borrowing by using the asset evidence as a mortgage by a holding party to a financial institution;
h2, the voucher sponsor redeems the mortgage assets through the repurchase of the voucher, and the voucher limit can be cleared once or returned in batches within the valid period of the voucher.
h3, the evidence holder obtains all the occupation ratios of the right given in the property rule, the disposition of the mortgage property is carried out by initiating the rights item, if the property evidence issued by the evidence holder can not be redeemed or the validity period of the property evidence is passed, the property ownership is changed to be held by the financial institution of the property mortgage, and the property evidence is destroyed;
h4, if the financial institution acquires the repayment request of the voucher issuer, checking whether the voucher issuer repays, if the repayment is confirmed, inquiring a repayment amount unit and giving the asset voucher transaction corresponding to the repayment amount unit to the financing party.
The invention has the beneficial effects that:
(1) according to the technical scheme, the real asset and the right asset are anchored, so that the right confirmation of the right asset is facilitated, data are collected and transmitted through a digital channel, and a fair and open transmission way is provided for the asset anchoring. The asset registration is public and transparent, and data are stored in a block chain network and are not easy to be tampered;
(2) the technical scheme of the invention combines the intelligent contract of the block chain and the right assets with exchange value, and provides compliance management for the rule and item design, initiation and execution of the uplink assets. Meanwhile, the tracing process is unified and standard, so that the supervision is easy, the supervision period is shortened, and the financial risk is reduced;
(3) the technical scheme of the invention solves the inherent defects of difficult evaluation of the right assets and opaque information, the platform introduces a block chain technology, the data is transparent, verifiable and traceable, the reliability of the service is increased, the establishment of a trust foundation among enterprises is helped, a block chain network-based approach is provided for asset pricing and circulation, the asset value is anchored by using the evidence, and the service flow efficiency is improved by an intelligent contract;
(4) according to the technical scheme, the block chain accreditation has the right assets to carry out endorsements, and the problems of high risk and unstable accreditation price of the current virtual currency are solved. Assets can be re-valued during mortgages, reducing financial risk/improving user experience;
(5) according to the technical scheme, the physical assets are certified, a foundation is provided for digitalization of the right assets, credibility and circulation efficiency are improved, and the certified assets are easy to split and can be borrowed and credited flexibly.
Drawings
FIG. 1 is a diagram of the platform architecture of the present invention.
FIG. 2 is a flow chart of a platform implementation method of the present invention.
Detailed Description
The following detailed description is given to select technical features, objects and advantages of the present invention in order to make the technical features, objects and advantages of the present invention more clearly understood. It should be understood that the embodiments described are illustrative of some, but not all embodiments of the invention, and are not to be construed as limiting the scope of the invention. All other embodiments that can be obtained by a person skilled in the art based on the embodiments of the present invention without any inventive step are within the scope of the present invention.
In order to overcome the problems that assets are easy to repeatedly mortgage, data are opaque, financial risks are high, on-line flow is complicated, the period is long, node flow is opaque, data cannot be shared between mechanisms, assets are not prone to being split, mortgage asset valuation is not accurate, valuation is not prone to being re-valued and the like in the prior art, the invention designs the right asset management service platform based on the block chain and the implementation method thereof, so that the right, circulation and tracing of the right assets are realized, the rights and interests of the right assets are guaranteed, and the implementation process of the specific technical scheme is shown in the following embodiment.
The first embodiment is as follows:
in this embodiment, as shown in fig. 1, an entitlement asset management service platform based on a block chain includes a data layer, a business layer, and a presentation layer, where the business layer is connected to the data layer and the presentation layer, respectively. The data layer comprises a management node, a peer-to-peer computing node, a distributed database, a data consensus node and a data encapsulation node; the peer-to-peer computing nodes are used for caching files to participate in consensus, and the management node is used for organizing block packaging, generating asset evidence and matching transaction and broadcasting the completed transaction to the peer-to-peer computing nodes in the network; (ii) a The distributed database is used for storing basic information of the rights assets, storing accounts and transaction data and ensuring the safety of the accounts and the transactions; the data consensus node is used for realizing the consistency of the transaction of the network nodes of the whole network and the data by utilizing a consensus algorithm; the data packaging node is used for packaging data in the processes of issuing, pricing and income distribution of asset certificates and destroying related intelligent contracts, algorithms and script programs; the service layer is used for managing the right asset transaction service of the platform; the display layer is used for displaying the rights asset management interface.
The business layer comprises a certificate online authentication subsystem, a certificate generation tool, an authorization transfer module, a third-party institution evaluation entrance and a certification-passing investor transaction module; the certificate online authentication subsystem is used for online authentication and management, processing requests related to property rights of assets of the platform, monitoring the requests through the controller module, calling asset property right services, requesting data and returning the data to the front end; the certificate generating tool is used for obtaining user information from the client, encrypting the right assets according to the provided private key and finally generating a certificate; the authorization transfer module is used for the certification issuing party to perform authorization transfer information interaction with the certification investor; the third-party institution evaluation entrance is used for the third-party institution to release the basic information of the entitlement assets; and the evidence-passing investor transaction module is used for carrying out the transaction transfer of asset evidence-passing among evidence-passing investors.
The display layer comprises an asset management interface, an asset property right authentication interface, a rights item interface, a certificate generation interface, a certificate issuing interface, a certificate circulation interface and a certificate cashing interface; the data change on the interface in the presentation layer is processed by dispatches to operate the distribution module and notify the state management module.
Further, the block chain-based right asset management service platform further comprises a certificate tool and a wallet which are connected with the business layer, wherein the wallet is used for managing authorized user information, a signature tool and a data encryption key.
The block chain-based right asset management service platform comprises a registration module, and is mainly used for providing system registration entries for financers (enterprises/individuals), financial institutions and authentication institutions, and generating system login accounts for the system and block chain wallet accounts, wherein the system login accounts comprise information of identity IDs, identity addresses, public keys and private keys.
In this embodiment, the entitlement asset management service platform based on the blockchain is further provided with an information security guarantee system and a flexible supervision audit system. The information security guarantee system is used for carrying out risk identification and security detection in the platform operation process, carrying out security response on the found potential safety hazards and threat attack behaviors, generating a security defense strategy and carrying out security recovery.
Wherein, information security guarantee system includes: risk identification (inventory), security defense (Protect), security detection (Detect), security Response (Response), and security Recovery (Recovery). The safety of the four aspects of the system is mainly maintained: firstly, the website operation monitoring protection. Websites are important channels for enterprises to provide online services (such as registration, login, transaction and the like provided by trading exchanges), and face risks of being implanted into backdoors, webpage tampering, DDoS attacks, website phishing and the like. Penetration testing is required, and an effective protection strategy is formulated, so that insufficient or waste of protection resources of a website is prevented, and the optimal protection effect and input-output ratio are achieved; secondly, the security of the digital wallet protection customized private key is the security of the digital assets, and the digital wallet is a management container of the private key, so that different protection technologies are adopted according to the wallet form, and safety measures are adopted in the aspects of design, operation environment, data storage security and the like. And thirdly, the full life cycle of the intelligent contract. The intelligent contract based on the block chain comprises the steps of constructing, storing and executing, including correctness testing and consistency testing, verifying whether a test result is consistent with an expected result of the contract or not, analyzing an abnormal reason once an abnormality is found, and taking corresponding response measures. Fourthly, unified safety control of system operation. The block chain system comprises a website, a mobile App, a database, an intelligent contract and other components and applications, the safety control of the system can quickly discover various threat attacks and potential safety hazards, and meanwhile relevant safety protection strategies are formulated and issued at the first time.
The flexible supervision auditing system is used for realizing data tamper resistance and record backtracking, and data whole-network broadcasting and encryption, and mainly comprises distributed accounts, whole-network broadcasting, time stamping, encryption mechanisms and other technical kernels contained in a block chain and has deeper conjunction with the internal optimization requirements of a supervision mechanism. On one hand, the chain accounting mode can realize data tamper resistance and record backtracking, and ensure the reality and transparency of financial business data and supervision data from generation to use in different links; on the other hand, the whole network broadcasting and encryption mechanism provides an effective way for a monitoring organization to acquire real-time data, and the accident risk prevention and control capability of the monitoring rules is improved by using intelligent contracts.
Example two:
in this embodiment, a method for implementing a block chain-based right asset management service platform is used to implement a block chain-based right asset management service platform in the first embodiment, and as shown in fig. 2, the method mainly includes the following steps: asset enrollment, generating certificates, comparing validation certificates and entitlement assets, authenticating entitlement assets, entitlement asset rule management, entitlement item tracing, and entitlement asset credentialing issuance.
The method specifically comprises the following steps:
e1, initial entitlement rule settings: the controller of the entitlement asset selects the registered entitlement asset in the asset list thereof, inputs an initial entitlement contract attribute attached to the asset, the initial entitlement contract attribute comprising the percentage of the entitlement, the scope of action and the validation condition, and submits the registered entitlement asset and the initial entitlement contract attribute to the blockchain;
e2, relevant rights party confirmation: relevant stakeholders sharing the right assets commonly log in to enter a platform, a right asset rule to be confirmed is selected from personal backlogs, the confirmed proportion progress is checked, the appointed rule item is checked, confirmation is carried out after no mistake is found, and meanwhile, the confirmation action is carried out to link up and store evidence according to the operation time;
e3, initiating an entitlement rule change: the controller of the rights asset exercises the right according to the original right rule, initiates a change proposal to the right rule item, inputs a newly added right rule term or deletes or modifies the original right rule term, and asks a consistent actor sharing the rights asset to make a resolution;
e4, consensus actor vote: the consignor of each right asset votes for the rule change items submitted by the asset controller according to the wishes of all parties, and if the total number of the change items agrees to reach or exceed the minimum proportion agreed in the original rule, the new asset rule takes effect;
e5, rights rule version update: after the new asset rule takes effect, all right asset rule items are changed into the latest description, and the right asset and the rules thereof form a new version according to the voting effect time and are recorded in the block chain distributed account book;
e6, rights rule version tracing: and sequentially displaying the rights asset version and the rule version according to the changed time attribute through the block chain, and tracing the version change condition and checking whether the rule change is in compliance by an inquirer.
The asset registration specifically comprises the steps of:
a1, the asset controller user enters the asset registration interface through the platform entrance, inputs the user name and carries out identity authentication;
a2, if passing the identity authentication, inputting the concrete content of the registered rights asset, wherein the content comprises the material of the title, ownership, rights item, obligation and asset certification;
a3, carrying out asset right confirmation through registration, confirming responsibility main bodies of subsequent asset transactions through a platform, and carrying out whole-network broadcasting by a management node after the assets are registered on a blockchain;
a 4. if the asset is shared by several principals, the investor must submit an asset rights rule document and be confirmed by all the conforming actors except the investor before they can be confirmed by the platform.
The certificate generation specifically comprises the following steps:
b1, the user enters a certificate generating interface through a certificate tool, inputs a user name and performs wallet authentication;
b2, if the wallet is authenticated, entering and submitting the asset rights file path; if the authentication fails, inputting a private key file path of the user, and then inputting an asset authority file path and submitting;
b3, carrying out block chain encryption on the asset right file to generate a corresponding unique hash value;
b4, encrypting rsa the hash value and the user private key to generate a user signature;
b5, generating a block format file by the user signature, the hash and the time stamp, writing the file into a specified path, and feeding back the result on the interface.
Comparing the certificate of authenticity to the rights asset specifically comprises the steps of:
c1, inputting a file path and a certificate path in the verification interface and starting verification;
c2, carrying out block chain encryption on the software to generate a hash, analyzing the certificate file and acquiring a hash value;
c3, comparing the two hash values to judge whether the asset is the original right asset identified by the certificate.
The process of authenticating a rights asset includes the sub-steps of:
d1, checking the identity authority of the user wallet to obtain the authority of accessing the block chain;
d2, selecting the type of authentication by the user with access right, wherein the type of authentication comprises the authentication of a new entitlement asset and the updating of the version of the entitlement asset with the existing entitlement rules;
d3, uploading the information of the authentication by the right asset owner, if the type selected by the right asset owner is the version for updating the existing right asset, keeping the information of the last version;
d4, uploading the certificate to the network by the right asset owner, acquiring the content to generate a hash address, and uploading a submission authentication form;
d5, the back end acquires the public key and then acquires the certificate file and analyzes the certificate file through the returned hash value to acquire the digital signature;
d6, decrypting the digital signature by the public key, comparing the hash value of the digital signature with the returned hash value, judging whether the hash value is consistent with the returned hash value, intercepting if the hash value is inconsistent with the returned hash value, finally storing the information of the right asset into the block chain network, generating the id number of the right asset, and storing all the registration information and the right rule onto the block chain together through the intelligent contract.
The rights item tracing specifically comprises the following steps:
f1, initiating entitlement item: according to the asset right relation body qualified by the rules, voting can be initiated in a manner of submitting the authority items, and the proposed items are voted, so that the voting condition meeting the asset rule convention is effective;
f2, vote resolution: the consignee of each right asset votes for the right items submitted by the asset controller according to the wishes of all parties, and if the total number of the agreed changes reaches or exceeds the minimum proportion agreed in the original rule, the item application is passed;
f3, item determination: the method comprises the following steps that the items of rights submitted by an asset controller are divided into items related to asset ownership and irrelevant items, and whether the item content relates to ownership proportion change needs to be judged specifically;
f4, transaction execution: the method comprises the following steps that (1) when the situation that an identical actor increases or decreases the holding is involved, if an investor who conducts asset transfer or change purchases through an investment relation and protocol mode, the change of shares which indirectly own the right reaches the previous specified proportion, the investor becomes the identical actor of the asset, and if the change exceeds the control right proportion agreed by the original rule, the investor becomes the asset controller;
f5, event tracking and tracing: according to the time attribute of the event process, the right events are sequentially displayed, and an inquirer can trace the voting condition of the events and check whether the rules are met.
The certification asset certification issuing specifically comprises the following steps:
g 1: acquiring data of assets to be mortared, identifying whether the assets to be mortared are mortgaged or not, if the assets to be mortgaged are verified to be not mortgaged, initiating a value evaluation item voting request, and carrying out item voting on the assets to be mortgaged by an actor;
g 2: if the assets to be mortared are not mortgaged, applying the financial institution to evaluate the value of the assets to be mortgaged, wherein the asset evaluation mainly comprises the following contents: the method comprises the following steps that the time limit structure, the property of the asset, the risk coefficient of the asset, the principal fund and the operation profit of the asset are formed, and the contents form the basic information of the asset and link up the evaluation value;
g 3: the financial institution acquires a certification issuing request submitted by a financing party and an asset certification file for mortgage, verifies the asset certification file and firstly checks whether the asset certification file is valid; secondly, checking whether the value of the asset file is matched with the issuing amount in the certificate passing issuing request or not, if the asset file is in the valid period and the value of the asset is matched with the certificate passing amount in the issuing request, passing the verification, otherwise, failing to pass the verification; if the verification is passed, issuing an asset pass certificate to the financing party, and receiving an asset certificate file original;
g 4: asset card holding events include transfer, cash, dividend, transfer, buyback, and logoff.
The method for realizing the right asset management service platform based on the block chain further comprises an asset evidence circulation process, and the process specifically comprises the following steps:
h1, splitting the asset evidence, using part of the quota to send a transaction request to different transaction parties after splitting, and borrowing by using the asset evidence as a mortgage by a holding party to a financial institution;
h2, the voucher sponsor redeems the mortgage assets through the repurchase of the voucher, and the voucher limit can be cleared once or returned in batches within the valid period of the voucher.
h3, the evidence holder obtains all the occupation ratios of the right given in the property rule, the disposition of the mortgage property is carried out by initiating the rights item, if the property evidence issued by the evidence holder can not be redeemed or the validity period of the property evidence is passed, the property ownership is changed to be held by the financial institution of the property mortgage, and the property evidence is destroyed;
h4, if the financial institution acquires the repayment request of the voucher issuer, checking whether the voucher issuer repays, if the repayment is confirmed, inquiring a repayment amount unit and giving the asset voucher transaction corresponding to the repayment amount unit to the financing party.
As can be seen from the technical solutions in the first and second embodiments, compared with the cited patents CN202010038125.9 and cn202010177433.x, the technical solution of the present invention has the following advantages:
(1) the invention takes the rule version of the right asset as a core processing object, the platform business logic flow establishes the authority of a relation person around the right asset rule and executes the right item according to the authority, and the right asset evaluation is based on the anchored physical asset and establishes a value system by the mutual confirmation of the right asset and an actor and the original certification certificate of a block chain; b: the initiation, voting and validation of entitlement rules and entitlement items are processed through a block chain intelligent contract, entitlement rule logic is automatically written into the intelligent contract, and confirmation and evaluation of entitlement asset value circulation are facilitated by calculating the share and authority of an actor occupying entitlement assets and applying block chain traceability.
(2) The right asset of the invention is different from the definition range of the current physical asset and intangible asset, by anchoring the existing asset, defining and quantifying the driving capability of the main right derived from the valuable object, and simultaneously providing a penetrating supervision auditing means based on a block chain, the property of the right asset and the historical track of the driving right of the asset owner can be intuitively embodied without intervening the business process, the infringement behavior of the asset can be identified, and the invention is favorable for better maintaining the subsidiary benefit of the property right.
The foregoing shows and describes the general principles, essential features, and advantages of the invention. It will be understood by those skilled in the art that the present invention is not limited to the embodiments described above, which are described in the specification and illustrated only to illustrate the principle of the present invention, but that various changes and modifications may be made therein without departing from the spirit and scope of the present invention, which fall within the scope of the invention as claimed. The scope of the invention is defined by the appended claims and equivalents thereof.

Claims (15)

1. The block chain-based right asset management service platform is characterized by comprising a data layer, a business layer and a display layer, wherein the business layer is connected with the data layer and the display layer respectively; the data layer comprises a management node, a peer-to-peer computing node, a distributed database, a data consensus node and a data encapsulation node; the peer-to-peer computing nodes are used for caching files to participate in consensus, and the management node is used for organizing block packaging, generating asset certificates and matching transactions and broadcasting the completed transactions to the peer-to-peer computing nodes in the network; the distributed database is used for storing basic information of the rights assets, storing accounts and transaction data and ensuring the safety of the accounts and the transactions; the data consensus node is used for realizing the consistency of the transaction of the network nodes of the whole network and the data by utilizing a consensus algorithm; the data packaging node is used for packaging data in the processes of issuing, pricing and income distribution of asset certificates and destroying related intelligent contracts, algorithms and script programs; the service layer is used for managing the right asset transaction service of the platform; the display layer is used for displaying the rights asset management interface.
2. The block chain-based right asset management service platform according to claim 1, wherein the business layer comprises a certificate online authentication subsystem, a certificate generation tool, an authorization circulation module, a third party institution evaluation portal and a certification investor transaction module; the certificate online authentication subsystem is used for online authentication and management, processing requests related to property rights of assets of the platform, monitoring the requests through the controller module, calling asset property right services, requesting data and returning the data to the front end; the certificate generating tool is used for obtaining user information from the client, encrypting the right assets according to the provided private key and finally generating a certificate; the authorization transfer module is used for the certification issuing party to perform authorization transfer information interaction with the certification investor; the third-party institution evaluation entrance is used for the third-party institution to release the basic information of the entitlement assets; and the evidence-passing investor transaction module is used for carrying out the transaction transfer of asset evidence-passing among evidence-passing investors.
3. The block chain-based rights asset management service platform of claim 1, wherein the display layer comprises an asset management interface, an asset property authentication interface, a rights item interface, a certificate generation interface, a certificate issuance interface, a certificate circulation interface and a certificate redemption interface; the data change on the interface in the presentation layer is processed by dispatches to operate the distribution module and notify the state management module.
4. The blockchain-based entitlement asset management service platform according to claim 1, further comprising a certificate tool and a wallet connected to said business layer, wherein the wallet is used for managing authorized user information, signature tools and data encryption keys.
5. The blockchain-based rights asset management service platform of claim 1, further comprising a registration module for providing system registration entries for financers, financial institutions, and accreditation institutions, and generating corresponding system login accounts and blockchain wallet accounts.
6. The block chain-based right asset management service platform according to claim 1, further comprising an information security guarantee system, configured to perform risk identification and security detection in the platform operation process, perform security response on the discovered potential safety hazard and threat attack behavior, generate a security defense policy, and perform security recovery.
7. The block chain-based rights asset management service platform according to claim 1, further comprising a flexible supervision audit system for implementing data tamper resistance and record traceability, and data network-wide broadcasting and encryption.
8. An implementation method of a block chain-based entitlement asset management service platform, which is used for implementing the block chain-based entitlement asset management service platform according to any one of claims 1 to 7, and comprises the following steps: the method comprises the following steps of asset registration, certificate generation, certificate verification and right asset comparison, right asset authentication, right asset rule management, right item tracing and right asset certification issuing; the management of the right asset rule specifically comprises the following steps:
e1, initial entitlement rule settings: the controller of the entitlement asset selects the registered entitlement asset in the asset list thereof, inputs an initial entitlement contract attribute attached to the asset, the initial entitlement contract attribute comprising the percentage of the entitlement, the scope of action and the validation condition, and submits the registered entitlement asset and the initial entitlement contract attribute to the blockchain;
e2, relevant rights party confirmation: relevant stakeholders sharing the right assets commonly log in to enter a platform, a right asset rule to be confirmed is selected from personal backlogs, the confirmed proportion progress is checked, the appointed rule item is checked, confirmation is carried out after no mistake is found, and meanwhile, the confirmation action is carried out to link up and store evidence according to the operation time;
e3, initiating an entitlement rule change: the controller of the rights asset exercises the right according to the original right rule, initiates a change proposal to the right rule item, inputs a newly added right rule term or deletes or modifies the original right rule term, and asks a consistent actor sharing the rights asset to make a resolution;
e4, consensus actor vote: the consignor of each right asset votes for the rule change items submitted by the asset controller according to the wishes of all parties, and if the total number of the change items agrees to reach or exceed the minimum proportion agreed in the original rule, the new asset rule takes effect;
e5, rights rule version update: after the new asset rule takes effect, all the items of the right asset rule are changed into the latest description, and the right asset and the rules thereof form a new version according to the voting effect time and are recorded in the block chain distributed ledger;
e6, rights rule version tracing: and sequentially displaying the rights asset version and the rule version according to the changed time attribute through the block chain, and tracing the version change condition and checking whether the rule change is in compliance by an inquirer.
9. The method as claimed in claim 8, wherein the asset registration specifically comprises the following steps:
a1, the asset controller user enters the asset registration interface through the platform entrance, inputs the user name, and performs the identity authentication;
a2, if passing the identity authentication, inputting the specific content of the registered right asset, wherein the content comprises the asset target, ownership, right item, obligation and asset certification material;
a3, carrying out asset right confirmation through registration, confirming responsibility main bodies of subsequent asset transactions through a platform, and carrying out whole-network broadcasting by a management node after the assets are registered on a blockchain;
a 4. if the asset is shared by several principals, the investor must submit an asset rights rule document and be confirmed by all the conforming actors except the investor before they can be confirmed by the platform.
10. The method for implementing a block chain-based entitlement asset management service platform according to claim 8, wherein the generating a certificate specifically includes the following steps:
b1, the user enters a certificate generating interface through a certificate tool, inputs a user name and performs wallet authentication;
b2, if the wallet is authenticated, entering and submitting the asset rights file path; if the authentication fails, inputting a private key file path of the user, and then inputting an asset authority file path and submitting;
b3, carrying out block chain encryption on the asset right file to generate a corresponding unique hash value;
b4, encrypting rsa the hash value and the user private key to generate a user signature;
b5, generating a block format file by the user signature, the hash and the time stamp, writing the file into a specified path, and feeding back the result on the interface.
11. The method as claimed in claim 8, wherein the comparing the certificate of authenticity with the rights asset comprises the following steps:
c1, inputting a file path and a certificate path in the verification interface and starting verification;
c2, carrying out block chain encryption on the software to generate a hash, analyzing the certificate file and acquiring a hash value;
c3, comparing the two hash values to judge whether the asset is the original right asset identified by the certificate.
12. The block chain-based entitlement asset management service platform implementation method according to claim 8, wherein the process of authenticating the entitlement asset comprises the following sub-steps:
d1, checking the identity authority of the user wallet to obtain the authority of accessing the block chain;
d2, selecting the type of authentication by the user with access right, wherein the type of authentication comprises the authentication of a new right asset and the updating of the version of the right asset with the existing right rule;
d3, uploading the information of the authentication by the right asset owner, if the type selected by the right asset owner is the version for updating the existing right asset, keeping the information of the last version;
d4, uploading the certificate to the network by the right asset owner, acquiring the content to generate a hash address, and uploading a submission authentication form;
d5, the back end acquires the public key and then acquires the certificate file and analyzes the certificate file through the returned hash value to acquire the digital signature;
d6, decrypting the digital signature by the public key, comparing the hash value of the digital signature with the returned hash value, judging whether the hash value is consistent with the returned hash value, intercepting if the hash value is inconsistent with the returned hash value, finally storing the information of the right asset into the block chain network, generating the id number of the right asset, and storing all the registration information and the right rule onto the block chain together through the intelligent contract.
13. The method for implementing a block chain-based entitlement asset management service platform according to claim 8, wherein the entitlement item tracking specifically comprises the following steps:
f1, initiating entitlement item: according to the asset right relation body with the qualified rules, voting can be initiated in a manner of submitting the rights items, and the proposed items are voted, so that the voting condition meeting the agreement of the asset rules is met, namely the items take effect;
f2, vote resolution: the consignee of each right asset votes for the right items submitted by the asset controller according to the wishes of all parties, and if the total number of the agreed changes reaches or exceeds the minimum proportion agreed in the original rule, the item application is passed;
f3, item determination: the method comprises the following steps that the items of rights submitted by an asset controller are divided into items related to asset ownership and irrelevant items, and whether the item content relates to ownership proportion change needs to be judged specifically;
f4, transaction execution: the method comprises the following steps that (1) when the situation that an identical actor increases or decreases the holding is involved, if an investor who conducts asset transfer or change purchases through an investment relation and protocol mode, the change of shares which indirectly own the right reaches the previous specified proportion, the investor becomes the identical actor of the asset, and if the change exceeds the control right proportion agreed by the original rule, the investor becomes the asset controller;
f5, event tracking and tracing: according to the time attribute of the event process, the right events are sequentially displayed, and an inquirer can trace the voting condition of the events and check whether the rules are met.
14. The method as claimed in claim 8, wherein the step of certifying the issuance of the asset certificate comprises the following steps:
g 1: acquiring data of assets to be mortared, identifying whether the assets to be mortared are mortgaged or not, if the assets to be mortgaged are verified to be not mortgaged, initiating a value evaluation item voting request, and carrying out item voting on the assets to be mortgaged by an actor;
g 2: if the assets to be mortared are not mortgaged, applying the financial institution to evaluate the value of the assets to be mortgaged, wherein the asset evaluation mainly comprises the following contents: the method comprises the following steps that the time limit structure, the property of the asset, the risk coefficient of the asset, the principal fund and the operation profit of the asset are formed, and the contents form the basic information of the asset and link up the evaluation value;
g 3: the financial institution acquires a certification issuing request submitted by a financing party and an asset certification file for mortgage, verifies the asset certification file and firstly checks whether the asset certification file is valid; secondly, checking whether the value of the asset file is matched with the issuing amount in the certificate passing issuing request or not, if the asset file is in the valid period and the value of the asset is matched with the certificate passing amount in the issuing request, passing the verification, otherwise, failing to pass the verification; if the verification is passed, issuing an asset pass certificate to the financing party, and receiving an asset certificate file original;
g 4: asset card holding events include transfer, cash, dividend, transfer, buyback, and logoff.
15. The method for implementing the block chain-based entitlement asset management service platform according to claim 8, further comprising an asset certification circulation process, wherein the process specifically comprises:
h1, splitting the asset evidence, using part of the quota to send a transaction request to different transaction parties after splitting, and borrowing by using the asset evidence as a mortgage by a holding party to a financial institution;
h2, the voucher sponsor redeems the mortgage assets through the repurchase of the voucher, and the voucher limit can be cleared once or returned in batches within the valid period of the voucher;
h3, the evidence holder obtains all the occupation ratios of the right given in the property rule, the disposition of the mortgage property is carried out by initiating the rights item, if the property evidence issued by the evidence holder can not be redeemed or the validity period of the property evidence is passed, the property ownership is changed to be held by the financial institution of the property mortgage, and the property evidence is destroyed;
h4, if the financial institution acquires the repayment request of the voucher issuer, checking whether the voucher issuer repays, if the repayment is confirmed, inquiring a repayment amount unit and giving the asset voucher transaction corresponding to the repayment amount unit to the financing party.
CN202111647128.3A 2021-12-30 2021-12-30 Right asset management service platform based on block chain and implementation method thereof Pending CN114549194A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111647128.3A CN114549194A (en) 2021-12-30 2021-12-30 Right asset management service platform based on block chain and implementation method thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111647128.3A CN114549194A (en) 2021-12-30 2021-12-30 Right asset management service platform based on block chain and implementation method thereof

Publications (1)

Publication Number Publication Date
CN114549194A true CN114549194A (en) 2022-05-27

Family

ID=81669466

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111647128.3A Pending CN114549194A (en) 2021-12-30 2021-12-30 Right asset management service platform based on block chain and implementation method thereof

Country Status (1)

Country Link
CN (1) CN114549194A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115052016A (en) * 2022-06-08 2022-09-13 上海万向区块链股份公司 Customizable digital firework collection generation system based on block chain technology
CN115409511A (en) * 2022-10-31 2022-11-29 北京亿赛通科技发展有限责任公司 Personal information protection system based on block chain
CN116245622A (en) * 2023-05-06 2023-06-09 布比(北京)网络技术有限公司 Block chain-based production and fusion service system and method and electronic equipment
CN116910816A (en) * 2023-09-12 2023-10-20 北京迅京科技有限公司 Multiparty asset collaborative management method and device for improving privacy protection
CN117437058A (en) * 2023-12-21 2024-01-23 北京太一云科技有限公司 Method and system for binding entity card and digital asset

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115052016A (en) * 2022-06-08 2022-09-13 上海万向区块链股份公司 Customizable digital firework collection generation system based on block chain technology
CN115409511A (en) * 2022-10-31 2022-11-29 北京亿赛通科技发展有限责任公司 Personal information protection system based on block chain
CN115409511B (en) * 2022-10-31 2023-02-10 北京亿赛通科技发展有限责任公司 Personal information protection system based on block chain
CN116245622A (en) * 2023-05-06 2023-06-09 布比(北京)网络技术有限公司 Block chain-based production and fusion service system and method and electronic equipment
CN116910816A (en) * 2023-09-12 2023-10-20 北京迅京科技有限公司 Multiparty asset collaborative management method and device for improving privacy protection
CN116910816B (en) * 2023-09-12 2023-12-05 北京迅京科技有限公司 Multiparty asset collaborative management method and device for improving privacy protection
CN117437058A (en) * 2023-12-21 2024-01-23 北京太一云科技有限公司 Method and system for binding entity card and digital asset
CN117437058B (en) * 2023-12-21 2024-02-23 北京太一云科技有限公司 Method and system for binding entity card and digital asset

Similar Documents

Publication Publication Date Title
CN108428122B (en) Trade financing method and system on distributed account book
Rizal Batubara et al. Unraveling transparency and accountability in blockchain
CA2849152C (en) System and method for creating, vaulting, transferring, and controlling transferable electronic records with unique ownership
CN114549194A (en) Right asset management service platform based on block chain and implementation method thereof
Winn Open Systems, Free Markets, and Regulation of Internet Commerce
WO2019015474A1 (en) Management method, apparatus and system for increasing security of commercial paper exchange
CN112685766B (en) Enterprise credit investigation management method and device based on block chain, computer equipment and storage medium
CN107636662A (en) Web content certification
CN116671087A (en) System and method for building blockchains to validate smart contract assets
CN111369730B (en) Voting processing method and device based on block chain
US20200005410A1 (en) System and Method for Facilitating Legal Review for Commercial Loan Transactions
US8307218B2 (en) System and method for creating, vaulting, transferring and controlling transferable electronic records with unique ownership
Sullivan et al. Blockchain, digital identity, e-government
CN111915349A (en) Cross-platform integral using system and method based on block chain
Abreu et al. A blockchain-based architecture for query and registration of student degree certificates
CN111339550A (en) Comment information credibility method based on block chain technology
CN108428135A (en) Auth method
Dash et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications
Arora et al. Blockchain technology and its applications: a systematic review of the literature
George et al. A blockchain based solution to know your customer (kyc) dilemma
Bui et al. Assessing the authenticity of subjective information in the blockchain: a survey and open issues
KR102450412B1 (en) SLA-Based Sharing Economy Service with Smart Contract for Resource Integrity in the Internet of Things
Mehta et al. Security in e-services and applications
CN112861181A (en) Block chain-based method for developing security mechanism of crowd-sourcing software
Al-Towhi The ideal use of NFT in Metaverse-A Systematic literature review

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination