CN113259450A - Transaction management system based on block chain fragmentation - Google Patents
Transaction management system based on block chain fragmentation Download PDFInfo
- Publication number
- CN113259450A CN113259450A CN202110595082.9A CN202110595082A CN113259450A CN 113259450 A CN113259450 A CN 113259450A CN 202110595082 A CN202110595082 A CN 202110595082A CN 113259450 A CN113259450 A CN 113259450A
- Authority
- CN
- China
- Prior art keywords
- transaction
- data
- module
- address
- sender
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000013467 fragmentation Methods 0.000 title description 12
- 238000006062 fragmentation reaction Methods 0.000 title description 12
- 239000012634 fragment Substances 0.000 claims abstract description 44
- 238000000034 method Methods 0.000 claims abstract description 31
- 230000005540 biological transmission Effects 0.000 claims abstract description 23
- 238000007726 management method Methods 0.000 claims abstract description 16
- 230000007246 mechanism Effects 0.000 claims abstract description 12
- 238000013461 design Methods 0.000 claims abstract description 8
- 230000008569 process Effects 0.000 claims description 25
- 238000012544 monitoring process Methods 0.000 claims description 15
- 238000012545 processing Methods 0.000 claims description 13
- 238000007667 floating Methods 0.000 claims description 4
- 238000005192 partition Methods 0.000 claims description 3
- 230000004044 response Effects 0.000 description 12
- 238000005516 engineering process Methods 0.000 description 8
- 238000012795 verification Methods 0.000 description 6
- 238000013507 mapping Methods 0.000 description 4
- 230000003044 adaptive effect Effects 0.000 description 3
- 238000001514 detection method Methods 0.000 description 3
- 238000000638 solvent extraction Methods 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000003993 interaction Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/10—Protocols in which an application is distributed across nodes in the network
- H04L67/1097—Protocols in which an application is distributed across nodes in the network for distributed storage of data in networks, e.g. transport arrangements for network file system [NFS], storage area networks [SAN] or network attached storage [NAS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/64—Protecting data integrity, e.g. using checksums, certificates or signatures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0442—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/06—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols the encryption apparatus using shift registers or memories for block-wise or stream coding, e.g. DES systems or RC4; Hash functions; Pseudorandom sequence generators
- H04L9/0643—Hash functions, e.g. MD5, SHA, HMAC or f9 MAC
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Health & Medical Sciences (AREA)
- Databases & Information Systems (AREA)
- Accounting & Taxation (AREA)
- Computing Systems (AREA)
- Software Systems (AREA)
- General Health & Medical Sciences (AREA)
- Bioethics (AREA)
- Development Economics (AREA)
- Technology Law (AREA)
- General Business, Economics & Management (AREA)
- Power Engineering (AREA)
- Strategic Management (AREA)
- Marketing (AREA)
- Economics (AREA)
- Data Mining & Analysis (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The invention discloses a transaction management system based on blockchain fragments, which comprises a transaction fragment module, a routing design module, a transaction protection module and a transaction module, and also discloses a transaction management method based on blockchain fragments, conducting transaction slicing on the blockchain according to the transaction type, distributing blockchain link points to each transaction slice according to needs, constructing a virtual node in each transaction slice to manage the transaction slices, selecting a storage path for transaction data generated by the transaction fragments, designing a routing mechanism for transaction data transmission, completing the safe storage and transmission of the transaction data, and when in transaction, the invention provides a method for keeping data integrity and data transaction safety, which can improve the efficiency of a system in data transaction.
Description
Technical Field
The invention relates to the technical field of block chain fragment management, in particular to a transaction management system based on block chain fragments.
Background
The value of data transaction is brought into play to a great extent due to the arrival of a big data era, meanwhile, when people perform data transaction, the privacy and safety requirements of the data transaction process are correspondingly improved, the technologies such as digital currency, distributed accounts and the like in the block chain technology are widely applied in a plurality of fields, but the block chain technology has certain limitation in the data transaction process, and the transaction performed by utilizing the block chain technology can perform reliable transaction through nodes in the block chain, but the dependence on the nodes is overlarge, so that the transaction efficiency is influenced;
in the existing system, when data transaction is performed through the existing transaction platform, certain problems exist in data security and personal privacy, and the following are specifically included:
1. in the prior art, many systems share information among a plurality of organization devices by using the characteristic that a blockchain data record cannot be tampered and counterfeited, have the characteristic of openness and transparency, and apply a blockchain technology to a data transaction management process, so that the data security of transaction cannot be guaranteed;
2. in the prior art, part of systems encrypt data in a block chain by a simple encryption method, but the simple encryption method cannot meet the high security of data transaction, once a transaction channel is attacked, the data is easy to leak or be tampered, the data affects both transaction parties, and the transaction efficiency is correspondingly reduced;
therefore, a need exists for a blockchain fragmentation-based transaction management system that can improve transaction efficiency and ensure the security of transaction processes to solve the above problems.
Disclosure of Invention
The invention aims to provide a transaction management system and method based on blockchain fragments to solve the problems in the background technology.
In order to solve the technical problems, the invention provides the following technical scheme: a transaction management system based on blockchain fragmentation comprises a transaction fragmentation module, a routing design module, a transaction protection module and a transaction module;
the transaction slicing module carries out transaction slicing on the block chain according to the transaction type, distributes block chain links to each transaction slice as required, and simultaneously constructs a virtual node in each transaction slice to manage the transaction slices;
the routing design module is used for selecting a storage path for transaction data generated by the transaction fragments, designing a routing mechanism for transaction data transmission, and finishing the safe storage and transmission of the transaction data;
the transaction protection module is used for encrypting and protecting data information in transaction, encrypting the data before the transaction is carried out, and safely decrypting the transaction data when the transaction reaches a destination;
the transaction module is used for monitoring the transaction process in real time, broadcasting the transaction completion status to the whole transaction path within a fixed time interval and reminding the transaction path to enter a busy hour waiting state.
Further, the transaction fragmentation module comprises a block chain fragmentation unit, a node partitioning unit and a virtual construction unit;
the block chain fragmentation unit is used for fragmenting transactions and storing fragmented transaction data in different block chain units;
the node partitioning unit divides the nodes according to the length of the transaction data in the blockchain unit, inserts identification nodes into random positions in the blockchain unit according to the node partitioning sequence, and identifies the transaction fragments and the positions of the nodes in the current blockchain unit;
the virtual construction unit is used for generating a virtual address and a virtual random key of a transaction sender;
the virtual address is generated by hash processing, and the IP address of the transaction sender is determined according to a formula:
wherein M isIPFor encrypted virtual addresses, fuThe method is a random hash function of a transaction sender u, IP is an IP address of the transaction sender, K is a hash floating value generated randomly, m is the length of the IP address of the transaction sender, and the generation of a virtual address can protect personal information of both parties of a transaction and avoid personal information leakage in the transaction process.
Further, the routing design module comprises a storage path selection unit, a routing mechanism selection unit and a transaction data cloud backup unit;
the storage path selection unit broadcasts the virtual address generated by the virtual construction unit in a transaction network, a transaction sender takes a network address sending a response message as a transaction receiver address after receiving a response, the transaction receiver stores the current path and the transaction sender address, and the transaction sender starts to formally send transaction data after successfully receiving the broadcast response, so that whether the current transaction channel can smoothly complete the transaction can be judged, the safety of the transaction data in the sending process is improved, and the transaction can be smoothly completed;
after the routing mechanism selection unit determines the address of the transaction sender, an adaptive routing mechanism is selected to establish connection between all channels between the transaction sender and the transaction receiver, transaction data fragments are sequentially placed in all the channels, and meanwhile, the first transaction data fragment in all the channels is sent;
the transaction data cloud backup unit uploads all transaction data transmission related information to the cloud for backup storage after a first transaction data fragment is received by a transaction receiver, wherein the transaction data transmission related information comprises storage information in the storage path selection unit, time required for completing one-time transaction data fragment sending, maximum fragment allowing length of a path, path response time and path time delay.
Further, the transaction protection module comprises an encryption protection unit and a decryption protection unit;
the encryption protection unit comprises an address encryption unit and a data encryption unit, wherein the address encryption unit is used for generating a pair of public and private keys before transaction, deriving a corresponding encrypted virtual address from the public key, and the data encryption unit is used for encrypting the specific contents of all transaction data fragments through the private key and setting timing for re-encryption in the transaction process;
the address encryption unit generates a private key with the length of 32 bits by specifying a hyperbola through a system, and maps the private key with the length of 32 bits into a public key with the length of 65 bits to form a key pair (K)S,KG) In which K isSIs a private key, KGThe public key is subjected to Hash hash processing, and the last 20 bits of a processing result are taken to generate an encrypted address;
the private key is mapped to the public key according to the formula:
wherein, KGIs a public key, fuA random hash function for the sender of the transaction, e assigning the hyperbolic eccentricity to the system,specifying a hyperbolic quasi-line equation for the system, and mapping a private key to a hyperbolic curve after hash processing to obtain a public key;
the data encryption unit carries out multi-round replacement encryption on transaction data by using a 32-bit private key and simultaneously sends encrypted ciphertext and a public key to a transaction receiver;
the transaction data is subjected to multiple rounds of replacement encryption according to a formula:
wherein, PnTo permute the encrypted transaction data n times,for the inverse operation of the (n-1) th permutation, KSThe value is a private key, and the value is not carry addition;
the decryption protection unit carries out address verification through the public key after the transaction receiver receives the first piece of transaction data, sends a continuous transaction response to the transaction sender after the address verification is passed, and then decrypts the private key according to the public key and decrypts the transaction data through the private key;
the transaction protection module generates different keys when different transactions are carried out each time, meanwhile, a system user can set a key exchange time interval by himself, and key exchange can be carried out on fragments which are not finished to be sent even if the current transaction is not finished in a certain time interval, so that the safety of data transaction is further improved on the basis of ensuring one-time pad.
Further, the transaction module comprises a monitoring unit and a broadcast query unit;
the monitoring unit is used for monitoring the transaction process, checking whether all the fragments are successfully transmitted in the transaction process, monitoring the transaction access condition, and reminding both transaction parties of suspending transaction in time when the transaction access fails;
the broadcast inquiry unit is used for sending detection broadcast to all transaction channels, inquiring the current busy state of the channels, reminding the sending of the next transaction data fragment to enter an advanced waiting state according to the transaction data transmission related information, and entering the next transaction data fragment sending process when the channel is idle for the next second, so that the transaction completion time can be shortened, the system transaction efficiency is improved, and the transaction process is always kept to be smoothly carried out.
A transaction management method based on blockchain fragments comprises the following steps:
step S1, performing transaction slicing on the block chain according to the transaction type, distributing the block chain links to each transaction slicing as required, and simultaneously constructing virtual nodes in each transaction slicing to manage the transaction slicing;
step S2, selecting a storage path for the transaction data generated by the transaction fragment, designing a routing mechanism for transaction data transmission, and completing the safe storage and transmission of the transaction data;
step S3, encrypting the data information of the transaction, encrypting the data before the transaction, and safely decrypting the transaction data when the transaction reaches the destination;
step S4, real-time monitoring the transaction process, and broadcasting the transaction completion status to the whole transaction path within a fixed time interval to remind the transaction path to enter a busy waiting state.
Further, the step S1 includes the following steps:
step S11, the transaction is fragmented, and the fragmented transaction data is stored in different block chain units;
step S12, dividing the nodes according to the length of the transaction data in step S11, inserting identification nodes into random positions in the blockchain unit according to the node partition sequence, and identifying the positions of the transaction fragments and the nodes in the current blockchain unit;
step S13, generating a virtual address and a virtual random key of a transaction sender;
the virtual address is generated by hash processing, and the IP address of the transaction sender is determined according to a formula:
wherein M isIPFor encrypted virtual addresses, fuIs a random hash function of the transaction sender u, IP is the transaction sender IP address, K is a randomly generated hash floating value, and m is the transaction sender IP address length.
Further, the step S2 includes the following steps:
step S21, the virtual address generated in the step S12 is broadcasted in the transaction network, after the transaction sender receives the response, the network address sending the response message is used as the address of the transaction receiver, and the transaction receiver stores the current path and the address of the transaction sender;
step S22, after determining the address of the transaction sender, selecting an adaptive routing mechanism to establish connection between all the paths between the transaction sender and the transaction receiver, putting the transaction data fragments into all the paths in sequence, and sending the first transaction data fragment in all the paths;
and step S23, after the first transaction data fragment is received by the transaction receiver, uploading all the transaction data transmission related information to the cloud for backup storage.
Further, the step S3 includes the following steps:
step S31, generating a pair of public-private key pairs before transaction, and performing address encryption and data encryption according to the public-private key, including the following steps:
step S311, a hyperbola is specified by the system to generate a private key with the length of 32 bits;
step S312, mapping the 32-bit private key to a 65-bit public key to form a key pair (K)S,KG) In which K isSIs a private key, KGThe public key is subjected to Hash hash processing, and the last 20 bits of a processing result are taken to generate an encrypted address;
the private key is mapped to the public key according to the formula:
wherein, KGIs a public key, fuA random hash function for the sender of the transaction, e assigning the hyperbolic eccentricity to the system,specifying a hyperbolic quasi-line equation for the system, and mapping a private key to a hyperbolic curve after hash processing to obtain a public key;
step S313, performing multi-round replacement encryption on the transaction data by using a 32-bit private key, and simultaneously sending the encrypted ciphertext and the public key to a transaction receiver;
the transaction data is subjected to multiple rounds of replacement encryption according to a formula:
wherein, PnTo permute the encrypted transaction data n times,for the inverse operation of the (n-1) th permutation, KSThe value is a private key, and the value is not carry addition;
and step S32, after the transaction receiver receives the first piece of transaction data, the address verification is carried out through the public key, after the address verification is passed, a continuous transaction response is sent to the transaction sender, and then the private key is decrypted according to the public key for the transaction data content, and the transaction data is decrypted through the private key.
Further, the step S4 includes the following steps:
step S41, monitoring the transaction process, checking whether all the fragments are successfully transmitted in the transaction process, monitoring the transaction access condition, and reminding both transaction parties of suspending the transaction in time when the transaction access fails;
and step S42, sending detection broadcast to all transaction channels for inquiring the current busy state of the channels, reminding the next transaction data fragment sending to enter an advanced waiting state according to the transaction data transmission related information, and entering the next transaction data fragment sending process when the channel is idle for the next second.
Compared with the prior art, the invention has the following beneficial effects: the invention combines the cryptographic technology and the block chain technology to carry out data transaction privacy protection, improves the security of the transaction process by technical means such as one-time pad and random key, segments the transaction data, and utilizes a plurality of channels to carry out broadcast transmission after each segment is marked, thereby improving the transaction efficiency, avoiding data loss, saving time for user transaction, simultaneously avoiding data transaction failure caused by channel failure due to the arrangement of a monitoring unit and a broadcast query unit, and preventing the data from being maliciously distorted or maliciously attacked in the interaction process by using the encryption means, thereby preventing the loss of correct data and influencing the transaction completion.
Drawings
The accompanying drawings, which are included to provide a further understanding of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the principles of the invention and not to limit the invention. In the drawings:
FIG. 1 is a block chain fragmentation based transaction management system according to the present invention;
fig. 2 is a flowchart illustrating a transaction management method based on blockchain fragmentation according to the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Referring to fig. 1-2, the present invention provides the following technical solutions: a transaction management system based on blockchain fragmentation comprises a transaction fragmentation module, a routing design module, a transaction protection module and a transaction module;
the transaction slicing module carries out transaction slicing on the block chain according to the transaction type, distributes block chain links to each transaction slice as required, and simultaneously constructs a virtual node in each transaction slice to manage the transaction slices, and the method comprises the following steps:
step S11, the transaction is fragmented, and the fragmented transaction data is stored in different block chain units;
step S12, dividing the nodes according to the length of the transaction data in step S11, inserting identification nodes into random positions in the blockchain unit according to the node partition sequence, and identifying the positions of the transaction fragments and the nodes in the current blockchain unit;
step S13, generating a virtual address and a virtual random key of a transaction sender;
the virtual address is generated by using hash processing, and the IP address of the transaction sender is according to a formula:
wherein M isIPFor encrypted virtual addresses, fuIs a random hash function of the transaction sender u, IP is the transaction sender IP address, K is a randomly generated hash floating value, and m is the transaction sender IP address length.
The route design module is used for selecting a storage path for transaction data generated by the transaction fragments, designing a route mechanism for transaction data transmission, and finishing the safe storage and transmission of the transaction data, and comprises the following steps:
step S21, the virtual address generated in step S12 is broadcasted in the transaction network, after the transaction sender receives the response, the network address sending the response message is used as the address of the transaction receiver, and the transaction receiver stores the current path and the address of the transaction sender;
step S22, after determining the address of the transaction sender, selecting an adaptive routing mechanism to establish connection between all the paths between the transaction sender and the transaction receiver, putting the transaction data fragments into all the paths in sequence, and sending the first transaction data fragment in all the paths;
step S23, after the first transaction data fragment is received by the transaction receiver, all the transaction data transmission relevant information is uploaded to the cloud for backup storage, and the transaction data transmission relevant information comprises storage information in the storage path selection unit, time required for completing one-time transaction data fragment sending, path permission maximum fragment length, path response time and path time delay.
The transaction protection module is used for encrypting and protecting data information in transaction, encrypting the data before the transaction is carried out, and safely decrypting the transaction data when the transaction reaches a destination, and comprises the following steps:
step S31, generating a pair of public-private key pairs before transaction, and performing address encryption and data encryption according to the public-private key, including the following steps:
step S311, a hyperbola is specified by the system to generate a private key with the length of 32 bits;
step S312, will 3The 2-bit private key is mapped to a 65-bit public key to form a key pair (K)S,KG) In which K isSIs a private key, KGThe public key is subjected to Hash hash processing, and the last 20 bits of a processing result are taken to generate an encrypted address;
the private key is mapped to the public key according to the formula:
wherein, KGIs a public key, fuA random hash function for the sender of the transaction, e assigning the hyperbolic eccentricity to the system,specifying a hyperbolic quasi-line equation for the system, and mapping a private key to a hyperbolic curve after hash processing to obtain a public key;
step S313, performing multi-round replacement encryption on the transaction data by using a 32-bit private key, and simultaneously sending the encrypted ciphertext and the public key to a transaction receiver;
the transaction data is subjected to multiple rounds of replacement encryption according to a formula:
wherein, PnTo permute the encrypted transaction data n times,for the inverse operation of the (n-1) th permutation, KSThe value is a private key, and the value is not carry addition;
and step S32, after the transaction receiver receives the first piece of transaction data, the address verification is carried out through the public key, after the address verification is passed, a continuous transaction response is sent to the transaction sender, and then the private key is decrypted according to the public key for the transaction data content, and the transaction data is decrypted through the private key.
The transaction module is used for monitoring the transaction process in real time, broadcasting the transaction completion status to the whole transaction path within a fixed time interval and reminding the transaction path to enter a busy hour waiting state, and comprises the following steps:
step S41, monitoring the transaction process, checking whether all the fragments are successfully transmitted in the transaction process, monitoring the transaction access condition, and reminding both transaction parties of suspending the transaction in time when the transaction access fails;
and step S42, sending detection broadcast to all transaction channels for inquiring the current busy state of the channels, reminding the next transaction data fragment sending to enter an advanced waiting state according to the transaction data transmission related information, and entering the next transaction data fragment sending process when the channel is idle for the next second.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in the claims should not be considered as limiting the involved transaction slicing of the blockchain according to the transaction type, distributing the blockchain nodes to each transaction slice as required, and constructing virtual nodes in each transaction slice to manage the transaction slices;
step S2, selecting a storage path for the transaction data generated by the transaction fragment, designing a routing mechanism for transaction data transmission, and completing the safe storage and transmission of the transaction data;
step S3, encrypting the data information of the transaction, encrypting the data before the transaction, and safely decrypting the transaction data when the transaction reaches the destination;
step S4, real-time monitoring the transaction process, and broadcasting the transaction completion status to the whole transaction path within a fixed time interval to remind the transaction path to enter a busy hour waiting state and claim.
Claims (1)
1. A transaction management system based on blockchain fragments is characterized by comprising a transaction fragment module, a route design module, a transaction protection module and a transaction module;
the transaction slicing module carries out transaction slicing on the block chain according to the transaction type, distributes block chain links to each transaction slice as required, and simultaneously constructs a virtual node in each transaction slice to manage the transaction slices;
the routing design module is used for selecting a storage path for transaction data generated by the transaction fragments, designing a routing mechanism for transaction data transmission, and finishing the safe storage and transmission of the transaction data;
the transaction protection module is used for encrypting and protecting data information in transaction, encrypting the data before the transaction is carried out, and safely decrypting the transaction data when the transaction reaches a destination;
the transaction module is used for monitoring the transaction process in real time, broadcasting a transaction completion condition to the whole transaction path within a fixed time interval and reminding the transaction path to enter a busy hour waiting state;
the transaction management method of the transaction management system comprises the following steps:
step S1, performing transaction slicing on the block chain according to the transaction type, distributing the block chain links to each transaction slicing as required, and simultaneously constructing virtual nodes in each transaction slicing to manage the transaction slicing;
step S2, selecting a storage path for the transaction data generated by the transaction fragment, designing a routing mechanism for transaction data transmission, and completing the safe storage and transmission of the transaction data;
step S3, encrypting the data information of the transaction, encrypting the data before the transaction, and safely decrypting the transaction data when the transaction reaches the destination;
step S4, real-time monitoring the transaction process, broadcasting the transaction completion status to the whole transaction path within a fixed time interval, and reminding the transaction path to enter a busy hour waiting state;
the step S1 includes the steps of:
step S11, the transaction is fragmented, and the fragmented transaction data is stored in different block chain units;
step S12, dividing the nodes according to the length of the transaction data in step S11, inserting identification nodes into random positions in the blockchain unit according to the node partition sequence, and identifying the positions of the transaction fragments and the nodes in the current blockchain unit;
step S13, generating a virtual address and a virtual random key of a transaction sender;
the virtual address is generated by hash processing, and the IP address of the transaction sender is determined according to a formula:
wherein M isIPFor encrypted virtual addresses, fuIs a random hash function of the transaction sender u, IP is the transaction sender IP address, K is a randomly generated hash floating value, and m is the transaction sender IP address length.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110595082.9A CN113259450A (en) | 2020-09-30 | 2020-09-30 | Transaction management system based on block chain fragmentation |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110595082.9A CN113259450A (en) | 2020-09-30 | 2020-09-30 | Transaction management system based on block chain fragmentation |
CN202011069344.XA CN112235382B (en) | 2020-09-30 | 2020-09-30 | Transaction management system and method based on block chain fragmentation |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011069344.XA Division CN112235382B (en) | 2020-09-30 | 2020-09-30 | Transaction management system and method based on block chain fragmentation |
Publications (1)
Publication Number | Publication Date |
---|---|
CN113259450A true CN113259450A (en) | 2021-08-13 |
Family
ID=74120532
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011069344.XA Active CN112235382B (en) | 2020-09-30 | 2020-09-30 | Transaction management system and method based on block chain fragmentation |
CN202110595082.9A Pending CN113259450A (en) | 2020-09-30 | 2020-09-30 | Transaction management system based on block chain fragmentation |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011069344.XA Active CN112235382B (en) | 2020-09-30 | 2020-09-30 | Transaction management system and method based on block chain fragmentation |
Country Status (1)
Country | Link |
---|---|
CN (2) | CN112235382B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114692133A (en) * | 2021-01-22 | 2022-07-01 | 支付宝(杭州)信息技术有限公司 | Program running method and system |
CN114529405B (en) * | 2022-02-24 | 2022-11-15 | 发明之家(北京)科技有限公司 | Information access management method and system based on intelligent transaction |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108647361B (en) * | 2018-05-21 | 2021-12-03 | 中国工商银行股份有限公司 | Data storage method, device and system based on block chain |
CN109508968B (en) * | 2018-10-25 | 2020-12-18 | 常州唯康信息科技有限公司 | Block chain system and control method thereof |
CN109361952A (en) * | 2018-12-14 | 2019-02-19 | 司马大大(北京)智能系统有限公司 | Video management method, apparatus, system and electronic equipment |
CN110062034B (en) * | 2019-04-01 | 2021-11-12 | 中科天御(苏州)科技有限公司 | Block chain large file secure storage method and system |
CN110430039B (en) * | 2019-07-19 | 2022-08-19 | 瑞纳智能设备股份有限公司 | Production management system and method based on block chain |
CN110570202B (en) * | 2019-09-02 | 2022-06-03 | 杭州趣链科技有限公司 | Hybrid consensus method based on fragmentation technology |
CN111144866B (en) * | 2019-12-25 | 2021-04-30 | 腾讯科技(深圳)有限公司 | Data transfer method, device, node equipment and storage medium |
CN111612466B (en) * | 2020-01-17 | 2022-02-18 | 厦门潭宏信息科技有限公司 | Consensus and resource transmission method, device and storage medium |
-
2020
- 2020-09-30 CN CN202011069344.XA patent/CN112235382B/en active Active
- 2020-09-30 CN CN202110595082.9A patent/CN113259450A/en active Pending
Also Published As
Publication number | Publication date |
---|---|
CN112235382B (en) | 2021-09-10 |
CN112235382A (en) | 2021-01-15 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN111818031B (en) | Block chain based covert communication message security encoding method, system and medium | |
CN101322349B (en) | Certification and segmenting system and method for Substitution encryption key | |
Liu et al. | Establishing pairwise keys in distributed sensor networks | |
US9338150B2 (en) | Content-centric networking | |
EP0916209B1 (en) | Cryptographic key recovery system | |
KR20190034505A (en) | Data conversion system and method | |
CN111092717B (en) | Group authentication-based safe and reliable communication method in smart home environment | |
US7634659B2 (en) | Roaming hardware paired encryption key generation | |
US6851049B1 (en) | Method and apparatus for facilitating secure anonymous email recipients | |
US7774594B2 (en) | Method and system for providing strong security in insecure networks | |
CN109145612B (en) | Block chain-based cloud data sharing method for preventing data tampering and user collusion | |
US7457411B2 (en) | Information security via dynamic encryption with hash function | |
CN109257346B (en) | Concealed transmission system based on block chain | |
US10586065B2 (en) | Method for secure data management in a computer network | |
CN110336673B (en) | Block chain design method based on privacy protection | |
WO2020173231A1 (en) | Resource request method, device and storage medium | |
US10699031B2 (en) | Secure transactions in a memory fabric | |
CN110581839B (en) | Content protection method and device | |
CN112235382B (en) | Transaction management system and method based on block chain fragmentation | |
Khalil et al. | Sybil attack prevention through identity symmetric scheme in vehicular ad-hoc networks | |
US20030188012A1 (en) | Access control system and method for a networked computer system | |
CN110688666A (en) | Data encryption and storage method in distributed storage | |
US20210099296A1 (en) | Key generation for use in secured communication | |
Alghamdi et al. | Routing-aware and malicious node detection in a concealed data aggregation for WSNs | |
CN113111386A (en) | Privacy protection method for block chain transaction data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210813 |