Digital asset hosting method and system

A technology of digital assets and assets, which is applied in the field of digital asset custody methods and systems, can solve problems such as major security risks and network attacks, and achieve the effects of avoiding security risks, enhancing security, and avoiding network attacks

Pending Publication Date: 2020-05-12
杜晓楠
View PDF4 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide a digital asset custody method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital asset hosting method and system
  • Digital asset hosting method and system
  • Digital asset hosting method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] In order to make the objectives, technical solutions, and advantages of the present invention clearer, the following further describes the present invention in detail with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, but not to limit the present invention.

[0036] figure 1 It is a schematic diagram of the method flow of the first embodiment of the digital asset custody method of the present invention. Such as figure 1 As shown, in step S1, an asset custody system is constructed. Figure 4 It shows the principle block diagram of the asset custody system according to the present invention. Such as Figure 4 As shown, the asset custody system of the present invention includes a financial management server 100 communicating with an external network, a management server 300 communicating with the financial management server 100 via a first communicati...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a digital asset trusteeship method. The method comprises a step of constructing an asset trusteeship system, a key application step and a signature step. The invention also relates to a digital asset hosting system. The asset trusteeship system comprises a financial management server communicating with an external network, a management server communicating with the financial management server through a first communication channel, a secret key server communicating with the management server through a second communication channel, and an offline encryption machine communicating with the secret key server through a third communication channel. According to the digital asset trusteeship method and system, the private key is stored in the offline encryption machine, and the signature is also carried out in the offline encryption machine, so that the security of the key is ensured, and the defects of network attacks, relatively large potential safety hazards and information leakage risks are avoided through multi-layer network isolation.

Description

Technical field [0001] The invention relates to the field of asset custody, and more specifically, to a digital asset custody method and system. Background technique [0002] Digital assets are non-monetary assets that are owned or controlled by enterprises or individuals, exist in the form of electronic data, and are held in daily activities for sale or in the production process. For example, computerized device software, firmware, executable instructions, digital certificates (such as public key certificates), cryptographic keys, Bitcoin, etc. These digital assets are usually stored in some digital asset custody platforms. [0003] Since digital assets usually have high value, many hackers use various technical means to attack the digital asset custody platform to steal the digital assets. However, the digital asset custody platform in the prior art is susceptible to network attacks, and has greater security risks and information leakage risks. Summary of the invention [0004]...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/38G06Q20/06G06Q40/04H04L9/32H04L29/06
CPCG06Q20/382G06Q20/3825G06Q20/3829G06Q20/065G06Q40/04H04L63/02H04L63/0428H04L9/3247
Inventor 杜晓楠
Owner 杜晓楠
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products