Digital asset security hosting system and method

A digital asset and security technology, applied in digital data protection, computer security devices, electronic digital data processing, etc., can solve problems such as major security risks and network attacks, and achieve the effect of avoiding network attacks

Active Publication Date: 2020-05-19
杜晓楠
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The technical problem to be solved by the present invention is to provide a digital asset safe custody system and method, which can be safely and efficiently The key is protected to ensure the security of digital assets

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Digital asset security hosting system and method
  • Digital asset security hosting system and method
  • Digital asset security hosting system and method

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] In order to make the object, technical solution and advantages of the present invention clearer, the present invention will be further described in detail below in conjunction with the accompanying drawings and embodiments. It should be understood that the specific embodiments described here are only used to explain the present invention, not to limit the present invention.

[0030] figure 1 It is a functional block diagram of a preferred embodiment of the digital asset security custody system of the present invention. Such as figure 1 As shown, the asset custody system of the present invention includes a financial management server 100 communicating with the external network, a management server 300 communicating with the financial management server 100 through a first communication channel 200, and communicating with the financial management server 100 through a second communication channel 400. The management server 300 communicates with the key server 500 , the fi...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a digital asset security hosting system. The asset trusteeship system comprises: a financial management server communicating with an external network; a management server which is communicated with the financial management server through a first communication channel; a secret key server which is communicated with the management server through a second communication channel; and a first encryption machine and at least two second encryption machines which are communicated with the secret key server through a third communication channel. The first encryption machine andthe second offline encryption machines communicate through a fourth communication channel, and the first encryption machine and the second encryption machines are located in different machine rooms. The invention also relates to a digital asset security hosting method. According to the invention, the private key is stored in different encryptors, and the signature is also carried out in differentencryptors, so that the private key cannot be leaked even if part of the encryptors are broken through, and the defects of network attack, relatively large potential safety hazard and information leakage risk are avoided through multi-layer network isolation.

Description

technical field [0001] The invention relates to the field of asset custody, and more specifically, to a unified method for safe custody of digital assets. Background technique [0002] Digital assets refer to non-monetary assets owned or controlled by enterprises or individuals that exist in the form of electronic data and are held in daily activities for sale or in the process of production. Examples are computerized device software, firmware, executable instructions, digital certificates (eg, public key certificates), cryptographic keys, bitcoins, and the like. These digital assets are usually stored in some digital asset custody platforms. [0003] Since digital assets usually have high value, many hackers use various technical means to attack digital asset custody platforms, thereby stealing digital assets. However, the digital asset custody platform in the existing technology is vulnerable to network attacks, and there are relatively large security risks and informati...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06Q20/38G06F21/60
CPCG06Q20/382G06Q20/3829G06Q20/3825G06F21/602
Inventor 杜晓楠
Owner 杜晓楠
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products