CN108564369A - A kind of decentralization moneytary operations method based on region chain - Google Patents
A kind of decentralization moneytary operations method based on region chain Download PDFInfo
- Publication number
- CN108564369A CN108564369A CN201810348378.9A CN201810348378A CN108564369A CN 108564369 A CN108564369 A CN 108564369A CN 201810348378 A CN201810348378 A CN 201810348378A CN 108564369 A CN108564369 A CN 108564369A
- Authority
- CN
- China
- Prior art keywords
- fund
- zeyu
- key
- xinyu
- account
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Abstract
The decentralization moneytary operations method based on region chain that the invention discloses a kind of, belongs to region chain technical field.It includes the following steps:S1. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, and associated two pairs of keys are generated respectively;S2. after fund outflow side Zeyu receives the correct keys of Xinyu, fund is produced to region chain authentication account, while generating key pair;Fund from Zeyu in the chain authentication account of region is transferred in the fund account of fund by S3.Xinyu, and generates key pair;S4. whether chain authentication in region is legal according to new key authentication, is updated to both sides' fund account if legal, if not conforming to rule restores initial capital data.The present invention be a kind of distributed account management, transaction be more prone to carry out, the more safe and reliable decentralization moneytary operations method based on region chain of account.
Description
Technical field
The invention mainly relates to region chain technical fields, refer in particular to a kind of decentralization moneytary operations side based on region chain
Method.
Background technology
Moneytary operations method is passed through bank and is carried out in the prior art, and this trade mode can not only increase the center of bank
Change function, it is busy that database is easy to cause when merchandising busy;What is more important, this trade mode place one's entire reliance upon bank's number
According to the safety in library, it is subject to the attack of hacker, the fund account safety of client is caused to reduce.Therefore, design one kind is disobeyed
The moneytary operations in bank, the moneytary operations method of more safety transparent is relied to have a very important significance.
Invention content
The technical issues of present invention need to solve be:For technical problem of the existing technology, the present invention provides a kind of point
Cloth account management, transaction are more prone to progress, the more safe and reliable decentralization moneytary operations based on region chain of account
Method.
To solve the above-mentioned problems, solution proposed by the present invention is:A kind of decentralization currency based on region chain
Method of commerce includes transaction funds outflow side Zeyu, transaction funds inflow side Xinyu and region chain authentication, it is characterised in that
Include the following steps:
S1. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, and associated two pairs are generated respectively
Key;
S2. after fund outflow side Zeyu receives the correct keys of Xinyu, fund is produced to region chain authentication account, together
Shi Shengcheng key pairs;
Fund from Zeyu in the chain authentication account of region is transferred in the fund account of fund by S3.Xinyu, and raw
At key pair;
S4. whether chain authentication in region is legal according to new key authentication, is updated to both sides' fund account if legal,
If not conforming to rule restores initial capital data.
The step S1 includes:
S1a. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, Zeyu according to systematic parameter and
Current network IP generates a pair of of initial key (SK-Z, SK-X), and key SK-Z is sent to region chain authentication, while will be close
Key SK-X is sent to Xinyu;
S1b. after fund inflow side Xinyu receives key SK-X, the network IP according to key SK-X and where itself
A pair of complementary key pair (SK-X, SK-X-Z) is generated by system, and key SK-X is sent to region chain authentication, simultaneously will
Key SK-X-Z is sent to fund outflow side Zeyu;
The step S2 includes:
S2a. after fund outflow side Zeyu receives SK-X-Z, a pair of secret keys (SK-X- is generated according to key SK-X-Z again
Z, SK-Z-X), and fund account is produced temporarily to region chain authentication;And SK-X-Z and SK-Z-X are sent respectively to simultaneously
Region chain authentication and transaction funds inflow side Xinyu;
S2b. chain authentication in region judges whether the fund of Zeyu produces operation according to secret key SK-Z and SK-X matching degrees
Effectively, if effectively and if lock the account enter next step, otherwise Zeyu fund accounts are constant;
S2c. after chain authentication in region receives the temporary fund of Zeyu, message is produced to Web Publishing fund, is waited for
Xinyu receives fund;
The step S3 includes:
S3a. after fund inflow side Xinyu is by the message of Web Publishing, the fund that region chain authentication is received is interim
It is transferred on the fund account of oneself, and a pair of new secret key pair (SK-Z-X-X, SK-Z-X-Z) is generated according to secret key SK-Z-X,
And it is sent respectively to fund verification method and fund outflow side Zeyu;
S3b. chain authentication in region judges that the fund of Xinyu is transferred to according to the matching degree of secret key SK-X-Z and SK-Z-X-X
Whether operation is effective, if the account is effectively lockked, and the message for the fund of being transferred to has been received in publication on network, under
One step;Otherwise area validation method account and fund inflow side Xinyu accounts are constant;
The step S4 includes:
S4a.Zeyu judges whether transaction is correct according to the matching degree of SK-Z-X-Z and SK-X-Z;It is sent if mistake
Pseudo- key LastSK_W gives region chain authentication, and key occurs again if correct LastSK_R to area validation side;
S4b. area validation side receives the LastSK_R or LastSK_W of Zeyu and judges whether entire transaction succeeds, if
Unsuccessful recovery primary account;If being successfully updated Zeyu and Xinyu accounts;No matter entirely transaction success or not is to two accounts
Family unlocks.
State initial key to SK-Z and SK-X should all include transaction amount character string, network IP character strings where Zeyu and
The Consulting Trade System amount of money exact date of Zeyu and Xinyu, and generated using cryptographic algorithm;
Key SK-the X-Z includes at least two time parameters, i.e., the described Consulting Trade System amount of money exact date and hand for the first time
The exact date of section secret key SK-X;
Time parameter is the time parameter that fund outflow side Zeyu receives SK-X-Z for the first time in the SK-Z-X, is no longer wrapped
Include Consulting Trade System amount of money exact date;
The region chain authentication is the network node for arbitrarily having on internet server capability, some described network section
In any one transactional operation equal synchronized copy to region chain of point on all nodes.
Compared with prior art, the present invention having the following advantages that and advantageous effect:
(1) it is of the invention it is a kind of based on the decentralization moneytary operations method of region chain as a result of multiple key pair,
To effectively prevent the attack of hacker, to improve the safety of fund account transaction.
(2) a kind of decentralization moneytary operations method based on region chain of the invention uses region chain authentication and carries out
Fund temporarily locks an account function and transaction key authentication function, and each transaction step is synchronized to other areas on network
On the chain node of domain, transparence is realized, to improve the convenience of funds transaction.
(3) a kind of decentralization moneytary operations method based on region chain of the invention eliminates the centralization of moneytary operations
Function uses Distributed Area chain authentication managed fund transactional operation, network when so as to avoid funds transaction peak
Paralysis problem.
Description of the drawings
Fig. 1 is a kind of flow chart of decentralization moneytary operations method based on region chain of the present invention.
Specific implementation mode
Below with reference to the drawings and specific embodiments, invention is further described in detail.
A kind of decentralization moneytary operations method based on region chain shown in Figure 1, of the invention, including transaction funds
Outflow side Zeyu, transaction funds inflow side Xinyu and region chain authentication, it is assumed that Zeyu and Xinyu is legal on the chain of region
Two users, have specific identity and legal fund account, region chain authentication be region chain in any one net
Network node is usually chosen to that most efficient node of processing Zeyu and Xinyu, includes the following steps:
S1. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, and associated two pairs are generated respectively
Key;
S2. after fund outflow side Zeyu receives the correct keys of Xinyu, fund is produced to region chain authentication account, together
Shi Shengcheng key pairs;
Fund from Zeyu in the chain authentication account of region is transferred in the fund account of fund by S3.Xinyu, and raw
At key pair;
S4. whether chain authentication in region is legal according to new key authentication, is updated to both sides' fund account if legal,
If not conforming to rule restores initial capital data.
Step S1 includes:
S1a. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, Zeyu according to systematic parameter and
Current network IP generates a pair of of initial key (SK-Z, SK-X), and key SK-Z is sent to region chain authentication, while will be close
Key SK-X is sent to Xinyu;
S1b. after fund inflow side Xinyu receives key SK-X, the network IP according to key SK-X and where itself
A pair of complementary key pair (SK-X, SK-X-Z) is generated by system, and key SK-X is sent to region chain authentication, simultaneously will
Key SK-X-Z is sent to fund outflow side Zeyu;
Step S2 includes:
S2a. after fund outflow side Zeyu receives SK-X-Z, a pair of secret keys (SK-X- is generated according to key SK-X-Z again
Z, SK-Z-X), and fund account is produced temporarily to region chain authentication;And SK-X-Z and SK-Z-X are sent respectively to simultaneously
Region chain authentication and transaction funds inflow side Xinyu;
S2b. chain authentication in region judges whether the fund of Zeyu produces operation according to secret key SK-Z and SK-X matching degrees
Effectively, if effectively and if lock the account enter next step, otherwise Zeyu fund accounts are constant;
S2c. after chain authentication in region receives the temporary fund of Zeyu, message is produced to Web Publishing fund, is waited for
Xinyu receives fund;
Step S3 includes:
S3a. after fund inflow side Xinyu is by the message of Web Publishing, the fund that region chain authentication is received is interim
It is transferred on the fund account of oneself, and a pair of new secret key pair (SK-Z-X-X, SK-Z-X-Z) is generated according to secret key SK-Z-X,
And it is sent respectively to fund verification method and fund outflow side Zeyu;
S3b. chain authentication in region judges that the fund of Xinyu is transferred to according to the matching degree of secret key SK-X-Z and SK-Z-X-X
Whether operation is effective, if the account is effectively lockked, and the message for the fund of being transferred to has been received in publication on network, under
One step;Otherwise area validation method account and fund inflow side Xinyu accounts are constant;
Step S4 includes:
S4a.Zeyu judges whether transaction is correct according to the matching degree of SK-Z-X-Z and SK-X-Z;It is sent if mistake
Pseudo- key LastSK_W gives region chain authentication, and key occurs again if correct LastSK_R to area validation side;
S4b. area validation side receives the LastSK_R or LastSK_W of Zeyu and judges whether entire transaction succeeds, if
Unsuccessful recovery primary account;If being successfully updated Zeyu and Xinyu accounts;No matter entirely transaction success or not is to two accounts
Family unlocks.
Preferably, initial key should all include network IP where transaction amount character string, Zeyu to SK-Z and SK-X
The Consulting Trade System amount of money exact date of character string and Zeyu and Xinyu, and generated using cryptographic algorithm;
Preferably, key SK-X-Z includes at least two time parameters, i.e. Consulting Trade System amount of money exact date and head
The exact date of secondary means secret key SK-X;
Preferably, in SK-Z-X time parameter be fund outflow side Zeyu receive for the first time SK-X-Z time join
Number no longer includes Consulting Trade System amount of money exact date;
Preferably, chain authentication in region is the network node for arbitrarily having on internet server capability, some net
In any one transactional operation equal synchronized copy to region chain of network node on all nodes.
Claims (2)
1. a kind of decentralization moneytary operations method based on region chain, including transaction funds outflow side Zeyu, transaction funds stream
The side of entering Xinyu and region chain authentication, it is characterised in that include the following steps:
S1. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, and generate respectively associated two pairs it is close
Key;
S2. after fund outflow side Zeyu receives the correct keys of Xinyu, fund is produced to region chain authentication account, it is raw simultaneously
At key pair;
Fund from Zeyu in the chain authentication account of region is transferred in the fund account of fund by S3.Xinyu, and is generated close
Key pair;
S4. whether chain authentication in region is legal according to new key authentication, is updated to both sides' fund account if legal, if
Do not conform to rule and restores initial capital data;
The step S1 includes:
S1a. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, Zeyu is according to systematic parameter and currently
Network IP generates a pair of of initial key (SK-Z, SK-X), and key SK-Z is sent to region chain authentication, while by key
SK-X is sent to Xinyu;
S1b. after fund inflow side Xinyu receives key SK-X, the network IP according to key SK-X and where itself is by being
System generates a pair of complementary key pair (SK-X, SK-X-Z), and key SK-X is sent to region chain authentication, while by key
SK-X-Z is sent to fund outflow side Zeyu;
The step S2 includes:
S2a. after fund outflow side Zeyu receives SK-X-Z, according to key SK-X-Z generate again a pair of secret keys (SK-X-Z,
SK-Z-X it), and by fund account produces temporarily to region chain authentication;And SK-X-Z and SK-Z-X are sent respectively to area simultaneously
Domain chain authentication and transaction funds inflow side Xinyu;
S2b. region chain authentication according to secret key SK-Z and SK-X matching degrees judge the fund of Zeyu produce operation it is whether effective,
If effectively and the latching account enters next step, and otherwise Zeyu fund accounts are constant;
S2c. after chain authentication in region receives the temporary fund of Zeyu, message is produced to Web Publishing fund, Xinyu is waited for connect
Receipts fund;
The step S3 includes:
S3a. after fund inflow side Xinyu is by the message of Web Publishing, the fund that region chain authentication receives is transferred to temporarily
A pair of new secret key pair (SK-Z-X-X, SK-Z-X-Z) is generated onto the fund account of oneself, and according to secret key SK-Z-X, and is divided
It is not sent to fund verification method and fund outflow side Zeyu;
S3b. chain authentication in region judges that the fund of Xinyu is transferred to operation according to the matching degree of secret key SK-X-Z and SK-Z-X-X
Effectively whether, if effectively lockking the account, and the message for the fund of being transferred to has been received in publication on network, and entrance is next
Step;Otherwise area validation method account and fund inflow side Xinyu accounts are constant;
The step S4 includes:
S4a.Zeyu judges whether transaction is correct according to the matching degree of SK-Z-X-Z and SK-X-Z;It is sent if mistake pseudo- close
Key LastSK_W gives region chain authentication, and key occurs again if correct LastSK_R to area validation side;
S4b. area validation side receives the LastSK_R or LastSK_W of Zeyu and judges whether entire transaction succeeds, if not at
Work(restores primary account;If being successfully updated Zeyu and Xinyu accounts;No matter entirely transaction success or not is to two account solutions
Lock.
2. a kind of decentralization moneytary operations method based on region chain according to claim 1, it is characterised in that:
The initial key to SK-Z and SK-X should all include transaction amount character string, network IP character strings where Zeyu and
The Consulting Trade System amount of money exact date of Zeyu and Xinyu, and generated using cryptographic algorithm;
Key SK-the X-Z includes at least two time parameters, i.e., the described Consulting Trade System amount of money exact date and means for the first time are close
The exact date of spoon SK-X;
Time parameter is the time parameter that fund outflow side Zeyu receives SK-X-Z for the first time in the SK-Z-X, no longer includes association
Quotient's transaction amount exact date;
The region chain authentication is the network node for arbitrarily having on internet server capability, some network node
In any one transactional operation equal synchronized copy to region chain on all nodes.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810348378.9A CN108564369B (en) | 2018-04-18 | 2018-04-18 | Decentralized currency transaction method based on regional chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810348378.9A CN108564369B (en) | 2018-04-18 | 2018-04-18 | Decentralized currency transaction method based on regional chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108564369A true CN108564369A (en) | 2018-09-21 |
CN108564369B CN108564369B (en) | 2021-07-27 |
Family
ID=63535481
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810348378.9A Active CN108564369B (en) | 2018-04-18 | 2018-04-18 | Decentralized currency transaction method based on regional chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108564369B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106339939A (en) * | 2016-08-26 | 2017-01-18 | 南京喜玛拉云信息技术有限公司 | Tamper-proofing distributed bill system based on safety hardware and transaction processing method |
CN106504085A (en) * | 2016-10-18 | 2017-03-15 | 北京天德科技有限公司 | A kind of DVP settlement methods based on block chain technology |
CN107330787A (en) * | 2017-05-24 | 2017-11-07 | 智牛股权投资基金(平潭)合伙企业(有限合伙) | High frequency transaction payment method, system under a kind of block chain chain of highly effective and safe |
-
2018
- 2018-04-18 CN CN201810348378.9A patent/CN108564369B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106339939A (en) * | 2016-08-26 | 2017-01-18 | 南京喜玛拉云信息技术有限公司 | Tamper-proofing distributed bill system based on safety hardware and transaction processing method |
CN106504085A (en) * | 2016-10-18 | 2017-03-15 | 北京天德科技有限公司 | A kind of DVP settlement methods based on block chain technology |
CN107330787A (en) * | 2017-05-24 | 2017-11-07 | 智牛股权投资基金(平潭)合伙企业(有限合伙) | High frequency transaction payment method, system under a kind of block chain chain of highly effective and safe |
Also Published As
Publication number | Publication date |
---|---|
CN108564369B (en) | 2021-07-27 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
WO2020182151A1 (en) | Methods for splitting and recovering key, program product, storage medium, and system | |
CN101981889B (en) | Secure communications in computer cluster systems | |
CN110380847B (en) | Block chain consensus method and device | |
CN101567780B (en) | Key management and recovery method for encrypted digital certificate | |
Sato et al. | Long-term public blockchain: Resilience against compromise of underlying cryptography | |
CN110958110A (en) | Block chain private data management method and system based on zero knowledge proof | |
Giechaskiel et al. | When the crypto in cryptocurrencies breaks: Bitcoin security under broken primitives | |
CN1989731A (en) | System and method for implementing digital signature using one time private keys | |
CN109687965A (en) | The real name identification method of subscriber identity information in a kind of protection network | |
CN109728896A (en) | A kind of incoming call certification and source tracing method and process based on block chain | |
CN112039986A (en) | System and method for realizing information interaction among departments of enterprise | |
US20190288833A1 (en) | System and Method for Securing Private Keys Behind a Biometric Authentication Gateway | |
CN102377573A (en) | Double-factor authentication method capable of securely updating password | |
CN114070567A (en) | Zero-knowledge proof equal-block chain identity authentication and privacy protection core technology | |
CN108886466B (en) | Computer-implemented method and apparatus | |
CN108564369A (en) | A kind of decentralization moneytary operations method based on region chain | |
Zhou et al. | Efficient construction of verifiable timed signatures and its application in scalable payments | |
Tapiador et al. | Cryptanalysis of Song's advanced smart card based password authentication protocol | |
Kurbatov et al. | Global Digital Identity and Public Key Infrastructure | |
Ali et al. | Modeling and verification of Extensible Authentication Protocol for Transport layer Security in Wireless LAN environment | |
Ferretti et al. | Transferable Anonymous Payments via TumbleBit in Permissioned Blockchains. | |
CN113393241A (en) | Editing method and device of block chain account book data | |
CN103177514A (en) | Method and system for achieving tax control business | |
CN107909370B (en) | Multiple safety control method and system for electronic payment platform | |
CN114041156A (en) | Method and system for performing electronic transactions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |