The content of the invention
(1) technical problem
However, the management of centralization data file has significant limitation with the framework of transaction platform, for example:
1st, exploitation and construction cost are huge, and the construction cycle is long;
2nd, the quality of data and Information Security are difficult to ensure that;
3rd, huge manpower and materials are needed to carry out system maintenance;
4th, the information announcing and based on username and password, it is impossible to certification and confirm the verity of data access person;
5th, it cannot be guaranteed that data access person is the participant that really concludes the business.
(2) technical scheme
The invention provides a kind of method security product being traded based on block chain security node, in the methodSpecifically include:
Step one, based on block chain technology, set up the first data-storage system of distributed frame, in the data storageAsset securitization document is built in system, first data-storage system includes multiple storage lists based on block chain formationUnit, receives asset securitization document data and in units of the time by the asset securitization document data ordered storage for receivingIn the storage element, unique cryptographic Hash is given according to putting in order to whole storage elements, described in oneBy a chain a complete asset securitization document data is presented in storage element;
Step 2, based on block chain technology, set up the second data-storage system of distributed frame, in the second data storageSecurities trading is carried out recording, stored in system, within the unit interval, monitor in real time is carried out to newly-increased security product, describedIncrease security product in second data-storage system newly, the card is pointed to by the server construction one of second data-storage systemPrivately owned chain whole transaction records for the complete newly-increased security of record being started from distribution in the privately owned chain in the local of certificate;
Step 3, based on block chain technology, set up public account book, and the first data-storage system and the second data depositedEach network node in storage system sets up communication port with public account book, obtains transaction activity information by each network node,Securities trading is carried out confirming by each network node, and by the transaction record in the public account book.
Be preferably based on aforesaid operations step, present invention additionally comprises have step 4, in first data-storage systemAn independent Data Access Security region is created, the access to the Data Access Security region carries out monitor in real time, when appointingWhat is the network node provided when one network node of meaning conducts interviews to the Data Access Security region of a certain feature is closeKey is checked, when include in the key of verification be accessed for the Data Access Security region in the Transaction Information that storesEach side provide signature after, the access passes through.
(3) beneficial effect
In the present invention, distributed data base technique is based on distributed data base principle, is deposited using the data of distributed frameStorage, data transfer.Distributed data base technique causes each participant in network have a complete data base standbyPart, whole " distributed account book " is transparent disclosed, realizes the whole network information sharing, information security storage.Handed over using decentrationEasily record, i.e., in block chain, all data, document, and the record that purchase, the transaction record changed hands will be complete is in blockIn chain, it is not necessary to centre management, by block chain self adaptation, complete certainly.Untrusted network is based on the basis of block chain, list is completedFirst, the maintenance and management of correct transaction record.Which is done using reliability, and level of security is very high, is stored in block chainInformation also have can not tamper.
Specific embodiment
With reference to the accompanying drawings and examples embodiments of the present invention are described in further detail.Following examples are used forThe present invention is illustrated, but can not be used for limiting the scope of the present invention.
In describing the invention, unless otherwise stated, " multiple " are meant that two or more;Term " on ",The orientation or position relationship of the instruction such as D score, "left", "right", " interior ", " outward ", " front end ", " rear end ", " head ", " afterbody " isBased on orientation shown in the drawings or position relationship, it is for only for ease of the description present invention and simplifies description, rather than indicate or darkShow that the device or element of indication there must be specific orientation, with specific azimuth configuration and operation therefore it is not intended that rightThe restriction of the present invention.Additionally, term " first ", " second ", " the 3rd " etc. be only used for describe purpose, and it is not intended that indicate orHint relative importance.
In describing the invention, it should be noted that unless otherwise clearly defined and limited, term " being connected ", " companyConnect " should be interpreted broadly, for example, it may be being fixedly connected, or being detachably connected, or it is integrally connected;It can be machineTool connects, or electrically connects;Can be joined directly together, it is also possible to be indirectly connected to by intermediary.For this areaFor those of ordinary skill, above-mentioned term concrete meaning in the present invention can be understood with concrete condition.
Fig. 1 to Fig. 3 is refer to, wherein, Fig. 1 is the block chart of the first data-storage system in the embodiment of the present invention;Fig. 2 isThe block chart of the second data-storage system in the embodiment of the present invention;Fig. 3 is each ring in block chain network in the embodiment of the present inventionThe connection diagram of section.
The present invention basic goal be:The securities trading of decentration is realized, each in network participates in node canPossess a complete DB Backup, what the data base (block chain) was complete have recorded security starts in a network from distributionPer transaction information, and all nodes are all likely to become " the book keeping operation person " of next block.
The present invention specifically includes two parts, and which is respectively block chain part and transaction platform part.Wherein, block chain portionDividing includes:Asset securitization document block chain and asset securitization transaction block chain;Transaction platform part includes:DecentrationLocal stock exchange platform and decentration big data and Complicated Files transaction platform.
Under the support of block chain technology, the data-storage system of distributed frame is set up.According to different storage (filesUpload) time, data (file etc.) are stored in different blocks, each block can be presented by a chain one it is completeWhole data.
Under the support of block chain technology, the data-storage system of distributed frame is set up.Different time sections (as per partlyIndividual hour) in securities trading record be stored in different blocks, each block can be presented by a chain one it is completeWhole data.For the security product of each new issue, the stock exchange platform of the decentration will all build a sensingPrivately owned chain (block chain) in the local of the security, this block chain by it is complete record the security from distribution start in a network it is everyTransaction is recorded.
Wherein, Hash:The cryptographic Hash of each block is represented, to the uniqueness for identifying each block;Per Hash:RepresentThe cryptographic Hash of previous block.
Publisher (passing through Web publisher security on transaction platform) as security product, represents whole transaction platform and gathers aroundThere is first block.Additionally, the transaction record of first investor (subscribing) forms second block.Hereafter in secondary marketIn security transfer (dealing), the transaction record of section will be packaged in a new transaction block at regular intervals.
In step 3, a Data Access Security region being controlled is created, in the Data Access Security regionThe Transaction Information of a feature is stored, the Transaction Information is to having multiple participants, i.e. investor's location network node, lawyerOffice's location network node, accounting firm's location network node, bank network node, CBRS network node etc., it is rightMultiple network nodes corresponding to the Data Access Security region of one feature give signature function, need when the region is accessedThe key of a multi-signature is used, the key has time restriction and is used only once.The signature is by same data safetyThe network node that whole corresponding to access region has signature function carries out signature authentication.
Management to above-mentioned key, it is not necessary to individually set up centralized system, by block chain network self adaptation, from completeInto.The wherein property of key, needs multi-signature to complete the decryption of key comprising one section of key information such as Bitcoin.WhenThe key is concluded the business and after use, such as restrictions (Double Spending) of the Bitcoin to Flos Lonicerae, the control of key willGive back initiator, it is impossible to be continuing with a network.
When initiator needs some specific users to access DMC Zone, it will initiate a transaction, make closeKey circulates in coming back to network.
Beneficial effects of the present invention are as follows:
Decentration transaction record
In block chain, all data, document, and the record that purchase, the transaction record changed hands will be complete is in blockIn chain, it is not necessary to centre management, by block chain self adaptation, complete certainly.Untrusted network is based on the basis of block chain, list is completedFirst, the maintenance and management of correct transaction record.
Intelligent credit accreditation
Based on complete data access and transaction record, using the credit distributed model in statistical significance, there is provided to DMCThe intelligent credit accreditation of Zone, the identity and credit accreditation of intelligent management data access person.For example to the true access data of userWith the record of transaction, it can be determined that user or the real purchase intention of node and transaction purpose;Or according to historical trading feelingsCondition, credit grade for judging user that can be intelligent etc..
Sequencing is concluded the business and intelligent contract
Trading rules are determined by sequencing, it is to avoid manual intervention.Intelligent contract can guarantee that the fairness and the transparency of transaction.
The core technology of the present invention is as follows with innovative point:
Improved distributed data base technique.
Improved distributed data base technique be based on distributed data base principle, using the data storage of distributed frame,Data transfer.Distributed data base technique causes each participant in network have a complete DB Backup,Entirely " distributed account book " is transparent disclosed, realizes the whole network information sharing, information security storage.
The issue of improved distributed data base and the technology of subscription.
Distributed data base is issued and is capable of achieving the data syn-chronization (renewal) in whole network data storehouse with the technology of subscription, participates in eachThe Backup Data that person possesses is always consistent.
Improved time server technology
Time server technology is the high-tech product for being calibrated and researching and developing for computer, automation equipment etc..WhenBetween server (e.g., the time signal of standard is transferred in automated system the equipment for needing temporal information by various interfacesSequence of events recording device), can thus reach the time synchronized of whole system.
Based on time server technology, when there is new record in distributed data base (block catenary system), (transaction/upload is literaryShelves) when producing, the whole network confirms that the timestamp of new record is all equal so that the information of newly-increased record (block) is more accurate.
Proof of work technology (calculates power competition mechanism)
Proof of work mechanism can perfectly realize the pseudo-randomness of " accounting nodes ".Only the calculation power of certain node is more than netEnough work has been carried out () during the calculation power of other any one nodes in network, if the node has been only possible to create new blockLanguage is weighed.Can more preferable safeguards system safety by calculating power competition mechanism.In improved proof of work, carry using userThe trading margin of front payment is used as calculating a kind of bright mode of strong evidence, improves penalty cost.
Cryptological technique (the Hash innovatory algorithm based on SHA256)
SHA256 has certain computational complexity, can truly realize that " book keeping operation " pattern of pseudo-randomness (is goneTrust), and on the basis of this algorithm by proof of work mechanism creating and improve block chain (storage block chain or trading postBlock chain).It is to realize following two functions using hash algorithm:
1) obtain block cryptographic Hash
Based on existing SHA256 algorithms, the initial stage is set up in each new block, by finding the word for fixing a lengthSymbol string x so that:
SHA256 (SHA256 (L, x))<=Target
Meet the hash random number of the referred to as newly-increased blocks of x of this condition, (SHA256 (L, x)) is new corresponding SHA256Increase the cryptographic Hash of block.
Target is a given desired value, and the value size of Target will determine the complexity of computing.
L is some build-in attributes of current block, such as the character string of the composition such as storage capacity, timestamp, trading volume.
2) confirmation of " accounting nodes "
The node for having the right to create new block is confirmed based on proof of work mechanism.Online all nodes can pass through simultaneouslyCalculate to find satisfaction:
SHA256 (SHA256 (L, x))<=Target
Regular length character string x, that node for finding the x at first is defined as the founder of new block, and willCorresponding SHA256 (cryptographic Hash of the SHA256 (L, x)) as newly-increased block.
Cipher key technique
Based on cipher key technique, each node in decentration transaction system is made to have an one's own account groundLocation, the address are made up of 34 English alphabets, for receiving or sending " data ".Additionally, each account address will possess oneThe private key of individual 64 related to the account character produced based on cipher key technique, (e.g., can be handed over come confirmation with the private keyEasily, data etc.).
Multi-signature technology
In traditional trade mode, each corresponding private key of account address only one of which.And multi-signature technology can be withMake each account address there are three associated private keys, need two of which just complete a transaction.Multi-signature technology is carriedA kind of " trustship " mechanism that voluntarily can be participated in has been supplied, the safety of transaction has more been ensure that.
Intelligent contract technology
Intelligent contract is the computer program for referring to perform automatically agreement terms.In essence, these automatic contractsOperation principle similar to the If-Then sentences in other computer programs.
Intelligent contract is built in into transaction (this project refers to securities trading) payment system, both parties are in transaction by assets(including but not limited to digital asset) is sent to " a neutral account " controlled by intelligent contract, when a bar finished in advanceWhen part is triggered, intelligent contract performs corresponding contract terms, realizes the automatic transfer of assets.Intelligent contract can make transaction(clearing, process) cross process automation and it is non-mystify, particularly, intelligent contract technology is built in into the transaction system of decentrationSystem, can make transaction more " honesty ", and save the time and money of dealer in a large number.
Honest node working mechanism
From the hash value algorithms of block it is recognised that rational block is not unique, therefore main chain mayThere is the situation of bifurcated (Fork).When running into bifurcated, network can elect one according to following principle (honest node working mechanism)Bar " best chain "
1) branch of different length, always receives that branch most grown.
2) branch of equal length, receives that maximum branch of difficulty.
3) length is identical and difficulty is consistent, receives the time earliest.
If 4) all sames, wait block chain length to increase 1 according to the order received from network, then reselect" best chain ".
According to the node of this rule running, referred to as honest node (Honest Nodes).
Node can also be dishonest with honesty, but based on honest node working mechanism, for wanting and the whole network branchFor the dishonest node of game, their final result is always helpless:(this point is clever at middle and can only to add trunk《Bit coin white paper》In existing detailed proof), honest node working mechanism ensure that the stability of distributed accounting system.
This project provides a kind of decentration, distributed big data and complex documents using the technology of class block chainRwan management solution RWAN.A decentration, distribution type file safety management system are built on this basis.Make big data,The way to manage decentration of document, it is safe and reliable, and to data, the access and transaction of document provide necessary support.HereOn basis, further due to the document block elements required for asset securitization product trading, a decentration is built,The stock exchange platform of point-to-point transaction is capable of achieving, so that support is provided to asset securitization transaction.Objectives are as follows:
The first step is:The decentration of a big data based on block chain technology and complex documents is set up, it is distributedManagement service platform.
Second step is:On this management service platform base, prolonged with reference to the Internet asset securitization service platformStretch, using block chain technology, make one efficiently, safety, the asset securitization trading service platform of effective decentration.
Other additional technical features of the present invention have:
In terms of Data Access Security, based on the data access of multiple authentication, the data access for substituting user name password canLean on, safety, data access can be controlled.
In terms of distributed key management, without the need for centralization cipher key system, basis is reduced using block chain adaptive managementFacility puts into.
In terms of distributed transaction record management, the trade managing system that need not set up centralization reduces infrastructure throwingEnter.
In terms of intelligent contract with sequencing transaction, transaction cost is reduced, makes transaction transparent, sequencing.Reduce transaction windDanger.
In terms of intelligent credit accreditation, the credit accreditation based on transaction record and credit statistical model reduces credit risk.
Embodiments of the invention in order to example and description for the sake of and be given, and be not exhaustively or by thisIt is bright to be limited to disclosed form.Many modifications and variations are obvious for the ordinary skill in the art.ChoosingIt is, for the principle and practical application that more preferably illustrate the present invention, and to make one of ordinary skill in the art to select and describe embodimentIt will be appreciated that the present invention is so as to designing the various embodiments with various modifications for being suitable to special-purpose.