CN114663234A - System and method for supervising abnormal transactions on block chain - Google Patents

System and method for supervising abnormal transactions on block chain Download PDF

Info

Publication number
CN114663234A
CN114663234A CN202210300793.3A CN202210300793A CN114663234A CN 114663234 A CN114663234 A CN 114663234A CN 202210300793 A CN202210300793 A CN 202210300793A CN 114663234 A CN114663234 A CN 114663234A
Authority
CN
China
Prior art keywords
sender
abnormal
transaction
data packet
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210300793.3A
Other languages
Chinese (zh)
Inventor
李志伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangdong Qilian Technology Co ltd
Original Assignee
Guangdong Qilian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangdong Qilian Technology Co ltd filed Critical Guangdong Qilian Technology Co ltd
Priority to CN202210300793.3A priority Critical patent/CN114663234A/en
Publication of CN114663234A publication Critical patent/CN114663234A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Health & Medical Sciences (AREA)
  • Business, Economics & Management (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • Computer Hardware Design (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Computing Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Medical Informatics (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a supervision system and a method for abnormal transactions on a block chain, wherein a sender sends a transaction request to a receiver, encrypts a data packet containing transaction information to obtain a new data packet and sends the new data packet to the receiver, the receiver receives the new data packet and decrypts the new data packet, if the decryption is unsuccessful, the transaction in the new data packet is determined to be an abnormal transaction, a sender corresponding to the abnormal transaction is determined to be an abnormal sender, and applies for supervision on the abnormal transaction to an audit node, after the audit node obtains a user transaction identifier of the abnormal sender, the network identity identifier of the abnormal sender is determined according to the user transaction identifier of the abnormal sender, and finally the user transaction identifier and the network identity identifier of the abnormal sender are cancelled to complete supervision on the abnormal transaction on the block chain, and the scheme can better realize supervision on the abnormal transaction while ensuring that the sender has anonymity, maintaining normal operation of the blockchain.

Description

System and method for supervising abnormal transactions on block chain
Technical Field
The application relates to the technical field of block chains, in particular to a system and a method for supervising abnormal transactions on a block chain.
Background
Block chains are a recent research hotspot and have gradual application in a plurality of fields. However, due to the characteristics of decentralized blockchain and the like, many security problems are caused, and many abnormal transactions based on blockchain technology are given off, for example, some malicious nodes (abnormal sender) can surreptitiously change themselves into a sender or a receiver of normal transactions so as to benefit from the transactions, so that the sender can sign or encrypt a data packet containing transaction information in the transaction process, the anonymity of the transactions is improved, and the abnormal operation of the abnormal sender on the transactions is reduced.
The increase of the anonymity of the transaction undoubtedly increases the supervision difficulty of the auditing node on the abnormal transaction, and the conventional supervision method cannot better realize supervision on an abnormal sender and influence the normal operation of a block chain.
Disclosure of Invention
In view of this, the present application provides a system and a method for supervising abnormal transactions on a block chain, which are used to solve the defect that the existing supervision method cannot better realize supervision on an abnormal sender and affect normal operation of the block chain.
To achieve the above object, the proposed solution is as follows:
in a first aspect, a system for supervising abnormal transactions on a block chain includes a sender, a receiver and an audit node, where:
the sender is used for sending a transaction request to the receiver and encrypting the data packet containing the transaction information to obtain a new data packet; sending the new data packet to the receiver;
the receiving party is used for responding to the instruction of the sending party for initiating the transaction request, receiving the new data packet and decrypting the new data packet; if the decryption fails, determining the transaction in the new data packet as an abnormal transaction, and determining a sender corresponding to the abnormal transaction as an abnormal sender; applying for supervision of the abnormal transaction to an auditing node;
the auditing node is used for responding to a command of a receiver for monitoring the abnormal transaction and acquiring a user transaction identifier of the abnormal sender; determining the network identity identification of the abnormal sender according to the user transaction identification of the abnormal sender; and canceling the user transaction identification and the network identity identification of the abnormal sender to complete the supervision of the abnormal transaction on the block chain.
Preferably, after determining the network identity of the abnormal sender according to the user transaction identifier of the abnormal sender, the audit node is further configured to:
obtaining the user ID of the abnormal sender according to the network identity of the abnormal sender;
and canceling the user ID of the abnormal sender to complete the supervision of the abnormal transaction on the block chain.
Preferably, the process of encrypting the data packet containing the transaction information by the sender to obtain a new data packet includes:
encrypting a data packet containing transaction information by using a first private key of the data packet to obtain a first data packet; the first private key of the sender and the user transaction identification of the sender form a key pair;
acquiring a user transaction identifier of a receiver, and encrypting the first data packet by using the user transaction identifier of the receiver to obtain a second data packet; the method comprises the following steps that a user transaction identifier of a receiving party and a first private key of the receiving party form a key pair;
encrypting the second data packet by using a second private key of the second data packet to obtain a new data packet; and the second private key of the sender and the network identity of the sender form a key pair.
Preferably, the receiving party decrypts the new data packet; if the decryption fails, determining the transaction in the new data packet as an abnormal transaction, and determining a sender corresponding to the abnormal transaction as an abnormal sender, wherein the process comprises the following steps of:
acquiring a network identity of a sender and a user transaction identity of the sender;
decrypting the new data packet by using the network identity of the sender;
if the decryption is successful, the second data packet is obtained, and the second data packet is decrypted by using a first private key of the second data packet;
if the decryption is successful, the first data packet is obtained, and the user transaction identification of the sender is used for decrypting the first data packet;
and if the decryption fails, determining the transaction in the new data packet as an abnormal transaction, and determining a sender corresponding to the abnormal transaction as an abnormal sender.
Preferably, after decrypting the new data packet by using the network identity of the sender, the receiver is further configured to:
and if the decryption fails, determining the transaction in the new data packet as an abnormal transaction, and determining a sender corresponding to the abnormal transaction as an abnormal sender.
Preferably, after decrypting the second data packet by using the first private key of the receiver, the receiver is further configured to:
and if the decryption fails, determining the transaction in the new data packet as an abnormal transaction, and determining a sender corresponding to the abnormal transaction as an abnormal sender.
Preferably, the process of determining, by the audit node, the network identity of the abnormal sender according to the user transaction identifier of the abnormal sender includes:
and sending the user transaction identification of the abnormal sender to a certificateless public key cryptosystem, so that the certificateless public key cryptosystem can inquire the network identity identification of the abnormal sender according to the user transaction identification of the abnormal sender.
Preferably, the process of obtaining, by the audit node, the user ID of the abnormal sender according to the network identity of the abnormal sender includes:
and sending the network identity of the abnormal sender to an identification password system, so that the identification password system can inquire the user ID of the abnormal sender according to the network identity of the abnormal sender.
In a second aspect, a method for supervising abnormal transactions on a blockchain, applied to an audit node, includes:
responding to a command of a receiver for monitoring abnormal transactions, and acquiring a user transaction identifier of an abnormal sender;
the abnormal transaction and the abnormal sender are determined by the receiver after responding to a request instruction of the sender for initiating the transaction, decrypting a new data packet sent by the sender and failing to decrypt, wherein the new data packet is obtained by encrypting a data packet containing transaction information by the sender, and the transaction information is the transaction information of the transaction initiated by the sender to the receiver; the abnormal sender is a sender corresponding to the abnormal transaction;
determining the network identity identification of the abnormal sender according to the user transaction identification of the abnormal sender;
and canceling the user transaction identification and the network identity identification of the abnormal sender to complete the supervision of the abnormal transaction on the block chain.
Preferably, after the network identity of the abnormal sender is determined according to the user transaction identity of the abnormal sender, the method further includes:
obtaining a user ID of the abnormal sender according to the network identity of the abnormal sender;
and canceling the user ID of the abnormal sender to complete the supervision of the abnormal transaction on the block chain.
It can be seen from the above technical solutions that the present application provides a system and a method for supervising abnormal transactions on a block chain, including a sender, a receiver and an audit node, wherein the sender initiates a transaction request to the receiver, encrypts a data packet containing transaction information to obtain a new data packet, sends the new data packet to the receiver, the receiver responds to a transaction request instruction initiated by the sender, receives the new data packet, decrypts the new data packet, determines a transaction in the new data packet as an abnormal transaction if decryption is unsuccessful, determines a sender corresponding to the abnormal transaction as an abnormal sender, and applies to the audit node for supervision of the abnormal transaction, after the audit node obtains a user transaction identifier of the abnormal sender, determines a network identity identifier of the abnormal sender according to the user transaction identifier of the abnormal sender, and finally revokes the user transaction identifier and the network identity identifier of the abnormal sender, therefore, the system can inquire the network identity of the abnormal sender by using the user transaction identifier, and cancel the user transaction identifier and the network identity of the abnormal sender, thereby better realizing the supervision of the abnormal transaction while ensuring the anonymity of the sender, more accurately finding out the abnormal sender from which the abnormal sender acts, punishing the abnormal sender and maintaining the normal operation of the block chain.
Drawings
Fig. 1 is a block diagram of an alternative structure of a monitoring system provided in an embodiment of the present application;
fig. 2 is a signaling interaction diagram of a monitoring method provided in an embodiment of the present application;
fig. 3 is a schematic view of an application scenario of the monitoring system in the blockchain according to the embodiment of the present application;
fig. 4 is an alternative flowchart of the supervision method according to the embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
The block chain is essentially a shared database, and the data or information stored in the database has the characteristics of unforgeability, whole-course trace retention, traceability, public transparency, collective maintenance and the like, and the characteristics lay the foundation of trust of the block chain technology. Wherein each block consists of transactions generated over a period of time, packaged by computer nodes that obtain accounting rights, and independently verified by each computer node. The transaction on the blockchain is the minimum unit of state conversion on the blockchain, is initiated by a signature of a sender, and carries out operations of transferring specific digital assets or carrying out intelligent contract calling and the like to influence the state of the blockchain.
However, the characteristics of decentralized block chain cause many safety problems, so that many transactions based on the block chain technology fall into tools of grey industry and it is difficult to trace back to determine responsibility. How to realize the supervision of abnormal transactions on a block chain while ensuring the privacy and the safety of users becomes one of the important problems which need to be solved in the long-term development of the block chain technology.
The UTXO (open Transaction outputs) structure adopted by the blocks in the block chain system has the effect of tracing the source, but a malicious user (an abnormal sender) can disturb the Transaction relationship by using a special means, so that the Transaction cannot be bound with a Transaction initiator (a sender of the Transaction), and a data packet containing Transaction information and sent by the sender to a receiver can be maliciously operated, so that the data packet becomes the sender in the Transaction, and benefits are obtained. Therefore, the real sender signs or encrypts the data packet containing the transaction information in the transaction process, the anonymity of the transaction is improved, and the abnormal operation of the abnormal sender on the transaction is reduced. However, the increase of the anonymity of the transaction undoubtedly increases the difficulty of monitoring the abnormal transaction by the audit node, and the conventional monitoring method cannot better monitor the abnormal sender and influence the normal operation of the block chain.
To solve the above-mentioned drawbacks of the prior art, an embodiment of the present application provides a system and a method for supervising an abnormal transaction on a block chain, and an optional system block diagram is shown in fig. 1, where the system includes a receiver 1, a sender 2, and an auditing node 3. The receiver 1, the sender 2 and the abnormal sender can all belong to common nodes, and the common nodes are common users participating in transactions. The auditing node 3 audits the nodes (common nodes) participating in the transaction in the whole network through the transaction information in the decentralized network. Referring to fig. 1, a sender 1 initiates a transaction to a receiver 2, if an abnormal sender intercepts the transaction and initiates an abnormal transaction to the receiver 2, the receiver 2 initiates a request for monitoring the abnormal transaction to an audit node 3, and then the audit node 3 traces the source and monitors the abnormal transaction, and then revokes the identity of the abnormal sender.
Next, an interaction flow between modules in the supervision system for abnormal transactions on a block chain provided by the present application is described with reference to fig. 2, as shown in fig. 2:
the sender 1 is used for sending a transaction request to the receiver 2 and encrypting a data packet containing transaction information to obtain a new data packet; the new data packet is sent to receiver 2.
The receiving party 2 is used for responding to the instruction of the sending party 1 for initiating the transaction request, receiving the new data packet and decrypting the new data packet; if the decryption fails, determining the transaction in the new data packet as an abnormal transaction, and determining a sender corresponding to the abnormal transaction as an abnormal sender; and applying for supervision of abnormal transactions to the auditing node 3.
The auditing node 3 is used for responding to the instruction of the monitoring request of the receiver 2 to the abnormal transaction and acquiring the user transaction identifier of the abnormal sender; determining the network identity identification of the abnormal sender according to the user transaction identification of the abnormal sender; and canceling the user transaction identification and the network identity identification of the abnormal sender to complete the supervision of the abnormal transaction on the block chain.
In the above embodiment, the sender 1 sends a transaction request to the receiver 2, encrypts a data packet containing transaction information to obtain a new data packet, and sends the new data packet to the receiver 2, the receiver 2 responds to a transaction request instruction sent by the sender 1 and receives the new data packet, decrypts the new data packet, determines a transaction in the new data packet as an abnormal transaction if decryption is unsuccessful, determines a sender corresponding to the abnormal transaction as an abnormal sender, and applies for supervision on the abnormal transaction to an audit node, after the audit node obtains a user transaction identifier of the abnormal sender, determines a network identity identifier of the abnormal sender according to the user transaction identifier of the abnormal sender, and finally cancels the user transaction identifier and the network identity identifier of the abnormal sender, thereby completing supervision on the abnormal transaction on the block chain, the system can query the network identity identifier of the abnormal sender by using the user transaction identifier, and the user transaction identification and the network identity identification of the abnormal sender are cancelled, so that the monitoring of the abnormal transaction can be better realized while the anonymity of the sender is ensured, the abnormal sender which acts as a peduncle can be more accurately found out, and is punished, and the normal operation of the block chain is maintained.
Specifically, an application scenario of the monitoring system provided by the embodiment of the present application on the blockchain may be as shown in fig. 3, please refer to fig. 3, the blockchain may include an application layer and a network layer, A, B and C represent common nodes, that is, a sender or a receiver of a transaction. The network layer comprises an identification password system, and the identification password system can generate a dynamically-changing network identity (EID) and a second private key (EIDsk) forming a key pair with the network identity for the common node according to the fixed ID of the common node. In the application layer, the user transaction identifier Address (i.e., W) may be generated by a certificateless public key cryptosystem using the network identity identifier EID. In addition, the blockchain may further include a backbone node, where the backbone node is a node responsible for communication between the common node and the audit node, and the audit node 3 may request to query the certificateless public key cryptosystem of the application layer for the network identity ID EID of the abnormal sender, or may query the network layer for the user ID of the abnormal sender.
Optionally, the specific generation process of generating the user transaction identifier through the certificateless public key cryptography by using the network identity identifier may include:
1) generating a master key pair (P, M) at an application layer, P representing a public key, M representing a private key, and selecting a relevant parameter, wherein the public key P and the relevant parameter are public in a blockchain.
2) And the user generates a part of key pairs (U, x) according to the related parameters, and processes the part of public keys U and the network identity EID by using a certificateless key management technology in a certificateless public key cryptosystem to obtain the key pairs (U, EID).
3) And (U, EID) generates partial key pairs (W, d) and sends the partial key pairs (W, d) to the user, and records the partial key pairs (EID, W) in the tracing correspondence list.
4) And processing the (W, d) by using a certificateless key management technology to generate a complete key pair (W, s), and disclosing the W as a user transaction identifier of the user.
It should be noted that any user in the blockchain has its own first private key S, user transaction identifier W, second private key EID, and network identity identifier EID, where both the user transaction identifier and the network identity identifier are public keys, the user transaction identifier is a first public key forming a pair of key pairs with the first private key, and the network identity identifier is a second public key forming a pair of key pairs with the second private key. In addition, in the process of encrypting the data packet, the sender 1 performs the first encryption and the second encryption on the application layer, and performs the third encryption on the network layer, so that the anonymity of the user can be improved.
In another embodiment of the present application, after the sender 1 initiates a transaction request to the receiver 2, it is further required to send a data packet containing transaction information to the receiver 2, and before sending the data packet to the receiver 2, the sender 1 may use its own first private key SAThe data packet is encrypted for the first time to obtain a first data packet, wherein the first private key S of the sender 1AUser transaction identification W with sender 1AForming a pair of key pairs; then, the user transaction identification of the receiver 2 is obtained, and the user transaction identification W of the receiver 2 can be utilizedBEncrypting the first data packet for the second time to obtain a second data packet, wherein the user transaction identifier W of the receiver 2BFirst private key S with receiver 2BForming a pair of key pairs; finally, the sender 1 can utilize the second private key EID of the senderAsk encrypts the obtained second data packet for the third time to obtain a new data packet, wherein the EID is the second private key of the sender 1ANetwork identity EID of sk and sender 1AForming a pair of key pairs.
After packing the new data packet, the sender 1 sends the new data packet to the receiver 2.
After receiving a request of a transaction initiated by the sender 1, the receiver 2 may obtain a network identity of the sender 1 and a user transaction identity of the sender, receive a new data packet, and then decrypt the new data packet, it should be noted that the new data packet received by the receiver 2 is not necessarily sent by the sender 1, and may be sent by an abnormal sender, because the abnormal sender may intercept the new data packet sent by the sender 1 to the receiver 2, and then encrypt its own data packet by using its own first private key, the user transaction identity of the receiver 2, and its own second private key, and then send it to the receiver 2, so that the new data packet received by the receiver 2 is not really sent by the sender 2, but sent by the abnormal sender, and thus when the receiver 2 decrypts the new data packet, it may fail to decrypt, the following three cases are included:
1) the receiving party 2 decrypts the new data packet by using the network identity of the sending party 1, and the abnormal sending party encrypts the data packet sent to the receiving party 2 by using the private key of the abnormal sending party step by step, so that the receiving party 2 fails to decrypt when decrypting the outermost layer of the password of the new data packet sent by the abnormal sending party by using the network identity of the real sending party 1, and because only the public key and the private key of the same user can become a pair of key pairs, the transaction in the new data packet can be determined as an abnormal transaction, the sending party corresponding to the abnormal transaction is determined as an abnormal sending party, and the monitoring of the abnormal transaction is applied to the auditing node.
2) The receiving party 2 decrypts the new data packet by using the network identity of the sending party 1, the decryption is successful to obtain a second data packet, the receiving party 2 decrypts the second data packet by using the first private key of the receiving party 2, and the abnormal sending party may not obtain the real user transaction identifier of the receiving party, so that the data packet is not encrypted by using the real user transaction identifier of the receiving party, and therefore, the receiving party 2 fails to decrypt when decrypting the second data packet by using the first private key of the receiving party 2, the transaction in the new data packet can be determined as an abnormal transaction, the sending party corresponding to the abnormal transaction is determined as an abnormal sending party, and the monitoring of the abnormal transaction is applied to the auditing node.
3) The receiving party 2 decrypts the new data packet by using the network identity of the sending party 1, the decryption is successful to obtain a second data packet, the receiving party 2 decrypts the second data packet by using a first private key of the receiving party 2, if the decryption is successful, a first data packet is obtained, then the first data packet is decrypted by using the user transaction identity of the sending party 1, the same is shown as 1), if the decryption is failed, the transaction in the new data packet can be determined as an abnormal transaction, the sending party corresponding to the abnormal transaction is determined as an abnormal sending party, and the monitoring of the abnormal transaction is applied to the auditing node.
Optionally, if the receiving side 2 can decrypt in one step to obtain an unencrypted data packet at the beginning, it may be shown that the sending side corresponding to the transaction in the data packet is the true sending side 1. If the receiving side 2 encounters any of the above 3 cases, the transaction in the new data packet may be determined as an abnormal transaction, and the sending side corresponding to the abnormal transaction may be determined as an abnormal sending side. At this time, the receiver 2 may report to the backbone node, and the backbone node applies for tracing and supervision of the abnormal transaction to the auditing node 3.
After receiving the supervision request instruction of the receiver 2 for the abnormal transaction, the audit node 3 may obtain the user transaction identifier of the abnormal sender, send the user transaction identifier of the abnormal sender to the certificateless public key cryptosystem in the block chain, so that the certificateless public key cryptosystem queries the network identity identifier of the abnormal sender according to the user transaction identifier of the abnormal sender, and then perform some punishment processing on the abnormal sender, for example, revoke the user transaction identifier and the network identity identifier of the abnormal sender, thereby completing supervision on the abnormal transaction on the block chain.
Optionally, after obtaining the network identity of the abnormal sender, the audit node 3 may send the network identity of the abnormal sender to an identification password system in the block chain, so that the identification password system queries a user ID (the ID may refer to a transaction account, a mobile phone number, an identity card number, an email, and the like, which may represent an identity of the abnormal sender) of the abnormal sender according to the network identity of the abnormal sender.
The method for supervising abnormal transactions in a block chain provided in the embodiment of the present application is described below, and the method for supervising abnormal transactions in a block chain described below and the system for supervising abnormal transactions in a block chain described above may be referred to in correspondence with each other.
With reference to fig. 4, a method for supervising abnormal transactions on a blockchain is described, as shown in fig. 4, the method is applied to an audit node 3, and the method includes:
s1: and responding to the instruction of the monitoring request of the receiver to the abnormal transaction, and acquiring the user transaction identifier of the abnormal sender.
The abnormal transaction and the abnormal sender are determined by the receiver after responding to a request instruction of the sender for initiating the transaction, decrypting a new data packet sent by the sender and failing to decrypt, wherein the new data packet is obtained by encrypting a data packet containing transaction information by the sender, and the transaction information is the transaction information of the transaction initiated by the sender to the receiver; and the abnormal sender is the sender corresponding to the abnormal transaction.
S2: and determining the network identity of the abnormal sender according to the user transaction identity of the abnormal sender.
S3: and canceling the user transaction identification and the network identity identification of the abnormal sender to complete the supervision of the abnormal transaction on the block chain.
Optionally, after determining the network identity of the abnormal sender according to the user transaction identifier of the abnormal sender, the audit node may further obtain the user ID of the abnormal sender according to the network identity of the abnormal sender; and canceling the user ID of the abnormal sender to complete the supervision of the abnormal transaction on the block chain.
Finally, it should also be noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
The embodiments in the present description are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same and similar parts among the embodiments are referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A supervision system for abnormal transactions on a blockchain is characterized by comprising a sender, a receiver and an audit node, wherein:
the sender is used for sending a transaction request to the receiver and encrypting the data packet containing the transaction information to obtain a new data packet; sending the new data packet to the receiver;
the receiving party is used for responding to the instruction of the sending party for initiating the transaction request, receiving the new data packet and decrypting the new data packet; if the decryption fails, determining the transaction in the new data packet as an abnormal transaction, and determining a sender corresponding to the abnormal transaction as an abnormal sender; applying for supervision of the abnormal transaction to an auditing node;
the auditing node is used for responding to a command of a receiver for monitoring the abnormal transaction and acquiring a user transaction identifier of the abnormal sender; determining the network identity identification of the abnormal sender according to the user transaction identification of the abnormal sender; and canceling the user transaction identification and the network identity identification of the abnormal sender to complete the supervision of the abnormal transaction on the block chain.
2. The system of claim 1, wherein the audit node, after determining the network identity of the anomalous sender based on the user transaction identity of the anomalous sender, is further configured to:
obtaining a user ID of the abnormal sender according to the network identity of the abnormal sender;
and canceling the user ID of the abnormal sender to complete the supervision of the abnormal transaction on the block chain.
3. The system of claim 1, wherein the process of encrypting the data packet containing the transaction information by the sender to obtain a new data packet comprises:
encrypting a data packet containing transaction information by using a first private key of the data packet to obtain a first data packet; the first private key of the sender and the user transaction identification of the sender form a key pair;
acquiring a user transaction identifier of a receiver, and encrypting the first data packet by using the user transaction identifier of the receiver to obtain a second data packet; the method comprises the following steps that a user transaction identifier of a receiving party and a first private key of the receiving party form a key pair;
encrypting the second data packet by using a second private key of the second data packet to obtain a new data packet; and the second private key of the sender and the network identity of the sender form a key pair.
4. The system of claim 3, wherein the recipient decrypts the new data packet; if the decryption fails, determining the transaction in the new data packet as an abnormal transaction, and determining a sender corresponding to the abnormal transaction as an abnormal sender, wherein the process comprises the following steps of:
acquiring a network identity of a sender and a user transaction identity of the sender;
decrypting the new data packet by using the network identity of the sender;
if the decryption is successful, the second data packet is obtained, and the second data packet is decrypted by using a first private key of the second data packet;
if the decryption is successful, the first data packet is obtained, and the user transaction identification of the sender is used for decrypting the first data packet;
and if the decryption fails, determining the transaction in the new data packet as an abnormal transaction, and determining a sender corresponding to the abnormal transaction as an abnormal sender.
5. The system according to claim 4, wherein the receiver, after decrypting the new data packet with the network identity of the sender, is further configured to:
and if the decryption fails, determining the transaction in the new data packet as an abnormal transaction, and determining a sender corresponding to the abnormal transaction as an abnormal sender.
6. The system of claim 4, wherein the receiving party, after decrypting the second data packet with its own first private key, is further configured to:
and if the decryption fails, determining the transaction in the new data packet as an abnormal transaction, and determining a sender corresponding to the abnormal transaction as an abnormal sender.
7. The system of claim 1, wherein the process of the audit node determining the network identity of the anomalous sender based on the user transaction identity of the anomalous sender comprises:
and sending the user transaction identification of the abnormal sender to a certificateless public key cryptosystem, so that the certificateless public key cryptosystem can inquire the network identity identification of the abnormal sender according to the user transaction identification of the abnormal sender.
8. The system according to claim 2, wherein the process of obtaining, by the audit node, the user ID of the abnormal sender according to the network identity of the abnormal sender comprises:
and sending the network identity of the abnormal sender to an identification password system, so that the identification password system can inquire the user ID of the abnormal sender according to the network identity of the abnormal sender.
9. A supervision method for abnormal transactions on a block chain is applied to an audit node and comprises the following steps:
responding to a command of a receiver for monitoring abnormal transactions, and acquiring a user transaction identifier of an abnormal sender;
the abnormal transaction and the abnormal sender are determined by the receiver after responding to a request instruction of the sender for initiating the transaction, decrypting a new data packet sent by the sender and failing to decrypt, wherein the new data packet is obtained by encrypting a data packet containing transaction information by the sender, and the transaction information is the transaction information of the transaction initiated by the sender to the receiver; the abnormal sender is a sender corresponding to the abnormal transaction;
determining a network identity of the abnormal sender according to the user transaction identifier of the abnormal sender;
and canceling the user transaction identification and the network identity identification of the abnormal sender to complete the supervision of the abnormal transaction on the block chain.
10. The method of claim 9, after determining the network id of the anomalous sender according to the user transaction id of the anomalous sender, further comprising:
obtaining a user ID of the abnormal sender according to the network identity of the abnormal sender;
and canceling the user ID of the abnormal sender to complete the supervision of the abnormal transaction on the block chain.
CN202210300793.3A 2022-03-25 2022-03-25 System and method for supervising abnormal transactions on block chain Pending CN114663234A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210300793.3A CN114663234A (en) 2022-03-25 2022-03-25 System and method for supervising abnormal transactions on block chain

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210300793.3A CN114663234A (en) 2022-03-25 2022-03-25 System and method for supervising abnormal transactions on block chain

Publications (1)

Publication Number Publication Date
CN114663234A true CN114663234A (en) 2022-06-24

Family

ID=82031958

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210300793.3A Pending CN114663234A (en) 2022-03-25 2022-03-25 System and method for supervising abnormal transactions on block chain

Country Status (1)

Country Link
CN (1) CN114663234A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115713334A (en) * 2022-11-28 2023-02-24 武汉利楚商务服务有限公司 Transaction data monitoring method and device

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115713334A (en) * 2022-11-28 2023-02-24 武汉利楚商务服务有限公司 Transaction data monitoring method and device

Similar Documents

Publication Publication Date Title
CN108768988B (en) Block chain access control method, block chain access control equipment and computer readable storage medium
CN109858262B (en) Process approval method, device and system based on block chain system and storage medium
CN105553951B (en) Data transmission method and device
CN1939028B (en) Accessing protected data on network storage from multiple devices
CN113591119B (en) Cross-domain identification analysis node data privacy protection and safety sharing method and system
CN101510888B (en) Method, device and system for improving data security for SaaS application
US20040117623A1 (en) Methods and apparatus for secure data communication links
US11831753B2 (en) Secure distributed key management system
CN101771699A (en) Method and system for improving SaaS application security
CN101720071A (en) Short message two-stage encryption transmission and secure storage method based on safety SIM card
CN108809936B (en) Intelligent mobile terminal identity verification method based on hybrid encryption algorithm and implementation system thereof
JP2022521525A (en) Cryptographic method for validating data
CN115967941A (en) Power 5G terminal authentication method and authentication system
CN113824553A (en) Key management method, device and system
CN113365264B (en) Block chain wireless network data transmission method, device and system
CN112887087B (en) Data management method and device, electronic equipment and readable storage medium
WO2021170049A1 (en) Method and apparatus for recording access behavior
CN102571338A (en) PKI (Public Key Infrastructure)-based method and system for certifying internet of things
CN114663234A (en) System and method for supervising abnormal transactions on block chain
KR20100025624A (en) Method for generating secure key using certificateless public key in insecure communication channel
CN114866244A (en) Controllable anonymous authentication method, system and device based on ciphertext block chaining encryption
CN114679262A (en) Quantum key distribution system and method fusing asymmetric system
JP2013236185A (en) Electronic signature proxy server, electronic signature proxy system, and electronic signature proxy method
CN109104393B (en) Identity authentication method, device and system
CN115208630B (en) Block chain-based data acquisition method and system and block chain system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination