CN111369732B - Counterfeit money identification method based on block chain and SDN - Google Patents

Counterfeit money identification method based on block chain and SDN Download PDF

Info

Publication number
CN111369732B
CN111369732B CN202010264733.1A CN202010264733A CN111369732B CN 111369732 B CN111369732 B CN 111369732B CN 202010264733 A CN202010264733 A CN 202010264733A CN 111369732 B CN111369732 B CN 111369732B
Authority
CN
China
Prior art keywords
counterfeit money
sdn controller
money
banknote
modular
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010264733.1A
Other languages
Chinese (zh)
Other versions
CN111369732A (en
Inventor
谢晓嘉
郑文锦
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Chutian Weibao Financial Service Co.,Ltd.
Original Assignee
Wuhan Chutian Weibao Financial Service Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Chutian Weibao Financial Service Co ltd filed Critical Wuhan Chutian Weibao Financial Service Co ltd
Priority to CN202010264733.1A priority Critical patent/CN111369732B/en
Publication of CN111369732A publication Critical patent/CN111369732A/en
Application granted granted Critical
Publication of CN111369732B publication Critical patent/CN111369732B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/04Testing magnetic properties of the materials thereof, e.g. by detection of magnetic imprint
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/16Testing the dimensions
    • G07D7/164Thickness
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/1097Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/06Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
    • H04L9/0643Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0816Key establishment, i.e. cryptographic processes or cryptographic protocols whereby a shared secret becomes available to two or more parties, for subsequent use
    • H04L9/0819Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s)
    • H04L9/0825Key transport or distribution, i.e. key establishment techniques where one party creates or otherwise obtains a secret value, and securely transfers it to the other(s) using asymmetric-key encryption or public key infrastructure [PKI], e.g. key signature or public key certificates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • H04L9/3252Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures using DSA or related signature schemes, e.g. elliptic based signatures, ElGamal or Schnorr schemes

Landscapes

  • Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Toxicology (AREA)
  • Computational Linguistics (AREA)
  • Power Engineering (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention provides a counterfeit money identification method based on a block chain and an SDN (software defined network), wherein a terminal is connected with a switch, the switch is connected with an SDN controller, and the SDN controller is connected with a cloud server to form a counterfeit money identification system for counterfeit money identification. And extracting and processing the characteristic data of the suspected counterfeit money by the terminal, and sending the characteristic data to the SDN controller. And the SDN controller performs data analysis. And when the counterfeit money is judged, the generated identification code and the characteristic data are sent to a cloud server, the received suspected counterfeit money characteristic data and the received true money characteristic information are compared, distinguishing characteristic data are analyzed, a suspected counterfeit money characteristic information base is updated, and meanwhile, a counterfeit money blacklist strategy is created and stored in a block chain node together with the characteristic data. Compared with the traditional method for checking the bank notes by comparing the real bank notes and the bank notes to be checked item by item, the method has the advantages of low resource consumption, high speed, reduction of the characteristic information quantity stored by the terminal, improvement of the security of a switching network and reduction of the risk of stealing.

Description

Counterfeit money identification method based on block chain and SDN
Technical Field
The invention relates to a computer communication technology, in particular to a counterfeit money identification method based on a block chain and an SDN (software defined network).
Background
Blockchains are a term of art in information technology. In essence, the system is a shared database, and the data or information stored in the shared database has the characteristics of 'unforgeability', 'whole-course trace', 'traceability', 'public transparency', 'collective maintenance', and the like. Based on the characteristics, the block chain technology lays a solid 'trust' foundation, creates a reliable 'cooperation' mechanism and has wide application prospect.
The blockchain technology is a new technology composed of technologies such as consensus mechanism, database, cryptography, P2P, etc., and security is always the focus of research of all parties. Information regarding the amount of transactions between the sender, the recipient and the parties is an important part of privacy protection. Without protection, users are at risk of identity theft, illegal transfers, or other potential loss.
Software Defined Networking (SDN) separates the control layer and the data layer of a legacy network hardware device, providing two advantages over legacy networks, where a SDN controller centralized at the control layer provides a full network view of data layer resources, and the SDN controller application provides programmability for network flow configuration of the data layer device.
The identification of bank notes is a method for judging whether the bank notes are forged or not, such as a bank note detector, and can effectively identify the authenticity of the bank notes. The authenticity is distinguished by detecting the inherent characteristics of the RMB. The currency count machine is a mechatronic product, relates to a plurality of fields such as machinery, electricity, light, magnetism. In the prior art, the currency detector or the ATM needs to compare with the currency detection ticket to be detected through the characteristics of the true currency one by one, the comparison workload is large, huge resources need to be consumed, the currency detector or the ATM needs to store the characteristics of the true currency, the characteristics of the true currency are attacked by a hacker, and the true currency characteristic data can be further provided for counterfeit personnel after being illegally stolen, so that serious safety risk is brought. On the other hand, in the prior art, a network used by a currency detector or an ATM cash dispenser belongs to a traditional private network, a switch and a router have multiple executing functions, but face the risk of being easily attacked, and a central centralized control needs to be provided with an independent server, so that more hardware resources are consumed.
Disclosure of Invention
In order to solve the problems in the prior art, the invention provides a counterfeit money identification method based on a block chain and an SDN (software defined network), which can solve the problems that the resource consumption is high when a money detector or an ATM cash dispenser detects money, the real money characteristic is easy to steal, the security of a transmission network is low, and the resource consumption is caused when a central server is established.
The invention provides a counterfeit money identification method based on a block chain and an SDN (software defined network), which comprises the following steps that a terminal is connected with a switch, the switch is connected with an SDN controller, the SDN controller is connected with a cloud server to form a counterfeit money identification system, and the counterfeit money identification system executes the following steps:
A0. the SDN controller issues suspected counterfeit money characteristic information to all terminals of the whole network, whether the money to be verified is suspected counterfeit money can be preliminarily judged according to the suspected counterfeit money characteristic information, and the suspected counterfeit money characteristic information only comprises physical information, such as texture, patterns, magnetism, thickness, spectrum and the like, of the suspected counterfeit money different from the genuine money;
A. when the terminal judges that the money to be verified is suspected counterfeit money, the terminal extracts feature data of the suspected counterfeit money, packages the feature data into a data packet, and adds a label to the data packet, wherein the label indicates that the data packet is the suspected counterfeit money;
B. the terminal sends the data packet to the switch, and the switch forwards the data packet to the SDN controller after recognizing the label;
C. the SDN controller reads the data packet, analyzes feature data in the data packet according to a real banknote feature information base obtained from the cloud server, and executes step D if the suspected counterfeit banknote corresponding to the feature data is identified to be a counterfeit banknote after analysis, or executes step H, wherein the real banknote feature information base is stored in the cloud server;
D. the SDN controller generates an identification code according to the characteristic data, the identification code and the characteristic data are sent to the cloud server, and the cloud server establishes an archive library of the counterfeit money corresponding to the characteristic data; the SDN controller compares the received characteristic data with a genuine banknote characteristic information base, analyzes distinguishing characteristic data and updates the distinguishing characteristic data into a suspected counterfeit banknote characteristic information base;
E. the SDN controller creates a counterfeit money blacklist strategy according to the feature data and the identification code, stores the blacklist strategy and the feature data into a block chain node, and ensures the safety of information stored in the block chain node through an intelligent contract;
F. the SDN controller sends the related information of the block chain nodes to the switch, and the switch sends the related information of the block chain nodes to all terminals of the whole network;
G. all terminals of the whole network read the blacklist strategy in the block chain node and execute the blacklist strategy;
H. and the SDN controller issues an instruction to the terminal, wherein the instruction indicates that the suspected counterfeit money is the true money.
The terminal extracts the characteristic data of the suspected counterfeit money, and the characteristic data is extracted through magnetic analysis, laser detection, infrared detection and fluorescence detection. The terminal further includes: ATM cash dispensers, ATM cash depositing and withdrawing machines, currency detectors, currency counters, and the like.
The SDN controller generates an identification code according to the feature data, and the step of generating a unique identification code according to the feature data by using a hash function.
The blacklist strategy comprises the steps of dividing the grade of the counterfeit money, belonging to high imitation if the similarity of the counterfeit money and the genuine money is more than 90%, and needing first-grade warning; the similarity between the banknote and the real banknote is greater than 50% and less than 90%, and the banknote belongs to middle simulation, and secondary warning is required; the similarity of the banknote to the real banknote is less than 50%, and the low-level simulation requires three-level warning.
The intelligent contract algorithm used by the intelligent contract further comprises a signature encryption algorithm, and the specific signature encryption algorithm is as follows:
firstly, a digital signature is needed to be used for identity authentication in an encryption algorithm;
the first step, element operation on a finite field, which is divided into four levels: modular addition and modular subtraction, modular multiplication, modular exponentiation and modular inversion, modular division,
modulo addition c ═ a + b mod p, declared add (a, b, c, p),
the modulo-minus operation c ═ a-b) mod p, declared as sub (a, b, c, p),
the modulo multiplication c ═ a × b mod p, declared as mul (a, b, c, p),
modular exponentiation with c as abmod p, declared as ind (a, b, c, p), where,
a, b and c are integers, and p is a prime number;
the modular inverse can be obtained by the Fermat theorem, i.e. when p is prime, there is ap-11mod p, then the modulo inverse a can be obtained-1≡ap-2mod p, which may represent a modular inverse operation using modular exponentiation, the modular inverse operation c ≡ a-1mod p states inv (a, c, p) ind (a, p-2, c, p); firstly, solving the modular inverse of the denominator and then carrying out modular multiplication operation on the denominator and the numerator to obtain modular division operation; firstly, solving the modular inverse of the denominator and then carrying out modular multiplication operation on the denominator and the numerator to obtain modular division operation;
the second step, the design and implementation of scalar multiplication operation,
adopting an operation rule under an affine and Jacobian mixed coordinate system, namely Y2=x3+axz4+bz6Wherein a, b are integers on an elliptic curve, and Δ ═ 4a3+27b2)mod p≠0;
Three dimensional coordinate P (x)1,y1,z1),Q(x2,y2The infinity point of 1) is (1,1, 0); multiplication operation P + P ═ x3,y3,z3) Declared as Padd1 (x)1,y1,z1,x3,y3,z3) The dot addition operation P + Q ═ x3,y3,z3) Declared as Padd2 (x)1,y1,z1,x2,y2,x3,y3,z3) The 2 functions Padd1 and Padd2 are simply intermediate calling functions, and the result (x)3,y3,z3) From the conversion down to the affine coordinate system under the jacobian-weighted photography coordinate system, the parameters need to be converted x3=x3/z1 2,y3=y3/z1 3Then the required two-dimensional coordinate point (x) can be obtained3,y3);
Setting parameters of known finite field elliptic curves: a prime number p, a coefficient a, b, coordinates (Gx, Gy) ≠ 0 of a base point G, an order N of G, a private key held by a user a is dA, a public key paired with the private key is Pa (xA, yA), the identity ID of a signer is converted into IDa with a length of idlen a bits, an integer idlen is represented by 2 bytes of idlean, Za is defined as a hash value formed by a personal ID of the user a and an elliptic curve parameter, Za ═ ZCZ (idlna | a | b | Gx | yA), the parameter Za | is required in both a generation algorithm of the digital signature and a verification algorithm of the digital signature to represent personal information of the user a, and N | M is set, and the hash result is hash function value (N);
and the third step, a digital signature generation algorithm,
1) generating a random number k by using a random number generator, wherein k is more than 0 and less than n;
2) calculating the point (x, y) of the elliptic curve as [ k ] G;
3) calculating r ═ (m + x) mod n, if r ═ 0 or r + k ═ n, returning to the step 1, otherwise, proceeding to the next step;
4) calculate s ═ ((1+ dA)-1) (k-rdA)) mod n, if s is equal to 0, returning to the step 1, otherwise, performing the next step;
5) successfully signing and outputting a signature message M and signatures r and s thereof;
and the fourth step, the digital signature verification algorithm,
1) checking whether r and s both belong to [0, n ];
2) calculating t as (r + s) mod n, and if t is 0, the verification is not passed;
3) calculating a point (x, y) ═ s ] G + [ t ] P on the elliptic curve;
4)R=(e+x)mod n;
5) if R ═ R, the verification passes, otherwise, the verification fails.
Compared with the prior art, the invention has the following beneficial effects:
1. the suspected counterfeit money characteristic information base is arranged, the suspected counterfeit money characteristic information base only comprises the known distinguishing characteristic information of the counterfeit money and the real money, the characteristic information quantity is small, when the terminal compares the to-be-verified money according to the suspected counterfeit money characteristic information, the resource consumption is small, the speed is high, the suspected counterfeit money can be rapidly identified, and the pressure of the terminal for storing a large amount of characteristic information is reduced due to the small characteristic information quantity.
2. The terminal only stores suspected counterfeit money characteristic information, the network protection capability of the terminal is low, the terminal is most vulnerable to hacker attack, and the risk that the genuine money characteristic information is stolen after the hacker attack is avoided.
3. By utilizing the characteristics of the SDN, a blacklist strategy is created through the SDN controller, suspected counterfeit money characteristic data and blacklist strategy data are transmitted through a switch of the SDN, programming in the SDN controller is facilitated, and the forwarding speed of the switch of the SDN is higher and more stable.
4. The blacklist strategy and the characteristic data are stored through the block chain, the safety of the blacklist strategy and the characteristic data is guaranteed by using the non-tamper property of the block chain, and the risk of being stolen is reduced.
5. Through suspected counterfeit money characteristic information, the terminal is primarily screened, and then secondary screening is performed through the SDN controller, so that the resource pressure of screening of the terminal and the SDN controller is reduced through secondary screening, and the screening speed is increased.
6. Through the suspected counterfeit money characteristic information continuously submitted by the terminal, the SDN controller can update the suspected counterfeit money characteristic information in time, and the updated suspected counterfeit money characteristic information can be quickly transmitted to all terminals of the whole network by using the central control advantage of the SDN controller, so that the identification rate of all terminals of the whole network is improved.
Drawings
Specific features of embodiments of the technology are set forth in the accompanying description. A better understanding of the features and advantages of the described technology will be obtained by reference to the following detailed description that sets forth illustrative embodiments, in which the principles of the invention are utilized, and the accompanying drawings of which:
fig. 1 shows an exemplary block chain.
Figure 2 shows a counterfeit banknote identification system based on a blockchain and SDN. Fig. 3 shows a flow chart.
Detailed Description
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings, in which like numerals in different drawings represent the same or similar elements, unless otherwise specified. The implementations set forth in the following description of exemplary embodiments consistent with the present invention do not represent all implementations consistent with the present invention. Instead, they are merely examples of systems and methods consistent with aspects related to the described invention.
The blockchain technique was originally derived from Bitcoin (Bitcoin) proposed in 2008 by self-centered intelligence (Satoshi Nakamoto). The distributed network transaction accounting system is a distributed network transaction accounting system, integrates technologies such as a P2P network, asymmetric encryption and digital signatures, a hash algorithm, a workload certification mechanism and the like, and can record large-scale network transactions completely and safely. This is mainly achieved by creating blocks. The characteristics of being not easy to be tampered, traceable, difficult to forge and the like are obvious advantages of the block chain technology.
The breakthrough of blockchain technology is actually a breakthrough of database systems in nature. The conventional database, whether a relational database (Mysql, DB2, SQLite) or a non-relational database (LevelDB, CouchDB), can perform arbitrary operations of adding, deleting, modifying, and querying data, and can also delete these data operation records together. The characteristics of the blockchain technique can change this state.
Although the use of the block chain technology is more and more diversified, the project system tends to be mature, but the block chain is still not separated from the project system, the block chain has a plurality of commonalities on a bottom layer framework, various Hash algorithms need to be used in the cryptography technology, a database is selected according to the storage condition, and a proper consensus algorithm is selected according to the application scene.
Fig. 1 illustrates an exemplary blockchain in accordance with various embodiments. As shown in fig. 1, at the application level, financial, medical, supply chain, etc. are leading-edge application areas of blockchain technology; the service is provided for the outside through the API and the SDK, a service layer needs to realize the transmission of information on a P2P network, the confirmation of data on a consensus mechanism and the processing of logic on an intelligent contract; the bottom layer generally provides three types of chain-type processing.
The blockchain adopts a safe storage model, adopts distributed accounting, and is essentially a distributed storage system. In a blockchain network, each node stores every transaction in the system, which is traceable and not modifiable. The blockchain technique relies on a decentralized P2P network, where all nodes are peer-to-peer and open. The method is applied to the transaction through asymmetric encryption and digital signature technology to ensure the correctness and the safety of transaction data. The consensus mechanism is a strategy in which nodes in a block chain form a consistent decision for a transaction block, and has an important influence on the time for completing a transaction. From a security perspective, smart contracts are used as a technical means to secure a blockchain.
As shown in fig. 2, the counterfeit money identification system includes a terminal connected to a switch, the switch is connected to an SDN controller, the SDN controller is connected to a cloud server to form a counterfeit money identification system, and the counterfeit money identification system executes the following steps:
A0. the SDN controller issues suspected counterfeit money characteristic information to all terminals of the whole network, whether the money to be verified is suspected counterfeit money can be preliminarily judged according to the suspected counterfeit money characteristic information, and the suspected counterfeit money characteristic information only comprises physical information, such as texture, patterns, magnetism, thickness, spectrum and the like, of the suspected counterfeit money different from the genuine money;
A. when the terminal judges that the money to be verified is suspected counterfeit money, the terminal extracts feature data of the suspected counterfeit money, packages the feature data into a data packet, and adds a label to the data packet, wherein the label indicates that the data packet is the suspected counterfeit money;
B. the terminal sends the data packet to the switch, and the switch forwards the data packet to the SDN controller after recognizing the label;
C. the SDN controller reads the data packet, analyzes feature data in the data packet according to a real banknote feature information base obtained from the cloud server, and executes step D if the suspected counterfeit banknote corresponding to the feature data is identified to be a counterfeit banknote after analysis, or executes step H, wherein the real banknote feature information base is stored in the cloud server;
D. the SDN controller generates an identification code according to the characteristic data, the identification code and the characteristic data are sent to the cloud server, and the cloud server establishes an archive library of the counterfeit money corresponding to the characteristic data; the SDN controller compares the received characteristic data with a genuine banknote characteristic information base, analyzes distinguishing characteristic data and updates the distinguishing characteristic data into a suspected counterfeit banknote characteristic information base;
E. the SDN controller creates a counterfeit money blacklist strategy according to the feature data and the identification code, stores the blacklist strategy and the feature data into a block chain node, and ensures the safety of information stored in the block chain node through an intelligent contract;
F. the SDN controller sends the related information of the block chain nodes to the switch, and the switch sends the related information of the block chain nodes to all terminals of the whole network;
G. all terminals of the whole network read the blacklist strategy in the block chain node and execute the blacklist strategy;
H. and the SDN controller issues an instruction to the terminal, wherein the instruction indicates that the suspected counterfeit money is the true money.
The terminal extracts the characteristic data of the suspected counterfeit money, and the characteristic data is extracted through magnetic analysis, laser detection, infrared detection and fluorescence detection. The terminal further includes: ATM cash dispensers, ATM cash depositing and withdrawing machines, currency detectors, currency counters, and the like.
The SDN controller generates an identification code according to the feature data, and the step of generating a unique identification code according to the feature data by using a hash function.
The blacklist strategy comprises the steps of dividing the grade of the counterfeit money, belonging to high imitation if the similarity of the counterfeit money and the genuine money is more than 90%, and needing first-grade warning; the similarity between the banknote and the real banknote is greater than 50% and less than 90%, and the banknote belongs to middle simulation, and secondary warning is required; the similarity of the banknote to the real banknote is less than 50%, and the low-level simulation requires three-level warning.
The specific encryption algorithm involved in the intelligent contract is as follows: in the encryption algorithm, firstly, a digital signature is used for identity authentication.
The first step, element operation on a finite field, which is divided into four levels: modulo addition and modulo subtraction, modulo multiplication, modulo power and modulo inversion, modulo division, modulo addition c ═ a + b) mod p, declared add (a, b, c, p), modulo subtraction c ═ a-b) mod p, declared sub (a, b, c, p),
the modulo multiplication c ═ a × b mod p, declared as mul (a, b, c, p),
modular exponentiation with c as abmod p, declared as ind (a, b, c, p), where a, b, c are integers and p is a prime number. The modular inverse can be obtained by the Fermat theorem, i.e. when p is prime, there is ap-11mod p, then the modulo inverse a can be obtained-1≡ap-2mod p, which may represent a modular inverse operation using modular exponentiation, the modular inverse operation c ≡ a-1mod p states inv (a, c, p) ind (a, p-2, c, p).
The second step, the design and realization of scalar multiplication operation adopts the operation rule of Y in the affine and Jacobian mixed coordinate system2=x3+axz4+bz6Wherein a, b are integers on an elliptic curve, and Δ ═ 4a3+27b2) mod P ≠ 0, three-dimensional coordinate P (x)1,y1,z1),Q(x2,y2And 1) the infinity point is (1,1, 0). Multiplication operation P + P ═ x3,y3,z3) Declared as Padd1 (x)1,y1,z1,x3,y3,z3) The dot addition operation P + Q ═ x3,y3,z3) Declared as Padd2 (x)1,y1,z1,x2,y2,x3,y3,z3) The 2 functions Padd1 and Padd2 are simply intermediate calling functions, and the result (x)3,y3,z3) Emphasizing camera coordinates from jacobian
Down-conversion to affine coordinate system requires conversion of parameters x3=x3/z1 2,y3=y3/z1 3Then the required two-dimensional coordinate point (x) can be obtained3,y3)。
Setting parameters of known finite field elliptic curves: prime number p, coefficients a, b, coordinates (Gx, Gy) ≠ 0 for base point G, order n for G. The private key held by the user A is dA, and the public key paired with dA is Pa (xA, yA). The identity ID of the signer is converted into IDa with a length of idlen bits, and the integer idlen is represented by 2 bytes of idlenA. Za is defined as a hash value of the personal id of user a and an elliptic curve parameter, Za ═ ZCZ (idlean | a | b | Gx | xA | yA), which is required in both the digital signature generation algorithm and the digital signature verification algorithm to represent the personal information of user a. Let N ═ Za | M, hash function value result e ═ hash (N).
Thirdly, generating a random number k by using a random number generator according to a digital signature generation algorithm, wherein k is more than 0 and less than n;
calculating the point (x, y) of the elliptic curve as [ k ]]G; calculating r ═ (m + x) mod n, if r ═ 0 or r + k ═ n, returning to the step 1, otherwise, proceeding to the next step; calculate s ═ ((1+ dA)-1) (k-rdA)) mod n, if s is equal to 0, returning to the step 1, otherwise, performing the next step; the signature is successful and the signed message M and its signatures r and s are output.
Step four, a digital signature verification algorithm 1) checks whether r and s both belong to [0, n ]; 2) calculating t as (r + s) mod n, and if t is 0, the verification is not passed; 3) calculating a point (x, y) ═ s ] G + [ t ] P on the elliptic curve; 4) r ═ e + x) mod n; 5) if R ═ R, the verification passes, otherwise, the verification fails.
The invention provides a counterfeit money identification method based on a block chain and an SDN (software defined network), which can solve the problems that the resource consumption is high when a money detector or an ATM cash dispenser detects money, the real money characteristic is easy to steal, the security of a transmission network is low, and the resource consumption is caused when a central server is established. The following advantageous properties are further achieved:
1. the suspected counterfeit money characteristic information base is arranged, the suspected counterfeit money characteristic information base only comprises the known distinguishing characteristic information of the counterfeit money and the real money, the characteristic information quantity is small, when the terminal compares the to-be-verified money according to the suspected counterfeit money characteristic information, the resource consumption is small, the speed is high, the suspected counterfeit money can be rapidly identified, and the pressure of the terminal for storing a large amount of characteristic information is reduced due to the small characteristic information quantity.
2. The terminal only stores suspected counterfeit money characteristic information, the network protection capability of the terminal is low, the terminal is most vulnerable to hacker attack, and the risk that the genuine money characteristic information is stolen after the hacker attack is avoided.
3. By utilizing the characteristics of the SDN, a blacklist strategy is created through the SDN controller, suspected counterfeit money characteristic data and blacklist strategy data are transmitted through a switch of the SDN, programming in the SDN controller is facilitated, and the forwarding speed of the switch of the SDN is higher and more stable.
4. The blacklist strategy and the characteristic data are stored through the block chain, the safety of the blacklist strategy and the characteristic data is guaranteed by using the non-tamper property of the block chain, and the risk of being stolen is reduced.
5. Through suspected counterfeit money characteristic information, the terminal is primarily screened, and then secondary screening is performed through the SDN controller, so that the resource pressure of screening of the terminal and the SDN controller is reduced through secondary screening, and the screening speed is increased.
6. Through the suspected counterfeit money characteristic information continuously submitted by the terminal, the SDN controller can update the suspected counterfeit money characteristic information in time, and the updated suspected counterfeit money characteristic information can be quickly transmitted to all terminals of the whole network by using the central control advantage of the SDN controller, so that the identification rate of all terminals of the whole network is improved.
The above description is only of the preferred embodiments of the present invention, and it should be noted that: it will be apparent to those skilled in the art that various modifications and adaptations can be made without departing from the principles of the invention and these are intended to be within the scope of the invention.

Claims (6)

1. A counterfeit money identification method based on a block chain and an SDN (software defined network) is characterized in that a terminal is connected with a switch, the switch is connected with an SDN controller, the SDN controller is connected with a cloud server to form a counterfeit money identification system, and the counterfeit money identification system executes the following steps:
A0. the SDN controller issues suspected counterfeit money characteristic information to all terminals of the whole network, whether the money to be verified is suspected counterfeit money can be preliminarily judged according to the suspected counterfeit money characteristic information, and the suspected counterfeit money characteristic information only comprises physical information, such as texture, patterns, magnetism, thickness, spectrum and the like, of the suspected counterfeit money different from the genuine money;
A. when the terminal judges that the money to be verified is suspected counterfeit money, the terminal extracts feature data of the suspected counterfeit money, packages the feature data into a data packet, and adds a label to the data packet, wherein the label indicates that the data packet is the suspected counterfeit money;
B. the terminal sends the data packet to the switch, and the switch forwards the data packet to the SDN controller after recognizing the label;
C. the SDN controller reads the data packet, analyzes feature data in the data packet according to a real banknote feature information base obtained from the cloud server, and executes step D if the suspected counterfeit banknote corresponding to the feature data is identified to be a counterfeit banknote through analysis, otherwise executes the SDN controller to issue an instruction to the terminal, wherein the instruction indicates that the suspected counterfeit banknote is a real banknote, and the real banknote feature information base is stored in the cloud server;
D. the SDN controller generates an identification code according to the characteristic data, the identification code and the characteristic data are sent to the cloud server, and the cloud server establishes an archive library of the counterfeit money corresponding to the characteristic data; the SDN controller compares the received characteristic data with a genuine banknote characteristic information base, analyzes distinguishing characteristic data and updates the distinguishing characteristic data into a suspected counterfeit banknote characteristic information base;
E. the SDN controller creates a counterfeit money blacklist strategy according to the feature data and the identification code, stores the blacklist strategy and the feature data into a block chain node, and ensures the safety of information stored in the block chain node through an intelligent contract;
F. the SDN controller sends the related information of the block chain nodes to the switch, and the switch sends the related information of the block chain nodes to all terminals of the whole network;
G. and all terminals of the whole network read the blacklist strategy in the block chain node and execute the blacklist strategy.
2. The counterfeit banknote identification method according to claim 1, wherein the step a further comprises:
the terminal extracts the characteristic data of the suspected counterfeit money, and the characteristic data is extracted through magnetic analysis, laser detection, infrared detection and fluorescence detection.
3. The counterfeit banknote identification method according to claim 1, wherein the step D further comprises:
the SDN controller generates an identification code according to the feature data, and the step of generating a unique identification code according to the feature data by using a hash function.
4. The counterfeit banknote identification method according to claim 1, wherein the step E further comprises:
the blacklist strategy comprises the steps of dividing the grade of the counterfeit money, belonging to high imitation if the similarity of the counterfeit money and the genuine money is more than 90%, and needing first-grade warning; the similarity between the banknote and the real banknote is greater than 50% and less than 90%, and the banknote belongs to middle simulation, and secondary warning is required; the similarity of the banknote to the real banknote is less than 50%, and the low-level simulation requires three-level warning.
5. The counterfeit money identification method based on the blockchain and SDN (software defined network) according to claim 1, wherein the terminal further comprises: ATM cash dispensers, ATM cash depositing and withdrawing machines, currency detectors, currency counters, and the like.
6. The counterfeit money identification method based on the blockchain and SDN (software defined network) as claimed in claim 1, wherein the smart contract algorithm used by the smart contract further comprises a signature encryption algorithm, and the specific signature encryption algorithm is as follows:
firstly, a digital signature is needed to be used for identity authentication in an encryption algorithm;
the first step, element operation on a finite field, which is divided into four levels: modular addition and modular subtraction, modular multiplication, modular exponentiation and modular inversion, modular division,
modulo addition c ═ a + b mod p, declared add (a, b, c, p),
the modulo-minus operation c ═ a-b) mod p, declared as sub (a, b, c, p),
the modulo multiplication c ═ a × b mod p, declared as mul (a, b, c, p),
modular exponentiation with c as abmod p, declared as ind (a, b, c, p), where,
a, b and c are integers, and p is a prime number;
the modular inverse can be obtained by the Fermat theorem, i.e. when p is prime, there is ap-11mod p, then the modulo inverse a can be obtained-1≡ap-2mod p, which may represent a modular inverse operation using modular exponentiation, the modular inverse operation c ≡ a-1mod p states inv (a, c, p) ind (a, p-2, c, p); firstly, solving the modular inverse of the denominator and then carrying out modular multiplication operation on the denominator and the numerator to obtain modular division operation; firstly, solving the modular inverse of the denominator and then carrying out modular multiplication operation on the denominator and the numerator to obtain modular division operation;
the second step, the design and implementation of scalar multiplication operation,
adopting an operation rule under an affine and Jacobian mixed coordinate system, namely Y2=x3+axz4+bz6Wherein a, b are integers on an elliptic curve, and Δ ═ 4a3+27b2)modp≠0;
Three dimensional coordinate P (x)1,y1,z1),Q(x2,y2The infinity point of 1) is (1,1, 0); multiplication operation P + P ═ x3,y3,z3) Declared as Padd1 (x)1,y1,z1,x3,y3,z3) The dot addition operation P + Q ═ x3,y3,z3) Declared as Padd2 (x)1,y1,z1,x2,y2,x3,y3,z3)2 functions Padd1 and Padd2 are simply middleInter-call function, to put result (x)3,y3,z3) From the conversion down to the affine coordinate system under the jacobian-weighted photography coordinate system, the parameters need to be converted x3=x3/z1 2,y3=y3/z1 3Then the required two-dimensional coordinate point (x) can be obtained3,y3);
Setting parameters of known finite field elliptic curves: a prime number p, a coefficient a, b, coordinates (Gx, Gy) ≠ 0 of a base point G, an order N of G, a private key held by a user a is dA, a public key paired with the private key is Pa (xA, yA), the identity ID of a signer is converted into IDa with a length of idlen a bits, an integer idlen is represented by 2 bytes of idlean, Za is defined as a hash value formed by a personal ID of the user a and an elliptic curve parameter, Za ═ ZCZ (idlna | a | b | Gx | yA), the parameter Za | is required in both a generation algorithm of the digital signature and a verification algorithm of the digital signature to represent personal information of the user a, and N | M is set, and the hash result is hash function value (N);
and the third step, a digital signature generation algorithm,
1) generating a random number k by using a random number generator, wherein k is more than 0 and less than n;
2) calculating the point (x, y) of the elliptic curve as [ k ] G;
3) calculating r ═ (m + x) mod n, if r ═ 0 or r + k ═ n, returning to the step 1, otherwise, proceeding to the next step;
4) calculate s ═ ((1+ dA)-1) (k-rdA)) mod n, if s is equal to 0, returning to the step 1, otherwise, performing the next step;
5) successfully signing and outputting a signature message M and signatures r and s thereof;
and the fourth step, the digital signature verification algorithm,
1) checking whether r and s both belong to [0, n ];
2) calculating t as (r + s) mod n, and if t is 0, the verification is not passed;
3) calculating a point (x, y) ═ s ] G + [ t ] P on the elliptic curve;
4)R=(e+x)mod n;
5) if R ═ R, the verification passes, otherwise, the verification fails.
CN202010264733.1A 2020-04-07 2020-04-07 Counterfeit money identification method based on block chain and SDN Active CN111369732B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010264733.1A CN111369732B (en) 2020-04-07 2020-04-07 Counterfeit money identification method based on block chain and SDN

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010264733.1A CN111369732B (en) 2020-04-07 2020-04-07 Counterfeit money identification method based on block chain and SDN

Publications (2)

Publication Number Publication Date
CN111369732A CN111369732A (en) 2020-07-03
CN111369732B true CN111369732B (en) 2021-05-11

Family

ID=71209290

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010264733.1A Active CN111369732B (en) 2020-04-07 2020-04-07 Counterfeit money identification method based on block chain and SDN

Country Status (1)

Country Link
CN (1) CN111369732B (en)

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7676501B2 (en) * 2008-03-22 2010-03-09 Wilson Kelce S Document integrity verification
CN103761795A (en) * 2014-02-27 2014-04-30 华中科技大学 Method for identifying counterfeit money of paper money anti-counterfeit feature database
CN104063952A (en) * 2014-07-07 2014-09-24 魏伟 Counterfeit money information management method and system
CN108197957A (en) * 2018-01-12 2018-06-22 北京欧链科技有限公司 A kind of method for anti-counterfeit and system based on block chain
CN110517049A (en) * 2019-07-25 2019-11-29 初建刚 A kind of bill anti-counterfeit recognition methods and device based on two dimensional code and block chain

Also Published As

Publication number Publication date
CN111369732A (en) 2020-07-03

Similar Documents

Publication Publication Date Title
Jogenfors Quantum bitcoin: an anonymous, distributed, and secure currency secured by the no-cloning theorem of quantum mechanics
Yavuz et al. BAF: An efficient publicly verifiable secure audit logging scheme for distributed systems
Srinivas et al. Designing anonymous signature-based authenticated key exchange scheme for Internet of Things-enabled smart grid systems
CN109768988A (en) Decentralization Internet of Things security certification system, facility registration and identity identifying method
CN112132577B (en) Multi-supervision transaction processing method and device based on block chain
CN105577356B (en) Based on method of data capture in the smart grid protected to privacy of user
Xiao et al. Secure and efficient multi-signature schemes for fabric: An enterprise blockchain platform
CN116881981B (en) Digital signature system and method based on certificate
CN104184588A (en) Undetachable digital signature method based on identity
CN107332665A (en) A kind of Partial Blind Signature method of identity-based on lattice
CN112769548B (en) Block chain numerical information transmission method, system, device and computer medium
CN116823456A (en) Heterogeneous chain cross-chain asset transaction method and system for identity privacy protection
Mambo et al. Unlinkable electronic coupon protocol with anonymity control
CN111369732B (en) Counterfeit money identification method based on block chain and SDN
CN112184245B (en) Transaction identity confirmation method and device for cross-region block chain
Kamuni et al. Secure energy market against cyber attacks using blockchain
Yadav et al. Adoptation of Blockchain of Things (BCOT): Oppurtunities & Challenges
Nishide et al. Security of offline anonymous electronic cash systems against insider attacks by untrusted authorities revisited
CN112769567A (en) Block chain HD private key retrieving method
Yang et al. A Hybrid Blockchain-Based Authentication Scheme for Smart Home
CN111340489A (en) Custodable transaction recipient protection method and apparatus
Blake-Wilson Information security, mathematics, and public-key cryptography
Maram Bitcoin generation using Blockchain technology
Ko et al. Private key recovery on Bitcoin with duplicated signatures
CN112581051A (en) Novel logistics system based on block chain technology

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20210422

Address after: 430000, No. 78, changteng street, Jianghan District, Wuhan City, Hubei Province

Applicant after: Wuhan Chutian Weibao Financial Service Co.,Ltd.

Address before: 103-104, ground floor, Huatai Building, No. 1, Lane 11, Nansha New Village, Lequn community, Xixiang street, Bao'an District, Shenzhen City, Guangdong Province

Applicant before: Shenzhen zheji Network Technology Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant