CN110192212A - Digital asset platform - Google Patents
Digital asset platform Download PDFInfo
- Publication number
- CN110192212A CN110192212A CN201680087670.9A CN201680087670A CN110192212A CN 110192212 A CN110192212 A CN 110192212A CN 201680087670 A CN201680087670 A CN 201680087670A CN 110192212 A CN110192212 A CN 110192212A
- Authority
- CN
- China
- Prior art keywords
- agreement
- account book
- participant
- transaction data
- data collection
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000013475 authorization Methods 0.000 claims abstract description 51
- 238000000034 method Methods 0.000 claims abstract description 45
- 238000013480 data collection Methods 0.000 claims description 44
- 238000012550 audit Methods 0.000 claims description 17
- 238000001514 detection method Methods 0.000 claims description 8
- 230000008859 change Effects 0.000 claims description 6
- 230000009467 reduction Effects 0.000 claims description 6
- 238000000926 separation method Methods 0.000 claims description 5
- 238000012545 processing Methods 0.000 claims description 4
- 238000005553 drilling Methods 0.000 claims 1
- 238000012423 maintenance Methods 0.000 claims 1
- 239000002699 waste material Substances 0.000 abstract 1
- 238000005516 engineering process Methods 0.000 description 8
- 238000010586 diagram Methods 0.000 description 7
- 230000006870 function Effects 0.000 description 6
- 238000004458 analytical method Methods 0.000 description 4
- 238000004422 calculation algorithm Methods 0.000 description 4
- 238000013461 design Methods 0.000 description 4
- 230000007246 mechanism Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 238000012795 verification Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000002146 bilateral effect Effects 0.000 description 2
- 238000007726 management method Methods 0.000 description 2
- 239000003550 marker Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 1
- 238000006243 chemical reaction Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000008094 contradictory effect Effects 0.000 description 1
- 238000009795 derivation Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000007689 inspection Methods 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012360 testing method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3236—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3297—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving time stamps, e.g. generation of time stamps
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Computer Security & Cryptography (AREA)
- General Business, Economics & Management (AREA)
- Signal Processing (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- Computer Networks & Wireless Communication (AREA)
- General Physics & Mathematics (AREA)
- Finance (AREA)
- Theoretical Computer Science (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
- Storage Device Security (AREA)
Abstract
Provide a kind of system and method for executing polygon waste book note workflow between multiple participants, comprising: receive the rule previously decided through consultation and standardized;Receive authorization decision;Based on authorization decision and rule, agreement evolution is executed;The agreement after evolution is notified to the participant of agreement;And by the agreement after evolution and voucher is notified to be stored in shared only additional account book.
Description
Technical field
This disclosure relates to digital asset platform and application method.
Background technique
The existing closed central management account book for settling accounts assets, debt and transaction is considered opaque and easily goes out
Wrong.This to supervise cumbersome, needs many duplicate processes and account book, and be easy to cause fraud.Existing account book framework
First is also at present using most alternative solutions to be referred to as the distributed digital account book of bit coin as representative, it uses area
Block chain data structure.One basic principle of bit coin operation is: the system is arranged to utilize public and private key cryptographic technique
Reciprocity mechanism of exchange without center intermediary's repository or central repositories, and allows all participants in network to hold in real time
The integrality of the complete copy of the complete copy and real-time verification account book of account book.The design of bit coin block chain is to create one
Born insecure assets that kind can be swapped with anonymity side in the world, i.e. bit coin.
The platform for the support digital asset built on class bit coin or class block catenary system at present is usually not tied
Structure is to provide comprehensive protection to financial institution, and this protection may be many existing transaction industry of the law to financial institution
Required by business.These platforms do not account for the supervisory system for financial institution and financial transaction usually.Therefore, mechanism
Investor is irresolute to digital asset market is entered, and avoids the existing business that distributed account book is used for them.
Summary of the invention
Exemplary embodiment disclosed herein provides a kind of for executing transaction workflow between multiple participants
Distributed system.A kind of method of the data structure of the polygon bookkeeping of manipulation distribution includes: to receive previously to decide through consultation and standardize
Rule;Receive authorization decision;Based on authorization decision and rule, agreement evolution is executed;After notifying evolution to the participant of agreement
Agreement;And by the agreement after evolution and voucher is notified to be stored in shared only additional account book.
This method may include: the conflicting agreement of detection;And based on from the shared voucher for only adding account book,
Exclude conflicting agreement.This method may include: by enough parts for authorization to participant itself and record
Protocol library is provided to participant and is seen clearly the part of agreement, wherein the area protocol library of participant, which remains, not to be participated in other
The record of person is contradicted and be can verify that in the visible range of participant.
This method may include: the evolution of automatic audit authorization and agreement.Only adding the situation that account book includes block chain
In, this method can be used.
This method may include that transaction workflow is executed between multiple participants, which includes: multiple using having
The order inquiry responsibility separation (CQRS) mode (pattern) of module is interacted with only additional account book, wherein module includes: account book
Writer is configured as the evidence record of transaction data collection being indicated to account book by the first writing module of CQRS;And account
This reader is configured as the voucher with matched notice token on detection account book, and first by CQRS reads mould
Block reads this matching voucher.
It include that can use the party in the situation for indicating the timestamp of the record time on account book in the voucher of instruction agreement
Method.In the situation of Merkel (Merkle) Hash that the voucher of instruction agreement includes transaction data collection, this method can be used.
When the transaction data collection through Hash includes the proof of corresponding polygon authorization commercial intention message and is used for commercial intention message
When being converted to the proof of the Current protocol of transaction data collection, this method can be used.
In the situation that each of multiple distributed nodes include the disparate modules of CQRS, this method can be used.
In the situation of the first writing module that the reduction subset of node includes CQRS, this method can also be used.
In the situation that the second read module by CQRS detects matched notice token, this method can be used.It should
Method may include that the bulletin that will be identified is issued on account book.This method can also include being written for each participant and log
Device is to the unique shared secret of calculating.It can be identified by participant in matched notice token, and to the feelings of other each side secrecy
In shape, this method can be used.
In the situation that Current protocol is stored as abstract syntax tree (AST) by transaction data collection, this method can be used.?
Transaction data collection is updated to be formed in the situation of Merkel's abstract syntax tree (MAST) using Merkel's Hash, and can also use should
Method.
This method can also include: to execute audit, with identification protocol from the first transaction data collection to the second transaction data collection
Evolution be proper authorization and correctly execute, and prove to be notified of variation relevant to them to all participants.It is examining
Core also confirms not to participant's notice with the situation of their incoherent variations, can also use this method.
A kind of example embodiment system for distributed polygon bookkeeping, comprising: commercial intention unit is configured as connecing
Receive the rule previously decided through consultation and standardized;Selecting unit is configured as receiving authorization decision from commercial intention unit;Processing is single
Member is configured as executing agreement evolution based on authorization decision and rule;Notification unit is configured as after notifying evolution to participant
Agreement;And account book is only added, it is configured as: agreement and notice voucher after storage evolution.
The system may include: audit unit, be configured as detecting conflicting agreement.Based on from it is shared only
The voucher of additional account book excludes that the system can also be used in the situation of the conflicting agreement detected.In audit unit
In the situation for supporting automatic audit authorization and the evolution of agreement, the system can also be used.
It is only adding in the situation that account book supports following functions, the system can used: by awarding to participant itself
Enough area protocol libraries are provided to participant for power and record sees clearly the part of agreement, wherein assists the part of participant
View library, which is remained, not to be contradicted with the record of other participants and can verify that in the visible range of participant.
The system may include order inquiry responsibility separation (CQRS) mode, which has multiple modules, support
It is interacted with account book is only added;Account book writer is configured as to indicate transaction data collection by the first writing module of CQRS
Evidence record is to account book;And account book reader, it is configured as the voucher with matched notice token on detection account book, and
This matching voucher is read by the first read module of CQRS.
It is only adding in the situation that account book includes block chain, the system can be used.It include referring in the voucher of instruction agreement
In the situation for showing the timestamp of the record time on account book, the system can be used.
In the situation of Merkel's Hash that the voucher of instruction agreement includes transaction data collection, the system can be used.?
Transaction data collection through Hash includes the proof of corresponding polygon authorization commercial intention message and is used to turn commercial intention message
It is changed in the situation of the proof of the Current protocol of transaction data collection, the system can also be used.
In the situation that each of multiple distributed nodes include the disparate modules of CQRS, the system can be used.
In the situation of the first writing module that the reduction subset of node includes CQRS, the system can also be used.
It is configured as in the situation for safeguarding the bulletin of the mark received on account book in each node, can be using this
System.It is configured as to calculate in each node corresponding with the participant of the node and any log writer unique shared
In secret situation, the system can be used.It can be identified by participant in matched notice token, and maintain secrecy to other each side
Situation in, the system can be used.It, can in the situation that the second read module by CQRS detects matched notice token
To use the system.
In the situation that Current protocol is stored as abstract syntax tree (AST) by transaction data collection, the system can be used.?
Transaction data collection is updated to be formed in the situation of Merkel's abstract syntax tree (MAST) using Merkel's Hash, and can also use should
System.
The system may include auditor, which is configured as identification protocol and hands over from the first transaction data collection to second
The evolution of easy data set is proper authorization and correctly executes, and proves to be notified of change relevant to them to all participants
Change.It is also confirmed not into participant's notice and the situation of their incoherent variations in auditor, the system can be used.
A kind of exemplary embodiment program storage device is visibly embodied for manipulating in distributed polygon bookkeeping
The executable program step of the computer of data structure, including the program step for following operation: reception is previously decided through consultation and is advised
The rule of generalized;Receive authorization decision;Based on authorization decision and rule, agreement evolution is executed;It is drilled to the participant of agreement notice
Agreement after;And by the agreement after evolution and voucher is notified to be stored in shared only additional account book.
The step of equipment may include for following operation: conflicting agreement is detected;And based on from shared
Only add account book voucher, exclude conflicting agreement.The step of equipment may include for following operation: by right
Enough area protocol libraries provide to participant and see clearly the part of agreement for the authorization of participant itself and record, wherein
The area protocol library of participant is remained not to be contradicted and can in the visible range of participant with the record of other participants
Verifying.
The step of equipment may include the evolution for auditing authorization and agreement automatically.It include block only adding account book
In the situation of chain, the equipment can be used.
The step of equipment may include for executing transaction workflow between multiple participants, which includes: to make
It is interacted with order inquiry responsibility separation (CQRS) mode with multiple modules with only additional account book, wherein module includes: account book
Writer is configured as the evidence record of transaction data collection being indicated to account book by the first writing module of CQRS;And account
This reader is configured as the voucher with matched notice token on detection account book, and first by CQRS reads mould
Block reads this matching voucher.
It include that can be set using this in the situation for indicating the timestamp of the record time on account book in the voucher of instruction agreement
It is standby.In the situation of Merkel's Hash that the voucher of instruction agreement includes transaction data collection, the equipment can be used.Through Hash
Transaction data collection include the proof of corresponding polygon authorization commercial intention message and for commercial intention message to be converted to friendship
In the situation of the proof of the Current protocol of easy data set, the equipment can also be used.
In the situation that each of multiple distributed nodes include the disparate modules of CQRS, the equipment can be used.
In the situation of the first writing module that the reduction subset of node includes CQRS, the equipment can also be used.
In the situation that the second read module by CQRS detects matched notice token, the equipment can be used.It should
Equipment may include step of the bulletin publication on account book for that will identify.The equipment may include for for each participation
The step of person and log writer are to unique shared secret is calculated.It can be identified by participant in matched notice token, and
To in the situation of other each side secrecy, the equipment can be used.
In the situation that Current protocol is stored as abstract syntax tree (AST) by transaction data collection, the equipment can be used.?
Transaction data collection is updated to be formed in the situation of Merkel's abstract syntax tree (MAST) using Merkel's Hash, and can also use should
Equipment.
The step of equipment may include for executing audit, the audit is to identification protocol from the first transaction data collection
Evolution to the second transaction data collection is proper authorization and correctly executes, and prove to be notified of to all participants and they
Relevant variation.Also confirm that not into participant's notice and the situation of their incoherent variations, can also use should in audit
Equipment.
Detailed description of the invention
From following detailed description, especially when read in conjunction with the accompanying drawings, it can be more clearly understood that illustrative unrestricted
The exemplary embodiment of property, in which:
Fig. 1 is the digital asset modeling language carried out by decision shown according to disclosure exemplary embodiment
(DAMLTM) schematic block diagram of the evolution of agreement;
Fig. 2 is schematic abstract syntax tree (AST) analysis diagram according to disclosure exemplary embodiment;
Fig. 3 is to show testing using distributed account book technology (DLT) log voucher according to disclosure exemplary embodiment
The schematic block diagram of the evolution of DAMLTM agreement demonstrate,proving, by decision progress;
Fig. 4 is to show the schematic block diagram identified according to the interested party of disclosure exemplary embodiment;
Fig. 5 is signal Merkel abstract syntax tree (MAST) analysis diagram according to disclosure exemplary embodiment;And
Fig. 6 is contract authorization and the distribution framework (Contract shown according to disclosure exemplary embodiment
Authorization and Distribution Framework, abbreviation CADF) exemplary system figure.
Specific embodiment
It will be with reference to the attached drawing for showing exemplary embodiment the present invention is more fully described design.However, present inventive concept
It can implement in many different forms, and should not be construed as being limited to embodiment set forth herein.Through this description,
Similar appended drawing reference may refer to similar element.As it is used herein, " model " word is defined as at least one set of association
View or potential transaction may indicate indicate according to certain management rules (for example, it may be possible to by master contract offer)
The agreement of digitized representations or legally binding contract.
Example embodiment system executes polygon bookkeeping, and wherein agreement was due to authorization decision and along previously deciding through consultation and standardized
The rule of change carries out evolution, guarantees the agreement that participant can know that they participate in, can be by about the shared of protocol conversion
Add log only to exclude conflicting agreement, participant may only (phase be seen clearly in the part with seeing clearly the part of agreement
It is enough for their authorization and record), the area protocol library of participant remains the not record with other participants
It contradicts and can verify that in the visible range of participant, and authorization and the evolution of agreement can be audited automatically.
As shown in Figure 1, the evolution of digital asset modeling language (DAMLTM) agreement is totally indicated by reference marker 100.
DAMLTM previous protocol 110 is influenced by decision 112, produces DAMLTM Current protocol 114.
Fig. 2 is gone to, exemplary DAMLTM abstract syntax tree (AST) analysis diagram is totally indicated by appended drawing reference 200.Here,
Operator 210 refers to counterfoil (stub) 212 and another operator 220.Another operator 220 refers to the first counterfoil 222, second
Counterfoil 224 and third counterfoil 226.Although the exemplary AST is that AST based on DAMLTM, in alternative embodiment can be with
Based on alternative contract norm language (CSL).
Turning now to Fig. 3, using the DAMLTM agreement evolution of distributed account book technology (DLT) log credential verification it is overall by
Reference marker 300 indicates.Here, the global synchronization log of DLT block chain include frame 310,312,314,316,318,320,322,
324 and 326.DAMLTM previous protocol 330 is influenced by decision 332, produces DAMLTM agreement 334.DAMLTM previous protocol 330
It is influenced by alternative decision making 336, produces DAMLTM alternative protocol 338.Voucher from frame 326 be used to verify previous protocol
330, and the voucher from frame 318 is used for indentification protocol 334.However, due to standby not for verifying in DLT block chain log
The voucher of agreement 338 is selected, therefore alternative protocol 338 is invalid.
As shown in figure 4, participant identification workflow is totally indicated by appended drawing reference 400.Here, in functional block 410, day
Will writer exports token according to the mark of the side A and the privacy key of log writer.In functional block 420, A root is according to log
The mark of writer and the privacy key of the side A export token.In input frame 430, it is related to the association of the side A using notice token reception
The voucher of view.Functional block 432 can execute optional processing and direction-pointing function frame 434.Functional block 434 determines the mark of the side A, and
And it is directed toward frame 436.Functional block 436 can execute optional processing and direction-pointing function frame 438.Functional block 438 then determines log
The mark of writer.
Fig. 5 is gone to, Merkel's abstract syntax tree (MAST) DAMLTM analysis diagram is totally indicated by appended drawing reference 500.Here,
Merkel's Hash 540 refers to another Merkel's Hash 542 and operator 520.Operator 520 is deposited with reference to the first counterfoil 522, second
Root 524 and third counterfoil 526.
Turning now to Fig. 6, contract authorization and distribution framework (CADF) interconnection system are totally indicated by appended drawing reference 600.This
In, the global synchronization log 650 based on exemplary digital account book technology (DLT) block chain is connected to 660 He of the first CADF unit
Each of 2nd CADF unit 670 unit.The use of first and second CADF units is led to the agreement that DAMLTM writes
Letter, the DAMLTM can be converted to AST or MAST.CADF system can authorize, store and request from representing the another of another party
The agreement of one CADF system.First CADF 660 is connected to information technology (IT) system 680 of the side A, and the 2nd CADF670
It is connected to not system 690 of the side B.
Digital asset modeling language (DAMLTM) is a kind of very strong language of expressive force, enables financial institution to agreement
Agreement is modeled and is executed, wherein this modeling and execution have certainty and foregone conclusion property.Based on distributed account book technology
(DLT) global synchronization log is the account book (such as, but not limited to block chain) of shared tape copy, has and is known as " consistency
The synchronization mechanism of algorithm ".Contract authorization and distribution framework (CADF) are supported or including selectively disclosing contract simultaneously to participant
Collect the service of its decision authorization.
Presently disclosed digital asset platform supports various rolls, and different role is entering agreement and/or checking agreement side
Face can have different abilities or presently disclosed digital asset platform technically supports the safety of platform.Configuration
DAMLTM, DLT log and/or unique design decision when CADF provide to simplification (streamline) and execute financial machine
The strong tools of contract workflow between structure and inside financial institution.
DAMLTM code by the Protocol Modeling between each side at usually finally refer to other DAMLTM models model, each
Other DAMLTM models are evolved to new model by the decision of a side.New model may make its other party participate in or be related to
Contract, it may be possible to provide new Tactic selection, or it is possibly even identical as prior model.DAMLTM language particularly suitable for this
Current possible all selections of the particular feature of the purpose of the sample each side that included: 1) DAML pattern enumeration and their own
As a result.2) decision makes DAML model that will be evolved to new DAML model with limited step, and new DAML model waits newly later
Decision is with further evolution.3) DAML model can be analyzed, to be inferred to: a) current each side and their available selections;With
And b) one when front decides to do any one in its current selection, the set of each side of new contract will be participated in.4)DAML
The some parts for allowing to extract model, so that these parts itself are also effective DAML model, but may have fewer
The participant of amount.
Although DAML be it is human-readable and editable, it can be converted into and form referred to as abstract syntax tree
(AST) definition defines and unique technology indicates, as shown in Figure 2.DAML allow operator, operator may combine counterfoil or
Other operators.Operator may indicate decision alternatives, and the subtree of operator may define the effect of decision.As decision
As a result, counterfoil may be replaced by model (being equally expressed as AST).
The reliable bookkeeping of Current protocol be used to avoid by either party while thinking effective conflicting agreement.
Distributed account book technology (DLT) is the alternative of third party's bookkeeping and bilateral bookkeeping.Compared with bilateral bookkeeping, it main excellent
Gesture is scalability, and compared with third party's bookkeeping, its main advantage is attack tolerant.Distributed account book technology introduces
Polygon bookkeeping, thus to create reliably shared architecture, which determines the suitable of agreement for network members cooperation
Sequence.It, can be by that only agreement will be thought of as effectively that there are contradictory agreements to solve earlier once the sequence of agreement is clear.
DLT global synchronization synchronization log is only additional log (the append-only log) for the voucher of agreement evolution.DLT log
Data structure is characterized in that: the complicated integrity certification based on digital signature and cryptographic Hash.The member of DLT log network
Their copy phase of the log copy with most of network participants can be proved to themselves by execution consistency algorithm
Matching.DLT pairing Tongfang is advantageous in that: if each side determines that DLT log should include all contracts, it can be identified completely
Current contract collection, while excluding alternative automatically.
When representing complete current contract collection, DLT log acts also as the publication canal for announcing new contract to participant
Road.Need the validity to participant notification protocol.Presently disclosed digital asset platform will notify token storage to new model
Voucher in.Participant can monitor their token.In order to protect the privacy of participant so that only the writer of log and
Participant aware notification token is linked to the mode of the party to calculate notice token.
Notice token is the function of the shared secret between log writer and notified party.Pass through the public affairs in log in advance
The mark for accusing log writer and participant, may be implemented the derivation of shared secret.Mark is associated with public key, and private key is public by institute
Involved party's secrecy that the mark of announcement represents.The log is supported after the security leak for occurring to influence a side, for regular key
It rolls or promptly cancels the bulletin being identified and recall.
Contract authorization and distribution framework (CADF) are used for decision, and decision needs are correctly awarded by that side to make a choice
Power.Platform collects the digital signature about commercial intention being formatted in certificate authority using AST derived from DAML.Due to
DAML may not be what authorized person created, it is therefore desirable to be provided on demand by the network node of founder.If requestor haves no right to look into
It sees contract or makes only to reply the hiding AST (being only enough to support the decision process of founder) in part, then it may refusal transmitting AST
To sign.
Platform hides the part AST using Merkel's abstract syntax tree (MAST).The some parts of AST are by its respective subtree
Merkel's Hash replacement, to create MAST.Any content of Merkel's Hash non-disclosre about hiding information.Merkel's Hash
Calculation allow based on complete AST or the digital signature of any MAST derived from it by the AST or its lead
The knowledge of any MAST out proves.Therefore, each side will retain them and have the right the incomplete mould checked or need to authorize
Type copy set content and.Their model storage is similar to polygon bookkeeping, but is standardized and through proper authorization.
Once being collected into enough authorizations, new agreement will be proven in DLT log.Voucher is underground and model content
Related any content, but it is compiled into fingerprint, which makes all participants that can prove that the voucher is for specific
Agreement.Working as all participants fully and is reliably defined by the polygonal models library that the voucher in DLT log filters
Preceding protocol suite.
The various network nodes for being connected to shared architecture can have different roles.If a node can be completed
Dry role.
One role is " account book writer ".It is account book write-in by evidence record to the network node only added in log
Device.Although technically It is not necessary to, it is likely to that the record for guaranteeing voucher is also occurred contradiction as few as possible, and
Therefore the agreement that it is recorded can be understood completely, and have complete record to this in its CADF.The role of account book writer
It can account book writer needs their combined authorization by several nodes sharings, therefore in desired scene.
Another role is " account book reader ".This is to represent that some agreements may be participated in or for each of supervisory authority
The network node of side.Account book reader will pay close attention to the notice of its service side in DLT log, and summarize agreement by its CADF
Partial database.
Another role is " auditor ".The purpose of auditor is to keep checking account book reader: proving association
View evolution is correct execution and authorization, and participant is notified, and does not record any conflicting agreement.With account book
Writer is similar, and auditor can have certain understanding to agreement, but in addition, it can also understand multi-party shared secret.Account book
Writer will be reviewed device label to the violation of agreement, and will handle except described shared architecture.Due to
The task of auditor is to execute the inspection algorithm for not needing artificially to judge or supervise, therefore auditor can be and calculate ring in safety
The autonomous execution algorithm run in border.Communication with security context can be encrypted, and it can be configured to, so that in addition to careful
Except any unsanctioned rule verification setting mark that core device is observed, safety collar may exit off without any other data
Border.
Under default situations, all each side of agreement require to authorize it.The agreement can replace previous agreement.
Agreement be usually " (eventful) of multiple affair " because it depend at least one external input or event, but this be not must
It needs.The grammer of agreement and explanation depend entirely on each side of agreement " closing account (off ledger) ".The account of exemplary embodiment
This records this pass account agreement, but is not intended to explain them.Under specific circumstances, if (it can cause to reach this agreement
Efficient protocal) be each side intention and each side it is respective authorization have legal status, then this agreement may meet given pipe
The requirement that contract legally can be performed in area under one's jurisdiction.Generally, account book is not relevant for whether given agreement legally can be performed, and
And exemplary embodiment does not distinguish general protocol and meets the agreement that contract standard legally can be performed.When needed, of the invention
Design is imagined: master contract can be used for giving legal identity of the DAML agreement as the contract in specific tube area under one's jurisdiction.
All codes discussed above, data structure etc. can store in non-transitory computer-readable storage media.
Functions described herein step can be completed by the computer code executed on a processor.Above-mentioned various data manipulations can
To be completed for the data structure stored, to create the transformed data knot handled in different ways by computer processor
Structure.The various functions of embodiment allow computing system to operate in a new way to complete to trade and provide new benefit.Various processes
Figure step can be completed by the software module executed on a computer processor.Each frame shown in figure can indicate data knot
Structure, such as store the database of record, manipulate these data structures in the manner described with allow computing system to data into
Row operates and converts data.
Although describing present inventive concept by the example about non-restrictive illustrative embodiment herein;But base
In introduction disclosed herein, other replacements, modifications and variations will be apparent for those of ordinary skill in the related art.
Therefore, the scope of the appended claims is intended to include all such substitutions of exemplary embodiment set forth herein, modification
With change and fall into the scope of the present disclosure and spirit in equivalent.
Claims (58)
1. a kind of method of the data structure of the distributed polygon bookkeeping of manipulation, comprising:
Receive the rule previously decided through consultation and standardized;
Receive authorization decision;
Based on the authorization decision and the rule, agreement evolution is executed;
The agreement after evolution is notified to the participant of agreement;And
By the agreement after evolution and voucher is notified to be stored in shared only additional account book.
2. according to the method described in claim 1, further include:
Detect conflicting agreement;And
Based on from the shared voucher for only adding account book, conflicting agreement is excluded.
3. according to the method described in claim 1, further include:
Part to agreement is provided by enough area protocol libraries for authorization to participant itself and record to participant
It sees clearly,
Wherein, the area protocol library of participant, which is remained, does not contradict with the record of other participants and visible in participant
It can verify that in range.
4. according to the method described in claim 1, further include:
The evolution of automatic audit authorization and agreement.
5. according to the method described in claim 1, wherein, the account book that only adds includes block chain.
6. according to the method described in claim 1, further include between multiple participants execute transaction workflow, it is described to execute packet
It includes:
It is interacted using the order inquiry responsibility separation CQRS mode with multiple modules with the account book that only adds,
Wherein, the module includes:
Account book writer, is configured as: the evidence record of transaction data collection will be indicated to the account by the writing module of CQRS
This;And
Account book reader, is configured as: detecting the voucher with matched notice token on the account book, and passes through CQRS's
Read module reads this matching voucher.
7. according to the method described in claim 6, wherein, indicating that the voucher of agreement includes: when indicating the record on the account book
Between timestamp.
8. according to the method described in claim 6, wherein, indicating that the voucher of agreement includes: the Merkel of the transaction data collection
Hash.
9. according to the method described in claim 8, wherein, the transaction data collection through Hash includes: corresponding polygon authorization business
It is intended to the proof of message and the proof of the Current protocol for the commercial intention message to be converted to transaction data collection.
10. according to the method described in claim 6, wherein, each of multiple distributed nodes include the different moulds of CQRS
Block.
11. according to the method described in claim 10, wherein, the reduction subset of the node includes the first write-in mould of CQRS
Block.
12. according to the method described in claim 6, wherein, the matched notice token is to read mould by the second of CQRS
Block detection.
13. according to the method described in claim 6, further include: the bulletin of mark is issued on the account book.
14. according to the method for claim 13, further includes: be directed to each participant and log writer pair, calculate unique
Shared secret.
15. according to the method for claim 14, wherein the matched notice token can identify by participant, and right
Other each side secrecy.
16. according to the method described in claim 6, wherein, Current protocol is stored as abstract syntax tree by the transaction data collection
AST。
17. according to the method for claim 16, wherein the transaction data collection is updated using Merkel's Hash, to be formed
Merkel's abstract syntax tree MAST.
18. according to the method described in claim 1, further include: audit is executed, with identification protocol from the first transaction data collection to
The evolution of two transaction data collection is proper authorization and correctly executes, and proves to be notified of to all participants related to them
Variation.
19. according to the method for claim 17, wherein audit also confirms not to participant's notice and their incoherent changes
Change.
20. a kind of system for distributed polygon bookkeeping, comprising:
Commercial intention unit, is configured as: receiving the rule previously decided through consultation and standardized;
Selecting unit is configured as: receiving authorization decision from the commercial intention unit;
Processing unit is configured as: executing agreement evolution based on the authorization decision and the rule;
Notification unit is configured as: the participant of Xiang Xieyi notifies the agreement after evolution;And
Account book is only added, is configured as: agreement and notice voucher after storage evolution.
21. system according to claim 20, further includes: audit unit is configured as detecting conflicting agreement.
22. system according to claim 21, wherein based on from the shared voucher for only adding account book, exclude detection
The conflicting agreement arrived.
23. system according to claim 21, wherein the audit unit supports drilling for automatic audit authorization and agreement
Into.
24. system according to claim 20, wherein the account book that only adds is supported:
Part to agreement is provided by enough area protocol libraries for authorization to participant itself and record to participant
It sees clearly,
Wherein, the area protocol library of participant, which is remained, does not contradict with the record of other participants and visible in participant
It can verify that in range.
25. system according to claim 20, wherein the account book that only adds includes block chain.
26. system according to claim 20, further includes:
Order inquiry responsibility separates CQRS mode, has multiple modules and supports to interact with the account book that only adds;
Account book writer, is configured as: the evidence record of transaction data collection will be indicated to the account by the writing module of CQRS
This;And
Account book reader, is configured as: detecting the voucher with matched notice token on the account book, and passes through CQRS's
Read module reads this matching voucher.
27. system according to claim 26, wherein the voucher for indicating agreement includes: the record on the instruction account book
The timestamp of time.
28. system according to claim 26, wherein the voucher for indicating agreement includes: the Merck of the transaction data collection
That Hash.
29. system according to claim 28, wherein the transaction data collection through Hash includes: corresponding polygon authorization quotient
Industry is intended to the proof of message and the proof of the Current protocol for the commercial intention message to be converted to transaction data collection.
30. system according to claim 26, wherein each of multiple distributed nodes include the different moulds of CQRS
Block.
31. system according to claim 30, wherein the reduction subset of the node includes the first write-in mould of CQRS
Block.
32. system according to claim 26, wherein each node is configured as what the maintenance on the account book received
The bulletin of mark.
33. system according to claim 32, wherein each node can calculate and the participant of the node and any
The corresponding unique shared secret of log writer.
34. system according to claim 26, wherein the matched notice token can identify by participant, but right
Other each side secrecy.
35. system according to claim 26, wherein the matched notice token is to read mould by the second of CQRS
Block detection.
36. system according to claim 26, wherein Current protocol is stored as abstract syntax tree by the transaction data collection
AST。
37. system according to claim 36, wherein the transaction data collection is updated using Merkel's Hash, to be formed
Merkel's abstract syntax tree MAST.
38. system according to claim 26, further includes: auditor is configured as identification protocol from the first transaction data
The evolution for collecting the second transaction data collection is proper authorization and correctly executes, and prove to be notified of to all participants and he
Relevant variation.
39. the system according to claim 38, wherein the auditor also confirms not to participant's notice and their not phases
The variation of pass.
40. a kind of program storage device, visibly embody computer it is executable for manipulating in distributed polygon bookkeeping
The program step of data structure, described program step include:
Receive the rule previously decided through consultation and standardized;
Receive authorization decision;
Based on the authorization decision and the rule, evolution agreement is executed;
The agreement after evolution is notified to the participant of agreement;And
By the agreement after evolution and voucher is notified to be stored in shared only additional account book.
41. equipment according to claim 40, the step further include:
Detect conflicting agreement;And
Based on from the shared voucher for only adding account book, conflicting agreement is excluded.
42. equipment according to claim 40, the step further include:
Part to agreement is provided by enough area protocol libraries for authorization to participant itself and record to participant
It sees clearly,
Wherein, the area protocol library of participant, which is remained, does not contradict with the record of other participants and visible in participant
It can verify that in range.
43. equipment according to claim 40, the step further include:
The evolution of automatic audit authorization and agreement.
44. equipment according to claim 40, wherein the account book that only adds includes block chain.
45. equipment according to claim 40, the step further includes that transaction workflow is executed between multiple participants,
The execution includes:
It is interacted using the order inquiry responsibility separation CQRS mode with multiple modules with the account book that only adds,
Wherein, the module includes:
Account book writer, is configured as: the evidence record of transaction data collection will be indicated to institute by the first writing module of CQRS
State account book;And
Account book reader, is configured as: detecting the voucher with matched notice token on the account book, and passes through CQRS's
First read module reads this matching voucher.
46. equipment according to claim 45, wherein the voucher for indicating agreement includes: the record on the instruction account book
The timestamp of time.
47. equipment according to claim 45, wherein the voucher for indicating agreement includes: the Merck of the transaction data collection
That Hash.
48. equipment according to claim 47, wherein the transaction data collection through Hash includes: corresponding polygon authorization quotient
Industry is intended to the proof of message and the proof of the Current protocol for the commercial intention message to be converted to transaction data collection.
49. equipment according to claim 45, wherein each of multiple distributed nodes include the different moulds of CQRS
Block.
50. equipment according to claim 49, wherein the reduction subset of the node includes the first write-in mould of CQRS
Block.
51. equipment according to claim 45, wherein the matched notice token is to read mould by the second of CQRS
Block detection.
52. equipment according to claim 45, the step further include: issuing the bulletin of mark on the account book.
53. equipment according to claim 52, the step further include: it is directed to each participant and log writer pair,
Calculate unique shared secret.
54. equipment according to claim 53, wherein the matched notice token can identify by participant, but right
Other each side secrecy.
55. equipment according to claim 45, wherein Current protocol is stored as abstract syntax tree by the transaction data collection
AST。
56. equipment according to claim 55, wherein the transaction data collection is updated using Merkel's Hash, to be formed
Merkel's abstract syntax tree MAST.
57. equipment according to claim 40, the step further include: execute audit, traded with identification protocol from first
The evolution of data set to the second transaction data collection is proper authorization and correctly executes, and proves to be notified of to all participants
Variation relevant to them.
58. equipment according to claim 57, wherein audit also confirms not to participant's notice and their incoherent changes
Change.
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
PCT/US2016/042322 WO2018013124A1 (en) | 2016-07-14 | 2016-07-14 | Digital asset platform |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110192212A true CN110192212A (en) | 2019-08-30 |
CN110192212B CN110192212B (en) | 2024-06-04 |
Family
ID=60953207
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201680087670.9A Active CN110192212B (en) | 2016-07-14 | 2016-07-14 | Digital asset platform |
Country Status (3)
Country | Link |
---|---|
EP (1) | EP3472779A4 (en) |
CN (1) | CN110192212B (en) |
WO (1) | WO2018013124A1 (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117237124A (en) * | 2023-11-15 | 2023-12-15 | 国网浙江省电力有限公司 | Digital asset management method and device based on multi-terminal interaction |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106980649B (en) | 2017-02-28 | 2020-07-10 | 创新先进技术有限公司 | Method and device for writing block chain service data and service subset determining method |
WO2019028068A1 (en) | 2017-08-01 | 2019-02-07 | Digital Asset (Switzerland) GmbH | Method and apparatus for automated committed settlement of digital assets |
US20200065802A1 (en) * | 2018-08-27 | 2020-02-27 | Digital Asset (Switzerland) GmbH | Eligibility of a digital asset for a transaction |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100110935A1 (en) * | 2006-01-24 | 2010-05-06 | Brown University | Efficient Content Authentication In Peer-To-Peer Networks |
CN102057617A (en) * | 2008-06-06 | 2011-05-11 | 艾利森电话股份有限公司 | Cryptographic key generation |
US20150379510A1 (en) * | 2012-07-10 | 2015-12-31 | Stanley Benjamin Smith | Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain. |
CN105488665A (en) * | 2015-11-25 | 2016-04-13 | 布比(北京)网络技术有限公司 | Decentralized transaction method |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20140279540A1 (en) * | 2013-03-15 | 2014-09-18 | Fulcrum Ip Corporation | Systems and methods for a private sector monetary authority |
-
2016
- 2016-07-14 WO PCT/US2016/042322 patent/WO2018013124A1/en active Search and Examination
- 2016-07-14 CN CN201680087670.9A patent/CN110192212B/en active Active
- 2016-07-14 EP EP16909020.6A patent/EP3472779A4/en not_active Ceased
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100110935A1 (en) * | 2006-01-24 | 2010-05-06 | Brown University | Efficient Content Authentication In Peer-To-Peer Networks |
CN102057617A (en) * | 2008-06-06 | 2011-05-11 | 艾利森电话股份有限公司 | Cryptographic key generation |
US20150379510A1 (en) * | 2012-07-10 | 2015-12-31 | Stanley Benjamin Smith | Method and system to use a block chain infrastructure and Smart Contracts to monetize data transactions involving changes to data included into a data supply chain. |
CN105488665A (en) * | 2015-11-25 | 2016-04-13 | 布比(北京)网络技术有限公司 | Decentralized transaction method |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN117237124A (en) * | 2023-11-15 | 2023-12-15 | 国网浙江省电力有限公司 | Digital asset management method and device based on multi-terminal interaction |
CN117237124B (en) * | 2023-11-15 | 2024-02-02 | 国网浙江省电力有限公司 | Digital asset management method and device based on multi-terminal interaction |
Also Published As
Publication number | Publication date |
---|---|
CN110192212B (en) | 2024-06-04 |
EP3472779A4 (en) | 2020-01-08 |
WO2018013124A1 (en) | 2018-01-18 |
EP3472779A1 (en) | 2019-04-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN108269351B (en) | A kind of digital ticket information processing method and system | |
US20180018738A1 (en) | Digital asset platform | |
CN108830602A (en) | A kind of license chain construction and management-control method based on chameleon hash function | |
CN110192212A (en) | Digital asset platform | |
CN111598574A (en) | Intelligent service transaction oriented supervision method and supervision interface | |
CN111369730B (en) | Voting processing method and device based on block chain | |
US20200058163A1 (en) | System and Method for Mapping a Virtual Building Model | |
Kebande et al. | Mapping digital forensic application requirement specification to an international standard | |
Sater | Blockchain and the european union's general data protection regulation: A chance to harmonize international data flows | |
Jiang et al. | Decentralized finance (DeFi): A survey | |
CN110472979A (en) | The verification method of transaction Subjective and Objective based on block chain | |
SADU | Auditing blockchain. | |
de Vilaca Burgos et al. | Distributed ledger technical research in Central Bank of Brazil | |
CN109690550A (en) | Digital asset framework | |
Grönlund | Using ICT to combat corruption | |
Jothi et al. | A Comprehensive Survey on Blockchain and Cryptocurrency Technologies: Approaches, Challenges, and Opportunities | |
Whitley | Trusted digital identity provision: GOV. UK Verify’s federated approach | |
Mott et al. | Facing the future of respiratory virus surveillance:“The mosaic surveillance framework” | |
CN112150299B (en) | Annuity data processing method, annuity data processing device, medium and electronic equipment | |
Rani et al. | Blockchain in capital markets: applications, possibilities and challenges | |
CN107835174A (en) | A kind of anti-fake system of account book based on Internet of Things and method | |
Kamau et al. | CryptoAudit: Nature, requirements and challenges of Blockchain transactions audit | |
Hu | [Retracted] Application Analysis of Block Technology Based on Block Chain Computer Model in the False Identification of the Catalog List of the Financial Department of Multinational Companies | |
Deshapriya et al. | Framework for data management in public service delivery applications in Sri Lanka using blockchain technology | |
CN114175599A (en) | Alarm problem management for building management environments |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20210326 Address after: Zurich Applicant after: Digital assets (Switzerland) Co.,Ltd. Address before: New York, USA Applicant before: DIGITAL ASSET HOLDINGS |
|
GR01 | Patent grant | ||
GR01 | Patent grant |