CN109447639A - Privacy transactions balances scan method, equipment and storage medium - Google Patents

Privacy transactions balances scan method, equipment and storage medium Download PDF

Info

Publication number
CN109447639A
CN109447639A CN201811237194.1A CN201811237194A CN109447639A CN 109447639 A CN109447639 A CN 109447639A CN 201811237194 A CN201811237194 A CN 201811237194A CN 109447639 A CN109447639 A CN 109447639A
Authority
CN
China
Prior art keywords
privacy
user
transaction
relevant parameter
account
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811237194.1A
Other languages
Chinese (zh)
Inventor
柳宇航
何正军
吴思进
王志文
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Hangzhou Fuzamei Technology Co Ltd
Original Assignee
Hangzhou Fuzamei Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Hangzhou Fuzamei Technology Co Ltd filed Critical Hangzhou Fuzamei Technology Co Ltd
Priority to CN201811237194.1A priority Critical patent/CN109447639A/en
Publication of CN109447639A publication Critical patent/CN109447639A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3829Payment protocols; Details thereof insuring higher security of transaction involving key management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction

Abstract

The present invention provides a kind of privacy transactions balances scan method, equipment and storage medium, this method comprises: sending privacy transaction request information to the node of the first block chain;The node for receiving the first block chain is traded according to several privacies that the privacy transaction request information returns, and is filtered out several first privacies related with this user from privacy transaction according to the private key held and traded;The privacy account relevant parameter for updating this user trade according to first privacy with the privacy account balance of this determining user.Present invention realization quickly filters out privacy transaction related with this user from combined account model, and determines the privacy account balance of this user, provides good user experience for user.

Description

Privacy transactions balances scan method, equipment and storage medium
Technical field
This application involves internet financial technology fields, and in particular to a kind of privacy transactions balances scan method, equipment and Storage medium.
Background technique
In existing block chain technology, independent regular account model is generally used, or individually UTXO model, needed not distinguish between General transaction (corresponding to independent regular account model) and privacy transaction (corresponding to UTXO model), are unable to satisfy user for not With the demand of the privacy of transaction.Also, in existing UTXO model, the remaining sum for not spending transaction to export will not be tracked and recorded Information (UTXO not spent) and the balance information (UTXO spent) for not spending transaction to export spent, this results in using The client at family needs accent to begin stepping through all privacy transaction in the case where encountering some exceptions, verifying privacy transaction Belongingness, and traded according to the privacy for belonging to user and calculate the UTXO of user, need to consume a longer time and occupy a large amount of memories.
Summary of the invention
In view of drawbacks described above in the prior art or deficiency, be intended to provide one kind (both can include from combined account model General transaction includes privacy transaction again) in quickly filter out the transaction of related with this user privacy, determine the privacy account of this user Family remaining sum, and can quickly and continuous several times from privacy transactions balances scan method in abnormal restoring and few committed memory, set Standby and storage medium.
In a first aspect, the present invention provides a kind of privacy transactions balances scan method, comprising:
Privacy transaction request information is sent to the node of the first block chain;
It receives the node of the first block chain to be traded according to several privacies that privacy transaction request information returns, and according to being held Some private keys filter out several first privacy transaction related with this user from privacy transaction;
According to the first privacy trade update this user privacy account relevant parameter with determine this user privacy account more than Volume.
Second aspect, the present invention also provides a kind of equipment, including one or more processors and memory, wherein memory Comprising can by instruction that the one or more processors execute so that the one or more processors execute it is each according to the present invention Privacy transactions balances scan method, equipment and the storage medium that embodiment provides.
Fourth aspect, the present invention also provides a kind of storage medium for being stored with computer program, which makes to count Calculation machine executes privacy transactions balances scan method, equipment and the storage medium that each embodiment provides according to the present invention.
Privacy transactions balances scan method, equipment and the storage medium that many embodiments of the present invention provide are by the firstth area The node of block chain sends privacy transaction request information;Receive what the node of the first block chain was returned according to privacy transaction request information Several privacy transaction, and several first privacies related with this user are filtered out from privacy transaction according to the private key held and are handed over Easily;The privacy account relevant parameter for updating this user trade according to the first privacy with the side of the privacy account balance of this determining user Method, realization quickly filters out privacy transaction related with this user from combined account model, and determines the privacy account of this user Family remaining sum provides good user experience for user.
Privacy transactions balances scan method, equipment and the storage medium that some embodiments of the invention provide, which further pass through, leads The privacy account balance for entering the privacy account relevant parameter of latest edition and this user of latest edition, according to the hidden of latest edition Private account relevant parameter generates privacy transaction request information, wherein privacy transaction request information includes that the first privacy is traded most New block height;Traverse current block height to newest block height next block height each first privacy transaction, root It trades according to each first privacy and updates the method for the privacy account relevant parameter of this user, realization can quickly and continuous several times are from mixing Abnormal restoring privacy is traded in account model, and committed memory is few, provides good user experience for user.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, the application's is other Feature, objects and advantages will become more apparent upon:
Fig. 1 is the schematic diagram that privacy transactions balances scan scene in one embodiment of the invention.
Fig. 2 is a kind of flow chart for privacy transactions balances scan method that one embodiment of the invention provides.
Fig. 3 is the flow chart of step S17 in a kind of preferred embodiment of method shown in Fig. 2.
Fig. 4 is the flow chart of step S17 in a kind of preferred embodiment of method shown in Fig. 3.
Fig. 5 is a kind of flow chart of preferred embodiment of method shown in Fig. 4.
Fig. 6 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
Specific embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining related invention, rather than the restriction to the invention.It also should be noted that in order to Convenient for description, part relevant to invention is illustrated only in attached drawing.
It should be noted that in the absence of conflict, the features in the embodiments and the embodiments of the present application can phase Mutually combination.The application is described in detail below with reference to the accompanying drawings and in conjunction with the embodiments.
Fig. 1 is the schematic diagram that privacy transactions balances scan scene in one embodiment of the invention.As shown in Figure 1, in this implementation In example, to be cooperated by the node 101 on user 20 and block chain 10, so that 20 quick obtaining privacy of user is traded, sieve Select the transaction of related with this user privacy, and traded according to privacy related with this user update privacy account relevant parameter with For determining privacy account balance, it is described in detail in conjunction with Fig. 2-6 pairs of privacy transactions balances scan methods provided by the invention.
Fig. 2 is a kind of flow chart for privacy transactions balances scan method that one embodiment of the invention provides.As shown in Fig. 2, In the present embodiment, the present invention provides a kind of privacy transactions balances scan method, comprising:
S13: privacy transaction request information is sent to the node of the first block chain.
S15: the node for receiving the first block chain is traded according to several privacies that privacy transaction request information returns, and according to The private key held filters out several first privacy transaction related with this user from privacy transaction.
S17: the privacy account relevant parameter for updating this user of being traded according to the first privacy is with the privacy account of this determining user Family remaining sum.
Specifically, by taking application scenarios shown in FIG. 1 as an example, the current privacy account balance of user's first are as follows: 10UTXO, this 10 A UTXO is by 1 UTXO, 4 UTXO, 5 UTXO compositions;The block height of next block of first block chain 10 is H, should Block includes 5 transaction (tx1, tx2, tx3, tx4, tx5), wherein and having 3 transaction is that privacy is traded (tx1, tx2, tx3), 3 Having 1 privacy transaction in the transaction of privacy is that the first privacy relevant to user's first is traded (tx1), and tx1 indicates that user's first spends 2 A UTXO.
In step s 13, the client 20 of user's first sends privacy transaction request letter to the node 101 of the first block chain 10 Breath.
In step S15, the client 20 of user's first receives the node 101 of the first block chain 10 according to privacy transaction request Information, node 101 return to 3 privacies transaction tx1, tx2 and tx3 of the block that block height is H, user's first 20 to user's first 20 1 first privacy transaction tx1 related with this user is filtered out from tx1, tx2, tx3 according to the private key held.
In step S17, the client 20 of user's first updates the hidden of user's first according to tx1 (user's first spends 2 UTXO) Private account relevant parameter is to determine the privacy account balance of user's first.Due to the current privacy account balance of user's first are as follows: 10UTXO, 10 UTXO are that user's first spends 2 UTXO by 1 UTXO, 4 UTXO, 5 UTXO compositions, tx1;From 4 2 UTXO that user's first is spent are deducted in UTXO, 4 UTXO are identified as 4 STXO, but due to only spending 2 UTXO, then need Will be to 2 UTXO of user's first small change, the privacy account relevant parameter of updated user's first is 1 UTXO, 2 UTXO, 5 UTXO and 4 STXO;The client 20 of user's first determines the privacy of user's first according to the privacy account relevant parameter of user's first Account balance is 8 UTXO.
Above-described embodiment, which provides, realizes that privacy related with this user is quickly filtered out from combined account model trades, and It determines the privacy account balance of this user, provides good user experience for user.
Fig. 3 is the flow chart of step S17 in a kind of preferred embodiment of method shown in Fig. 2.As shown in figure 3, excellent one It selects in embodiment, step S17 includes:
S171: the privacy account relevant parameter of this user is updated in memory to determine this user according to the transaction of the first privacy Privacy account balance;
S173: the privacy account balance of privacy account relevant parameter and this user is stored into database newest to generate The privacy account balance of this user of the privacy account relevant parameter and latest edition of version.
Specifically, with application scenarios shown in FIG. 1, the privacy account relevant parameter of updated user's first is 1 UTXO, 2 UTXO, 5 UTXO and 4 STXO;It is shown in the client 20 of user's first, the privacy account balance of user's first is 8 For UTXO;
In step S171, the client 20 of user's first is traded according to the first privacy updates privacy account correlation in memory Parameter is 1 UTXO, 2 UTXO, 5 UTXO and 4 STXO;The client 20 of user's first is according to the privacy account phase of user's first Parameter is closed to determine the privacy account balance of user's first for 8 UTXO.
In step S173, the client 20 of user's first by privacy account relevant parameter (1 UTXO, 2 UTXO, 5 UTXO and 4 STXO) and the privacy account balance (8 UTXO) of this user store into database to generate the hidden of latest edition The privacy account balance of this user of private account relevant parameter and latest edition.
Above-described embodiment, which provides, to be realized the information of privacy account relevant parameter and privacy account balance with different versions It is recorded, user can track different colophons privacy account relevant parameter and the change of privacy account balance is believed Breath, provides good user experience for user.
In a preferred embodiment, privacy account relevant parameter, which includes at least one of the following:, does not spend transaction output (referred to as UTXO), the newest block height of transaction output (abbreviation STXO), the transaction of the first privacy has been spent.Specifically, with shown in FIG. 1 For application scenarios, user's first updates privacy account relevant parameter are as follows: 1 after the block acquisition tx1 that block height is H UTXO, 2 UTXO, 5 UTXO, 4 STXO, height: H.It, can also be according to actual needs by privacy account in more embodiments The newest block height parameter of the first privacy transaction in the relevant parameter of family is configured to other can be used for identifying the transaction and area The associated other parameters of block, for example, being configured to the id of block, it can be achieved that identical technical effect.
In a preferred embodiment, the transaction of the first block chained record is configured with first identifier, and first identifier is for identifying Whether privacy is traded for transaction, and privacy transaction is screened and returned according to first identifier by the node of the first block chain.Specifically, to scheme For application scenarios shown in 1, and to configure normal mark for general transaction, for privacy transaction configuration privacy mark, Node on first block chain assert tx1, tx2, tx3 are privacy by judging that tx1, tx2, tx3 are identified configured with privacy It trades, tx1, tx2, tx3 are sent to user's first by the node on the first block chain.In more embodiments, it can be handed over for privacy Easily and general transaction configure different marks for distinguish transaction whether be privacy trade, it can be achieved that identical technical effect.
Fig. 4 is the flow chart of step S17 in a kind of preferred embodiment of method shown in Fig. 3.As shown in figure 4, excellent one It selects in embodiment, step S17 includes:
S171: the privacy account relevant parameter of this user is updated in memory to determine this user according to the transaction of the first privacy Privacy account balance;
S173: the privacy account balance of privacy account relevant parameter and this user is stored into database newest to generate The privacy account balance of this user of the privacy account relevant parameter and latest edition of version;
S175: the privacy account relevant parameter of latest edition and the privacy account balance of this user of latest edition are exported Storage.
Specifically, with application scenarios shown in FIG. 1, the privacy account relevant parameter of updated user's first is 1 UTXO, 2 UTXO, 5 UTXO and 4 STXO;It is shown in the client 20 of user's first, the privacy account balance of user's first is 8 For UTXO;
In step S171, the client 20 of user's first is traded according to the first privacy updates privacy account correlation in memory Parameter is 1 UTXO, 2 UTXO, 5 UTXO and 4 STXO;The client 20 of user's first is according to the privacy account phase of user's first Parameter is closed to determine the privacy account balance of user's first for 8 UTXO.
In step S173, the client 20 of user's first by privacy account relevant parameter (1 UTXO, 2 UTXO, 5 UTXO and 4 STXO) and the privacy account balance (8 UTXO) of this user store into database to generate the hidden of latest edition The privacy account balance of this user of private account relevant parameter and latest edition.
In step S175, the client 20 of user's first by the privacy account relevant parameter of latest edition (1 UTXO, 2 UTXO, 5 UTXO and 4 STXO) and this user privacy account balance (8 UTXO) export storage.
It, can be by the privacy account relevant parameter of latest edition and the privacy account balance of this user in more embodiments Export storage is at different file formats, such as XML file, MDF file;It can also be by privacy account relevant parameter and this user Privacy account balance export storage at different file formats, such as XML file, MDF file, it can be achieved that identical technology imitate Fruit.
Fig. 5 is a kind of flow chart of preferred embodiment of method shown in Fig. 4.As shown in figure 5, in a preferred embodiment In, before sending privacy transaction request information to the node of the first block chain further include:
S11: the privacy account balance of the privacy account relevant parameter of latest edition and this user of latest edition, root are imported Privacy transaction request information is generated according to the privacy account relevant parameter of latest edition, wherein privacy transaction request information includes the The newest block height of one privacy transaction;
S12: each privacy transaction of next block height of traversal current block height to newest block height, according to institute The private key held filters out each first privacy transaction related with this user from privacy transaction, and is traded according to each first privacy The privacy account relevant parameter of this user is updated to determine the privacy account balance of this user.
Specifically, with application scenarios shown in FIG. 1, the privacy account phase for the version that user's first is H in export block height It goes offline after closing parameter and privacy account balance, after online again, block height has been updated to for H+100 at this time;
In step s 11, the client 20 of user's first imports the privacy account relevant parameter and latest edition of latest edition This user privacy account balance, according to the privacy account relevant parameter of latest edition generate privacy transaction request information, In, privacy transaction request information includes the newest block height of the first privacy transaction;It is H's since latest edition is block height Version, it is 1 UTXO, 2 UTXO that the client 20 of user's first, which imports privacy account relevant parameter, 5 UTXO and 4 STXO, The privacy account balance of user's first is 8 UTXO, and the client 20 of user's first generates privacy transaction request information, is used for first It is the privacy transaction that H+1 is H+100 to block height that the node 101 of block chain 10, which requests block height,.
In step s 12, it is the privacy that H+1 is H+100 to block height that the client 20 of user's first, which traverses block height, Transaction filters out each first privacy related with this user from privacy transaction according to the private key held and trades, and according to each The transaction of first privacy updates the privacy account relevant parameter of this user to determine the privacy account balance of this user.
The privacy account relevant parameter for updating this user trade according to each first privacy with the privacy account of this determining user The method of remaining sum is described in detail in the above-described embodiments, and details are not described herein again.
Above-described embodiment allows user quickly to trace the privacy account relevant parameter and latest edition of latest edition The privacy account balance of this user, realization can quickly and continuous several times abnormal restoring privacy from combined account model is traded, and Committed memory is few, provides good user experience for user.In more embodiments, user can be by importing different editions Privacy account relevant parameter and privacy account balance obtain the privacy account relevant parameter privacy account balance of different editions, for Family provides good user experience.
In a preferred embodiment, the screening technique of the first privacy transaction are as follows:
Pass through formula P '=Hs(aR) G+B calculates verification public key P ';
Judge verification public key P ' and privacy transaction in One-off public key P it is whether identical: be, then it represents that privacy transaction for The related first privacy transaction of this user;
Wherein, the generating mode of One-off public key are as follows: P=Hs(rA) G+B, the generating mode of curve public key are as follows: R= rG;R is curve public key, and r is the first random number, and G is a basic point on elliptic curve;A is the first public key in (A, B) First public key, B is the first public key to second public key in (A, B), and a is corresponding first private key of first public key A, Hs () is a kind of hash function.
Due to the generating mode of One-off public key P are as follows: P=Hs(rA) calculation method of G+B, verification public key P ' are P '=Hs (aR) G+B, the generating mode of curve public key are as follows: R=rG;R is curve public key, and r is the first random number, and G is ellipse A basic point on curve;A is the first public key to first public key in (A, B), and B is the first public key to second in (A, B) A public key, a are that the corresponding first private key R of first public key A is curve public key, and r is the first random number, and G is elliptic curve On a basic point;
If verifying the transaction of certain privacy, available P '=Hs(aR) G+B=Hs(arG)G+BHs(rA) G+B=P, then this is hidden Personal friendship is easily the first privacy transaction for belonging to user.
Fig. 6 is a kind of structural schematic diagram for equipment that one embodiment of the invention provides.
As shown in fig. 6, present invention also provides a kind of equipment 600, including one or more centres as on the other hand Unit (CPU) 601 is managed, can be added according to the program being stored in read-only memory (ROM) 602 or from storage section 608 The program that is downloaded in random access storage device (RAM) 603 and execute various movements appropriate and processing.In RAM603, also deposit It contains equipment 600 and operates required various programs and data.CPU601, ROM602 and RAM603 pass through the phase each other of bus 604 Even.Input/output (I/O) interface 605 is also connected to bus 604.
I/O interface 605 is connected to lower component: the importation 606 including keyboard, mouse etc.;It is penetrated including such as cathode The output par, c 607 of spool (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.;Storage section 608 including hard disk etc.; And the communications portion 609 of the network interface card including LAN card, modem etc..Communications portion 609 via such as because The network of spy's net executes communication process.Driver 610 is also connected to I/O interface 605 as needed.Detachable media 611, such as Disk, CD, magneto-optic disk, semiconductor memory etc. are mounted on as needed on driver 610, in order to read from thereon Computer program be mounted into storage section 608 as needed.
Particularly, in accordance with an embodiment of the present disclosure, the privacy transactions balances scan method of any of the above-described embodiment description can To be implemented as computer software programs.For example, embodiment of the disclosure includes a kind of computer program product comprising tangible Ground includes computer program on a machine-readable medium, and the computer program includes for executing the scanning of privacy transactions balances The program code of method.In such embodiments, which can be downloaded from network by communications portion 609 And installation, and/or be mounted from detachable media 611.
As another aspect, present invention also provides a kind of computer readable storage medium, the computer-readable storage mediums Matter can be computer readable storage medium included in the device of above-described embodiment;It is also possible to individualism, it is unassembled Enter the computer readable storage medium in equipment.Computer-readable recording medium storage has one or more than one program, should Program is used to execute the privacy transactions balances scan method for being described in the application by one or more than one processor.
Flow chart and block diagram in attached drawing are illustrated according to the system of various embodiments of the invention, method and computer journey The architecture, function and operation in the cards of sequence product.In this regard, each box in flowchart or block diagram can generation A part of one module, program segment or code of table, a part of the module, program segment or code include one or more use The executable instruction of the logic function as defined in realizing.It should also be noted that in some implementations as replacements, being marked in box The function of note can also occur in a different order than that indicated in the drawings.For example, two boxes succeedingly indicated are actually It can be basically executed in parallel, they can also be executed in the opposite order sometimes, this is depending on related function.Also it wants It is noted that the combination of each box in block diagram and or flow chart and the box in block diagram and or flow chart, Ke Yitong The dedicated hardware based system of functions or operations as defined in executing is crossed to realize, or by specialized hardware and can be calculated The combination of machine instruction is realized.
Being described in the embodiment of the present application involved unit or module can be realized by way of software, can also be with It is realized by way of hardware.Described unit or module also can be set in the processor, for example, each unit can To be the software program being arranged in computer or intelligent movable equipment, it is also possible to the hardware device being separately configured.Wherein, this The title of a little units or module does not constitute the restriction to the unit or module itself under certain conditions.
Above description is only the preferred embodiment of the application and the explanation to institute's application technology principle.Those skilled in the art Member is it should be appreciated that invention scope involved in the application, however it is not limited to technology made of the specific combination of above-mentioned technical characteristic Scheme, while should also cover in the case where not departing from the application design, appointed by above-mentioned technical characteristic or its equivalent feature Other technical solutions of meaning combination and formation.Such as features described above and (but being not limited to) disclosed herein have similar functions Technical characteristic replaced mutually and the technical solution that is formed.

Claims (9)

1. a kind of privacy transactions balances scan method characterized by comprising
Privacy transaction request information is sent to the node of the first block chain;
The node for receiving the first block chain is traded according to several privacies that the privacy transaction request information returns, and according to The private key held filters out several first privacy transaction related with this user from privacy transaction;
According to first privacy trade update this user privacy account relevant parameter with determine this user privacy account more than Volume.
2. the method according to claim 1, wherein described traded according to first privacy updates this user's Privacy account relevant parameter with determine this user privacy account balance include:
The privacy account relevant parameter of this user is updated in memory according to first privacy transaction to determine that this user's is hidden Private account balance;
The privacy account balance of the privacy account relevant parameter and described user is stored into database newest to generate The privacy account balance of this user of the privacy account relevant parameter and latest edition of version.
3. the method according to claim 1, wherein the privacy account relevant parameter includes following at least one : the most new district for not spending transaction output (abbreviation UTXO), having spent transaction output (abbreviation STXO), first privacy transaction Block height.
4. the method according to claim 1, wherein the transaction of the first block chained record is configured with the first mark Know, the first identifier for identifying the transaction, whether trade by privacy, the section that the privacy is traded by the first block chain Point is screened and is returned according to the first identifier.
5. the method according to claim 1, wherein described traded according to first privacy updates this user's Privacy account relevant parameter with determine this user privacy account balance include:
According to first privacy trade update this user privacy account relevant parameter with determine this user privacy account more than Volume.
The privacy account balance of the privacy account relevant parameter and described user is stored into database newest to generate The privacy account balance of this user of the privacy account relevant parameter and latest edition of version;
By the privacy account relevant parameter of the latest edition and the export storage of the privacy account balance of this user of latest edition.
6. according to the method described in claim 5, it is characterized in that, described ask to the transmission privacy transaction of the node of the first block chain Before seeking information further include:
The privacy account balance for importing the privacy account relevant parameter of the latest edition and this user of latest edition, according to institute The privacy account relevant parameter for stating latest edition generates privacy transaction request information, wherein the privacy transaction request information packet Include the newest block height of the first privacy transaction;
Traverse current block height to the newest block height next block height each privacy transaction, according to institute The private key held filters out each first privacy transaction related with this user from privacy transaction, and according to each described The transaction of first privacy updates the privacy account relevant parameter of this user to determine the privacy account balance of this user.
7. the method according to claim 1, wherein the screening technique of first privacy transaction are as follows:
Pass through formula P '=Hs(aR) G+B calculates verification public key P ';
Judge whether verification public key P ' and the One-off public key P in privacy transaction are identical: being, then it represents that the privacy transaction For the first privacy related with this user transaction;
Wherein, the generating mode of the One-off public key are as follows: P=Hs(rA) G+B, the generating mode of curve public key are as follows: R= rG;R is curve public key, and r is the first random number, and G is a basic point on elliptic curve;A is the first public key in (A, B) First public key, B is the first public key to second public key in (A, B), and a is first public key A corresponding first private Key, Hs() is a kind of hash function.
8. a kind of equipment, which is characterized in that the equipment includes:
One or more processors;
Memory, for storing one or more programs,
When one or more of programs are executed by one or more of processors, so that one or more of processors Execute such as method of any of claims 1-7.
9. a kind of storage medium for being stored with computer program, which is characterized in that realize when the program is executed by processor as weighed Benefit requires method described in any one of 1-7.
CN201811237194.1A 2018-10-23 2018-10-23 Privacy transactions balances scan method, equipment and storage medium Pending CN109447639A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811237194.1A CN109447639A (en) 2018-10-23 2018-10-23 Privacy transactions balances scan method, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811237194.1A CN109447639A (en) 2018-10-23 2018-10-23 Privacy transactions balances scan method, equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109447639A true CN109447639A (en) 2019-03-08

Family

ID=65548077

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811237194.1A Pending CN109447639A (en) 2018-10-23 2018-10-23 Privacy transactions balances scan method, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109447639A (en)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110535639A (en) * 2019-08-20 2019-12-03 深圳市网心科技有限公司 Block chain assets disposition method and relevant device based on more asset models
CN110598463A (en) * 2019-04-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based information processing method and device and computer-readable storage medium
CN111275549A (en) * 2019-12-31 2020-06-12 深圳市网心科技有限公司 Block chain-based digital currency transaction method and related device
CN111611318A (en) * 2020-06-08 2020-09-01 杭州复杂美科技有限公司 Data access method, device and storage medium
CN112564907A (en) * 2021-03-01 2021-03-26 北京信安世纪科技股份有限公司 Key generation method and device, encryption method and device, and decryption method and device

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503053A (en) * 2016-09-26 2017-03-15 江苏通付盾科技有限公司 UTXO querying methods and device
CN106548330A (en) * 2016-10-27 2017-03-29 上海亿账通区块链科技有限公司 Transaction verification method and system based on block chain
CN108616539A (en) * 2018-05-03 2018-10-02 东莞市翔实信息科技有限公司 A kind of method and system that block chain transaction record accesses

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106503053A (en) * 2016-09-26 2017-03-15 江苏通付盾科技有限公司 UTXO querying methods and device
CN106548330A (en) * 2016-10-27 2017-03-29 上海亿账通区块链科技有限公司 Transaction verification method and system based on block chain
CN108616539A (en) * 2018-05-03 2018-10-02 东莞市翔实信息科技有限公司 A kind of method and system that block chain transaction record accesses

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
中国互联网金融安全课题组: "《中国互联网金融安全发展报告2017 ——监管科技:逻辑、应用与路径》", 31 January 2018, 中国金融出版社 *
傅晓彤等: "基于代理的密码货币支付系统", 《通信学报》 *
李赫等: "《区块链技术金融应用实践》", 30 September 2017, 北京航空航天大学出版社 *

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110598463A (en) * 2019-04-19 2019-12-20 腾讯科技(深圳)有限公司 Block chain-based information processing method and device and computer-readable storage medium
CN110598463B (en) * 2019-04-19 2021-05-14 腾讯科技(深圳)有限公司 Block chain-based information processing method and device and computer-readable storage medium
CN110535639A (en) * 2019-08-20 2019-12-03 深圳市网心科技有限公司 Block chain assets disposition method and relevant device based on more asset models
CN111275549A (en) * 2019-12-31 2020-06-12 深圳市网心科技有限公司 Block chain-based digital currency transaction method and related device
CN111611318A (en) * 2020-06-08 2020-09-01 杭州复杂美科技有限公司 Data access method, device and storage medium
CN112564907A (en) * 2021-03-01 2021-03-26 北京信安世纪科技股份有限公司 Key generation method and device, encryption method and device, and decryption method and device

Similar Documents

Publication Publication Date Title
CN109447639A (en) Privacy transactions balances scan method, equipment and storage medium
Victor et al. Measuring ethereum-based erc20 token networks
CN106228446B (en) Transaction in assets plateform system and method based on privately owned block chain
Awotunde et al. Application of big data with fintech in financial services
Myles Shaver The benefits of geographic sales diversification: How exporting facilitates capital investment
Hakansson et al. Sufficient and necessary conditions for information to have social value in pure exchange
Welfens et al. Information & communication technology and true real GDP: economic analysis and findings for selected countries
US8468170B2 (en) Creating ad hoc relationships between entities
Griffiths et al. What creates abnormal profits?
Viscusi et al. Digital information asset evaluation: Characteristics and dimensions
Corradini et al. Enabling auditing of smart contracts through process mining
CN108921559A (en) Across chain transaction method of calibration, equipment and storage medium
Dekker et al. The monetary value of knowledge assets: a micro approach
CN109324905A (en) Database operation method, device, electronic equipment and storage medium
CN111951052B (en) Method and device for acquiring potential clients based on knowledge graph
Pagnottoni Superhighways and roads of multivariate time series shock transmission: application to cryptocurrency, carbon emission and energy prices
CN109359956A (en) Contract configuration method, contract application method, equipment and storage medium
Yan et al. Role of diversification risk in financial bubbles
JP2008102729A (en) System, method and program for providing information
Shahiduzzaman et al. Digital dividends in the phase of falling productivity growth and implications for policy making
US20150348201A1 (en) Automated tool for investment technologies
JP2020013229A (en) Device, method and program for calculating default probability
Paracha et al. Investigate the Effect of Intangible Assets and Liabilities on Firm Performance: Evidence from Pakistan
US11327956B2 (en) Cloud-based renumbering of identifiers
CN109272319A (en) Community's mapping and transaction violation community identification method, device, electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination