CN108564369B - Decentralized currency transaction method based on regional chain - Google Patents
Decentralized currency transaction method based on regional chain Download PDFInfo
- Publication number
- CN108564369B CN108564369B CN201810348378.9A CN201810348378A CN108564369B CN 108564369 B CN108564369 B CN 108564369B CN 201810348378 A CN201810348378 A CN 201810348378A CN 108564369 B CN108564369 B CN 108564369B
- Authority
- CN
- China
- Prior art keywords
- fund
- key
- party
- zeyu
- xinyu
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Abstract
The invention discloses a decentralized currency transaction method based on a regional chain, and belongs to the technical field of regional chains. It comprises the following steps: s1, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate a transaction amount and respectively generate two pairs of associated keys; s2, after receiving the Xinyu correct key, the fund flow-out party Zeyu transfers the fund to an account of a regional chain verification party and simultaneously generates a key pair; s3, transferring funds from Zeyu in the area chain verifier account into a fund account of the funds, and generating a key pair by the Xinyu; and S4, the regional chain verifier verifies whether the new key is legal or not, updates the fund accounts of the two parties if the new key is legal, and recovers the initial fund data if the new key is illegal. The invention is a decentralized currency transaction method based on the regional chain, which has the advantages of distributed account management, easier transaction, safer and more reliable account.
Description
Technical Field
The invention mainly relates to the technical field of regional chains, in particular to a regional chain-based decentralized currency transaction method.
Background
In the prior art, currency transaction methods are all carried out through banks, and the transaction mode not only can increase the centralized function of the banks, but also easily causes the database to be busy when the transaction is busy; more importantly, the transaction mode completely depends on the security of the bank database, and is easy to attack by hackers, so that the security of the fund account of the customer is reduced. Therefore, it is very important to design a currency transaction method which is not dependent on banks and is safer and more transparent.
Disclosure of Invention
The technical problems to be solved by the invention are as follows: aiming at the technical problems in the prior art, the invention provides a regional chain-based decentralized currency transaction method which is distributed account management, easier in transaction, safer and more reliable in account.
In order to solve the problems, the solution proposed by the invention is as follows: a regional chain-based decentralized currency transaction method comprises a transaction fund outflow party Zeyu, a transaction fund inflow party Xinyu and a regional chain verifying party, and is characterized by comprising the following steps:
s1, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate a transaction amount and respectively generate two pairs of associated keys;
s2, after receiving the Xinyu correct key, the fund flow-out party Zeyu transfers the fund to an account of a regional chain verification party and simultaneously generates a key pair;
s3, transferring funds from Zeyu in the area chain verifier account into a fund account of the funds, and generating a key pair by the Xinyu;
and S4, the regional chain verifier verifies whether the new key is legal or not, updates the fund accounts of the two parties if the new key is legal, and recovers the initial fund data if the new key is illegal.
The step S1 includes:
s1a, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate transaction amount, the Zeyu generates a pair of initial keys (SK-Z and SK-X) according to system parameters and a current network IP, the key SK-Z is sent to a regional chain verifier, and the key SK-X is sent to the Xinyu;
s1b, after receiving a key SK-X, a fund inflow party Xinyu generates a pair of complementary key pairs (SK-X, SK-X-Z) by a system according to the key SK-X and a network IP where the fund inflow party Xinyu is located, sends the key SK-X to a regional chain verifier, and sends the key SK-X-Z to a fund outflow party Zeyu;
the step S2 includes:
s2a, after receiving the SK-X-Z, the fund outflow party Zeyu generates a pair of keys (SK-X-Z, SK-Z-X) again according to the key SK-X-Z, and temporarily transfers the fund account to the regional chain verifier; and simultaneously, the SK-X-Z and the SK-Z-X are respectively sent to a regional chain verifier and a transaction fund inflow party Xinyu;
s2b, judging whether the fund transfer-out operation of Zeyu is effective or not by the area chain verifier according to the matching degree of the secret key SK-Z and the SK-X, locking the account to enter the next step if the operation is effective, and otherwise, keeping the Zeyu fund account unchanged;
s2c, after receiving the temporary fund of Zeyu, the regional chain verifier issues a fund transfer-out message to the network and waits for the Xinyu to receive the fund;
the step S3 includes:
s3a, after receiving a message issued by a network, a fund inflow party Xinyu temporarily transfers funds received by a regional chain verifier to a fund account of the fund inflow party Xinyu, generates a pair of new key pairs (SK-Z-X-X, SK-Z-X-Z) according to a key SK-Z-X, and respectively sends the key pairs to the fund verifier and a fund outflow party Zeyu;
s3b, judging whether the fund transfer operation of the Xinyu is effective or not by the regional chain verifier according to the matching degree of the secret key SK-X-Z and the SK-Z-X-X, if so, locking the account, issuing a message that the fund transfer operation is received on the network, and entering the next step; otherwise, the account of the area verifier and the account of the fund inflow party Xinyu are unchanged;
the step S4 includes:
s4a, Zeyu judges whether the transaction is correct according to the matching degree of SK-Z-X-Z and SK-X-Z; if the error occurs, the pseudo key LastSK _ W is sent to the area chain verifier, and if the LastSK _ R is correct, the key is sent to the area verifier again;
s4b, receiving LastSK _ R or LastSK _ W of Zeyu by a regional verifying party, judging whether the whole transaction is successful, and if not, recovering the primary account; if Zeyu and Xinyu accounts are successfully updated; both accounts are unlocked whether the entire transaction is successful or not.
The initial key pairs SK-Z and SK-X both comprise a transaction amount character string, a network IP character string where Zeyu is located and a specific transaction amount date negotiated by Zeyu and Xinyu, and are generated by adopting a cryptographic algorithm;
the key SK-X-Z at least comprises two time parameters, namely the specific date of the negotiated transaction amount and the specific date of the first time key SK-X is received;
the time parameter in the SK-Z-X is the time parameter when the fund flow-out party Zeyu receives the SK-X-Z for the first time, and the specific date of the negotiated transaction amount is not included any more;
the regional chain verifier is any network node with a server function on the Internet, and any transaction operation of the network node is synchronously copied to all nodes on the regional chain.
Compared with the prior art, the invention has the following advantages and beneficial effects:
(1) the decentralized currency transaction method based on the regional chain effectively prevents hacker attack by adopting a plurality of key pairs, thereby improving the security of fund account transaction.
(2) The regional chain-based decentralized currency transaction method adopts the regional chain verifier to perform the functions of temporarily locking accounts for funds and verifying transaction keys, and transaction steps of each time are synchronized to other regional chain nodes on the network, so that transparence is realized, and convenience of fund transaction is improved.
(3) The decentralized currency transaction method based on the regional chain eliminates the centralized function of currency transaction, and adopts the distributed regional chain verification side to manage the fund transaction operation, thereby avoiding the problem of network paralysis during the peak of the fund transaction.
Drawings
FIG. 1 is a flow chart of a regional chain based decentralized currency transaction method of the present invention.
Detailed Description
The invention will be described in further detail below with reference to the accompanying drawings and specific embodiments.
Referring to fig. 1, the regional chain-based decentralized currency transaction method of the present invention includes a transaction fund outflow party Zeyu, a transaction fund inflow party Xinyu, and a regional chain verifier, where Zeyu and Xinyu are two legitimate users on a regional chain and have definite identities and legitimate fund accounts, and the regional chain verifier is any network node in the regional chain and is generally selected as the node most efficient in processing Zeyu and Xinyu, and includes the following steps:
s1, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate a transaction amount and respectively generate two pairs of associated keys;
s2, after receiving the Xinyu correct key, the fund flow-out party Zeyu transfers the fund to an account of a regional chain verification party and simultaneously generates a key pair;
s3, transferring funds from Zeyu in the area chain verifier account into a fund account of the funds, and generating a key pair by the Xinyu;
and S4, the regional chain verifier verifies whether the new key is legal or not, updates the fund accounts of the two parties if the new key is legal, and recovers the initial fund data if the new key is illegal.
Step S1 includes:
s1a, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate transaction amount, the Zeyu generates a pair of initial keys (SK-Z and SK-X) according to system parameters and a current network IP, the key SK-Z is sent to a regional chain verifier, and the key SK-X is sent to the Xinyu;
s1b, after receiving a key SK-X, a fund inflow party Xinyu generates a pair of complementary key pairs (SK-X, SK-X-Z) by a system according to the key SK-X and a network IP where the fund inflow party Xinyu is located, sends the key SK-X to a regional chain verifier, and sends the key SK-X-Z to a fund outflow party Zeyu;
step S2 includes:
s2a, after receiving the SK-X-Z, the fund outflow party Zeyu generates a pair of keys (SK-X-Z, SK-Z-X) again according to the key SK-X-Z, and temporarily transfers the fund account to the regional chain verifier; and simultaneously, the SK-X-Z and the SK-Z-X are respectively sent to a regional chain verifier and a transaction fund inflow party Xinyu;
s2b, judging whether the fund transfer-out operation of Zeyu is effective or not by the area chain verifier according to the matching degree of the secret key SK-Z and the SK-X, locking the account to enter the next step if the operation is effective, and otherwise, keeping the Zeyu fund account unchanged;
s2c, after receiving the temporary fund of Zeyu, the regional chain verifier issues a fund transfer-out message to the network and waits for the Xinyu to receive the fund;
step S3 includes:
s3a, after receiving a message issued by a network, a fund inflow party Xinyu temporarily transfers funds received by a regional chain verifier to a fund account of the fund inflow party Xinyu, generates a pair of new key pairs (SK-Z-X-X, SK-Z-X-Z) according to a key SK-Z-X, and respectively sends the key pairs to the fund verifier and a fund outflow party Zeyu;
s3b, judging whether the fund transfer operation of the Xinyu is effective or not by the regional chain verifier according to the matching degree of the secret key SK-X-Z and the SK-Z-X-X, if so, locking the account, issuing a message that the fund transfer operation is received on the network, and entering the next step; otherwise, the account of the area verifier and the account of the fund inflow party Xinyu are unchanged;
step S4 includes:
s4a, Zeyu judges whether the transaction is correct according to the matching degree of SK-Z-X-Z and SK-X-Z; if the error occurs, the pseudo key LastSK _ W is sent to the area chain verifier, and if the LastSK _ R is correct, the key is sent to the area verifier again;
s4b, receiving LastSK _ R or LastSK _ W of Zeyu by a regional verifying party, judging whether the whole transaction is successful, and if not, recovering the primary account; if Zeyu and Xinyu accounts are successfully updated; both accounts are unlocked whether the entire transaction is successful or not.
Preferably, the initial key pair SK-Z and SK-X both comprise a transaction amount character string, a network IP character string where Zeyu is located and a negotiation transaction amount specific date of Zeyu and Xinyu, and are generated by adopting a cryptographic algorithm;
preferably, the key SK-X-Z comprises at least two time parameters, namely a specific date of the negotiated transaction amount and a specific date of the first receipt of the key SK-X;
preferably, the time parameter in the SK-Z-X is the time parameter when the fund flow-out party Zeyu receives the SK-X-Z for the first time, and the specific date of the negotiated transaction amount is not included;
preferably, the regional chain verifier is any network node with a server function on the internet, and any transaction operation of the network node is synchronously copied to all nodes on the regional chain.
Claims (2)
1. A regional chain-based decentralized currency transaction method comprises a transaction fund outflow party Zeyu, a transaction fund inflow party Xinyu and a regional chain verifying party, and is characterized by comprising the following steps:
s1, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate a transaction amount and respectively generate two pairs of associated keys;
s2, after receiving the Xinyu correct key, the fund flow-out party Zeyu transfers the fund to an account of a regional chain verification party and simultaneously generates a key pair;
s3, transferring funds from Zeyu in the area chain verifier account into a fund account of the funds, and generating a key pair by the Xinyu;
s4, the regional chain verifier verifies whether the new key is legal or not, updates the fund accounts of the two parties if the new key is legal, and recovers the initial fund data if the new key is illegal;
the step S1 includes:
s1a, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate transaction amount, the Zeyu generates a pair of initial keys (SK-Z and SK-X) according to system parameters and a current network IP, the key SK-Z is sent to a regional chain verifier, and the key SK-X is sent to the Xinyu;
s1b, after receiving a key SK-X, a fund inflow party Xinyu generates a pair of complementary key pairs (SK-X, SK-X-Z) by a system according to the key SK-X and a network IP where the fund inflow party Xinyu is located, sends the key SK-X to a regional chain verifier, and sends the key SK-X-Z to a fund outflow party Zeyu;
the step S2 includes:
s2a, after receiving the SK-X-Z, the fund outflow party Zeyu generates a pair of keys (SK-X-Z, SK-Z-X) again according to the key SK-X-Z, and temporarily transfers the fund account to the regional chain verifier; and simultaneously, the SK-X-Z and the SK-Z-X are respectively sent to a regional chain verifier and a transaction fund inflow party Xinyu;
s2b, judging whether the fund transfer-out operation of Zeyu is effective or not by the area chain verifier according to the matching degree of the secret key SK-Z and the SK-X, locking the account to enter the next step if the operation is effective, and otherwise, keeping the Zeyu fund account unchanged;
s2c, after receiving the temporary fund of Zeyu, the regional chain verifier issues a fund transfer-out message to the network and waits for the Xinyu to receive the fund;
the step S3 includes:
s3a, after receiving a message issued by a network, a fund inflow party Xinyu temporarily transfers funds received by a regional chain verifier to a fund account of the fund inflow party Xinyu, generates a pair of new key pairs (SK-Z-X-X, SK-Z-X-Z) according to a key SK-Z-X, and respectively sends the key pairs to the fund verifier and a fund outflow party Zeyu;
s3b, judging whether the fund transfer operation of the Xinyu is effective or not by the regional chain verifier according to the matching degree of the secret key SK-X-Z and the SK-Z-X-X, if so, locking the account, issuing a message that the fund transfer operation is received on the network, and entering the next step; otherwise, the account of the area verifier and the account of the fund inflow party Xinyu are unchanged;
the step S4 includes:
s4a, Zeyu judges whether the transaction is correct according to the matching degree of SK-Z-X-Z and SK-X-Z; if the error occurs, the pseudo key LastSK _ W is sent to the area chain verifier, and if the LastSK _ R is correct, the key is sent to the area verifier again;
s4b, receiving LastSK _ R or LastSK _ W of Zeyu by a regional verifying party, judging whether the whole transaction is successful, and if not, recovering the primary account; if Zeyu and Xinyu accounts are successfully updated; both accounts are unlocked whether the entire transaction is successful or not.
2. The regional chain-based decentralized currency transaction method according to claim 1, characterized in that:
the initial key pair SK-Z and SK-X both comprise a transaction amount character string, a network IP character string where Zeyu is located and a specific transaction amount date negotiated by Zeyu and Xinyu, and are generated by adopting a cryptographic algorithm;
the key SK-X-Z at least comprises two time parameters, namely the specific date of the negotiated transaction amount and the specific date of the first time key SK-X is received;
the time parameter in the SK-Z-X is the time parameter when the fund flow-out party Zeyu receives the SK-X-Z for the first time, and the specific date of the negotiated transaction amount is not included any more;
the regional chain verifier is any network node with a server function on the Internet, and any transaction operation of the network node is synchronously copied to all nodes on the regional chain.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810348378.9A CN108564369B (en) | 2018-04-18 | 2018-04-18 | Decentralized currency transaction method based on regional chain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810348378.9A CN108564369B (en) | 2018-04-18 | 2018-04-18 | Decentralized currency transaction method based on regional chain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108564369A CN108564369A (en) | 2018-09-21 |
CN108564369B true CN108564369B (en) | 2021-07-27 |
Family
ID=63535481
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810348378.9A Active CN108564369B (en) | 2018-04-18 | 2018-04-18 | Decentralized currency transaction method based on regional chain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108564369B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106339939A (en) * | 2016-08-26 | 2017-01-18 | 南京喜玛拉云信息技术有限公司 | Tamper-proofing distributed bill system based on safety hardware and transaction processing method |
CN106504085A (en) * | 2016-10-18 | 2017-03-15 | 北京天德科技有限公司 | A kind of DVP settlement methods based on block chain technology |
CN107330787A (en) * | 2017-05-24 | 2017-11-07 | 智牛股权投资基金(平潭)合伙企业(有限合伙) | High frequency transaction payment method, system under a kind of block chain chain of highly effective and safe |
-
2018
- 2018-04-18 CN CN201810348378.9A patent/CN108564369B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106339939A (en) * | 2016-08-26 | 2017-01-18 | 南京喜玛拉云信息技术有限公司 | Tamper-proofing distributed bill system based on safety hardware and transaction processing method |
CN106504085A (en) * | 2016-10-18 | 2017-03-15 | 北京天德科技有限公司 | A kind of DVP settlement methods based on block chain technology |
CN107330787A (en) * | 2017-05-24 | 2017-11-07 | 智牛股权投资基金(平潭)合伙企业(有限合伙) | High frequency transaction payment method, system under a kind of block chain chain of highly effective and safe |
Also Published As
Publication number | Publication date |
---|---|
CN108564369A (en) | 2018-09-21 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109918878B (en) | Industrial Internet of things equipment identity authentication and safe interaction method based on block chain | |
CN110958110B (en) | Block chain private data management method and system based on zero knowledge proof | |
CN109981582B (en) | Internet of things equipment identity authentication method based on block chain | |
CN110069918B (en) | Efficient double-factor cross-domain authentication method based on block chain technology | |
Gong | Increasing availability and security of an authentication service | |
CN100561916C (en) | A kind of method and system that upgrades authenticate key | |
CN110930153B (en) | Block chain privacy data management method and system based on hidden third party account | |
CN109687965A (en) | The real name identification method of subscriber identity information in a kind of protection network | |
CN109359464B (en) | Wireless security authentication method based on block chain technology | |
CN109245894B (en) | Distributed cloud storage system based on intelligent contracts | |
CN109685505B (en) | Byzantine fault-tolerant consensus optimization method based on association ring signature | |
CN110838920B (en) | Password authentication and key agreement protocol in web system without storing password related information | |
CN108965342B (en) | Authentication method and system for data requester to access data source | |
CN113746858B (en) | Cross-chain communication method based on verifiable random function | |
CN110852745A (en) | Block chain distributed dynamic network key automatic updating method | |
CN110519300A (en) | Client key method for secure storing based on password bidirectional authentication | |
CN112488682B (en) | Three-party transfer method and device for block chain | |
CN109728896A (en) | A kind of incoming call certification and source tracing method and process based on block chain | |
US11962698B2 (en) | Token node locking with fingerprints authenticated by digital certificates | |
CN102377573A (en) | Double-factor authentication method capable of securely updating password | |
CN114070567A (en) | Zero-knowledge proof equal-block chain identity authentication and privacy protection core technology | |
CN104717070B (en) | A method of being associated with digital certificate using one-way Hash function | |
CN111865595B (en) | Block chain consensus method and device | |
CN110634072A (en) | Block chain transaction system based on multiple tags and hardware encryption and operation mechanism thereof | |
CN108564369B (en) | Decentralized currency transaction method based on regional chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |