CN106934623B - Account integrity checking method based on Ether house block chain technology - Google Patents

Account integrity checking method based on Ether house block chain technology Download PDF

Info

Publication number
CN106934623B
CN106934623B CN201611114664.6A CN201611114664A CN106934623B CN 106934623 B CN106934623 B CN 106934623B CN 201611114664 A CN201611114664 A CN 201611114664A CN 106934623 B CN106934623 B CN 106934623B
Authority
CN
China
Prior art keywords
node
account
transaction
integrity check
receiver
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201611114664.6A
Other languages
Chinese (zh)
Other versions
CN106934623A (en
Inventor
于镳
张雪来
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Unionpay Co Ltd
Original Assignee
China Unionpay Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Unionpay Co Ltd filed Critical China Unionpay Co Ltd
Priority to CN201611114664.6A priority Critical patent/CN106934623B/en
Publication of CN106934623A publication Critical patent/CN106934623A/en
Application granted granted Critical
Publication of CN106934623B publication Critical patent/CN106934623B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/407Cancellation of a transaction
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/363Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes with the personal data of a user
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Abstract

An account integrity checking method based on an Ethernet block chain technology comprises the following steps: a) the first node locates the second node according to the address of the account of the transaction receiver; b) if the second node is different from the first node, the first node sends an account integrity check instruction to the second node, and executes the step c 1); if the second node is the same node as the first node, executing step c 2); c1) the second node searches whether the first information of the account of the transaction receiver is stored on the second node according to the account integrity check instruction so as to return a first search result to the first node; c2) the second node searches the first information of the account of the transaction receiver at the second node to obtain a second search result; and d), if the first or second retrieval result is true, the first node continues to perform the current transaction; otherwise, the current transaction is terminated. The method can effectively avoid the situation that the transaction is successful and the digital currency cannot be circulated, and has the advantages of simple realization, convenient operation and good safety.

Description

Account integrity checking method based on Ether house block chain technology
Technical Field
The invention relates to the technical field of data storage, in particular to an account integrity checking method based on an Ethernet bay blockchain technology.
Background
The blockchain is an account book data storage mode, and is an addable general ledger database which exists on a point-to-point network in a multi-copy mode. The method has the characteristics of collective maintenance, decentralization, trust consensus mechanism, data non-tampering and the like. As a decentralized and public transparent distributed account book data storage mode, a block chain exists on a point-to-point network in a multi-copy mode.
Etherhouse, as a new generation of digital currency and blockchain platform, has gained a high degree of market attention with its features of supporting intelligent contracts and built-in Turing-complete scripting language. The nature of etherhouses frees transactions from downtime and review, and the establishment of fully decentralized organizations and decentralized companies has become possible, so this technology has now become one of the most competitive solutions in the area of blockchain. The application of blockchains and ether houses in the financial field is also widely valued by various financial institutions at home and abroad, and a plurality of companies have started to build financial infrastructure based on ether houses, build financial products of ether houses and improve the practicability of ether house technology.
With the development of digital technology, regulatory agencies in developed countries in europe and america have actively explored roles that digital currencies should take, and financial-related agencies have recently begun to accelerate related layouts for digital currencies. The blockchain and the digital currency are independent and mutually influenced, the blockchain is an underlying distributed cooperation technology, and the digital currency is a specific business application. Digital currency can be realized through a distributed ledger and blockchain technology, and can also be realized based on other centralized technologies.
With the popularity of the etherhouse blockchain technique, some of the drawbacks of the technique are also exposed. For example, in a specific implementation process, it is found that an ether house has a certain vulnerability in the aspect of private key storage, and when a user creates an account, the user may encounter the situation that the private key is not written into a file and stored in a specific directory after being created, so that the accounts are incomplete.
In the application scenario of digital currency, there is no mechanism for identifying such private key missing account, or the integrity of the user account cannot be effectively verified, which is also expected to be solved by those skilled in the art.
Disclosure of Invention
The invention aims to provide a technical scheme which can be realized based on an Ethernet block chain technology and can effectively verify the integrity of a user account.
In order to achieve the above purpose, the invention provides a technical scheme as follows:
an account integrity checking method based on an Ethernet block chain technology comprises the following steps: a) the first node locates the second node according to the address of the account of the transaction receiver; the first node is a node of an Ethernet house network where an account of a transaction initiator is located, and the second node is a node of the Ethernet house network where an account of a transaction receiver is located; b) if the second node is different from the first node, the first node sends an account integrity check instruction to the second node, and executes the following step c 1); if the second node is the same node as the first node, executing the following step c 2); c1) the second node searches whether the first information of the account of the transaction receiver is stored on the second node according to the account integrity check instruction so as to return a first search result to the first node and continue to execute the following step d); c2) the second node searches the first information of the account of the transaction receiver at the second node to obtain a second search result, and continues to execute the following step d); d) if the first retrieval result is true or the second retrieval result is true, the first node continues to perform the current transaction; otherwise, the first node terminates the current transaction.
Preferably, the first information is private key information of the transaction receiver account.
Preferably, the first information is integrity check information of the transaction recipient account.
The invention also discloses a digital currency transaction method based on the Etherhouse blockchain technology, which utilizes the account integrity check method to carry out integrity check on the account of the transaction receiver and continues the digital currency transaction based on the result of the integrity check.
The invention also discloses a digital currency transaction system based on the Ethernet bay blockchain technology, which comprises a plurality of Ethernet bay network nodes, wherein each Ethernet bay network node performs integrity check on the account of a transaction receiver by using the account integrity check method.
According to the account integrity checking method based on the Ethenhouse blockchain technology, aiming at the loophole existing in the aspect of private key storage of the Ethenhouse blockchain technology, the account integrity checking can be carried out before transaction, the condition that the transaction is successful and digital currency cannot be circulated can be effectively avoided, the property of a user can be effectively protected, and the complicated subsequent processing brought to financial institutions and the user by the abnormal condition can be avoided.
Drawings
Fig. 1 is a flowchart illustrating an account integrity checking method based on the etherhouse blockchain technique according to a first embodiment of the present invention.
Detailed Description
As shown in fig. 1, a first embodiment of the present invention provides an account integrity checking method based on the ethernet block chain technology, which includes the following steps:
in step S10, the first node locates the second node based on the address of the transaction recipient account.
Specifically, the first node is a node of an ethernet network where an account of the transaction initiator is located, and the second node is a node of an ethernet network where an account of the transaction receiver is located.
Step S11, it is determined whether the first node and the second node are the same node.
Subsequently, when the second node is different from the first node, the following two steps S120 and S122 are performed.
Step S120, the first node sends an account integrity check instruction to the second node.
And step S122, the second node searches whether the first information of the account of the transaction receiver is stored on the second node according to the account integrity check instruction, obtains a first search result and returns the first search result to the first node.
When the second node is the same node as the first node, the following step S121 is executed.
In step S121, the second node retrieves the first information of the transaction recipient account at itself and obtains a second retrieval result.
As one example, the first information may be private key information of the transaction recipient account.
As another example, the first information may be integrity check information of the transaction recipient account.
Finally, step S13 is executed to determine whether the first search result or the second search result is true.
Finally, when the first search result or the second search result is true, step S141 is executed to continue the current transaction. Otherwise, step S140 is executed to terminate the current transaction.
According to the first embodiment described above, the account integrity checking method may have two different flows. That is, in the case where the first node and the second node are different nodes, the account integrity checking method sequentially performs one of step S10, step S11, step S120, step S122, subsequent step S13, and step S140 or step S141. In the case that the first node and the second node are the same node, the account integrity check method sequentially performs step S10, step S11, step S121, the subsequent step S13, and one of step S140 or step S141. These two different flows are performed in an alternative manner and do not occur simultaneously.
The account integrity checking method based on the etherhouse blockchain technology provided by the first embodiment is used for checking the account integrity before the transaction aiming at the loophole of the etherhouse blockchain technology in the aspect of private key storage, so that the condition that the transaction is successful and the digital currency cannot be circulated can be effectively avoided, the property of the user can be effectively protected, and the complicated subsequent processing brought to the financial institution and the user by the abnormal condition can be avoided. Meanwhile, the account integrity checking method is simple to implement, convenient to operate and good in safety due to the fact that the account integrity checking method is based on the Ether house block chain technology.
The second embodiment of the present invention provides a digital currency transaction method based on the etherhouse blockchain technology, which utilizes the account integrity check method in the first embodiment to perform integrity check on the account of the transaction receiver, and continues to perform digital currency transaction based on the result of the integrity check.
The digital currency transaction method can be applied to fund transfer and circulation among financial institutions, and can also be applied to online shopping, electronic transaction and the like of individual users.
As an example of a specific implementation, after a user initiates a digital currency transaction, the ethernet shop network (a first node) performs "account location" according to the recipient account information of the transaction, quickly locates a node (a second node) where the recipient account is located, and proposes an account integrity check to the node. After receiving the account integrity check instruction, the node (second node) searches the corresponding private key in a specific directory, and if a legal private key file is searched, the transaction continues; otherwise, the transaction is automatically cancelled and an error message is returned.
Specifically, the scheme utilizes the characteristic that when the ether house stores the private key, the address of the user account is attached to the last stored information, and the private key is retrieved by taking the account of the receiving party as a keyword under the storage directory of the private key:
if the account of the initiator and the account of the receiver are positioned under the same node, the account of the receiver is directly searched in the storage address (default to a keystore folder) of the private key of the node by taking the account of the receiver as a keyword.
If the accounts of the initiator and the receiver are located in different nodes, the node (second node) where the initiator and the receiver are located is traced back according to the address of the receiver, the private key storage address under the node is accessed, and the account of the receiver is used as a keyword for retrieval.
Then, returning a Boolean value according to whether a retrieval result is obtained or not; and judging whether to continue the transaction according to the return value. If true is returned, the Ethernet shop network confirms that the private key of the account of the receiving party exists and determines that the transaction can be carried out, so that the client of the initiating party is indicated that the transaction can be continued, and the transaction becomes a state to be determined; if false is returned, the Etherhouse network confirms that the private key of the account of the receiving party does not exist, determines that the transaction is invalid, can terminate the transaction and return error information to the initiating party.
The third embodiment of the present invention provides a digital currency transaction system based on the ethernet bay blockchain technology, which includes a plurality of ethernet bay network nodes, wherein each ethernet bay network node performs integrity check on the account of the transaction recipient by using the account integrity check method in the first embodiment.
The digital currency transaction system can be realized based on a mature Ether house blockchain technology, the realization cost is low, and the characteristics of decentralization, a trust consensus mechanism, data non-tampering and the like of the Ether house blockchain technology also ensure that the digital currency transaction is safe and reliable.
The above description is only for the preferred embodiment of the present invention and is not intended to limit the scope of the present invention. Various modifications may be made by those skilled in the art without departing from the spirit of the invention and the appended claims.

Claims (3)

1. An account integrity checking method based on an Ethernet block chain technology comprises the following steps:
a) the first node locates the second node according to the address of the account of the transaction receiver; the first node is a node of an Ethernet network where an account of a transaction initiator is located, and the second node is a node of the Ethernet network where an account of a transaction receiver is located;
b) if the second node is different from the first node, the first node sends an account integrity check instruction to the second node, and executes the following step c 1); if the second node is the same as the first node, executing the following step c 2);
c1) the second node searches whether the first information of the account of the transaction receiver is stored on the second node according to the account integrity check instruction so as to return a first search result to the first node and continue to execute the following step d);
c2) the second node searches the first information of the account of the transaction receiver at the second node to obtain a second search result, and continues to execute the following step d);
d) if the first retrieval result is true or the second retrieval result is true, the first node continues to perform the current transaction; otherwise, the first node terminates the current transaction,
wherein the first information is private key information of the account of the transaction receiver,
2. a digital money transaction method based on the etherhouse blockchain technology, which performs an integrity check on a transaction receiver account using the account integrity check method as described in claim 1 above, and proceeds with the digital money transaction based on the result of the integrity check.
3. A digital money transaction system based on ethernet house blockchain technology comprising a plurality of ethernet house network nodes, each of said ethernet house network nodes integrity-checking a transaction recipient account using the account integrity checking method of claim 1 above.
CN201611114664.6A 2016-12-07 2016-12-07 Account integrity checking method based on Ether house block chain technology Active CN106934623B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201611114664.6A CN106934623B (en) 2016-12-07 2016-12-07 Account integrity checking method based on Ether house block chain technology

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201611114664.6A CN106934623B (en) 2016-12-07 2016-12-07 Account integrity checking method based on Ether house block chain technology

Publications (2)

Publication Number Publication Date
CN106934623A CN106934623A (en) 2017-07-07
CN106934623B true CN106934623B (en) 2021-06-08

Family

ID=59444052

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201611114664.6A Active CN106934623B (en) 2016-12-07 2016-12-07 Account integrity checking method based on Ether house block chain technology

Country Status (1)

Country Link
CN (1) CN106934623B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109615348A (en) * 2018-10-18 2019-04-12 玄章技术有限公司 A kind of method of mark encryption currency wallet address and a kind of encryption money-system
CN109801071B (en) * 2019-01-17 2020-09-29 厦门美图之家科技有限公司 Password resetting method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101490688A (en) * 2006-07-07 2009-07-22 桑迪士克股份有限公司 Content control system and method using certificate revocation lists
CN102419809B (en) * 2011-10-29 2014-07-16 重庆君盾科技有限公司 Safe, efficient and universal method for proving original value of electronic document
SI3073670T1 (en) * 2015-03-27 2021-07-30 Black Gold Coin, Inc. A system and a method for personal identification and verification
CN105678182B (en) * 2015-12-29 2019-04-12 布比(北京)网络技术有限公司 A kind of method and device of data manipulation control

Also Published As

Publication number Publication date
CN106934623A (en) 2017-07-07

Similar Documents

Publication Publication Date Title
US11615362B2 (en) Universal model scoring engine
CN110046998B (en) Cross-chain right using system, method, device, electronic equipment and storage medium
US8838988B2 (en) Verification of transactional integrity
US20160321745A1 (en) Account binding processing method, apparatus and system
JP2020505799A (en) System and method for replay attack detection
US20150356524A1 (en) System and method for executing financial transactions
US11263622B2 (en) Computer-implemented system and method for determining the state of a machine executable contract implemented using a blockchain
CN107945017B (en) Hybrid chain accounting method based on multi-stage verification
TW201800989A (en) Method for marking digital currency circulation by using block chains
JP2020505663A (en) System and method for replay attack detection
US11605088B2 (en) Systems and methods for providing concurrent data loading and rules execution in risk evaluations
WO2020220740A1 (en) Blockchain-based invoice creation method, apparatus and electronic device
JP6760974B2 (en) Transaction processing method and system
US20140137265A1 (en) System and Method For Securing Critical Data In A Remotely Accessible Database
CN110428238A (en) The account cancelling method and system of block chain
CN106934623B (en) Account integrity checking method based on Ether house block chain technology
US20190188578A1 (en) Automatic discovery of data required by a rule engine
CN106161183A (en) Method for message interaction and social interaction server device and communication system
WO2019179249A1 (en) Payment method and device and electronic apparatus
TW201905813A (en) Smart contract executing system with permission rating and avoid duplication and method thereof
CN110648235A (en) Cross-chain asset transfer method based on trusted computing environment (TEE)
US10652276B1 (en) System and method for distinguishing authentic and malicious electronic messages
CN113095821A (en) Method and device for interaction of property rights
KR20210007928A (en) Techniques for trading cryptocurrency
CN106327187A (en) Information processing method and apparatus

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant