WO2021060340A1 - Transaction information processing system - Google Patents

Transaction information processing system Download PDF

Info

Publication number
WO2021060340A1
WO2021060340A1 PCT/JP2020/035941 JP2020035941W WO2021060340A1 WO 2021060340 A1 WO2021060340 A1 WO 2021060340A1 JP 2020035941 W JP2020035941 W JP 2020035941W WO 2021060340 A1 WO2021060340 A1 WO 2021060340A1
Authority
WO
WIPO (PCT)
Prior art keywords
transaction
transaction information
audit
processing system
information processing
Prior art date
Application number
PCT/JP2020/035941
Other languages
French (fr)
Japanese (ja)
Inventor
昂希 柳谷
Original Assignee
スタンダードキャピタル株式会社
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by スタンダードキャピタル株式会社 filed Critical スタンダードキャピタル株式会社
Publication of WO2021060340A1 publication Critical patent/WO2021060340A1/en

Links

Images

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/14Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using a plurality of keys or algorithms
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • the present invention is suitable for application to, for example, an asset-based encrypted electronic record transfer system.
  • cryptographic tokens cryptographic assets, security tokens, etc.
  • P2P Peer to Peer
  • rights to be traded for example, patents.
  • Reference 1 a business operator who wants to collect funds creates a new crypto token and collects funds from fund providers using methods such as ICO (Initial Coin Offering) and IEO (Initial Exchange Offering). It has been.
  • the present invention has been made to solve such a problem, and an object of the present invention is to provide a transaction information system capable of suppressing illegal sales of cryptographic tokens.
  • the transaction information processing system of the present invention Publication of a multi-signature in which N private keys (N is a natural number of 3 or more) are prepared and it is possible to digitally sign using NA (a is a natural number and NA is 2 or more) private keys.
  • a transaction information system that uses a key method to process electronic transactions of cryptographic tokens using cryptography, which is a data right, and multiple distribution transactions of the cryptographic tokens.
  • An exchange device that mediates transactions between the transfer source and transfer destination of the cryptographic token, and A plurality of auditing devices that are given auditing authority in advance and that correspond to a plurality of auditors holding a private key corresponding to the transfer source and authenticate transactions using the private key, and a plurality of auditing devices. It has a P2P (Peer to Peer) network that establishes the authenticated transaction by writing the authenticated transaction on the blockchain.
  • the transfer source holds one of the private keys
  • the plurality of auditors hold the remaining private key one by one.
  • the present invention can realize a transaction information processing system that can suppress the illegal sale of cryptographic tokens.
  • FIG. 1 shows a transaction information processing system as a whole.
  • the exchange device 11A owned by the exchange 11 owned by the solicitor 12, the provider device 13A owned by the provider 13, and the agency 14 owned by the agent 14 It has a device 14A and a P2P (Peer to Peer) network 31, and is connected by an electronic communication line such as the Internet.
  • P2P Peer to Peer
  • cryptographic assets and electronic record transfer rights are collectively referred to as cryptographic tokens.
  • the exchange 11 mediates the transaction between the solicitor 12 who wants to solicit funds and the provider 13 who provides the funds.
  • the provider 13 has an account with an agent 14 such as a securities company, and the agent 14 acts on behalf of the provider 13.
  • a security token electronic record transfer right
  • assets such as real estate, precious metals, natural mineral resources, and fossil resources
  • the exchange 11 confirms the asset status of the solicitor 12 and permits the solicitor to sell the crypto token P only when the crypto token P to be sold (indicated as P-COIN in the figure) is found to be valid. To do. Then, the exchange 11 mediates the transaction of the permitted cryptographic token P.
  • the P2P network 31 is connected to a normal group 32 that mainly performs mining and an audit group 40 that has audit authority.
  • the audit group 40 authenticates the ordinary transaction information by digitally signing the ordinary transaction information using the private keys 51 and 52.
  • the information processing device 32A in the normal group 32 confirms the validity of the electronic signature of the electronically signed transaction information and approves the movement information of the cryptographic token P included in the transaction information.
  • the distributed ledger owned by each information processing device 32A, audit devices 41A to 41D, 42A to 42D (in some cases, the exchange device 11A and the recruiting device 12A may participate) participating in the P2P network 31.
  • the blockchain of the cryptographic token P in is rewritten, and a formal transaction is established.
  • the P2P network 31 adopts a multi-signature method that requires an electronic certificate using (NA) of the N private keys generated in advance in order to approve the transaction. ing.
  • Audit group 40 is a group of auditors who have audit qualifications (for example, tax accountant or specific certification) that have been certified by the exchange 11 in advance, and are given audit authority after being examined in advance. Auditors 41 and 42 participate in the P2P network 31 via the audit devices 41A to 41D and 42A to 41D. This audit authority is granted by the exchange 11, and the audit devices 41A to 41D and 42A to 42D owned by the auditor are registered in the exchange device 11A.
  • audit qualifications for example, tax accountant or specific certification
  • the auditors 41 and 42 are assigned secret keys 51 and 52 in which the private keys of the recruiting source 12 and the agent 14 are distributed in advance.
  • the auditor to which the private key 51 corresponding to the agent 14 is assigned is the auditor 41 (corresponding to the audit devices 41A to 41D), and the audit to which the private key 52 corresponding to the recruiting source 12 is assigned.
  • Personnel will be described as Auditor 42 (corresponding to Audit Devices 42A-42D).
  • the private keys 51 and 52 may be managed by, for example, being stored by the auditors 41 and 42 in an external storage medium (for example, paper or electronic medium), and may be stored inside the audit devices 41A to 41D and 42A to 41D. You may memorize it in the department.
  • an external storage medium for example, paper or electronic medium
  • the normal sales transaction process is executed, and not only the electronic signature of the party (moving source) but also the electronic signature is performed by the audit group 40. After being authenticated, approval is performed by the P2P network 31.
  • the solicitor 12 places a sell order for the cryptographic token P certified by the exchange 11 via the solicitor device 12A.
  • the recruiting source device 12A transmits the selling order information to the effect that the cryptographic token P is sold to the exchange device 11A.
  • This sell order information includes the number of crypto tokens sold and the quantity of distribution tokens received in return.
  • the exchange device 11A has a transaction database (not shown) for sell and buy orders.
  • the exchange device 11A registers the sell order represented by the sell order information supplied from the soliciting source device 12A in the transaction database.
  • the selling order information currently being executed can be viewed by the soliciting source device 12A and the agency device 14A as public information. The same applies to buy order information.
  • the agent 14 recruits providers and sets up an account for each provider. That is, the proxy device 14A has a holding database for managing the holding quantity of each token for each provider and an order management database for managing sell orders and buy orders in the storage unit.
  • the token deposited in the account is treated as a token held by the agent 14 in the distributed ledger, and the transaction is executed using the private key 51E held by the agent 14 and the corresponding secret keys 51A to 51D.
  • the agent device 14A When the agent device 14A transmits the buy order information to purchase the cryptographic token P from the provider device 13A, the agent device 14A registers the buy order represented by the buy order information in the order management database and purchases the cryptographic token P on behalf of the agent device 14A. The buy order information is transmitted to the exchange device 11A.
  • the exchange device 11A registers the buy order represented by the proxy buy order information in the transaction database.
  • the exchange device 11A executes the transfer of ownership of the cryptographic token P when the sell order and the buy order are matched.
  • the exchange device 11A transmits matching establishment information indicating matching to the soliciting source device 12A and the agency device 14A.
  • the agency device 14A executes the ownership transfer process of the distribution token from the agency 14 to the recruiting source 12 based on the matching establishment information. Although the description is omitted, the ownership transfer process of the cryptographic token P from the recruiting source 12 to the agent 14 is also executed in the same manner.
  • the agency device 14A generates normal transaction information (BtoA in the figure) indicating the transfer of ownership from the distribution token agent 14 (B in the figure) to the solicitor 12 (A in the figure), and uses the private key 51E. It is transmitted to the exchange device 11A together with the signed transaction information with the electronic signature. The exchange device 11A broadcasts normal transaction information to the audit group 40.
  • the audit devices 41A to 41D corresponding to the auditor 41 holding the private keys 51A to 51D corresponding to the agent 14 display the details of the transaction to the auditor 41, for example, on the display unit. Requests confirmation of the legitimacy of the transaction.
  • the audit devices 41A to 41D digitally sign the signed transaction information. At this time, only the signed transaction information of the audit devices 41A to 41D that has been processed earliest is used.
  • the audit device 41A performs a second electronic signature on the signed transaction information, and then broadcasts the signed transaction information and the normal transaction information to the audit group 40. Further, when the audit device 41B performs a third electronic signature on the signed transaction information, the audit device 41B broadcasts the signed transaction information and the normal transaction information having the three electronic signatures to the normal group 32. ..
  • the information processing device 32A which normally participates in the group 32, confirms the validity of the electronic signature in the signed transaction information, calculates the correct hash value, and broadcasts the calculation result to the P2P network 31. As a result, the transfer of ownership from the agent 14 to the solicitor 12 is written on the blockchain of the distribution token, and the transaction is officially approved and concluded.
  • the fraudulent counter-transaction process is executed to offset the transaction without the electronic signatures of the recruiting source 12 and the agent 14 who are the parties to the transaction.
  • FIG. 3 shows a case where the agency device 14A detects fraudulent transactions and broadcasts fraudulent evidence and fraudulent transaction information to the audit group 40 via the exchange 11, but the exchange 11, the audit group 40, and the audit group 40 When any device belonging to the normal group 32 detects it, the fraudulent evidence and fraudulent transaction information are broadcast to the audit group 40 in the same manner.
  • the audit devices 42A to 42D corresponding to the auditor 42 holding the private keys 52A to 52D corresponding to the recruiting source 12 generate counter-transaction information that offsets the fraudulent transaction information. For example, if the ownership of the distribution token is transferred from the agent 14 (B in the figure) to the recruiter 12 (A in the figure), the ownership of the same quantity of distribution tokens is transferred from the agent 12 to the agent 14.
  • the transaction (denoted as AtoB in the figure) is the opposite transaction information.
  • the audit devices 42A to 42D corresponding to the auditor 42 holding the private keys 52A to 52D corresponding to the recruiting source 12 display the details of the transaction to the auditor 42, for example, on the display unit. Requests confirmation of the legitimacy of the transaction.
  • the audit devices 42A to 42D digitally sign the counter-transaction information. At this time, only the signed transaction information of the auditing devices 42A to 42D that has been processed earliest is used.
  • the audit device 42A broadcasts the signed transaction information and the fraudulent transaction information to the audit group 40 after performing the first electronic signature on the signed transaction information.
  • the audit device 42B performs a second electronic signature on the signed transaction information
  • the signed transaction information and the fraudulent transaction information are broadcast to the audit group 40.
  • the audit device 41C broadcasts the signed transaction information and the normal transaction information having the three electronic signatures to the normal group 32.
  • the information processing device 32A which normally participates in the group 32, confirms the validity of the electronic signature in the signed transaction information, calculates the correct hash value, and broadcasts the calculation result to the P2P network 31. As a result, the transfer of ownership from the agent 14 to the recruiter 12 is written in the blockchain (distributed ledger) of the distribution token.
  • the exchange device 11A, the agency device 14A, and the recruiting source device 12A can confirm that the transaction has actually been performed by checking the distributed ledger.
  • a reliable audit group 40 can be formed by giving audit authority to only qualified auditors after examination. Further, by transmitting the transaction information (normal transaction information and counter-transaction information) before the electronic signatures are prepared only to the audit group 40, the confidentiality of the transaction before the establishment can be guaranteed to some extent.
  • the cryptographic token P can be used as a new account.
  • the loss of the cryptographic token P can be prevented by special processing such as moving to.
  • the special transaction information is generated based on the application from the right party (holder of cryptographic token P or recruiter 12, provider 13), and the private key held by the audit group 40. Is executed by.
  • the communication terminals used are system servers, personal computers, tablet terminals, and smartphones. It has a computer configuration such as.
  • Each communication terminal has a control unit (not shown) composed of a CPU (Central Processing Unit), a ROM (Read Only Memory), and a RAM (Random Access Memory), which controls the entire communication terminal in a centralized manner, and ROMs in advance. It is designed to carry out a part of normal sales transaction processing and fraudulent counter-transaction processing according to the agency transaction program stored in.
  • a control unit composed of a CPU (Central Processing Unit), a ROM (Read Only Memory), and a RAM (Random Access Memory), which controls the entire communication terminal in a centralized manner, and ROMs in advance. It is designed to carry out a part of normal sales transaction processing and fraudulent counter-transaction processing according to the agency transaction program stored in.
  • step S11 a sell order is supplied from the recruiting source device 12A to the exchange device 11A.
  • step S12 the exchange device 11A registers the sell order in the transaction database.
  • step S13 a buy order is supplied from the agency device 14A to the exchange device 11A.
  • the exchange device 11A registers the buy order in the transaction database, registers the fact that the matching has been established in the transaction database, and provides the matching establishment information indicating that the matching has been established to the agency device 14A and the recruiting source device. Supply to 12A.
  • step S15 the agency device 14A generates normal transaction information indicating the transfer of the distribution token from the agency 14 to the recruiting source 12 based on the matching establishment information, and digitally signs the distribution token using the private key 51E. , The signed transaction information and the normal transaction information are supplied to the exchange device 11A.
  • step S16 the exchange device 11A broadcasts the signed transaction information and the normal transaction information to the audit group 40.
  • step S17 one of the auditing devices 41A to 41D corresponding to the agent 14 performs a second electronic signature on the signed transaction information, and the signed transaction information and the normal transaction information are audited by the audit group 40. Broadcast to.
  • step S18 one of the auditing devices 41A to 41D corresponding to the agent 14 performs a third electronic signature on the signed transaction information, and the signed transaction information and the normal transaction information are combined with the P2P network 31. Broadcast to the information processing device 32A inside.
  • step S19 the information processing apparatus 32A verifies the validity of the electronic signature, calculates the correct hash value, and broadcasts the calculated hash value to the P2P network 31.
  • step S20 the transaction represented by the normal transaction information (that is, the transfer from the agent 14 to the recruiting source 12) is recorded in the distributed ledger in the P2P network 31, and the normal sales transaction process ends.
  • step S41 fraudulent evidence indicating fraudulent transactions and fraudulent transaction information in which details of the fraudulent transaction are specified are supplied from the agency device 14A to the exchange device 11A.
  • step S42 the exchange device 11A generates counter-transaction information that offsets the fraudulent transaction represented by the fraudulent transaction information (that is, represents the transfer of the distribution token from the solicitor 12 to the agent 14).
  • step S42 the exchange device 11A broadcasts the fraudulent transaction information to the audit group 40 together with the fraudulent evidence.
  • step S44 one of the auditing devices 42A to 42D corresponding to the solicitor 12 performs the first electronic signature on the signed transaction information, and the signed transaction information and the fraudulent transaction information are combined with the fraudulent evidence. Broadcast to audit group 40.
  • step S45 one of the auditing devices 42A to 42D corresponding to the solicitor 12 performs a second electronic signature on the signed transaction information, and the signed transaction information and the fraudulent transaction information are combined with the fraudulent evidence. Broadcast to audit group 40.
  • step S46 one of the auditing devices 42A to 42D corresponding to the solicitor 12 performs a third electronic signature on the signed transaction information, and the signed transaction information and the fraudulent transaction information are audited by the audit group 40. Broadcast to.
  • step S47 the information processing device 32A verifies the validity of the electronic signature, calculates the correct hash value, and broadcasts the calculated hash value to the P2P network 31.
  • step S48 the transaction represented by the counter-transaction information (that is, the transfer from the solicitor 12 to the agent 14) is recorded in the distributed ledger in the P2P network 31, and the fraudulent counter-transaction process ends.
  • N private keys (N is a natural number of 3 or more) are prepared, and a multi-signature public key that can be digitally signed using N-a (a is a natural number) private keys.
  • a transaction information system (transaction information processing system 1) that uses a method to process electronic transactions of cryptographic tokens using cryptography, which is a data right, and multiple distribution transactions of the cryptographic tokens.
  • An exchange device that mediates transactions between the transfer source (recruitment source 12) and the transfer destination (provider 13 or agent 14) of the cryptographic token, and A plurality of auditing devices (auditing devices 41A to 41D, 42A to) that correspond to a plurality of auditors who are given audit authority in advance and hold a private key corresponding to the transfer source and authenticate transactions using the private key. 42D) and It has a P2P network (P2P network 31) that establishes the authenticated transaction by writing the authenticated transaction on the blockchain.
  • the transfer source holds one secret key (private keys 51E, 52E),
  • the plurality of auditors hold the remaining private keys (private keys 51A to D, 52A to D) one by one (that is, secret sharing).
  • the auditor's private key is required to execute the transaction, and the transaction can be performed using only the private key held by the auditor. Therefore, the transaction information processing system as a whole monitors the transaction. Can be strengthened, and fraudulent sales of cryptographic tokens can be suppressed.
  • the first to N- (a + 1) auditing devices are When the transaction information that represents the matching transaction between the transfer source and the transfer destination and the electronic signature of the transfer source is supplied and the observer authenticates the validity of the transaction, the first to N- (a + 1) Digitally sign The P2P network is It is characterized in that an electronically signed transaction is completed by the first to N- (a + 1) auditing devices.
  • the first to NA auditing devices are When the observer authenticates the fraudulent transaction that was sent in the past, the counter-transaction information that cancels the corresponding transaction is digitally signed.
  • the P2P network is It is characterized in that the counter-transaction represented by the authenticated counter-trade information supplied from the audit device that has performed the electronic signature is completed.
  • the exchange device or the first audit device It is characterized in that the counter-transaction information is generated for transactions that have been completed in the past.
  • the transaction information system It has an agency device that acts on behalf of the transaction of the transfer destination, The transaction is executed between the agency device and the transfer source device corresponding to the transfer source.
  • the exchange device is Generate transaction information for transactions that match the transfer source and transfer destination.
  • the relocation destination device corresponding to the relocation destination is Electronically sign the transaction information
  • the exchange device or the relocation destination device It is characterized in that the electronically signed transaction information is transmitted to at least the plurality of observer devices.
  • the unsigned transaction information can be transmitted only to the observer device, so that the confidentiality of the unsuccessful transaction can be guaranteed.
  • the normal transaction information or the counter-transaction information and the signed transaction information are broadcast only to the audit group 40, but the present invention is not limited to this.
  • it may be broadcast to the entire P2P network 31.
  • the exchange device 11A it is not always necessary for the exchange device 11A to broadcast the normal transaction information or the counter-transaction information and the signed transaction information, and the parties to the transaction such as the agency device 14A may broadcast directly to the P2P network 31. ..
  • the confidentiality of the unsuccessful transaction can be ensured.
  • the agent 14 acts as the agent for the transaction of the provider 13, but the present invention is not limited to this.
  • the process may be executed by the provider device 13A owned by the provider 13.
  • the provider device 13A executes the same processing as the proxy device 14A instead of the proxy device 14A.
  • the transaction is executed using the private key held by the agent.
  • five private keys are used, but the present invention is not limited to this.
  • three private keys can be used to digitally sign with two or more private keys, or four private keys can be used to digitally sign with three or more private keys.
  • the point is that there are N private keys, and the electronic signature can be verified by using (NA) private keys.
  • the audit group 40 also participates in the P2P network 31, but the present invention is not limited to this.
  • the audit group 40 may exist as a single group that does not overlap with the P2P network 31.
  • an audit device of an auditor who holds a private key is registered in advance in the exchange device.
  • An auditing device suitable for the trader may be selected to transmit normal transaction information or counter-transaction information, signed transaction information, and the like.
  • the transaction of moving one transaction (distribution token) from the agent 14 to the solicitor 12 has been described, but the present invention is not limited to this. Since two transactions (a transaction for moving the distribution token from the agent 14 to the agent 12 and a transaction for moving the cryptographic token P from the agent 12 to the agent 14) need to be performed in parallel, these are required. By broadcasting or transmitting to the audit group 40 as a set, a more rigorous audit can be performed. In this case, it is preferable that the two normal transaction information and one signed transaction information are sent as a package.
  • the transaction information processing system 1 of the present invention is applied at the time of selling the security token based on the asset has been described, but the present invention is not limited to this.
  • the present invention can be applied to so-called cryptographic assets for the purpose of soliciting funds or transferring funds of start-up companies.
  • the normal transaction information is transmitted to all of the auditing devices 41A to 41D corresponding to the auditor 41 having the private keys 51A to 51D corresponding to the agent 14, and the auditing devices 41A to 41A to perform the processing earliest.
  • Only 41D signed transaction information was used, but the present invention is not limited to this.
  • a ranking may be assigned in advance or for each transaction, and ordinary transaction information or ordinary transaction information and signed transaction information may be transmitted in order from the earliest order. In this case, for example, if the normal transaction information and the signed transaction information are not transmitted to the audit device of the next rank even after the lapse of a predetermined time, the transmitted audit device is skipped and transmitted to the audit device of the next rank. Can be done.
  • fraudulent transactions were detected by the network, but the present invention is not limited to this.
  • the recruiting source 12 commits fraud by making a false application, proof of fraud is submitted by the provider 13 or the agent 14. Even in this case, fraudulent counter-transaction processing is executed in the same manner.
  • the fraudulent transaction may be specified by the exchange 11 and the fraudulent transaction information may be generated. For accounts where fraudulent transactions have been discovered, transactions will not be possible if the observer does not accept transaction requests. Fraudulent accounts and fraudulent transaction information are recorded and retained in the ledger as evidence of fraud.
  • the present invention is not limited to this.
  • the present invention can be similarly applied to the next transaction.
  • a known method such as a threshold signature or a BLS signature can be appropriately selected and used.
  • a transaction (transaction information) signed with (NA) private keys can be verified with the master public key, or (NA) transactions signed with (NA) private keys can be verified. It can be verified with the public key corresponding to the private key of.
  • the public key may be attached to a transaction (transaction information), all public keys may be centrally managed and made public by a transaction system, or a public key may be generated using a random number or the like for each transaction.
  • the public key only the number of private keys (N) may be generated, or only the public keys (that is, NA) corresponding to the private keys used for the electronic signature may be generated.
  • N the number of private keys
  • NA the public keys
  • the digital signature can be used. The legitimacy is verified.
  • a token transaction method using multisig As a token transaction method using multisig, a Raw Output method in which a public key is added to a transaction as it is, a P2SH (Pay to Script Hash) method in which a hash of a public key is added to a transaction, and the like are preferably used. ..
  • the present invention can be used, for example, in a security token trading system linked to an asset.
  • Transaction information processing system 11 Exchange 11A: Exchange device 12: recruiter 12A: recruiter device 13: Provider 13A: Provider device 14: Agent 14A: Agency device 31: P2P network 32: Normal group 32A : Information processing device 40: Audit group 41: Auditors 41A to 41D, 42A to 42D: Audit devices 51, 51A to 51E, 52, 52A to 52E: Private key P: Cryptographic token

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

[Problem] To make it possible to prevent a fraudulent transaction of a cryptographic token. [Solution] This transaction information processing system is characterized by having a plurality of auditing devices in addition to an exchange device and a P2P network. When an electronic transaction of a cryptographic token that uses a code serving as data rights is executed using a multi-signature public key method in which N secret keys (N is a natural number of 3 or higher) are prepared and it is possible to execute a digital signature using N − a secret keys (a is a natural number and N − a is 2 or higher), the exchange device intermediates the transaction between the transfer source and the transfer destination of the cryptographic token. The plurality of auditing devices correspond to a plurality of auditors granted auditing authority in advance, each of whom possesses a secret key corresponding to the transfer source, and the auditing devices authenticate the transaction using the secret keys. The P2P network causes the authenticated transaction to come into effect by writing the authenticated transaction into a blockchain. The transfer source possesses one of the secret keys and the plurality of auditors possess the remaining secret keys, which have been dispersed one by one.

Description

取引情報処理システムTransaction information processing system
 本発明は、例えば資産に基づく暗号化された電子記録移転システムに適用して好適なものである。 The present invention is suitable for application to, for example, an asset-based encrypted electronic record transfer system.
 従来、ブロックチェーン技術が使用され、取引対象となる権利を電子取引が広く行われている。これらの電子取引では、取引対象となる権利として暗号資産やセキュリティトークンなど(以下、これらを暗号トークンと呼ぶ)として、P2P(Peer to Peer)ネットワークを利用して取引されることが多い(例えば特許文献1参照)。かかる暗号トークン取引においては、資金を集めたい事業者が新たな暗号トークンを作り、ICO(Initial Coin Offering)やIEO(Initial Exchange Offering)などの手法を用いて資金提供者から資金を集めることが行われている。 Conventionally, blockchain technology has been used, and electronic commerce is widely used for the rights to be traded. In these electronic transactions, cryptographic assets, security tokens, etc. (hereinafter referred to as cryptographic tokens) are often traded using a P2P (Peer to Peer) network as rights to be traded (for example, patents). Reference 1). In such crypto token transactions, a business operator who wants to collect funds creates a new crypto token and collects funds from fund providers using methods such as ICO (Initial Coin Offering) and IEO (Initial Exchange Offering). It has been.
特許第6521421号Patent No. 6521421
 しかしながら、実体のない暗号トークンを不正に販売する業者が後を絶たず、資金提供者が騙される事例が後を絶たないという問題があった。 However, there was a problem that there were a lot of vendors who illegally sold intangible cryptographic tokens, and there were a lot of cases where funders were deceived.
 本発明はこのような問題を解決するためになされたもので、その目的は、暗号トークンを不正に販売することを抑制できる取引情報システムを提供するものである。 The present invention has been made to solve such a problem, and an object of the present invention is to provide a transaction information system capable of suppressing illegal sales of cryptographic tokens.
 かかる課題を解決するため、本発明の取引情報処理システムは、
 秘密鍵がN個(Nは3以上の自然数)用意され、N-a個(aは自然数かつN-aは2以上)の秘密鍵を用いて電子署名を行うことが可能なマルチシグニチャの公開鍵方式を用いて、データ上の権利である暗号を用いた暗号トークンの電子取引及び該暗号トークンの複数次流通取引として処理する取引情報システムであって、
 前記暗号トークンの移転元と移転先との取引を仲介する交換所装置と、
 予め監査権限が付与されており前記移転元に対応する秘密鍵を保有する複数の監査者に対応し、前記秘密鍵を用いて取引を認証する複数の監査装置と、
 前記認証された取引をブロックチェーンに書き込むことにより、前記認証された取引を成立させるP2P(Peer to Peer)ネットワークとを有し、
 前記移転元が一つの前記秘密鍵を保有し、
 前記複数の監査者が残りの前記秘密鍵を一つずつ保有することを特徴とする。
In order to solve such a problem, the transaction information processing system of the present invention
Publication of a multi-signature in which N private keys (N is a natural number of 3 or more) are prepared and it is possible to digitally sign using NA (a is a natural number and NA is 2 or more) private keys. A transaction information system that uses a key method to process electronic transactions of cryptographic tokens using cryptography, which is a data right, and multiple distribution transactions of the cryptographic tokens.
An exchange device that mediates transactions between the transfer source and transfer destination of the cryptographic token, and
A plurality of auditing devices that are given auditing authority in advance and that correspond to a plurality of auditors holding a private key corresponding to the transfer source and authenticate transactions using the private key, and a plurality of auditing devices.
It has a P2P (Peer to Peer) network that establishes the authenticated transaction by writing the authenticated transaction on the blockchain.
The transfer source holds one of the private keys,
The plurality of auditors hold the remaining private key one by one.
 本発明は、暗号トークンを不正に販売することを抑制できる取引情報処理システムを実現できる。 The present invention can realize a transaction information processing system that can suppress the illegal sale of cryptographic tokens.
本実施の形態の取引情報処理システム(1)略線図である。It is a schematic diagram of the transaction information processing system (1) of this embodiment. 本実施の形態の取引情報処理システム(2)略線図である。It is a schematic diagram of the transaction information processing system (2) of this embodiment. 本実施の形態の取引情報処理システム(3)略線図である。It is a schematic diagram of the transaction information processing system (3) of this embodiment. 本実施の形態の通常売買取引処理を示すシステムチャートである。It is a system chart which shows the ordinary trading transaction processing of this embodiment. 本実施の形態の不正反対取引処理を示すシステムチャートである。It is a system chart which shows the fraudulent opposition transaction processing of this embodiment. 他の実施の形態の取引情報処理システム(1)略線図である。It is a schematic diagram of the transaction information processing system (1) of another embodiment. 他の実施の形態の取引情報処理システム(2)略線図である。It is a schematic diagram of the transaction information processing system (2) of another embodiment.
 以下、本発明を実施するための形態について図面を参照して説明する。 Hereinafter, a mode for carrying out the present invention will be described with reference to the drawings.
<実施の形態>
 図1に示す1は、全体として取引情報処理システムを示している。取引情報処理システム1では、交換所11が保有する交換所装置11Aと、募集元12が保有する募集元装置12Aと、提供者13が保有する提供者装置13Aと、代行者14が保有する代行装置14Aと、P2P(Peer to Peer)ネットワーク31とを有しており、インターネットなどの電子通信回線によって接続されている。なお本明細書では、いわゆる暗号資産と電子記録移転権利とを包括して暗号トークンと呼ぶ。
<Embodiment>
1 shown in FIG. 1 shows a transaction information processing system as a whole. In the transaction information processing system 1, the exchange device 11A owned by the exchange 11, the solicitor device 12A owned by the solicitor 12, the provider device 13A owned by the provider 13, and the agency 14 owned by the agent 14 It has a device 14A and a P2P (Peer to Peer) network 31, and is connected by an electronic communication line such as the Internet. In this specification, so-called cryptographic assets and electronic record transfer rights are collectively referred to as cryptographic tokens.
 取引情報処理システム1では、資金募集を行いたい募集元12と、資金の提供を行う提供者13との間の取引を交換所11が仲介する。提供者13は、証券会社などの代行者14にアカウントを有しており、代行者14が提供者13の取引を代行する。 In the transaction information processing system 1, the exchange 11 mediates the transaction between the solicitor 12 who wants to solicit funds and the provider 13 who provides the funds. The provider 13 has an account with an agent 14 such as a securities company, and the agent 14 acts on behalf of the provider 13.
 本実施の形態における取引情報処理システム1では、暗号トークンとして、例えば不動産、貴金属、天然鉱物資源、化石資源などの資産に基づくセキュリティトークン(電子記録移転権利)の取引をする場合について説明する。交換所11は、募集元12の資産状況を確認し、販売する暗号トークンP(図ではP-COINと表示)が正当であると認めたときにのみ、募集者に対する暗号トークンPの販売を許可する。そして交換所11は、該許可した暗号トークンPの取引を仲介する。 In the transaction information processing system 1 of the present embodiment, a case where a security token (electronic record transfer right) based on assets such as real estate, precious metals, natural mineral resources, and fossil resources is traded as a cryptographic token will be described. The exchange 11 confirms the asset status of the solicitor 12 and permits the solicitor to sell the crypto token P only when the crypto token P to be sold (indicated as P-COIN in the figure) is found to be valid. To do. Then, the exchange 11 mediates the transaction of the permitted cryptographic token P.
 P2Pネットワーク31は、主にマイニングを行う通常グループ32と、監査権限を有する監査グループ40とが接続されている。 The P2P network 31 is connected to a normal group 32 that mainly performs mining and an audit group 40 that has audit authority.
 監査グループ40は、秘密鍵51,52を用いて通常取引情報に電子署名を行うことにより該通常取引情報を認証する。通常グループ32における情報処理装置32Aは、電子署名された取引情報に対して電子署名の正当性を確認すると共に、取引情報に含まれる暗号トークンPの移動情報を承認する。この結果、P2Pネットワーク31に参加している各情報処理装置32A,監査装置41A~41D,42A~42D(交換所装置11Aや募集元装置12Aが参加している場合もある)が保有する分散台帳における暗号トークンPのブロックチェーンが書き換えられ、正式な取引が成立する。 The audit group 40 authenticates the ordinary transaction information by digitally signing the ordinary transaction information using the private keys 51 and 52. The information processing device 32A in the normal group 32 confirms the validity of the electronic signature of the electronically signed transaction information and approves the movement information of the cryptographic token P included in the transaction information. As a result, the distributed ledger owned by each information processing device 32A, audit devices 41A to 41D, 42A to 42D (in some cases, the exchange device 11A and the recruiting device 12A may participate) participating in the P2P network 31. The blockchain of the cryptographic token P in is rewritten, and a formal transaction is established.
 ここで、P2Pネットワーク31は、取引を承認するために、予め生成されたN個の秘密鍵のうち(N-a)個の秘密鍵を用いた電子証明を必要とするマルチシグニチャ方式を採用している。 Here, the P2P network 31 adopts a multi-signature method that requires an electronic certificate using (NA) of the N private keys generated in advance in order to approve the transaction. ing.
 監査グループ40は、予め交換所11から認定を受けた監査資格(例えば税理士や特定の認定など)を有する監査者のグループであり、予め審査された上で監査権限が付与されている。監査者41,42は、監査装置41A~41D,42A~41Dを介してP2Pネットワーク31に参加している。この監査権限は、交換所11から付与されるものであり、交換所装置11Aには、監査者が保有する監査装置41A~41D,42A~42Dが登録されている。 Audit group 40 is a group of auditors who have audit qualifications (for example, tax accountant or specific certification) that have been certified by the exchange 11 in advance, and are given audit authority after being examined in advance. Auditors 41 and 42 participate in the P2P network 31 via the audit devices 41A to 41D and 42A to 41D. This audit authority is granted by the exchange 11, and the audit devices 41A to 41D and 42A to 42D owned by the auditor are registered in the exchange device 11A.
 各監査者41,42には、予め募集元12及び代行者14の秘密鍵を分散した秘密鍵51,52が割り当てられている。なお説明の便宜上、ここでは代行者14に対応する秘密鍵51が割り当てられた監査者を監査者41(監査装置41A~41Dに対応),募集元12に対応する秘密鍵52が割り当てられた監査者を監査者42(監査装置42A~42Dに対応)として説明する。 The auditors 41 and 42 are assigned secret keys 51 and 52 in which the private keys of the recruiting source 12 and the agent 14 are distributed in advance. For convenience of explanation, here, the auditor to which the private key 51 corresponding to the agent 14 is assigned is the auditor 41 (corresponding to the audit devices 41A to 41D), and the audit to which the private key 52 corresponding to the recruiting source 12 is assigned. Personnel will be described as Auditor 42 (corresponding to Audit Devices 42A-42D).
 この秘密鍵51,52は、例えば監査者41,42が外付けの記憶媒体(例えば紙又は電子媒体)に記憶することにより管理してもよく、監査装置41A~41D,42A~41D内部における記憶部に記憶させていても良い。 The private keys 51 and 52 may be managed by, for example, being stored by the auditors 41 and 42 in an external storage medium (for example, paper or electronic medium), and may be stored inside the audit devices 41A to 41D and 42A to 41D. You may memorize it in the department.
 監査者41,42は、秘密鍵の数に特に制限は無いが、ここではN=5個の秘密鍵が生成され、(N-a)=3個の秘密鍵による電子署名が必要な場合について説明する。 The auditors 41 and 42 have no particular limitation on the number of private keys, but here, when N = 5 private keys are generated and (NA) = 3 private keys are required to be digitally signed. explain.
 取引情報処理システム1では、通常時の暗号トークンPについての通常の売買取引において、通常売買取引処理を実行し、当事者(移動元)の電子署名だけでなく、監査グループ40によって電子署名を行って認証された上で、P2Pネットワーク31による承認が行われる。 In the transaction information processing system 1, in the normal sales transaction for the cryptographic token P at the normal time, the normal sales transaction process is executed, and not only the electronic signature of the party (moving source) but also the electronic signature is performed by the audit group 40. After being authenticated, approval is performed by the P2P network 31.
 募集元12は、交換所11に認定された暗号トークンPに関して募集元装置12Aを介して売り注文を行う。このとき募集元装置12Aは、暗号トークンPを売る旨の売り注文情報を交換所装置11Aに対して送信する。この売り注文情報には、暗号トークンPの販売数と代償として受け取る流通トークンの数量が含まれる。交換所装置11Aは、売り注文と買い注文に関する取引データベース(図示せず)を有している。交換所装置11Aは、募集元装置12Aから供給された売り注文情報が表す売り注文を取引データベースに登録する。ここで、現在執行中の売り注文情報については、公開情報として募集元装置12Aや代行装置14Aが閲覧することが可能である。買い注文情報についても同様である。 The solicitor 12 places a sell order for the cryptographic token P certified by the exchange 11 via the solicitor device 12A. At this time, the recruiting source device 12A transmits the selling order information to the effect that the cryptographic token P is sold to the exchange device 11A. This sell order information includes the number of crypto tokens sold and the quantity of distribution tokens received in return. The exchange device 11A has a transaction database (not shown) for sell and buy orders. The exchange device 11A registers the sell order represented by the sell order information supplied from the soliciting source device 12A in the transaction database. Here, the selling order information currently being executed can be viewed by the soliciting source device 12A and the agency device 14A as public information. The same applies to buy order information.
 代行者14は、提供者を募集し、提供者ごとにアカウント(口座)を設定している。すなわち、代行装置14Aは、記憶部に提供者ごと各トークンの保有数量を管理する保有データベースと、売り注文及び買い注文を管理する注文管理データベースとを有している。アカウントに預けられたトークンは、分散台帳には代行者14が保有するトークンとして取り扱われ、代行者14が保有する秘密鍵51E及び対応する秘密鍵51A~51Dを用いて取引が実行される。 The agent 14 recruits providers and sets up an account for each provider. That is, the proxy device 14A has a holding database for managing the holding quantity of each token for each provider and an order management database for managing sell orders and buy orders in the storage unit. The token deposited in the account is treated as a token held by the agent 14 in the distributed ledger, and the transaction is executed using the private key 51E held by the agent 14 and the corresponding secret keys 51A to 51D.
 なお、提供者13の要求により、暗号トークンPが提供者13が保有しているウォレットに移動する旨の要求がなされた場合には、代行者14から提供者13への暗号トークンPの移動が実行される。 When the request of the provider 13 requests that the cryptographic token P be moved to the wallet owned by the provider 13, the cryptographic token P is moved from the agent 14 to the provider 13. Will be executed.
 代行装置14Aは、提供者装置13Aから暗号トークンPを買い付ける旨の買い注文情報が送信されると、買い注文情報が表す買い注文を注文管理データベースに登録すると共に、暗号トークンPを買い付ける旨の代行買い注文情報を交換所装置11Aに送信する。 When the agent device 14A transmits the buy order information to purchase the cryptographic token P from the provider device 13A, the agent device 14A registers the buy order represented by the buy order information in the order management database and purchases the cryptographic token P on behalf of the agent device 14A. The buy order information is transmitted to the exchange device 11A.
 図2に示すように、交換所装置11Aは、代行買い注文情報が表す買い注文を取引データベースに登録する。交換所装置11Aは、売り注文と買い注文とがマッチングすると、暗号トークンPの所有権の移動を実行する。 As shown in FIG. 2, the exchange device 11A registers the buy order represented by the proxy buy order information in the transaction database. The exchange device 11A executes the transfer of ownership of the cryptographic token P when the sell order and the buy order are matched.
 具体的に、交換所装置11Aは、マッチングしたことを表すマッチング成立情報を募集元装置12A及び代行装置14Aに送信する。 Specifically, the exchange device 11A transmits matching establishment information indicating matching to the soliciting source device 12A and the agency device 14A.
 代行装置14Aは、マッチング成立情報に基づき、代行者14から募集元12への流通トークンの所有権移動処理を実行する。なお説明を省略するが、同様にして募集元12から代行者14への暗号トークンPの所有権移動処理も実行される。 The agency device 14A executes the ownership transfer process of the distribution token from the agency 14 to the recruiting source 12 based on the matching establishment information. Although the description is omitted, the ownership transfer process of the cryptographic token P from the recruiting source 12 to the agent 14 is also executed in the same manner.
 代行装置14Aは、流通トークンの代行者14(図ではB)から募集元12(図ではA)への所有権移動を表す通常取引情報(図ではBtoA)を生成し、秘密鍵51Eを用いて電子署名を行った署名付取引情報と共に交換所装置11Aへ送信する。交換所装置11Aは、監査グループ40に対して通常取引情報を放送する。 The agency device 14A generates normal transaction information (BtoA in the figure) indicating the transfer of ownership from the distribution token agent 14 (B in the figure) to the solicitor 12 (A in the figure), and uses the private key 51E. It is transmitted to the exchange device 11A together with the signed transaction information with the electronic signature. The exchange device 11A broadcasts normal transaction information to the audit group 40.
 監査グループ40のうち、代行者14に対応する秘密鍵51A~51Dを保有する監査者41に対応する監査装置41A~41Dは、監査者41に対して例えば表示部に取引の詳細を表示することにより、取引の正当性の確認を要求する。監査者41の操作入力に応じて取引の正当性が確認されると、監査装置41A~41Dは署名付取引情報に対して電子署名を行う。このとき、最も早く処理を行った監査装置41A~41Dの署名付取引情報のみが使用される。 Among the audit group 40, the audit devices 41A to 41D corresponding to the auditor 41 holding the private keys 51A to 51D corresponding to the agent 14 display the details of the transaction to the auditor 41, for example, on the display unit. Requests confirmation of the legitimacy of the transaction. When the legitimacy of the transaction is confirmed in response to the operation input of the auditor 41, the audit devices 41A to 41D digitally sign the signed transaction information. At this time, only the signed transaction information of the audit devices 41A to 41D that has been processed earliest is used.
 なお、取引の正当性の確認の一部を監査装置41A~41Dのプログラム上で自動的に行うことも可能である。例えば、特定の条件を満たす場合には監査装置41A~41Dが自動的に電子署名を行うものの、例えば同じ取引者による複数回目以降の取引や取引上限金額を超えるなどの場合にのみ監査者による確認を要求することができる。 It is also possible to automatically confirm the validity of the transaction on the program of the audit devices 41A to 41D. For example, if certain conditions are met, the auditing devices 41A to 41D automatically digitally sign, but the auditor confirms only when, for example, the same trader makes multiple transactions or exceeds the maximum transaction amount. Can be requested.
 例えば、監査装置41Aは、署名付取引情報に対して2つ目の電子署名を行ったのち署名付取引情報及び通常取引情報を監査グループ40に対して放送する。さらに、監査装置41Bが署名付取引情報に対して3つ目の電子署名を行うと、監査装置41Bは3つの電子署名を有する署名付取引情報及び通常取引情報を通常グループ32に対して放送する。 For example, the audit device 41A performs a second electronic signature on the signed transaction information, and then broadcasts the signed transaction information and the normal transaction information to the audit group 40. Further, when the audit device 41B performs a third electronic signature on the signed transaction information, the audit device 41B broadcasts the signed transaction information and the normal transaction information having the three electronic signatures to the normal group 32. ..
 通常グループ32に参加する情報処理装置32Aは、署名付取引情報における電子署名の正当性を確認し、正しいハッシュ値を算出し、算出結果をP2Pネットワーク31に放送する。この結果、流通トークンのブロックチェーンには代行者14から募集元12への所有権の移動が書き込まれ、正式に承認されて取引が成立する。 The information processing device 32A, which normally participates in the group 32, confirms the validity of the electronic signature in the signed transaction information, calculates the correct hash value, and broadcasts the calculation result to the P2P network 31. As a result, the transfer of ownership from the agent 14 to the solicitor 12 is written on the blockchain of the distribution token, and the transaction is officially approved and concluded.
 このように、取引情報処理システム1では、予め秘密鍵が割り当てられた監査者による認証されてから、トークンの所有権の移動が完了される。これにより、第3者のハッキングや偽注文などによる不正なトークンの取引成立を未然に防止することができる。 In this way, in the transaction information processing system 1, the transfer of ownership of the token is completed after being authenticated by the auditor to whom the private key is assigned in advance. As a result, it is possible to prevent the establishment of fraudulent token transactions due to hacking by a third party or fake order.
 さらに取引情報処理システム1では、不正取引があった場合に、取引の当事者である募集元12,代行者14の電子署名なしに取引を相殺する不正反対取引処理を実行する。 Further, in the transaction information processing system 1, when there is a fraudulent transaction, the fraudulent counter-transaction process is executed to offset the transaction without the electronic signatures of the recruiting source 12 and the agent 14 who are the parties to the transaction.
 例えば短時間内に同一の募集元及び提供者間で複数の取引が行われた場合や、所定時間内に取引価格が大きく変化した場合など、不正が疑われる取引が発生した場合、取引情報処理システム1内のネットワーク上で自動的に検知され、不正証拠及び不正取引情報として監査グループ40に放送される。なお図3では、代行装置14Aが不正取引を検出し、交換所11を介して監査グループ40に不正証拠及び不正取引情報が放送された場合を示しているが、交換所11、監査グループ40及び通常グループ32に属するいずれかの装置が検出した場合にも同様にして監査グループ40に不正証拠及び不正取引情報が放送される。 For example, when multiple transactions are made between the same solicitor and provider within a short period of time, or when the transaction price changes significantly within a predetermined time, or when a transaction suspected of fraud occurs, transaction information processing It is automatically detected on the network in the system 1 and broadcast to the audit group 40 as fraudulent evidence and fraudulent transaction information. Note that FIG. 3 shows a case where the agency device 14A detects fraudulent transactions and broadcasts fraudulent evidence and fraudulent transaction information to the audit group 40 via the exchange 11, but the exchange 11, the audit group 40, and the audit group 40 When any device belonging to the normal group 32 detects it, the fraudulent evidence and fraudulent transaction information are broadcast to the audit group 40 in the same manner.
 監査グループ40のうち、募集元12に対応する秘密鍵52A~52Dを保有する監査者42に対応する監査装置42A~42Dは、不正取引情報を相殺する反対取引情報を生成する。例えば流通トークンの所有権が代行者14(図ではB)から募集元12(図ではA)へ移動していた場合、同じ数量の流通トークンの所有権を募集元12から代行者14へ移動させる取引(図ではAtoBと記載)が反対取引情報である。 Among the audit group 40, the audit devices 42A to 42D corresponding to the auditor 42 holding the private keys 52A to 52D corresponding to the recruiting source 12 generate counter-transaction information that offsets the fraudulent transaction information. For example, if the ownership of the distribution token is transferred from the agent 14 (B in the figure) to the recruiter 12 (A in the figure), the ownership of the same quantity of distribution tokens is transferred from the agent 12 to the agent 14. The transaction (denoted as AtoB in the figure) is the opposite transaction information.
 監査グループ40のうち、募集元12に対応する秘密鍵52A~52Dを保有する監査者42に対応する監査装置42A~42Dは、監査者42に対して例えば表示部に取引の詳細を表示することにより、取引の正当性の確認を要求する。監査者42の操作入力に応じて不正が確認されると、監査装置42A~42Dは反対取引情報に対して電子署名を行う。このとき、最も早く処理を行った監査装置42A~42Dの署名付取引情報のみが使用される。 Among the audit group 40, the audit devices 42A to 42D corresponding to the auditor 42 holding the private keys 52A to 52D corresponding to the recruiting source 12 display the details of the transaction to the auditor 42, for example, on the display unit. Requests confirmation of the legitimacy of the transaction. When fraud is confirmed in response to the operation input of the auditor 42, the audit devices 42A to 42D digitally sign the counter-transaction information. At this time, only the signed transaction information of the auditing devices 42A to 42D that has been processed earliest is used.
 例えば、監査装置42Aは、署名付取引情報に対して1つ目の電子署名を行ったのち署名付取引情報及び不正取引情報を監査グループ40に対して放送する。監査装置42Bが署名付取引情報に対して2つ目の電子署名を行うと、署名付取引情報及び不正取引情報を監査グループ40に対して放送する。そして監査装置42Cが署名付取引情報に対して3つ目の電子署名を行うと、監査装置41Cは3つの電子署名を有する署名付取引情報及び通常取引情報を通常グループ32に対して放送する。 For example, the audit device 42A broadcasts the signed transaction information and the fraudulent transaction information to the audit group 40 after performing the first electronic signature on the signed transaction information. When the audit device 42B performs a second electronic signature on the signed transaction information, the signed transaction information and the fraudulent transaction information are broadcast to the audit group 40. Then, when the audit device 42C makes a third electronic signature on the signed transaction information, the audit device 41C broadcasts the signed transaction information and the normal transaction information having the three electronic signatures to the normal group 32.
 通常グループ32に参加する情報処理装置32Aは、署名付取引情報における電子署名の正当性を確認し、正しいハッシュ値を算出し、算出結果をP2Pネットワーク31に放送する。この結果、流通トークンのブロックチェーン(分散台帳)には代行者14から募集元12への所有権の移動が書き込まれる。 The information processing device 32A, which normally participates in the group 32, confirms the validity of the electronic signature in the signed transaction information, calculates the correct hash value, and broadcasts the calculation result to the P2P network 31. As a result, the transfer of ownership from the agent 14 to the recruiter 12 is written in the blockchain (distributed ledger) of the distribution token.
 この後、交換所装置11Aや代行装置14A、募集元装置12Aは、分散台帳を確認することにより、取引が実際に行われたことを確認することができる。 After that, the exchange device 11A, the agency device 14A, and the recruiting source device 12A can confirm that the transaction has actually been performed by checking the distributed ledger.
 このように、秘密鍵51,52を保有させることにより、取引の当事者が保有する秘密鍵を使用する必要がない。また、予め資格を有する監査者のみに対し、審査の上監査権限を与えることにより、信頼性のある監査グループ40を形成することができる。また、電子署名が揃う前の取引情報(通常取引情報及び反対取引情報)を監査グループ40にのみ送信することにより、成立前の取引の秘密性をある程度担保することができる。 By holding the private keys 51 and 52 in this way, it is not necessary to use the private keys held by the parties to the transaction. In addition, a reliable audit group 40 can be formed by giving audit authority to only qualified auditors after examination. Further, by transmitting the transaction information (normal transaction information and counter-transaction information) before the electronic signatures are prepared only to the audit group 40, the confidentiality of the transaction before the establishment can be guaranteed to some extent.
 また、例えば死亡や秘密鍵の紛失など、暗号トークンPの保有者が保有する秘密鍵が分からなくなる事態が生じた場合であっても、監査グループ40による認証があれば、暗号トークンPを新しいアカウントに移動させるなどの特別処理により暗号トークンPの喪失を防止することができる。また、誤った送金についても同様にして取消(反対処理)が可能である。いずれの場合であっても、権利を有する当事者(暗号トークンPの保有者又は募集元12、提供者13)からの申請に基づいて、特別取引情報が生成され、監査グループ40が保有する秘密鍵によって実行される。 In addition, even if the private key held by the holder of the cryptographic token P becomes unknown, such as death or loss of the private key, if the audit group 40 authenticates, the cryptographic token P can be used as a new account. The loss of the cryptographic token P can be prevented by special processing such as moving to. In addition, it is possible to cancel (opposite processing) the wrong remittance in the same way. In any case, the special transaction information is generated based on the application from the right party (holder of cryptographic token P or recruiter 12, provider 13), and the private key held by the audit group 40. Is executed by.
 これにより、暗号トークンの保有者が間違った送金をしたり、秘密鍵を紛失したり、代行者の創業者や当事者の死亡などの事象により、暗号トークンが引き出せなくなるリスクを大きく低減することができる。 This can greatly reduce the risk that the crypto token cannot be withdrawn due to an event such as the holder of the crypto token making a wrong remittance, losing the private key, or the death of the founder or the party of the agent. ..
 次に、取引情報処理システム1が実行する通常売買取引処理について、図4のシステムチャートを用いて説明する。なお、使用される各通信端末(代行装置14A,交換所装置11A、募集元装置12A,監査装置41A~41D,42A~42D、情報処理装置32A)は、システムサーバ、パーソナルコンピュータ、タブレット端末、スマートフォンなどのコンピュータ構成を有している。 Next, the normal trading transaction processing executed by the transaction information processing system 1 will be described using the system chart of FIG. The communication terminals used (substitute device 14A, exchange device 11A, recruiting device 12A, audit device 41A to 41D, 42A to 42D, information processing device 32A) are system servers, personal computers, tablet terminals, and smartphones. It has a computer configuration such as.
 各通信端末は、CPU(Central Processing Unit)、ROM(Read Only Memory)及びRAM(Random Access Memory)から構成される制御部(図示しない)が各通信端末の全体を統括的に制御し、予めROMに記憶された代行取引プログラムに従って通常売買取引処理及び不正反対取引処理の一部を遂行するようになされている。 Each communication terminal has a control unit (not shown) composed of a CPU (Central Processing Unit), a ROM (Read Only Memory), and a RAM (Random Access Memory), which controls the entire communication terminal in a centralized manner, and ROMs in advance. It is designed to carry out a part of normal sales transaction processing and fraudulent counter-transaction processing according to the agency transaction program stored in.
 ステップS11において、募集元装置12Aから交換所装置11Aに対して売り注文が供給される。ステップS12において、交換所装置11Aは、売り注文を取引データベースに登録する。 In step S11, a sell order is supplied from the recruiting source device 12A to the exchange device 11A. In step S12, the exchange device 11A registers the sell order in the transaction database.
 ステップS13において、代行装置14Aから交換所装置11Aに対して買い注文が供給される。ステップS13において、交換所装置11Aは、買い注文を取引データベースに登録すると共に、マッチングが成立したことを取引データベースに登録し、マッチングが成立した旨を表すマッチング成立情報を代行装置14A及び募集元装置12Aに供給する。 In step S13, a buy order is supplied from the agency device 14A to the exchange device 11A. In step S13, the exchange device 11A registers the buy order in the transaction database, registers the fact that the matching has been established in the transaction database, and provides the matching establishment information indicating that the matching has been established to the agency device 14A and the recruiting source device. Supply to 12A.
 ステップS15において、代行装置14Aは、マッチング成立情報に基づいて、流通トークンの代行者14から募集元12への移転を表す通常取引情報を生成し、秘密鍵51Eを用いて電子署名をした上で、署名付取引情報と通常取引情報とを交換所装置11Aに供給する。 In step S15, the agency device 14A generates normal transaction information indicating the transfer of the distribution token from the agency 14 to the recruiting source 12 based on the matching establishment information, and digitally signs the distribution token using the private key 51E. , The signed transaction information and the normal transaction information are supplied to the exchange device 11A.
 ステップS16において、交換所装置11Aは、署名付取引情報と通常取引情報とを監査グループ40に放送する。 In step S16, the exchange device 11A broadcasts the signed transaction information and the normal transaction information to the audit group 40.
 ステップS17において、代行者14に対応する監査装置41A~41Dのうち一の監査装置は、署名付取引情報に2つ目の電子署名を行い、署名付取引情報と通常取引情報とを監査グループ40に放送する。 In step S17, one of the auditing devices 41A to 41D corresponding to the agent 14 performs a second electronic signature on the signed transaction information, and the signed transaction information and the normal transaction information are audited by the audit group 40. Broadcast to.
 ステップS18において、代行者14に対応する監査装置41A~41Dのうち一の監査装置は、署名付取引情報に3つ目の電子署名を行い、署名付取引情報と通常取引情報とをP2Pネットワーク31内の情報処理装置32Aに放送する。 In step S18, one of the auditing devices 41A to 41D corresponding to the agent 14 performs a third electronic signature on the signed transaction information, and the signed transaction information and the normal transaction information are combined with the P2P network 31. Broadcast to the information processing device 32A inside.
 ステップS19において、情報処理装置32Aは、電子署名の正当性を検証し、正しいハッシュ値を算出すると、算出したハッシュ値をP2Pネットワーク31に放送する。ステップS20において、P2Pネットワーク31内の分散台帳には、通常取引情報が表す取引(すなわち代行者14から募集元12への移転)が記録され、通常売買取引処理が終了する。 In step S19, the information processing apparatus 32A verifies the validity of the electronic signature, calculates the correct hash value, and broadcasts the calculated hash value to the P2P network 31. In step S20, the transaction represented by the normal transaction information (that is, the transfer from the agent 14 to the recruiting source 12) is recorded in the distributed ledger in the P2P network 31, and the normal sales transaction process ends.
 次に、取引情報処理システム1が実行する不正反対取引処理について、図5のシステムチャートを用いて説明する。 Next, the fraudulent counter-transaction processing executed by the transaction information processing system 1 will be described using the system chart of FIG.
 ステップS41において、代行装置14Aから不正取引を示す不正証拠と、不正が行われた取引の詳細が指定された不正取引情報とが交換所装置11Aに対して供給される。ステップS42において、交換所装置11Aは不正取引情報が表す不正取引を相殺する(すなわち流通トークンの募集元12から代行者14への移転を表す)反対取引情報を生成する。ステップS42において、交換所装置11Aは、不正取引情報を不正証拠と共に監査グループ40に放送する。 In step S41, fraudulent evidence indicating fraudulent transactions and fraudulent transaction information in which details of the fraudulent transaction are specified are supplied from the agency device 14A to the exchange device 11A. In step S42, the exchange device 11A generates counter-transaction information that offsets the fraudulent transaction represented by the fraudulent transaction information (that is, represents the transfer of the distribution token from the solicitor 12 to the agent 14). In step S42, the exchange device 11A broadcasts the fraudulent transaction information to the audit group 40 together with the fraudulent evidence.
 ステップS44において、募集元12に対応する監査装置42A~42Dのうち一の監査装置は、署名付取引情報に1つ目の電子署名を行い、署名付取引情報と不正取引情報とを不正証拠と共に監査グループ40に放送する。 In step S44, one of the auditing devices 42A to 42D corresponding to the solicitor 12 performs the first electronic signature on the signed transaction information, and the signed transaction information and the fraudulent transaction information are combined with the fraudulent evidence. Broadcast to audit group 40.
 ステップS45において、募集元12に対応する監査装置42A~42Dのうち一の監査装置は、署名付取引情報に2つ目の電子署名を行い、署名付取引情報と不正取引情報とを不正証拠と共に監査グループ40に放送する。 In step S45, one of the auditing devices 42A to 42D corresponding to the solicitor 12 performs a second electronic signature on the signed transaction information, and the signed transaction information and the fraudulent transaction information are combined with the fraudulent evidence. Broadcast to audit group 40.
 ステップS46において、募集元12に対応する監査装置42A~42Dのうち一の監査装置は、署名付取引情報に3つ目の電子署名を行い、署名付取引情報と不正取引情報とを監査グループ40に放送する。 In step S46, one of the auditing devices 42A to 42D corresponding to the solicitor 12 performs a third electronic signature on the signed transaction information, and the signed transaction information and the fraudulent transaction information are audited by the audit group 40. Broadcast to.
 ステップS47において、情報処理装置32Aは、電子署名の正当性を検証し、正しいハッシュ値を算出すると、算出したハッシュ値をP2Pネットワーク31に放送する。ステップS48において、P2Pネットワーク31内の分散台帳には、反対取引情報が表す取引(すなわち募集元12から代行者14への移転)が記録され、不正反対取引処理が終了する。 In step S47, the information processing device 32A verifies the validity of the electronic signature, calculates the correct hash value, and broadcasts the calculated hash value to the P2P network 31. In step S48, the transaction represented by the counter-transaction information (that is, the transfer from the solicitor 12 to the agent 14) is recorded in the distributed ledger in the P2P network 31, and the fraudulent counter-transaction process ends.
 <動作及び効果>
 以下、上記した実施形態から抽出される発明群の特徴について、必要に応じて効果等を示しつつ説明する。なお以下においては、理解の容易のため、上記各実施形態において対応する構成を括弧書き等で適宜示すが、この括弧書き等で示した具体的構成に限定されるものではない。また、各特徴に記載した用語の意味や例示等は、同一の文言にて記載した他の特徴に記載した用語の意味や例示として適用しても良い。
<Operation and effect>
Hereinafter, the characteristics of the invention group extracted from the above-described embodiments will be described while showing the effects and the like as necessary. In the following, for the sake of easy understanding, the corresponding configurations in each of the above embodiments are appropriately shown in parentheses or the like, but the present invention is not limited to the specific configurations shown in the parentheses or the like. In addition, the meanings and examples of terms described in each feature may be applied as meanings and examples of terms described in other features described in the same wording.
 本発明の取引情報処理システでは、秘密鍵がN個(Nは3以上の自然数)用意され、N-a個(aは自然数)の秘密鍵を用いて電子署名が可能なマルチシグニチャの公開鍵方式を用いて、データ上の権利である暗号を用いた暗号トークンの電子取引及び該暗号トークンの複数次流通取引として処理する取引情報システム(取引情報処理システム1)であって、
 前記暗号トークンの移転元(募集元12)と移転先(提供者13又は代行者14)との取引を仲介する交換所装置(交換所装置11A)と、
 予め監査権限が付与されており前記移転元に対応する秘密鍵を保有する複数の監査者に対応し、前記秘密鍵を用いて取引を認証する複数の監査装置(監査装置41A~41D,42A~42D)と、
 前記認証された取引をブロックチェーンに書き込むことにより、前記認証された取引を成立させるP2Pネットワーク(P2Pネットワーク31)とを有し、
 前記移転元が一つの前記秘密鍵(秘密鍵51E,52E)を保有し、
 前記複数の監査者が残りの前記秘密鍵(秘密鍵51A~D,52A~D)を一つずつ保有(すなわち秘密分散)することを特徴とする。
In the transaction information processing system of the present invention, N private keys (N is a natural number of 3 or more) are prepared, and a multi-signature public key that can be digitally signed using N-a (a is a natural number) private keys. A transaction information system (transaction information processing system 1) that uses a method to process electronic transactions of cryptographic tokens using cryptography, which is a data right, and multiple distribution transactions of the cryptographic tokens.
An exchange device (exchange device 11A) that mediates transactions between the transfer source (recruitment source 12) and the transfer destination (provider 13 or agent 14) of the cryptographic token, and
A plurality of auditing devices (auditing devices 41A to 41D, 42A to) that correspond to a plurality of auditors who are given audit authority in advance and hold a private key corresponding to the transfer source and authenticate transactions using the private key. 42D) and
It has a P2P network (P2P network 31) that establishes the authenticated transaction by writing the authenticated transaction on the blockchain.
The transfer source holds one secret key ( private keys 51E, 52E),
The plurality of auditors hold the remaining private keys (private keys 51A to D, 52A to D) one by one (that is, secret sharing).
 これにより、取引を実行するためには監査者の秘密鍵が必要であり、かつ監査者が保有する秘密鍵のみを使用した取引が可能となるため、取引情報処理システム全体としての取引に対する監視体制を強化することができ、暗号トークンを不正に販売することを抑制できる。 As a result, the auditor's private key is required to execute the transaction, and the transaction can be performed using only the private key held by the auditor. Therefore, the transaction information processing system as a whole monitors the transaction. Can be strengthened, and fraudulent sales of cryptographic tokens can be suppressed.
 また、取引情報処理システムにおいて、前記複数の監査装置のうち第1~第N-(a+1)の監査装置は、
 移転元と移転先とでマッチングした取引を表し前記移転元の電子署名がされた取引情報が供給され、前記監視者が前記取引の正当性を認証すると、第1~第N-(a+1)によって電子署名を行い、
 前記P2Pネットワークは、
 前記第1~第N-(a+1)の監査装置によって電子署名された取引を成立させることを特徴とする。
Further, in the transaction information processing system, among the plurality of auditing devices, the first to N- (a + 1) auditing devices are
When the transaction information that represents the matching transaction between the transfer source and the transfer destination and the electronic signature of the transfer source is supplied and the observer authenticates the validity of the transaction, the first to N- (a + 1) Digitally sign
The P2P network is
It is characterized in that an electronically signed transaction is completed by the first to N- (a + 1) auditing devices.
 これにより、取引の当事者(移動元)が電子署名後に残りを監査装置によって電子署名すれば良いため、監査装置による電子署名の数を低減させ、取引の終了(分散台帳への記録)までの処理時間を短縮することができる。 As a result, since the parties to the transaction (moving source) need only digitally sign the rest with the audit device after the electronic signature, the number of electronic signatures by the audit device can be reduced and the process until the end of the transaction (recording in the distributed ledger). You can save time.
 取引情報処理システムにおいて、
 前記複数の監査装置のうち第1~第N-aの監査装置は、
 送付された過去に成立した取引に対して、前記監視者が不正を認証すると、対応する取引を取り消す反対取引情報に対して電子署名を行い、
 前記P2Pネットワークは、
 前記電子署名を行った監査装置から供給される認証された反対取引情報が表す反対取引を成立させることを特徴とする。
In the transaction information processing system
Of the plurality of auditing devices, the first to NA auditing devices are
When the observer authenticates the fraudulent transaction that was sent in the past, the counter-transaction information that cancels the corresponding transaction is digitally signed.
The P2P network is
It is characterized in that the counter-transaction represented by the authenticated counter-trade information supplied from the audit device that has performed the electronic signature is completed.
 これにより、監査権限を有する監査者のみで反対取引を成立させることができ、暗号トークンを不正に販売することを抑制できる。 As a result, it is possible to conclude a counter-trade only by an auditor who has audit authority, and it is possible to suppress the illegal sale of cryptographic tokens.
 取引情報処理システムにおいて、
 前記交換所装置又は前記第1の監査装置は、
 過去に成立した取引に対して、前記反対取引情報を生成する
 ことを特徴とする。
In the transaction information processing system
The exchange device or the first audit device
It is characterized in that the counter-transaction information is generated for transactions that have been completed in the past.
 これにより、取引情報処理システムでは、公正な立場にある交換所又は複数の監査者にのみ反対取引情報の生成をさせることができ、当事者(代行者14)に反対取引情報を生成させないため、むやみに反対取引情報が生成されるのを未然に防止できる。 As a result, in the transaction information processing system, only the exchange or a plurality of auditors in a fair position can generate the counter-transaction information, and the parties (agent 14) do not generate the counter-transaction information. It is possible to prevent the generation of counter-trade information.
 前記取引情報システムは、
 前記移転先の取引を代行する代行装置を有し、
 前記代行装置と前記移転元に対応する移転元装置との間で前記取引が実行されることを特徴とする。
The transaction information system
It has an agency device that acts on behalf of the transaction of the transfer destination,
The transaction is executed between the agency device and the transfer source device corresponding to the transfer source.
 これにより、証券会社などの代行者を利用して、個人などが簡単に取引に参加することができる。 This allows individuals and others to easily participate in transactions using agents such as securities companies.
 取引情報処理システムにおいて、前記交換所装置は、
 前記移転元と前記移転先とでマッチングした取引に関して取引情報を生成し、
 前記移転先に対応する移転先装置は、
 前記取引情報に対して電子署名を行い、
 前記交換所装置又は前記移転先装置は、
 少なくとも前記複数の監視者装置に対して前記電子署名された取引情報を
送信することを特徴とする。
In the transaction information processing system, the exchange device is
Generate transaction information for transactions that match the transfer source and transfer destination.
The relocation destination device corresponding to the relocation destination is
Electronically sign the transaction information
The exchange device or the relocation destination device
It is characterized in that the electronically signed transaction information is transmitted to at least the plurality of observer devices.
 これにより、未電子署名の取引情報を監視者装置にのみ送信することができるため、未成立の取引の秘密性を担保できる。 As a result, the unsigned transaction information can be transmitted only to the observer device, so that the confidentiality of the unsuccessful transaction can be guaranteed.
<他の実施の形態>
 なお上述実施形態では、監査グループ40に対してのみ通常取引情報又は反対取引情報並びに署名付取引情報が放送されるようにしたが、本発明はこれに限られない。例えば図6に示すように、P2Pネットワーク31の全体に対して放送されても良い。また、通常取引情報又は反対取引情報並びに署名付取引情報を放送するのは必ずしも交換所装置11Aである必要は無く、例えば代行装置14Aなどの取引の当事者がP2Pネットワーク31に直接放送してもよい。この場合、例えば監査グループ40にのみ復号可能な暗号をかけるなどすることにより、未成立の取引に対する秘密性を確保できる。
<Other embodiments>
In the above-described embodiment, the normal transaction information or the counter-transaction information and the signed transaction information are broadcast only to the audit group 40, but the present invention is not limited to this. For example, as shown in FIG. 6, it may be broadcast to the entire P2P network 31. Further, it is not always necessary for the exchange device 11A to broadcast the normal transaction information or the counter-transaction information and the signed transaction information, and the parties to the transaction such as the agency device 14A may broadcast directly to the P2P network 31. .. In this case, for example, by applying a decryptable code only to the audit group 40, the confidentiality of the unsuccessful transaction can be ensured.
 また上述実施形態では、代行者14が提供者13の取引を代行したが、本発明はこれに限られない。例えば図7に示すように、提供者13が有する提供者装置13Aによって処理が実行されても良い。この場合、提供者装置13Aは、代行装置14Aの代わりに、代行装置14Aと同様の処理を実行する。また、募集元12に代行者が存在しても良い。この場合、上述実施形態と同様、代行者が保有する秘密鍵を用いて取引が実行される。 Further, in the above-described embodiment, the agent 14 acts as the agent for the transaction of the provider 13, but the present invention is not limited to this. For example, as shown in FIG. 7, the process may be executed by the provider device 13A owned by the provider 13. In this case, the provider device 13A executes the same processing as the proxy device 14A instead of the proxy device 14A. In addition, there may be an agent at the recruiting source 12. In this case, as in the above embodiment, the transaction is executed using the private key held by the agent.
 上述実施形態では、5つの秘密鍵を使用するようにしたが、本発明はこれに限られない。例えば3つの秘密鍵を使用して2つ以上の秘密鍵で電子署名可能にしたり、4つの秘密鍵を使用して3つ以上の秘密鍵で電子署名可能にすることもできる。要は、秘密鍵がN個存在し、(N-a)個の秘密鍵を用いることにより電子署名の検証が可能であるようにすれば良い。 In the above-described embodiment, five private keys are used, but the present invention is not limited to this. For example, three private keys can be used to digitally sign with two or more private keys, or four private keys can be used to digitally sign with three or more private keys. The point is that there are N private keys, and the electronic signature can be verified by using (NA) private keys.
 上述実施形態では、監査グループ40もP2Pネットワーク31に参加しているようにしたが、本発明はこれに限られない。監査グループ40はP2Pネットワーク31とは重複しない単独グループとして存在させても良い。また、必ずしも監査グループ40に対して通常取引情報又は反対取引情報並びに署名付取引情報などを放送する必要は無く、例えば交換所装置に予め秘密鍵を保有する監査者の監査装置が登録されており、取引者に応じた監査装置を選定して通常取引情報又は反対取引情報並びに署名付取引情報など送信するようにしても良い。 In the above-described embodiment, the audit group 40 also participates in the P2P network 31, but the present invention is not limited to this. The audit group 40 may exist as a single group that does not overlap with the P2P network 31. In addition, it is not always necessary to broadcast normal transaction information or counter-transaction information, signed transaction information, etc. to the audit group 40. For example, an audit device of an auditor who holds a private key is registered in advance in the exchange device. , An auditing device suitable for the trader may be selected to transmit normal transaction information or counter-transaction information, signed transaction information, and the like.
 上述実施形態では、一つの取引(流通トークン)を代行者14から募集元12へ移動する取引について説明したが、本発明はこれに限られない。2つの取引(流通トークンを代行者14から募集元12へ移動する取引と、暗号トークンPを募集元12から代行者14へ移動させる取引)が同時並行的に行われる必要がありるため、これらをセットにして監査グループ40に放送又は送信することにより、一段と厳密な監査を行うことが可能となる。この場合、2つの通常取引情報と、一方の署名付取引情報とがパッケージになって送付されることが好ましい。 In the above-described embodiment, the transaction of moving one transaction (distribution token) from the agent 14 to the solicitor 12 has been described, but the present invention is not limited to this. Since two transactions (a transaction for moving the distribution token from the agent 14 to the agent 12 and a transaction for moving the cryptographic token P from the agent 12 to the agent 14) need to be performed in parallel, these are required. By broadcasting or transmitting to the audit group 40 as a set, a more rigorous audit can be performed. In this case, it is preferable that the two normal transaction information and one signed transaction information are sent as a package.
 上述実施形態では、資産に基づくセキュリティトークンの販売時に本発明の取引情報処理システム1を適用する場合について述べたが、本発明はこれに限られない。例えばスタートアップ企業の資金募集や資金移動を目的とするいわゆる暗号資産などについても本発明を適用することができる。 In the above-described embodiment, the case where the transaction information processing system 1 of the present invention is applied at the time of selling the security token based on the asset has been described, but the present invention is not limited to this. For example, the present invention can be applied to so-called cryptographic assets for the purpose of soliciting funds or transferring funds of start-up companies.
 上述実施形態では、代行者14に対応する秘密鍵51A~51Dを保有する監査者41に対応する監査装置41A~41Dの全てに通常取引情報が送信され、最も早く処理を行った監査装置41A~41Dの署名付取引情報のみが使用されたが、本発明はこれに限られない。例えば、予め又は取引ごとに順位が割り振られ、早い順位から順に通常取引情報又は通常取引情報及び署名付取引情報が送信されても良い。この場合、例えば所定時間が経過しても通常取引情報及び署名付取引情報が次の順位の監査装置に送信されない場合には、該送信された監査装置を飛ばし、次の順位の監査装置に送信されるようにすることができる。 In the above-described embodiment, the normal transaction information is transmitted to all of the auditing devices 41A to 41D corresponding to the auditor 41 having the private keys 51A to 51D corresponding to the agent 14, and the auditing devices 41A to 41A to perform the processing earliest. Only 41D signed transaction information was used, but the present invention is not limited to this. For example, a ranking may be assigned in advance or for each transaction, and ordinary transaction information or ordinary transaction information and signed transaction information may be transmitted in order from the earliest order. In this case, for example, if the normal transaction information and the signed transaction information are not transmitted to the audit device of the next rank even after the lapse of a predetermined time, the transmitted audit device is skipped and transmitted to the audit device of the next rank. Can be done.
 上述実施形態では、ネットワークによって不正取引が検出されたが、本発明はこれに限られない。例えば、募集元12が虚偽の申請を行うなどして不正を行った場合などには、不正証拠が提供者13又は代行者14によって提出される。この場合であっても、同様にして不正反対取引処理が実行される。また、例えば募集元12が逮捕されたような場合には、交換所11によって不正取引が特定されて不正取引情報が生成されても良い。不正取引が発覚したアカウントについては、取引のリクエストを監視者が受け付けなくする事で取引が不可能になる。不正アカウント及び、不正取引情報は不正証拠として台帳に記録保持される。 In the above embodiment, fraudulent transactions were detected by the network, but the present invention is not limited to this. For example, when the recruiting source 12 commits fraud by making a false application, proof of fraud is submitted by the provider 13 or the agent 14. Even in this case, fraudulent counter-transaction processing is executed in the same manner. Further, for example, when the recruiting source 12 is arrested, the fraudulent transaction may be specified by the exchange 11 and the fraudulent transaction information may be generated. For accounts where fraudulent transactions have been discovered, transactions will not be possible if the observer does not accept transaction requests. Fraudulent accounts and fraudulent transaction information are recorded and retained in the ledger as evidence of fraud.
 上述実施形態では、移転元と移転先として、募集元12と提供者13間で取引を行う場合について説明したが、本発明はこれに限られない。例えば、暗号トークンを募集元12から購入して暗号トークンの保有者となった保有者と提供者間、さらに複数の取引を介して暗号トークンの保有者となった保有者と提供者間による複数次取引においても同様に本発明を適用することが可能である。 In the above-described embodiment, the case where a transaction is conducted between the solicitor 12 and the provider 13 as the transfer source and the transfer destination has been described, but the present invention is not limited to this. For example, between the holder and the provider who purchased the crypto token from the solicitor 12 and became the holder of the crypto token, and further between the holder and the provider who became the holder of the crypto token through a plurality of transactions. The present invention can be similarly applied to the next transaction.
 上述実施形態では述べていないが、電子署名の方式に制限は無く、閾値署名やBLS署名などの公知の方法を適宜選択して使用することが可能である。例えば、(N-a)個の秘密鍵で署名されたトランザクション(取引情報)をマスター公開鍵で検証したり、(N-a)個の秘密鍵で署名されたトランザクションを(N-a)個の秘密鍵に対応する公開鍵で検証することができる。 Although not described in the above-described embodiment, there is no limitation on the electronic signature method, and a known method such as a threshold signature or a BLS signature can be appropriately selected and used. For example, a transaction (transaction information) signed with (NA) private keys can be verified with the master public key, or (NA) transactions signed with (NA) private keys can be verified. It can be verified with the public key corresponding to the private key of.
 また、公開鍵をトランザクション(取引情報)に附したり、全ての公開鍵を取引システムで一元管理して公開したり、取引ごとに乱数などを用いて公開鍵が生成されても良い。このとき、公開鍵としては、秘密鍵の数(N)だけ生成されても良く、電子署名に使用された秘密鍵に対応する公開鍵(すなわち、N-a)だけ生成されても良い。電子署名に使用された秘密鍵に対応する公開鍵が使用されたり、電子署名に使用されていない秘密鍵を含むマスター秘密鍵に対応するマスター公開鍵が生成され使用されることにより、電子署名の正当性が検証される。マルチシグを用いたトークン取引方法としては、トランザクションに対してそのまま公開鍵を付加するRaw Output 方式や、トランザクションに対して公開鍵のハッシュを付加するP2SH(Pay to Script Hash)方式などが好適に用いられる。 In addition, the public key may be attached to a transaction (transaction information), all public keys may be centrally managed and made public by a transaction system, or a public key may be generated using a random number or the like for each transaction. At this time, as the public key, only the number of private keys (N) may be generated, or only the public keys (that is, NA) corresponding to the private keys used for the electronic signature may be generated. By using the public key corresponding to the private key used for the digital signature, or by generating and using the master public key corresponding to the master private key including the private key not used for the digital signature, the digital signature can be used. The legitimacy is verified. As a token transaction method using multisig, a Raw Output method in which a public key is added to a transaction as it is, a P2SH (Pay to Script Hash) method in which a hash of a public key is added to a transaction, and the like are preferably used. ..
 本発明は、例えば資産に紐付いたセキュリティトークンの取引システムに利用することができる。 The present invention can be used, for example, in a security token trading system linked to an asset.
1   :取引情報処理システム
11  :交換所
11A :交換所装置
12  :募集元
12A :募集元装置
13  :提供者
13A :提供者装置
14  :代行者
14A :代行装置
31  :P2Pネットワーク
32  :通常グループ
32A :情報処理装置
40  :監査グループ
41  :監査者
41A~41D,42A~42D:監査装置
51,51A~51E,52,52A~52E:秘密鍵
P   :暗号トークン

 
1: Transaction information processing system 11: Exchange 11A: Exchange device 12: Recruiter 12A: Recruiter device 13: Provider 13A: Provider device 14: Agent 14A: Agency device 31: P2P network 32: Normal group 32A : Information processing device 40: Audit group 41: Auditors 41A to 41D, 42A to 42D: Audit devices 51, 51A to 51E, 52, 52A to 52E: Private key P: Cryptographic token

Claims (6)

  1.  秘密鍵がN個(Nは3以上の自然数)用意され、N-a個(aは自然数かつN-aは2以上)の秘密鍵を用いて電子署名を行うことが可能なマルチシグニチャの公開鍵方式を用いて、データ上の権利である暗号を用いた暗号トークンの電子取引及び該暗号トークンの複数次流通取引として処理する取引情報システムであって、
     前記暗号トークンの移転元と移転先との取引を仲介する交換所装置と、
     予め監査権限が付与されており前記移転元に対応する秘密鍵を保有する複数の監査者に対応し、前記秘密鍵を用いて取引を認証する複数の監査装置と、
     前記認証された取引をブロックチェーンに書き込むことにより、前記認証された取引を成立させるP2P(Peer to Peer)ネットワークとを有し、
     前記移転元が一つの前記秘密鍵を保有し、
     前記複数の監査者が残りの前記秘密鍵を一つずつ保有する
     ことを特徴とする取引情報処理システム。
    Publication of a multi-signature in which N private keys (N is a natural number of 3 or more) are prepared and it is possible to digitally sign using NA (a is a natural number and NA is 2 or more) private keys. A transaction information system that uses a key method to process electronic transactions of cryptographic tokens using cryptography, which is a data right, and multiple distribution transactions of the cryptographic tokens.
    An exchange device that mediates transactions between the transfer source and transfer destination of the cryptographic token, and
    A plurality of auditing devices that are given auditing authority in advance and that correspond to a plurality of auditors holding a private key corresponding to the transfer source and authenticate transactions using the private key, and a plurality of auditing devices.
    It has a P2P (Peer to Peer) network that establishes the authenticated transaction by writing the authenticated transaction on the blockchain.
    The transfer source holds one of the private keys,
    A transaction information processing system in which the plurality of auditors hold the remaining private keys one by one.
  2.  前記複数の監査装置のうち第1~第N-(a+1)の監査装置は、
     前記移転元と前記移転先とでマッチングした取引を表し前記移転元の電子署名がされた取引情報が供給され、前記監査者が前記取引の正当性を認証すると、第1~第N-(a+1)によって電子署名を行い、
     前記P2Pネットワークは、
     前記第1~第N-(a+1)の監査装置によって電子署名された取引を成立させる
     ことを特徴とする請求項1に記載の取引情報処理システム。
    Of the plurality of auditing devices, the first to N- (a + 1) auditing devices are
    When the transaction information that represents the matching transaction between the transfer source and the transfer destination and the electronic signature of the transfer source is supplied and the auditor authenticates the validity of the transaction, the first to N- (a + 1) ) To digitally sign
    The P2P network is
    The transaction information processing system according to claim 1, wherein an electronically signed transaction is completed by the first to N- (a + 1) auditing devices.
  3.  前記複数の監査装置のうち第1~第N-aの監査装置は、
     送付された過去に成立した取引に対して、前記監査者が不正を認証すると、対応する取引を取り消す反対取引情報に対して電子署名を行い、
     前記P2Pネットワークは、
     前記電子署名を行った監査装置から供給される認証された反対取引情報が表す反対取引を成立させる
     ことを特徴とする請求項1に記載の取引情報処理システム。
    Of the plurality of auditing devices, the first to NA auditing devices are
    When the auditor authenticates the fraudulent transaction that was sent in the past, the counter-transaction information that cancels the corresponding transaction is digitally signed.
    The P2P network is
    The transaction information processing system according to claim 1, wherein the counter-transaction represented by the authenticated counter-trade information supplied from the audit device that has digitally signed is established.
  4.  前記交換所装置又は前記第1の監査装置は、
     過去に成立した取引に対して、前記反対取引情報を生成する
     ことを特徴とする請求項3に記載の取引情報処理システム。
    The exchange device or the first audit device
    The transaction information processing system according to claim 3, wherein the counter-transaction information is generated for a transaction that has been completed in the past.
  5.  前記取引情報システムは、
     前記移転先の取引を代行する代行装置を有し、
     前記代行装置と前記移転元に対応する移転元装置との間で前記取引が実行される
     ことを特徴とする請求項1に記載の取引情報処理システム。
    The transaction information system
    It has an agency device that acts on behalf of the transaction of the transfer destination,
    The transaction information processing system according to claim 1, wherein the transaction is executed between the agency device and the transfer source device corresponding to the transfer source.
  6.  前記交換所装置は、
     前記移転元と前記移転先とでマッチングした取引に関して取引情報を生成し、
     前記移転先に対応する移転先装置は、
     前記取引情報に対して電子署名を行い、
     前記交換所装置又は前記移転先装置は、
     少なくとも前記複数の監査装置に対して前記電子署名された取引情報を
    送信する
     ことを特徴とする請求項2に記載の取引情報処理システム。
     

     
    The exchange device
    Generate transaction information for transactions that match the transfer source and transfer destination.
    The relocation destination device corresponding to the relocation destination is
    Electronically sign the transaction information
    The exchange device or the relocation destination device
    The transaction information processing system according to claim 2, wherein the electronically signed transaction information is transmitted to at least the plurality of audit devices.


PCT/JP2020/035941 2019-09-24 2020-09-24 Transaction information processing system WO2021060340A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
JP2019172727A JP6840319B1 (en) 2019-09-24 2019-09-24 Transaction information processing system
JP2019-172727 2019-09-24

Publications (1)

Publication Number Publication Date
WO2021060340A1 true WO2021060340A1 (en) 2021-04-01

Family

ID=74845355

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/JP2020/035941 WO2021060340A1 (en) 2019-09-24 2020-09-24 Transaction information processing system

Country Status (2)

Country Link
JP (1) JP6840319B1 (en)
WO (1) WO2021060340A1 (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170249667A1 (en) * 2016-02-25 2017-08-31 Cayan Llc Use of item level transactional details in payment processing and customer engagement platforms

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004192624A (en) * 2002-11-26 2004-07-08 Ip Strategy:Kk Storage medium with unmediated financial transaction program recorded, unmediated financial transaction system, and unmediated financial transaction method
JP2004220334A (en) * 2003-01-15 2004-08-05 Hitachi Ltd Control method for information processor, information processor, program and record medium
JP2018507501A (en) * 2015-03-05 2018-03-15 ゴールドマン サックス アンド カンパニー エルエルシー System and method for updating a distributed ledger based on partial authorization of a transaction
JP2018511137A (en) * 2015-04-05 2018-04-19 デジタル・アセット・ホールディングス Digital asset brokerage electronic payment platform
JP2018536957A (en) * 2015-11-30 2018-12-13 シェイプシフト・アーゲーShapeShift AG System and method for improving security in blockchain asset transactions
WO2019072670A1 (en) * 2017-10-09 2019-04-18 Koninklijke Kpn N.V. Blockchain with transaction cancellation
JP2019161302A (en) * 2018-03-08 2019-09-19 Gmoシステムコンサルティング株式会社 Signature system

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160071108A1 (en) * 2014-09-04 2016-03-10 Idm Global, Inc. Enhanced automated anti-fraud and anti-money-laundering payment system
JP2018097725A (en) * 2016-12-15 2018-06-21 シラジ エイマル Digital transaction system based on virtual currency
GB201715423D0 (en) * 2017-09-22 2017-11-08 Nchain Holdings Ltd Computer-implemented system and method

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2004192624A (en) * 2002-11-26 2004-07-08 Ip Strategy:Kk Storage medium with unmediated financial transaction program recorded, unmediated financial transaction system, and unmediated financial transaction method
JP2004220334A (en) * 2003-01-15 2004-08-05 Hitachi Ltd Control method for information processor, information processor, program and record medium
JP2018507501A (en) * 2015-03-05 2018-03-15 ゴールドマン サックス アンド カンパニー エルエルシー System and method for updating a distributed ledger based on partial authorization of a transaction
JP2018511137A (en) * 2015-04-05 2018-04-19 デジタル・アセット・ホールディングス Digital asset brokerage electronic payment platform
JP2018536957A (en) * 2015-11-30 2018-12-13 シェイプシフト・アーゲーShapeShift AG System and method for improving security in blockchain asset transactions
WO2019072670A1 (en) * 2017-10-09 2019-04-18 Koninklijke Kpn N.V. Blockchain with transaction cancellation
JP2019161302A (en) * 2018-03-08 2019-09-19 Gmoシステムコンサルティング株式会社 Signature system

Also Published As

Publication number Publication date
JP6840319B1 (en) 2021-03-10
JP2021052260A (en) 2021-04-01

Similar Documents

Publication Publication Date Title
JP7533974B2 (en) Apparatus, system, or method for facilitating value transfer between parties with low or no trust
JP7350030B2 (en) Method and system for recording multiple transactions on blockchain
US11687924B2 (en) Cryptocurrency infrastructure system
US11250507B2 (en) Trusted tokenized transactions in a blockchain system
US11507929B2 (en) Digital fiat currency
US11270299B2 (en) Methods and systems of using a cryptocurrency system to manage payments and payment alternatives
US6157920A (en) Executable digital cash for electronic commerce
US6236972B1 (en) Method and apparatus for facilitating transactions on a commercial network system
CN111418184B (en) Credible insurance letter based on block chain
CN111373431B (en) Credible insurance letter based on block chain
JP2020071617A (en) Transaction method, program, verifying apparatus and creating method
CN109829767A (en) A kind of point reward exchanging system and method based on block chain technology
TW201732700A (en) Blockchain-based exchange with tokenisation
CN111357026B (en) Credible insurance letter based on block chain
JP2017504127A (en) Rights transfer and verification
CN111417945B (en) Credible insurance letter based on block chain
CN111433799B (en) Credible insurance letter based on block chain
CN111433798B (en) Credible insurance letter based on block chain
CN107852333A (en) System and method for the mandate of sharable content object
CN113826134A (en) Credible insurance letter based on block chain
CN115136542A (en) Intelligent contract
WO2021060340A1 (en) Transaction information processing system
Li et al. Secure electronic ticketing system based on consortium blockchain
Senthilkumar Data confidentiality, integrity, and authentication
Lesavre et al. Token Design and Management Overview

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20868074

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 21.06.2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20868074

Country of ref document: EP

Kind code of ref document: A1