CN112991058B - Verification method and system for conducting transaction based on blockchain - Google Patents

Verification method and system for conducting transaction based on blockchain Download PDF

Info

Publication number
CN112991058B
CN112991058B CN202110192019.0A CN202110192019A CN112991058B CN 112991058 B CN112991058 B CN 112991058B CN 202110192019 A CN202110192019 A CN 202110192019A CN 112991058 B CN112991058 B CN 112991058B
Authority
CN
China
Prior art keywords
transaction
verified
payment
hash value
verifying
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110192019.0A
Other languages
Chinese (zh)
Other versions
CN112991058A (en
Inventor
余鸿忠
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Block Power Guangzhou Technology Co ltd
Original Assignee
Block Power Guangzhou Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Block Power Guangzhou Technology Co ltd filed Critical Block Power Guangzhou Technology Co ltd
Priority to CN202110192019.0A priority Critical patent/CN112991058B/en
Publication of CN112991058A publication Critical patent/CN112991058A/en
Application granted granted Critical
Publication of CN112991058B publication Critical patent/CN112991058B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management

Abstract

The invention is applicable to the technical field of blockchain verification, and provides a blockchain-based transaction verification method, which comprises the steps of obtaining a blockposition corresponding to a payment transaction to be verified, verifying the existence of the payment transaction to be verified according to the blockposition corresponding to the payment transaction to be verified, and verifying the authenticity of the payment transaction to be verified if the verification exists, wherein the verification method comprises the following steps: encrypting the payment transaction to be verified and broadcasting the payment transaction to the blockchain node, and verifying the encrypted payment transaction to be verified by the blockchain node; further comprises: generating a secondary authentication base according to the amount of the transaction to be verified and paid, generating secondary encryption information by the secondary authentication base, the current time and a public key, acquiring broadcast signature information, the transaction to be verified and paid and the position information of a client of the secondary encryption information at a block link point, and requesting a camera of a calling client to conduct face recognition, wherein the transaction verification is passed if the face recognition is successful; thereby increasing the level of validation of the blockchain.

Description

Verification method and system for conducting transaction based on blockchain
Technical Field
The invention belongs to the technical field of blockchain verification, and particularly relates to a verification method and system for carrying out transaction based on a blockchain.
Background
At present, the security of the blockchain virtual asset cannot be ensured, taking a shopping platform as an example, when the shopping platform performs money verification, only the legitimacy of data is verified, but the legitimacy of money and the legitimacy of an initiator are not verified; thus giving the lawless persons a opportunity to get them still.
Disclosure of Invention
In view of the shortcomings of the prior art, the invention aims to provide a verification method for carrying out transactions based on blockchains, and aims to solve the problems of large blockchain transaction loopholes and low safety coefficient caused by the fact that the prior art cannot provide an effective verification method for carrying out transactions based on blockchains.
In one aspect, the present invention provides a blockchain-based validation method for transactions, the method comprising the steps of:
obtaining the block position corresponding to the payment transaction to be verified,
verifying the existence of the transaction to be verified according to the block position corresponding to the payment transaction to be verified, and verifying the authenticity of the transaction to be verified if the transaction to be verified exists;
the verifying the authenticity of the transaction to be verified comprises: encrypting and broadcasting the payment transaction to be verified to a blockchain node, and verifying the encrypted payment transaction to be verified by the blockchain node.
Further, the obtaining the block position corresponding to the payment transaction to be verified includes:
calculating a transaction hash value of the payment to be verified;
acquiring and storing a block head of a longest chain in a block chain from a block chain network;
acquiring a hash value authentication path of a merck tree corresponding to payment to be verified, and calculating a first root hash value of the merck tree according to the hash value authentication path;
and comparing the first root hash value with a second root hash value of the merck tree in the local block header, and if the comparison is consistent, positioning the first root hash value to the position of the block corresponding to the first root hash value.
Further, the verifying the existence of the transaction for which payment is to be verified includes:
verifying whether the block head of the block is contained in the known longest chain according to the position of the block, and if not, paying for verification failure.
Further, encrypting and broadcasting the payment transaction to be validated to a block link point comprises:
calculating a transaction hash value of the payment to be verified, and performing asymmetric encryption on the transaction hash value of the payment to be verified to generate signature information;
broadcasting the signature information and the transaction of the payment to be verified to a blockchain node;
the step of generating signature information by asymmetrically encrypting the transaction hash value of the payment to be verified comprises the following steps: and carrying out asymmetric encryption on the transaction hash value of the payment to be verified by using a public key to generate signature information.
Further, the blockchain node verifying the encrypted payment to be verified transaction includes:
acquiring signature information and a transaction of payment to be verified;
performing asymmetric decryption on the signature information by using a private key corresponding to the public key to obtain a decrypted hash value;
carrying out hash operation on the transaction of the payment to be verified by using the same hash algorithm for calculating the transaction hash value of the payment to be verified to obtain a secondary hash value;
and comparing the decrypted hash value with the secondary hash value, and if the comparison is consistent, verifying to pass.
Further preferably, the method further comprises:
generating a secondary authentication base according to the amount of the transaction to be verified and paid, and generating secondary encryption information by the secondary authentication base, the current time and the public key;
broadcasting the secondary encryption information to a blockchain node.
Further preferably, the method further comprises: acquiring secondary encryption information;
the verification process further comprises the following steps:
acquiring the time of the received secondary encryption information, and asymmetrically decrypting the secondary encryption information by using a private key corresponding to the public key and the time of the received secondary encryption information to generate a secondary authentication base;
extracting the amount of the transaction to be verified and paid from the secondary authentication base, comparing the amount with the amount in the acquired transaction to be verified and paid, and if the comparison is consistent, verifying the transaction;
before the transaction verification is passed, further comprising:
and acquiring the signature information, the transaction of the payment to be verified, the position information of the client of the secondary encryption information and the camera of the client to be called for face recognition, and verifying the transaction if the face recognition is successful.
In another aspect, the present invention provides a blockchain-based transaction verification system, the system comprising:
the client unit acquires the block position corresponding to the payment transaction to be verified;
verifying the existence of the transaction to be verified according to the block position corresponding to the payment transaction to be verified;
the block chain node unit is used for verifying the authenticity of the transaction to be verified and paid;
the client secondary encryption unit generates a secondary authentication base according to the amount of the transaction to be verified and paid, and generates secondary encryption information from the secondary authentication base, the current time and the public key;
a blockchain node secondary decryption unit, which obtains the time of the received secondary encryption information, and uses a private key corresponding to the public key and the time of the received secondary encryption information to asymmetrically decrypt the secondary encryption information to generate a secondary authentication base;
and extracting the amount of the transaction to be verified and paid from the secondary authentication base, comparing the amount with the amount in the acquired transaction to be verified and paid, and if the comparison is consistent, verifying the transaction.
In another aspect, the present invention also provides a non-volatile computer-readable storage medium storing computer-executable instructions that, when executed by one or more processors, cause the one or more processors to perform the above-described blockchain-based transaction verification method.
In another aspect, the present invention also provides a computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions which, when executed by a processor, cause the processor to perform the above-described blockchain-based transaction verification method.
The invention has the beneficial effects that: acquiring a block position corresponding to the payment transaction to be verified, verifying the existence of the payment transaction to be verified according to the block position corresponding to the payment transaction to be verified, and verifying the authenticity of the payment transaction to be verified if the verification exists; verifying the authenticity of the transaction to be verified for payment includes: encrypting the payment transaction to be verified and broadcasting the payment transaction to the blockchain node, and verifying the encrypted payment transaction to be verified by the blockchain node; further comprises: generating a secondary authentication base according to the amount of the transaction to be verified and paid, generating secondary encryption information by the secondary authentication base, the current time and a public key, broadcasting the secondary encryption information to a block chain node, acquiring broadcasting signature information, the transaction to be verified and paid and the position information of a client of the secondary encryption information at the block chain node, and requesting to call a camera of the client to conduct face recognition, wherein the face recognition is successful, and the transaction verification is passed; therefore, the verification level of the blockchain is improved, and the experience of a user is improved.
Drawings
FIG. 1 is a flowchart of an implementation of a blockchain-based transaction verification method according to an embodiment of the present invention;
FIG. 2 is a flowchart of a verification method for conducting transactions based on blockchain according to a second embodiment of the present invention;
FIG. 3 is a flowchart of an implementation of a blockchain-based transaction verification method according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a verification system for conducting transactions based on blockchain according to a fourth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present invention more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The following describes in detail the implementation of the present invention in connection with specific embodiments:
embodiment one:
fig. 1 shows an implementation flow of a block chain-based transaction verification method according to an embodiment of the present invention, and for convenience of explanation, only a portion related to the embodiment of the present invention is shown, which is described in detail below:
the payment verification node (client) comprises performing steps S301, S302, S303;
in step S101, a block location corresponding to a payment transaction to be verified is obtained.
In step S102, the existence of the transaction to be verified is verified according to the block location corresponding to the payment transaction to be verified.
In step S103, verifying the authenticity of the transaction to be verified and paid if the verification exists;
in an embodiment of the invention, verifying the authenticity of the transaction to be verified for payment comprises: encrypting and broadcasting the payment transaction to be verified to the blockchain node, and verifying the encrypted payment transaction to be verified by the blockchain node.
Embodiment two:
fig. 2 shows an implementation flow of a block chain-based transaction verification method according to a second embodiment of the present invention, which further includes:
the payment verification node further comprises executing steps S201, S202, S203, S204, S205, S206, S207;
in step S201, a transaction hash value of the payment to be verified is calculated;
in the embodiment of the invention, the transaction hash value of the payment to be verified is calculated as hash operation is carried out on the transaction of the payment to be verified.
In step S202, the block header of the longest chain in the blockchain is obtained and stored from the blockchain network;
in embodiments of the present invention, the blockchain consensus requirements are met.
In step S203, a hash value authentication path of the merck tree corresponding to the payment to be verified is obtained, and a first root hash value of the merck tree is calculated according to the hash value authentication path.
In step S204, the first root hash value is compared with the second root hash value of the merck tree in the local block header, and if the comparison is consistent, the block corresponding to the first root hash value is located.
In step S205, whether the block header of the block is already included in the known longest chain is verified according to the position of the block, if not, the verification failure is paid.
In step S206, calculating a transaction hash value of the payment to be verified, asymmetrically encrypting the transaction hash value of the payment to be verified to generate signature information, and broadcasting the signature information and the transaction of the payment to be verified to the blockchain node;
in an embodiment of the invention, encrypting and broadcasting to block link points a payment transaction to be validated includes: calculating a transaction hash value of the payment to be verified, and performing asymmetric encryption on the transaction hash value of the payment to be verified to generate signature information;
broadcasting signature information and a transaction of payment to be verified to a blockchain node;
the generating signature information by asymmetrically encrypting the transaction hash value of the payment to be verified comprises: and carrying out asymmetric encryption on the transaction hash value of the payment to be verified by using the public key to generate signature information.
In step S207, generating a secondary authentication base according to the amount of the transaction to be verified and paid, and generating secondary encryption information by the secondary authentication base, the current time and the public key; the secondary encryption information is broadcast to the blockchain node.
Embodiment III:
fig. 3 shows an implementation flow of a block chain-based transaction verification method according to a third embodiment of the present invention, which further includes:
the block link points include executing steps S301, S302, S303, S304, S305, S306;
in step S301, signature information and transaction of payment to be verified and secondary encryption information are acquired.
In step S302, the signature information is asymmetrically decrypted using a private key corresponding to the public key to obtain a decrypted hash value.
In step S303, a hash operation is performed on the transaction of the payment to be verified to obtain a secondary hash value using the same hash algorithm as that used to calculate the transaction hash value of the payment to be verified.
In step S304, the decrypted hash value and the secondary hash value are compared, and if the comparison is consistent, the verification is passed.
In step S305, the time of the received secondary encryption information is acquired, and the secondary encryption information is asymmetrically decrypted using the private key corresponding to the public key and the time of the received secondary encryption information to generate a secondary authentication base.
In step S306, the amount of the transaction to be verified and paid is extracted from the secondary authentication base, and compared with the amount in the acquired transaction to be verified and paid, and if the comparison is consistent, the transaction verification is passed;
in an embodiment of the present invention, it is further preferable that before the transaction verification is passed, further comprising: and acquiring the broadcasting signature information, the transaction to be verified and paid, the position information of the client side of the secondary encryption information, and the camera of the request calling client side to carry out face recognition, wherein the transaction verification is passed if the face recognition is successful.
Acquiring a block position corresponding to the payment transaction to be verified, verifying the existence of the payment transaction to be verified according to the block position corresponding to the payment transaction to be verified, and verifying the authenticity of the payment transaction to be verified if the verification exists; verifying the authenticity of the transaction to be verified for payment includes: encrypting the payment transaction to be verified and broadcasting the payment transaction to the blockchain node, and verifying the encrypted payment transaction to be verified by the blockchain node; further comprises: generating a secondary authentication base according to the amount of the transaction to be verified and paid, generating secondary encryption information by the secondary authentication base, the current time and a public key, broadcasting the secondary encryption information to a block chain node, acquiring broadcasting signature information, the transaction to be verified and paid and the position information of a client of the secondary encryption information at the block chain node, and requesting to call a camera of the client to conduct face recognition, wherein the face recognition is successful, and the transaction verification is passed; therefore, the verification level of the blockchain is improved, and the experience of a user is improved.
Embodiment four:
fig. 4 shows the structure of a verification system for conducting transactions based on blockchain according to the fourth embodiment of the present invention, and for convenience of explanation, only the parts related to the embodiment of the present invention are shown, including:
the client unit 401 acquires a block position corresponding to the payment transaction to be verified;
verifying the existence of the transaction to be verified according to the block position corresponding to the payment transaction to be verified;
a blockchain node unit 402 for verifying the authenticity of the transaction to be verified for payment;
a client secondary encryption unit 403 that generates a secondary authentication base according to the amount of the transaction to be validated and paid, and generates secondary encryption information from the secondary authentication base, the current time, and the public key;
the blockchain node secondary decryption unit 404 obtains the time of the received secondary encryption information, and performs asymmetric decryption on the secondary encryption information by using the private key corresponding to the public key and the time of the received secondary encryption information to generate a secondary authentication base;
extracting the amount of the transaction to be verified and paid from the secondary authentication base, comparing the amount with the amount in the acquired transaction to be verified and paid, and if the comparison is consistent, verifying the transaction; and the time is adopted for further authentication, so that the information is prevented from being stolen and cracked.
In the embodiment of the invention, each unit of the verification system for carrying out transaction based on the blockchain can be realized by corresponding hardware or software units, and each unit can be an independent software and hardware unit or can be integrated into one software and hardware unit, and the invention is not limited herein.
Fifth embodiment:
a fifth embodiment of the present invention provides a non-volatile computer-readable storage medium storing computer-executable instructions that are executed by one or more processors, for example, to perform the method steps S100 to S103 in fig. 1 described above.
By way of example, nonvolatile storage media can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically erasable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM), which acts as external cache memory. By way of illustration and not limitation, RAM is available in many forms such as Synchronous RAM (SRAM), dynamic RAM, (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDR SDRAM), enhanced SDRAM (ESDRAM), synchlink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM). The disclosed memory components or memories of the operating environments described herein are intended to comprise one or more of these and/or any other suitable types of memory.
Example six:
a sixth embodiment of the present invention provides a computer program product, the computer program product comprising a computer program stored on a non-volatile computer readable storage medium, the computer program comprising program instructions which, when executed by a processor, cause the processor to perform the blockchain-based transaction verification method of the method embodiment described above. For example, the above-described method steps S100 to S103 in fig. 1 are performed.
The embodiments described above are merely illustrative, wherein elements illustrated as separate elements may or may not be physically separate, and elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
From the above description of embodiments, it will be apparent to those skilled in the art that the embodiments may be implemented by means of software plus a general purpose hardware platform, or may be implemented by hardware. Based on such understanding, the foregoing technical solutions may be embodied essentially or in part in a form of a software product, which may exist in a computer-readable storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, etc., including several instructions for causing a computer electronic device (which may be a personal computer, a server, or a network electronic device, etc.) to perform the various embodiments or methods of some parts of the embodiments.
Conditional language such as "capable," "energy," "possible," or "may," among others, is generally intended to convey that a particular embodiment can include (but other embodiments do not include) particular features, elements, and/or operations unless specifically stated otherwise or otherwise understood within the context as used. Thus, such conditional language is not generally intended to imply that features, elements and/or operations are in any way required for one or more embodiments or that one or more embodiments must include logic for deciding, with or without student input or prompting, whether these features, elements and/or operations are included or are to be performed in any particular embodiment.
What has been described herein in the specification and drawings includes examples of methods and apparatus capable of providing verification of blockchain-based transactions. It is, of course, not possible to describe every conceivable combination of components and/or methodologies for purposes of describing the various features of the present disclosure, but it may be appreciated that many further combinations and permutations of the disclosed features are possible. It is therefore evident that various modifications may be made thereto without departing from the scope or spirit of the disclosure. Further, or in the alternative, other embodiments of the disclosure may be apparent from consideration of the specification and drawings, and practice of the disclosure as presented herein. It is intended that the examples set forth in this specification and figures be considered illustrative in all respects as illustrative and not limiting. Although specific terms are employed herein, they are used in a generic and descriptive sense only and not for purposes of limitation.

Claims (10)

1. A method of verifying transactions based on blockchain, the method comprising the steps of:
obtaining the block position corresponding to the payment transaction to be verified,
verifying the existence of the transaction to be verified according to the block position corresponding to the payment transaction to be verified, and verifying the authenticity of the transaction to be verified if the transaction to be verified exists;
the verifying the authenticity of the transaction to be verified comprises: encrypting and broadcasting the payment transaction to be verified to a blockchain node, and verifying the encrypted payment transaction to be verified by the blockchain node.
2. The method of claim 1, wherein the obtaining the block location corresponding to the payment transaction to be validated comprises:
calculating a transaction hash value of the payment to be verified;
acquiring and storing a block head of a longest chain in a block chain from a block chain network;
acquiring a hash value authentication path of a merck tree corresponding to payment to be verified, and calculating a first root hash value of the merck tree according to the hash value authentication path;
and comparing the first root hash value with a second root hash value of the merck tree in the local block header, and if the comparison is consistent, positioning the first root hash value to the position of the block corresponding to the first root hash value.
3. The method of claim 2, wherein verifying the presence of the transaction for which payment is to be verified comprises:
verifying whether the block head of the block is contained in the known longest chain according to the position of the block, and if not, paying for verification failure.
4. The method of claim 3, wherein encrypting and broadcasting the payment transaction to be validated to a block chain link point comprises:
calculating a transaction hash value of the payment to be verified, and performing asymmetric encryption on the transaction hash value of the payment to be verified to generate signature information;
broadcasting the signature information and the transaction of the payment to be verified to a blockchain node;
the step of generating signature information by asymmetrically encrypting the transaction hash value of the payment to be verified comprises the following steps: and carrying out asymmetric encryption on the transaction hash value of the payment to be verified by using a public key to generate signature information.
5. The method of claim 4, wherein the blockchain node verifying the encrypted payment to verify transaction comprises:
acquiring signature information and a transaction of payment to be verified;
performing asymmetric decryption on the signature information by using a private key corresponding to the public key to obtain a decrypted hash value;
carrying out hash operation on the transaction of the payment to be verified by using the same hash algorithm for calculating the transaction hash value of the payment to be verified to obtain a secondary hash value;
and comparing the decrypted hash value with the secondary hash value, and if the comparison is consistent, verifying to pass.
6. The method as recited in claim 2, further comprising:
generating a secondary authentication base according to the amount of the transaction to be verified and paid, and generating secondary encryption information by the secondary authentication base, the current time and the public key;
broadcasting the secondary encryption information to a blockchain node.
7. The method as recited in claim 6, further comprising: acquiring secondary encryption information;
the verification process further comprises the following steps:
acquiring the time of the received secondary encryption information, and asymmetrically decrypting the secondary encryption information by using a private key corresponding to the public key and the time of the received secondary encryption information to generate a secondary authentication base;
extracting the amount of the transaction to be verified and paid from the secondary authentication base, comparing the amount with the amount in the acquired transaction to be verified and paid, and if the comparison is consistent, verifying the transaction;
before the transaction verification is passed, further comprising:
and acquiring the signature information, the transaction of the payment to be verified, the position information of the client of the secondary encryption information and the camera of the client to be called for face recognition, and verifying the transaction if the face recognition is successful.
8. A blockchain-based verification system for conducting transactions, the system comprising:
the client unit acquires the block position corresponding to the payment transaction to be verified;
verifying the existence of the transaction to be verified according to the block position corresponding to the payment transaction to be verified;
the block chain node unit is used for verifying the authenticity of the transaction to be verified and paid;
the client secondary encryption unit generates a secondary authentication base according to the amount of the transaction to be verified and paid, and generates secondary encryption information from the secondary authentication base, the current time and the public key;
a blockchain node secondary decryption unit, which obtains the time of the received secondary encryption information, and uses a private key corresponding to the public key and the time of the received secondary encryption information to asymmetrically decrypt the secondary encryption information to generate a secondary authentication base;
and extracting the amount of the transaction to be verified and paid from the secondary authentication base, comparing the amount with the amount in the acquired transaction to be verified and paid, and if the comparison is consistent, verifying the transaction.
9. A non-transitory computer-readable storage medium storing computer-executable instructions which, when executed by one or more processors, cause the one or more processors to perform the blockchain-based transaction verification method of any of claims 1-7.
10. A computer program product comprising a computer program stored on a non-transitory computer readable storage medium, the computer program comprising program instructions that when executed by a processor cause the processor to perform the blockchain-based transaction verification method of any of claims 1-7.
CN202110192019.0A 2021-02-19 2021-02-19 Verification method and system for conducting transaction based on blockchain Active CN112991058B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110192019.0A CN112991058B (en) 2021-02-19 2021-02-19 Verification method and system for conducting transaction based on blockchain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110192019.0A CN112991058B (en) 2021-02-19 2021-02-19 Verification method and system for conducting transaction based on blockchain

Publications (2)

Publication Number Publication Date
CN112991058A CN112991058A (en) 2021-06-18
CN112991058B true CN112991058B (en) 2023-09-22

Family

ID=76393641

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110192019.0A Active CN112991058B (en) 2021-02-19 2021-02-19 Verification method and system for conducting transaction based on blockchain

Country Status (1)

Country Link
CN (1) CN112991058B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115277021A (en) * 2022-07-29 2022-11-01 蚂蚁区块链科技(上海)有限公司 Method and device for preventing network attack

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107077674A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 Transaction verification processing method and device and node equipment
KR20180014534A (en) * 2016-08-01 2018-02-09 서강대학교산학협력단 Verification system and method for transaction based block chain
CN109427012A (en) * 2017-08-22 2019-03-05 汇链丰(北京)科技有限公司 A kind of transaction and verification method based on block chain
CN109658240A (en) * 2018-11-20 2019-04-19 深圳变设龙信息科技有限公司 A kind of data trade method, apparatus and terminal device based on block chain
CN110599177A (en) * 2019-09-23 2019-12-20 腾讯科技(深圳)有限公司 Transaction verification method and related equipment
CN111614709A (en) * 2019-02-26 2020-09-01 傲为信息技术(江苏)有限公司 Partition transaction method and system based on block chain
CN112101944A (en) * 2020-09-28 2020-12-18 平安壹钱包电子商务有限公司 Efficient privacy payment implementation method and device, computer equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR20180014534A (en) * 2016-08-01 2018-02-09 서강대학교산학협력단 Verification system and method for transaction based block chain
CN107077674A (en) * 2016-12-29 2017-08-18 深圳前海达闼云端智能科技有限公司 Transaction verification processing method and device and node equipment
CN109427012A (en) * 2017-08-22 2019-03-05 汇链丰(北京)科技有限公司 A kind of transaction and verification method based on block chain
CN109658240A (en) * 2018-11-20 2019-04-19 深圳变设龙信息科技有限公司 A kind of data trade method, apparatus and terminal device based on block chain
CN111614709A (en) * 2019-02-26 2020-09-01 傲为信息技术(江苏)有限公司 Partition transaction method and system based on block chain
CN110599177A (en) * 2019-09-23 2019-12-20 腾讯科技(深圳)有限公司 Transaction verification method and related equipment
CN112101944A (en) * 2020-09-28 2020-12-18 平安壹钱包电子商务有限公司 Efficient privacy payment implementation method and device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN112991058A (en) 2021-06-18

Similar Documents

Publication Publication Date Title
CN111090876B (en) Contract calling method and device
CN107925572B (en) Secure binding of software applications to communication devices
US20210279736A1 (en) Blockchain secure transaction method and device based on biomarker authentication
CN112260826B (en) Method for secure credential provisioning
CN111756533B (en) System, method and storage medium for secure password generation
KR102255287B1 (en) Physical identity management system using One-time-password on Blockchain
CN111859422A (en) Digital asset deposit certificate system based on block chain
KR20200028961A (en) Blockchain-implementation event-method and system for lock encryption
AU2019207310A1 (en) Anti-replay attack authentication protocol
CN105900375A (en) Efficient methods for protecting identity in authenticated transmissions
CN111355749A (en) Efficient method for authenticated communication
WO2017000648A1 (en) Authentication method and apparatus for reinforced software
US20090119505A1 (en) Transaction method and verification method
CN110942382A (en) Electronic contract generating method and device, computer equipment and storage medium
CN111210287A (en) Tax UKey-based invoicing method and system
WO2019178763A1 (en) Certificate importing method and terminal
CN112991058B (en) Verification method and system for conducting transaction based on blockchain
CN107453871A (en) Password generated method, password authentication method, method of payment and device
CN114143312A (en) Block chain-based edge computing terminal authentication method, system and equipment
KR101876672B1 (en) Digital signature method using block chain and system performing the same
CN113205342A (en) User identity authentication method and device based on multi-terminal payment
KR102466866B1 (en) Data verification method
US11729159B2 (en) System security infrastructure facilitating protecting against fraudulent use of individual identity credentials
Wilusz et al. Securing cryptoasset insurance services with multisignatures
CN112905698A (en) Data processing method of block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant