CN112991058A - Verification method and system for transaction based on block chain - Google Patents

Verification method and system for transaction based on block chain Download PDF

Info

Publication number
CN112991058A
CN112991058A CN202110192019.0A CN202110192019A CN112991058A CN 112991058 A CN112991058 A CN 112991058A CN 202110192019 A CN202110192019 A CN 202110192019A CN 112991058 A CN112991058 A CN 112991058A
Authority
CN
China
Prior art keywords
transaction
verified
payment
hash value
block
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110192019.0A
Other languages
Chinese (zh)
Other versions
CN112991058B (en
Inventor
余鸿忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Block Power Guangzhou Technology Co Ltd
Original Assignee
Block Power Guangzhou Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Block Power Guangzhou Technology Co Ltd filed Critical Block Power Guangzhou Technology Co Ltd
Priority to CN202110192019.0A priority Critical patent/CN112991058B/en
Publication of CN112991058A publication Critical patent/CN112991058A/en
Application granted granted Critical
Publication of CN112991058B publication Critical patent/CN112991058B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

The invention is applicable to the technical field of block chain verification, and provides a verification method for performing transactions based on a block chain, which comprises the steps of obtaining a block position corresponding to a payment transaction to be verified, verifying the existence of the transaction to be verified and the payment transaction according to the block position corresponding to the payment transaction to be verified, and if the verification exists, verifying the authenticity of the transaction to be verified and the payment transaction comprises the following steps: encrypting the payment transaction to be verified and broadcasting the encrypted payment transaction to the block link points, and verifying the encrypted payment transaction to be verified by the block link points; further comprising: generating a secondary authentication base number according to the amount of the transaction to be verified and paid, generating secondary encryption information by using the secondary authentication base number, the current time and a public key, acquiring the broadcast signature information, the transaction to be verified and paid and the position information of a client of the secondary encryption information at a block link point, and requesting to call a camera of the client to perform face recognition, wherein if the face recognition is successful, the transaction verification is passed; thereby increasing the level of authentication of the blockchain.

Description

Verification method and system for transaction based on block chain
Technical Field
The invention belongs to the technical field of block chain verification, and particularly relates to a verification method and a verification system for transactions based on a block chain.
Background
At present, the safety of the block chain virtual assets cannot be guaranteed, for example, a shopping platform is used, when the shopping platform carries out money amount verification, only the legality of data is verified, but the legality of money amount and the legality of an initiator are not verified; therefore, lawless persons can be given the opportunity.
Disclosure of Invention
In view of the defects of the prior art, the present invention aims to provide a verification method for transactions based on a blockchain, and aims to solve the problems of large loophole and low safety factor of blockchain transactions due to the fact that the prior art cannot provide an effective verification method for transactions based on a blockchain.
In one aspect, the present invention provides a method for verifying a transaction based on a blockchain, the method comprising the steps of:
acquiring the block position corresponding to the payment transaction to be verified,
verifying the existence of the transaction of the payment to be verified according to the block position corresponding to the transaction of the payment to be verified, and if the existence of the transaction of the payment to be verified is verified, verifying the authenticity of the transaction of the payment to be verified;
the verifying the authenticity of the transaction of the payment to be verified comprises: encrypting the payment transaction to be verified and broadcasting the encrypted payment transaction to the block link point, and verifying the encrypted payment transaction to be verified by the block link point.
Further, the obtaining the block position corresponding to the payment transaction to be verified includes:
calculating a transaction hash value of the payment to be verified;
acquiring and storing a block head of the longest chain in a block chain from a block chain network;
acquiring a Mercker tree hash value authentication path corresponding to payment to be verified, and calculating a first root hash value of the Mercker tree according to the hash value authentication path;
and comparing the first root hash value with a second root hash value of the Mercker tree in the local block head, and if the first root hash value and the second root hash value are consistent, positioning the block corresponding to the first root hash value.
Further, said verifying the presence of the transaction for the payment to be verified comprises:
verifying whether the block head of the block is contained in the known longest chain according to the position of the block, and if not, failing the verification.
Further, the encrypting and broadcasting the payment transaction to be verified to the block chain node comprises:
the transaction hash value of the payment to be verified is calculated, and the transaction hash value of the payment to be verified is asymmetrically encrypted to generate signature information;
broadcasting the signature information and the transaction of the payment to be verified to a block link point;
the asymmetric encryption of the transaction hash value of the payment to be verified to generate signature information comprises: and carrying out asymmetric encryption on the transaction hash value of the payment to be verified by using a public key to generate signature information.
Further, the verifying the encrypted payment transaction to be verified by the block link node comprises:
acquiring signature information and a transaction of payment to be verified;
asymmetrically decrypting the signature information by using a private key corresponding to the public key to obtain a decrypted hash value;
performing hash operation on the transaction of the payment to be verified by using the same hash algorithm as the hash algorithm for calculating the transaction hash value of the payment to be verified to obtain a secondary hash value;
and comparing the decrypted hash value with the secondary hash value, and if the comparison is consistent, passing the verification.
Further preferably, the method further comprises the following steps:
generating a secondary authentication base number according to the amount of the transaction to be verified and paid, and generating secondary encryption information by using the secondary authentication base number, the current time and the public key;
and broadcasting the secondary encryption information to the block link points.
Further preferably, the method further comprises the following steps: acquiring secondary encryption information;
after the verification is passed, the method further comprises the following steps:
acquiring the time of the received secondary encrypted information, and asymmetrically decrypting the secondary encrypted information by using a private key corresponding to the public key and the time of the received secondary encrypted information to generate a secondary authentication base number;
extracting the amount of the transaction to be verified and paid from the secondary authentication base number, comparing the amount of the transaction to be verified and paid with the amount of the acquired transaction to be verified and paid, and if the comparison is consistent, the transaction verification is passed;
before the transaction verification is passed, the method further comprises the following steps:
and acquiring the position information of the client broadcasting the signature information and the to-be-verified payment and the position information of the secondary encryption information, and requesting to call a camera of the client to perform face recognition, wherein if the face recognition is successful, the transaction verification is passed.
In another aspect, the present invention provides a verification system for conducting a transaction based on a blockchain, the system comprising:
the client unit is used for acquiring a block position corresponding to the payment transaction to be verified;
verifying the existence of the transaction of the payment to be verified according to the block position corresponding to the transaction of the payment to be verified;
the block chain link point unit is used for verifying the authenticity of the transaction to be verified and paid;
the client secondary encryption unit generates a secondary authentication base number according to the amount of the transaction to be verified and paid, and generates secondary encryption information by the secondary authentication base number, the current time and the public key;
the block chain node secondary decryption unit is used for acquiring the time of the received secondary encryption information and asymmetrically decrypting the secondary encryption information by using a private key corresponding to the public key and the time of the received secondary encryption information to generate a secondary authentication base number;
and extracting the amount of the transaction to be verified and paid from the secondary authentication base number, comparing the amount of the transaction to be verified and paid with the amount of the acquired transaction to be verified and paid, and if the comparison is consistent, the transaction verification is passed.
In another aspect, the present invention also provides a non-transitory computer-readable storage medium storing computer-executable instructions, which when executed by one or more processors, cause the one or more processors to perform the above verification method for performing transactions based on a blockchain.
In another aspect, the present invention also provides a computer program product comprising a computer program stored on a non-volatile computer-readable storage medium, the computer program comprising program instructions which, when executed by a processor, cause the processor to perform the above-described method of validating a blockchain based transaction.
The invention has the beneficial effects that: acquiring a block position corresponding to the payment transaction to be verified, verifying the existence of the transaction to be verified according to the block position corresponding to the payment transaction to be verified, and verifying the authenticity of the transaction to be verified if the transaction exists; verifying the authenticity of the transaction to be verified for payment comprises: encrypting the payment transaction to be verified and broadcasting the encrypted payment transaction to the block link points, and verifying the encrypted payment transaction to be verified by the block link points; further comprising: generating a secondary authentication base number according to the amount of the transaction to be verified and paid, generating secondary encryption information by using the secondary authentication base number, the current time and a public key, broadcasting the secondary encryption information to block link points, acquiring the broadcast signature information, the transaction to be verified and paid and the position information of a client of the secondary encryption information at the block link points, and requesting to call a camera of the client to perform face recognition, wherein if the face recognition is successful, the transaction verification is passed; therefore, the verification level of the block chain is improved, and the user experience is improved to the greatest extent.
Drawings
Fig. 1 is a flowchart of an implementation of a verification method for performing transactions based on a blockchain according to an embodiment of the present invention;
fig. 2 is a flowchart of an implementation of a verification method for conducting transactions based on a blockchain according to a second embodiment of the present invention;
fig. 3 is a flowchart of an implementation of a verification method for performing transactions based on a blockchain according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a verification system for conducting transactions based on a blockchain according to a fourth embodiment of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more apparent, the present invention is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The following detailed description of specific implementations of the present invention is provided in conjunction with specific embodiments:
the first embodiment is as follows:
fig. 1 shows an implementation flow of a verification method for performing transactions based on a blockchain according to an embodiment of the present invention, and for convenience of description, only the parts related to the embodiment of the present invention are shown, which is detailed as follows:
the payment verification node (client) comprises executing steps S301, S302, S303;
in step S101, a block position corresponding to the payment transaction to be verified is obtained.
In step S102, the existence of the transaction of the payment to be verified is verified according to the block position corresponding to the transaction of the payment to be verified.
In step S103, verifying the authenticity of the transaction to be verified and paid if the transaction exists;
in an embodiment of the invention, verifying authenticity of a transaction to be verified for payment comprises: and encrypting the payment transaction to be verified and broadcasting the encrypted payment transaction to the block link point, and verifying the encrypted payment transaction to be verified by the block link point.
Example two:
fig. 2 shows an implementation flow of the verification method for conducting transactions based on blockchain according to the second embodiment of the present invention, compared with the first embodiment, the implementation flow further includes:
the payment verification node further comprises executing steps S201, S202, S203, S204, S205, S206, S207;
in step S201, a transaction hash value of the payment to be verified is calculated;
in the embodiment of the invention, the transaction hash value of the payment to be verified is calculated as the hash operation of the transaction of the payment to be verified.
In step S202, a block header of the longest chain in the block chain is obtained and stored from the block chain network;
in the embodiment of the invention, the block chain consensus requirement is met.
In step S203, a tachr tree hash value authentication path corresponding to the payment to be verified is obtained, and a first root hash value of the tachr tree is calculated according to the hash value authentication path.
In step S204, the first root hash value is compared with the second root hash value of the merkel tree in the local block header, and if the first root hash value and the second root hash value are consistent, the block corresponding to the first root hash value is located.
In step S205, it is verified whether the block header of the block is included in the known longest chain according to the position of the block, and if not, the payment verification fails.
In step S206, a transaction hash value of the payment to be verified is calculated, the transaction hash value of the payment to be verified is asymmetrically encrypted to generate signature information, and the signature information and the transaction of the payment to be verified are broadcast to the block link points;
in an embodiment of the invention, encrypting and broadcasting the payment transaction to be verified to the block chain node comprises: calculating a transaction hash value of payment to be verified, and asymmetrically encrypting the transaction hash value of payment to be verified to generate signature information;
broadcasting the signature information and the transaction of payment to be verified to the block link points;
the asymmetric encryption of the transaction hash value of the payment to be verified to generate the signature information comprises the following steps: and asymmetrically encrypting the transaction hash value of the payment to be verified by using the public key to generate signature information.
In step S207, a secondary authentication base is generated according to the amount of the transaction to be verified and paid, and secondary encryption information is generated from the secondary authentication base, the current time and the public key; and broadcasting the secondary encryption information to the block link points.
Example three:
fig. 3 shows an implementation flow of the verification method for transaction based on blockchain according to the third embodiment of the present invention, compared with the second embodiment and the first embodiment, further includes:
the block link point comprises executing steps S301, S302, S303, S304, S305, S306;
in step S301, signature information, a transaction of payment to be verified, and secondary encryption information are acquired.
In step S302, the signature information is asymmetrically decrypted using a private key corresponding to the public key to obtain a decrypted hash value.
In step S303, a secondary hash value is obtained by performing a hash operation on the transaction to be verified and paid using the same hash algorithm as that used for calculating the transaction hash value to be verified and paid.
In step S304, the decrypted hash value is compared with the secondary hash value, and if the comparison is consistent, the verification is passed.
In step S305, the time of the received secondary encrypted information is acquired, and the secondary encrypted information is asymmetrically decrypted using the private key corresponding to the public key and the time of the received secondary encrypted information to generate a secondary authentication base.
In step S306, the amount of the transaction to be verified and paid is extracted from the secondary authentication base and compared with the amount of the acquired transaction to be verified and paid, and if the comparison is consistent, the transaction verification is passed;
in the embodiment of the present invention, it is further preferable that before the transaction verification is passed, the method further includes: and acquiring the position information of the client side of the broadcast signature information, the transaction to be verified and paid and the secondary encryption information, and requesting to call a camera of the client side to perform face recognition, wherein if the face recognition is successful, the transaction verification is passed.
Acquiring a block position corresponding to the payment transaction to be verified, verifying the existence of the transaction to be verified according to the block position corresponding to the payment transaction to be verified, and verifying the authenticity of the transaction to be verified if the transaction exists; verifying the authenticity of the transaction to be verified for payment comprises: encrypting the payment transaction to be verified and broadcasting the encrypted payment transaction to the block link points, and verifying the encrypted payment transaction to be verified by the block link points; further comprising: generating a secondary authentication base number according to the amount of the transaction to be verified and paid, generating secondary encryption information by using the secondary authentication base number, the current time and a public key, broadcasting the secondary encryption information to block link points, acquiring the broadcast signature information, the transaction to be verified and paid and the position information of a client of the secondary encryption information at the block link points, and requesting to call a camera of the client to perform face recognition, wherein if the face recognition is successful, the transaction verification is passed; therefore, the verification level of the block chain is improved, and the user experience is improved to the greatest extent.
Example four:
fig. 4 shows the structure of a verification system for transaction based on blockchain according to a fourth embodiment of the present invention, and for convenience of illustration, only the parts related to the embodiment of the present invention are shown, which include:
the client unit 401 acquires a block position corresponding to the payment transaction to be verified;
verifying the existence of the transaction to be verified and paid according to the block position corresponding to the transaction to be verified and paid;
a block chain node unit 402, which verifies the authenticity of the transaction to be verified and paid;
the client secondary encryption unit 403 generates a secondary authentication base number according to the amount of the transaction to be verified and paid, and generates secondary encryption information from the secondary authentication base number, the current time and the public key;
a block chain node secondary decryption unit 404, which obtains the time of the received secondary encrypted information, and asymmetrically decrypts the secondary encrypted information by using the private key corresponding to the public key and the time of the received secondary encrypted information to generate a secondary authentication base number;
the amount of the transaction to be verified and paid is extracted from the secondary authentication base number and is compared with the amount of the acquired transaction to be verified and paid, and if the comparison is consistent, the transaction verification is passed; time is adopted for further authentication, and information is prevented from being stolen and cracked.
In the embodiment of the present invention, each unit of the verification system for performing transactions based on a blockchain may be implemented by a corresponding hardware or software unit, and each unit may be an independent software or hardware unit, or may be integrated into a software or hardware unit, which is not limited herein.
Example five:
fifth embodiment of the present invention provides a non-transitory computer-readable storage medium storing computer-executable instructions, which are executed by one or more processors, for example, to perform steps S100 to S103 of the method in fig. 1 described above.
By way of example, non-volatile storage media can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as Synchronous RAM (SRAM), dynamic RAM, (DRAM), Synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), Enhanced SDRAM (ESDRAM), Synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The disclosed memory components or memory of the operating environment described herein are intended to comprise one or more of these and/or any other suitable types of memory.
Example six:
an embodiment of the present invention provides a computer program product, where the computer program product includes a computer program stored on a non-volatile computer-readable storage medium, and the computer program includes program instructions, and when the program instructions are executed by a processor, the processor is caused to execute the verification method for transaction based on block chain of the above method embodiment. For example, the method steps S100 to S103 in fig. 1 described above are performed.
The above-described embodiments are merely illustrative, and the units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules can be selected according to actual needs to achieve the purpose of the scheme of the embodiment.
Through the above description of the embodiments, those skilled in the art will clearly understand that the embodiments may be implemented by software plus a general hardware platform, and may also be implemented by hardware. With this in mind, the above-described technical solutions may be embodied in the form of a software product, which can be stored in a computer-readable storage medium, such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer electronic device (which may be a personal computer, a server, or a network electronic device, etc.) to execute the methods of the various embodiments or some parts of the embodiments.
Conditional language such as "can," "might," or "may" is generally intended to convey that a particular embodiment can include (yet other embodiments do not include) particular features, elements, and/or operations, among others, unless specifically stated otherwise or otherwise understood within the context as used. Thus, such conditional language is not generally intended to imply that features, elements, and/or operations are in any way required for one or more embodiments or that one or more embodiments necessarily include logic for deciding, with or without student input or prompting, whether such features, elements, and/or operations are included or are to be performed in any particular embodiment.
What has been described herein in the specification and drawings includes examples that can provide a verification method and apparatus for conducting transactions based on blockchains. It will, of course, not be possible to describe every conceivable combination of components and/or methodologies for purposes of describing the various features of the disclosure, but it can be appreciated that many further combinations and permutations of the disclosed features are possible. It is therefore evident that various modifications can be made to the disclosure without departing from the scope or spirit thereof. In addition, or in the alternative, other embodiments of the disclosure may be apparent from consideration of the specification and drawings and from practice of the disclosure as presented herein. It is intended that the examples set forth in this specification and the drawings be considered in all respects as illustrative and not restrictive. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims (10)

1. A method for verifying a transaction based on a blockchain, the method comprising the steps of:
acquiring the block position corresponding to the payment transaction to be verified,
verifying the existence of the transaction of the payment to be verified according to the block position corresponding to the transaction of the payment to be verified, and if the existence of the transaction of the payment to be verified is verified, verifying the authenticity of the transaction of the payment to be verified;
the verifying the authenticity of the transaction of the payment to be verified comprises: encrypting the payment transaction to be verified and broadcasting the encrypted payment transaction to the block link point, and verifying the encrypted payment transaction to be verified by the block link point.
2. The method of claim 1, wherein the obtaining a block location corresponding to a payment transaction to be verified comprises:
calculating a transaction hash value of the payment to be verified;
acquiring and storing a block head of the longest chain in a block chain from a block chain network;
acquiring a Mercker tree hash value authentication path corresponding to payment to be verified, and calculating a first root hash value of the Mercker tree according to the hash value authentication path;
and comparing the first root hash value with a second root hash value of the Mercker tree in the local block head, and if the first root hash value and the second root hash value are consistent, positioning the block corresponding to the first root hash value.
3. The method of claim 2, wherein the verifying the existence of the transaction for payment to be verified comprises:
verifying whether the block head of the block is contained in the known longest chain according to the position of the block, and if not, failing the verification.
4. The method of claim 3, wherein the encrypting and broadcasting the payment transaction to be authenticated to a blockchain node comprises:
the transaction hash value of the payment to be verified is calculated, and the transaction hash value of the payment to be verified is asymmetrically encrypted to generate signature information;
broadcasting the signature information and the transaction of the payment to be verified to a block link point;
the asymmetric encryption of the transaction hash value of the payment to be verified to generate signature information comprises: and carrying out asymmetric encryption on the transaction hash value of the payment to be verified by using a public key to generate signature information.
5. The method of claim 4, wherein the block link node verifying the encrypted payment transaction to be verified comprises:
acquiring signature information and a transaction of payment to be verified;
asymmetrically decrypting the signature information by using a private key corresponding to the public key to obtain a decrypted hash value;
performing hash operation on the transaction of the payment to be verified by using the same hash algorithm as the hash algorithm for calculating the transaction hash value of the payment to be verified to obtain a secondary hash value;
and comparing the decrypted hash value with the secondary hash value, and if the comparison is consistent, passing the verification.
6. The method of claim 2, further comprising:
generating a secondary authentication base number according to the amount of the transaction to be verified and paid, and generating secondary encryption information by using the secondary authentication base number, the current time and the public key;
and broadcasting the secondary encryption information to the block link points.
7. The method of claim 6, further comprising: acquiring secondary encryption information;
after the verification is passed, the method further comprises the following steps:
acquiring the time of the received secondary encrypted information, and asymmetrically decrypting the secondary encrypted information by using a private key corresponding to the public key and the time of the received secondary encrypted information to generate a secondary authentication base number;
extracting the amount of the transaction to be verified and paid from the secondary authentication base number, comparing the amount of the transaction to be verified and paid with the amount of the acquired transaction to be verified and paid, and if the comparison is consistent, the transaction verification is passed;
before the transaction verification is passed, the method further comprises the following steps:
and acquiring the position information of the client broadcasting the signature information and the to-be-verified payment and the position information of the secondary encryption information, and requesting to call a camera of the client to perform face recognition, wherein if the face recognition is successful, the transaction verification is passed.
8. A verification system for conducting transactions based on blockchain, the system comprising:
the client unit is used for acquiring a block position corresponding to the payment transaction to be verified;
verifying the existence of the transaction of the payment to be verified according to the block position corresponding to the transaction of the payment to be verified;
the block chain link point unit is used for verifying the authenticity of the transaction to be verified and paid;
the client secondary encryption unit generates a secondary authentication base number according to the amount of the transaction to be verified and paid, and generates secondary encryption information by the secondary authentication base number, the current time and the public key;
the block chain node secondary decryption unit is used for acquiring the time of the received secondary encryption information and asymmetrically decrypting the secondary encryption information by using a private key corresponding to the public key and the time of the received secondary encryption information to generate a secondary authentication base number;
and extracting the amount of the transaction to be verified and paid from the secondary authentication base number, comparing the amount of the transaction to be verified and paid with the amount of the acquired transaction to be verified and paid, and if the comparison is consistent, the transaction verification is passed.
9. A non-transitory computer-readable storage medium having stored thereon computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the method for validating a blockchain based transaction of any one of claims 1 to 7.
10. A computer program product, characterized in that the computer program product comprises a computer program stored on a non-volatile computer-readable storage medium, the computer program comprising program instructions that, when executed by a processor, cause the processor to carry out the method of validation of a blockchain based transaction according to any one of claims 1 to 7.
CN202110192019.0A 2021-02-19 2021-02-19 Verification method and system for conducting transaction based on blockchain Active CN112991058B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110192019.0A CN112991058B (en) 2021-02-19 2021-02-19 Verification method and system for conducting transaction based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110192019.0A CN112991058B (en) 2021-02-19 2021-02-19 Verification method and system for conducting transaction based on blockchain

Publications (2)

Publication Number Publication Date
CN112991058A true CN112991058A (en) 2021-06-18
CN112991058B CN112991058B (en) 2023-09-22

Family

ID=76393641

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110192019.0A Active CN112991058B (en) 2021-02-19 2021-02-19 Verification method and system for conducting transaction based on blockchain

Country Status (1)

Country Link
CN (1) CN112991058B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024021410A1 (en) * 2022-07-29 2024-02-01 蚂蚁区块链科技(上海)有限公司 Method and apparatus for preventing network attacks

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107077674A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 Transaction verification processing method and device and node equipment
KR20180014534A (en) * 2016-08-01 2018-02-09 서강대학교산학협력단 Verification system and method for transaction based block chain
CN109427012A (en) * 2017-08-22 2019-03-05 汇链丰(北京)科技有限公司 A kind of transaction and verification method based on block chain
CN109658240A (en) * 2018-11-20 2019-04-19 深圳变设龙信息科技有限公司 A kind of data trade method, apparatus and terminal device based on block chain
CN110599177A (en) * 2019-09-23 2019-12-20 腾讯科技(深圳)有限公司 Transaction verification method and related equipment
CN111614709A (en) * 2019-02-26 2020-09-01 傲为信息技术(江苏)有限公司 Partition transaction method and system based on block chain
CN112101944A (en) * 2020-09-28 2020-12-18 平安壹钱包电子商务有限公司 Efficient privacy payment implementation method and device, computer equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180014534A (en) * 2016-08-01 2018-02-09 서강대학교산학협력단 Verification system and method for transaction based block chain
CN107077674A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 Transaction verification processing method and device and node equipment
CN109427012A (en) * 2017-08-22 2019-03-05 汇链丰(北京)科技有限公司 A kind of transaction and verification method based on block chain
CN109658240A (en) * 2018-11-20 2019-04-19 深圳变设龙信息科技有限公司 A kind of data trade method, apparatus and terminal device based on block chain
CN111614709A (en) * 2019-02-26 2020-09-01 傲为信息技术(江苏)有限公司 Partition transaction method and system based on block chain
CN110599177A (en) * 2019-09-23 2019-12-20 腾讯科技(深圳)有限公司 Transaction verification method and related equipment
CN112101944A (en) * 2020-09-28 2020-12-18 平安壹钱包电子商务有限公司 Efficient privacy payment implementation method and device, computer equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2024021410A1 (en) * 2022-07-29 2024-02-01 蚂蚁区块链科技(上海)有限公司 Method and apparatus for preventing network attacks

Also Published As

Publication number Publication date
CN112991058B (en) 2023-09-22

Similar Documents

Publication Publication Date Title
US10958436B2 (en) Methods contract generator and validation server for access control of contract data in a distributed system with distributed consensus
US10587604B2 (en) Device verification method and apparatus
CN107925572B (en) Secure binding of software applications to communication devices
CN111756533B (en) System, method and storage medium for secure password generation
CN106991298B (en) Access method of application program to interface, authorization request method and device
CN110035052B (en) Method and device for checking historical transaction information and electronic equipment
US9025834B2 (en) Input validation, user and data authentication on potentially compromised mobile devices
CN111723383A (en) Data storage and verification method and device
CN111625829A (en) Application activation method and device based on trusted execution environment
US20180204004A1 (en) Authentication method and apparatus for reinforced software
US20160321656A1 (en) Method and system for protecting information against unauthorized use (variants)
CN110175466B (en) Security management method and device for open platform, computer equipment and storage medium
US20160239841A1 (en) Method, apparatus, and system for secure online payment
US20090119505A1 (en) Transaction method and verification method
KR101741917B1 (en) Apparatus and method for authenticating using speech recognition
CN112528236B (en) Application software authorization method based on virtual machine
CN111210287A (en) Tax UKey-based invoicing method and system
WO2019178763A1 (en) Certificate importing method and terminal
Mondal et al. Know your customer (KYC) based authentication method for financial services through the internet
CN107453871A (en) Password generated method, password authentication method, method of payment and device
US7739500B2 (en) Method and system for consistent recognition of ongoing digital relationships
CN112991058B (en) Verification method and system for conducting transaction based on blockchain
US8499357B1 (en) Signing a library file to verify a callback function
CN114143312A (en) Block chain-based edge computing terminal authentication method, system and equipment
CN113204798A (en) Signature authentication method and system based on operating system software package

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant