CN108564369B - Decentralized currency transaction method based on regional chain - Google Patents

Decentralized currency transaction method based on regional chain Download PDF

Info

Publication number
CN108564369B
CN108564369B CN201810348378.9A CN201810348378A CN108564369B CN 108564369 B CN108564369 B CN 108564369B CN 201810348378 A CN201810348378 A CN 201810348378A CN 108564369 B CN108564369 B CN 108564369B
Authority
CN
China
Prior art keywords
fund
key
party
zeyu
xinyu
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810348378.9A
Other languages
Chinese (zh)
Other versions
CN108564369A (en
Inventor
班书昊
李晓艳
蒋学东
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Changzhou University
Original Assignee
Changzhou University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Changzhou University filed Critical Changzhou University
Priority to CN201810348378.9A priority Critical patent/CN108564369B/en
Publication of CN108564369A publication Critical patent/CN108564369A/en
Application granted granted Critical
Publication of CN108564369B publication Critical patent/CN108564369B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

The invention discloses a decentralized currency transaction method based on a regional chain, and belongs to the technical field of regional chains. It comprises the following steps: s1, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate a transaction amount and respectively generate two pairs of associated keys; s2, after receiving the Xinyu correct key, the fund flow-out party Zeyu transfers the fund to an account of a regional chain verification party and simultaneously generates a key pair; s3, transferring funds from Zeyu in the area chain verifier account into a fund account of the funds, and generating a key pair by the Xinyu; and S4, the regional chain verifier verifies whether the new key is legal or not, updates the fund accounts of the two parties if the new key is legal, and recovers the initial fund data if the new key is illegal. The invention is a decentralized currency transaction method based on the regional chain, which has the advantages of distributed account management, easier transaction, safer and more reliable account.

Description

Decentralized currency transaction method based on regional chain
Technical Field
The invention mainly relates to the technical field of regional chains, in particular to a regional chain-based decentralized currency transaction method.
Background
In the prior art, currency transaction methods are all carried out through banks, and the transaction mode not only can increase the centralized function of the banks, but also easily causes the database to be busy when the transaction is busy; more importantly, the transaction mode completely depends on the security of the bank database, and is easy to attack by hackers, so that the security of the fund account of the customer is reduced. Therefore, it is very important to design a currency transaction method which is not dependent on banks and is safer and more transparent.
Disclosure of Invention
The technical problems to be solved by the invention are as follows: aiming at the technical problems in the prior art, the invention provides a regional chain-based decentralized currency transaction method which is distributed account management, easier in transaction, safer and more reliable in account.
In order to solve the problems, the solution proposed by the invention is as follows: a regional chain-based decentralized currency transaction method comprises a transaction fund outflow party Zeyu, a transaction fund inflow party Xinyu and a regional chain verifying party, and is characterized by comprising the following steps:
s1, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate a transaction amount and respectively generate two pairs of associated keys;
s2, after receiving the Xinyu correct key, the fund flow-out party Zeyu transfers the fund to an account of a regional chain verification party and simultaneously generates a key pair;
s3, transferring funds from Zeyu in the area chain verifier account into a fund account of the funds, and generating a key pair by the Xinyu;
and S4, the regional chain verifier verifies whether the new key is legal or not, updates the fund accounts of the two parties if the new key is legal, and recovers the initial fund data if the new key is illegal.
The step S1 includes:
s1a, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate transaction amount, the Zeyu generates a pair of initial keys (SK-Z and SK-X) according to system parameters and a current network IP, the key SK-Z is sent to a regional chain verifier, and the key SK-X is sent to the Xinyu;
s1b, after receiving a key SK-X, a fund inflow party Xinyu generates a pair of complementary key pairs (SK-X, SK-X-Z) by a system according to the key SK-X and a network IP where the fund inflow party Xinyu is located, sends the key SK-X to a regional chain verifier, and sends the key SK-X-Z to a fund outflow party Zeyu;
the step S2 includes:
s2a, after receiving the SK-X-Z, the fund outflow party Zeyu generates a pair of keys (SK-X-Z, SK-Z-X) again according to the key SK-X-Z, and temporarily transfers the fund account to the regional chain verifier; and simultaneously, the SK-X-Z and the SK-Z-X are respectively sent to a regional chain verifier and a transaction fund inflow party Xinyu;
s2b, judging whether the fund transfer-out operation of Zeyu is effective or not by the area chain verifier according to the matching degree of the secret key SK-Z and the SK-X, locking the account to enter the next step if the operation is effective, and otherwise, keeping the Zeyu fund account unchanged;
s2c, after receiving the temporary fund of Zeyu, the regional chain verifier issues a fund transfer-out message to the network and waits for the Xinyu to receive the fund;
the step S3 includes:
s3a, after receiving a message issued by a network, a fund inflow party Xinyu temporarily transfers funds received by a regional chain verifier to a fund account of the fund inflow party Xinyu, generates a pair of new key pairs (SK-Z-X-X, SK-Z-X-Z) according to a key SK-Z-X, and respectively sends the key pairs to the fund verifier and a fund outflow party Zeyu;
s3b, judging whether the fund transfer operation of the Xinyu is effective or not by the regional chain verifier according to the matching degree of the secret key SK-X-Z and the SK-Z-X-X, if so, locking the account, issuing a message that the fund transfer operation is received on the network, and entering the next step; otherwise, the account of the area verifier and the account of the fund inflow party Xinyu are unchanged;
the step S4 includes:
s4a, Zeyu judges whether the transaction is correct according to the matching degree of SK-Z-X-Z and SK-X-Z; if the error occurs, the pseudo key LastSK _ W is sent to the area chain verifier, and if the LastSK _ R is correct, the key is sent to the area verifier again;
s4b, receiving LastSK _ R or LastSK _ W of Zeyu by a regional verifying party, judging whether the whole transaction is successful, and if not, recovering the primary account; if Zeyu and Xinyu accounts are successfully updated; both accounts are unlocked whether the entire transaction is successful or not.
The initial key pairs SK-Z and SK-X both comprise a transaction amount character string, a network IP character string where Zeyu is located and a specific transaction amount date negotiated by Zeyu and Xinyu, and are generated by adopting a cryptographic algorithm;
the key SK-X-Z at least comprises two time parameters, namely the specific date of the negotiated transaction amount and the specific date of the first time key SK-X is received;
the time parameter in the SK-Z-X is the time parameter when the fund flow-out party Zeyu receives the SK-X-Z for the first time, and the specific date of the negotiated transaction amount is not included any more;
the regional chain verifier is any network node with a server function on the Internet, and any transaction operation of the network node is synchronously copied to all nodes on the regional chain.
Compared with the prior art, the invention has the following advantages and beneficial effects:
(1) the decentralized currency transaction method based on the regional chain effectively prevents hacker attack by adopting a plurality of key pairs, thereby improving the security of fund account transaction.
(2) The regional chain-based decentralized currency transaction method adopts the regional chain verifier to perform the functions of temporarily locking accounts for funds and verifying transaction keys, and transaction steps of each time are synchronized to other regional chain nodes on the network, so that transparence is realized, and convenience of fund transaction is improved.
(3) The decentralized currency transaction method based on the regional chain eliminates the centralized function of currency transaction, and adopts the distributed regional chain verification side to manage the fund transaction operation, thereby avoiding the problem of network paralysis during the peak of the fund transaction.
Drawings
FIG. 1 is a flow chart of a regional chain based decentralized currency transaction method of the present invention.
Detailed Description
The invention will be described in further detail below with reference to the accompanying drawings and specific embodiments.
Referring to fig. 1, the regional chain-based decentralized currency transaction method of the present invention includes a transaction fund outflow party Zeyu, a transaction fund inflow party Xinyu, and a regional chain verifier, where Zeyu and Xinyu are two legitimate users on a regional chain and have definite identities and legitimate fund accounts, and the regional chain verifier is any network node in the regional chain and is generally selected as the node most efficient in processing Zeyu and Xinyu, and includes the following steps:
s1, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate a transaction amount and respectively generate two pairs of associated keys;
s2, after receiving the Xinyu correct key, the fund flow-out party Zeyu transfers the fund to an account of a regional chain verification party and simultaneously generates a key pair;
s3, transferring funds from Zeyu in the area chain verifier account into a fund account of the funds, and generating a key pair by the Xinyu;
and S4, the regional chain verifier verifies whether the new key is legal or not, updates the fund accounts of the two parties if the new key is legal, and recovers the initial fund data if the new key is illegal.
Step S1 includes:
s1a, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate transaction amount, the Zeyu generates a pair of initial keys (SK-Z and SK-X) according to system parameters and a current network IP, the key SK-Z is sent to a regional chain verifier, and the key SK-X is sent to the Xinyu;
s1b, after receiving a key SK-X, a fund inflow party Xinyu generates a pair of complementary key pairs (SK-X, SK-X-Z) by a system according to the key SK-X and a network IP where the fund inflow party Xinyu is located, sends the key SK-X to a regional chain verifier, and sends the key SK-X-Z to a fund outflow party Zeyu;
step S2 includes:
s2a, after receiving the SK-X-Z, the fund outflow party Zeyu generates a pair of keys (SK-X-Z, SK-Z-X) again according to the key SK-X-Z, and temporarily transfers the fund account to the regional chain verifier; and simultaneously, the SK-X-Z and the SK-Z-X are respectively sent to a regional chain verifier and a transaction fund inflow party Xinyu;
s2b, judging whether the fund transfer-out operation of Zeyu is effective or not by the area chain verifier according to the matching degree of the secret key SK-Z and the SK-X, locking the account to enter the next step if the operation is effective, and otherwise, keeping the Zeyu fund account unchanged;
s2c, after receiving the temporary fund of Zeyu, the regional chain verifier issues a fund transfer-out message to the network and waits for the Xinyu to receive the fund;
step S3 includes:
s3a, after receiving a message issued by a network, a fund inflow party Xinyu temporarily transfers funds received by a regional chain verifier to a fund account of the fund inflow party Xinyu, generates a pair of new key pairs (SK-Z-X-X, SK-Z-X-Z) according to a key SK-Z-X, and respectively sends the key pairs to the fund verifier and a fund outflow party Zeyu;
s3b, judging whether the fund transfer operation of the Xinyu is effective or not by the regional chain verifier according to the matching degree of the secret key SK-X-Z and the SK-Z-X-X, if so, locking the account, issuing a message that the fund transfer operation is received on the network, and entering the next step; otherwise, the account of the area verifier and the account of the fund inflow party Xinyu are unchanged;
step S4 includes:
s4a, Zeyu judges whether the transaction is correct according to the matching degree of SK-Z-X-Z and SK-X-Z; if the error occurs, the pseudo key LastSK _ W is sent to the area chain verifier, and if the LastSK _ R is correct, the key is sent to the area verifier again;
s4b, receiving LastSK _ R or LastSK _ W of Zeyu by a regional verifying party, judging whether the whole transaction is successful, and if not, recovering the primary account; if Zeyu and Xinyu accounts are successfully updated; both accounts are unlocked whether the entire transaction is successful or not.
Preferably, the initial key pair SK-Z and SK-X both comprise a transaction amount character string, a network IP character string where Zeyu is located and a negotiation transaction amount specific date of Zeyu and Xinyu, and are generated by adopting a cryptographic algorithm;
preferably, the key SK-X-Z comprises at least two time parameters, namely a specific date of the negotiated transaction amount and a specific date of the first receipt of the key SK-X;
preferably, the time parameter in the SK-Z-X is the time parameter when the fund flow-out party Zeyu receives the SK-X-Z for the first time, and the specific date of the negotiated transaction amount is not included;
preferably, the regional chain verifier is any network node with a server function on the internet, and any transaction operation of the network node is synchronously copied to all nodes on the regional chain.

Claims (2)

1. A regional chain-based decentralized currency transaction method comprises a transaction fund outflow party Zeyu, a transaction fund inflow party Xinyu and a regional chain verifying party, and is characterized by comprising the following steps:
s1, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate a transaction amount and respectively generate two pairs of associated keys;
s2, after receiving the Xinyu correct key, the fund flow-out party Zeyu transfers the fund to an account of a regional chain verification party and simultaneously generates a key pair;
s3, transferring funds from Zeyu in the area chain verifier account into a fund account of the funds, and generating a key pair by the Xinyu;
s4, the regional chain verifier verifies whether the new key is legal or not, updates the fund accounts of the two parties if the new key is legal, and recovers the initial fund data if the new key is illegal;
the step S1 includes:
s1a, a fund outflow party Zeyu and a fund inflow party Xinyu negotiate transaction amount, the Zeyu generates a pair of initial keys (SK-Z and SK-X) according to system parameters and a current network IP, the key SK-Z is sent to a regional chain verifier, and the key SK-X is sent to the Xinyu;
s1b, after receiving a key SK-X, a fund inflow party Xinyu generates a pair of complementary key pairs (SK-X, SK-X-Z) by a system according to the key SK-X and a network IP where the fund inflow party Xinyu is located, sends the key SK-X to a regional chain verifier, and sends the key SK-X-Z to a fund outflow party Zeyu;
the step S2 includes:
s2a, after receiving the SK-X-Z, the fund outflow party Zeyu generates a pair of keys (SK-X-Z, SK-Z-X) again according to the key SK-X-Z, and temporarily transfers the fund account to the regional chain verifier; and simultaneously, the SK-X-Z and the SK-Z-X are respectively sent to a regional chain verifier and a transaction fund inflow party Xinyu;
s2b, judging whether the fund transfer-out operation of Zeyu is effective or not by the area chain verifier according to the matching degree of the secret key SK-Z and the SK-X, locking the account to enter the next step if the operation is effective, and otherwise, keeping the Zeyu fund account unchanged;
s2c, after receiving the temporary fund of Zeyu, the regional chain verifier issues a fund transfer-out message to the network and waits for the Xinyu to receive the fund;
the step S3 includes:
s3a, after receiving a message issued by a network, a fund inflow party Xinyu temporarily transfers funds received by a regional chain verifier to a fund account of the fund inflow party Xinyu, generates a pair of new key pairs (SK-Z-X-X, SK-Z-X-Z) according to a key SK-Z-X, and respectively sends the key pairs to the fund verifier and a fund outflow party Zeyu;
s3b, judging whether the fund transfer operation of the Xinyu is effective or not by the regional chain verifier according to the matching degree of the secret key SK-X-Z and the SK-Z-X-X, if so, locking the account, issuing a message that the fund transfer operation is received on the network, and entering the next step; otherwise, the account of the area verifier and the account of the fund inflow party Xinyu are unchanged;
the step S4 includes:
s4a, Zeyu judges whether the transaction is correct according to the matching degree of SK-Z-X-Z and SK-X-Z; if the error occurs, the pseudo key LastSK _ W is sent to the area chain verifier, and if the LastSK _ R is correct, the key is sent to the area verifier again;
s4b, receiving LastSK _ R or LastSK _ W of Zeyu by a regional verifying party, judging whether the whole transaction is successful, and if not, recovering the primary account; if Zeyu and Xinyu accounts are successfully updated; both accounts are unlocked whether the entire transaction is successful or not.
2. The regional chain-based decentralized currency transaction method according to claim 1, characterized in that:
the initial key pair SK-Z and SK-X both comprise a transaction amount character string, a network IP character string where Zeyu is located and a specific transaction amount date negotiated by Zeyu and Xinyu, and are generated by adopting a cryptographic algorithm;
the key SK-X-Z at least comprises two time parameters, namely the specific date of the negotiated transaction amount and the specific date of the first time key SK-X is received;
the time parameter in the SK-Z-X is the time parameter when the fund flow-out party Zeyu receives the SK-X-Z for the first time, and the specific date of the negotiated transaction amount is not included any more;
the regional chain verifier is any network node with a server function on the Internet, and any transaction operation of the network node is synchronously copied to all nodes on the regional chain.
CN201810348378.9A 2018-04-18 2018-04-18 Decentralized currency transaction method based on regional chain Active CN108564369B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810348378.9A CN108564369B (en) 2018-04-18 2018-04-18 Decentralized currency transaction method based on regional chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810348378.9A CN108564369B (en) 2018-04-18 2018-04-18 Decentralized currency transaction method based on regional chain

Publications (2)

Publication Number Publication Date
CN108564369A CN108564369A (en) 2018-09-21
CN108564369B true CN108564369B (en) 2021-07-27

Family

ID=63535481

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810348378.9A Active CN108564369B (en) 2018-04-18 2018-04-18 Decentralized currency transaction method based on regional chain

Country Status (1)

Country Link
CN (1) CN108564369B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106339939A (en) * 2016-08-26 2017-01-18 南京喜玛拉云信息技术有限公司 Tamper-proofing distributed bill system based on safety hardware and transaction processing method
CN106504085A (en) * 2016-10-18 2017-03-15 北京天德科技有限公司 A kind of DVP settlement methods based on block chain technology
CN107330787A (en) * 2017-05-24 2017-11-07 智牛股权投资基金(平潭)合伙企业(有限合伙) High frequency transaction payment method, system under a kind of block chain chain of highly effective and safe

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106339939A (en) * 2016-08-26 2017-01-18 南京喜玛拉云信息技术有限公司 Tamper-proofing distributed bill system based on safety hardware and transaction processing method
CN106504085A (en) * 2016-10-18 2017-03-15 北京天德科技有限公司 A kind of DVP settlement methods based on block chain technology
CN107330787A (en) * 2017-05-24 2017-11-07 智牛股权投资基金(平潭)合伙企业(有限合伙) High frequency transaction payment method, system under a kind of block chain chain of highly effective and safe

Also Published As

Publication number Publication date
CN108564369A (en) 2018-09-21

Similar Documents

Publication Publication Date Title
CN109918878B (en) Industrial Internet of things equipment identity authentication and safe interaction method based on block chain
CN110958110B (en) Block chain private data management method and system based on zero knowledge proof
CN109981582B (en) Internet of things equipment identity authentication method based on block chain
CN110069918B (en) Efficient double-factor cross-domain authentication method based on block chain technology
Gong Increasing availability and security of an authentication service
CN100561916C (en) A kind of method and system that upgrades authenticate key
CN110930153B (en) Block chain privacy data management method and system based on hidden third party account
CN109687965A (en) The real name identification method of subscriber identity information in a kind of protection network
CN109359464B (en) Wireless security authentication method based on block chain technology
CN109245894B (en) Distributed cloud storage system based on intelligent contracts
CN109685505B (en) Byzantine fault-tolerant consensus optimization method based on association ring signature
CN110838920B (en) Password authentication and key agreement protocol in web system without storing password related information
CN108965342B (en) Authentication method and system for data requester to access data source
CN113746858B (en) Cross-chain communication method based on verifiable random function
CN110852745A (en) Block chain distributed dynamic network key automatic updating method
CN110519300A (en) Client key method for secure storing based on password bidirectional authentication
CN112488682B (en) Three-party transfer method and device for block chain
CN109728896A (en) A kind of incoming call certification and source tracing method and process based on block chain
US11962698B2 (en) Token node locking with fingerprints authenticated by digital certificates
CN102377573A (en) Double-factor authentication method capable of securely updating password
CN114070567A (en) Zero-knowledge proof equal-block chain identity authentication and privacy protection core technology
CN104717070B (en) A method of being associated with digital certificate using one-way Hash function
CN111865595B (en) Block chain consensus method and device
CN110634072A (en) Block chain transaction system based on multiple tags and hardware encryption and operation mechanism thereof
CN108564369B (en) Decentralized currency transaction method based on regional chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant