CN112991058B - Verification method and system for conducting transaction based on blockchain - Google Patents
Verification method and system for conducting transaction based on blockchain Download PDFInfo
- Publication number
- CN112991058B CN112991058B CN202110192019.0A CN202110192019A CN112991058B CN 112991058 B CN112991058 B CN 112991058B CN 202110192019 A CN202110192019 A CN 202110192019A CN 112991058 B CN112991058 B CN 112991058B
- Authority
- CN
- China
- Prior art keywords
- transaction
- verified
- payment
- hash value
- verifying
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/382—Payment protocols; Details thereof insuring higher security of transaction
- G06Q20/3829—Payment protocols; Details thereof insuring higher security of transaction involving key management
Abstract
The invention is applicable to the technical field of blockchain verification, and provides a blockchain-based transaction verification method, which comprises the steps of obtaining a blockposition corresponding to a payment transaction to be verified, verifying the existence of the payment transaction to be verified according to the blockposition corresponding to the payment transaction to be verified, and verifying the authenticity of the payment transaction to be verified if the verification exists, wherein the verification method comprises the following steps: encrypting the payment transaction to be verified and broadcasting the payment transaction to the blockchain node, and verifying the encrypted payment transaction to be verified by the blockchain node; further comprises: generating a secondary authentication base according to the amount of the transaction to be verified and paid, generating secondary encryption information by the secondary authentication base, the current time and a public key, acquiring broadcast signature information, the transaction to be verified and paid and the position information of a client of the secondary encryption information at a block link point, and requesting a camera of a calling client to conduct face recognition, wherein the transaction verification is passed if the face recognition is successful; thereby increasing the level of validation of the blockchain.
Description
Technical Field
The invention belongs to the technical field of blockchain verification, and particularly relates to a verification method and system for carrying out transaction based on a blockchain.
Background
At present, the security of the blockchain virtual asset cannot be ensured, taking a shopping platform as an example, when the shopping platform performs money verification, only the legitimacy of data is verified, but the legitimacy of money and the legitimacy of an initiator are not verified; thus giving the lawless persons a opportunity to get them still.
Disclosure of Invention
In view of the shortcomings of the prior art, the invention aims to provide a verification method for carrying out transactions based on blockchains, and aims to solve the problems of large blockchain transaction loopholes and low safety coefficient caused by the fact that the prior art cannot provide an effective verification method for carrying out transactions based on blockchains.
In one aspect, the present invention provides a blockchain-based validation method for transactions, the method comprising the steps of:
obtaining the block position corresponding to the payment transaction to be verified,
verifying the existence of the transaction to be verified according to the block position corresponding to the payment transaction to be verified, and verifying the authenticity of the transaction to be verified if the transaction to be verified exists;
the verifying the authenticity of the transaction to be verified comprises: encrypting and broadcasting the payment transaction to be verified to a blockchain node, and verifying the encrypted payment transaction to be verified by the blockchain node.
Further, the obtaining the block position corresponding to the payment transaction to be verified includes:
calculating a transaction hash value of the payment to be verified;
acquiring and storing a block head of a longest chain in a block chain from a block chain network;
acquiring a hash value authentication path of a merck tree corresponding to payment to be verified, and calculating a first root hash value of the merck tree according to the hash value authentication path;
and comparing the first root hash value with a second root hash value of the merck tree in the local block header, and if the comparison is consistent, positioning the first root hash value to the position of the block corresponding to the first root hash value.
Further, the verifying the existence of the transaction for which payment is to be verified includes:
verifying whether the block head of the block is contained in the known longest chain according to the position of the block, and if not, paying for verification failure.
Further, encrypting and broadcasting the payment transaction to be validated to a block link point comprises:
calculating a transaction hash value of the payment to be verified, and performing asymmetric encryption on the transaction hash value of the payment to be verified to generate signature information;
broadcasting the signature information and the transaction of the payment to be verified to a blockchain node;
the step of generating signature information by asymmetrically encrypting the transaction hash value of the payment to be verified comprises the following steps: and carrying out asymmetric encryption on the transaction hash value of the payment to be verified by using a public key to generate signature information.
Further, the blockchain node verifying the encrypted payment to be verified transaction includes:
acquiring signature information and a transaction of payment to be verified;
performing asymmetric decryption on the signature information by using a private key corresponding to the public key to obtain a decrypted hash value;
carrying out hash operation on the transaction of the payment to be verified by using the same hash algorithm for calculating the transaction hash value of the payment to be verified to obtain a secondary hash value;
and comparing the decrypted hash value with the secondary hash value, and if the comparison is consistent, verifying to pass.
Further preferably, the method further comprises:
generating a secondary authentication base according to the amount of the transaction to be verified and paid, and generating secondary encryption information by the secondary authentication base, the current time and the public key;
broadcasting the secondary encryption information to a blockchain node.
Further preferably, the method further comprises: acquiring secondary encryption information;
the verification process further comprises the following steps:
acquiring the time of the received secondary encryption information, and asymmetrically decrypting the secondary encryption information by using a private key corresponding to the public key and the time of the received secondary encryption information to generate a secondary authentication base;
extracting the amount of the transaction to be verified and paid from the secondary authentication base, comparing the amount with the amount in the acquired transaction to be verified and paid, and if the comparison is consistent, verifying the transaction;
before the transaction verification is passed, further comprising:
and acquiring the signature information, the transaction of the payment to be verified, the position information of the client of the secondary encryption information and the camera of the client to be called for face recognition, and verifying the transaction if the face recognition is successful.
In another aspect, the present invention provides a blockchain-based transaction verification system, the system comprising:
the client unit acquires the block position corresponding to the payment transaction to be verified;
verifying the existence of the transaction to be verified according to the block position corresponding to the payment transaction to be verified;
the block chain node unit is used for verifying the authenticity of the transaction to be verified and paid;
the client secondary encryption unit generates a secondary authentication base according to the amount of the transaction to be verified and paid, and generates secondary encryption information from the secondary authentication base, the current time and the public key;
a blockchain node secondary decryption unit, which obtains the time of the received secondary encryption information, and uses a private key corresponding to the public key and the time of the received secondary encryption information to asymmetrically decrypt the secondary encryption information to generate a secondary authentication base;
and extracting the amount of the transaction to be verified and paid from the secondary authentication base, comparing the amount with the amount in the acquired transaction to be verified and paid, and if the comparison is consistent, verifying the transaction.
In another aspect, the present invention also provides a non-volatile computer-readable storage medium storing computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the above-described blockchain-based transaction verification method.
In another aspect, the present invention also provides a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a processor, cause the processor to perform the above-described blockchain-based transaction verification method.
The invention has the beneficial effects that: acquiring a block position corresponding to the payment transaction to be verified, verifying the existence of the payment transaction to be verified according to the block position corresponding to the payment transaction to be verified, and verifying the authenticity of the payment transaction to be verified if the verification exists; verifying the authenticity of the transaction to be verified for payment includes: encrypting the payment transaction to be verified and broadcasting the payment transaction to the blockchain node, and verifying the encrypted payment transaction to be verified by the blockchain node; further comprises: generating a secondary authentication base according to the amount of the transaction to be verified and paid, generating secondary encryption information by the secondary authentication base, the current time and a public key, broadcasting the secondary encryption information to a block chain node, acquiring broadcasting signature information, the transaction to be verified and paid and the position information of a client of the secondary encryption information at the block chain node, and requesting to call a camera of the client to conduct face recognition, wherein the face recognition is successful, and the transaction verification is passed; therefore, the verification level of the blockchain is improved, and the experience of a user is improved.
Drawings
FIG. 1 is a flowchart of an implementation of a blockchain-based transaction verification method according to an embodiment of the present invention;
FIG. 2 is a flowchart of a verification method for conducting transactions based on blockchain according to a second embodiment of the present invention;
FIG. 3 is a flowchart of an implementation of a blockchain-based transaction verification method according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a verification system for conducting transactions based on blockchain according to a fourth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The following describes in detail the implementation of the present invention in connection with specific embodiments:
embodiment one:
fig. 1 shows an implementation flow of a block chain-based transaction verification method according to an embodiment of the present invention, and for convenience of explanation, only a portion related to the embodiment of the present invention is shown, which is described in detail below:
the payment verification node (client) comprises performing steps S301, S302, S303;
in step S101, a block location corresponding to a payment transaction to be verified is obtained.
In step S102, the existence of the transaction to be verified is verified according to the block location corresponding to the payment transaction to be verified.
In step S103, verifying the authenticity of the transaction to be verified and paid if the verification exists;
in an embodiment of the invention, verifying the authenticity of the transaction to be verified for payment comprises: encrypting and broadcasting the payment transaction to be verified to the blockchain node, and verifying the encrypted payment transaction to be verified by the blockchain node.
Embodiment two:
fig. 2 shows an implementation flow of a block chain-based transaction verification method according to a second embodiment of the present invention, which further includes:
the payment verification node further comprises executing steps S201, S202, S203, S204, S205, S206, S207;
in step S201, a transaction hash value of the payment to be verified is calculated;
in the embodiment of the invention, the transaction hash value of the payment to be verified is calculated as hash operation is carried out on the transaction of the payment to be verified.
In step S202, the block header of the longest chain in the blockchain is obtained and stored from the blockchain network;
in embodiments of the present invention, the blockchain consensus requirements are met.
In step S203, a hash value authentication path of the merck tree corresponding to the payment to be verified is obtained, and a first root hash value of the merck tree is calculated according to the hash value authentication path.
In step S204, the first root hash value is compared with the second root hash value of the merck tree in the local block header, and if the comparison is consistent, the block corresponding to the first root hash value is located.
In step S205, whether the block header of the block is already included in the known longest chain is verified according to the position of the block, if not, the verification failure is paid.
In step S206, calculating a transaction hash value of the payment to be verified, asymmetrically encrypting the transaction hash value of the payment to be verified to generate signature information, and broadcasting the signature information and the transaction of the payment to be verified to the blockchain node;
in an embodiment of the invention, encrypting and broadcasting to block link points a payment transaction to be validated includes: calculating a transaction hash value of the payment to be verified, and performing asymmetric encryption on the transaction hash value of the payment to be verified to generate signature information;
broadcasting signature information and a transaction of payment to be verified to a blockchain node;
the generating signature information by asymmetrically encrypting the transaction hash value of the payment to be verified comprises: and carrying out asymmetric encryption on the transaction hash value of the payment to be verified by using the public key to generate signature information.
In step S207, generating a secondary authentication base according to the amount of the transaction to be verified and paid, and generating secondary encryption information by the secondary authentication base, the current time and the public key; the secondary encryption information is broadcast to the blockchain node.
Embodiment III:
fig. 3 shows an implementation flow of a block chain-based transaction verification method according to a third embodiment of the present invention, which further includes:
the block link points include executing steps S301, S302, S303, S304, S305, S306;
in step S301, signature information and transaction of payment to be verified and secondary encryption information are acquired.
In step S302, the signature information is asymmetrically decrypted using a private key corresponding to the public key to obtain a decrypted hash value.
In step S303, a hash operation is performed on the transaction of the payment to be verified to obtain a secondary hash value using the same hash algorithm as that used to calculate the transaction hash value of the payment to be verified.
In step S304, the decrypted hash value and the secondary hash value are compared, and if the comparison is consistent, the verification is passed.
In step S305, the time of the received secondary encryption information is acquired, and the secondary encryption information is asymmetrically decrypted using the private key corresponding to the public key and the time of the received secondary encryption information to generate a secondary authentication base.
In step S306, the amount of the transaction to be verified and paid is extracted from the secondary authentication base, and compared with the amount in the acquired transaction to be verified and paid, and if the comparison is consistent, the transaction verification is passed;
in an embodiment of the present invention, it is further preferable that before the transaction verification is passed, further comprising: and acquiring the broadcasting signature information, the transaction to be verified and paid, the position information of the client side of the secondary encryption information, and the camera of the request calling client side to carry out face recognition, wherein the transaction verification is passed if the face recognition is successful.
Acquiring a block position corresponding to the payment transaction to be verified, verifying the existence of the payment transaction to be verified according to the block position corresponding to the payment transaction to be verified, and verifying the authenticity of the payment transaction to be verified if the verification exists; verifying the authenticity of the transaction to be verified for payment includes: encrypting the payment transaction to be verified and broadcasting the payment transaction to the blockchain node, and verifying the encrypted payment transaction to be verified by the blockchain node; further comprises: generating a secondary authentication base according to the amount of the transaction to be verified and paid, generating secondary encryption information by the secondary authentication base, the current time and a public key, broadcasting the secondary encryption information to a block chain node, acquiring broadcasting signature information, the transaction to be verified and paid and the position information of a client of the secondary encryption information at the block chain node, and requesting to call a camera of the client to conduct face recognition, wherein the face recognition is successful, and the transaction verification is passed; therefore, the verification level of the blockchain is improved, and the experience of a user is improved.
Embodiment four:
fig. 4 shows the structure of a verification system for conducting transactions based on blockchain according to the fourth embodiment of the present invention, and for convenience of explanation, only the parts related to the embodiment of the present invention are shown, including:
the client unit 401 acquires a block position corresponding to the payment transaction to be verified;
verifying the existence of the transaction to be verified according to the block position corresponding to the payment transaction to be verified;
a blockchain node unit 402 for verifying the authenticity of the transaction to be verified for payment;
a client secondary encryption unit 403 that generates a secondary authentication base according to the amount of the transaction to be validated and paid, and generates secondary encryption information from the secondary authentication base, the current time, and the public key;
the blockchain node secondary decryption unit 404 obtains the time of the received secondary encryption information, and performs asymmetric decryption on the secondary encryption information by using the private key corresponding to the public key and the time of the received secondary encryption information to generate a secondary authentication base;
extracting the amount of the transaction to be verified and paid from the secondary authentication base, comparing the amount with the amount in the acquired transaction to be verified and paid, and if the comparison is consistent, verifying the transaction; and the time is adopted for further authentication, so that the information is prevented from being stolen and cracked.
In the embodiment of the invention, each unit of the verification system for carrying out transaction based on the blockchain can be realized by corresponding hardware or software units, and each unit can be an independent software and hardware unit or can be integrated into one software and hardware unit, and the invention is not limited herein.
Fifth embodiment:
a fifth embodiment of the present invention provides a non-volatile computer-readable storage medium storing computer-executable instructions that are executed by one or more processors, for example, to perform the method steps S100 to S103 in fig. 1 described above.
By way of example, nonvolatile storage media can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as Synchronous RAM (SRAM), dynamic RAM, (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The disclosed memory components or memories of the operating environments described herein are intended to comprise one or more of these and/or any other suitable types of memory.
Example six:
a sixth embodiment of the present invention provides a computer program product, the computer program product comprising a computer program stored on a non-volatile computer readable storage medium, the computer program comprising program instructions which, when executed by a processor, cause the processor to perform the blockchain-based transaction verification method of the method embodiment described above. For example, the above-described method steps S100 to S103 in fig. 1 are performed.
The embodiments described above are merely illustrative, wherein elements illustrated as separate elements may or may not be physically separate, and elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
From the above description of embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus a general purpose hardware platform, or may be implemented by hardware. Based on such understanding, the foregoing technical solutions may be embodied essentially or in part in a form of a software product, which may exist in a computer-readable storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer electronic device (which may be a personal computer, a server, or a network electronic device, etc.) to perform the various embodiments or methods of some parts of the embodiments.
Conditional language such as "capable," "energy," "possible," or "may," among others, is generally intended to convey that a particular embodiment can include (but other embodiments do not include) particular features, elements, and/or operations unless specifically stated otherwise or otherwise understood within the context as used. Thus, such conditional language is not generally intended to imply that features, elements and/or operations are in any way required for one or more embodiments or that one or more embodiments must include logic for deciding, with or without student input or prompting, whether these features, elements and/or operations are included or are to be performed in any particular embodiment.
What has been described herein in the specification and drawings includes examples of methods and apparatus capable of providing verification of blockchain-based transactions. It is, of course, not possible to describe every conceivable combination of components and/or methodologies for purposes of describing the various features of the present disclosure, but it may be appreciated that many further combinations and permutations of the disclosed features are possible. It is therefore evident that various modifications may be made thereto without departing from the scope or spirit of the disclosure. Further, or in the alternative, other embodiments of the disclosure may be apparent from consideration of the specification and drawings, and practice of the disclosure as presented herein. It is intended that the examples set forth in this specification and figures be considered illustrative in all respects as illustrative and not limiting. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.
Claims (10)
1. A method of verifying transactions based on blockchain, the method comprising the steps of:
obtaining the block position corresponding to the payment transaction to be verified,
verifying the existence of the transaction to be verified according to the block position corresponding to the payment transaction to be verified, and verifying the authenticity of the transaction to be verified if the transaction to be verified exists;
the verifying the authenticity of the transaction to be verified comprises: encrypting and broadcasting the payment transaction to be verified to a blockchain node, and verifying the encrypted payment transaction to be verified by the blockchain node.
2. The method of claim 1, wherein the obtaining the block location corresponding to the payment transaction to be validated comprises:
calculating a transaction hash value of the payment to be verified;
acquiring and storing a block head of a longest chain in a block chain from a block chain network;
acquiring a hash value authentication path of a merck tree corresponding to payment to be verified, and calculating a first root hash value of the merck tree according to the hash value authentication path;
and comparing the first root hash value with a second root hash value of the merck tree in the local block header, and if the comparison is consistent, positioning the first root hash value to the position of the block corresponding to the first root hash value.
3. The method of claim 2, wherein verifying the presence of the transaction for which payment is to be verified comprises:
verifying whether the block head of the block is contained in the known longest chain according to the position of the block, and if not, paying for verification failure.
4. The method of claim 3, wherein encrypting and broadcasting the payment transaction to be validated to a block chain link point comprises:
calculating a transaction hash value of the payment to be verified, and performing asymmetric encryption on the transaction hash value of the payment to be verified to generate signature information;
broadcasting the signature information and the transaction of the payment to be verified to a blockchain node;
the step of generating signature information by asymmetrically encrypting the transaction hash value of the payment to be verified comprises the following steps: and carrying out asymmetric encryption on the transaction hash value of the payment to be verified by using a public key to generate signature information.
5. The method of claim 4, wherein the blockchain node verifying the encrypted payment to verify transaction comprises:
acquiring signature information and a transaction of payment to be verified;
performing asymmetric decryption on the signature information by using a private key corresponding to the public key to obtain a decrypted hash value;
carrying out hash operation on the transaction of the payment to be verified by using the same hash algorithm for calculating the transaction hash value of the payment to be verified to obtain a secondary hash value;
and comparing the decrypted hash value with the secondary hash value, and if the comparison is consistent, verifying to pass.
6. The method as recited in claim 2, further comprising:
generating a secondary authentication base according to the amount of the transaction to be verified and paid, and generating secondary encryption information by the secondary authentication base, the current time and the public key;
broadcasting the secondary encryption information to a blockchain node.
7. The method as recited in claim 6, further comprising: acquiring secondary encryption information;
the verification process further comprises the following steps:
acquiring the time of the received secondary encryption information, and asymmetrically decrypting the secondary encryption information by using a private key corresponding to the public key and the time of the received secondary encryption information to generate a secondary authentication base;
extracting the amount of the transaction to be verified and paid from the secondary authentication base, comparing the amount with the amount in the acquired transaction to be verified and paid, and if the comparison is consistent, verifying the transaction;
before the transaction verification is passed, further comprising:
and acquiring the signature information, the transaction of the payment to be verified, the position information of the client of the secondary encryption information and the camera of the client to be called for face recognition, and verifying the transaction if the face recognition is successful.
8. A blockchain-based verification system for conducting transactions, the system comprising:
the client unit acquires the block position corresponding to the payment transaction to be verified;
verifying the existence of the transaction to be verified according to the block position corresponding to the payment transaction to be verified;
the block chain node unit is used for verifying the authenticity of the transaction to be verified and paid;
the client secondary encryption unit generates a secondary authentication base according to the amount of the transaction to be verified and paid, and generates secondary encryption information from the secondary authentication base, the current time and the public key;
a blockchain node secondary decryption unit, which obtains the time of the received secondary encryption information, and uses a private key corresponding to the public key and the time of the received secondary encryption information to asymmetrically decrypt the secondary encryption information to generate a secondary authentication base;
and extracting the amount of the transaction to be verified and paid from the secondary authentication base, comparing the amount with the amount in the acquired transaction to be verified and paid, and if the comparison is consistent, verifying the transaction.
9. A non-transitory computer-readable storage medium storing computer-executable instructions which, when executed by one or more processors, cause the one or more processors to perform the blockchain-based transaction verification method of any of claims 1-7.
10. A computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions that when executed by a processor cause the processor to perform the blockchain-based transaction verification method of any of claims 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110192019.0A CN112991058B (en) | 2021-02-19 | 2021-02-19 | Verification method and system for conducting transaction based on blockchain |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110192019.0A CN112991058B (en) | 2021-02-19 | 2021-02-19 | Verification method and system for conducting transaction based on blockchain |
Publications (2)
Publication Number | Publication Date |
---|---|
CN112991058A CN112991058A (en) | 2021-06-18 |
CN112991058B true CN112991058B (en) | 2023-09-22 |
Family
ID=76393641
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110192019.0A Active CN112991058B (en) | 2021-02-19 | 2021-02-19 | Verification method and system for conducting transaction based on blockchain |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112991058B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115277021A (en) * | 2022-07-29 | 2022-11-01 | 蚂蚁区块链科技(上海)有限公司 | Method and device for preventing network attack |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107077674A (en) * | 2016-12-29 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Transaction verification processing method and device and node equipment |
KR20180014534A (en) * | 2016-08-01 | 2018-02-09 | 서강대학교산학협력단 | Verification system and method for transaction based block chain |
CN109427012A (en) * | 2017-08-22 | 2019-03-05 | 汇链丰(北京)科技有限公司 | A kind of transaction and verification method based on block chain |
CN109658240A (en) * | 2018-11-20 | 2019-04-19 | 深圳变设龙信息科技有限公司 | A kind of data trade method, apparatus and terminal device based on block chain |
CN110599177A (en) * | 2019-09-23 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Transaction verification method and related equipment |
CN111614709A (en) * | 2019-02-26 | 2020-09-01 | 傲为信息技术(江苏)有限公司 | Partition transaction method and system based on block chain |
CN112101944A (en) * | 2020-09-28 | 2020-12-18 | 平安壹钱包电子商务有限公司 | Efficient privacy payment implementation method and device, computer equipment and storage medium |
-
2021
- 2021-02-19 CN CN202110192019.0A patent/CN112991058B/en active Active
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
KR20180014534A (en) * | 2016-08-01 | 2018-02-09 | 서강대학교산학협력단 | Verification system and method for transaction based block chain |
CN107077674A (en) * | 2016-12-29 | 2017-08-18 | 深圳前海达闼云端智能科技有限公司 | Transaction verification processing method and device and node equipment |
CN109427012A (en) * | 2017-08-22 | 2019-03-05 | 汇链丰(北京)科技有限公司 | A kind of transaction and verification method based on block chain |
CN109658240A (en) * | 2018-11-20 | 2019-04-19 | 深圳变设龙信息科技有限公司 | A kind of data trade method, apparatus and terminal device based on block chain |
CN111614709A (en) * | 2019-02-26 | 2020-09-01 | 傲为信息技术(江苏)有限公司 | Partition transaction method and system based on block chain |
CN110599177A (en) * | 2019-09-23 | 2019-12-20 | 腾讯科技(深圳)有限公司 | Transaction verification method and related equipment |
CN112101944A (en) * | 2020-09-28 | 2020-12-18 | 平安壹钱包电子商务有限公司 | Efficient privacy payment implementation method and device, computer equipment and storage medium |
Also Published As
Publication number | Publication date |
---|---|
CN112991058A (en) | 2021-06-18 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111090876B (en) | Contract calling method and device | |
CN107925572B (en) | Secure binding of software applications to communication devices | |
US20210279736A1 (en) | Blockchain secure transaction method and device based on biomarker authentication | |
CN112260826B (en) | Method for secure credential provisioning | |
CN111756533B (en) | System, method and storage medium for secure password generation | |
KR102255287B1 (en) | Physical identity management system using One-time-password on Blockchain | |
CN111859422A (en) | Digital asset deposit certificate system based on block chain | |
KR20200028961A (en) | Blockchain-implementation event-method and system for lock encryption | |
AU2019207310A1 (en) | Anti-replay attack authentication protocol | |
CN105900375A (en) | Efficient methods for protecting identity in authenticated transmissions | |
CN111355749A (en) | Efficient method for authenticated communication | |
WO2017000648A1 (en) | Authentication method and apparatus for reinforced software | |
US20090119505A1 (en) | Transaction method and verification method | |
CN110942382A (en) | Electronic contract generating method and device, computer equipment and storage medium | |
CN111210287A (en) | Tax UKey-based invoicing method and system | |
WO2019178763A1 (en) | Certificate importing method and terminal | |
CN112991058B (en) | Verification method and system for conducting transaction based on blockchain | |
CN107453871A (en) | Password generated method, password authentication method, method of payment and device | |
CN114143312A (en) | Block chain-based edge computing terminal authentication method, system and equipment | |
KR101876672B1 (en) | Digital signature method using block chain and system performing the same | |
CN113205342A (en) | User identity authentication method and device based on multi-terminal payment | |
KR102466866B1 (en) | Data verification method | |
US11729159B2 (en) | System security infrastructure facilitating protecting against fraudulent use of individual identity credentials | |
Wilusz et al. | Securing cryptoasset insurance services with multisignatures | |
CN112905698A (en) | Data processing method of block chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |