WO2021114446A1 - 数字资产隔离管理系统和方法 - Google Patents

数字资产隔离管理系统和方法 Download PDF

Info

Publication number
WO2021114446A1
WO2021114446A1 PCT/CN2020/070536 CN2020070536W WO2021114446A1 WO 2021114446 A1 WO2021114446 A1 WO 2021114446A1 CN 2020070536 W CN2020070536 W CN 2020070536W WO 2021114446 A1 WO2021114446 A1 WO 2021114446A1
Authority
WO
WIPO (PCT)
Prior art keywords
key
server
encryption machine
offline
digital asset
Prior art date
Application number
PCT/CN2020/070536
Other languages
English (en)
French (fr)
Inventor
杜晓楠
Original Assignee
杜晓楠
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Priority claimed from CN201911290904.1A external-priority patent/CN111144885B/zh
Priority claimed from CN201911342711.6A external-priority patent/CN111523881B/zh
Priority claimed from CN201911341614.5A external-priority patent/CN111523879B/zh
Priority claimed from CN201911345174.0A external-priority patent/CN111507707B/zh
Application filed by 杜晓楠 filed Critical 杜晓楠
Priority to US17/050,909 priority Critical patent/US20220129886A1/en
Publication of WO2021114446A1 publication Critical patent/WO2021114446A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/385Payment protocols; Details thereof using an alias or single-use codes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/083Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) involving central third party, e.g. key distribution center [KDC] or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • G06Q20/0655Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash e-cash managed centrally
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • G06Q20/0658Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash e-cash managed locally
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3823Payment protocols; Details thereof insuring higher security of transaction combining multiple encryption tools for a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • H04L9/3228One-time or temporary data, i.e. information which is sent for every authentication or authorization, e.g. one-time-password, one-time-token or one-time-key
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • the invention relates to the field of digital asset management, and more specifically, to a digital asset isolation management system and method.
  • Digital assets are non-monetary assets that are owned or controlled by enterprises or individuals, exist in the form of electronic data, and are held in daily activities for sale or in the production process.
  • computerized device software firmware, executable instructions, digital certificates (such as public key certificates), cryptographic keys, Bitcoin, etc.
  • digital certificates such as public key certificates
  • cryptographic keys Bitcoin, etc.
  • digital assets are usually stored in some digital asset isolation management platforms.
  • the technical problem to be solved by the present invention is to provide a digital asset isolation management system and method in view of the defects that the digital asset isolation management platform of the prior art is vulnerable to network attacks, has greater security risks and information leakage risks, and can be safe and efficient.
  • the key is protected to ensure the security of digital assets.
  • the technical solution adopted by the present invention to solve its technical problems is to construct a digital asset isolation management system, including: a financial management server communicating with an external network, a management server communicating with the financial management server via a first communication channel, and a management server communicating with the financial management server via a first communication channel.
  • the financial management server receives the key application and transmits it to the key server through the management server, the key server generates a key, and transmits the key to the first offline encryption machine;
  • the first offline encryption machine encrypts the key to generate an encrypted private key and a public key, stores the encrypted private key internally and returns the public key to the key server, and the key server sends the The public key is returned to the financial management server in the original way.
  • the financial management server receives transaction data that needs to be signed, and transmits it to the key server through the management server, and the key server uses public key encryption to encrypt The data is sent to the first offline encryption machine, which uses the encrypted private key to sign the encrypted data, and then returns the signed data to the key server, and the key server sends the The original signature data is returned to the financial management server.
  • the third communication channel includes a first sonic wave transceiving device set on the key server and a second sonic wave transceiving device set on the first offline encryption machine
  • the first acoustic wave transceiving device is connected to the key server through a USB interface
  • the second acoustic wave transceiving device is connected to the first offline encryption machine through a USB interface.
  • the third communication channel includes a first two-dimensional code scanning communication device set on the key server and a second second communication device set on the first offline encryption machine.
  • One-dimensional code scanning communication device the first two-dimensional code scanning communication device communicates with the key server through a USB interface
  • the second two-dimensional code scanning communication device communicates with the first offline encryption machine through a USB interface Connection
  • each of the two-dimensional code scanning unit includes a scanning unit and a display unit.
  • the financial management server receives the transaction data that needs to be signed, and transmits it to the key server through the management server, and the key server performs the transaction data that needs to be signed. Encode the two-dimensional code, then encrypt the obtained two-dimensional code with a public key, and display the encrypted two-dimensional code on its display unit; the scanning unit on the first offline encryption machine scans to obtain the encrypted two-dimensional code with Obtain the transaction data and use the encrypted private key to sign the transaction data, and then encode the signature data with a two-dimensional code and display the signed two-dimensional code on its display unit. The scanning unit on the key server obtains all the data. The signature two-dimensional code is used to obtain the signature data, and then the key server returns the signature data to the financial management server.
  • the digital asset isolation management system includes a plurality of first offline encryption machines, and the financial management server receives a key application and transmits it to the key through the management server Server, the key server generates a key, and transmits the key to each of the first offline encryptors; each of the first offline encryptors encrypts the key to generate its own encrypted private key And the public key, and store the encrypted private key internally and return the public key to the key server, and the key server returns the public key to the financial management server in the same way.
  • the financial management server receives the transaction data that needs to be signed from the external network, and transmits it to the key server through the management server, and the management server is based on settings
  • the rule selects at least one of the plurality of first offline encryption machines for signing.
  • the key server and the first offline encryption machine are arranged in a confined space, and are physically separated from each other by a transparent partition;
  • the first communication channel is provided with a first A firewall, the management server is set in an internal network;
  • a second firewall is set in the second communication channel, and the key server is set in an isolated network.
  • the scanning unit is a scanner
  • the display unit is a liquid crystal display
  • an anti-peeping film is pasted on the liquid crystal display.
  • the asset isolation management system of the present invention further includes a second offline encryption machine, and the first offline encryption machine communicates with the second offline encryption machine through the fourth communication channel.
  • the financial management server receives a key application and transmits it to the key server through the management server, and the key server generates a key and transfers the key to the key server.
  • the key is transmitted to the first offline encryption machine, the first offline encryption machine forwards the key to the second offline encryption machine, and the second offline encryption machine encrypts the key to generate an encrypted private key And the public key, and store the encrypted private key internally and return the public key to the financial management server in the original way;
  • the financial management server receives the transaction data that needs to be signed and transmits it to the key server through the management server, and the key server forwards the transaction data that needs to be signed to the first offline encryption machine.
  • the first offline encryptor uses public key encryption to send encrypted data to the second offline encryptor, and the second offline encryptor uses the encrypted private key to sign the encrypted data, and then returns the signed data to the original path To the financial management server.
  • the first offline encryption machine and the second offline encryption machine are arranged in a confined space, and the key server is arranged outside the confined space.
  • the third communication channel includes a first sonic wave transceiving device provided on the key server and a second sonic wave transceiving device provided on the first offline encryption machine;
  • the first acoustic wave transceiving device is connected to the key server through a USB interface
  • the second acoustic wave transceiving device is connected to the first offline encryption machine through a USB interface.
  • the fourth communication channel includes a first two-dimensional code scanning communication device set on the first offline encryption machine and a second communication device set on the second offline encryption machine.
  • a two-dimensional code scanning communication device the first two-dimensional code scanning communication device is communicatively connected with the first offline encryption machine through a USB interface, and the second two-dimensional code scanning communication device is encrypted with the second line through a USB interface
  • Each of the two-dimensional code scanning units includes a scanning unit and a display unit.
  • the financial management server receives the transaction data that needs to be signed from the external network, and transmits it to the key server through the management server, and the key server passes through the
  • the first sonic wave transceiving device sends the transaction data that needs to be signed to the second sonic wave transceiving device of the first offline encryption machine, and the first off-line encryption machine encodes the transaction data that needs to be signed by a two-dimensional code, Then the obtained two-dimensional code is encrypted with a public key, and the encrypted two-dimensional code is displayed on its display unit;
  • the scanning unit on the second offline encryption machine scans to obtain the encrypted two-dimensional code to obtain the transaction data And use the encrypted private key to sign the transaction data, then encode the signature data with a two-dimensional code to generate a signed two-dimensional code, and then use its display unit to display the signed two-dimensional code;
  • the first offline encryption The scanning unit on the machine scans and acquires the signature two-dimensional code to obtain the signature data, and sends the signature data through the second
  • the digital asset isolation management system includes a plurality of second offline encryption machines, and the financial management server receives a key application and transmits it to the key through the management server Server, the key server generates a key, and forwards the key to each of the second offline encryptors through the first offline encryptor; each of the second offline encryptors encrypts the secret Key to generate the respective encrypted private key and public key, store the encrypted private key internally and return the public key to the key server, and the key server returns the public key to the Financial management server.
  • the financial management server receives the transaction data that needs to be signed from the external network, and transmits it to the key server through the management server, and the management server is based on settings
  • the rule selects at least one of the plurality of second offline encryption machines for signing.
  • the asset isolation management system of the present invention further includes a wallet server and an online encryption machine.
  • the wallet server communicates with the financial management server through the first communication channel, and communicates with the financial management server through the second communication channel.
  • the key server communicates, and the wallet server communicates with the online encryption machine at the same time;
  • the wallet server receives a digital asset deposit request and deposits a first proportion of digital assets into the online encryption machine according to a set rule, and deposits a second proportion of digital assets into the first offline encryption machine;
  • the financial management server receives the digital asset retrieval request and sends it to the wallet server, and the wallet server retrieves the digital asset from the online encryption machine and/or the first offline encryption machine according to the set rules. Assets and return to the financial management server.
  • the financial management server receives a key application and transmits it to the key server through the management server, and the key server generates a key and transfers the key to the key server.
  • the key is transmitted to the first offline encryption machine and the online encryption machine; the online encryption machine encrypts the key to generate a first encrypted private key and a first public key, and stores the first encrypted private key internally And return the first public key to the key server and the financial management server; the first offline encryption machine encrypts the key to generate a second encrypted private key and a second public key and store them internally
  • the second encrypted private key and the second public key are returned to the key server, and the key server returns the second public key to the financial management server.
  • the wallet server analyzes the first transaction data that requires the signature of the online encryption machine and the signature of the online encryption machine based on the digital asset withdrawal request and the set rules.
  • the key server uses the first public key to encrypt the first transaction data and then sends the first encrypted data to the online through the wallet server
  • An encryption machine the online encryption machine uses the first encrypted private key to sign the first encrypted data, and then returns the generated first signature data to the wallet server, and the wallet server sends the first signature data Return to the financial management server in the same way
  • the key server uses the second public key to encrypt the second transaction data and then sends the second encrypted data to the first offline encryptor via the third communication channel
  • the first offline encryptor uses the second encrypted private key to sign the second encrypted data, and then returns the generated second signature data to the key server, and the key server signs the second encrypted data
  • the original data path is returned to the financial management server.
  • the asset isolation management system of the present invention further includes a wallet server and an online encryption machine.
  • the wallet server communicates with the financial management server through the first communication channel, and communicates with the financial management server through the second communication channel.
  • the key server communicates, and the wallet server communicates with the online encryption machine at the same time;
  • the wallet server receives a digital asset deposit request and deposits a first proportion of digital assets into the online encryption machine according to a set rule, and deposits a second proportion of digital assets into the second offline encryption machine;
  • the financial management server receives the digital asset retrieval request and sends it to the wallet server, and the wallet server retrieves the digital asset from the online encryption machine and/or the second offline encryption machine according to set rules. Assets and return to the financial management server.
  • the financial management server receives a key application and transmits it to the key server through the management server, and the key server generates a key and transfers the key to the key server.
  • the key is transmitted to the first offline encryption machine and the online encryption machine;
  • the online encryption machine encrypts the key to generate a first encrypted private key and a first public key, and stores the first encrypted private key internally And return the first public key to the key server and the financial management server;
  • the first offline encryption machine forwards the key to the second offline encryption machine, and the second offline encryption machine
  • the machine encrypts the key to generate a second encrypted private key and a second public key, stores the second encrypted private key internally, and returns the second public key to the first offline encryption machine, the first An offline encryption machine returns the second public key to the financial management server.
  • the wallet server analyzes the first transaction data that requires the online encryption machine signature and/or the second transaction data based on the digital asset withdrawal request and the set rules.
  • the second transaction data signed by the offline encryption machine the key server uses the first public key to encrypt the first transaction data and then sends the first encrypted data to the online encryption machine via the wallet server, and the online encryption
  • the machine uses the first encrypted private key to sign the first encrypted data, and then returns the generated first signature data to the wallet server, and the wallet server returns the first signature data to the financial Management server;
  • the key server forwards the second transaction data to the first offline encryption machine, and the first offline encryption machine uses a second public key to encrypt the second transaction data and then encrypts the second data It is sent to the second offline encryptor via the fourth communication channel, and the second offline encryptor uses the second encrypted private key to sign the second encrypted data, and then returns the generated second signature data to The first offline encryption machine, and the first offline encryption machine returns the second signature data to the financial management server.
  • the wallet server first determines whether the total digital assets stored in the online encryption machine meets the digital asset withdrawal request, and if so, takes out all the digital assets from the online encryption machine. Said digital assets, and return to the financial management server, otherwise, take out the first digital asset and the second digital asset from the online encryption machine and the first offline encryption machine or the second offline encryption machine, and Returning to the financial management server, wherein the sum of the first digital asset and the second digital asset is greater than or equal to the digital asset withdrawal request.
  • the financial management server when the sum of the first digital asset and the second digital asset is greater than the digital asset withdrawal request, the financial management server returns the remaining digital asset to the Store in the online encryption machine.
  • Another technical solution adopted by the present invention to solve its technical problem is to construct a digital asset isolation management method, including: S1, constructing a digital asset isolation management system according to any one of claims 1-25; S2, adopting The digital asset isolation management system completes the key application; S3. The digital asset isolation management system is used to complete the signature of transaction data.
  • the digital asset isolation management method of the present invention further includes: S4. Using the digital asset isolation management system to complete the deposit of digital assets.
  • step S3 the digital asset isolation management system is used to complete the signature of transaction data to withdraw the digital asset.
  • the private key is stored in the offline encryption machine, and the signature is also performed in the offline encryption machine. Therefore, the security of the key is ensured and the isolation is achieved through a multilayer network, thereby avoiding easy It is vulnerable to network attacks, large security risks and information leakage risks.
  • the key server and the first offline encryption machine can only communicate with each other through acoustic waves and are isolated from each other, while the first offline encryption machine and the second offline encryption machine can only scan through a QR code. Code, the encryption process is complex and has a high degree of security. Furthermore, by storing digital assets in offline encryption machines and online encryption machines in different proportions, it is convenient and fast to access and enhance security.
  • the digital assets stored in the online encryption machine customers can quickly access; for the digital assets stored in the offline encryption machine, the private key is stored in the offline encryption machine, and the signature is also performed in the offline encryption machine, thus ensuring the digital assets Security. Furthermore, through multi-layer network isolation, it avoids the vulnerabilities of being vulnerable to network attacks, greater security risks, and information leakage risks. Furthermore, the storage ratio and access rules of digital assets in the online and second offline encryption machines can be set by themselves, which is flexible in setting and convenient to access.
  • Figure 1 is a schematic block diagram of the first preferred embodiment of the digital asset isolation management system of the present invention
  • FIG. 2 is a schematic block diagram of a second preferred embodiment of the digital asset isolation management system of the present invention.
  • Fig. 3 is a schematic block diagram of a third preferred embodiment of the digital asset isolation management system of the present invention.
  • FIG. 4 is a functional block diagram of the fourth preferred embodiment of the digital asset isolation management system of the present invention.
  • FIG. 5 is a schematic block diagram of a fifth preferred embodiment of the digital asset isolation management system of the present invention.
  • Fig. 6 is a schematic block diagram of the first preferred embodiment of the third communication channel of the digital asset isolation management system of the present invention.
  • FIG. 7 is a schematic structural diagram of a second preferred embodiment of the third communication channel of the digital asset isolation management system of the present invention.
  • FIG. 8 is a schematic structural diagram of another preferred embodiment of the third communication channel and the fifth communication channel of the digital asset isolation management system of the present invention.
  • Fig. 10 is a flowchart of the second preferred embodiment of the digital asset isolation management method of the present invention.
  • Fig. 1 is a functional block diagram of the first preferred embodiment of the digital asset isolation management system of the present invention.
  • the asset custody system of the present invention includes a financial management server 10 communicating with an external network, a management server 30 communicating with the financial management server 10 via a first communication channel 20, and a second communication channel 40
  • the key server 50 that communicates with the management server 30 is a first offline encryption machine 70 that communicates with the key server 50 via the third communication channel 60.
  • FIG. 1 is a functional block diagram of the first preferred embodiment of the digital asset isolation management system of the present invention.
  • the asset custody system of the present invention includes a financial management server 10 communicating with an external network, a management server 30 communicating with the financial management server 10 via a first communication channel 20, and a second communication channel 40
  • the key server 50 that communicates with the management server 30 is a first offline encryption machine 70 that communicates with the key server 50 via the third communication channel 60.
  • the first communication channel 20 and the second communication channel 40 are both network channels, a first firewall is set in the first communication channel 20, and the management server 30 is set in an internal network A second firewall is set in the second communication channel 40, the key server 50 is set in an isolated network, and the key server 50 is physically separated from the first offline encryption machine 70, and is located in the same location.
  • offline means not connected to any network. Offline encryption machine, that is, it cannot communicate with external networks, and cannot communicate with other devices or equipment in any other way except for the communication method specified in this article.
  • the financial management server 10 receives the key application, and then transmits the key application to the management server 30 in the intranet via the first communication channel 20.
  • the management server 30 transmits the key application to the key server 50 in the isolated network through the second communication channel 30.
  • the key server 50 generates a key and transmits the key to the first offline encryption machine 70.
  • the first offline encryption machine 70 encrypts the key to generate an encrypted private key and a public key, stores the encrypted private key internally, and returns the public key to the key server 50, and the key server 50 returns the public key to the financial management server 10 in the same way. Since the first communication channel 20 and the second communication channel 40 are respectively provided with firewalls, the security assurance capability can be enhanced.
  • the isolation of the external network and the internal network through the isolation of the external network and the internal network, the isolation of the internal network and the isolation network, and the physical isolation of the isolation network from the offline encryption machine, multiple isolations can be achieved, and the security assurance capability can be further enhanced.
  • the encrypted private key can only be stored offline in the encryption machine, so the security of the private key is further protected and network attacks can be avoided.
  • the financial management server 10 when there is transaction data that needs to be signed, the financial management server 10 similarly receives the transaction data that needs to be signed via an external network. Then, the transaction data that needs to be signed is transmitted to the management server 30 in the intranet via the first communication channel 20. The management server 30 transmits the transaction data that needs to be signed to the key server 50 in the isolated network through the second communication channel 30.
  • the key server 50 uses public key encryption and then sends the encrypted data to the first offline encryptor 70.
  • the first offline encryptor 70 uses the encrypted private key stored by itself to sign the encrypted data, and then The signature data is returned to the key server 50, and the key server 50 returns the signature data to the financial management server 10 in the same way.
  • the entire signature process can only be executed in the offline encryption machine, so the security of the private key is further guaranteed, and network attacks can be avoided. Because the private key is stored in the offline encryption machine, and the signature is also performed in the offline encryption machine, the security of the key is ensured, and the multi-layer network is isolated, thereby avoiding network attacks, large security risks, and information leakage risks Defects. Furthermore, through multi-layer firewall isolation, security risks are further avoided.
  • each transaction data may require multiple signatures.
  • multiple first offline encryption machines 70 can be set.
  • the financial management server 10 receives the key application and transmits it to the key server 50 through the management server 30.
  • the key server 50 generates a key and transmits the key to each of the first offline encryption machines 70.
  • Each of the first offline encryption machines 70 encrypts the key to generate a respective encrypted private key and public key, stores the encrypted private key internally, and returns the public key to the key server 50.
  • the key server 50 returns the public key to the financial management server 10 in the same way.
  • the financial management server 10 receives the transaction data that needs to be signed from the external network, and transmits it to the key server 50 through the management server 30, and the management server 30 selects it based on the set rules At least one of the plurality of first offline encryption machines 70 is used for signing, and two or more offline encryption machines 70 may also be selected for signing.
  • the third communication channel 60 includes a first sound wave transceiver 61 set on the key server 50 and a first off-line encryption device 61 set on the key server 50.
  • the second acoustic wave transceiving device 62 on the device 70, the first acoustic wave transceiving device 61 is connected to the key server 50 through a USB interface, and the second acoustic wave transceiving device 62 is connected to the first offline encryption through a USB interface.
  • the machine 70 is connected.
  • the third communication channel 60 includes a first two-dimensional code scanning communication device set on the key server 50 and a first offline
  • the second two-dimensional code on the encryption machine 70 scans the communication device.
  • each of the two-dimensional code scanning units 64 respectively includes a scanning unit 64 and a display unit 63.
  • the scanning unit 64 and the display unit 63 are respectively installed on the key server 50 and the key server through the mounting base 65.
  • the first offline encryption machine 70 communicates with the key server 50 and the first offline encryption machine 70 through the USB interface 66 respectively.
  • the key server 50 and the first offline encryption machine 70 are arranged in a confined space and are physically separated from each other by a transparent partition.
  • the scanning unit 64 and the display unit 63 are respectively located on the same side of the key server 50 and the first offline encryption machine 70, so that the scanning unit 64 of the key server 50 faces the
  • the display unit 63 of the first offline encryption machine 70 and the display unit 63 of the key server 50 are facing the scanning unit 64 of the first offline encryption machine 70.
  • the scanning unit may be a code scanning gun, and the display unit may be a liquid crystal display screen.
  • the key server 50 and the first offline encryption machine 70 are arranged at relatively close positions physically.
  • the scanning unit of the key server 50 is set to the display unit of the first offline encryption machine 70. In the same way, the display unit of the key server 50 is set to the scanning unit of the first offline encryption machine 70.
  • the financial management server 10 receives the transaction data requiring signature from the external network, and transmits the transaction data requiring signature to the management server 30 in the internal network via the first communication channel 20.
  • the management server 30 transmits the transaction data that needs to be signed to the key server 50 in the isolated network through the second communication channel 30.
  • the key server 50 encodes the transaction data that needs to be signed with a two-dimensional code, then encrypts the obtained two-dimensional code with a public key, and displays the encrypted two-dimensional code on its display unit 63.
  • any known encoding method can be used to encode the obtained transaction data into a two-dimensional code that can be displayed by the display unit 63.
  • any encryption method can be used to encrypt the obtained two-dimensional code.
  • the encrypted two-dimensional code is updated and displayed every set time, for example.
  • the scanning unit 64 on the first offline encryption machine 70 scans to obtain the encrypted two-dimensional code, decrypts the encrypted two-dimensional code with a local encrypted private key to obtain the transaction data, and uses the local encrypted private key to sign , And encode the signature data with a two-dimensional code to generate a signature two-dimensional code, and then use its display unit 63 to display the signature two-dimensional code.
  • the scanning unit 64 may scan to obtain the above-mentioned two-dimensional code in a manner of regular polling.
  • the scanning unit 64 may also keep scanning, so as to obtain the two-dimensional code at the first time.
  • the scanning unit 64 on the key server 50 scans and obtains the signature two-dimensional code to obtain the signature data, and returns the signature data to the financial management server 10 in its original way.
  • the communication between the key server 50 and the first offline encryption machine 70 can only be through a two-dimensional code scanning method, thus ensuring the security of the entire process.
  • transaction data that needs to be signed requires at least two first offline encryption machines 70 to be signed.
  • the number of first offline encryption machines 70 that need to be signed can be selected by the management server 30 according to a set rule.
  • the entire system may include multiple offline encryption machines, and the management server 30 may select at least two of them, or a plurality of them to sign in sequence, and all signatures must be completed before the transaction can take effect.
  • the order may not be established.
  • the asset custody system includes a plurality of first offline encryption machines 70, and the key server 50 and each first offline encryption machine 70 are equipped with a scanning unit 64 and a display unit 63.
  • the key server 50 and the first offline encryption machine 70 are arranged at relatively close positions physically.
  • the scanning unit 64 of the key server 50 is set directly on the display unit 63 of the at least one first offline encryption machine 70.
  • the display unit 63 of the key server 50 is set directly on the scanning unit 64 of at least one of the first offline encryption machines 70.
  • the key server 50 and the scanning unit 64 and the display unit 63 provided on each first offline encryption machine 70 need to be located such that the following scanning operations can be completed.
  • the scanning unit 64 and the display unit 63 can be set to be manually adjusted, so as to complete different facing settings to meet the requirements of the management server 30.
  • the financial management server 10 receives the transaction data that needs to be signed from the external network and transmits it to the key server 50 through the management server 30.
  • the management server 30 selects at least one of the plurality of offline encryption machines. Sign both.
  • the key server 50 encodes the transaction data that needs to be signed with a two-dimensional code, then encrypts the obtained two-dimensional code with a public key, and displays the encrypted two-dimensional code on its display unit 63.
  • the scanning unit 64 on the first first offline encryption machine selected by the management server 30 scans to obtain the encrypted two-dimensional code, decrypts the encrypted two-dimensional code with a local encryption private key to obtain the transaction data, and uses all The local encryption private key is used to sign, and the signature data is encoded with a two-dimensional code to generate a one-time signature two-dimensional code, and then its display unit 63 is used to display the one-time signature two-dimensional code.
  • the scanning unit 64 on the second first offline encryption machine selected by the management server 30 scans to obtain the one-time signature two-dimensional code, uses a local encryption private key to decrypt the one-time signature two-dimensional code to obtain the transaction data and uses The local encrypted private key performs a secondary signature, and performs a two-dimensional code encoding on the secondary signature data to generate a secondary signature two-dimensional code, and then uses its display unit 63 to display the secondary signature two-dimensional code.
  • the scanning unit 64 on the key server 50 scans and obtains the two-dimensional code of the second signature to obtain the signature data, and returns the signature data to the financial management server 10 in the original way.
  • the signature process is similar to the previous embodiment, and the difference is that two signatures are required.
  • Using the form of two signatures provides an even greater guarantee for the security of the entire system. In other preferred embodiments of the present invention, multiple signatures can also be set to further increase the security guarantee.
  • the private key is stored in the offline encryption machine, and the signature is also performed in the offline encryption machine. Therefore, the security of the key is ensured, and the isolation through a multi-layer network avoids being vulnerable to the network. Attacks, the existence of greater security risks and the flaws of information leakage risks. You can also set multiple signatures to further increase security
  • Fig. 2 is a schematic block diagram of a second preferred embodiment of the digital asset isolation management system of the present invention.
  • the asset custody system of the present invention includes a financial management server 10 communicating with an external network, a management server 30 communicating with the financial management server 10 via a first communication channel 20, and a second communication channel 40
  • the key server 50 that communicates with the management server 30, the first offline encryption machine 70 that communicates with the key server 50 through the third communication channel 60; and the first offline encryption machine through the fourth communication channel 80
  • the financial management server 10 the first communication channel 20, the management server 30, the key server 50, the second communication channel 40, the third communication channel 60
  • the first offline encryption machine 70 can be constructed similarly with reference to the embodiment shown in FIG. 1.
  • the fourth communication channel 80 and the second offline encryption machine 90 can be constructed similarly to the first offline encryption machine 70 and the third communication channel 60 shown in FIG.
  • the embodiment shown in Figure 1 is similar.
  • the first offline encryption machine 70, the second offline encryption machine 90, and the key server 50 are isolated from each other but located in the same place.
  • the financial management server 10 receives the key application, and then transmits the key application to the management server 30 in the intranet via the first communication channel 20.
  • the management server 30 transmits the key application to the key server 50 in the isolated network through the second communication channel 40.
  • the key server 50 generates a key, and transmits the key to the first offline encryption machine 70 through the third communication channel 60.
  • the first offline encryption machine 70 forwards the key to the second offline encryption machine 90 through the fourth communication channel 80, and the second offline encryption machine 90 encrypts the key to generate an encrypted private key and a public key. Key, and store the encrypted private key internally and return the public key to the financial management server 10 in the original way.
  • the security assurance capability can be enhanced. Furthermore, through the isolation of the external network and the internal network, the isolation of the internal network and the isolation network, the physical isolation of the isolation network and the offline encryption machine, and the isolation between the two offline encryption machines, multiple isolations can be realized and the security assurance capability can be further enhanced.
  • the encrypted private key can only be stored offline in the second offline encryption machine, so the security of the private key is further guaranteed, and network attacks can be avoided.
  • the financial management server 10 When there is transaction data that needs to be signed, the financial management server 10 also receives the transaction data that needs to be signed via the external network. Then, the transaction data that needs to be signed is transmitted to the management server 30 in the intranet via the first communication channel 20. The management server 30 transmits the transaction data that needs to be signed to the key server 50 in the isolated network through the second communication channel 40. The key server 50 forwards the transaction data that needs to be signed to the first offline encryption machine 70 through the third communication channel 60, and the first offline encryption machine 70 uses public key encryption and then passes through the fourth communication channel 80. The encrypted data is sent to the second offline encryption machine 90, and the second offline encryption machine 90 uses the encrypted private key to sign the encrypted data, and then returns the signed data to the financial management server 10 in the original way. In this way, the entire signature process can only be executed in the offline encryption machine, so the security of the private key is further guaranteed, and network attacks can be avoided.
  • the third communication channel 60 and the fourth communication channel 80 may adopt special settings.
  • Fig. 8 is a schematic structural diagram of another preferred embodiment of the third communication channel and the fifth communication channel of the digital asset isolation management system of the present invention.
  • the third communication channel 60 includes a first acoustic wave transceiver 61 arranged on the key server 50 and a second acoustic wave transceiver 62 arranged on the first offline encryptor 70
  • the first acoustic wave transceiving device 61 is connected to the key server 50 through a USB interface 66
  • the second acoustic wave transceiving device 62 is connected to the first offline encryption machine 70 through a USB interface 66.
  • the fourth communication channel 80 includes a first two-dimensional code scanning communication device set on the first offline encryption machine 70 and a second two-dimensional code scanning communication device set on the second offline encryption machine 90.
  • the first two-dimensional code scanning communication device is communicatively connected to the first offline encryption machine 70 through a USB interface
  • the second two-dimensional code scanning communication device is communicatively connected to the second offline encryption machine 90 through a USB interface.
  • Each of the two-dimensional code scanning units 64 includes a scanning unit 84 and a display unit 83 respectively.
  • the scanning unit 84 and the display unit 83 are respectively installed on the first offline encryption machine 70 and the second offline encryption machine 90 through the mounting base 85, and are respectively connected to the first offline encryption machine 70 through the USB interface 66. Communicate with the second offline encryption machine 90.
  • the second offline encryption machine 90 and the first offline encryption machine 70 are arranged in a closed space 111, and the key server 50 is arranged outside the closed space 111.
  • the enclosed space 111 is preferably made of an opaque and non-sound-proof material to facilitate the transmission of sound waves.
  • the financial management server 10 receives the key application, and then transmits the key application to the management server 30 in the intranet via the first communication channel 20.
  • the management server 30 transmits the key application to the key server 50 in the isolated network through the second communication channel 40.
  • the key server 50 generates a key, but transmits the key to the second sound wave transceiving unit 630 of the first offline encryption machine 70 through the first sound wave transceiving unit 61.
  • the first offline encryption machine 70 can forward the key to the second offline encryption machine 90 through the display unit 63 thereon and the scanning unit 64 on the second offline encryption machine 90.
  • the offline encryption machine 90 encrypts the key to generate an encrypted private key and a public key, and stores the encrypted private key internally and displays the public key through the display unit 63 thereon, and the first offline encryption machine 70 scans the public key through the scanning unit 64 on it, and passes it through the first sonic wave transceiving unit and the second sonic wave transceiving unit, and each channel returns to the financial management server 10 in the same way.
  • both the display and scanning of the key can be transmitted between offline encryption machines through the display and scanning of the two-dimensional code.
  • the financial management server 10 When there is transaction data that needs to be signed, the financial management server 10 receives the transaction data that needs to be signed from the external network, and transmits it to the key server 50 through the financial management server 10, and the key server 50
  • the transaction data that needs to be signed is sent to the second acoustic wave transceiving unit 62 of the first offline encryption machine 70 through the first acoustic wave transceiving unit 61.
  • the first offline encryption machine 70 encodes the transaction data that needs to be signed with a two-dimensional code, then encrypts the obtained two-dimensional code with a public key, and displays the encrypted two-dimensional code on its display unit 63.
  • the scanning unit 64 on the second offline encryption machine 90 scans to obtain the encrypted two-dimensional code, scans and obtains the encrypted two-dimensional code to obtain the transaction data, and uses the encrypted private key to sign the transaction data, and
  • the signature data is encoded with a two-dimensional code to generate a signature two-dimensional code, and then its display unit 63 is used to display the signature two-dimensional code.
  • the scanning unit 64 on the first offline encryption machine 70 scans and acquires the signature two-dimensional code to obtain the signature data, and sends the signature data through the second acoustic wave transceiving unit 630, the key server 50
  • the signature data is received through the first acoustic wave transceiver unit 61 and returned to the financial management server 10 in the same way.
  • any known encoding method can be used to encode the obtained transaction data into a two-dimensional code that can be displayed by the display unit.
  • any encryption method can be used to encrypt the obtained two-dimensional code.
  • a common DES and RSA hybrid encryption algorithm can be used.
  • the encrypted two-dimensional code is updated and displayed every set time, for example.
  • the scanning unit may scan and acquire the above-mentioned two-dimensional code in a timed polling manner.
  • the scanning unit may also keep scanning, so as to obtain the two-dimensional code at the first time.
  • the scanning unit is a scanner
  • the display unit is a liquid crystal display screen
  • an anti-peeping film is pasted on the liquid crystal display screen.
  • the key server and the first offline encryption machine can only communicate through sound waves
  • the first offline encryption machine and the second offline encryption machine can only communicate through QR code scanning.
  • the encryption process is complex and highly secure. Furthermore, through multi-layer firewall isolation, security risks are further avoided.
  • Fig. 3 is a schematic block diagram of a third preferred embodiment of the digital asset isolation management system of the present invention.
  • the embodiment shown in Fig. 3 is similar to Fig. 2 except that it includes a plurality of second offline encryption machines 91-93.
  • the financial management server 10 receives a key application, and transmits it to the key server 50 through the management server 30, and the key server 50 generates a key and passes the first offline
  • the encryption machine 70 forwards the key to each of the second offline encryption machines 91, 92, 93, and each of the second offline encryption machines 91, 92, 93 encrypts the key to generate its own encrypted secret.
  • the encryption key and the public key are stored internally and the public key is returned to the key server 50, and the key server 50 returns the public key to the financial management server 10 in the same way.
  • the financial management server 10 receives the transaction data that needs to be signed from the external network, and transmits it to the key server 50 through the management server 30, and the management server 30 selects the transaction data based on the set rules.
  • At least one of the plurality of second offline encryption machines 91, 92, 93 performs the signature.
  • a scanning unit 64 and a display unit 63 can be provided on each second offline encryption machine.
  • the second offline encryption machines 91 and 92 can be selected for one-time signature.
  • the key server 50 forwards the transaction data that needs to be signed to the first offline encryptor 70, and the first offline encryptor 70 encodes the transaction data that needs to be signed by a two-dimensional code, and then encodes the obtained two
  • the one-dimensional code is encrypted with at least one public key, and the encrypted two-dimensional code is displayed on the display unit 63 thereof. Which public key is selected can be specified by the key server 50.
  • the scanning unit 64 on the second offline encryption machine 91 scans to obtain the encrypted two-dimensional code, decrypts the encrypted two-dimensional code using a local encryption private key to obtain the transaction data, and uses the local encrypted private key to sign, and The two-dimensional code encoding is performed on the signature data to generate a one-time signature two-dimensional code, and then the display unit 63 thereof is used to display the one-time signature two-dimensional code.
  • the scanning unit 64 on the second offline encryption machine 92 scans to obtain the one-time signature two-dimensional code, uses a local encryption private key to decrypt the one-time signature two-dimensional code to obtain the transaction data, and uses the local encryption private key to perform two operations.
  • the scanning unit 64 on the first offline encryption machine 70 scans and obtains the two-dimensional code of the second signature to obtain the signature data, and returns the signature data to the financial management server 10 in the same way.
  • Those skilled in the art know that a greater number of second offline encryption machines can be set, and the number of signatures can be greater. Which public key is selected for signing, and which or those second offline encryption machines are selected can be determined by the system according to actual needs. The administrator defines it.
  • the security of the transaction is further enhanced through the multi-signature transaction, so that even if there is a problem with a second offline encryption machine, the signature will not be stolen.
  • the data of the second signature can be directly transmitted to the first offline encryption machine 70 through the second offline encryption machine of the second signature, or it can be returned to the first offline encryption machine 70 according to the original route.
  • the communication between the first offline encryption machine 70 and the key server 50 may adopt acoustic wave communication, or may adopt two-dimensional code communication. Based on the teachings of the present invention, those skilled in the art can construct various implementations.
  • the private key is stored in the offline encryption machine, and the signature is also performed in the offline encryption machine. Therefore, the security of the key is ensured, and the isolation through a multi-layer network avoids being vulnerable to the network. Attacks, the existence of greater security risks and the flaws of information leakage risks.
  • the key server and the first offline encryption machine can only communicate with each other through acoustic waves and are isolated from each other, while the first offline encryption machine and the second offline encryption machine can only scan through a QR code. Code, the encryption process is complex and has a high degree of security. Furthermore, through multi-layer network isolation, it avoids the vulnerabilities of being vulnerable to network attacks, greater security risks, and information leakage risks. Furthermore, the storage ratio and access rules of digital assets in the online and second offline encryption machines can be set by themselves, which is flexible in setting and convenient to access.
  • Fig. 4 is a functional block diagram of the fourth preferred embodiment of the digital asset isolation management system of the present invention.
  • the asset custody system of the present invention includes a financial management server 10 communicating with an external network, a management server 30 communicating with the financial management server 10 via a first communication channel 20, and a second communication channel 40.
  • the key server 50 that communicates with the management server 30 is a first offline encryption machine 70 that communicates with the key server 50 via the third communication channel 60.
  • the asset custody system of the present invention further includes a wallet server 110 and an online encryption machine 120.
  • the wallet server 110 communicates with the financial management server 10 through the first communication channel. Communication: communicating with the key server 50 through the second communication channel, and the wallet server 110 communicates with the online encryption machine 120 at the same time.
  • the financial management server 10 the first communication channel 20, the management server 30, the second communication channel 40, the key server 50, and the first offline encryption machine 70, except for the functions mentioned in this embodiment
  • the online encryption machine 120 and the wallet server 110 can be constructed with reference to the embodiment shown below. Based on the present invention and common knowledge, those skilled in the art can construct it.
  • the online encryption machine 120 means that the encryption machine can be connected to an external network through the wallet server 120 and the financial management server 10.
  • the financial management server 10 receives the key application, and then transmits the key application to the management server 30 in the intranet via the first communication channel 20.
  • the management server 30 transmits the key application to the key server 50 in the isolated network through the second communication channel 40.
  • the key server 50 generates a key, and transmits the key to the first offline encryption machine 70 and the wallet server 110 through the third communication channel 60.
  • the wallet server 110 sends the key to the online encryption machine 120 again.
  • the online encryption machine 120 encrypts the key to generate a first encrypted private key and a first public key, stores the first encrypted private key internally, and returns the first public key to the wallet server 110.
  • the wallet server 110 returns the first public key to the key server 50 and the financial management server 10 via the second communication channel 40 and the second communication channel 20, respectively.
  • the first offline encryption machine 70 encrypts the key to generate a second encrypted private key and a second public key, stores the second encrypted private key internally, and transmits the second public key through the third communication channel 60
  • the key server 50 returns the second public key to the financial management server 10 via the second communication channel 40 and the management server 30, of course, the key The server 50 returns the second public key to the financial management server 10 via the second communication channel 40 and the wallet server 110.
  • the financial management server 10 When a digital asset needs to be deposited, the financial management server 10 receives a digital asset deposit request and sends it to the wallet server 110, and the wallet server 110 deposits a first proportion of digital assets according to the set rules
  • the online encryption machine 120 stores the second proportion of digital assets in the first offline encryption machine 70.
  • the financial management server 10 may first receive multiple digital assets from various user clients. When a certain amount is accumulated, the financial management server 10 generates a digital asset deposit request. In another preferred embodiment of the present invention, the financial management server 10 may also receive digital asset deposit requests from various user clients.
  • a small proportion of digital assets (for example, 5-10%) will be stored in online encryption machines to deal with account circulation, and a large proportion of digital assets (90-95%) will be stored in offline encryption machines. Ensure account security. Of course, other settings can also be made according to actual needs.
  • a large proportion of digital assets (90-95%) can be stored in the first offline encryption machine 70 by means of offline Bitcoin wallet addresses.
  • the storage method of the digital asset in the first offline encryption machine 70 can also be set according to actual needs. For example, all digital assets can be written to the same Bitcoin wallet address, and then multiple backup Bitcoin wallet addresses can be set for use. For subsequent asset withdrawal operations, all digital assets can also be written into different Bitcoin wallet addresses in equal or unequal amounts according to a certain ratio rule to facilitate subsequent asset withdrawal operations. Each Bitcoin wallet address becomes invalid after the signature is taken out.
  • the financial management server 10 When digital assets need to be withdrawn, the financial management server 10, for example, receives digital asset withdrawal requests from one or more user clients. At this time, it forwards the digital asset withdrawal request to the wallet server 110.
  • the wallet server 110 takes out the digital asset from the online encryption machine 120 and/or the first offline encryption machine 70 according to the set rules, returns it to the financial management server 10, and then sends it to the financial management server 10 through the blockchain Client.
  • the wallet server 110 finds that the total amount of digital assets required by the digital asset withdrawal request is lower than the total amount of digital assets stored in the online encryption machine 120, and after the online encryption machine 120 is withdrawn, it will not be less than The specified minimum storage amount is then directly withdrawn from the online encryption machine 120.
  • the wallet server 110 finds that the total amount of digital assets required by the digital asset withdrawal request is lower than the total amount of digital assets stored in the online encryption machine 120, but after the online encryption machine 120 withdraws, it will be lower than its prescribed amount.
  • the minimum storage amount is then directly withdrawn from the online encryption machine 120, and then or within a set time period, the specific digital asset is withdrawn from the first offline encryption machine 70 and flushed into the online encryption machine 120.
  • a certain rule such as a certain ratio or requirement
  • the first digital asset is withdrawn from the online encryption machine 120, and the second digital asset is withdrawn from the first offline encryption machine 70.
  • the financial management server returns the remaining digital asset to the online encryption machine for storage.
  • the total amount of digital assets required by the digital asset withdrawal request is relatively large, and the digital assets stored by the online encryption machine 120 are already lower than or equal to the minimum storage amount specified by it. Then, it can only be withdrawn from the first offline encryption machine 70.
  • those skilled in the art can also set other rules and requirements.
  • the wallet server 80 analyzes the first transaction data and the first transaction data that need to be signed by the online encryption machine 120 based on the digital asset withdrawal request and the set rules. /Or the second transaction data that needs to be signed by the first offline encryption machine 70.
  • the wallet server 80 analyzes the first transaction data and the first transaction data that need to be signed by the online encryption machine 120 based on the digital asset withdrawal request and the set rules. /Or the second transaction data that needs to be signed by the first offline encryption machine 70.
  • the wallet server 80 analyzes the first transaction data and the first transaction data that need to be signed by the online encryption machine 120 based on the digital asset withdrawal request and the set rules. /Or the second transaction data that needs to be signed by the first offline encryption machine 70.
  • the key server 50 uses the first public key to encrypt the first transaction data and then sends the first encrypted data to the online encryption machine 120 via the wallet server 110.
  • the online encryption machine 120 uses the first encrypted private key to sign the first encrypted data, and then returns the generated first signature data to the wallet server 110, and the wallet server 110 transfers the first signature data to the original path.
  • the key server 50 uses the second public key to encrypt the second transaction data and then sends the second encrypted data to the first offline encryption machine via the third communication channel 60 70.
  • the first offline encryption machine 70 uses the second encrypted private key to sign the second encrypted data, and then returns the generated second signature data to the key server 50, and the key server 50
  • the second signature data is returned to the financial management server 10 in the same way.
  • the third communication channel 60 may also adopt the embodiment shown in FIG. 6 or FIG. 7.
  • the key server 50 when the embodiment shown in FIG. 7 is adopted, when the offline encryption machine 70 is required to perform a signature, the key server 50 performs a two-dimensional code encoding on the second transaction data after receiving the second transaction data , And then encrypt the obtained two-dimensional code with the second public key, and display the encrypted two-dimensional code on its display unit 63.
  • the scanning unit 64 on the offline encryption machine 70 scans to obtain the encrypted two-dimensional code, uses the second encrypted private key to decrypt the encrypted two-dimensional code to obtain the second transaction data, and uses the second encryption
  • the private key is used to sign
  • the signature data is encoded with a two-dimensional code to generate a signed two-dimensional code, and then the display unit 63 thereof is used to display the signed two-dimensional code.
  • the scanning unit 64 on the key server 50 scans and acquires the signature two-dimensional code to obtain the second signature data, and returns the second signature data to the financial management server 10 in the same way.
  • the same is true for the communication between the key server 50 and the first offline encryption machine 70, which will not be repeated here.
  • Implementing the digital asset isolation management system of the present invention by storing the digital assets in the offline encryption machine and the online encryption machine respectively according to different proportions, it is convenient and quick to access and enhances security.
  • customers can quickly access;
  • the digital assets stored in the offline encryption machine the private key is stored in the offline encryption machine, and the signature is also performed in the offline encryption machine, thus ensuring the digital assets Security.
  • multi-layer network isolation it avoids the vulnerabilities of being vulnerable to network attacks, greater security risks, and information leakage risks.
  • the storage ratio and access rules of digital assets in the online and second offline encryption machines can be set by themselves, which is flexible in setting and convenient to access.
  • Fig. 5 is a functional block diagram of a fifth preferred embodiment of the digital asset isolation management system of the present invention.
  • the asset custody system of the present invention includes a financial management server 10 communicating with an external network, a management server 30 communicating with the financial management server 10 via a first communication channel 20, and a second communication channel 40
  • the key server 50 that communicates with the management server 30, the first offline encryption machine 70 that communicates with the key server 50 through the third communication channel 60; and the first offline encryption machine through the fourth communication channel 80
  • the asset isolation management system further includes a wallet server 110 and an online encryption machine 120.
  • the wallet server 110 communicates with the financial management server 10 through the first communication channel, and
  • the second communication channel communicates with the key server 50, and the wallet server 110 communicates with the online encryption machine 120 at the same time;
  • the financial management server 10 the first communication channel 20, the management server 30, the key server 50, the second communication channel 40, the third communication channel 60,
  • the first offline encryption machine 70, the fourth communication channel 80, and the second offline encryption machine 90 can all be constructed with reference to the embodiment shown in FIG. 2.
  • the online encryption machine 120 and the wallet server 110 can be constructed with reference to the embodiment shown in FIG. 4. Based on the present invention and common knowledge, those skilled in the art can construct it.
  • a plurality of second offline encryption machines may be included.
  • the financial management server 10 receives the key application and transmits it to the key server 50 through the management server 30, and the key server 50 generates the key, And transmit the key to the first offline encryption machine 70 and the online encryption machine 120; the online encryption machine 120 encrypts the key to generate a first encrypted private key and a first public key, which are internally Store the first encrypted private key and return the first public key to the key server 50 and the financial management server 10; the first offline encryption machine 70 forwards the key to the first Two offline encryption machine 90, the second offline encryption machine 90 encrypts the key to generate a second encrypted private key and a second public key, and stores the second encrypted private key internally and the second public key Return to the first offline encryption machine 70, and the first offline encryption machine 70 returns the second public key to the financial management server 10.
  • the wallet server 110 analyzes the first transaction data that requires the online encryption machine 120 to sign and/or requires the second offline encryption machine based on the digital asset withdrawal request and the set rules.
  • the key server 50 uses the first public key to encrypt the first transaction data and then sends the first encrypted data to the online encryption machine 120 via the wallet server 110, and the online
  • the encryption machine 120 uses the first encrypted private key to sign the first encrypted data, and then returns the generated first signature data to the wallet server 110, and the wallet server 110 returns the first signature data to the original path To the financial management server 10;
  • the key server 50 forwards the second transaction data to the first offline encryption machine 70, and the first offline encryption machine 70 uses a second public key to encrypt the second
  • the second encrypted data is sent to the second offline encryptor 90 via the fourth communication channel, and the second offline encryptor 90 uses the second encrypted private key to sign the second encrypted data, Then, the generated second signature data is returned to the first offline encryption machine 70, and the first offline encryption
  • the wallet server 110 first determines whether the total digital assets stored in the online encryption machine 120 meets the digital asset withdrawal request, and if so, from the online encryption machine 120 Take out the digital asset from the system and return it to the financial management server 10, otherwise take out the first digital asset and the first digital asset from the online encryption machine 120 and the first offline encryption machine 70 or the second offline encryption machine, respectively.
  • the second digital asset is returned to the financial management server 10, wherein the sum of the first digital asset and the second digital asset is greater than or equal to the digital asset withdrawal request.
  • the financial management server 10 when the sum of the first digital asset and the second digital asset is greater than the digital asset withdrawal request, the financial management server 10 returns the remaining digital asset to all Said online encryption machine 120 is stored.
  • the private key is stored in the offline encryption machine, and the signature is also performed in the offline encryption machine. Therefore, the security of the key is ensured, and the isolation through a multi-layer network avoids being vulnerable to the network. Attacks, the existence of greater security risks and the flaws of information leakage risks. Furthermore, by storing digital assets in offline encryption machines and online encryption machines in different proportions, it is convenient and fast to access and enhance security. For the digital assets stored in the online encryption machine, customers can quickly access; for the digital assets stored in the offline encryption machine, the private key is stored in the offline encryption machine, and the signature is also performed in the offline encryption machine, thus ensuring the digital assets Security.
  • Fig. 9 is a flowchart of the first preferred embodiment of the digital asset isolation management method of the present invention.
  • step S1 a digital asset isolation management system is constructed.
  • the digital asset isolation management can be constructed according to any of the embodiments shown in FIGS. 1-8.
  • step S2 the digital asset isolation management system is used to complete the key application.
  • the key application can be completed by referring to any method in Figs. 1-7.
  • the financial management server receives a key application and transmits it to the key server through the management server, the key server generates a key, and transmits the key to the first offline encryption machine ;
  • the first offline encryption machine encrypts the key to generate an encrypted private key and a public key and stores the encrypted private key internally and returns the public key to the key server, which will The public key is returned to the financial management server in the original way.
  • step S3 the digital asset isolation management system is used to complete the signature of the transaction data.
  • the financial management server receives transaction data that needs to be signed, and transmits it to the key server through the management server, and the key server uses public key encryption to send the encrypted data to the first offline encryption machine.
  • the first offline encryption machine uses the encrypted private key to sign the encrypted data, and then returns the signed data to the key server, and the key server returns the signed data to the financial management server.
  • Fig. 10 is a flowchart of the second preferred embodiment of the digital asset isolation management method of the present invention.
  • step S1 a digital asset isolation management system is constructed.
  • the digital asset isolation management can be constructed according to any of the embodiments shown in FIGS. 1-7.
  • step S2 the digital asset isolation management system is used to complete the key application.
  • the key application can be completed with reference to any method in Figs. 1-7.
  • the financial management server receives a key application and transmits it to the key server through the management server, the key server generates a key, and transmits the key to the first offline encryption machine , The first offline encryption machine forwards the key to the second offline encryption machine, and the second offline encryption machine encrypts the key to generate an encrypted private key and a public key, and stores the key internally Encrypting the private key and returning the public key to the financial management server in the original way;
  • step S3 the digital asset isolation management system is used to complete the deposit of digital assets.
  • the deposit of digital assets can be completed by referring to any of the above embodiments.
  • the wallet server receives a digital asset deposit request and deposits a first proportion of digital assets into the online encryption machine according to a set rule, and deposits a second proportion of digital assets into at least one of the The first offline encryption machine or the second offline encryption machine.
  • a plurality of the first offline encryption machine or the second offline encryption machine may be set, and the wallet server stores digital assets in one or more offline encryption machines according to a set rule.
  • step S4 the digital asset isolation management system is used to complete the signature of transaction data to take out the digital asset.
  • the withdrawal of the above-mentioned digital assets can be completed with reference to any of the above embodiments.
  • the wallet server analyzes the first transaction data that requires the signature of the online encryption machine and/or the second transaction that requires the signature of the first offline encryption machine or the second offline encryption machine based on the digital asset withdrawal request and the set rules Data, the key server uses the first public key to encrypt the first transaction data and then sends the first encrypted data to the online encryption machine via the wallet server, and the online encryption machine uses the first encrypted private key The key signs the first encrypted data, and then returns the generated first signature data to the wallet server, and the wallet server returns the first signature data to the financial management server in the same way; the key server After encrypting the second transaction data with a second public key, the second encrypted data is sent to the first offline encryption machine or the second offline encryption machine, the first offline encryption machine or the third communication channel via the third communication channel.
  • the second offline encryption machine
  • the private key is stored in the offline encryption machine, and the signature is also performed in the offline encryption machine. Therefore, the security of the key is ensured, and the isolation is performed through a multi-layer network, thereby avoiding being vulnerable to the network Attacks, the existence of greater security risks and the flaws of information leakage risks.
  • the key server and the first offline encryption machine can only communicate with each other through acoustic waves and are isolated from each other, while the first offline encryption machine and the second offline encryption machine can only scan through a QR code. Code, the encryption process is complex and has a high degree of security. Furthermore, by storing digital assets in offline encryption machines and online encryption machines in different proportions, it is convenient and fast to access and enhance security.
  • the digital assets stored in the online encryption machine customers can quickly access; for the digital assets stored in the offline encryption machine, the private key is stored in the offline encryption machine, and the signature is also performed in the offline encryption machine, thus ensuring the digital assets Security. Furthermore, through multi-layer network isolation, it avoids the vulnerabilities of being vulnerable to network attacks, greater security risks, and information leakage risks. Furthermore, the storage ratio and access rules of digital assets in the online and second offline encryption machines can be set by themselves, which is flexible in setting and convenient to access.
  • the present invention can be implemented by hardware, software or a combination of software and hardware.
  • the present invention can be implemented in a centralized manner in at least one computer system, or implemented in a decentralized manner by different parts distributed in several interconnected computer systems. Any computer system or other equipment that can implement the method of the present invention is applicable.
  • the combination of commonly used software and hardware can be a general computer system with a computer program installed, and the computer system is controlled by installing and executing the program to make it run according to the method of the present invention.
  • the present invention can also be implemented by a computer program product.
  • the program contains all the features that can implement the method of the present invention, and when it is installed in a computer system, the method of the present invention can be implemented.
  • the computer program in this document refers to any expression of a set of instructions that can be written in any programming language, code, or symbol.
  • the instruction set enables the system to have information processing capabilities to directly implement specific functions, or to perform the next step. After one or two steps, a specific function is realized: a) conversion into other languages, codes or symbols; b) reproduction in a different format.

Abstract

一种数字资产隔离管理系统和方法,所述系统包括:与外网通信的金融管理服务器,经第一通信通道与所述金融管理服务器通信的管理服务器,经第二通信信道与所述管理服务器通信的密钥服务器,经第三通信信道与所述密钥服务器通信的第一离线加密机。所述数字资产隔离管理系统和方法,私钥存储在离线加密机中,签名也在离线加密机中进行,因此保证了密钥的安全性,并且通过多层网络隔离,从而避免了容易受到网络攻击、存在较大安全隐患和信息泄露风险的缺陷。

Description

数字资产隔离管理系统和方法 技术领域
本发明涉及数字资产管理领域,更具体地说,涉及一种数字资产隔离管理系统和方法。
背景技术
数字资产(Digital assets)是指企业或个人拥有或控制的,以电子数据形式存在的,在日常活动中持有以备出售或处于生产过程中的非货币性资产。例如计算机化的设备的软件、固件、可执行指令、数字证书(例如公共密钥证书)、密码密钥、比特币等等。而这些数字资产通常存放在一些数字资产隔离管理平台中。
由于数字资产通常具有较高价值,因此很多黑客采用各种技术手段对数字资产隔离管理平台进行攻击,从而盗取其中的数字资产。而现有技术中的数字资产隔离管理平台,容易受到网络攻击,存在较大的安全隐患和信息泄露风险。
技术问题
本发明要解决的技术问题在于,针对现有技术的数字资产隔离管理平台容易受到网络攻击、存在较大安全隐患和信息泄露风险的缺陷,提供一种数字资产隔离管理系统和方法,能够安全高效的对密钥进行保护,进而确保数字资产的安全。
技术解决方案
本发明解决其技术问题采用的技术方案是,构造一种数字资产隔离管理系统,包括:与外网通信的金融管理服务器,经第一通信通道与所述金融管理服务器通信的管理服务器,经第二通信信道与所述管理服务器通信的密钥服务器,经第三通信信道与所述密钥服务器通信的第一离线加密机;
所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并将所述密钥传送给所述第一离线加密机;所述第一离线加密机加密所述密钥以生成加密私钥和公钥并在内部存储所述加密私钥并将所述公钥返回给所述密钥服务器,所述密钥服务器将所述公钥原路返回到所述金融管理服务器。
在本发明所述的资产隔离管理系统中,所述金融管理服务器接收需要签名的交易数据,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器采用公钥加密后将加密数据发送给所述第一离线加密机,所述第一离线加密机采用所述加密私钥签名所述加密数据,然后将签名数据返回给所述密钥服务器,所述密钥服务器将所述签名数据原路返回到所述金融管理服务器。
在本发明所述的资产隔离管理系统中,所述第三通信通道包括设置在所述密钥服务器上的第一声波收发装置和设置在所述第一离线加密机上的第二声波收发装置,所述第一声波收发装置通过USB接口与所述密钥服务器连接,所述第二声波收发装置通过USB接口与所述第一离线加密机连接。
在本发明所述的资产隔离管理系统中,所述第三通信通道包括设置在所述密钥服务器上的第一二维码扫描通信装置和设置在所述第一离线加密机上的第二二维码扫描通信装置,所述第一二维码扫描通信装置通过USB接口与所述密钥服务器通信连接,所述第二二维码扫描通信装置通过USB接口与所述第一离线加密机通信连接;每个所述二维码扫描单元分别包括扫描单元和显示单元。
在本发明所述的资产隔离管理系统中,所述金融管理服务器接收需要签名的交易数据,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器将需要签名的交易数据进行二维码编码,然后将获得的二维码采用公钥加密,并将加密二维码在其显示单元上进行显示;所述第一离线加密机上的扫描单元扫描获取所述加密二维码以获得所述交易数据并 采用所述加密私钥签名所述交易数据,然后对签名数据进行二维码编码后在其显示单元上显示签名二维码,所述密钥服务器上的扫描单元获取所述签名二维码以获取所述签名数据,然后所述密钥服务器将所述签名数据原路返回到所述金融管理服务器。
在本发明所述的资产隔离管理系统中,所述数字资产隔离管理系统包括多个第一离线加密机,所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并将所述密钥传送给每个所述第一离线加密机;每个所述第一离线加密机加密所述密钥以生成各自的加密私钥和公钥并在内部存储所述加密私钥并将所述公钥返回给所述密钥服务器,所述密钥服务器将所述公钥原路返回到所述金融管理服务器。
在本发明所述的资产隔离管理系统中,所述金融管理服务器从外网接收所述需要签名的交易数据,并通过所述管理服务器传送给所述密钥服务器,所述管理服务器基于设定规则选择所述多个第一离线加密机中的至少一个进行签名。
在本发明所述的资产隔离管理系统中,所述密钥服务器与所述第一离线加密机设置在密闭空间中,且通过透明隔板彼此物理间隔;所述第一通信通道中设置第一道防火墙,所述管理服务器设置在内部网络中;所述第二通信通道中设置第二道防火墙,所述密钥服务器设置在隔离网络中。
在本发明所述的资产隔离管理系统中,所述扫描单元为扫描器,所述显示单元为液晶显示屏,所述液晶显示屏上贴防偷窥膜。
在本发明所述的资产隔离管理系统中,进一步包括第二离线加密机,所述第一离线加密机通过所述第四通信信道与所述第二离线加密机通信。
在本发明所述的资产隔离管理系统中,所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并将所述密钥传送给所述第一离线加密机,所述第一离线加密机将所述密钥转发给所述第二离线加密机,所述第二离线加密机加密所述密钥以生成加密私钥和公钥,并在内部存储所述加密私钥并将所述公钥原路返回到所述金融管理服务器;
所述金融管理服务器接收需要签名的交易数据,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器将所述需要签名的交易数据转发给所述第一离线加密机,所述第一离线加密机采用公钥加密后将加密数据发送给所述第二离线加密机,所述第二离线加密机采用所述加密私钥签名所述加密数据,然后将签名数据原路返回到所述金融管理服务器。
在本发明所述的资产隔离管理系统中,所述第一离线加密机和所述第二离线加密机设置在密闭空间中,所述密钥服务器设置在所述密闭空间外。
在本发明所述的资产隔离管理系统中,所述第三通信信道包括设置所述密钥服务器上第一声波收发装置和设置在所述第一离线加密机上的第二声波收发装置;所述第一声波收发装置通过USB接口与所述密钥服务器连接,所述第二声波收发装置通过USB接口与所述第一离线加密机连接。
在本发明所述的资产隔离管理系统中,所述第四通信通道包括设置在所述第一离线加密机上的第一二维码扫描通信装置和设置在所述第二离线加密机上的第二二维码扫描通信装置,所述第一二维码扫描通信装置通过USB接口与所述第一离线加密机通信连接,所述第二二维码扫描通信装置通过USB接口与所述第二线加密机通信连接;每个所述二维码扫描单元分别包括扫描单元和显示单元。
在本发明所述的资产隔离管理系统中,所述金融管理服务器从外网接收所述需要签名的交易数据,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器通过所述第一声波收发装置将所述需要签名的交易数据发送给所述第一离线加密机的第二声波收发装置,所述第一离线加密机将需要签名的交易数据进行二维码编码,然后将获得的二维码采用公钥加密,并将加密二维码在其显示单元上进行显示;所述第二离线加密机上的扫描单元扫描获取所述加密二维码以获得所述交易数据并采用所述加密私钥签名所述交易数据,然后对所述签名数据进行二维码编码以生成签名二维码,然后采用其显示单元显示所述签名二维码;所述第一离线加密机上的扫描单元扫描获取所述签名二维码以获得所述签名数据,并通过所述第二声波收发装置发送所述签名数据,所述密钥服务器通过所述第一声波收发装置接收所述签名数据并将其按照原路返回到所述金融管理服务器。
在本发明所述的资产隔离管理系统中,所述数字资产隔离管理系统包括多个第二离线加密机,所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并通过所述第一离线加密机将所述密钥转发给每个所述第二离线加密机;每个所述第二离线加密机加密所述密钥以生成各自的加密私钥和公钥并在内部存储所述加密私钥并将所述公钥返回给所述密钥服务器,所述密钥服务器将所述公钥原路返回到所述金融管理服务器。
在本发明所述的资产隔离管理系统中,所述金融管理服务器从外网接收所述需要签名的交易数据,并通过所述管理服务器传送给所述密钥服务器,所述管理服务器基于设定规则选择所述多个第二离线加密机中的至少一个进行签名。
在本发明所述的资产隔离管理系统中,进一步包括钱包服务器和在线加密机,所述钱包服务器通过所述第一通信通道与所述金融管理服务器通信,通过所述第二通信通道与所述密钥服务器通信,所述钱包服务器同时与所述在线加密机通信;
所述钱包服务器接收数字资产存入请求并根据设定规则将第一比例的数字资产存入所述在线加密机、并将第二比例的数字资产存入所述第一离线加密机;
所述金融管理服务器接收数字资产取出请求,并将其发送给所述钱包服务器,所述钱包服务器根据设定规则从所述在线加密机和/或所述第一离线加密机中取出所述数字资产,并返回到所述金融管理服务器。
在本发明所述的资产隔离管理系统中,所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并将所述密钥传送给所述第一离线加密机和所述在线加密机;所述在线加密机加密所述密钥以生成第一加密私钥和第一公钥并在内部存储所述第一加密私钥并将所述第一公钥返回给所述密钥服务器和所述金融管理服务器;所述第一离线加密机加密所述密钥以生成第二加密私钥和第二公钥并在内部存储所述第二加密私钥并将所述第二公钥返回给所述密钥服务器,所述密钥服务器将所述第二公钥返回到所述金融管理服务器。
在本发明所述的资产隔离管理系统中,所述钱包服务器基于所述数字资产取出请求和所述设定规则解析需要所述在线加密机签名需要所述在线加密机签名的第一交易数据和/或需要所述第一离线加密机签名的第二交易数据,所述密钥服务器采用第一公钥加密所述第一交易数据后将第一加密数据经所述钱包服务器发送给所述在线加密机,所述在线加密机采用所述第一加密私钥签名所述第一加密数据,然后将生成的第一签名数据返回给所述钱包服务器,所述钱包服务器将所述第一签名数据原路返回到所述金融管理服务器;所述密钥服务器采用第二公钥加密所述第二交易数据后将第二加密数据经所述第三通信信道发送给所述第一离线加密机,所述第一离线加密机采用所述第二加密私钥签名所述第二加密数据,然后将生成的第二签名数据返回给所述密钥服务器,所述密钥服务器将所述第二签名数据原路返回到所述金融管理服务器。
在本发明所述的资产隔离管理系统中,进一步包括钱包服务器和在线加密机,所述钱包服务器通过所述第一通信通道与所述金融管理服务器通信,通过所述第二通信通道与所述密钥服务器通信,所述钱包服务器同时与所述在线加密机通信;
所述钱包服务器接收数字资产存入请求并根据设定规则将第一比例的数字资产存入所述在线加密机、并将第二比例的数字资产存入所述第二离线加密机;
所述金融管理服务器接收数字资产取出请求,并将其发送给所述钱包服务器,所述钱包服务器根据设定规则从所述在线加密机和/或所述第二离线加密机中取出所述数字资产,并返回到所述金融管理服务器。
在本发明所述的资产隔离管理系统中,所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并将所述密钥传送给所述第一离线加密机和所述在线加密机;所述在线加密机加密所述密钥以生成第一加密私钥和第一公钥并在内部存储所述第一加密私钥并将所述第一公钥返回给所述密钥服务器和所述金融管理服务器;所述第一离线加密机将所述密钥转发给所述第二离线加密机,所述第二离线加密机加密所述密钥以生成第二加密私钥和第二公钥并在内部存储所述第二加密私钥并将所述第二公钥返回给所述第一离线加密机,所述第一离线加密机将所述第二公钥返回到所述金融管理服务器。
在本发明所述的资产隔离管理系统中,所述钱包服务器基于所述数字资产取出请求和所述设定规则解析需要所述在线加密机签名的第一交易数据和/或需要所述第二离线加密机签名的第二交易数据,所述密钥服务器采用第一公钥加密所述第一交易数据后将第一加密数据经所述钱包服务器发送给所述在线加密机,所述在线加密机采用所述第一加密私钥签名所述第一加密数据,然后将生成的第一签名数据返回给所述钱包服务器,所述钱包服务器将所述第一签名数据原路返回到所述金融管理服务器;所述密钥服务器将所述第二交易数据转发给所述第一离线加密机,所述第一离线加密机采用第二公钥加密所述第二交易数据后将第二加密数据经所述第四通信信道发送给所述第二离线加密机,所述第二离线加密机采用所述第二加密私钥签名所述第二加密数据,然后将生成的第二签名数据返回给所述第一离线加密机,所述第一离线加密机将所述第二签名数据原路返回到所述金融管理服务器。
在本发明所述的资产隔离管理系统中,所述钱包服务器首先判定所述在线加密机中存储的总数字资产是否满足所述数字资产取出请求,如果是则从所述在线加密机中取出所述数字资产,并返回到所述金融管理服务器,否则从所述在线加密机和所述第一离线加密机或所述第二离线加密机中分别取出第一数字资产和第二数字资产,并返回到所述金融管理服务器,其中所述第一数字资产和所述第二数字资产之和大于或等于所述数字资产取出请求。
在本发明所述的资产隔离管理系统中,当所述第一数字资产和所述第二数字资产之和大于所述数字资产取出请求时,所述金融管理服务器将剩余数字资产返回到所述在线加密机中存储。
本发明解决其技术问题采用的另一技术方案是,构造一种数字资产隔离管理方法,包括:S1、构建根据权利要求1-25中任意一项所述的数字资产隔离管理系统;S2、采用所述的数字资产隔离管理系统完成密钥申请;S3、采用所述的数字资产隔离管理系统完成交易数据的签名。
在本发明所述的数字资产隔离管理方法中,进一步包括:S4、采用所述的数字资产隔离管理系统完成数字资产的存入。
在本发明所述的数字资产隔离管理方法中,在步骤S3中采用所述的数字资产隔离管理系统完成交易数据的签名以取出所述数字资产。
有益效果
实施本发明的数字资产隔离管理系统和方法,私钥存储在离线加密机中,签名也在离线加密机中进行,因此保证了密钥的安全性,并且通过多层网络隔离,从而避免了容易受到网络攻击、存在较大安全隐患和信息泄露风险的缺陷。进一步地,所述密钥服务器与所述第一离线加密机之间只能通过声波通信且彼此隔离,而所述第一离线加密机和所述第二离线加密机只能通过二维码扫码,加密过程复杂、安全程度高。更进一步地,通过将数字资产按照不同的比例分别存储在离线加密机和在线加密机中,即方便快速存取,又加强了安全性。对于存储在在线加密机中的数字资产,客户可以快速存取;对于存储在离线加密机的数字资产,私钥存储在离线加密机中,签名也在离线加密机中进行,因此保证了数字资产的安全性。进一步地,通过多层网络隔离,从而避免了容易受到网络攻击、存在较大安全隐患和信息泄露风险的缺陷。再进一步的,可以自行设置数字资产在在线和第二离线加密机中的存储比例以及存取规则,设置灵活,取用方便。
附图说明
下面将结合附图及实施例对本发明作进一步说明,附图中:
图1是本发明的数字资产隔离管理系统的第一优选实施例的原理框图;
图2是本发明的数字资产隔离管理系统的第二优选实施例的原理框图;
图3是本发明的数字资产隔离管理系统的第三优选实施例的原理框图;
图4是本发明的数字资产隔离管理系统的第四优选实施例的原理框图;
图5是本发明的数字资产隔离管理系统的第五优选实施例的原理框图;
图6是本发明的数字资产隔离管理系统第三通信信道的第一优选实施例的原理框图;
图7是本发明的数字资产隔离管理系统第三通信信道的第二优选实施例的结构示意图;
图8是本发明的数字资产隔离管理系统第三通信信道和第五通信通道的又一优选实施例的结构示意图;
图9是本发明的数字资产隔离管理方法的第一优选实施例的流程图;
图10是本发明的数字资产隔离管理方法的第二优选实施例的流程图。
本发明的实施方式
为了使本发明的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本发明进行进一步详细说明。应当理解,此处所描述的具体实施例仅仅用以解释本发明,并不用于限定本发明。
图1是本发明的数字资产隔离管理系统的第一优选实施例的原理框图。如图1所示,本发明的所述资产托管系统包括与外网通信的金融管理服务器10,经第一通信通道20与所述金融管理服务器10通信的管理服务器30,经第二通信信道40与所述管理服务器30通信的密钥服务器50,经第三通信信道60与所述密钥服务器50通信的第一离线加密机70。如图1所示,所述第一通信通道20和所述第二通信通道40均为网络信道,所述第一通信通道20中设置第一道防火墙,所述管理服务器30设置在内部网络中;所述第二通信通道40中设置第二道防火墙,所述密钥服务器50设置在隔离网络中,所述密钥服务器50与所述第一离线加密机70之间物理隔离,且位于同一地点。在此同一地点是指,其可以通过近距离通信的方式进行通信。在本发明中,离线是指不跟任何网络连接。离线加密机,即其无法与外部网络通信,并且除了本文中明确的通信方式以外,无法以任何其他方式与其他装置或设备通信。
在本实施例中,所述金融管理服务器10接收密钥申请,然后经第一通信通道20将该密钥申请传送给处于内网中的所述管理服务器30。所述管理服务器30在经过第二通信通道30将该密钥申请传送给处于隔离网络中的所述密钥服务器50。所述密钥服务器50生成密钥,并将所述密钥传送给所述第一离线加密机70。所述第一离线加密机70加密所述密钥以生成加密私钥和公钥并在内部存储所述加密私钥并将所述公钥返回给所述密钥服务器50,所述密钥服务器50将所述公钥原路返回到所述金融管理服务器10。由于所述第一通信通道20和所述第二通信通道40中分别设置防火墙,因此可以增强安全保障能力。进一步的,通过外网和内网隔离,内网和隔离网络隔离,隔离网络与离线加密机物理隔离,可以实现多重隔离,进一步增强安全保障能力。并且加密私钥只能够离线存储在加密机中,因此进一步保障了私钥的安全性,可以避免网络攻击。
在本实施例中,在有交易数据需要进行签名时,所述金融管理服务器10同样地通过外部网络接收需要签名的交易数据。然后经第一通信通道20将该需要签名的交易数据传送给处于内网中的所述管理服务器30。所述管理服务器30在经过第二通信通道30将该需要签名的交易数据传送给处于隔离网络中的所述密钥服务器50。所述密钥服务器50采用公钥加密后将加密数据发送给所述第一离线加密机70,所述第一离线加密机70采用其自身存储的所述加密私钥签名所述加密数据,然后将签名数据返回给所述密钥服务器50,所述密钥服务器50将所述签名数据原路返回到所述金融管理服务器10。这样,整个签名过程也只能够在离线加密机中执行,因此进一步保障了私钥的安全性,可以避免网络攻击。由于私钥存储在离线加密机中,签名也在离线加密机中进行,因此保证了密钥的安全性,并且通过多层网络隔离,从而避免了网络攻击、存在较大安全隐患和信息泄露风险的缺陷。进一步地,通过多层防火墙隔离,进一步避免了安全隐患。
在本发明的优选实施例中,签名的方式可以有多种。在本实施例中,每次交易数据只需要一次签名即可。并且在本优选实施例中,可以设置至少一个第一离线加密机70。在本发明的其他优选实施例中,每次交易数据可能需要多次签名。这时候,可以设置多个第一离线加密机70。这时候。所述金融管理服务器10接收密钥申请,并通过所述管理服务器30传送给所述密钥服务器50。所述密钥服务器50生成密钥,并将所述密钥传送给每个所述第一离线加密机70。每个所述第一离线加密机70加密所述密钥以生成各自的加密私钥和公钥并在内部存储所述加密私钥并将所述公钥返回给所述密钥服务器50。所述密钥服务器50将所述公钥原路返回到所述金融管理服务器10。在需要进行签名时,所述金融管理服务器10从外网接收所述需要签名的交易数据,并通过所述管理服务器30传送给所述密钥服务器50,所述管理服务器30基于设定规则选择所述多个第一离线加密机70中的至少一个进行签名,也可以选择两个或以上的离线加密机70进行签名。
在本发明的一个优选实施例中,如图6所示,所述第三通信通道60包括设置在所述密钥服务器50上的第一声波收发装置61和设置在所述第一离线加密机70上的第二声波收发装置62,所述第一声波收发装置61通过USB接口与所述密钥服务器50连接,所述第二声波收发装置62通过USB接口与所述第一离线加密机70连接。
在本发明的一个优选实施例中,如图7所示,所述第三通信通道60包括设置在所述密钥服务器50上的第一二维码扫描通信装置和设置在所述第一离线加密机70上的第二二维码扫描通信装置。如图6所示,每个所述二维码扫描单元64分别包括扫描单元64和显示单元63,该扫描单元64和显示单元63分别通过安装基座65安装在所述密钥服务器50和所述第一离线加密机70上且通过USB接口66分别与所述密钥服务器50和所述第一离线加密机70通信。在本实施例中,所述密钥服务器50和所述第一离线加密机70设置在一个密闭空间中且通过透明隔板彼此物理间隔。
进一步如图7所示,扫描单元64和显示单元63分别位于所述密钥服务器50和所述第一离线加密机70同侧,从而使得所述密钥服务器50的扫描单元64正对所述第一离线加密机70的显示单元63,且所述密钥服务器50的显示单元63正对所述第一离线加密机70的扫描单元64。所述扫描单元可以是扫码枪,所述显示单元可以是液晶显示屏。所述密钥服务器50和所述第一离线加密机70设置在物理上比较接近的位置。所述密钥服务器50的扫描单元正对所述第一离线加密机70的显示单元设置。同理,所述密钥服务器50的显示单元正对所述第一离线加密机70的扫描单元设置。
在本实施例中,所述金融管理服务器10从外网接收所述需要签名的交易数据,经第一通信通道20将该需要签名的交易数据传送给处于内网中的所述管理服务器30。所述管理服务器30在经过第二通信通道30将该需要签名的交易数据传送给处于隔离网络中的所述密钥服务器50。所述密钥服务器50将需要签名的交易数据进行二维码编码,然后将获得的二维码采用公钥加密,并将加密二维码在其显示单元63上进行显示。在本发明的优选实施例中,可以采用任何已知的编码方法,将获得的交易数据编码成可以供显示单元63进行显示的二维码。进一步的,任何加密方法都可以用来对获得的二维码进行加密。例如,可以采用常见的DES与RSA混合加密算法。优选的,所述加密二维码例如每隔设定时间进行更新显示。所述第一离线加密机70上的扫描单元64扫描获取所述加密二维码,采用本地加密私钥解密所述加密二维码以获得所述交易数据并采用所述本地加密私钥进行签名,并对所述签名数据进行二维码编码以生成签名二维码,然后采用其显示单元63显示所述签名二维码。优选的,所述扫描单元64可以以定时轮询的方式扫描获取上述二维码。当然,在本发明的另一优选实施例中,所述扫描单元64也可以一直保持扫描,从而在第一时间获取二维码。所述密钥服务器50上的扫描单元64扫描获取所述签名二维码以获得所述签名数据,并将所述签名数据原路返回到所述金融管理服务器10。在本实施例中,所述密钥服务器50和所述第一离线加密机70之间的通信只能通过二维码扫描的方式,因此保障了整个过程的安全性。
在本发明的进一步和优选实施例中,需要签名的交易数据需要至少两个第一离线加密机70进行签名。具体需要签名的第一离线加密机70的数量可以由所述管理服务器30按照设定规则进行选择。比如,整个系统可以包括多个离线加密机,所述管理服务器30可以选择其中的至少两个,或者多个依次进行签名,必须完成全部签名,交易才能生效。在本发明的其他优选实施例中,也可以不制定顺序。在本实施例中,所述资产托管系统包括多个第一离线加密机70,所述密钥服务器50和每个第一离线加密机70均设置扫描单元64和显示单元63。所述密钥服务器50和所述第一离线加密机70设置在物理上比较接近的位置。所述密钥服务器50的扫描单元64正对至少一个第一离线加密机70的显示单元63设置。同理,所述密钥服务器50的显示单元63正对至少一个所述第一离线加密机70的扫描单元64设置。本领域技术人员知悉,所述密钥服务器50和每个第一离线加密机70上设置的扫描单元64和显示单元63,其位置需要使得能完成以下扫描操作。当然,这些扫描单元64和显示单元63可以设置成可以手动调整,从而完成不同的正对设置,以满足所述管理服务器30的要求。所述金融管理服务器10从外网接收所述需要签名的交易数据,并通过所述管理服务器30传送给所述密钥服务器50,所述管理服务器30选择所述多个离线加密机中的至少两个进行签名。所述密钥服务器50将需要签名的交易数据进行二维码编码,然后将获得的二维码采用公钥加密,并将加密二维码在其显示单元63上进行显示。所述管理服务器30选定的第一个第一离线加密机上的扫描单元64扫描获取所述加密二维码,采用本地加密私钥解密所述加密二维码以获得所述交易数据并采用所述本地加密私钥进行签名,并对所述签名数据进行二维码编码以生成一次签名二维码,然后采用其显示单元63显示所述一次签名二维码。所述管理服务器30选定的第二第一离线加密机上的扫描单元64扫描获取所述一次签名二维码,采用本地加密私钥解密所述一次签名二维码以获得所述交易数据并采用所述本地加密私钥进行二次签名,并对二次签名数据进行二维码编码以生成二次签名二维码,然后采用其显示单元63显示所述二次签名二维码。所述密钥服务器50上的扫描单元64扫描获取所述二次签名二维码以获得所述签名数据,并将所述签名数据原路返回到所述金融管理服务器10。在本实施例中具体的密码申请,签名过程与前述实施例近似,其区别在于,需要两次签名。采用两次签名的形式,为整个系统的安全性更加了一重保障。在本发明的其他优选实施例中,还可以设置多次签名,从而更进一步地增加安全保障。
实施本发明的数字资产隔离管理系统,私钥存储在离线加密机中,签名也在离线加密机中进行,因此保证了密钥的安全性,并且通过多层网络隔离,从而避免了容易受到网络攻击、存在较大安全隐患和信息泄露风险的缺陷。还可以设置多次签名,从而更进一步地增加安全保障
图2是本发明的数字资产隔离管理系统的第二优选实施例的原理框图。如图2所示,本发明的所述资产托管系统包括与外网通信的金融管理服务器10,经第一通信通道20与所述金融管理服务器10通信的管理服务器30,经第二通信信道40与所述管理服务器30通信的密钥服务器50,经第三通信信道60与所述密钥服务器50通信的第一离线加密机70;通过所述第四通信信道80与所述第一离线加密机70通信的第二离线加密机90。
在本实施例中,所述金融管理服务器10、所述第一通信通道20、所述管理服务器30、所述密钥服务器50、所述第二通信信道40、所述第三通信通道60、所述第一离线加密机70均可以参照图1所示实施例类似构造。进一步的,在此所述第四通信信道80和第二离线加密机90均可以参照图1所示的所述第一离线加密机70和所述第三通信通道60类似构造,其原理也与图1所示实施例类似。在本优选实施例中,所述第一离线加密机70、所述第二离线加密机90和所述密钥服务器50彼此隔离但是位于相同地点。
在密钥申请过程中,所述金融管理服务器10接收密钥申请,然后经第一通信通道20将该密钥申请传送给处于内网中的所述管理服务器30。所述管理服务器30在经过第二通信通道40将该密钥申请传送给处于隔离网络中的所述密钥服务器50。所述密钥服务器50生成密钥,并通过第三通信信道60将所述密钥传送给所述第一离线加密机70。所述第一离线加密机70通过第四通信信道80将所述密钥转发给所述第二离线加密机90,所述第二离线加密机90加密所述密钥以生成加密私钥和公钥,并在内部存储所述加密私钥并将所述公钥原路返回到所述金融管理服务器10。由于所述第一通信通道20和所述第二通信通道40中分别设置防火墙,因此可以增强安全保障能力。进一步的,通过外网和内网隔离,内网和隔离网络隔离,隔离网络与离线加密机物理隔离,两个离线加密机之间的彼此隔离,可以实现多重隔离,进一步增强安全保障能力。并且加密私钥只能够离线存储在第二离线加密机中,因此进一步保障了私钥的安全性,可以避免网络攻击。
在有交易数据需要进行签名时,所述金融管理服务器10同样地通过外部网络接收需要签名的交易数据。然后经第一通信通道20将该需要签名的交易数据传送给处于内网中的所述管理服务器30。所述管理服务器30在经过第二通信通道40将该需要签名的交易数据传送给处于隔离网络中的所述密钥服务器50。所述密钥服务器50将所述需要签名的交易数据通过第三通信信道60转发给所述第一离线加密机70,所述第一离线加密机70采用公钥加密后通过第四通信信道80将加密数据发送给所述第二离线加密机90,所述第二离线加密机90采用所述加密私钥签名所述加密数据,然后将签名数据原路返回到所述金融管理服务器10。这样,整个签名过程也只能够在离线加密机中执行,因此进一步保障了私钥的安全性,可以避免网络攻击。
在本发明的优选实施例中,所述第三通信通道60和第四通信通道80可以采取特殊的设置。图8是本发明的数字资产隔离管理系统第三通信信道和第五通信通道的又一优选实施例的结构示意图。如图8所示,所述第三通信通道60包括设置在所述密钥服务器50上的第一声波收发装置61和设置在所述第一离线加密机70上的第二声波收发装置62,所述第一声波收发装置61通过USB接口66与所述密钥服务器50连接,所述第二声波收发装置62通过USB接口66与所述第一离线加密机70连接。所述第四通信通道80包括设置在所述第一离线加密机70上的第一二维码扫描通信装置和设置在所述第二离线加密机90上的第二二维码扫描通信装置。所述第一二维码扫描通信装置通过USB接口与所述第一离线加密机70通信连接,所述第二二维码扫描通信装置通过USB接口与所述第二离线加密机90通信连接。每个所述二维码扫描单元64分别包括扫描单元84和显示单元83。该扫描单元84和显示单元83分别通过安装基座85安装在所述第一离线加密机70和所述第二离线加密机90上且通过USB接口66分别与所所述第一离线加密机70和所述第二离线加密机90通信。在本实施例中,所述第二离线加密机90和所述第一离线加密机70设置在密闭空间111中,所述密钥服务器50设置在所述密闭空间111外。所述密闭空间111优选是不透明且不隔音的材料制成,以便于声波传输。
在密钥申请过程中,所述金融管理服务器10接收密钥申请,然后经第一通信通道20将该密钥申请传送给处于内网中的所述管理服务器30。所述管理服务器30在经过第二通信通道40将该密钥申请传送给处于隔离网络中的所述密钥服务器50。所述密钥服务器50生成密钥,然而通过第一声波收发单元61将所述密钥传送给所述第一离线加密机70的第二声波收发单元630。所述第一离线加密机70可以通过其上的显示单元63和所述第二离线加密机90上的扫描单元64将所述密钥转发给所述第二离线加密机90,所述第二离线加密机90加密所述密钥以生成加密私钥和公钥,并在内部存储所述加密私钥并将所述公钥通过其上的显示单元63显示,而所述第一离线加密机70通过其上的扫描单元64扫描该公钥,并将其通过第一声波收发单元,第二声波收发单元,各个信道原路返回到所述金融管理服务器10。在本实施例中,密钥的显示和扫描均可以通过二维码显示和扫描实现其在离线加密机之间的传送的。
在有交易数据需要进行签名时,所述金融管理服务器10从外网接收所述需要签名的交易数据,并通过所述金融管理服务器10传送给所述密钥服务器50,所述密钥服务器50通过所述第一声波收发单元61将所述需要签名的交易数据发送给所述第一离线加密机70的第二声波收发单元62。所述第一离线加密机70将需要签名的交易数据进行二维码编码,然后将获得的二维码采用公钥加密,并将加密二维码在其显示单元63上进行显示。所述第二离线加密机90上的扫描单元64扫描获取所述加密二维码,扫描获取所述加密二维码以获得所述交易数据并采用所述加密私钥签名所述交易数据,并对所述签名数据进行二维码编码以生成签名二维码,然后采用其显示单元63显示所述签名二维码。所述第一离线加密机70上的扫描单元64扫描获取所述签名二维码以获得所述签名数据,并通过所述第二声波收发单元630发送所述签名数据,所述密钥服务器50通过所述第一声波收发单元61接收所述签名数据并将其按照原路返回到所述金融管理服务器10。
在本发明的优选实施例中,可以采用任何已知的编码方法,将获得的交易数据编码成可以供显示单元进行显示的二维码。进一步的,任何加密方法都可以用来对获得的二维码进行加密。例如,可以采用常见的DES与RSA混合加密算法。优选的,所述加密二维码例如每隔设定时间进行更新显示。优选的,所述扫描单元可以以定时轮询的方式扫描获取上述二维码。当然,在本发明的另一优选实施例中,所述扫描单元也可以一直保持扫描,从而在第一时间获取二维码。优选地,所述扫描单元为扫描器,所述显示单元为液晶显示屏,所述液晶显示屏上贴防偷窥膜。在本实施例中,所述密钥服务器与所述第一离线加密机之间只能通过声波通信,而第一离线加密机和第二离线加密机之间只能通过二维码扫描通信,加密过程复杂、安全程度高。进一步地,通过多层防火墙隔离,进一步避免了安全隐患。
图3是本发明的数字资产隔离管理系统的第三优选实施例的原理框图。图3所示实施例与图2类似,其区别仅在于,其包括多个第二离线加密机91-93。在该实施例中,所述金融管理服务器10接收密钥申请,并通过所述管理服务器30传送给所述密钥服务器50,所述密钥服务器50生成密钥,并通过所述第一离线加密机70将所述密钥转发给每个所述第二离线加密机91、92、93,每个所述第二离线加密机91、92、93加密所述密钥以生成各自的加密私钥和公钥并在内部存储所述加密私钥并将所述公钥返回给所述密钥服务器50,所述密钥服务器50将所述公钥原路返回到所述金融管理服务器10。
在需要签名时,所述金融管理服务器10从外网接收所述需要签名的交易数据,并通过所述管理服务器30传送给所述密钥服务器50,所述管理服务器30基于设定规则选择所述多个第二离线加密机中91、92、93的至少一个进行签名。在本实施例中,同上,每个第二离线加密机上均可以设置扫描单元64和显示单元63。例如可以选择第二离线加密机91和92一次签名。所述密钥服务器50将所述需要签名的交易数据转发给所述第一离线加密机70,所述第一离线加密机70将需要签名的交易数据进行二维码编码,然后将获得的二维码采用至少一个公钥加密,并将加密二维码在其显示单元63上进行显示。选择哪一个公钥可以由所述密钥服务器50指定。第二离线加密机91上的扫描单元64扫描获取所述加密二维码,采用本地加密私钥解密所述加密二维码以获得所述交易数据并采用所述本地加密私钥进行签名,并对所述签名数据进行二维码编码以生成一次签名二维码,然后采用其显示单元63显示所述一次签名二维码。第二离线加密机92上的扫描单元64扫描获取所述一次签名二维码,采用本地加密私钥解密所述一次签名二维码以获得所述交易数据并采用所述本地加密私钥进行二次签名,并对二次签名数据进行二维码编码以生成二次签名二维码,然后采用其显示单元63显示所述二次签名二维码。所述第一离线加密机70上的扫描单元64扫描获取所述二次签名二维码以获得所述签名数据,并将所述签名数据原路返回到所述金融管理服务器10。本领域技术人员知悉,可以设置更多数量的第二离线加密机,其签名次数可以更多,选择哪一个公钥进行签名,以及选择哪个或者那些第二离线加密机都可以根据实际需要由系统管理员进行定义。在本实施例中,通过多重签名交易,进一步增强了交易的安全性,这样,即使一个第二离线加密机出现问题,也不会使得签名被盗。此外,对于二次签名的数据,可以直接通过二次签名的第二离线加密机传送给所述第一离线加密机70,也可以按照原路返回给所述第一离线加密机70。所述第一离线加密机70和所述密钥服务器50之间的通信可以采用声波通信,也可以采用二维码通信。基于本发明的教导,本领域技术人员能够构造各种实现方式。
实施本发明的数字资产隔离管理系统,私钥存储在离线加密机中,签名也在离线加密机中进行,因此保证了密钥的安全性,并且通过多层网络隔离,从而避免了容易受到网络攻击、存在较大安全隐患和信息泄露风险的缺陷。进一步地,所述密钥服务器与所述第一离线加密机之间只能通过声波通信且彼此隔离,而所述第一离线加密机和所述第二离线加密机只能通过二维码扫码,加密过程复杂、安全程度高。进一步地,通过多层网络隔离,从而避免了容易受到网络攻击、存在较大安全隐患和信息泄露风险的缺陷。再进一步的,可以自行设置数字资产在在线和第二离线加密机中的存储比例以及存取规则,设置灵活,取用方便。
图4是本发明的数字资产隔离管理系统的第四优选实施例的原理框图。如图4所示,本发明的所述资产托管系统包括与外网通信的金融管理服务器10,经第一通信通道20与所述金融管理服务器10通信的管理服务器30,经第二通信信道40与所述管理服务器30通信的密钥服务器50,经第三通信信道60与所述密钥服务器50通信的第一离线加密机70。进一步地,在图4所示实施例中,本发明的所述资产托管系统进一步包括钱包服务器110和在线加密机120,所述钱包服务器110通过所述第一通信通道与所述金融管理服务器10通信,通过所述第二通信通道与所述密钥服务器50通信,所述钱包服务器110同时与所述在线加密机120通信。
在本优实施例中,所述金融管理服务器10,第一通信通道20、管理服务器30,第二通信通道40、密钥服务器50、第一离线加密机70,除本实施例提及的功能以外的其他功能,可以参照图1所示的实施例构造。在本实施例中,在线加密机120和钱包服务器110可以参照如下所示实施例构造。基于本发明和公知常识,本领域技术人员能够将其构造。在本发明中,在线加密机120是指该加密机可以通过所述钱包服务器120、金融管理服务器10从而与外部网络连接。
在本实施例中,在密钥申请过程中,所述金融管理服务器10接收密钥申请,然后经第一通信通道20将该密钥申请传送给处于内网中的所述管理服务器30。所述管理服务器30在经过第二通信通道40将该密钥申请传送给处于隔离网络中的所述密钥服务器50。所述密钥服务器50生成密钥,并通过第三通信信道60将所述密钥传送给所述第一离线加密机70和所述钱包服务器110。所述钱包服务器110将所述密钥又发送给所述在线加密机120。所述在线加密机120加密所述密钥以生成第一加密私钥和第一公钥并在内部存储所述第一加密私钥并将所述第一公钥返回给所述钱包服务器110。而所述钱包服务器110将所述第一公钥分别经第二通信信道40和第二通信信道20返回给所述密钥服务器50和所述金融管理服务器10。所述第一离线加密机70加密所述密钥以生成第二加密私钥和第二公钥并在内部存储所述第二加密私钥并将所述第二公钥经第三通信信道60返回给所述密钥服务器50,所述密钥服务器50经所述第二通信信道40和所述管理服务器30将所述第二公钥返回到所述金融管理服务器10,当然所述密钥服务器50经所述第二通信信道40和所述钱包服务器110将所述第二公钥返回到所述金融管理服务器10。
当需要存入数字资产时,所述金融管理服务器10接收数字资产存入请求,并将其发送给所述钱包服务器110,所述钱包服务器110根据设定规则将第一比例的数字资产存入所述在线加密机120,并将第二比例的数字资产存入所述第一离线加密机70。在本发明的一个优选实施例中,首先可以通过金融管理服务器10接收来自各个用户客户端的多笔数字资产,当累积到一定数额时,所述金融管理服务器10生成数字资产存入请求。在本发明的另一个优选实施例中,也可以金融管理服务器10接收来自各个用户客户端的数字资产存入请求。通常情况下,会将小比例的数字资产(例如5-10%)存储在在线加密机中以应对账户流通,而将大比例的数字资产(90-95%)存储在离线加密机中,以保证账户安全。当然,还可以根据实际需要进行其他设置。通常可以通过离线比特币钱包地址的方式来将大比例的数字资产(90-95%)存储在第一离线加密机70。该数字资产在第一离线加密机70中的存储方式,也可以根据实际需要设定,例如可以将全部数字资产写入同一个比特币钱包地址,然后设置多个备份比特币钱包地址,以用于后续的资产取出操作,也可以将全部的数字资产按照一定的比例规则,等额或者不等额的写入不同的比特币钱包地址,以便于后续的资产取出操作。每条比特币钱包地址在签名取出之后失效。
当需要取出数字资产时,所述金融管理服务器10例如接收来自某个或者多个用户客户端的数字资产取出请求。这时,其将该数字资产取出请求转发给所述钱包服务器110。所述钱包服务器110根据设定规则从所述在线加密机120和/或所述第一离线加密机70取出所述数字资产,并返回到所述金融管理服务器10,再通过区块链发送给客户端。例如,所述钱包服务器110发现数字资产取出请求所要求取出的数字资产总额低于所述在线加密机120中存储的数字资产总额,并且在所述在线加密机120支取之后,也不会低于其规定的最低存储额,那么直接从在线加密机120中支取。如果所述钱包服务器110发现数字资产取出请求所要求取出的数字资产总额低于所述在线加密机120中存储的数字资产总额,但在所述在线加密机120支取之后,将低于其规定的最低存储额,那么直接从在线加密机120中支取,并且随后或者再设定时间段内在所述第一离线加密机70中支取特定的数字资产,将其冲入所述在线加密机120。又例如,如果所述钱包服务器110发现数字资产取出请求所要求取出的数字资产总额高于所述在线加密机120中存储的数字资产总额,那么按照一定的规则(比如一定的比例,或者要求)分别从在线加密机120中支取第一数字资产,而在所述第一离线加密机70中支取第二数字资产。当所述第一数字资产和所述第二数字资产之和大于所述数字资产取出请求时,所述金融管理服务器将剩余数字资产返回到所述在线加密机中存储。当然在本发明的另一优选实施例中例如发现数字资产取出请求所要求取出的数字资产总额较大,而所述在线加密机120存储的数字资产已经低于或者等于其规定的最低存储额,那么可以只从所述第一离线加密机70中支取。当然,基于本发明的教导,本领域技术人员还可以设置其他的规则和要求。
在本发明的优选实施例中,当需要取出数字资产时,所述钱包服务器基80于所述数字资产取出请求和所述设定规则解析需要所述在线加密机120签名的第一交易数据和/或需要所述第一离线加密机70签名的第二交易数据。如前所述,当只需要从所述在线加密机120支取时,只解析出第一交易数据,当只需要从所述第一离线加密机70支取时,只解析出第二交易数据,而当需要从两者支取时,将解析出第一和第二交易数据。
当解析出第一交易数据时,所述密钥服务器50采用第一公钥加密所述第一交易数据后将第一加密数据经所述钱包服务器110发送给所述在线加密机120,所述在线加密机120采用所述第一加密私钥签名所述第一加密数据,然后将生成的第一签名数据返回给所述钱包服务器110,所述钱包服务器110将所述第一签名数据原路返回到所述金融管理服务器10。当解析出第二交易数据时,所述密钥服务器50采用第二公钥加密所述第二交易数据后将第二加密数据经所述第三通信信道60发送给所述第一离线加密机70,所述第一离线加密机70采用所述第二加密私钥签名所述第二加密数据,然后将生成的第二签名数据返回给所述密钥服务器50,所述密钥服务器50将所述第二签名数据原路返回到所述金融管理服务器10。当同时解析出第一和第二交易数据时,同时执行上述两步即可。
在本发明的一个优选实施例中,本发明中,所述第三通信信道60同样可以采用图6或者图7所示的实施例。例如,当采用图7所示实施例时,在需要所述离线加密机70进行签名时,所述密钥服务器50在接收到所述第二交易数据后将第二交易数据进行二维码编码,然后将获得的二维码采用所述第二公钥加密,并将加密二维码在其显示单元63上进行显示。所述离线加密机70上的扫描单元64扫描获取所述加密二维码,采用所述第二加密私钥解密所述加密二维码以获得所述第二交易数据并采用所述第二加密私钥进行签名,并对所述签名数据进行二维码编码以生成签名二维码,然后采用其显示单元63显示所述签名二维码。所述密钥服务器50上的扫描单元64扫描获取所述签名二维码以获得所述第二签名数据,并将所述第二签名数据原路返回到所述金融管理服务器10。同理,在本实施例中,在密钥申请过程中,所述密钥服务器50与所述第一离线加密机70之间的通信也是如此,在此就不再累述了。
实施本发明的数字资产隔离管理系统,通过将数字资产按照不同的比例分别存储在离线加密机和在线加密机中,即方便快速存取,又加强了安全性。对于存储在在线加密机中的数字资产,客户可以快速存取;对于存储在离线加密机的数字资产,私钥存储在离线加密机中,签名也在离线加密机中进行,因此保证了数字资产的安全性。进一步地,通过多层网络隔离,从而避免了容易受到网络攻击、存在较大安全隐患和信息泄露风险的缺陷。再进一步的,可以自行设置数字资产在在线和第二离线加密机中的存储比例以及存取规则,设置灵活,取用方便。
图5是本发明的数字资产隔离管理系统的第五优选实施例的原理框图。如图5所示,本发明的所述资产托管系统包括与外网通信的金融管理服务器10,经第一通信通道20与所述金融管理服务器10通信的管理服务器30,经第二通信信道40与所述管理服务器30通信的密钥服务器50,经第三通信信道60与所述密钥服务器50通信的第一离线加密机70;通过所述第四通信信道80与所述第一离线加密机70通信的第二离线加密机90。在本实施例中,所述的资产隔离管理系统中,进一步包括钱包服务器110和在线加密机120,所述钱包服务器110通过所述第一通信通道与所述金融管理服务器10通信,通过所述第二通信通道与所述密钥服务器50通信,所述钱包服务器110同时与所述在线加密机120通信;
在本实施例中,所述金融管理服务器10、所述第一通信通道20、所述管理服务器30、所述密钥服务器50、所述第二通信信道40、所述第三通信通道60、所述第一离线加密机70、所述第四通信信道80和第二离线加密机90均可以参照图2所示实施例构造。在本实施例中,在线加密机120和钱包服务器110可以参照图4所示的实施例构造。基于本发明和公知常识,本领域技术人员能够将其构造。在本发明的优选实施例中,可以包括多个第二离线加密机。
在本实施例中,在密钥申请过程中,所述金融管理服务器10接收密钥申请,并通过所述管理服务器30传送给所述密钥服务器50,所述密钥服务器50生成密钥,并将所述密钥传送给所述第一离线加密机70和所述在线加密机120;所述在线加密机120加密所述密钥以生成第一加密私钥和第一公钥并在内部存储所述第一加密私钥并将所述第一公钥返回给所述密钥服务器50和所述金融管理服务器10;所述第一离线加密机70将所述密钥转发给所述第二离线加密机90,所述第二离线加密机90加密所述密钥以生成第二加密私钥和第二公钥并在内部存储所述第二加密私钥并将所述第二公钥返回给所述第一离线加密机70,所述第一离线加密机70将所述第二公钥返回到所述金融管理服务器10。
在数字资产取出过程中,所述钱包服务器110基于所述数字资产取出请求和所述设定规则解析需要所述在线加密机120签名的第一交易数据和/或需要所述第二离线加密机90签名的第二交易数据,所述密钥服务器50采用第一公钥加密所述第一交易数据后将第一加密数据经所述钱包服务器110发送给所述在线加密机120,所述在线加密机120采用所述第一加密私钥签名所述第一加密数据,然后将生成的第一签名数据返回给所述钱包服务器110,所述钱包服务器110将所述第一签名数据原路返回到所述金融管理服务器10;所述密钥服务器50将所述第二交易数据转发给所述第一离线加密机70,所述第一离线加密机70采用第二公钥加密所述第二交易数据后将第二加密数据经所述第四通信信道发送给所述第二离线加密机90,所述第二离线加密机90采用所述第二加密私钥签名所述第二加密数据,然后将生成的第二签名数据返回给所述第一离线加密机70,所述第一离线加密机70将所述第二签名数据原路返回到所述金融管理服务器10。
在本发明所述的资产隔离管理系统中,所述钱包服务器110首先判定所述在线加密机120中存储的总数字资产是否满足所述数字资产取出请求,如果是则从所述在线加密机120中取出所述数字资产,并返回到所述金融管理服务器10,否则从所述在线加密机120和所述第一离线加密机70或所述第二离线加密机中分别取出第一数字资产和第二数字资产,并返回到所述金融管理服务器10,其中所述第一数字资产和所述第二数字资产之和大于或等于所述数字资产取出请求。
在本发明所述的资产隔离管理系统中,当所述第一数字资产和所述第二数字资产之和大于所述数字资产取出请求时,所述金融管理服务器10将剩余数字资产返回到所述在线加密机120中存储。
实施本发明的数字资产隔离管理系统,私钥存储在离线加密机中,签名也在离线加密机中进行,因此保证了密钥的安全性,并且通过多层网络隔离,从而避免了容易受到网络攻击、存在较大安全隐患和信息泄露风险的缺陷。更进一步地,通过将数字资产按照不同的比例分别存储在离线加密机和在线加密机中,即方便快速存取,又加强了安全性。对于存储在在线加密机中的数字资产,客户可以快速存取;对于存储在离线加密机的数字资产,私钥存储在离线加密机中,签名也在离线加密机中进行,因此保证了数字资产的安全性。进一步地,通过多层网络隔离,从而避免了容易受到网络攻击、存在较大安全隐患和信息泄露风险的缺陷。再进一步的,可以自行设置数字资产在在线和第二离线加密机中的存储比例以及存取规则,设置灵活,取用方便。
图9是本发明的数字资产隔离管理方法的第一优选实施例的流程图。在步骤S1中,构建数字资产隔离管理系统。在本实施例中,可以根据图1-8中所示的任意实施例,构建所述数字资产隔离管理。
在步骤S2中,采用所述的数字资产隔离管理系统完成密钥申请。在本发明的优选实施例中,可以参照图1-7中的任何方法完成该密钥申请。例如,所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并将所述密钥传送给所述第一离线加密机;所述第一离线加密机加密所述密钥以生成加密私钥和公钥并在内部存储所述加密私钥并将所述公钥返回给所述密钥服务器,所述密钥服务器将所述公钥原路返回到所述金融管理服务器。
在步骤S3中,采用所述的数字资产隔离管理系统完成交易数据的签名。可以参照图1-7中的任何方法和步骤完成该交易数据的签名。例如,所述金融管理服务器接收需要签名的交易数据,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器采用公钥加密后将加密数据发送给所述第一离线加密机,所述第一离线加密机采用所述加密私钥签名所述加密数据,然后将签名数据返回给所述密钥服务器,所述密钥服务器将所述签名数据原路返回到所述金融管理服务器。
图10是本发明的数字资产隔离管理方法的第二优选实施例的流程图。在步骤S1中,构建数字资产隔离管理系统。在本实施例中,可以根据图1-7中所示的任意实施例,构建所述数字资产隔离管理。
在步骤S2中,采用所述的数字资产隔离管理系统完成密钥申请。例如,在本发明的优选实施例中,可以参照图1-7中的任何方法完成该密钥申请。又例如所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并将所述密钥传送给所述第一离线加密机,所述第一离线加密机将所述密钥转发给所述第二离线加密机,所述第二离线加密机加密所述密钥以生成加密私钥和公钥,并在内部存储所述加密私钥并将所述公钥原路返回到所述金融管理服务器;
在步骤S3中,采用所述的数字资产隔离管理系统完成数字资产的存入。例如,在本发明的优选实施例中,可以参照以上任一实施例完成数字资产的存入。例如在本步骤中,所述钱包服务器接收数字资产存入请求并根据设定规则将第一比例的数字资产存入所述在线加密机、并将第二比例的数字资产存入至少一个所述第一离线加密机或者第二离线加密机。在本发明的优选实施例中,可以设置多个个所述第一离线加密机或者第二离线加密机,所述钱包服务器按照设定规则在一个或以上离线加密机中存储数字资产。本领域技术人员知悉,步骤S2和S3的顺序可以更换,只要保证其均在步骤S1和S4之间均可。
在步骤S4中,采用所述的数字资产隔离管理系统完成交易数据的签名以取出所述数字资产。可以参照以上任意实施例完成上述数字资产的取出。所述钱包服务器基于数字资产取出请求和设定规则解析需要所述在线加密机签名的第一交易数据和/或需要所述第一离线加密机或所述第二离线加密机签名的第二交易数据,所述密钥服务器采用第一公钥加密所述第一交易数据后将第一加密数据经所述钱包服务器发送给所述在线加密机,所述在线加密机采用所述第一加密私钥签名所述第一加密数据,然后将生成的第一签名数据返回给所述钱包服务器,所述钱包服务器将所述第一签名数据原路返回到所述金融管理服务器;所述密钥服务器采用第二公钥加密所述第二交易数据后将第二加密数据经所述第三通信通道发送给所述第一离线加密机或所述第二离线加密机,第一离线加密机或所述第二离线加密机采用所述加密私钥签名所述加密数据,然后将签名数据原路返回到所述金融管理服务器。
实施本发明的数字资产隔离管理方法,私钥存储在离线加密机中,签名也在离线加密机中进行,因此保证了密钥的安全性,并且通过多层网络隔离,从而避免了容易受到网络攻击、存在较大安全隐患和信息泄露风险的缺陷。进一步地,所述密钥服务器与所述第一离线加密机之间只能通过声波通信且彼此隔离,而所述第一离线加密机和所述第二离线加密机只能通过二维码扫码,加密过程复杂、安全程度高。更进一步地,通过将数字资产按照不同的比例分别存储在离线加密机和在线加密机中,即方便快速存取,又加强了安全性。对于存储在在线加密机中的数字资产,客户可以快速存取;对于存储在离线加密机的数字资产,私钥存储在离线加密机中,签名也在离线加密机中进行,因此保证了数字资产的安全性。进一步地,通过多层网络隔离,从而避免了容易受到网络攻击、存在较大安全隐患和信息泄露风险的缺陷。再进一步的,可以自行设置数字资产在在线和第二离线加密机中的存储比例以及存取规则,设置灵活,取用方便。
因此,本发明可以通过硬件、软件或者软、硬件结合来实现。本发明可以在至少一个计算机系统中以集中方式实现,或者由分布在几个互连的计算机系统中的不同部分以分散方式实现。任何可以实现本发明方法的计算机系统或其它设备都是可适用的。常用软硬件的结合可以是安装有计算机程序的通用计算机系统,通过安装和执行程序控制计算机系统,使其按本发明方法运行。
本发明还可以通过计算机程序产品进行实施,程序包含能够实现本发明方法的全部特征,当其安装到计算机系统中时,可以实现本发明的方法。本文件中的计算机程序所指的是:可以采用任何程序语言、代码或符号编写的一组指令的任何表达式,该指令组使系统具有信息处理能力,以直接实现特定功能,或在进行下述一个或两个步骤之后实现特定功能:a)转换成其它语言、编码或符号;b)以不同的格式再现。
虽然本发明是通过具体实施例进行说明的,本领域技术人员应当明白,在不脱离本发明范围的情况下,还可以对本发明进行各种变换及等同替代。另外,针对特定情形或材料,可以对本发明做各种修改,而不脱离本发明的范围。因此,本发明不局限于所公开的具体实施例,而应当包括落入本发明权利要求范围内的全部实施方式。
以上所述仅为本发明的较佳实施例而已,并不用以限制本发明,凡在本发明的精神和原则之内所作的任何修改、等同替换和改进等,均应包含在本发明的保护范围之内。

Claims (28)

  1. 一种数字资产隔离管理系统,其特征在于,包括:与外网通信的金融管理服务器,经第一通信通道与所述金融管理服务器通信的管理服务器,经第二通信信道与所述管理服务器通信的密钥服务器,经第三通信信道与所述密钥服务器通信的第一离线加密机;
    所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并将所述密钥传送给所述第一离线加密机;所述第一离线加密机加密所述密钥以生成加密私钥和公钥并在内部存储所述加密私钥并将所述公钥返回给所述密钥服务器,所述密钥服务器将所述公钥原路返回到所述金融管理服务器。
  2. 根据权利要求1所述的资产隔离管理系统,其特征在于,所述金融管理服务器接收需要签名的交易数据,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器采用公钥加密后将加密数据发送给所述第一离线加密机,所述第一离线加密机采用所述加密私钥签名所述加密数据,然后将签名数据返回给所述密钥服务器,所述密钥服务器将所述签名数据原路返回到所述金融管理服务器。
  3. 根据权利要求2所述的资产隔离管理系统,其特征在于,所述第三通信通道包括设置在所述密钥服务器上的第一声波收发装置和设置在所述第一离线加密机上的第二声波收发装置,所述第一声波收发装置通过USB接口与所述密钥服务器连接,所述第二声波收发装置通过USB接口与所述第一离线加密机连接。
  4. 根据权利要求2所述的数字资产隔离管理系统,其特征在于,所述第三通信通道包括设置在所述密钥服务器上的第一二维码扫描通信装置和设置在所述第一离线加密机上的第二二维码扫描通信装置,所述第一二维码扫描通信装置通过USB接口与所述密钥服务器通信连接,所述第二二维码扫描通信装置通过USB接口与所述第一离线加密机通信连接;每个所述二维码扫描单元分别包括扫描单元和显示单元。
  5. 根据权利要求4所述的数字资产隔离管理系统,其特征在于,所述金融管理服务器接收需要签名的交易数据,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器将需要签名的交易数据进行二维码编码,然后将获得的二维码采用公钥加密,并将加密二维码在其显示单元上进行显示;所述第一离线加密机上的扫描单元扫描获取所述加密二维码以获得所述交易数据并 采用所述加密私钥签名所述交易数据,然后对签名数据进行二维码编码后在其显示单元上显示签名二维码,所述密钥服务器上的扫描单元获取所述签名二维码以获取所述签名数据,然后所述密钥服务器将所述签名数据原路返回到所述金融管理服务器。
  6. 根据权利要求1-5中任意一项所述的数字资产隔离管理系统,其特征在于,所述数字资产隔离管理系统包括多个第一离线加密机,所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并将所述密钥传送给每个所述第一离线加密机;每个所述第一离线加密机加密所述密钥以生成各自的加密私钥和公钥并在内部存储所述加密私钥并将所述公钥返回给所述密钥服务器,所述密钥服务器将所述公钥原路返回到所述金融管理服务器。
  7. 根据权利要求6所述的数字资产隔离管理系统,其特征在于,所述金融管理服务器从外网接收所述需要签名的交易数据,并通过所述管理服务器传送给所述密钥服务器,所述管理服务器基于设定规则选择所述多个第一离线加密机中的至少一个进行签名。
  8. 根据权利要求7所述的数字资产隔离管理系统,其特征在于,所述密钥服务器与所述第一离线加密机设置在密闭空间中,且通过透明隔板彼此物理间隔;所述第一通信通道中设置第一道防火墙,所述管理服务器设置在内部网络中;所述第二通信通道中设置第二道防火墙,所述密钥服务器设置在隔离网络中。
  9. 根据权利要求4所述的数字资产隔离管理系统,其特征在于,所述扫描单元为扫描器,所述显示单元为液晶显示屏,所述液晶显示屏上贴防偷窥膜。
  10. 根据权利要求2所述的数字资产隔离管理系统,其特征在于,进一步包括第二离线加密机,所述第一离线加密机通过所述第四通信信道与所述第二离线加密机通信。
  11. 根据权利要求10所述的数字资产隔离管理系统,其特征在于,所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并将所述密钥传送给所述第一离线加密机,所述第一离线加密机将所述密钥转发给所述第二离线加密机,所述第二离线加密机加密所述密钥以生成加密私钥和公钥,并在内部存储所述加密私钥并将所述公钥原路返回到所述金融管理服务器;
    所述金融管理服务器接收需要签名的交易数据,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器将所述需要签名的交易数据转发给所述第一离线加密机,所述第一离线加密机采用公钥加密后将加密数据发送给所述第二离线加密机,所述第二离线加密机采用所述加密私钥签名所述加密数据,然后将签名数据原路返回到所述金融管理服务器。
  12. 根据权利要求11所述的数字资产隔离管理系统,其特征在于,所述第一离线加密机和所述第二离线加密机设置在密闭空间中,所述密钥服务器设置在所述密闭空间外。
  13. 根据权利要求12所述的数字资产隔离管理系统,其特征在于,所述第三通信信道包括设置所述密钥服务器上第一声波收发装置和设置在所述第一离线加密机上的第二声波收发装置;所述第一声波收发装置通过USB接口与所述密钥服务器连接,所述第二声波收发装置通过USB接口与所述第一离线加密机连接。
  14. 根据权利要求13所述的数字资产隔离管理系统,其特征在于,所述第四通信通道包括设置在所述第一离线加密机上的第一二维码扫描通信装置和设置在所述第二离线加密机上的第二二维码扫描通信装置,所述第一二维码扫描通信装置通过USB接口与所述第一离线加密机通信连接,所述第二二维码扫描通信装置通过USB接口与所述第二线加密机通信连接;每个所述二维码扫描单元分别包括扫描单元和显示单元。
  15. 根据权利要求14所述的数字资产隔离管理系统,其特征在于,所述金融管理服务器从外网接收所述需要签名的交易数据,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器通过所述第一声波收发装置将所述需要签名的交易数据发送给所述第一离线加密机的第二声波收发装置,所述第一离线加密机将需要签名的交易数据进行二维码编码,然后将获得的二维码采用公钥加密,并将加密二维码在其显示单元上进行显示;所述第二离线加密机上的扫描单元扫描获取所述加密二维码以获得所述交易数据并采用所述加密私钥签名所述交易数据,然后对所述签名数据进行二维码编码以生成签名二维码,然后采用其显示单元显示所述签名二维码;所述第一离线加密机上的扫描单元扫描获取所述签名二维码以获得所述签名数据,并通过所述第二声波收发装置发送所述签名数据,所述密钥服务器通过所述第一声波收发装置接收所述签名数据并将其按照原路返回到所述金融管理服务器。
  16. 根据权利要求2-15中任意一项所述的数字资产隔离管理系统,其特征在于,所述数字资产隔离管理系统包括多个第二离线加密机,所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并通过所述第一离线加密机将所述密钥转发给每个所述第二离线加密机;每个所述第二离线加密机加密所述密钥以生成各自的加密私钥和公钥并在内部存储所述加密私钥并将所述公钥返回给所述密钥服务器,所述密钥服务器将所述公钥原路返回到所述金融管理服务器。
  17. 根据权利要求16所述的数字资产隔离管理系统,其特征在于,所述金融管理服务器从外网接收所述需要签名的交易数据,并通过所述管理服务器传送给所述密钥服务器,所述管理服务器基于设定规则选择所述多个第二离线加密机中的至少一个进行签名。
  18. 根据权利要求1-9中任意一项所述的数字资产隔离管理系统,其特征在于,进一步包括钱包服务器和在线加密机,所述钱包服务器通过所述第一通信通道与所述金融管理服务器通信,通过所述第二通信通道与所述密钥服务器通信,所述钱包服务器同时与所述在线加密机通信;
    所述钱包服务器接收数字资产存入请求并根据设定规则将第一比例的数字资产存入所述在线加密机、并将第二比例的数字资产存入所述第一离线加密机;
    所述金融管理服务器接收数字资产取出请求,并将其发送给所述钱包服务器,所述钱包服务器根据设定规则从所述在线加密机和/或所述第一离线加密机中取出所述数字资产,并返回到所述金融管理服务器。
  19. 根据权利要求18所述的数字资产隔离管理系统,其特征在于,所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并将所述密钥传送给所述第一离线加密机和所述在线加密机;所述在线加密机加密所述密钥以生成第一加密私钥和第一公钥并在内部存储所述第一加密私钥并将所述第一公钥返回给所述密钥服务器和所述金融管理服务器;所述第一离线加密机加密所述密钥以生成第二加密私钥和第二公钥并在内部存储所述第二加密私钥并将所述第二公钥返回给所述密钥服务器,所述密钥服务器将所述第二公钥返回到所述金融管理服务器。
  20. 根据权利要求19所述的数字资产隔离管理系统,其特征在于,所述钱包服务器基于所述数字资产取出请求和所述设定规则解析需要所述在线加密机签名需要所述在线加密机签名的第一交易数据和/或需要所述第一离线加密机签名的第二交易数据,所述密钥服务器采用第一公钥加密所述第一交易数据后将第一加密数据经所述钱包服务器发送给所述在线加密机,所述在线加密机采用所述第一加密私钥签名所述第一加密数据,然后将生成的第一签名数据返回给所述钱包服务器,所述钱包服务器将所述第一签名数据原路返回到所述金融管理服务器;所述密钥服务器采用第二公钥加密所述第二交易数据后将第二加密数据经所述第三通信信道发送给所述第一离线加密机,所述第一离线加密机采用所述第二加密私钥签名所述第二加密数据,然后将生成的第二签名数据返回给所述密钥服务器,所述密钥服务器将所述第二签名数据原路返回到所述金融管理服务器。
  21. 根据权利要求10-17中任意一项所述的数字资产隔离管理系统,其特征在于,进一步包括钱包服务器和在线加密机,所述钱包服务器通过所述第一通信通道与所述金融管理服务器通信,通过所述第二通信通道与所述密钥服务器通信,所述钱包服务器同时与所述在线加密机通信;
    所述钱包服务器接收数字资产存入请求并根据设定规则将第一比例的数字资产存入所述在线加密机、并将第二比例的数字资产存入所述第二离线加密机;
    所述金融管理服务器接收数字资产取出请求,并将其发送给所述钱包服务器,所述钱包服务器根据设定规则从所述在线加密机和/或所述第二离线加密机中取出所述数字资产,并返回到所述金融管理服务器。
  22. 根据权利要求21所述的数字资产隔离管理系统,其特征在于,所述金融管理服务器接收密钥申请,并通过所述管理服务器传送给所述密钥服务器,所述密钥服务器生成密钥,并将所述密钥传送给所述第一离线加密机和所述在线加密机;所述在线加密机加密所述密钥以生成第一加密私钥和第一公钥并在内部存储所述第一加密私钥并将所述第一公钥返回给所述密钥服务器和所述金融管理服务器;所述第一离线加密机将所述密钥转发给所述第二离线加密机,所述第二离线加密机加密所述密钥以生成第二加密私钥和第二公钥并在内部存储所述第二加密私钥并将所述第二公钥返回给所述第一离线加密机,所述第一离线加密机将所述第二公钥返回到所述金融管理服务器。
  23. 根据权利要求22所述的数字资产隔离管理系统,其特征在于,所述钱包服务器基于所述数字资产取出请求和所述设定规则解析需要所述在线加密机签名的第一交易数据和/或需要所述第二离线加密机签名的第二交易数据,所述密钥服务器采用第一公钥加密所述第一交易数据后将第一加密数据经所述钱包服务器发送给所述在线加密机,所述在线加密机采用所述第一加密私钥签名所述第一加密数据,然后将生成的第一签名数据返回给所述钱包服务器,所述钱包服务器将所述第一签名数据原路返回到所述金融管理服务器;所述密钥服务器将所述第二交易数据转发给所述第一离线加密机,所述第一离线加密机采用第二公钥加密所述第二交易数据后将第二加密数据经所述第四通信信道发送给所述第二离线加密机,所述第二离线加密机采用所述第二加密私钥签名所述第二加密数据,然后将生成的第二签名数据返回给所述第一离线加密机,所述第一离线加密机将所述第二签名数据原路返回到所述金融管理服务器。
  24. 根据权利要求18-23中任意一项所述的数字资产隔离管理系统,其特征在于,所述钱包服务器首先判定所述在线加密机中存储的总数字资产是否满足所述数字资产取出请求,如果是则从所述在线加密机中取出所述数字资产,并返回到所述金融管理服务器,否则从所述在线加密机和所述第一离线加密机或所述第二离线加密机中分别取出第一数字资产和第二数字资产,并返回到所述金融管理服务器,其中所述第一数字资产和所述第二数字资产之和大于或等于所述数字资产取出请求。
  25. 根据权利要求24所述的数字资产隔离管理系统,其特征在于,当所述第一数字资产和所述第二数字资产之和大于所述数字资产取出请求时,所述金融管理服务器将剩余数字资产返回到所述在线加密机中存储。
  26. 一种数字资产隔离管理方法,其特征在于,包括:S1、构建根据权利要求1-25中任意一项所述的数字资产隔离管理系统;S2、采用所述的数字资产隔离管理系统完成密钥申请;S3、采用所述的数字资产隔离管理系统完成交易数据的签名。
  27. 根据权利要求26所述的数字资产隔离管理方法,其特征在于,进一步包括:S4、采用所述的数字资产隔离管理系统完成数字资产的存入。
  28. 根据权利要求27所述的数字资产隔离管理方法,其特征在于,在步骤S3中采用所述的数字资产隔离管理系统完成交易数据的签名以取出所述数字资产。
PCT/CN2020/070536 2019-12-13 2020-01-06 数字资产隔离管理系统和方法 WO2021114446A1 (zh)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US17/050,909 US20220129886A1 (en) 2019-12-13 2020-01-06 System and method for isolated management of digital assets

Applications Claiming Priority (8)

Application Number Priority Date Filing Date Title
CN201911290904.1A CN111144885B (zh) 2019-12-13 2019-12-13 一种数字资产托管方法和系统
CN201911290904.1 2019-12-13
CN201911341614.5 2019-12-23
CN201911342711.6 2019-12-23
CN201911342711.6A CN111523881B (zh) 2019-12-23 2019-12-23 一种数字资产分管系统和方法
CN201911341614.5A CN111523879B (zh) 2019-12-23 2019-12-23 一种数字资产安全隔离托管系统和方法
CN201911345174.0 2019-12-23
CN201911345174.0A CN111507707B (zh) 2019-12-23 2019-12-23 一种数字资产隔离分管系统和方法

Publications (1)

Publication Number Publication Date
WO2021114446A1 true WO2021114446A1 (zh) 2021-06-17

Family

ID=76328830

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/070536 WO2021114446A1 (zh) 2019-12-13 2020-01-06 数字资产隔离管理系统和方法

Country Status (2)

Country Link
US (1) US20220129886A1 (zh)
WO (1) WO2021114446A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20220318779A1 (en) * 2021-04-01 2022-10-06 International Business Machines Corporation Secure Off-Line Transactions Through Broadcast Encryption
US20230012696A1 (en) * 2021-07-19 2023-01-19 EMC IP Holding Company LLC True secure airgap

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015175854A2 (en) * 2014-05-15 2015-11-19 Cryptyk, Inc. (Trading As Bitsavr Inc.) System and method for digital currency storage, payment and credit
CN107566119A (zh) * 2017-09-28 2018-01-09 中国—东盟信息港股份有限公司 一种eSIM卡数据安全的保护方法及系统
CN109246096A (zh) * 2018-08-30 2019-01-18 西安电子科技大学 适用于云存储的多功能细粒度访问控制方法
CN110533417A (zh) * 2018-05-24 2019-12-03 上海赢亥信息科技有限公司 一种数字资产管理装置、发行方法及系统

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR102130726B1 (ko) * 2012-02-29 2020-08-05 모비웨이브 인코포레이티드 디바이스로 보안 금융 거래를 행하는 방법, 디바이스 및 보안 요소
WO2014201059A1 (en) * 2013-06-10 2014-12-18 Certimix, Llc Secure storing and offline transfering of digitally transferable assets
US9891882B2 (en) * 2015-06-01 2018-02-13 Nagravision S.A. Methods and systems for conveying encrypted data to a communication device
US10693658B2 (en) * 2016-02-12 2020-06-23 Visa International Service Association Methods and systems for using digital signatures to create trusted digital asset transfers
KR102174665B1 (ko) * 2016-11-14 2020-11-05 인테그리티 시큐리티 서비시즈 엘엘씨 디바이스의 보안 프로비저닝 및 관리
US10498705B2 (en) * 2017-11-15 2019-12-03 Visa International Service Association Dynamic offline encryption

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2015175854A2 (en) * 2014-05-15 2015-11-19 Cryptyk, Inc. (Trading As Bitsavr Inc.) System and method for digital currency storage, payment and credit
CN107566119A (zh) * 2017-09-28 2018-01-09 中国—东盟信息港股份有限公司 一种eSIM卡数据安全的保护方法及系统
CN110533417A (zh) * 2018-05-24 2019-12-03 上海赢亥信息科技有限公司 一种数字资产管理装置、发行方法及系统
CN109246096A (zh) * 2018-08-30 2019-01-18 西安电子科技大学 适用于云存储的多功能细粒度访问控制方法

Also Published As

Publication number Publication date
US20220129886A1 (en) 2022-04-28

Similar Documents

Publication Publication Date Title
EP2228942B1 (en) Securing communications sent by a first user to a second user
US20130028419A1 (en) System and a method for use in a symmetric key cryptographic communications
JP2020513183A (ja) データのトークン化
JP3504988B2 (ja) 非順応暗号システムによりメッセージ認証を行う通信ノード
CN101005357A (zh) 一种更新认证密钥的方法和系统
US20180115535A1 (en) Blind En/decryption for Multiple Clients Using a Single Key Pair
CN103455734A (zh) 与设备无关的密码信息管理
WO2021114446A1 (zh) 数字资产隔离管理系统和方法
CN112000978B (zh) 隐私数据的输出方法、数据处理系统及存储介质
WO2021114445A1 (zh) 数字资产异地管理系统和方法
CN116340331A (zh) 一种基于区块链的大型仪器实验结果存证方法和系统
CN111144885B (zh) 一种数字资产托管方法和系统
CN112003690A (zh) 密码服务系统、方法及装置
Kaushik et al. Secure cloud data using hybrid cryptographic scheme
CN112861156B (zh) 显示数据的安全通信方法、装置、电子设备及存储介质
US11546156B1 (en) Secure data communication using Elliptic-curve Diffie-Hellman (ECDHE) key agreement
CN111523879B (zh) 一种数字资产安全隔离托管系统和方法
CN111178882B (zh) 一种数字资产安全托管系统和方法
KR102475434B1 (ko) 암호화폐 보안 방법 및 시스템
CN111507707B (zh) 一种数字资产隔离分管系统和方法
CN111523881B (zh) 一种数字资产分管系统和方法
CN111523882B (zh) 一种数字资产异地隔离分管系统和方法
CN111523880B (zh) 一种数字资产异地分管系统和方法
CN111523883B (zh) 一种数字资产异地隔离托管系统和方法
US20170308708A1 (en) Data checking apparatus and method using same

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20898829

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20898829

Country of ref document: EP

Kind code of ref document: A1