CN108564369A - A kind of decentralization moneytary operations method based on region chain - Google Patents

A kind of decentralization moneytary operations method based on region chain Download PDF

Info

Publication number
CN108564369A
CN108564369A CN201810348378.9A CN201810348378A CN108564369A CN 108564369 A CN108564369 A CN 108564369A CN 201810348378 A CN201810348378 A CN 201810348378A CN 108564369 A CN108564369 A CN 108564369A
Authority
CN
China
Prior art keywords
fund
zeyu
key
xinyu
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810348378.9A
Other languages
Chinese (zh)
Other versions
CN108564369B (en
Inventor
班书昊
李晓艳
蒋学东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changzhou University
Original Assignee
Changzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changzhou University filed Critical Changzhou University
Priority to CN201810348378.9A priority Critical patent/CN108564369B/en
Publication of CN108564369A publication Critical patent/CN108564369A/en
Application granted granted Critical
Publication of CN108564369B publication Critical patent/CN108564369B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The decentralization moneytary operations method based on region chain that the invention discloses a kind of, belongs to region chain technical field.It includes the following steps:S1. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, and associated two pairs of keys are generated respectively;S2. after fund outflow side Zeyu receives the correct keys of Xinyu, fund is produced to region chain authentication account, while generating key pair;Fund from Zeyu in the chain authentication account of region is transferred in the fund account of fund by S3.Xinyu, and generates key pair;S4. whether chain authentication in region is legal according to new key authentication, is updated to both sides' fund account if legal, if not conforming to rule restores initial capital data.The present invention be a kind of distributed account management, transaction be more prone to carry out, the more safe and reliable decentralization moneytary operations method based on region chain of account.

Description

A kind of decentralization moneytary operations method based on region chain
Technical field
The invention mainly relates to region chain technical fields, refer in particular to a kind of decentralization moneytary operations side based on region chain Method.
Background technology
Moneytary operations method is passed through bank and is carried out in the prior art, and this trade mode can not only increase the center of bank Change function, it is busy that database is easy to cause when merchandising busy;What is more important, this trade mode place one's entire reliance upon bank's number According to the safety in library, it is subject to the attack of hacker, the fund account safety of client is caused to reduce.Therefore, design one kind is disobeyed The moneytary operations in bank, the moneytary operations method of more safety transparent is relied to have a very important significance.
Invention content
The technical issues of present invention need to solve be:For technical problem of the existing technology, the present invention provides a kind of point Cloth account management, transaction are more prone to progress, the more safe and reliable decentralization moneytary operations based on region chain of account Method.
To solve the above-mentioned problems, solution proposed by the present invention is:A kind of decentralization currency based on region chain Method of commerce includes transaction funds outflow side Zeyu, transaction funds inflow side Xinyu and region chain authentication, it is characterised in that Include the following steps:
S1. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, and associated two pairs are generated respectively Key;
S2. after fund outflow side Zeyu receives the correct keys of Xinyu, fund is produced to region chain authentication account, together Shi Shengcheng key pairs;
Fund from Zeyu in the chain authentication account of region is transferred in the fund account of fund by S3.Xinyu, and raw At key pair;
S4. whether chain authentication in region is legal according to new key authentication, is updated to both sides' fund account if legal, If not conforming to rule restores initial capital data.
The step S1 includes:
S1a. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, Zeyu according to systematic parameter and Current network IP generates a pair of of initial key (SK-Z, SK-X), and key SK-Z is sent to region chain authentication, while will be close Key SK-X is sent to Xinyu;
S1b. after fund inflow side Xinyu receives key SK-X, the network IP according to key SK-X and where itself A pair of complementary key pair (SK-X, SK-X-Z) is generated by system, and key SK-X is sent to region chain authentication, simultaneously will Key SK-X-Z is sent to fund outflow side Zeyu;
The step S2 includes:
S2a. after fund outflow side Zeyu receives SK-X-Z, a pair of secret keys (SK-X- is generated according to key SK-X-Z again Z, SK-Z-X), and fund account is produced temporarily to region chain authentication;And SK-X-Z and SK-Z-X are sent respectively to simultaneously Region chain authentication and transaction funds inflow side Xinyu;
S2b. chain authentication in region judges whether the fund of Zeyu produces operation according to secret key SK-Z and SK-X matching degrees Effectively, if effectively and if lock the account enter next step, otherwise Zeyu fund accounts are constant;
S2c. after chain authentication in region receives the temporary fund of Zeyu, message is produced to Web Publishing fund, is waited for Xinyu receives fund;
The step S3 includes:
S3a. after fund inflow side Xinyu is by the message of Web Publishing, the fund that region chain authentication is received is interim It is transferred on the fund account of oneself, and a pair of new secret key pair (SK-Z-X-X, SK-Z-X-Z) is generated according to secret key SK-Z-X, And it is sent respectively to fund verification method and fund outflow side Zeyu;
S3b. chain authentication in region judges that the fund of Xinyu is transferred to according to the matching degree of secret key SK-X-Z and SK-Z-X-X Whether operation is effective, if the account is effectively lockked, and the message for the fund of being transferred to has been received in publication on network, under One step;Otherwise area validation method account and fund inflow side Xinyu accounts are constant;
The step S4 includes:
S4a.Zeyu judges whether transaction is correct according to the matching degree of SK-Z-X-Z and SK-X-Z;It is sent if mistake Pseudo- key LastSK_W gives region chain authentication, and key occurs again if correct LastSK_R to area validation side;
S4b. area validation side receives the LastSK_R or LastSK_W of Zeyu and judges whether entire transaction succeeds, if Unsuccessful recovery primary account;If being successfully updated Zeyu and Xinyu accounts;No matter entirely transaction success or not is to two accounts Family unlocks.
State initial key to SK-Z and SK-X should all include transaction amount character string, network IP character strings where Zeyu and The Consulting Trade System amount of money exact date of Zeyu and Xinyu, and generated using cryptographic algorithm;
Key SK-the X-Z includes at least two time parameters, i.e., the described Consulting Trade System amount of money exact date and hand for the first time The exact date of section secret key SK-X;
Time parameter is the time parameter that fund outflow side Zeyu receives SK-X-Z for the first time in the SK-Z-X, is no longer wrapped Include Consulting Trade System amount of money exact date;
The region chain authentication is the network node for arbitrarily having on internet server capability, some described network section In any one transactional operation equal synchronized copy to region chain of point on all nodes.
Compared with prior art, the present invention having the following advantages that and advantageous effect:
(1) it is of the invention it is a kind of based on the decentralization moneytary operations method of region chain as a result of multiple key pair, To effectively prevent the attack of hacker, to improve the safety of fund account transaction.
(2) a kind of decentralization moneytary operations method based on region chain of the invention uses region chain authentication and carries out Fund temporarily locks an account function and transaction key authentication function, and each transaction step is synchronized to other areas on network On the chain node of domain, transparence is realized, to improve the convenience of funds transaction.
(3) a kind of decentralization moneytary operations method based on region chain of the invention eliminates the centralization of moneytary operations Function uses Distributed Area chain authentication managed fund transactional operation, network when so as to avoid funds transaction peak Paralysis problem.
Description of the drawings
Fig. 1 is a kind of flow chart of decentralization moneytary operations method based on region chain of the present invention.
Specific implementation mode
Below with reference to the drawings and specific embodiments, invention is further described in detail.
A kind of decentralization moneytary operations method based on region chain shown in Figure 1, of the invention, including transaction funds Outflow side Zeyu, transaction funds inflow side Xinyu and region chain authentication, it is assumed that Zeyu and Xinyu is legal on the chain of region Two users, have specific identity and legal fund account, region chain authentication be region chain in any one net Network node is usually chosen to that most efficient node of processing Zeyu and Xinyu, includes the following steps:
S1. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, and associated two pairs are generated respectively Key;
S2. after fund outflow side Zeyu receives the correct keys of Xinyu, fund is produced to region chain authentication account, together Shi Shengcheng key pairs;
Fund from Zeyu in the chain authentication account of region is transferred in the fund account of fund by S3.Xinyu, and raw At key pair;
S4. whether chain authentication in region is legal according to new key authentication, is updated to both sides' fund account if legal, If not conforming to rule restores initial capital data.
Step S1 includes:
S1a. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, Zeyu according to systematic parameter and Current network IP generates a pair of of initial key (SK-Z, SK-X), and key SK-Z is sent to region chain authentication, while will be close Key SK-X is sent to Xinyu;
S1b. after fund inflow side Xinyu receives key SK-X, the network IP according to key SK-X and where itself A pair of complementary key pair (SK-X, SK-X-Z) is generated by system, and key SK-X is sent to region chain authentication, simultaneously will Key SK-X-Z is sent to fund outflow side Zeyu;
Step S2 includes:
S2a. after fund outflow side Zeyu receives SK-X-Z, a pair of secret keys (SK-X- is generated according to key SK-X-Z again Z, SK-Z-X), and fund account is produced temporarily to region chain authentication;And SK-X-Z and SK-Z-X are sent respectively to simultaneously Region chain authentication and transaction funds inflow side Xinyu;
S2b. chain authentication in region judges whether the fund of Zeyu produces operation according to secret key SK-Z and SK-X matching degrees Effectively, if effectively and if lock the account enter next step, otherwise Zeyu fund accounts are constant;
S2c. after chain authentication in region receives the temporary fund of Zeyu, message is produced to Web Publishing fund, is waited for Xinyu receives fund;
Step S3 includes:
S3a. after fund inflow side Xinyu is by the message of Web Publishing, the fund that region chain authentication is received is interim It is transferred on the fund account of oneself, and a pair of new secret key pair (SK-Z-X-X, SK-Z-X-Z) is generated according to secret key SK-Z-X, And it is sent respectively to fund verification method and fund outflow side Zeyu;
S3b. chain authentication in region judges that the fund of Xinyu is transferred to according to the matching degree of secret key SK-X-Z and SK-Z-X-X Whether operation is effective, if the account is effectively lockked, and the message for the fund of being transferred to has been received in publication on network, under One step;Otherwise area validation method account and fund inflow side Xinyu accounts are constant;
Step S4 includes:
S4a.Zeyu judges whether transaction is correct according to the matching degree of SK-Z-X-Z and SK-X-Z;It is sent if mistake Pseudo- key LastSK_W gives region chain authentication, and key occurs again if correct LastSK_R to area validation side;
S4b. area validation side receives the LastSK_R or LastSK_W of Zeyu and judges whether entire transaction succeeds, if Unsuccessful recovery primary account;If being successfully updated Zeyu and Xinyu accounts;No matter entirely transaction success or not is to two accounts Family unlocks.
Preferably, initial key should all include network IP where transaction amount character string, Zeyu to SK-Z and SK-X The Consulting Trade System amount of money exact date of character string and Zeyu and Xinyu, and generated using cryptographic algorithm;
Preferably, key SK-X-Z includes at least two time parameters, i.e. Consulting Trade System amount of money exact date and head The exact date of secondary means secret key SK-X;
Preferably, in SK-Z-X time parameter be fund outflow side Zeyu receive for the first time SK-X-Z time join Number no longer includes Consulting Trade System amount of money exact date;
Preferably, chain authentication in region is the network node for arbitrarily having on internet server capability, some net In any one transactional operation equal synchronized copy to region chain of network node on all nodes.

Claims (2)

1. a kind of decentralization moneytary operations method based on region chain, including transaction funds outflow side Zeyu, transaction funds stream The side of entering Xinyu and region chain authentication, it is characterised in that include the following steps:
S1. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, and generate respectively associated two pairs it is close Key;
S2. after fund outflow side Zeyu receives the correct keys of Xinyu, fund is produced to region chain authentication account, it is raw simultaneously At key pair;
Fund from Zeyu in the chain authentication account of region is transferred in the fund account of fund by S3.Xinyu, and is generated close Key pair;
S4. whether chain authentication in region is legal according to new key authentication, is updated to both sides' fund account if legal, if Do not conform to rule and restores initial capital data;
The step S1 includes:
S1a. fund outflow side Zeyu and the fund inflow side Xinyu Consulting Trade System amount of money, Zeyu is according to systematic parameter and currently Network IP generates a pair of of initial key (SK-Z, SK-X), and key SK-Z is sent to region chain authentication, while by key SK-X is sent to Xinyu;
S1b. after fund inflow side Xinyu receives key SK-X, the network IP according to key SK-X and where itself is by being System generates a pair of complementary key pair (SK-X, SK-X-Z), and key SK-X is sent to region chain authentication, while by key SK-X-Z is sent to fund outflow side Zeyu;
The step S2 includes:
S2a. after fund outflow side Zeyu receives SK-X-Z, according to key SK-X-Z generate again a pair of secret keys (SK-X-Z, SK-Z-X it), and by fund account produces temporarily to region chain authentication;And SK-X-Z and SK-Z-X are sent respectively to area simultaneously Domain chain authentication and transaction funds inflow side Xinyu;
S2b. region chain authentication according to secret key SK-Z and SK-X matching degrees judge the fund of Zeyu produce operation it is whether effective, If effectively and the latching account enters next step, and otherwise Zeyu fund accounts are constant;
S2c. after chain authentication in region receives the temporary fund of Zeyu, message is produced to Web Publishing fund, Xinyu is waited for connect Receipts fund;
The step S3 includes:
S3a. after fund inflow side Xinyu is by the message of Web Publishing, the fund that region chain authentication receives is transferred to temporarily A pair of new secret key pair (SK-Z-X-X, SK-Z-X-Z) is generated onto the fund account of oneself, and according to secret key SK-Z-X, and is divided It is not sent to fund verification method and fund outflow side Zeyu;
S3b. chain authentication in region judges that the fund of Xinyu is transferred to operation according to the matching degree of secret key SK-X-Z and SK-Z-X-X Effectively whether, if effectively lockking the account, and the message for the fund of being transferred to has been received in publication on network, and entrance is next Step;Otherwise area validation method account and fund inflow side Xinyu accounts are constant;
The step S4 includes:
S4a.Zeyu judges whether transaction is correct according to the matching degree of SK-Z-X-Z and SK-X-Z;It is sent if mistake pseudo- close Key LastSK_W gives region chain authentication, and key occurs again if correct LastSK_R to area validation side;
S4b. area validation side receives the LastSK_R or LastSK_W of Zeyu and judges whether entire transaction succeeds, if not at Work(restores primary account;If being successfully updated Zeyu and Xinyu accounts;No matter entirely transaction success or not is to two account solutions Lock.
2. a kind of decentralization moneytary operations method based on region chain according to claim 1, it is characterised in that:
The initial key to SK-Z and SK-X should all include transaction amount character string, network IP character strings where Zeyu and The Consulting Trade System amount of money exact date of Zeyu and Xinyu, and generated using cryptographic algorithm;
Key SK-the X-Z includes at least two time parameters, i.e., the described Consulting Trade System amount of money exact date and means for the first time are close The exact date of spoon SK-X;
Time parameter is the time parameter that fund outflow side Zeyu receives SK-X-Z for the first time in the SK-Z-X, no longer includes association Quotient's transaction amount exact date;
The region chain authentication is the network node for arbitrarily having on internet server capability, some network node In any one transactional operation equal synchronized copy to region chain on all nodes.
CN201810348378.9A 2018-04-18 2018-04-18 Decentralized currency transaction method based on regional chain Active CN108564369B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810348378.9A CN108564369B (en) 2018-04-18 2018-04-18 Decentralized currency transaction method based on regional chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810348378.9A CN108564369B (en) 2018-04-18 2018-04-18 Decentralized currency transaction method based on regional chain

Publications (2)

Publication Number Publication Date
CN108564369A true CN108564369A (en) 2018-09-21
CN108564369B CN108564369B (en) 2021-07-27

Family

ID=63535481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810348378.9A Active CN108564369B (en) 2018-04-18 2018-04-18 Decentralized currency transaction method based on regional chain

Country Status (1)

Country Link
CN (1) CN108564369B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106339939A (en) * 2016-08-26 2017-01-18 南京喜玛拉云信息技术有限公司 Tamper-proofing distributed bill system based on safety hardware and transaction processing method
CN106504085A (en) * 2016-10-18 2017-03-15 北京天德科技有限公司 A kind of DVP settlement methods based on block chain technology
CN107330787A (en) * 2017-05-24 2017-11-07 智牛股权投资基金(平潭)合伙企业(有限合伙) High frequency transaction payment method, system under a kind of block chain chain of highly effective and safe

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106339939A (en) * 2016-08-26 2017-01-18 南京喜玛拉云信息技术有限公司 Tamper-proofing distributed bill system based on safety hardware and transaction processing method
CN106504085A (en) * 2016-10-18 2017-03-15 北京天德科技有限公司 A kind of DVP settlement methods based on block chain technology
CN107330787A (en) * 2017-05-24 2017-11-07 智牛股权投资基金(平潭)合伙企业(有限合伙) High frequency transaction payment method, system under a kind of block chain chain of highly effective and safe

Also Published As

Publication number Publication date
CN108564369B (en) 2021-07-27

Similar Documents

Publication Publication Date Title
WO2020182151A1 (en) Methods for splitting and recovering key, program product, storage medium, and system
CN101981889B (en) Secure communications in computer cluster systems
CN110380847B (en) Block chain consensus method and device
CN101567780B (en) Key management and recovery method for encrypted digital certificate
Sato et al. Long-term public blockchain: Resilience against compromise of underlying cryptography
CN110958110A (en) Block chain private data management method and system based on zero knowledge proof
Giechaskiel et al. When the crypto in cryptocurrencies breaks: Bitcoin security under broken primitives
CN1989731A (en) System and method for implementing digital signature using one time private keys
CN109687965A (en) The real name identification method of subscriber identity information in a kind of protection network
CN109728896A (en) A kind of incoming call certification and source tracing method and process based on block chain
CN112039986A (en) System and method for realizing information interaction among departments of enterprise
US20190288833A1 (en) System and Method for Securing Private Keys Behind a Biometric Authentication Gateway
CN102377573A (en) Double-factor authentication method capable of securely updating password
CN114070567A (en) Zero-knowledge proof equal-block chain identity authentication and privacy protection core technology
CN108886466B (en) Computer-implemented method and apparatus
CN108564369A (en) A kind of decentralization moneytary operations method based on region chain
Zhou et al. Efficient construction of verifiable timed signatures and its application in scalable payments
Tapiador et al. Cryptanalysis of Song's advanced smart card based password authentication protocol
Kurbatov et al. Global Digital Identity and Public Key Infrastructure
Ali et al. Modeling and verification of Extensible Authentication Protocol for Transport layer Security in Wireless LAN environment
Ferretti et al. Transferable Anonymous Payments via TumbleBit in Permissioned Blockchains.
CN113393241A (en) Editing method and device of block chain account book data
CN103177514A (en) Method and system for achieving tax control business
CN107909370B (en) Multiple safety control method and system for electronic payment platform
CN114041156A (en) Method and system for performing electronic transactions

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant