CN110473102A - Transaction processing method, device and block chain node - Google Patents

Transaction processing method, device and block chain node Download PDF

Info

Publication number
CN110473102A
CN110473102A CN201910757088.4A CN201910757088A CN110473102A CN 110473102 A CN110473102 A CN 110473102A CN 201910757088 A CN201910757088 A CN 201910757088A CN 110473102 A CN110473102 A CN 110473102A
Authority
CN
China
Prior art keywords
node
information
transaction
block chain
authenticating
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910757088.4A
Other languages
Chinese (zh)
Inventor
孙大伟
张锦喜
彭奕填
叶亚芳
马利平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Ant Bit Block Chain Technology Co Ltd
Original Assignee
Guangzhou Ant Bit Block Chain Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Ant Bit Block Chain Technology Co Ltd filed Critical Guangzhou Ant Bit Block Chain Technology Co Ltd
Priority to CN201910757088.4A priority Critical patent/CN110473102A/en
Publication of CN110473102A publication Critical patent/CN110473102A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange

Abstract

A kind of transaction processing method, device and block chain node provided by the embodiments of the present application, it is related to trading processing technical field, this method comprises: receiving the Transaction Information that the second node in the block chain network is initiated, obtain the relevant information of the second node of storage, judge whether the second node carried out identity identifying and authenticating in advance according to the relevant information of the second node, if the second node carried out the identity identifying and authenticating in advance, the Transaction Information is responded.First node in block chain network obtains the relevant information for initiating the second node of Transaction Information, and judge whether second node carried out identity identifying and authenticating in advance according to relevant information, guarantee the authenticity of initiation trade user identity, the Transaction Information is responded, if carrying out the identity identifying and authenticating so as to avoid the occurrence of risk sexual transaction.

Description

Transaction processing method, device and block chain node
Technical field
This application involves trading processing technical fields, in particular to a kind of transaction processing method, device and block chain Node.
Background technique
Block chain is the novel of the computer technologies such as Distributed Storage, point-to-point transmission, common recognition mechanism, Encryption Algorithm Application model, the characteristic that the information having can not distort ensure that data have high reliability and stabilization in block chain Property.User information is stored by block chain technology to database in the prior art, although can be protected when being traded every time Demonstrate,prove transaction data can not tamper, still, not can guarantee but initiate trade user identity authenticity, cause occur have wind The transaction of danger.
Summary of the invention
In view of this, the embodiment of the present application is designed to provide a kind of transaction processing method, device and block chain node, To improve in the prior art the problem of not can guarantee the authenticity for initiating trade user identity.
In a first aspect, the embodiment of the present application provides a kind of transaction processing method, applied to first in block chain network Node, which comprises receive the Transaction Information that the second node in the block chain network is initiated;Obtain the described of storage The relevant information of second node;Judge whether the second node carried out body in advance according to the relevant information of the second node Part identification certification;If the second node carried out the identity identifying and authenticating in advance, the Transaction Information is responded.
During above-mentioned realization, after receiving the Transaction Information that the second node in block chain network is initiated, block First node in chain network obtains the relevant information of second node, and judges that whether pre- second node is advanced according to relevant information It went identity identifying and authenticating, and guaranteed the authenticity for initiating trade user identity, responded if carrying out the identity identifying and authenticating The Transaction Information, so as to avoid the occurrence of risky transaction.
Optionally, before receiving the Transaction Information that the second node in the block chain network is initiated, the method is also wrapped It includes: receiving the request for the addition block chain network that the second node is sent;Respond the second section described in the request The relevant information of point;The block chain network is added in the second node according to the relevant information of the second node.
During above-mentioned realization, the request is responded after receiving the request of second node addition block chain network, And the relevant information of second node is obtained, second node is added by block chain network according to relevant information, so that first node can Judge whether that the Transaction Information initiated second node responds with the relevant information according to second node, to avoid the occurrence of Risky transaction.
Optionally, the relevant information of the second node includes the type of the second node and the category of the second node Property information, the second node is added by the block chain network according to the relevant information of the second node, comprising: according to institute The type for stating second node judges whether the second node belongs to preset kind;If so, according to the category of the second node Property information to the second node carry out identity identifying and authenticating;After the identity identifying and authenticating of the second node passes through, by institute It states second node and the block chain network is added.
During above-mentioned realization, it is pre- to judge whether second node belongs to according to the type in the relevant information of second node If type, if belonging to, authentication is carried out to second node according to the attribute information of second node, to guarantee second node Authenticity, and block chain network is added in second node after the identity identifying and authenticating of second node passes through, to guarantee block The authenticity of the information of the node of transaction is initiated in chain network, and then can avoid the occurrence of risky transaction.
Optionally, after the identity identifying and authenticating of the second node passes through, the block is added in the second node After chain network, further includes: identified for the second node distribution node;Obtain the related letter of the second node of storage Breath, comprising: search the relevant information of the second node of storage from database according to the node identification of the second node.
During above-mentioned realization, second node is added after block chain network, it is also necessary to for second node distribution section Point identification, so that first node can quickly find out the phase of second node according to the node identification of second node from database Information is closed, convenient for completing subsequent process related with relevant information, while avoiding the occurrence of risky transaction, improves transaction The efficiency of completion.
Optionally, the preset kind is the type of business or individual enterprise's type.
During above-mentioned realization, when second node requests that block chain network is added, need whether to judge second node Belong to preset kind, if so, need to carry out identity identifying and authenticating, the friendship that the node of the type of business or individual enterprise's type is initiated Easy risk is higher, therefore preset kind is the type of business or individual enterprise's type, it is ensured that the node of the type is being added Has authenticity when block chain network, to guarantee to avoid the node from initiating risky transaction after block chain network is added.
Optionally, described according to after receiving the Transaction Information that the second node in the block chain network is initiated Before the relevant information of second node judges whether the second node carried out identity identifying and authenticating in advance, the method is also wrapped It includes: judging whether the Transaction Information belongs to contraband;If belonging to, according to the attribute information of the second node in institute It states the user that second node initiates to trade to be tracked, to obtain the information of the user;If being not belonging to, then follow the steps: root Judge whether the second node carried out identity identifying and authenticating in advance according to the relevant information of the second node.
During above-mentioned realization, after second node initiates Transaction Information, if judging the transaction that the second node is initiated It is to belong to contraband, then the user for initiating contraband in the node is tracked according to the attribute information of second node, To obtain the information of the user, the risk for carrying out contraband is reduced, and if judging the transaction of second node initiation and being not belonging to Contraband then can judge whether the second node carried out identity identifying and authenticating according to the relevant information of second node, after Continuous to execute transaction follow-up process, the transaction for guaranteeing that the second node is initiated is normally carried out.
Optionally, judge whether the second node carried out identity in advance and know according to the relevant information of the second node Not Ren Zheng after, the method also includes: if the second node did not carried out the identity identifying and authenticating in advance, according to institute The relevant information for stating second node carries out identity identifying and authenticating to the second node;After identity identifying and authenticating passes through, then ring Answer the Transaction Information.
During above-mentioned realization, when judge initiate transaction second node do not carried out identity identifying and authenticating in advance, It then needs to carry out identity identifying and authenticating according to the relevant information of second node, to guarantee to initiate the use of transaction on the second node The authenticity at family, and the Transaction Information is responded after identity identifying and authenticating passes through, to avoid the occurrence of risky friendship Easily.
Second aspect, the embodiment of the present application provide a kind of transaction processing method, are applied to block chain network, the method It include: that second node in the block chain network to first node initiates Transaction Information;First in the block chain network Node receives the Transaction Information, and obtains the relevant information of the second node of storage;The first node is according to The relevant information of second node judges whether the second node carried out identity identifying and authenticating in advance;If the second node is pre- The identity identifying and authenticating was first carried out, then the first node responds the Transaction Information.
The third aspect, the embodiment of the present application provide a kind of traction processing apparatus, applied to first in block chain network Node, described device include: transaction information receipt module, for receiving the friendship of the initiation of the second node in the block chain network Easy information;Data obtaining module, the relevant information of the second node for obtaining storage;Identification judgment module is used In judging whether the second node carried out identity identifying and authenticating in advance according to the relevant information of the second node;Transaction letter It ceases respond module and responded the Transaction Information if carrying out the identity identifying and authenticating in advance for the second node.
Optionally, traction processing apparatus further include: request receiving module is added, for receiving the second node transmission The request of the block chain network is added;Relevant information obtains module, for responding second node described in the request Relevant information;Request permissions module is added, for institute to be added in the second node according to the relevant information of the second node State block chain network.
Optionally, the relevant information of the second node includes the type of the second node and the category of the second node Property information, it includes: type judging unit that request permissions module, which is added, for judging described the according to the type of the second node Whether two nodes belong to preset kind;Identity identifying and authenticating unit, if to judge that the second node belongs to pre- for type judging unit If type, then for carrying out identity identifying and authenticating to the second node according to the attribute information of the second node;Addition is asked Licence units are sought, for after the identity identifying and authenticating of the second node passes through, the block to be added in the second node Chain network.
Optionally, request permissions module is added further include: node identification allocation unit, for being distributed for the second node Node identification;Data obtaining module includes: information searching unit, for according to the node identification of the second node from database The relevant information of the middle second node for searching storage.
Optionally, the traction processing apparatus further include: contraband judgment module judges institute for the first node State whether Transaction Information belongs to contraband;User tracking module, if judging, the Transaction Information belongs to contraband, is used for The user for initiating transaction in the second node is tracked according to the attribute information of the second node, to obtain the use The information at family;Identification judgment module, if judging, the Transaction Information is not belonging to contraband, for executing in the module The step of: the first node judges whether the second node carried out body in advance according to the relevant information of the second node Part identification certification.
Optionally, traction processing apparatus further include: identity identifying and authenticating module, if not pre- advanced for the second node It went the identity identifying and authenticating, then identification is carried out to the second node according to the relevant information of the second node and recognized Card;Transaction Information respond module, after identity identifying and authenticating passes through, then for responding the Transaction Information.
Fourth aspect, the embodiment of the present application provide a kind of traction processing apparatus, are applied to block chain network, described device Include: transaction initiation module, initiates Transaction Information to first node for the second node in the block chain network;Transaction connects Module is received, receives the Transaction Information for the first node in the block chain network, and obtain second section of storage The relevant information of point;Identity identifying and authenticating judgment module, for the first node according to the relevant information of the second node Judge whether the second node carried out identity identifying and authenticating in advance;Transaction respond module, if pre- for the second node The identity identifying and authenticating was first carried out, then the first node responds the Transaction Information.
5th aspect, the embodiment of the present application provide a kind of block chain node, including processor and memory, the storage Device is stored with computer-readable instruction fetch, and when the computer-readable instruction fetch is executed by the processor, operation is such as above-mentioned The step in the method that first aspect provides.
6th aspect, the embodiment of the present application provide a kind of readable storage medium storing program for executing, are stored thereon with computer program, the meter The step in the method that first aspect offer is as above provided is run when calculation machine program is executed by processor.
Other feature and advantage of the application will be illustrated in subsequent specification, also, partly be become from specification It is clear that by implementing the embodiment of the present application understanding.The purpose of the application and other advantages can be by written theorys Specifically noted structure is achieved and obtained in bright book, claims and attached drawing.
Detailed description of the invention
Technical solution in ord to more clearly illustrate embodiments of the present application, below will be to needed in the embodiment attached Figure is briefly described, it should be understood that the following drawings illustrates only some embodiments of the application, therefore is not construed as pair The restriction of range for those of ordinary skill in the art without creative efforts, can also be according to this A little attached drawings obtain other relevant attached drawings.
Fig. 1 is a kind of structural block diagram of block chain node provided by the embodiments of the present application;
Fig. 2 is a kind of flow chart of transaction processing method provided by the embodiments of the present application;
Fig. 3 is the flow chart of another transaction processing method provided by the embodiments of the present application;
Fig. 4 is a kind of structural block diagram of traction processing apparatus provided by the embodiments of the present application.
Specific embodiment
Below in conjunction with attached drawing in the embodiment of the present application, technical solutions in the embodiments of the present application carries out clear, complete Ground description, it is clear that described embodiments are only a part of embodiments of the present application, instead of all the embodiments.Usually exist The component of the embodiment of the present application described and illustrated in attached drawing can be arranged and be designed with a variety of different configurations herein.Cause This, is not intended to limit claimed the application's to the detailed description of the embodiments herein provided in the accompanying drawings below Range, but it is merely representative of the selected embodiment of the application.Based on embodiments herein, those skilled in the art are not being done Every other embodiment obtained under the premise of creative work out, shall fall in the protection scope of this application.
It should also be noted that similar label and letter indicate similar terms in following attached drawing, therefore, once a certain Xiang Yi It is defined in a attached drawing, does not then need that it is further defined and explained in subsequent attached drawing.Meanwhile the application's In description, term " first ", " second " etc. are only used for distinguishing description, are not understood to indicate or imply relative importance.
Fig. 1 is please referred to, Fig. 1 is a kind of structural schematic diagram of block chain node provided in an embodiment of the present invention, the block Chain node may include: at least one processor 110, such as CPU, at least one communication interface 120, at least one processor 130 and at least one communication bus 140.Wherein, communication bus 140 is for realizing the direct connection communication of these components.Wherein, The communication interface 120 of equipment is used to carry out the communication of signaling or data with other node devices in the embodiment of the present application.Memory 130 can be high speed RAM memory, be also possible to non-labile memory (non-volatile memory), for example, at least One magnetic disk storage.Memory 130 optionally can also be that at least one is located remotely from the storage device of aforementioned processor.It deposits Computer-readable instruction fetch is stored in reservoir 130, when the computer-readable instruction fetch is executed by the processor 110, Block chain node executes method process shown in following Fig. 2.
Fig. 2 is please referred to, Fig. 2 is a kind of flow chart of transaction processing method provided by the embodiments of the present application, the trading processing Method is applied to block chain network, includes the following steps:
Step S210: the second node in the block chain network initiates Transaction Information to first node.
Step S220: the first node in the block chain network receives the Transaction Information, and obtains the described of storage The relevant information of second node.
Step S230: the first node judges whether the second node is pre- according to the relevant information of the second node First carried out identity identifying and authenticating.
Step S240: if the second node carried out the identity identifying and authenticating, the first node response in advance The Transaction Information.
For example, second node initiates transaction, first node receives the Transaction Information that second node initiates transaction, and from first The relevant information of the second node of storage is obtained in the database of node, wherein when Transaction Information can be transaction Hash, transaction Between, trading object and transaction content etc., relevant information can be type belonging to second node, or second node mentions Passport NO., phone, mailbox and address of confession etc., then first node is sentenced according to the relevant information of the second node got Whether disconnected second node carried out identity identifying and authenticating in advance, and last first node can be to carrying out identity identifying and authenticating in advance The Transaction Information that second node is initiated is responded, for example, the trading object in the Transaction Information that second node is initiated is user B, transaction content is to transfer accounts 10,000 yuan to user B, at this point, first node is when responding the Transaction Information that second node is initiated, the The transaction that one node can permit second node initiation continues to execute, and records the Transaction Information.Due to passing through identification The second node of certification has certain authenticity, therefore can be sent out according to the relevant information of second node on second node The user for playing transaction is tracked, if guaranteeing that the use for initiating the risk trade can be tracked when Transaction Information occurrence risk with this Family.
Wherein, identity identifying and authenticating can be regular to understand client (know-your-customer, KYC), in the rule The relevant identification information of the available client of transaction platform, and to the examination that account holder is strengthened, it is ensured that do not meet mark Quasi- user is not available service provided by the platform, plays the role of effectively preventing transaction risk, it is also possible to be The investigative action of the risk trade of appearance provides investigation foundation.
In addition, in the embodiment of the present application the second node in block chain network to first node initiate Transaction Information be can With what is encrypted, first node needs the corresponding Transaction Information for being decrypted and can getting second node transmission, adds Close mode can use public key encryption, and be decrypted using private key, it is possible to understand that ground, first node are obtaining second node Relevant information when can also carry out the safe transmission for being encrypted to ensure that information, and herein to encryption and decryption mode do not limit System.
First node judges whether second node carried out in advance according to the relevant information of second node in step S230 When identity identifying and authenticating, it can be determined that whether second node carried out the identity identifying and authenticating of KYC rule in advance, then passed through root Judge whether the relevant information of second node meets according to KYC rule, if the relevant information of second node meets KYC rule, It can illustrate that second node carried out identity identifying and authenticating in advance.It particularly, can be with if identity identifying and authenticating is other rules Judge whether second node carried out identity identifying and authenticating in advance according to other rules.
For second node before block chain network is added, first node need to first receive the addition institute that the second node is sent The request for stating block chain network is then responding to the request and obtains the relevant information of the second node, finally according to The block chain network is added in the second node by the relevant information of second node.Block chain network is being added in second node When, first node needs to receive the request that block chain network is added and obtains the relevant information of second node, then, according to phase It closes information and block chain network is added in second node, so that first node can judge whether according to the relevant information of second node The Transaction Information initiated second node responds, to guarantee the safety of transaction.
Wherein, the relevant information of the second node includes the type of the second node and the attribute of the second node Therefore information when according to the relevant information of second node block chain network is added in second node by first node, can pass through Following procedure is realized: judge whether the second node belongs to preset kind according to the type of the second node first, if so, Identity identifying and authenticating is then carried out to the second node according to the attribute information of the second node, then in the second node Identity identifying and authenticating pass through after, the block chain network is added in the second node.
In addition, the preset kind is the type of business or individual enterprise's type.
When preset kind be the type of business when, then second node need to provide this relevant information can for enterprise name, Unified social credibility code certification (number of registration), organization mechanism code (2 select 1), certificate code, operating period, location, in detail Thin address, business entity front hold enterprise's business license front and back sides photo etc., wherein can be unified social credibility code and recognize Demonstrate,prove at least one of (number of registration) and organization mechanism code.When preset kind is individual enterprise's type, second node needs The relevant information for providing this can be Sole Proprietorship entity name, certificate code, operating period, location, better address, method People front holds business license front and back sides photo etc..
Second node can also be personal type, risk existing for the transaction initiated as the second node of personal type Smaller relative to the type of business or individual enterprise's type, therefore, personal type can not carry out in advance before block chain is added Identity identifying and authenticating, for the node of personal type when block chain network is added, the information that can be provided includes name, electronics postal Case, telephone number, position, company name, address, identification card number/passport No., the hand-held identity card/passport number photo in personal front It is any several in front and back sides etc., if the second node of individual's type is needed through identity identifying and authenticating, to provide more than Other information in information in addition to name, to guarantee to pass through identity identifying and authenticating.
During above-mentioned realization, preset kind is set as the type of business or individual enterprise's type, it is ensured that the type Node have authenticity when block chain network is added, thus avoid be added block chain network after the node initiate it is risky Transaction.
It then, can be second node distribution node mark after block chain network is added in second node by first node Know, so that first node can be according to second section in the step S220 before the Transaction Information that response second node is initiated The node identification of point searches the relevant information of the second node of storage from database, so that first node can be quickly quasi- The relevant information of second node is found in true slave database.
During above-mentioned realization, second node is added after block chain network, it is also necessary to for second node distribution section Point identification, so that first node can quickly find out the phase of second node according to the node identification of second node from database Information is closed, convenient for completing subsequent process related with relevant information, while avoiding initiating risk trade, transaction is improved and completes Efficiency.
Please refer to Fig. 3, Fig. 3 is the flow chart of another transaction processing method provided by the embodiments of the present application, at the transaction Reason method is applied to the first node in block chain network, comprising the following steps:
Step S310: the Transaction Information that the second node in the block chain network is initiated is received.
Step S320: the relevant information of the second node of storage is obtained.
Step S330: judge whether the second node carried out identity in advance according to the relevant information of the second node Identification certification.Step S340: if the second node carried out the identity identifying and authenticating in advance, the transaction letter is responded Breath.
If second node carried out identity identifying and authenticating in advance, it can guarantee that the relevant information of second node has centainly Authenticity, the Transaction Information that response second node is initiated has certain reliability, therefore, can be to carrying out identity in advance The Transaction Information that the second node of identification certification is initiated is responded, and reduces transaction risk with this, specific embodiment can join Correlate the embodiment in the transaction processing method for block chain network.
Further include following steps in this method continuing with reference to Fig. 3:
Step S350: if the second node did not carried out the identity identifying and authenticating in advance, according to second section The relevant information of point carries out identity identifying and authenticating to the second node.
When judge initiate transaction second node do not carried out identity identifying and authenticating in advance, then need according to second node Relevant information carry out identity identifying and authenticating, to guarantee to initiate the authenticity of the user of transaction on the second node, and in body Part identification certification responds the Transaction Information after passing through, to avoid the occurrence of risk sexual transaction.
Step S360: after identity identifying and authenticating passes through, then the Transaction Information is responded.
During above-mentioned entire realization, after receiving the Transaction Information that the second node in block chain network is initiated, First node in block chain network obtains the relevant information of second node, and judges whether second node is pre- according to relevant information Identity identifying and authenticating was first carried out, guarantees the authenticity for initiating the user of transaction, is rung if carrying out the identity identifying and authenticating Should Transaction Information, so as to avoid the occurrence of risk sexual transaction.
As an implementation, after receiving the Transaction Information that the second node in the block chain network is initiated, institute It states before judging whether the second node carried out identity identifying and authenticating in advance according to the relevant information of the second node, it can First to carry out following steps:
Judge whether the Transaction Information belongs to contraband;
If belonging to, the user that transaction is initiated in the second node is carried out according to the attribute information of the second node Tracking, to obtain the information of the user;
If being not belonging to, then follow the steps: judging whether the second node is pre- according to the relevant information of the second node First carried out identity identifying and authenticating.
Second node initiate transaction after, first node can judge Transaction Information, if the Transaction Information belong to it is separated Method, then first node will not respond the Transaction Information, and can be by the attribute information of second node in the second section The user that transaction is initiated on point is tracked, and while to guarantee to avoid the occurrence of risk sexual transaction, finds risk sources.
Judge whether that belonging to contraband can be judged according to every Day Trading upper limit and transaction count etc., for example, Before initiating the Transaction Information this day, the number traded is excessive, and is greater than certain frequency threshold value, furthermore trades every time Transaction amount reaches certain amount of money threshold value, then may determine that the Transaction Information belongs to contraband, furthermore, it is possible to be believed according to transaction It ceases some transaction for not meeting relationship trading regulation judged and also belongs to contraband.
For example, certain A enterprise has initiated contraband in second node, which belongs to the friendship for violating anti money washing specification Easily, first node judges the transaction just to believe by the attribute that A enterprise provides when block chain network is added after contraband Breath, that is, enterprise name, unified social credibility code certification/number of registration, organization mechanism code (2 select 1), certificate code, warp Time limit, location, better address, the hand-held enterprise's business license front and back sides photo in business entity front etc. are sought, tracking A enterprise Responsible person concerned, and the person liable is alerted or is punished accordingly, meanwhile, the risk trade information that A enterprise initiates can To store into database, require to carry out tightened up identifying procedure in the All Activity that A enterprise initiates, to prevent A enterprise Risk trade is initiated again.
During above-mentioned realization, after second node initiates Transaction Information, if judging the transaction that the second node is initiated It is to belong to contraband, then the user for initiating contraband in the node is tracked according to the attribute information of second node, To obtain the information of the user, the risk for carrying out contraband is reduced, and if judging the transaction of second node initiation and being not belonging to Contraband then can judge whether the second node carried out identity identifying and authenticating according to the relevant information of second node, after Continuous to execute transaction follow-up process, the transaction for guaranteeing that the second node is initiated is normally carried out.
It is to be appreciated that the second node being applied in block chain network is there are also a kind of transaction processing method, including following Process: Transaction Information is initiated to first node first, when first node gets the relevant information of second node and judges second When node carried out the identity identifying and authenticating in advance, the feedback information that first node is sent according to Transaction Information is received.
Wherein, feedback information can be authentication pass information or certification not by information, and the needs when certification passes through The prompting message paid attention to, for example, first node sends the feedback information of authentication pass information according to Transaction Information to second node, Therefore, second node initiate transaction can continue to execute, at this point, second node can according to transaction execute need to provide it is close Code etc. shows second if first node sends certification not by the feedback information of information to second node according to Transaction Information Node cannot continue to execute the transaction, and second node can not continue to improve the Transaction Information of initiation by information according to certification Or the Transaction Information that modification is initiated, so that first node can be sent out according to perfect or modified Transaction Information to second node The feedback information of authentication pass information is sent, first node can also send need when certification passes through to second node according to Transaction Information It is noted that prompting message, for example, second node initiate Transaction Information be performed after, the transaction amount of this day just reaches Limit, or this transaction count in a few days are excessive, and having reached the upper limit might have the prompting message that risk needs to pay attention to.
The application also provides a kind of block chain network system, which includes first node and second node, wherein second Node is used to initiate Transaction Information to first node, and first node obtains the described of storage for receiving the Transaction Information Then the relevant information of second node judges whether the second node carries out in advance according to the relevant information of the second node Identity identifying and authenticating is crossed, if the second node carried out the identity identifying and authenticating in advance, the first node is for ringing Answer the Transaction Information.
Fig. 4 is please referred to, Fig. 4 is a kind of structural block diagram of traction processing apparatus 200 provided by the embodiments of the present application.The device It can be the module, section or code on block chain node.It should be understood that the traction processing apparatus 200 and above-mentioned Fig. 3 method are real It is corresponding to apply example, is able to carry out each step that Fig. 3 embodiment of the method is related to, which can be with Description in seeing above, it is appropriate herein to omit detailed description to avoid repeating.
Optionally, which is applied to the first node in block chain network, comprising:
Transaction information receipt module 210, for receiving the Transaction Information of the initiation of the second node in the block chain network.
Data obtaining module 220, the relevant information of the second node for obtaining storage.
Identification judgment module 230, for judging that the second node is according to the relevant information of the second node It is no to carry out identity identifying and authenticating in advance.
Transaction Information respond module 240 is rung if carrying out the identity identifying and authenticating in advance for the second node Answer the Transaction Information.
In addition, traction processing apparatus 200 further include:
Request receiving module is added, for receiving the request for the addition block chain network that the second node is sent.
Relevant information obtains module, for responding the relevant information of second node described in the request.
Request permissions module is added, described in the second node is added according to the relevant information of the second node Block chain network.
Wherein, the relevant information of the second node includes the type of the second node and the attribute of the second node Information, request permissions module, which is added, includes:
Type judging unit, for judging whether the second node belongs to default class according to the type of the second node Type.
Identity identifying and authenticating unit is used for root if type judging unit judges that the second node belongs to preset kind Identity identifying and authenticating is carried out to the second node according to the attribute information of the second node.
Request licence units are added, for after the identity identifying and authenticating of the second node passes through, by second section The block chain network is added in point.
In addition, request permissions module is added further include:
Node identification allocation unit, for being identified for the second node distribution node.
Data obtaining module includes:
Information searching unit, for searching described the of storage from database according to the node identification of the second node The relevant information of two nodes.
Particularly, the traction processing apparatus 200 further include:
Contraband judgment module judges whether the Transaction Information belongs to contraband for the first node.
User tracking module, if judging, the Transaction Information belongs to contraband, for according to the second node Attribute information is tracked the user for initiating transaction in the second node, to obtain the information of the user.
Identification judgment module, if judging, the Transaction Information is not belonging to contraband, for executing in the module The step of: the first node judges whether the second node carried out body in advance according to the relevant information of the second node Part identification certification.
Wherein, traction processing apparatus 200 further include:
Identity identifying and authenticating module, if not carrying out the identity identifying and authenticating, root in advance for the second node Identity identifying and authenticating is carried out to the second node according to the relevant information of the second node.
Transaction Information respond module, after identity identifying and authenticating passes through, then for responding the Transaction Information.
Optionally, the embodiment of the present application also provides a kind of traction processing apparatus 200, are applied to block chain network, described Device includes:
Transaction initiation module initiates Transaction Information to first node for the second node in the block chain network.
Transaction acceptance module receives the Transaction Information for the first node in the block chain network, and obtains and deposit The relevant information of the second node of storage.
Identity identifying and authenticating judgment module judges institute according to the relevant information of the second node for the first node State whether second node carried out identity identifying and authenticating in advance.
It trades respond module, if carrying out the identity identifying and authenticating in advance for the second node, described first Node responds the Transaction Information.
The embodiment of the present application provides a kind of read/write memory medium, when the computer program is executed by processor, executes Method process performed by block chain node in embodiment of the method as shown in Figure 2.
It is apparent to those skilled in the art that for convenience and simplicity of description, the device of foregoing description Specific work process, no longer can excessively be repeated herein with reference to the corresponding process in preceding method.
In conclusion this application provides a kind of transaction processing method, device and block chain node, when receiving block chain After the Transaction Information that second node in network is initiated, the first node in block chain network obtains the related letter of second node Breath, and judge whether second node carried out identity identifying and authenticating in advance according to relevant information, guarantee to initiate trade user identity Authenticity, respond the Transaction Information, if carrying out the identity identifying and authenticating so as to avoid the occurrence of risk sexual transaction.
In several embodiments provided herein, it should be understood that disclosed device and method can also pass through Other modes are realized.The apparatus embodiments described above are merely exemplary, for example, flow chart and block diagram in attached drawing Show the device of multiple embodiments according to the application, the architectural framework in the cards of method and computer program product, Function and operation.In this regard, each box in flowchart or block diagram can represent the one of a module, section or code Part, a part of the module, section or code, which includes that one or more is for implementing the specified logical function, to be held Row instruction.It should also be noted that function marked in the box can also be to be different from some implementations as replacement The sequence marked in attached drawing occurs.For example, two continuous boxes can actually be basically executed in parallel, they are sometimes It can execute in the opposite order, this depends on the function involved.It is also noted that every in block diagram and or flow chart The combination of box in a box and block diagram and or flow chart can use the dedicated base for executing defined function or movement It realizes, or can realize using a combination of dedicated hardware and computer instructions in the system of hardware.
In addition, each functional module in each embodiment of the application can integrate one independent portion of formation together Point, it is also possible to modules individualism, an independent part can also be integrated to form with two or more modules.
It, can be with if the function is realized and when sold or used as an independent product in the form of software function module It is stored in a computer readable storage medium.Based on this understanding, the technical solution of the application is substantially in other words The part of the part that contributes to existing technology or the technical solution can be embodied in the form of software products, the meter Calculation machine software product is stored in a storage medium, including some instructions are used so that a computer equipment (can be a People's computer, server or network equipment etc.) execute each embodiment the method for the application all or part of the steps. And storage medium above-mentioned includes: that USB flash disk, mobile hard disk, read-only memory (ROM, Read-Only Memory), arbitrary access are deposited The various media that can store program code such as reservoir (RAM, Random Access Memory), magnetic or disk.
The foregoing is merely preferred embodiment of the present application, are not intended to limit this application, for the skill of this field For art personnel, various changes and changes are possible in this application.Within the spirit and principles of this application, made any to repair Change, equivalent replacement, improvement etc., should be included within the scope of protection of this application.It should also be noted that similar label and letter exist Similar terms are indicated in following attached drawing, therefore, once being defined in a certain Xiang Yi attached drawing, are then not required in subsequent attached drawing It is further defined and explained.
The above, the only specific embodiment of the application, but the protection scope of the application is not limited thereto, it is any Those familiar with the art within the technical scope of the present application, can easily think of the change or the replacement, and should all contain Lid is within the scope of protection of this application.Therefore, the protection scope of the application shall be subject to the protection scope of the claim.
It should be noted that, in this document, relational terms such as first and second and the like are used merely to a reality Body or operation are distinguished with another entity or operation, are deposited without necessarily requiring or implying between these entities or operation In any actual relationship or order or sequence.Moreover, the terms "include", "comprise" or its any other variant are intended to Non-exclusive inclusion, so that the process, method, article or equipment including a series of elements is not only wanted including those Element, but also including other elements that are not explicitly listed, or further include for this process, method, article or equipment Intrinsic element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that There is also other identical elements in process, method, article or equipment including the element.

Claims (10)

1. a kind of transaction processing method, which is characterized in that applied to the first node in block chain network, which comprises
Receive the Transaction Information that the second node in the block chain network is initiated;
Obtain the relevant information of the second node of storage;
Judge whether the second node carried out identity identifying and authenticating in advance according to the relevant information of the second node;
If the second node carried out the identity identifying and authenticating in advance, the Transaction Information is responded.
2. transaction processing method according to claim 1, which is characterized in that receive the second section in the block chain network Before the Transaction Information that point is initiated, the method also includes:
Receive the request for the addition block chain network that the second node is sent;
Respond the relevant information of second node described in the request;
The block chain network is added in the second node according to the relevant information of the second node.
3. transaction processing method according to claim 2, which is characterized in that the relevant information of the second node includes institute The type of second node and the attribute information of the second node are stated, according to the relevant information of the second node by described second The block chain network is added in node, comprising:
Judge whether the second node belongs to preset kind according to the type of the second node;
If so, carrying out identity identifying and authenticating to the second node according to the attribute information of the second node;
After the identity identifying and authenticating of the second node passes through, the block chain network is added in the second node.
4. transaction processing method according to claim 3, which is characterized in that in the identity identifying and authenticating of the second node By rear, the second node is added after the block chain network, further includes:
For second node distribution node mark;
Obtain the relevant information of the second node of storage, comprising:
The relevant information of the second node of storage is searched from database according to the node identification of the second node.
5. transaction processing method according to claim 3, which is characterized in that the preset kind is the type of business or individual The type of business.
6. transaction processing method according to claim 3, which is characterized in that receive the second section in the block chain network After the Transaction Information that point is initiated, the relevant information according to the second node judges that whether pre- the second node is advanced It went before identity identifying and authenticating, the method also includes:
Judge whether the Transaction Information belongs to contraband;
If belonging to, the user for initiating transaction in the second node is chased after according to the attribute information of the second node Track, to obtain the information of the user;
If being not belonging to, then follow the steps: judging that whether pre- the second node is advanced according to the relevant information of the second node Went identity identifying and authenticating.
7. transaction processing method according to claim 1, which is characterized in that sentenced according to the relevant information of the second node After whether the second node that breaks carried out identity identifying and authenticating in advance, the method also includes:
If the second node did not carried out the identity identifying and authenticating in advance, according to the relevant information pair of the second node The second node carries out identity identifying and authenticating;
After identity identifying and authenticating passes through, then the Transaction Information is responded.
8. a kind of transaction processing method, which is characterized in that be applied to block chain network, which comprises
Second node in the block chain network initiates Transaction Information to first node;
First node in the block chain network receives the Transaction Information, and obtains the correlation of the second node of storage Information;
The first node judges whether the second node carried out identity in advance according to the relevant information of the second node Identification certification;
If the second node carried out the identity identifying and authenticating in advance, the first node responds the Transaction Information.
9. a kind of traction processing apparatus, which is characterized in that applied to the first node in block chain network, described device includes:
Transaction information receipt module, for receiving the Transaction Information of the initiation of the second node in the block chain network;
Data obtaining module, the relevant information of the second node for obtaining storage;
Identification judgment module, for judging that whether pre- the second node is advanced according to the relevant information of the second node Went identity identifying and authenticating;
Transaction Information respond module, if carrying out the identity identifying and authenticating in advance for the second node, described in response Transaction Information.
10. a kind of block chain node, which is characterized in that including processor and memory, the memory is stored with computer Readable instruction fetch is run as described in claim 1-7 is any when the computer-readable instruction fetch is executed by the processor Step in method.
CN201910757088.4A 2019-08-15 2019-08-15 Transaction processing method, device and block chain node Pending CN110473102A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910757088.4A CN110473102A (en) 2019-08-15 2019-08-15 Transaction processing method, device and block chain node

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910757088.4A CN110473102A (en) 2019-08-15 2019-08-15 Transaction processing method, device and block chain node

Publications (1)

Publication Number Publication Date
CN110473102A true CN110473102A (en) 2019-11-19

Family

ID=68510112

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910757088.4A Pending CN110473102A (en) 2019-08-15 2019-08-15 Transaction processing method, device and block chain node

Country Status (1)

Country Link
CN (1) CN110473102A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111768196A (en) * 2020-07-01 2020-10-13 中国银行股份有限公司 Transaction information confirmation method and device
CN112017045A (en) * 2020-08-18 2020-12-01 无锡井通网络科技有限公司 Digital asset off-site transaction system and method based on block chain
CN113438073A (en) * 2021-06-24 2021-09-24 福建师范大学 Block chain compiling and correcting method based on period and supporting appointed modification times

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160358186A1 (en) * 2015-06-04 2016-12-08 Chronicled, Inc. Open registry for identity of things
CN106357644A (en) * 2016-09-21 2017-01-25 江苏通付盾科技有限公司 Method, system and server for authenticating identities on basis of block chain networks
CN109255619A (en) * 2018-09-26 2019-01-22 北京亚联之星信息技术有限公司 A kind of identity identifying method and equipment based on block chain
CN109615386A (en) * 2018-11-28 2019-04-12 优钱付(浙江)信息科技有限公司 KYC anti money washing method, apparatus, equipment and the medium of recurrent wrIting block chain

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160358186A1 (en) * 2015-06-04 2016-12-08 Chronicled, Inc. Open registry for identity of things
CN106357644A (en) * 2016-09-21 2017-01-25 江苏通付盾科技有限公司 Method, system and server for authenticating identities on basis of block chain networks
CN109255619A (en) * 2018-09-26 2019-01-22 北京亚联之星信息技术有限公司 A kind of identity identifying method and equipment based on block chain
CN109615386A (en) * 2018-11-28 2019-04-12 优钱付(浙江)信息科技有限公司 KYC anti money washing method, apparatus, equipment and the medium of recurrent wrIting block chain

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111768196A (en) * 2020-07-01 2020-10-13 中国银行股份有限公司 Transaction information confirmation method and device
CN111768196B (en) * 2020-07-01 2024-01-30 中国银行股份有限公司 Transaction information confirmation method and device
CN112017045A (en) * 2020-08-18 2020-12-01 无锡井通网络科技有限公司 Digital asset off-site transaction system and method based on block chain
CN113438073A (en) * 2021-06-24 2021-09-24 福建师范大学 Block chain compiling and correcting method based on period and supporting appointed modification times
CN113438073B (en) * 2021-06-24 2023-05-09 福建师范大学 Block chain compiling and correcting method based on period and supporting appointed modification times

Similar Documents

Publication Publication Date Title
US10853812B2 (en) Blockchain transaction safety
US20210166326A1 (en) Claim settlement method and apparatus employing blockchain technology
CN110148017A (en) Equity distribution method and device, electronic equipment, storage medium based on block chain
US8458090B1 (en) Detecting fraudulent mobile money transactions
CN110060112A (en) Invoice creation method and device, electronic equipment based on block chain
CN109872151A (en) For carrying out the method and system of risk score to anonymous deal
CN110046482A (en) Identity verification method and its system
EP3786871B1 (en) Vehicle-related information processing based on blockchain
CN109034800A (en) A kind of privacy method of commerce, system and equipment
CN106485167A (en) Credit record system and method based on block chain
CN108780546A (en) Location verification in dynamic data transaction
AU2018201140B2 (en) System and method for candidate profile screening
CN110473102A (en) Transaction processing method, device and block chain node
CN111464499A (en) Electronic warehouse receipt tracing method and device, computer equipment and storage medium
CN110009340A (en) Card method and apparatus are deposited based on block chain
CN108694657A (en) Client's identification device, method and computer readable storage medium
CN110245940A (en) Digital asset voucher inherits the information processing method and relevant apparatus in transfer
CN108985569A (en) A kind of vehicle risk appraisal procedure, server
US20210365584A1 (en) Portable reputation brokering using linked blockchains and shared events
CN110046156A (en) Content Management System and method, apparatus, electronic equipment based on block chain
CN109242481A (en) Information approach, device and computer equipment are pledged based on block chain query
CN109508564A (en) A kind of digital asset storage system and method based on block chain
CN111770198A (en) Information sharing method, device and equipment
CN109242666A (en) Personal reference method, apparatus and computer equipment are obtained based on block chain
CN109525949A (en) Register method and device, storage medium, server, user terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20191119