CN110192212A - Digital asset platform - Google Patents

Digital asset platform Download PDF

Info

Publication number
CN110192212A
CN110192212A CN201680087670.9A CN201680087670A CN110192212A CN 110192212 A CN110192212 A CN 110192212A CN 201680087670 A CN201680087670 A CN 201680087670A CN 110192212 A CN110192212 A CN 110192212A
Authority
CN
China
Prior art keywords
agreement
account book
participant
transaction data
data collection
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201680087670.9A
Other languages
Chinese (zh)
Other versions
CN110192212B (en
Inventor
亚历山大·伯诺尔
陶马斯·布吕默
绍尔·克弗尔
詹姆士·利齐奥斯
西蒙·迈耶
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Digital Asset Switzerland GmbH
Original Assignee
Digital Asset Holdings LLC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Digital Asset Holdings LLC filed Critical Digital Asset Holdings LLC
Publication of CN110192212A publication Critical patent/CN110192212A/en
Application granted granted Critical
Publication of CN110192212B publication Critical patent/CN110192212B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3297Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • General Business, Economics & Management (AREA)
  • Signal Processing (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Storage Device Security (AREA)

Abstract

Provide a kind of system and method for executing polygon waste book note workflow between multiple participants, comprising: receive the rule previously decided through consultation and standardized;Receive authorization decision;Based on authorization decision and rule, agreement evolution is executed;The agreement after evolution is notified to the participant of agreement;And by the agreement after evolution and voucher is notified to be stored in shared only additional account book.

Description

Digital asset platform
Technical field
This disclosure relates to digital asset platform and application method.
Background technique
The existing closed central management account book for settling accounts assets, debt and transaction is considered opaque and easily goes out Wrong.This to supervise cumbersome, needs many duplicate processes and account book, and be easy to cause fraud.Existing account book framework First is also at present using most alternative solutions to be referred to as the distributed digital account book of bit coin as representative, it uses area Block chain data structure.One basic principle of bit coin operation is: the system is arranged to utilize public and private key cryptographic technique Reciprocity mechanism of exchange without center intermediary's repository or central repositories, and allows all participants in network to hold in real time The integrality of the complete copy of the complete copy and real-time verification account book of account book.The design of bit coin block chain is to create one Born insecure assets that kind can be swapped with anonymity side in the world, i.e. bit coin.
The platform for the support digital asset built on class bit coin or class block catenary system at present is usually not tied Structure is to provide comprehensive protection to financial institution, and this protection may be many existing transaction industry of the law to financial institution Required by business.These platforms do not account for the supervisory system for financial institution and financial transaction usually.Therefore, mechanism Investor is irresolute to digital asset market is entered, and avoids the existing business that distributed account book is used for them.
Summary of the invention
Exemplary embodiment disclosed herein provides a kind of for executing transaction workflow between multiple participants Distributed system.A kind of method of the data structure of the polygon bookkeeping of manipulation distribution includes: to receive previously to decide through consultation and standardize Rule;Receive authorization decision;Based on authorization decision and rule, agreement evolution is executed;After notifying evolution to the participant of agreement Agreement;And by the agreement after evolution and voucher is notified to be stored in shared only additional account book.
This method may include: the conflicting agreement of detection;And based on from the shared voucher for only adding account book, Exclude conflicting agreement.This method may include: by enough parts for authorization to participant itself and record Protocol library is provided to participant and is seen clearly the part of agreement, wherein the area protocol library of participant, which remains, not to be participated in other The record of person is contradicted and be can verify that in the visible range of participant.
This method may include: the evolution of automatic audit authorization and agreement.Only adding the situation that account book includes block chain In, this method can be used.
This method may include that transaction workflow is executed between multiple participants, which includes: multiple using having The order inquiry responsibility separation (CQRS) mode (pattern) of module is interacted with only additional account book, wherein module includes: account book Writer is configured as the evidence record of transaction data collection being indicated to account book by the first writing module of CQRS;And account This reader is configured as the voucher with matched notice token on detection account book, and first by CQRS reads mould Block reads this matching voucher.
It include that can use the party in the situation for indicating the timestamp of the record time on account book in the voucher of instruction agreement Method.In the situation of Merkel (Merkle) Hash that the voucher of instruction agreement includes transaction data collection, this method can be used. When the transaction data collection through Hash includes the proof of corresponding polygon authorization commercial intention message and is used for commercial intention message When being converted to the proof of the Current protocol of transaction data collection, this method can be used.
In the situation that each of multiple distributed nodes include the disparate modules of CQRS, this method can be used. In the situation of the first writing module that the reduction subset of node includes CQRS, this method can also be used.
In the situation that the second read module by CQRS detects matched notice token, this method can be used.It should Method may include that the bulletin that will be identified is issued on account book.This method can also include being written for each participant and log Device is to the unique shared secret of calculating.It can be identified by participant in matched notice token, and to the feelings of other each side secrecy In shape, this method can be used.
In the situation that Current protocol is stored as abstract syntax tree (AST) by transaction data collection, this method can be used.? Transaction data collection is updated to be formed in the situation of Merkel's abstract syntax tree (MAST) using Merkel's Hash, and can also use should Method.
This method can also include: to execute audit, with identification protocol from the first transaction data collection to the second transaction data collection Evolution be proper authorization and correctly execute, and prove to be notified of variation relevant to them to all participants.It is examining Core also confirms not to participant's notice with the situation of their incoherent variations, can also use this method.
A kind of example embodiment system for distributed polygon bookkeeping, comprising: commercial intention unit is configured as connecing Receive the rule previously decided through consultation and standardized;Selecting unit is configured as receiving authorization decision from commercial intention unit;Processing is single Member is configured as executing agreement evolution based on authorization decision and rule;Notification unit is configured as after notifying evolution to participant Agreement;And account book is only added, it is configured as: agreement and notice voucher after storage evolution.
The system may include: audit unit, be configured as detecting conflicting agreement.Based on from it is shared only The voucher of additional account book excludes that the system can also be used in the situation of the conflicting agreement detected.In audit unit In the situation for supporting automatic audit authorization and the evolution of agreement, the system can also be used.
It is only adding in the situation that account book supports following functions, the system can used: by awarding to participant itself Enough area protocol libraries are provided to participant for power and record sees clearly the part of agreement, wherein assists the part of participant View library, which is remained, not to be contradicted with the record of other participants and can verify that in the visible range of participant.
The system may include order inquiry responsibility separation (CQRS) mode, which has multiple modules, support It is interacted with account book is only added;Account book writer is configured as to indicate transaction data collection by the first writing module of CQRS Evidence record is to account book;And account book reader, it is configured as the voucher with matched notice token on detection account book, and This matching voucher is read by the first read module of CQRS.
It is only adding in the situation that account book includes block chain, the system can be used.It include referring in the voucher of instruction agreement In the situation for showing the timestamp of the record time on account book, the system can be used.
In the situation of Merkel's Hash that the voucher of instruction agreement includes transaction data collection, the system can be used.? Transaction data collection through Hash includes the proof of corresponding polygon authorization commercial intention message and is used to turn commercial intention message It is changed in the situation of the proof of the Current protocol of transaction data collection, the system can also be used.
In the situation that each of multiple distributed nodes include the disparate modules of CQRS, the system can be used. In the situation of the first writing module that the reduction subset of node includes CQRS, the system can also be used.
It is configured as in the situation for safeguarding the bulletin of the mark received on account book in each node, can be using this System.It is configured as to calculate in each node corresponding with the participant of the node and any log writer unique shared In secret situation, the system can be used.It can be identified by participant in matched notice token, and maintain secrecy to other each side Situation in, the system can be used.It, can in the situation that the second read module by CQRS detects matched notice token To use the system.
In the situation that Current protocol is stored as abstract syntax tree (AST) by transaction data collection, the system can be used.? Transaction data collection is updated to be formed in the situation of Merkel's abstract syntax tree (MAST) using Merkel's Hash, and can also use should System.
The system may include auditor, which is configured as identification protocol and hands over from the first transaction data collection to second The evolution of easy data set is proper authorization and correctly executes, and proves to be notified of change relevant to them to all participants Change.It is also confirmed not into participant's notice and the situation of their incoherent variations in auditor, the system can be used.
A kind of exemplary embodiment program storage device is visibly embodied for manipulating in distributed polygon bookkeeping The executable program step of the computer of data structure, including the program step for following operation: reception is previously decided through consultation and is advised The rule of generalized;Receive authorization decision;Based on authorization decision and rule, agreement evolution is executed;It is drilled to the participant of agreement notice Agreement after;And by the agreement after evolution and voucher is notified to be stored in shared only additional account book.
The step of equipment may include for following operation: conflicting agreement is detected;And based on from shared Only add account book voucher, exclude conflicting agreement.The step of equipment may include for following operation: by right Enough area protocol libraries provide to participant and see clearly the part of agreement for the authorization of participant itself and record, wherein The area protocol library of participant is remained not to be contradicted and can in the visible range of participant with the record of other participants Verifying.
The step of equipment may include the evolution for auditing authorization and agreement automatically.It include block only adding account book In the situation of chain, the equipment can be used.
The step of equipment may include for executing transaction workflow between multiple participants, which includes: to make It is interacted with order inquiry responsibility separation (CQRS) mode with multiple modules with only additional account book, wherein module includes: account book Writer is configured as the evidence record of transaction data collection being indicated to account book by the first writing module of CQRS;And account This reader is configured as the voucher with matched notice token on detection account book, and first by CQRS reads mould Block reads this matching voucher.
It include that can be set using this in the situation for indicating the timestamp of the record time on account book in the voucher of instruction agreement It is standby.In the situation of Merkel's Hash that the voucher of instruction agreement includes transaction data collection, the equipment can be used.Through Hash Transaction data collection include the proof of corresponding polygon authorization commercial intention message and for commercial intention message to be converted to friendship In the situation of the proof of the Current protocol of easy data set, the equipment can also be used.
In the situation that each of multiple distributed nodes include the disparate modules of CQRS, the equipment can be used. In the situation of the first writing module that the reduction subset of node includes CQRS, the equipment can also be used.
In the situation that the second read module by CQRS detects matched notice token, the equipment can be used.It should Equipment may include step of the bulletin publication on account book for that will identify.The equipment may include for for each participation The step of person and log writer are to unique shared secret is calculated.It can be identified by participant in matched notice token, and To in the situation of other each side secrecy, the equipment can be used.
In the situation that Current protocol is stored as abstract syntax tree (AST) by transaction data collection, the equipment can be used.? Transaction data collection is updated to be formed in the situation of Merkel's abstract syntax tree (MAST) using Merkel's Hash, and can also use should Equipment.
The step of equipment may include for executing audit, the audit is to identification protocol from the first transaction data collection Evolution to the second transaction data collection is proper authorization and correctly executes, and prove to be notified of to all participants and they Relevant variation.Also confirm that not into participant's notice and the situation of their incoherent variations, can also use should in audit Equipment.
Detailed description of the invention
From following detailed description, especially when read in conjunction with the accompanying drawings, it can be more clearly understood that illustrative unrestricted The exemplary embodiment of property, in which:
Fig. 1 is the digital asset modeling language carried out by decision shown according to disclosure exemplary embodiment (DAMLTM) schematic block diagram of the evolution of agreement;
Fig. 2 is schematic abstract syntax tree (AST) analysis diagram according to disclosure exemplary embodiment;
Fig. 3 is to show testing using distributed account book technology (DLT) log voucher according to disclosure exemplary embodiment The schematic block diagram of the evolution of DAMLTM agreement demonstrate,proving, by decision progress;
Fig. 4 is to show the schematic block diagram identified according to the interested party of disclosure exemplary embodiment;
Fig. 5 is signal Merkel abstract syntax tree (MAST) analysis diagram according to disclosure exemplary embodiment;And
Fig. 6 is contract authorization and the distribution framework (Contract shown according to disclosure exemplary embodiment Authorization and Distribution Framework, abbreviation CADF) exemplary system figure.
Specific embodiment
It will be with reference to the attached drawing for showing exemplary embodiment the present invention is more fully described design.However, present inventive concept It can implement in many different forms, and should not be construed as being limited to embodiment set forth herein.Through this description, Similar appended drawing reference may refer to similar element.As it is used herein, " model " word is defined as at least one set of association View or potential transaction may indicate indicate according to certain management rules (for example, it may be possible to by master contract offer) The agreement of digitized representations or legally binding contract.
Example embodiment system executes polygon bookkeeping, and wherein agreement was due to authorization decision and along previously deciding through consultation and standardized The rule of change carries out evolution, guarantees the agreement that participant can know that they participate in, can be by about the shared of protocol conversion Add log only to exclude conflicting agreement, participant may only (phase be seen clearly in the part with seeing clearly the part of agreement It is enough for their authorization and record), the area protocol library of participant remains the not record with other participants It contradicts and can verify that in the visible range of participant, and authorization and the evolution of agreement can be audited automatically.
As shown in Figure 1, the evolution of digital asset modeling language (DAMLTM) agreement is totally indicated by reference marker 100. DAMLTM previous protocol 110 is influenced by decision 112, produces DAMLTM Current protocol 114.
Fig. 2 is gone to, exemplary DAMLTM abstract syntax tree (AST) analysis diagram is totally indicated by appended drawing reference 200.Here, Operator 210 refers to counterfoil (stub) 212 and another operator 220.Another operator 220 refers to the first counterfoil 222, second Counterfoil 224 and third counterfoil 226.Although the exemplary AST is that AST based on DAMLTM, in alternative embodiment can be with Based on alternative contract norm language (CSL).
Turning now to Fig. 3, using the DAMLTM agreement evolution of distributed account book technology (DLT) log credential verification it is overall by Reference marker 300 indicates.Here, the global synchronization log of DLT block chain include frame 310,312,314,316,318,320,322, 324 and 326.DAMLTM previous protocol 330 is influenced by decision 332, produces DAMLTM agreement 334.DAMLTM previous protocol 330 It is influenced by alternative decision making 336, produces DAMLTM alternative protocol 338.Voucher from frame 326 be used to verify previous protocol 330, and the voucher from frame 318 is used for indentification protocol 334.However, due to standby not for verifying in DLT block chain log The voucher of agreement 338 is selected, therefore alternative protocol 338 is invalid.
As shown in figure 4, participant identification workflow is totally indicated by appended drawing reference 400.Here, in functional block 410, day Will writer exports token according to the mark of the side A and the privacy key of log writer.In functional block 420, A root is according to log The mark of writer and the privacy key of the side A export token.In input frame 430, it is related to the association of the side A using notice token reception The voucher of view.Functional block 432 can execute optional processing and direction-pointing function frame 434.Functional block 434 determines the mark of the side A, and And it is directed toward frame 436.Functional block 436 can execute optional processing and direction-pointing function frame 438.Functional block 438 then determines log The mark of writer.
Fig. 5 is gone to, Merkel's abstract syntax tree (MAST) DAMLTM analysis diagram is totally indicated by appended drawing reference 500.Here, Merkel's Hash 540 refers to another Merkel's Hash 542 and operator 520.Operator 520 is deposited with reference to the first counterfoil 522, second Root 524 and third counterfoil 526.
Turning now to Fig. 6, contract authorization and distribution framework (CADF) interconnection system are totally indicated by appended drawing reference 600.This In, the global synchronization log 650 based on exemplary digital account book technology (DLT) block chain is connected to 660 He of the first CADF unit Each of 2nd CADF unit 670 unit.The use of first and second CADF units is led to the agreement that DAMLTM writes Letter, the DAMLTM can be converted to AST or MAST.CADF system can authorize, store and request from representing the another of another party The agreement of one CADF system.First CADF 660 is connected to information technology (IT) system 680 of the side A, and the 2nd CADF670 It is connected to not system 690 of the side B.
Digital asset modeling language (DAMLTM) is a kind of very strong language of expressive force, enables financial institution to agreement Agreement is modeled and is executed, wherein this modeling and execution have certainty and foregone conclusion property.Based on distributed account book technology (DLT) global synchronization log is the account book (such as, but not limited to block chain) of shared tape copy, has and is known as " consistency The synchronization mechanism of algorithm ".Contract authorization and distribution framework (CADF) are supported or including selectively disclosing contract simultaneously to participant Collect the service of its decision authorization.
Presently disclosed digital asset platform supports various rolls, and different role is entering agreement and/or checking agreement side Face can have different abilities or presently disclosed digital asset platform technically supports the safety of platform.Configuration DAMLTM, DLT log and/or unique design decision when CADF provide to simplification (streamline) and execute financial machine The strong tools of contract workflow between structure and inside financial institution.
DAMLTM code by the Protocol Modeling between each side at usually finally refer to other DAMLTM models model, each Other DAMLTM models are evolved to new model by the decision of a side.New model may make its other party participate in or be related to Contract, it may be possible to provide new Tactic selection, or it is possibly even identical as prior model.DAMLTM language particularly suitable for this Current possible all selections of the particular feature of the purpose of the sample each side that included: 1) DAML pattern enumeration and their own As a result.2) decision makes DAML model that will be evolved to new DAML model with limited step, and new DAML model waits newly later Decision is with further evolution.3) DAML model can be analyzed, to be inferred to: a) current each side and their available selections;With And b) one when front decides to do any one in its current selection, the set of each side of new contract will be participated in.4)DAML The some parts for allowing to extract model, so that these parts itself are also effective DAML model, but may have fewer The participant of amount.
Although DAML be it is human-readable and editable, it can be converted into and form referred to as abstract syntax tree (AST) definition defines and unique technology indicates, as shown in Figure 2.DAML allow operator, operator may combine counterfoil or Other operators.Operator may indicate decision alternatives, and the subtree of operator may define the effect of decision.As decision As a result, counterfoil may be replaced by model (being equally expressed as AST).
The reliable bookkeeping of Current protocol be used to avoid by either party while thinking effective conflicting agreement. Distributed account book technology (DLT) is the alternative of third party's bookkeeping and bilateral bookkeeping.Compared with bilateral bookkeeping, it main excellent Gesture is scalability, and compared with third party's bookkeeping, its main advantage is attack tolerant.Distributed account book technology introduces Polygon bookkeeping, thus to create reliably shared architecture, which determines the suitable of agreement for network members cooperation Sequence.It, can be by that only agreement will be thought of as effectively that there are contradictory agreements to solve earlier once the sequence of agreement is clear. DLT global synchronization synchronization log is only additional log (the append-only log) for the voucher of agreement evolution.DLT log Data structure is characterized in that: the complicated integrity certification based on digital signature and cryptographic Hash.The member of DLT log network Their copy phase of the log copy with most of network participants can be proved to themselves by execution consistency algorithm Matching.DLT pairing Tongfang is advantageous in that: if each side determines that DLT log should include all contracts, it can be identified completely Current contract collection, while excluding alternative automatically.
When representing complete current contract collection, DLT log acts also as the publication canal for announcing new contract to participant Road.Need the validity to participant notification protocol.Presently disclosed digital asset platform will notify token storage to new model Voucher in.Participant can monitor their token.In order to protect the privacy of participant so that only the writer of log and Participant aware notification token is linked to the mode of the party to calculate notice token.
Notice token is the function of the shared secret between log writer and notified party.Pass through the public affairs in log in advance The mark for accusing log writer and participant, may be implemented the derivation of shared secret.Mark is associated with public key, and private key is public by institute Involved party's secrecy that the mark of announcement represents.The log is supported after the security leak for occurring to influence a side, for regular key It rolls or promptly cancels the bulletin being identified and recall.
Contract authorization and distribution framework (CADF) are used for decision, and decision needs are correctly awarded by that side to make a choice Power.Platform collects the digital signature about commercial intention being formatted in certificate authority using AST derived from DAML.Due to DAML may not be what authorized person created, it is therefore desirable to be provided on demand by the network node of founder.If requestor haves no right to look into It sees contract or makes only to reply the hiding AST (being only enough to support the decision process of founder) in part, then it may refusal transmitting AST To sign.
Platform hides the part AST using Merkel's abstract syntax tree (MAST).The some parts of AST are by its respective subtree Merkel's Hash replacement, to create MAST.Any content of Merkel's Hash non-disclosre about hiding information.Merkel's Hash Calculation allow based on complete AST or the digital signature of any MAST derived from it by the AST or its lead The knowledge of any MAST out proves.Therefore, each side will retain them and have the right the incomplete mould checked or need to authorize Type copy set content and.Their model storage is similar to polygon bookkeeping, but is standardized and through proper authorization.
Once being collected into enough authorizations, new agreement will be proven in DLT log.Voucher is underground and model content Related any content, but it is compiled into fingerprint, which makes all participants that can prove that the voucher is for specific Agreement.Working as all participants fully and is reliably defined by the polygonal models library that the voucher in DLT log filters Preceding protocol suite.
The various network nodes for being connected to shared architecture can have different roles.If a node can be completed Dry role.
One role is " account book writer ".It is account book write-in by evidence record to the network node only added in log Device.Although technically It is not necessary to, it is likely to that the record for guaranteeing voucher is also occurred contradiction as few as possible, and Therefore the agreement that it is recorded can be understood completely, and have complete record to this in its CADF.The role of account book writer It can account book writer needs their combined authorization by several nodes sharings, therefore in desired scene.
Another role is " account book reader ".This is to represent that some agreements may be participated in or for each of supervisory authority The network node of side.Account book reader will pay close attention to the notice of its service side in DLT log, and summarize agreement by its CADF Partial database.
Another role is " auditor ".The purpose of auditor is to keep checking account book reader: proving association View evolution is correct execution and authorization, and participant is notified, and does not record any conflicting agreement.With account book Writer is similar, and auditor can have certain understanding to agreement, but in addition, it can also understand multi-party shared secret.Account book Writer will be reviewed device label to the violation of agreement, and will handle except described shared architecture.Due to The task of auditor is to execute the inspection algorithm for not needing artificially to judge or supervise, therefore auditor can be and calculate ring in safety The autonomous execution algorithm run in border.Communication with security context can be encrypted, and it can be configured to, so that in addition to careful Except any unsanctioned rule verification setting mark that core device is observed, safety collar may exit off without any other data Border.
Under default situations, all each side of agreement require to authorize it.The agreement can replace previous agreement. Agreement be usually " (eventful) of multiple affair " because it depend at least one external input or event, but this be not must It needs.The grammer of agreement and explanation depend entirely on each side of agreement " closing account (off ledger) ".The account of exemplary embodiment This records this pass account agreement, but is not intended to explain them.Under specific circumstances, if (it can cause to reach this agreement Efficient protocal) be each side intention and each side it is respective authorization have legal status, then this agreement may meet given pipe The requirement that contract legally can be performed in area under one's jurisdiction.Generally, account book is not relevant for whether given agreement legally can be performed, and And exemplary embodiment does not distinguish general protocol and meets the agreement that contract standard legally can be performed.When needed, of the invention Design is imagined: master contract can be used for giving legal identity of the DAML agreement as the contract in specific tube area under one's jurisdiction.
All codes discussed above, data structure etc. can store in non-transitory computer-readable storage media. Functions described herein step can be completed by the computer code executed on a processor.Above-mentioned various data manipulations can To be completed for the data structure stored, to create the transformed data knot handled in different ways by computer processor Structure.The various functions of embodiment allow computing system to operate in a new way to complete to trade and provide new benefit.Various processes Figure step can be completed by the software module executed on a computer processor.Each frame shown in figure can indicate data knot Structure, such as store the database of record, manipulate these data structures in the manner described with allow computing system to data into Row operates and converts data.
Although describing present inventive concept by the example about non-restrictive illustrative embodiment herein;But base In introduction disclosed herein, other replacements, modifications and variations will be apparent for those of ordinary skill in the related art. Therefore, the scope of the appended claims is intended to include all such substitutions of exemplary embodiment set forth herein, modification With change and fall into the scope of the present disclosure and spirit in equivalent.

Claims (58)

1. a kind of method of the data structure of the distributed polygon bookkeeping of manipulation, comprising:
Receive the rule previously decided through consultation and standardized;
Receive authorization decision;
Based on the authorization decision and the rule, agreement evolution is executed;
The agreement after evolution is notified to the participant of agreement;And
By the agreement after evolution and voucher is notified to be stored in shared only additional account book.
2. according to the method described in claim 1, further include:
Detect conflicting agreement;And
Based on from the shared voucher for only adding account book, conflicting agreement is excluded.
3. according to the method described in claim 1, further include:
Part to agreement is provided by enough area protocol libraries for authorization to participant itself and record to participant It sees clearly,
Wherein, the area protocol library of participant, which is remained, does not contradict with the record of other participants and visible in participant It can verify that in range.
4. according to the method described in claim 1, further include:
The evolution of automatic audit authorization and agreement.
5. according to the method described in claim 1, wherein, the account book that only adds includes block chain.
6. according to the method described in claim 1, further include between multiple participants execute transaction workflow, it is described to execute packet It includes:
It is interacted using the order inquiry responsibility separation CQRS mode with multiple modules with the account book that only adds,
Wherein, the module includes:
Account book writer, is configured as: the evidence record of transaction data collection will be indicated to the account by the writing module of CQRS This;And
Account book reader, is configured as: detecting the voucher with matched notice token on the account book, and passes through CQRS's Read module reads this matching voucher.
7. according to the method described in claim 6, wherein, indicating that the voucher of agreement includes: when indicating the record on the account book Between timestamp.
8. according to the method described in claim 6, wherein, indicating that the voucher of agreement includes: the Merkel of the transaction data collection Hash.
9. according to the method described in claim 8, wherein, the transaction data collection through Hash includes: corresponding polygon authorization business It is intended to the proof of message and the proof of the Current protocol for the commercial intention message to be converted to transaction data collection.
10. according to the method described in claim 6, wherein, each of multiple distributed nodes include the different moulds of CQRS Block.
11. according to the method described in claim 10, wherein, the reduction subset of the node includes the first write-in mould of CQRS Block.
12. according to the method described in claim 6, wherein, the matched notice token is to read mould by the second of CQRS Block detection.
13. according to the method described in claim 6, further include: the bulletin of mark is issued on the account book.
14. according to the method for claim 13, further includes: be directed to each participant and log writer pair, calculate unique Shared secret.
15. according to the method for claim 14, wherein the matched notice token can identify by participant, and right Other each side secrecy.
16. according to the method described in claim 6, wherein, Current protocol is stored as abstract syntax tree by the transaction data collection AST。
17. according to the method for claim 16, wherein the transaction data collection is updated using Merkel's Hash, to be formed Merkel's abstract syntax tree MAST.
18. according to the method described in claim 1, further include: audit is executed, with identification protocol from the first transaction data collection to The evolution of two transaction data collection is proper authorization and correctly executes, and proves to be notified of to all participants related to them Variation.
19. according to the method for claim 17, wherein audit also confirms not to participant's notice and their incoherent changes Change.
20. a kind of system for distributed polygon bookkeeping, comprising:
Commercial intention unit, is configured as: receiving the rule previously decided through consultation and standardized;
Selecting unit is configured as: receiving authorization decision from the commercial intention unit;
Processing unit is configured as: executing agreement evolution based on the authorization decision and the rule;
Notification unit is configured as: the participant of Xiang Xieyi notifies the agreement after evolution;And
Account book is only added, is configured as: agreement and notice voucher after storage evolution.
21. system according to claim 20, further includes: audit unit is configured as detecting conflicting agreement.
22. system according to claim 21, wherein based on from the shared voucher for only adding account book, exclude detection The conflicting agreement arrived.
23. system according to claim 21, wherein the audit unit supports drilling for automatic audit authorization and agreement Into.
24. system according to claim 20, wherein the account book that only adds is supported:
Part to agreement is provided by enough area protocol libraries for authorization to participant itself and record to participant It sees clearly,
Wherein, the area protocol library of participant, which is remained, does not contradict with the record of other participants and visible in participant It can verify that in range.
25. system according to claim 20, wherein the account book that only adds includes block chain.
26. system according to claim 20, further includes:
Order inquiry responsibility separates CQRS mode, has multiple modules and supports to interact with the account book that only adds;
Account book writer, is configured as: the evidence record of transaction data collection will be indicated to the account by the writing module of CQRS This;And
Account book reader, is configured as: detecting the voucher with matched notice token on the account book, and passes through CQRS's Read module reads this matching voucher.
27. system according to claim 26, wherein the voucher for indicating agreement includes: the record on the instruction account book The timestamp of time.
28. system according to claim 26, wherein the voucher for indicating agreement includes: the Merck of the transaction data collection That Hash.
29. system according to claim 28, wherein the transaction data collection through Hash includes: corresponding polygon authorization quotient Industry is intended to the proof of message and the proof of the Current protocol for the commercial intention message to be converted to transaction data collection.
30. system according to claim 26, wherein each of multiple distributed nodes include the different moulds of CQRS Block.
31. system according to claim 30, wherein the reduction subset of the node includes the first write-in mould of CQRS Block.
32. system according to claim 26, wherein each node is configured as what the maintenance on the account book received The bulletin of mark.
33. system according to claim 32, wherein each node can calculate and the participant of the node and any The corresponding unique shared secret of log writer.
34. system according to claim 26, wherein the matched notice token can identify by participant, but right Other each side secrecy.
35. system according to claim 26, wherein the matched notice token is to read mould by the second of CQRS Block detection.
36. system according to claim 26, wherein Current protocol is stored as abstract syntax tree by the transaction data collection AST。
37. system according to claim 36, wherein the transaction data collection is updated using Merkel's Hash, to be formed Merkel's abstract syntax tree MAST.
38. system according to claim 26, further includes: auditor is configured as identification protocol from the first transaction data The evolution for collecting the second transaction data collection is proper authorization and correctly executes, and prove to be notified of to all participants and he Relevant variation.
39. the system according to claim 38, wherein the auditor also confirms not to participant's notice and their not phases The variation of pass.
40. a kind of program storage device, visibly embody computer it is executable for manipulating in distributed polygon bookkeeping The program step of data structure, described program step include:
Receive the rule previously decided through consultation and standardized;
Receive authorization decision;
Based on the authorization decision and the rule, evolution agreement is executed;
The agreement after evolution is notified to the participant of agreement;And
By the agreement after evolution and voucher is notified to be stored in shared only additional account book.
41. equipment according to claim 40, the step further include:
Detect conflicting agreement;And
Based on from the shared voucher for only adding account book, conflicting agreement is excluded.
42. equipment according to claim 40, the step further include:
Part to agreement is provided by enough area protocol libraries for authorization to participant itself and record to participant It sees clearly,
Wherein, the area protocol library of participant, which is remained, does not contradict with the record of other participants and visible in participant It can verify that in range.
43. equipment according to claim 40, the step further include:
The evolution of automatic audit authorization and agreement.
44. equipment according to claim 40, wherein the account book that only adds includes block chain.
45. equipment according to claim 40, the step further includes that transaction workflow is executed between multiple participants, The execution includes:
It is interacted using the order inquiry responsibility separation CQRS mode with multiple modules with the account book that only adds,
Wherein, the module includes:
Account book writer, is configured as: the evidence record of transaction data collection will be indicated to institute by the first writing module of CQRS State account book;And
Account book reader, is configured as: detecting the voucher with matched notice token on the account book, and passes through CQRS's First read module reads this matching voucher.
46. equipment according to claim 45, wherein the voucher for indicating agreement includes: the record on the instruction account book The timestamp of time.
47. equipment according to claim 45, wherein the voucher for indicating agreement includes: the Merck of the transaction data collection That Hash.
48. equipment according to claim 47, wherein the transaction data collection through Hash includes: corresponding polygon authorization quotient Industry is intended to the proof of message and the proof of the Current protocol for the commercial intention message to be converted to transaction data collection.
49. equipment according to claim 45, wherein each of multiple distributed nodes include the different moulds of CQRS Block.
50. equipment according to claim 49, wherein the reduction subset of the node includes the first write-in mould of CQRS Block.
51. equipment according to claim 45, wherein the matched notice token is to read mould by the second of CQRS Block detection.
52. equipment according to claim 45, the step further include: issuing the bulletin of mark on the account book.
53. equipment according to claim 52, the step further include: it is directed to each participant and log writer pair, Calculate unique shared secret.
54. equipment according to claim 53, wherein the matched notice token can identify by participant, but right Other each side secrecy.
55. equipment according to claim 45, wherein Current protocol is stored as abstract syntax tree by the transaction data collection AST。
56. equipment according to claim 55, wherein the transaction data collection is updated using Merkel's Hash, to be formed Merkel's abstract syntax tree MAST.
57. equipment according to claim 40, the step further include: execute audit, traded with identification protocol from first The evolution of data set to the second transaction data collection is proper authorization and correctly executes, and proves to be notified of to all participants Variation relevant to them.
58. equipment according to claim 57, wherein audit also confirms not to participant's notice and their incoherent changes Change.
CN201680087670.9A 2016-07-14 2016-07-14 Digital asset platform Active CN110192212B (en)

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
PCT/US2016/042322 WO2018013124A1 (en) 2016-07-14 2016-07-14 Digital asset platform

Publications (2)

Publication Number Publication Date
CN110192212A true CN110192212A (en) 2019-08-30
CN110192212B CN110192212B (en) 2024-06-04

Family

ID=60953207

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201680087670.9A Active CN110192212B (en) 2016-07-14 2016-07-14 Digital asset platform

Country Status (3)

Country Link
EP (1) EP3472779A4 (en)
CN (1) CN110192212B (en)
WO (1) WO2018013124A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117237124A (en) * 2023-11-15 2023-12-15 国网浙江省电力有限公司 Digital asset management method and device based on multi-terminal interaction

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106980649B (en) 2017-02-28 2020-07-10 创新先进技术有限公司 Method and device for writing block chain service data and service subset determining method
WO2019028068A1 (en) 2017-08-01 2019-02-07 Digital Asset (Switzerland) GmbH Method and apparatus for automated committed settlement of digital assets
US20200065802A1 (en) * 2018-08-27 2020-02-27 Digital Asset (Switzerland) GmbH Eligibility of a digital asset for a transaction

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100110935A1 (en) * 2006-01-24 2010-05-06 Brown University Efficient Content Authentication In Peer-To-Peer Networks
CN102057617A (en) * 2008-06-06 2011-05-11 艾利森电话股份有限公司 Cryptographic key generation
US20150379510A1 (en) * 2012-07-10 2015-12-31 Stanley Benjamin Smith Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.
CN105488665A (en) * 2015-11-25 2016-04-13 布比(北京)网络技术有限公司 Decentralized transaction method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140279540A1 (en) * 2013-03-15 2014-09-18 Fulcrum Ip Corporation Systems and methods for a private sector monetary authority

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20100110935A1 (en) * 2006-01-24 2010-05-06 Brown University Efficient Content Authentication In Peer-To-Peer Networks
CN102057617A (en) * 2008-06-06 2011-05-11 艾利森电话股份有限公司 Cryptographic key generation
US20150379510A1 (en) * 2012-07-10 2015-12-31 Stanley Benjamin Smith Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain.
CN105488665A (en) * 2015-11-25 2016-04-13 布比(北京)网络技术有限公司 Decentralized transaction method

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117237124A (en) * 2023-11-15 2023-12-15 国网浙江省电力有限公司 Digital asset management method and device based on multi-terminal interaction
CN117237124B (en) * 2023-11-15 2024-02-02 国网浙江省电力有限公司 Digital asset management method and device based on multi-terminal interaction

Also Published As

Publication number Publication date
CN110192212B (en) 2024-06-04
EP3472779A4 (en) 2020-01-08
WO2018013124A1 (en) 2018-01-18
EP3472779A1 (en) 2019-04-24

Similar Documents

Publication Publication Date Title
CN108269351B (en) A kind of digital ticket information processing method and system
US20180018738A1 (en) Digital asset platform
CN108830602A (en) A kind of license chain construction and management-control method based on chameleon hash function
CN110192212A (en) Digital asset platform
CN111598574A (en) Intelligent service transaction oriented supervision method and supervision interface
CN111369730B (en) Voting processing method and device based on block chain
US20200058163A1 (en) System and Method for Mapping a Virtual Building Model
Kebande et al. Mapping digital forensic application requirement specification to an international standard
Sater Blockchain and the european union's general data protection regulation: A chance to harmonize international data flows
Jiang et al. Decentralized finance (DeFi): A survey
CN110472979A (en) The verification method of transaction Subjective and Objective based on block chain
SADU Auditing blockchain.
de Vilaca Burgos et al. Distributed ledger technical research in Central Bank of Brazil
CN109690550A (en) Digital asset framework
Grönlund Using ICT to combat corruption
Jothi et al. A Comprehensive Survey on Blockchain and Cryptocurrency Technologies: Approaches, Challenges, and Opportunities
Whitley Trusted digital identity provision: GOV. UK Verify’s federated approach
Mott et al. Facing the future of respiratory virus surveillance:“The mosaic surveillance framework”
CN112150299B (en) Annuity data processing method, annuity data processing device, medium and electronic equipment
Rani et al. Blockchain in capital markets: applications, possibilities and challenges
CN107835174A (en) A kind of anti-fake system of account book based on Internet of Things and method
Kamau et al. CryptoAudit: Nature, requirements and challenges of Blockchain transactions audit
Hu [Retracted] Application Analysis of Block Technology Based on Block Chain Computer Model in the False Identification of the Catalog List of the Financial Department of Multinational Companies
Deshapriya et al. Framework for data management in public service delivery applications in Sri Lanka using blockchain technology
CN114175599A (en) Alarm problem management for building management environments

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210326

Address after: Zurich

Applicant after: Digital assets (Switzerland) Co.,Ltd.

Address before: New York, USA

Applicant before: DIGITAL ASSET HOLDINGS

GR01 Patent grant
GR01 Patent grant